Cyber
Cyber
● Computers and networks are often used as tools to facilitate traditional crimes
like fraud, identity theft, phishing, and the spread of spam.
● These crimes exploit human weaknesses and are more challenging to trace and
prosecute due to the anonymity offered by digital tools.
Online Harassment and Cyberbullying:
● Darknet markets have become a significant platform for the illegal sale of
drugs, using encrypted tools like VPNs and Tor to maintain anonymity.
● These markets operate with a high level of secrecy, using cryptocurrencies like
Bitcoin for transactions.
● Despite law enforcement efforts, such as FBI crackdowns, these markets
continue to thrive, with thousands of transactions occurring daily. Exit scams,
where vendors disappear after receiving payment without delivering goods,
are common.
##**INCIDENTS**##
2005: Government Website Defacements
● Incident: The website of the anti-corruption movement led by Anna Hazare was
hacked.
● Details: Hackers targeted the website to disrupt the campaign's activities. The
attack involved altering or removing content from the site.
● Impact: Disruption of online campaign efforts and a blow to the movement’s
visibility and credibility.
● Purpose: To hinder the anti-corruption efforts and make political statements.
● Purpose: This Act regulates and controls the production, manufacture, import
inter-State, export inter-State, import into India, export from India, and
transshipment of narcotic drugs and psychotropic substances. It also covers
offenses related to drug trafficking, which can occur online.
● Purpose: Provides legal recognition for electronic records and digital signatures.
It ensures that electronic transactions are legally valid and can be used as
evidence in disputes.
● Purpose: Protects the rights of creators over their literary and artistic works. The
2012 amendment included provisions to address digital copyright infringement,
ensuring that digital content creators have their rights protected online.
● Purpose: Provides guidelines for intermediaries (like social media platforms) and
digital media entities. It mandates how they should handle content moderation,
user grievances, and compliance with government regulations.
● Purpose: Aims to regulate the processing of personal data and ensure privacy
protection. Although not yet enacted, it is designed to set guidelines for how
personal data is collected, stored, and used by organizations.
● Purpose: This Act provides the legal foundation for regulating electronic
commerce, data security, and cybercrimes in India. It includes provisions for:
○ Section 43: Addresses unauthorized access to computer systems and
data.
○ Section 66: Covers hacking and other computer-related offenses.
○ Section 70: Protects critical information infrastructure, such as systems
vital to national security.
○ Section 72: Deals with breaches of confidentiality and privacy of data.
● Purpose: These rules outline the security practices organizations must follow to
protect sensitive personal data or information (SPDI). They set standards for:
○ Implementing reasonable security measures.
○ Safeguarding data from unauthorized access or breaches.
○ Handling data breaches and informing affected individuals.
● Purpose: This policy outlines India’s strategy for securing cyberspace. Its goals
include:
○ Protecting information and communication infrastructure.
○ Enhancing national cybersecurity posture through a multi-stakeholder
approach.
○ Building capabilities for cyber threat detection and response.
4. National Critical Information Infrastructure Protection Centre
(NCIIPC) Act, 2014
● Purpose: Issued by the RBI, these guidelines provide banks and financial
institutions with detailed instructions on:
○ Securing IT systems and data.
○ Managing cybersecurity risks and responding to incidents.
○ Ensuring compliance with regulatory standards for cybersecurity.
● Purpose: These rules regulate intermediaries (e.g., social media platforms) and
digital media entities. They require:
○ Content moderation to handle illegal or harmful content.
○ Measures to address cybersecurity threats and user grievances.
○ Compliance with government directives on digital media.
8. The Personal Data Protection Bill (PDPB) (Still Under Discussion)
● Purpose: Aims to regulate the processing of personal data and enhance privacy
protections. Key aspects include:
○ Establishing data protection frameworks for handling personal
information.
○ Imposing requirements for data security measures and breach
notifications.
○ Creating mechanisms for addressing data protection violations (Note: Not
yet enacted).
● Purpose: Replaces the PDPB and focuses on data protection with a strong
emphasis on:
○ Protecting personal data through robust security measures.
○ Implementing breach notification requirements.
○ Establishing rights for individuals regarding their personal data.
● Purpose: Provides the primary legal framework for online safety and
cyber-related issues.
○ Section 43: Addresses unauthorized access to computer systems and
data, promoting online safety by deterring hacking and data theft.
○ Section 66: Criminalizes hacking and other computer-related offenses,
enhancing protections against unauthorized access and cyberattacks.
○ Section 67: Deals with the publication and transmission of obscene
material in electronic form, aiming to prevent online harassment and
inappropriate content.
○ Section 72: Addresses breach of confidentiality and privacy, ensuring that
personal data is not misused or disclosed without consent.
● Purpose: Provides detailed guidelines for handling sensitive personal data and
implementing reasonable security measures to protect online safety.
○ Requires organizations to adopt security practices for protecting sensitive
personal data.
○ Specifies the procedure for handling data breaches and informs affected
individuals.