"TYPES OF CYBER CRIMES & APPLICABLE LAW"
Email Hacking
1.
Suppose the
password has been stolen & obscene emails are being send to your friends
from the given address book .Sec. 43,66,67 of Information Technology ACT, 2000
& section 509 of Indian Penal Code . The person who is hacking the email
account as well as a person who is misusing it are responsible for the crime.
2.
Password stolen
& hacker tried to intimidate victim
to shake down money from him/her . Sec. 43,66,of IT ACT,2000 & Section 384
of IPC. Person who is hacking email account as well as person who is misusing and who is motivating to do that is
responsible for that crime.
Virus Dissemination
Viruses are the programs which affects the available files on the computer & spread all over
the network by using the Internet. Virus is targeting an individual or an exact organization
which is not detected by antivirus software’s. Section 43,66 of IT Act,2000 and section 426
of IPC. The bug writer as well as the person who is spreading this bug is responsible for the
crime.
Viruses are the programs which affects the available files on the computer & spread all over
the network by using the Internet. Virus is targeting an individual or an exact organization
which is not detected by antivirus software’s. Section 43,66 of IT Act,2000 and section 426
of IPC. The bug writer as well as the person who is spreading this bug is responsible for the
crime.
The person pirated the software’s & send it into a pirated Compact Disk . Section 43,66 of IT Act,2000 & 63 of Copyright Act. The person who pirate that software as well as the person who buy it as well as who use software is responsible for that crime .
Cyber Pornography Crimes
As per IT act,2000, publishing,
transmitting & causing to be published any type of porn material either in
an electronic format which is considered to be as cyber crime. There are trillions of the websites which includes pornographic material online easily .
The person who not only creates but
also maintain such websites are liable for the crimes. Sometimes cyber café
owners might also be liable for it as they allow their customers to not only visit but also
suggest to use such websites. Section 67 of IT Act,2000
Social Networking (Facebook/Orkut) Fake Profile Impersonation Cases
1.
Fake profile of a feminine is created & the photograph,
phone number & address has been posted on that profile too . The fake profile also describes feminine as prostitute. Section 67 of IT
Act,2000 & 509 of IPC.
2.
Fake group of people has been created
& wrong information about an individual person or an association has been
posted. Section 153A & 153B of IPC.
Web Defacements
Crackers or an Hackers find the
loopholes of the website. Hacker
replaces the index page of
the website with another page. Hacker can also
delete the total data available on the
websites. Section 43,66 of IT Act, India
& Sec.67 in some other cases.
Email Scams
A suspect sends the thousands number of
emails & conveniences to victim to get out of a lot of money. The might
give you lucrative offers like job
offers, lottery & investment offers. Section 420 of IPC. Sender of an
email, sometimes bank account are liable for this type of crime.
Theft of the Source Code
Source Code of a program is one of the
very most important asset for any group.
Source code theft is common in software or an information technology companies. Person
steals the code & sell it to another party after making amendment in the source code.
Section43,65,66 of IT Act,2000 & 63 of copyright act. Person who has stolen the code is
liable for the act .
Source code theft is common in software or an information technology companies. Person
steals the code & sell it to another party after making amendment in the source code.
Section43,65,66 of IT Act,2000 & 63 of copyright act. Person who has stolen the code is
liable for the act .
Theft of confidential information
Employee steals the secret information
of the company & mail it to the competitors & post
the entire thing on
the websites & forums. Section 43,66 of IT Act,2000 & 426 of IPC.
Mobile Related Crimes
Now a day’s mobile phones become most
popular means of communications. SMS forging is
one of the method to spoof
identity of an SMS where as Call Forging is a method to spoof
caller ID of
Call.
Suspect has misused the victim’s no to
send an SMS or to make call to another person or the competitor . Section 65,66
of IT Act,2000. The person misusing the
victim’s number as well as the company
or an organization who allows user to change their identity of SMS or Call are liable.
Credit Card Frauds
Victim’s Credit cards have been misused on an airline
websites for online gambling , pornography websites etc . Section 43,66 of IT Act,2000 & 420 of IPC. The persons had stolen the entire information to who have misused that information online are
liable.
Comments
Post a Comment