Cyber Crime
Cyber Crime
Introduction
1. Section 43:
Penalizes unauthorized access to computer systems, including
hacking, introducing malware, or damaging data.
2. Section 66:
Criminalizes hacking activities, with penalties including
imprisonment of up to 3 years and fines of ₹5 lakhs.
4. Section 69:
Empowers government agencies to intercept, monitor, or decrypt
any information in the interest of national security.
5. Section 79:
Provides a safe harbor to intermediaries but mandates cooperation
with law enforcement to tackle cybercrimes.
6. Amendments of 2008:
Introduced provisions for data protection, phishing, and incident
response, leading to the creation of CERT-In as a central body for
cybersecurity.
Key Provisions Related to Cyber Forensics
1. Section 67C:
Requires intermediaries to preserve and retain information for
prescribed periods to aid forensic investigations.
2. Section 72:
Penalizes unauthorized sharing of sensitive data acquired during
forensic or professional duties.
3. Section 69A:
Allows the government to block public access to information for
cybersecurity concerns.
Summary:
Employees of a BPO misused Citibank customer data to siphon off
₹1.5 crores from accounts.
Impact:
Highlighted the vulnerability of outsourced call center operations
and the need for stronger cybersecurity laws.
Relevance to ITA:
Invoked provisions under Section 66 and Section 72.
Summary:
A customer sued Sony India Pvt. Ltd. for failing to deliver a
PlayStation ordered online. The case dealt with contractual
obligations in the digital domain.
Impact:
Set a precedent for addressing e-commerce disputes under ITA.
Relevance to ITA:
Related to Section 43 and Section 66 for negligence and data
breaches.
Summary:
A group of cybercriminals hacked ATM systems to steal customer
credentials, leading to financial losses for banks.
Impact:
Raised awareness about vulnerabilities in financial institutions.
Relevance to ITA:
Addressed under Sections 43 and 66C (identity theft).
Summary:
A ransomware attack on Oil India Limited in Assam resulted in the
encryption of critical systems and a $7.5 million ransom demand.
Impact:
Highlighted the need for robust incident response mechanisms.
Relevance to ITA:
Sections 66, 69, and CERT-In guidelines were involved in the
response.
Summary:
Personal data of over 100 million MobiKwik users, including Aadhaar
and payment details, was allegedly leaked and sold online.
Impact:
Raised concerns about data protection and compliance with ITA.
Relevance to ITA:
Addressed under Sections 43, 66, and 72 (privacy breach).
Summary:
Several Indian organizations faced malware attacks targeting
sensitive data through phishing campaigns.
Impact:
Highlighted global cyber threats and India's vulnerability.
Relevance to ITA:
Involved Section 66C and CERT-In for containment and forensics.
Historical Context
Key Milestones: