Advantages of Cyber Laws
Advantages of Cyber Laws
Advantages of Cyber Laws
1) From the perspective of e-commerce in India, the IT Act 2000 and its
provisions contain many positive aspects. Firstly, the implications of these
provisions for the e-businesses would be that email would now be a valid
and legal form of communication in our country that can be duly produced
and approved in a court of law.
2) Companies shall now be able to carry out electronic commerce using the
legal infrastructure provided by the Act.
3) Digital signatures have been given legal validity and sanction in the Act.
4) The Act throws open the doors for the entry of corporate companies in the
business of being Certifying Authorities for issuing Digital Signatures
Certificates.
5) The Act now allows Government to issue notification on the web thus
heralding e-governance.
6) The Act enables the companies to file any form, application or any other
document with any office, authority, body or agency owned or controlled by
the appropriate Government in electronic form by means of such electronic
form as may be prescribed by the appropriate Government.
7) The IT Act also addresses the important issues of security, which are so
critical to the success of electronic transactions. The Act has given a legal
definition to the concept of secure digital signatures that would be required
to have been passed through a system of a security procedure, as stipulated
by the Government at a later date.
8) Under the IT Act, 2000, it shall now be possible for corporates to have a
statutory remedy in case if anyone breaks into their computer systems or
network and cause loss.ses damages or copies data. The remedy provided by
the Act is in the form of monetary damages, not exceeding Rs. 1 crore.
intro
Internet. The terms Internet and World Wide Web are often used in
everyday speech withoutmuch distinction. However, the Internet and the
World Wide Web are not one andthe same. The Internet is a global data
communications system. It is a hardwareand software infrastructure that
provides connectivity between computers. Incontrast, the Web is one of the
services communicated via the Internet. It is acollection of interconnected
documents and other resources, linked by hyperlinksand Uniform Resource
Locator [URLs] The World Wide Web was invented in 1989 by the English
physicist Tim Berners-Lee, now the Director of the World Wide Web
Consortium, and later assisted byRobert Cailliau, a Belgian computer
scientist, while both were working at CERN inGeneva, Switzerland. In
1990, they proposed building a "web of nodes" storing"hypertext pages"
viewed by "browsers" on a network and released that web inDecember
Cyber Law
Cyber law is a term used to describe the legal issues related to use
of communications technology, particularly "cyberspace", i.e. the Internet. It
is less adistinct field of law in the way that property or contract are, as it is
an intersectionof many legal fields, including intellectual property, privacy,
freedom of expression,and jurisdiction. In essence, cyber law is an attempt
to apply laws designed for thephysical world to human activity on the
Internet. There is no one exhaustive definition of the term
Cyberlaw. Simply speaking,Cyberlaw is a generic term which refers to all
the legal and regulatory aspects of Internet and the World Wide Web.
3
Carding: It means false ATM cards i.e. Debit and Credit cards used by
criminals for their monetary benefits through withdrawing money from the
victims bank account mala-fidely. There is always unauthorized use of ATM
cards in this type of cyber crimes.
Cheating & Fraud: It means the person who is doing the act of cyber crime
i.e. stealing password and data storage has done it with having guilty mind
which leads to fraud and cheating.
Assault by Threat: refers to threatening a person with fear for their lives or
lives of their families through the use of a computer network i.e. E-mail,
videos or phones.
Cyber Squatting: It means where two persons claim for the same Domain
Name either by claiming that they had registered the name first on by right of
using it before the other or using something similar to that previously. For
example two similar names i.e. www.yahoo.com and www.yaahoo.com.
by altering or deleting it. Worm attacks plays major role in affecting the
computerize system of the individuals.
Internet Time Thefts: Basically, Internet time theft comes under hacking. It
is the use by an unauthorised person, of the Internet hours paid for by another
person. The person who gets access to someone elses ISP user ID and
password, either by hacking or by gaining access to it by illegal means, uses
it to access the Internet without the other persons knowledge. You can
identify time theft if your Internet time has to be recharged often, despite
infrequent usage.
Online Gambling: Online fraud and cheating is one of the most lucrative
businesses that are growing today in the cyber space. There are many cases
that have come to light are those pertaining to credit card crimes, contractual
crimes, offering jobs, etc.