Information Technology Act - Rather Than Giving Rise To Information and Technology Gives Rise To Cyber Crime
Information Technology Act - Rather Than Giving Rise To Information and Technology Gives Rise To Cyber Crime
SUBMITTED BY:
MMS Batch 2022 | Group 2
1
INDEX
1. Introduction 3
6. Case Study 13
6.1 Pune Citi bank Mphasis Call Center Fraud
6.2 Air India’s Massive Data Breach
8. Conclusion 20
9. Webliography 22
2
1. INTRODUCTION
In today’s era, computer, internet and Information and Communication Technology has totally
changed the lifestyle of the people where everyone is dependent on the evolution of technologies.
Though technology has made life easy still it has its own pros and cons, and one of the cons is the rise
in cyber-crimes. To tackle the crimes related to computer or network Information Technology Act
2000 was passed on 9 June 2000 and commenced on 17 October 2000 which provides legal
recognition for transactions carried out by means of Electronic Data Interchange (EDI). Cyber-crime
is not an old sort of crime to the world. It is defined as any criminal activity which takes place on or
over the medium of computers or internet or other technology recognised by the Information
Technology Act. With the passage of time, developing technology and its vast usage has led to new
methods of committing crimes so IT Act 2000 was amended, and a reform Act was passed
Information Technology (Amendment) Act 2008 which was made effective from 27 October 2009.
Data or information are very sensitive and confidential from a person’s , from company’s as well as
from a nation’s perspective. To keep the data secured from any wrongful possession or any form of
illegal handling various high-quality technologies are used to protect them from the reach of criminals
and even the laws are passed to put an end to the criminals. Cyber-crime is the one major drawbacks
of developing technology, but the same time technologies has made peoples life better in personal as
well as in their professional life. Every now and then cyber crime takes place around the world be it
extracting money , illegally handling information , causing disruption in a system, hacking into
personal accounts and many more. In India as a developing country even the people need to
understand the correct and wrong way of the usage of technology, people still lack the knowledge in
this fast-paced world of technology and various bodies are present to deal with the cyber-crimes.
3
Data confidentiality is a basic security service for data protecting. It is about protecting data against
international, unlawful, or unauthorized access, disclosure, or theft. Confidentiality has to do with the
privacy of information, password, including authorizations to view, share and use it, which must
remain confidential to protect the system and accounts. Low confidentiality data considered as
“public” or otherwise not threatening if exposed beyond its audience. High confidentiality data is
considered “secret” and must be kept confidential to prevent identity theft, compromise of accounts
and system, legal damage, and other consequences.
Social security numbers and credit card numbers, which must remain confidential to prevent
identity theft.
Passwords and security codes, which must remain confidential to protect systems and
accounts.
The internet is a fundamental part of our lives, and because of this rise in the use of the internet, the
threat of cybercrime and data hacking also rises day to day. Hackers are stealing or compromising
4
billions of pounds worth of data from business and companies' systems each year. The companies that
hold the personal information have a legal duty to keep it safe. There also, the hackers get access to
the company system and steal the data from the system.
Examples of famous hackers in history are Kevin Mitnick, Jahan Helsinguis, Linus Torvalds, Robert
Morris, and so many others.
Examples: -
Yahoo data hacked in 2017.
LinkedIn data hacked in 2021.
Facebook data hacked in 2019.
Types of hacking: -
Website hacking, Network hacking.
Ethical hacking and Email or Password hacking.
Online banking hacking and Computer hacking.
Three interrelated concepts that affect the protection of data are Privacy, Confidentiality and Security.
Privacy is both legal and an ethical concept. Privacy protections vary between jurisdictions and are
defined by law and regulations.
Confidentiality relates to the right of individuals to protect their data during its storage, transfer and
use to prevent unauthorized disclosure of information.
Security discussion should include identification of threats to system and data, and they must address
both the protection of data from inadvertent or malicious disclosure of data due to system failure or
errors.
