Page 156 - ICDEBI2018
P. 156

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456nternational Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 | IF: 4.101
         I
        14. The powers to entering and searching the private tering and searching the private  Specific Suggestions:
            places have not been given to police under the IT places have not been given to police under the IT  1.  Proper  Provisions  regarding  EProper  Provisions  regarding  E-contracts  and  E-
                                                                   stamp  duty  have  to  be  inserted.  Body  corporate tamp  duty  have  to  be  inserted.  Body  corporate
            Act.  But  unfortunately,  many  cyber  criminals Act.  But  unfortunately,  many  cyber  criminals   s
            operate  from  their  houses  where  police  cannot operate  from  their  houses  where  police  cannot   n
                                                                   need  to  take  measures  required  to  provide  a eed  to  take  measures  required  to  provide  a
                                                                   s
            reach and cannot search.                               supplementary base for validating the contracts. If upplementary base for validating the contracts. If
                                                                   E-stamp duty is permitted and providstamp duty is permitted and provided in the Act,
        15. Through  the  discussions  it  is  also  observed  that Through  the  discussions  it  is  also  observed  that
                                                                   i
                                                                   it can yield lot of revenue to the government. t can yield lot of revenue to the government.
            major  offences  covered  under  the  IT  Act  are fences  covered  under  the  IT  Act  are
            bailable  in  nature.  Interim  reliefs,  anticipatory bailable  in  nature.  Interim  reliefs,  anticipatory  2.  Special cyber courts with trained judicial officials Special cyber courts with trained judicial officials
            bails etc would be common. Cyber criminals have bails etc would be common. Cyber criminals have   s
                                                                   should be established to decide and settle the cases hould be established to decide and settle the cases
            become use to for this practice; they may not have become use to for this practice; they may not have   of cyber crimes.
            fear  in  their  mind  until  they  feel  fear  about  the fear  in  their  mind  until  they  feel  fear  about  the
                                                                3.  IT department should pass certain guidelines and IT department should pass certain guidelines and
            consequences after commitment of offence.  mmitment of offence.     notifications for the protection of computer system e protection of computer system

