Page 156 - ICDEBI2018
P. 156
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456nternational Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 | IF: 4.101
I
14. The powers to entering and searching the private tering and searching the private Specific Suggestions:
places have not been given to police under the IT places have not been given to police under the IT 1. Proper Provisions regarding EProper Provisions regarding E-contracts and E-
stamp duty have to be inserted. Body corporate tamp duty have to be inserted. Body corporate
Act. But unfortunately, many cyber criminals Act. But unfortunately, many cyber criminals s
operate from their houses where police cannot operate from their houses where police cannot n
need to take measures required to provide a eed to take measures required to provide a
s
reach and cannot search. supplementary base for validating the contracts. If upplementary base for validating the contracts. If
E-stamp duty is permitted and providstamp duty is permitted and provided in the Act,
15. Through the discussions it is also observed that Through the discussions it is also observed that
i
it can yield lot of revenue to the government. t can yield lot of revenue to the government.
major offences covered under the IT Act are fences covered under the IT Act are
bailable in nature. Interim reliefs, anticipatory bailable in nature. Interim reliefs, anticipatory 2. Special cyber courts with trained judicial officials Special cyber courts with trained judicial officials
bails etc would be common. Cyber criminals have bails etc would be common. Cyber criminals have s
should be established to decide and settle the cases hould be established to decide and settle the cases
become use to for this practice; they may not have become use to for this practice; they may not have of cyber crimes.
fear in their mind until they feel fear about the fear in their mind until they feel fear about the
3. IT department should pass certain guidelines and IT department should pass certain guidelines and
consequences after commitment of offence. mmitment of offence. notifications for the protection of computer system e protection of computer system
a
and should some more strict laws to breakdown nd should some more strict laws to breakdown
General Suggestions: t the criminal activities relating to cyber crime. he criminal activities relating to cyber crime.
1. There is an urgent need to create awareness There is an urgent need to create awareness
among the people and basically users of internet among the people and basically users of internet 4. There is a need of developing cyber forensics and There is a need of developing cyber forensics and
b
about cyber space, different forms of cyber about cyber space, different forms of cyber biometric techniques. This will provide technical iometric techniques. This will provide technical
assistance to the investigatssistance to the investigating agency in
crimes, so that internet users can take some crimes, so that internet users can take some a
persuasions while operating the internet. To persuasions while operating the internet. To i investigation of cyber crime.nvestigation of cyber crime.
enhance the knowledge about the ITAA Act 2008 the ITAA Act 2008
is low, there is a need to conduct seminaris low, there is a need to conduct seminar- Conclusion:
T
workshops on this said subject. The cyber crime is a new type of crime made by a he cyber crime is a new type of crime made by a
class of sophisticated and learned criminals. Science lass of sophisticated and learned criminals. Science
c
2. Prevention is always better then cures. A netizen Prevention is always better then cures. A netizen and technology is growing fast and they are nd technology is growing fast and they are
a
should take certain precautions while operating should take certain precautions while operating
connecting the Globe by cutting the national frontieonnecting the Globe by cutting the national frontiers
c
the internet and should follow certain preventive the internet and should follow certain preventive
but unfortunately the cyber law is still struggling to ut unfortunately the cyber law is still struggling to
b
measures for cyber crimes.
define and redefine the boundaries for the control of efine and redefine the boundaries for the control of
d
3. With the healthy partnership with government, With the healthy partnership with government, cyber crimes. The IT Act does not define the data cyber crimes. The IT Act does not define the data
there is a need of safe, secure & trustworthy there is a need of safe, secure & trustworthy protection principles. It failed to provide any protection principles. It failed to provide any
environment. The Act is passed in 2000, amended environment. The Act is passed in 2000, amended provision related to third country transfer ofprovision related to third country transfer of data.
in 2008 to cover all the areas. But cyber law has to in 2008 to cover all the areas. But cyber law has to Incidents of copyright theft, hacking, virus attacks etc Incidents of copyright theft, hacking, virus attacks etc
h
be changed with changing times.. have increased in last few years. As a result of ave increased in last few years. As a result of
growing internet users globally, piles of computer rowing internet users globally, piles of computer
g
4. Currently many laws like IPC, Arms Act, laws like IPC, Arms Act,
crimes are increasing. It seems inability of the rimes are increasing. It seems inability of the
Communication Decency law, Data Protection Communication Decency law, Data Protection c
l
Act, CPC etc deal with the many subjects Act, CPC etc deal with the many subjects legislature to keep cyber crime legislationegislature to keep cyber crime legislation ahead of
the fast moving technological advancements. The IT he fast moving technological advancements. The IT
t
therefore therefore lacks lacks efficient efficient enforceability enforceability
Act is engaged in prevention and control of cyber ct is engaged in prevention and control of cyber
A
mechanism. To avoid the confusion of many laws mechanism. To avoid the confusion of many laws
crimes within the country’s territorial jurisdiction. But rimes within the country’s territorial jurisdiction. But
c
dealing with the same subject, there is a need of dealing with the same subject, there is a need of
unfortunately the Act is forgetting that cyber nfortunately the Act is forgetting that cyber
special law dealing with the subject specifically in law dealing with the subject specifically in u
c
toto. There is a need of unification of laws by toto. There is a need of unification of laws by criminality is a global phenomenon whichriminality is a global phenomenon which has no
territorial limits at all. There is a need to enact a erritorial limits at all. There is a need to enact a
t
taking all the internet laws to arrive at code which taking all the internet laws to arrive at code which
g
global cyber law uniformly applicable to all the lobal cyber law uniformly applicable to all the
will deal with all the problems related to internet will deal with all the problems related to internet
countries in the world. To avoid the increasing crimes, ountries in the world. To avoid the increasing crimes,
c
crimes. Unification of internet laws will be the crimes. Unification of internet laws will be the
t
solution. there is a need to impart education and training for here is a need to impart education and training for
internet users.
5. E-commerce is flourishing in India in last 4commerce is flourishing in India in last 4-5
years. Website owners should responsible to years. Website owners should responsible to References:
checking the traffic and tap any irregularity on the checking the traffic and tap any irregularity on the 1. Jitender Kumar(2017)” Cyber Crime in India: An r Kumar(2017)” Cyber Crime in India: An
site. They should adopt some policy for site. They should adopt some policy for o
overview” an article published in Imperial Journal verview” an article published in Imperial Journal
preventing cyber crimes as number of internet preventing cyber crimes as number of internet o
of Interdisciplinary Research, Volf Interdisciplinary Research, Vol-3, Issue-4, 2017
users are growing day by day. ISSN 2454-1362
@ IJTSRD | Available Online @ www.ijtsrd.comwww.ijtsrd.com | Conference Issue: ICDEBI-2018 | Oct 2018| Oct 2018 Page: 148