5
3. Short Information on NASSCOM
The National Association of Software and Services Companies is a not-for-profit trade association for
the Information technology and Business Process Management (BPM) industry in India. NASSCOM
was established in 1988 since then it has been the supportive body for the IT BPM industry and
dedicated to expanding India’s role in the global IT order by creating a valuable business
environment, simplifying policies and procedures, promoting intellectual capital, and strengthening
the talent pool. NASSCOM facilitates business and trade in software and services and encourages the
advancement of research in software technology. It is registered under the Indian Societies Act, 1860.
It’s head-quarter is in New Delhi, India.
NASSCOM acts as an advisor to the Indian government as well as to state levels and forms a global
level partnership in promoting Indian IT BPM industry. It conducts in depth research on IT BPM
industries to keep its members aware of the global trends, best practices, threats, and opportunities. It
maintains high quality products and services with the aim of developing public confidence for its
members and the industry. It creates business opportunities for its members in India and on a global
platform. It conducts various seminars, webinars, and events for its members to build their networks.
It works with the government of India and support in policy making to enable the industry to meet its
growth and over the years it has been an industry trusted partner in policy framing and review.
During this pandemic India’s IT BPM sector showed a growth of 2.3% to $194 billion in the financial
year 2020-21. IT services grew 2.7% to $99 billion, BPM grew 2.3% to $38 billion and IT exports
showed a growth of 1.9% which is $150 billion whereas engineering R&D degree 0.2% to $31 billion.
As there was a shift in the working environment of working from the offices to work from anywhere
using new technologies showed a digital transformation which in-turn showed 28-30% growth in the
digital revenue of 50-53 billion dollars. As an industry, the vision is to grow to a 300-350 bn dollar
sector by 2025. This requires building and expanding market opportunities in India, in emerging
markets and existing markets.
NASSCOM made detailed memorandum of suggestions to Ministry of Finance (MoF) and members
of GST Council with respect to the Goods and Services Tax (GST) to enable growth and ease of
doing business for the Information Technology (IT) - Business Process Management (BPM)/ IT
enabled Services (ITeS) Industry.
6
4.1 Introduction
The emerging information technology and cyber devices heralded a new world and brought
tremendous change in all the sectors of the economy. One of them is the Banking sector which is the
backbone of Indian financial system and in today’s era, technology support is very important for the
successful functioning of the banking sector. Banking sector always stands at the forefront of the
economy and innovation has paramount concern to the application of modern technical devices.
Competition from fintech firms and big tech giants, increased expectations from the consumer, and
new innovations connecting data to digital delivery are requiring banks and credit unions to embrace
new technologies to build winning strategies.
Some of the Technology’s advancement used in Banking sector are described below:
ATM : Automated Teller Machines are computerized machines placed by the local banks in
various places of a city or town to enable customers to access their accounts and perform
certain banking operations.
Net Banking: It provides personal banking services that gives complete control over all
banking demands online
Mobile Banking: It provides all banking solutions on one’s mobile handset. This makes
banking operations very convenient for all those who own a mobile phone
RTGS: Real-time gross settlement' systems (RTGS) are specialist funds transfer systems
where transfer of money or securities takes place from one bank to another on a "real time"
and on "gross" basis. Settlement in "real time" means payment transactions are not subjected
to any waiting period.
IMPS: Using Immediate Payment Service (IMPS) the payment can be made in 24*7 and 365
days in a year. IMPS payments are safe and secured as they are end-to-end encrypted. IMPS
offers intra and inter-bank electronic fund transfer service through mobile phone.
UPI: Unified Payments Interface (UPI) is an instant real-time payment system developed by
National Payments Corporation of India which allows users to transfer money between banks.
It is a system which holds multiple bank accounts into a single mobile application having
several banking features. It eliminates the need to enter bank details or other sensitive
information each time a customer initiates a transaction.
Debit and Credit Clearing System: A credit clearing system is an arrangement in which the
members of an association of traders, each of whom is both a buyer and a seller, agree to
allocate to one another sufficient credit to facilitate their transactions amongst themselves.
7
MICR Technology: Magnetic Ink Character Recognition (MICR) is a machine which reads,
processes and records information by identifying the readable code which is printed on the
cheque. It has enhanced security against fraud and mechanization of check processing.
CTS: Cheque Truncation System (CTS) is a cheque clearing system using the electronic
image of the cheque which transmits vital information like MICR, date , bank information etc.