                                                                   a
                                                                   and  should  some  more  strict  laws  to  breakdown nd  should  some  more  strict  laws  to  breakdown
        General Suggestions:                                       t the criminal activities relating to cyber crime. he criminal activities relating to cyber crime.
        1.  There  is  an  urgent  need  to  create  awareness There  is  an  urgent  need  to  create  awareness
            among  the  people  and  basically  users  of  internet among  the  people  and  basically  users  of  internet  4.  There is a need of developing cyber forensics and There is a need of developing cyber forensics and
                                                                   b
            about  cyber  space,  different  forms  of  cyber about  cyber  space,  different  forms  of  cyber   biometric  techniques.  This  will  provide technical iometric  techniques.  This  will  provide technical
                                                                   assistance  to  the  investigatssistance  to  the  investigating  agency  in
            crimes,  so  that  internet  users  can  take  some crimes,  so  that  internet  users  can  take  some   a
            persuasions  while  operating  the  internet.    To persuasions  while  operating  the  internet.    To   i investigation of cyber crime.nvestigation of cyber crime.
            enhance the knowledge about the ITAA Act 2008 the ITAA Act 2008
            is  low,  there  is  a  need  to  conduct  seminaris  low,  there  is  a  need  to  conduct  seminar-  Conclusion:
                                                                T
            workshops on this said subject.                     The  cyber  crime  is  a  new  type  of  crime  made  by  a he  cyber  crime  is  a  new  type  of  crime  made  by  a
                                                                class  of  sophisticated  and  learned  criminals.  Science lass  of  sophisticated  and  learned  criminals.  Science
                                                                c
        2.  Prevention is always better then cures. A netizen Prevention is always better then cures. A netizen   and  technology  is  growing  fast  and  they  are nd  technology  is  growing  fast  and  they  are
                                                                a
            should  take  certain  precautions  while  operating should  take  certain  precautions  while  operating
                                                                connecting the Globe by cutting the national frontieonnecting the Globe by cutting the national frontiers
                                                                c
            the  internet  and  should  follow  certain  preventive the  internet  and  should  follow  certain  preventive
                                                                but  unfortunately  the  cyber  law  is  still  struggling  to ut  unfortunately  the  cyber  law  is  still  struggling  to
                                                                b
            measures for cyber crimes.
                                                                define and redefine the boundaries for the control of efine and redefine the boundaries for the control of
                                                                d
        3.  With  the  healthy  partnership  with  government, With  the  healthy  partnership  with  government,  cyber  crimes.  The  IT  Act  does  not  define  the  data cyber  crimes.  The  IT  Act  does  not  define  the  data
            there  is  a  need  of  safe,  secure  &  trustworthy there  is  a  need  of  safe,  secure  &  trustworthy  protection  principles.  It  failed  to  provide  any protection  principles.  It  failed  to  provide  any
            environment. The Act is passed in 2000, amended environment. The Act is passed in 2000, amended  provision  related  to  third  country  transfer  ofprovision  related  to  third  country  transfer  of  data.
            in 2008 to cover all the areas. But cyber law has to in 2008 to cover all the areas. But cyber law has to  Incidents of copyright theft, hacking, virus attacks etc Incidents of copyright theft, hacking, virus attacks etc
                                                                h
            be changed with changing times..                    have  increased  in  last  few  years.  As  a  result  of ave  increased  in  last  few  years.  As  a  result  of
                                                                growing  internet  users  globally,  piles  of  computer rowing  internet  users  globally,  piles  of  computer
                                                                g
        4.  Currently  many  laws  like  IPC,  Arms  Act, laws  like  IPC,  Arms  Act,
                                                                crimes  are  increasing.  It  seems  inability  of  the rimes  are  increasing.  It  seems  inability  of  the
            Communication  Decency  law,  Data  Protection Communication  Decency  law,  Data  Protection   c
                                                                l
            Act,  CPC  etc  deal  with  the  many  subjects Act,  CPC  etc  deal  with  the  many  subjects   legislature  to  keep  cyber  crime  legislationegislature  to  keep  cyber  crime  legislation  ahead  of
                                                                the fast moving technological advancements. The  IT he fast moving technological advancements. The  IT
                                                                t
            therefore therefore   lacks lacks   efficient efficient   enforceability enforceability
                                                                Act  is  engaged  in  prevention  and  control  of  cyber ct  is  engaged  in  prevention  and  control  of  cyber
                                                                A
            mechanism. To avoid the confusion of many laws mechanism. To avoid the confusion of many laws
                                                                crimes within the country’s territorial jurisdiction. But rimes within the country’s territorial jurisdiction. But
                                                                c
            dealing with the same subject, there is a need of dealing with the same subject, there is a need of
                                                                unfortunately  the  Act  is  forgetting  that  cyber nfortunately  the  Act  is  forgetting  that  cyber
            special law dealing with the subject specifically in law dealing with the subject specifically in   u
                                                                c
            toto.  There  is  a  need  of  unification  of  laws  by toto.  There  is  a  need  of  unification  of  laws  by   criminality  is  a  global  phenomenon  whichriminality  is  a  global  phenomenon  which  has  no
                                                                territorial  limits  at  all.  There  is  a  need  to  enact  a erritorial  limits  at  all.  There  is  a  need  to  enact  a
                                                                t
            taking all the internet laws to arrive at code which taking all the internet laws to arrive at code which
                                                                g
                                                                global  cyber  law  uniformly  applicable  to  all  the lobal  cyber  law  uniformly  applicable  to  all  the
            will deal with all the problems related to internet will deal with all the problems related to internet
                                                                countries in the world. To avoid the increasing crimes, ountries in the world. To avoid the increasing crimes,
                                                                c
            crimes.  Unification  of  internet  laws  will  be  the crimes.  Unification  of  internet  laws  will  be  the
                                                                t
            solution.                                           there  is  a  need  to  impart  education  and  training  for here  is  a  need  to  impart  education  and  training  for
                                                                internet users.
        5.  E-commerce  is  flourishing  in  India  in  last  4commerce  is  flourishing  in  India  in  last  4-5
            years.  Website  owners  should  responsible  to years.  Website  owners  should  responsible  to   References:
            checking the traffic and tap any irregularity on the checking the traffic and tap any irregularity on the  1.  Jitender Kumar(2017)” Cyber Crime in India: An r Kumar(2017)” Cyber Crime in India: An
            site.  They  should  adopt  some  policy  for site.  They  should  adopt  some  policy  for   o
                                                                   overview” an article published in Imperial Journal verview” an article published in Imperial Journal
            preventing  cyber  crimes  as  number  of  internet preventing  cyber  crimes  as  number  of  internet   o
                                                                   of Interdisciplinary Research, Volf Interdisciplinary Research, Vol-3, Issue-4, 2017
            users are growing day by day.                          ISSN 2454-1362

        @ IJTSRD  |  Available Online @ www.ijtsrd.comwww.ijtsrd.com |  Conference Issue: ICDEBI-2018 | Oct 2018| Oct 2018   Page: 148
   151   152   153   154   155   156   157   158   159   160   161