This would eliminate the need to move the physical instruments across the banks and it will
enhance the customers convenience along with an efficient way rather than the paper
clearance system.
Information Technology offers great potential and various opportunities to the Indian Banking
sector. It provides cost-effective, rapid, and systematic provision of services to the customer.
Banking process is faster than before and more reliable, even maintaining and retrieving
documents and records is much faster.
Transparency between the banks and the customers regarding each transaction and the
activity carried out by both are recorded.
Technology has brought customers' relation with the banks into greater focus. It is an
instrument to cost reduction and effective communication with people and the institutions
associated with the banking business.
Banks produce large amounts of data and transactions every now and then which are
confidential and need to be protected. So Banks deploys advanced analytics ,real time
monitoring and AI to detect threats and voluntarily stops it from happening.
Using Artificial Intelligence (AI) banks can easily carry out and even transform their services
according to customer’s needs.
The scope of frauds in banks is being minimised using passwords, double authentication in
online banking.
The modern technology helps in tracking the key customers and provides them better
services.
Owing to lower branch maintenance and manpower cost such banks can offer competitive
pricing for their product and services as compared to traditional banks.
IT also provides the framework for the banking industry to meet challenges in the present
competitive environment.
8
4.3 Negative Impact of IT on Banking Sector:
Banks and other financial institutions are now-a-days suffering from cybercrimes as they have
personal data of clients that possess valuable information for the banks.
In the current era of digitalization workforces, services have shifted from traditional banking
to online banking. If the bank does not have a proper security system , it will come under
cyber security threats.
Technology has taken the place of men in banks as the services and information are easily
made available to the customers.
Fraudsters make use of technologies to dupe money from a person's accounts and transfer it to
its desired account.
Banking services turned online with the use of mobile made life easy but at the same time
with the use of mobile criminals collect data from the people.
Hacking is one of common ways to get unauthorized access by cracking the systems or by
trying to bypass the security mechanisms and get into banking sites and even the accounts of
the customers.
Online credit card frauds take place when customers use their credit card or debit card for any
online payment if another person with malafide intentions, uses such card details and
password by hacking and misusing the customers' hacked card details.
Key logging are activity-monitoring software programs by which fraudsters record actual
keystrokes and mouse clicks to get access to your personal data. Criminals make use of all
sensitive data and try to steal the money from the banks of the customer.
The technology on one hand serves as a powerful tool for customer servicing, on the other hand, it
itself results in depersonalising of the banking services. This has an adverse effect on relationship
banking. A decade of computerization can probably never substitute a simple or a warm handshake.
At the same time in the pace of innovation and digitization , money cheating has increased using
various methods with the use of the same technologies. Cyber Crime is a Technology related offence
and Information Technology Act comes in to reduce the cybercrimes in India. According to the
National Crime Records Bureau, it was found that there has been a huge increase in the number of
cyber-crimes in India in the past three years. Electronic crime is a serious problem. In cases of cyber-
crime, there is not only financial loss to the banks but the faith of the customer upon banks is also
undermined.
9
5. Comparison of Indian IT Act with other countries
Norton claimed that more than According to 2010 data, 70% of According to the report, a
5.4 million Australians were New Zealand adults have been whopping 27 million Indian
victims of cyber-crime – a the targets of some form of adults were victims of identity
quarter of the country’s total cyber-crime, with the most theft in the past 12 months, and
population; those crimes cost common complaints being 52% of adults in the country do
Australia $1.65 billion over that computer scams, fraud and not know how to protect
year, and the Australian viruses/malware. themselves from cyber crime.
Government to stay above $1 “In a year of lockdowns and
billion a year for the foreseeable restrictions, cybercriminals have
future. not been deterred. More Indian
adults fell victim to identity
theft in the past 12 months and
most are concerned about data
privacy,"
10
cyber threats, with a focus on crimes: cyber-espionage, cyber security.
government, critical hacktivism and terrorist use of Emerging technologies,
infrastructure and other systems the Internet. explosion of digital business
of national interest”. In 2012 New Zealand passed models and a substantial
Other priorities include the Search and Surveillance increase in the instances of
educating the Australians with Act.35 The Act unified the cybercrimes have triggered the
information and practical tools powers that previously were government to take steps to fast
to protect themselves online, scattered across roughly 70 track the process of amending
cooperate with businesses to agencies. the IT Act.
promote cyber security, The Secret Intelligence Service On 23 February 2003, the
promote the development of a and the Government MeitY designated the Indian
skilled cyber security Communications Security Computer Emergency Response
workforce, model best practice Bureau are still governed by Team (“CERT-In”) as the
in the protection of government their own legislation. authority to issue instructions
ICT systems, and promote a for blocking websites under the
secure global electronic IT Act to prevent online
operating environment that obscenity[5]. In 2009, CERT-
supports Australia's national In was later nominated as the
interests. national agency to respond to
cyber-security incidents
The Law and the need for The Law and the need for The Law and the need for
Warrants Warrants Warrants
The Ministry for Home Affairs The following offences are It is clear from the new Cyber
and Justice and the Police are identified as “crimes involving Security Strategy that the
the authorities responsible for computers” and are subjected to Finnish government attributes a
cyber-crime. punishment according to great importance on securing
The Ministry released the Crimes Act: the key businesses, crucial
Protocol for Law Enforcement Section 249 – “Accessing governmental institutions and
Agencies on Cybercrime computer system for dishonest critical infrastructure providers
Investigations in 2011. purpose” from cyber-attacks that pose
The protocol provides a cyber- Section 250 specifies political or economic threat than
crime investigation matrix that imprisonment for a term not on solving cyber-crime or
outlines the most appropriate exceeding 10 years to everyone enforcing legislation.
agencies to deal with particular who intentionally damages or The Cyber Security Strategy
types of complaints, and alters any computer system “if outlines the responsibilities of
provide specific arrangements he or she knows or ought to current and to-be-established
for sharing information to cyber know that danger to life is likely legislative authorities and
crime investigations between to result”. Any damage to emphasizes the cooperation
jurisdictions. computer system, interference between different private and
with data without authorisation, public sectors to secure
causing computer system to fail cyberspace and prepare for
or deny service to any effective crisis management.
authorised user is punishable by However, the Cyber Security
imprisonment for up to 7 years. Strategy is not meant to
Section 251 Making, selling, establish laws or set any legal
or distributing or possessing framework; its purpose is to
software for committing a crime outline the national strategic
– imprisonment for up to 2 vision.
years
6.
11
6. Case Study
6.1 Pune Citibank v Mphasis Call Center Fraud
Introduction :
In 2005, US $ 3,50,000 which was almost INR 1.5 Cr back then were dishonestly transferred to fake
accounts in Pune from Citibank accounts of four US customers , through the internet.
Some employees of a call centre under the guise of helping the customers to get out of difficult
situations gained the confidence of the US customers and obtained their PIN numbers. But later they
used these numbers to commit fraud.
The fake accounts were then opened in Pune and the money from those Citibank customers got
transferred into those accounts. Later when luckily a customer complained about his money being
transferred to the accounts in Pune and the police came into action. Citigroup Investigation Services
in Mumbai were alerted about the situation. The team contacted the recipient banks and confirmed the
fraud. When the main accused came to check the transfer, the police caught him and made a total of
16 arrests. They used SWIFT i.e. Society for Worldwide Interbank Financial Telecommunication to
transfer the funds. When the bank accounts were made in Pune, fake email accounts were also made
because of which the original account holders never received the confirmations, which they would
have received during the transferring of funds. In March 2005, with the help of two home loan agents
ICICI whose role was to facilitate illegal accounts the money was being moved to a dozen bank
accounts which were made by them. They were not from BPO but were part of the scam and also
among the people who were arrested.
Judgement :
● The Court held the accused under Section 43(a) of IT Act, 2000 as it is applicable in the
present case because of the presence of the unauthorized access to the "Electronic Account
Space" of the customers that are involved to commit transactions and is therefore firmly
within the domain of "Cyber Crimes".
12
● The accused were charged under Section 66 of the same Act and Sections 420 i.e., cheating,
465, 467, and 471 i.e., forgery.
ITA-2000 is versatile enough to accommodate the aspects of crime not covered by ITA-2000 but
covered by other statutes since any IPC offence committed with the use of "Electronic Documents"
can be considered as a crime with the use of a "Written Documents". "Cheating", "Conspiracy",
"Breach of Trust", etc. are therefore applicable in the above case in addition to the section in ITA-
2000.
Conclusion :
● The strict background check needs to be done compulsorily for the companies while
appointing call center executives. Though the background check cannot eliminate the
possibility of such security breaches but still it must be ensured that the checks should not be
ignored while hiring the employees.
● The customers should be educated by the banks to not fall under such traps. Customers need
to be open-eyed while dealing with call-centre agents. Sharing of passwords, PINs or blank
cheques with your signature on it is nothing less than a dumb act itself. Even the verification
code at the back of a credit card should not be shared. Also, customers should keep
monitoring their accounts and statements routinely to spot any unauthorised transaction if
any.
Suggestions :
One should make sure never to disclose any personal information to strangers via any means.
One must avoid sending photographs to strangers online as misusing and breaching of
photograph incidents is increasing day by day.
You should never share your credit card number to any site that is not secured.
Web servers running public sites must be separately protected from internal corporate
networks to maintain privacy.
An updated Antivirus software should be used by everyone to guard against virus attacks. To
control information on sites, It is better to use a security program by the body corporate .
To break down the criminal activities relating to cyberspace and protection of computer
systems, the IT department should pass guidelines and notifications and should also bring out
some more strict laws.
Special police task force which is expert in the technical field can be allotted for the
protection of such acts.
13
6.2 Air India's Massive Data Breach
Introduction :
In May 2021 Air India made an announcement that its customer database had suffered from a massive
security breach. They informed that the breach involved personal data registered of passengers
registered between August 2011 and February 2021”
The airline announced that the breach took place due to breach from the SITA passenger service
system which is a technology-based company located in Switzerland, specializing in information
technology and air transport communications. The data breach involved information of around 45
lakh passengers.
Leaked data included passenger’:
● Name
● Contact information
● Date of birth
● Ticket information
● Passport information
● Credit card data
● Frequent flyer data
The details of the security breach are not entirely clear yet. The only thing known was the breach
occurred due to a cybersecurity attack of the airline’s third-party data processor, in which not only Air
India but many airlines all over the world got affected by.
14
Conclusion :
Now-a-days, cyberattacks have been reported frequently by many companies, which are posing a
serious threat towards the privacy of every individual. With the rise in digitalization
across the globe there's an increase in the cyber-crimes and cyber-attacks by the criminals.
Within six months the Air India security breach was India’s second airline data breach. In December
2020, IndiGo’s servers were hacked, and they announced that it is possible that the stolen information
could be uploaded on public websites by hackers.
The question is, are these big companies like Air India and others doing enough from a data security
and data privacy point of view??? Are they doing enough to protect themselves and their customers
who put their trust in them? It is very important that organizations take steps to bulletproof their data
from hackers, especially if they are using external third-party services.
Compliance with best-practice data security guidelines is also a crucial task that these companies
should consider and international standards is a significant step to prevent future breaches. also, to
mitigate the potential damage of breaches that may occur, it is of utmost importance that an
organisation employs a strong encryption strategy and operational processes.
Suggestions :
Air India must ensure that:
● Even at rest its data remains encrypted in its databases.
● Its data is encrypted while in transit when it migrates between clients, applications, and Air
India personnel.
● The HSMs (hardware security module) are not accessible by the third-party data processor.
● All key management is performed only by Air India.
● Its encryption keys are never in a third-party's data processor and remain stored in Air India’s
secured data center.
● Third parties do not have access to any kind of readable data.
● The multifactor authentication of clients is implemented so that there is limited access to data
and only to authorized persons like passengers who can only view their personal data.
These steps towards best practice stress the need for strong cryptography using HSMs and lifecycle
key management, which enables a business to be confident that its sensitive data is even at rest or in
use is fully protected against breaches - so confidential data remains encrypted even if attackers gain
access to it.
15
7. COVID a boon or bane for Information Technology.
Nature is inevitable. The predictions and expectations are not in our hand. The example of the same is
Covid 19. While everything was going normal suddenly the phenomenal change occurred and
changed everything. The phenomenal change was a virus, a virus named corona that hit the whole
world round. As the virus has risen one thing will surely happen that is nothing going to be same
again and India is the most affected country because of it. The virus had brought many changes in
every person’s life. Pre lockdown or before lockdown when everything was normal people were
working in their own comfort zones like maximum in the office and minimum from home or vice
versa or a place from where they can work. But now situation has reversed covid had made everyone
sit home and work. This situation is the new normal.
The spread of pandemic Covid-19 has drastically disrupted every aspect of human life including
Indian IT sector. It has created an unusual test on IT sector. In many IT companies around the world,
offices are closed, and work is done from home. One can clearly see that over a decade IT Sector has
been India’s one of the blooming and leading sector to economic growth of India. This sector has
have become a dream of many in fulfilling their accomplishments. However, due to coronavirus
Covid-19 outbreak, players in India’s IT services, according to industry analyst says that there will be:
16
Teams. All these teleconferencing tools help the people who are in quarantine to stay in touch
with their family members as well as have conference meetings and work at the same time.
Most organizations do not have a tech stack in place for a reliable business continuity plan
(BCP). due to enhanced remote work scenarios, IT department will play a larger role in future
BCPs and will need help from IT service providers in producing devices, setting up a
resilient, flexible, and secure network, disaster recovery systems, IT security, etc.
The need for even-faster access to data and automation will enhance the focus on network
equipment and communications as never before, speeding up 5G network deployments and
adoption of 5G equipment. Due to the coronavirus, a lot of opportunities opened in the IT
industry, such as the growing need for the 5th generation. This will help increase connections
that support the primed remote interactions. This has become the top priority for many
organizations due to the pandemic.
IT has become the most prominent internal function in the aftermath of COVID-19, with
business and other functions expecting IT services and support like never. IT will truly
become the backbone of business in the post COVID-19 period.
Because of IT sector people are getting diagnosed, treated, and operated without the need of
a physician to be physically present. A lot of apps have been built in the past few months to
help achieve this. There are many patients who are in self-quarantine who need medical
supervision and medical assistance every day, and these applications could help them achieve
that.
According to Business Standard report the pandemic has been a blessing in disguise and will lead to a
larger number of people to work from home in the post coronavirus world says two expert
Largest software exporter TCS's Chief Executive and Managing Director Rajesh Gopinathan
said that over a decade, IT companies' model was based on employees trooping-in to cubicles
often in specially erected or hired campuses for work, but the lockdown resulted in a quick
shift to the WFH model.
Chief Executive of business process management player WNS and former Chairman of IT
industry lobby grouping NASSCOM Keshav Murugesh, Chief Executive of business process
management player WNS and former Chairman of IT industry lobby grouping NASSCOM,
said the association responded to the challenge by helping its members transport over 25 lakh
desktops from offices to associates' residences within a fortnight, which ensured work can
continue. Once they started working from home, companies are seeing gains on costs as well
17
as efficiencies, and now, business leaders are certain that fewer people will be manning the
cubicles spread across campuses.
So here one can state that initially it was a bane for the It sector because at the start of the pandemic or
lockdown the IT sector was affected badly. As no one had a clue about how to manage whole working
system from home, pre covid work from home used to happen on certain days but lockdown made it
permanent. While every situation was new the IT sector faced certain problems like providing laptops
to every employee, to see whether employee’s internet facilities are working well or not etc. At that
moment everything seemed difficult but as days passed IT sector condition started to normalize. The
sector is looking forward to continues the permanent work from home. However, it is saving
companies expenses and employee travelling time. It will boon for IT sector in coming years.
18
8. CONCLUSION
As one can see the growth in the technology’s day by day, this directly creates lots of data or
information which lies openly in the cyber space. With so many cyber-crimes happening all over the
world these days, data or information are at risk of getting misused by criminals. Hacking is becoming
a serious problem, and it is not something that can be put to an end. It seems the technologies have
paved the way for these hackers too. Cyber-crime has become a great threat to mankind and in various
sectors of industries such as Banking sectors , Company’s confidential information , customers data,
etc. getting leaked and many others. To slow down the rate of crime it is not only the responsibility of
government or cyber-crime control departments, but it is the responsibility of each person who is part
of society to be aware of such frauds and should use the cyber space diligently.
You should make sure never to disclose any personal information to strangers via any means.
You should never share your bank details or any account related details at any unauthorized
site without making sure the security of your information.
One must avoid sending photographs to strangers online as misusing and breaching of
photograph incidents is increasing day by day.
One must be aware of the fraud call and should make sure to report it to the officials as soon
as possible to save yourself and others.
Elders in the house must be educated regarding the fraud call where they state that they are
part of banks and trap them in giving their details resulting in getting duped.
An updated Antivirus software should be used by everyone to guard against virus attacks.
An updated Antivirus software should be used by everyone to guard against virus attacks. To
control information on sites, it is better to use a security program by the body corporate.
Web servers running public sites must be separately protected from internal corporate
networks to maintain privacy.
Even at rest companies should make sure that their data remains encrypted in its databases.
Rather than with third party’s data processors, companies should make sure that the data’s
encryption keys are in the company's secured data center.
Third parties should not be given access to any kind of readable data.
19
The strict background check needs to be done compulsorily for the companies while
appointing call center executives. Though the background check cannot eliminate the
possibility of such security breaches but still it must be ensured that the checks should not be
ignored while hiring the employees.
The customers should be educated by the banks to not fall under such traps.
To break down the criminal activities relating to cyberspace and protection of computer
systems, the IT department should pass guidelines and notifications and should also bring out
some more strict laws.
Special police task force which is expert in the technical field can be allotted for the
protection of such acts
Cybercrime is not a particular states or country’s problem but a worldwide crime affecting
lakhs and crores of people. So instead of making different laws for different countries,
universal laws should be made for cyber-crime and accordingly the punishments should be
given to decrease the threat or fear people have nowadays because of cybercrimes happening.
So, to decrease cyber-crimes, we should not just depend on officials or authorities but should become
aware of all these happening in the cyber world we are living in these days.
20
9. Webliography/ Bibliography
https://www.indiacode.nic.in/handle/123456789/1999
https://nasscom.in/
https://timesofindia.indiatimes.com/business/india-business/it-iindustry-to-grow-2-3-to-
194bn-in-fy21-nasscom/articleshow/80954964.cms
https://www.legalserviceindia.com/legal/article-3073-cyber-frauds-in-the-indian-banking-
industry.html
https://www.mygreatlearning.com/blog/biggest-cyber-security-threats-indian-banking-sector/
https://www.business-standard.com/article/finance/cyber-crime-is-growing-risk-to-bank-
ratings-s-p-121052500341_1.html
https://www1.udel.edu/security/data/confidentiality.html
https://www.hayesconnor.co.uk/cyber-crime/data-hacking/
https://bnwjournal.com/2020/07/17/pune-citibank-mphasis-call-center-fraud/
http://www.indiancybersecurity.com/case_stuty_pune_citibank_mphasis_call_center_fraud.p
hp
https://www.ecommercetimes.com/story/42112.html
https://www.lawctopus.com/academike/cyber-crimes-other-liabilities/
https://www.thehindu.com/news/national/telangana/impact-of-covid-19-bane-for-many-boon-
for-some/article31193295.ece
https://community.nasscom.in/communities/covid-19/is-covid-19-a-boon-or-bane.html
https://solidstatetechnology.us/index.php/JSST/article/view/5208
https://www.google.com/search?
q=Pune+Citibank+MphasiS+call+center+fraud+judgments&sa=X&biw=1366&bih=657&sxs
rf=ALeKk00DOAKXUkVDbvA3k14nb841ycUWxQ:1628405569634&tbm=isch&source=iu
&ictx=1&fir=EWNreTG4KUBj4M%252C1aS9lDsMSQ8bMM%252C_&vet=1&usg=AI4_-
kSIOy-
b4A_fCi_P5sQAUjUJ2vjYtg&ved=2ahUKEwi60Zy866DyAhWW73MBHeaDAdgQ9QF6B
AggEAE#imgrc=EWNreTG4KUBj4M
21