Cyber Law-A Critical View on Existing Cyber Laws in India: Do they Suffice in Today’s World?

Authors

  • KIRTIKA GUPTA

Keywords:

Cyber law, framework, information technology act, cybercrime, policy

Abstract

In the 21st century, numerous technologies have become fundamental elements of one’s life. Although, these technologies are immensely functional and informative but often leads to certain cybercrimes which would not only affect individual but also society at large. Secure cyberspace is very crucial for a nation to defend itself from any cyber-attack. Nowadays, cyber-crime has become a major concern in India and the existing laws related to cyber-crime are insufficient to deal with the increase in the number of crimes related to cyberspace. These policies were designed to eliminate or rather reduce such crimes but clearly, these policies need to be revised and reworked thoroughly to suffice in today’s world. There are several laws and policy relating to cyber security in India such as the Information Technology Act, 2000, the Indian Penal Code 1860, and the National Cyber Security Policy, 2013 (a framework of DeitY) which protect and penalizes numerous cyber-crimes. The paper primarily focuses on the critical review of cyber security in India. As per reports, India, in the year 2022, have more than 658 million internet users which are nearly 47% of the total population of India. It denotes that all these millions of internet users are under threat of cyber-attack in one or the other way. Furthermore, the recent it could be very well documented that many governmental agencies have become a target of cyber-attacks; even neighbouring countries are mounting cyber- attack on the Indian army as well. In these situations, India should make strong and viable cyberspace for the safety of governmental agencies as well as for every individual to protect the cyber sovereignty of India. More than that attack on the government, many individuals and hacking groups are there in India which has become a possible reason for cyber threats and attacks in India. Hacking groups conduct such activities for personal gains likely to be fraud through the internet and individual do so for some personal goal as to harass another individual. But overall cyber-attacks and threats must be dealt with utmost strictness to preserve and protect cyberspace in India. The
article also discusses how a mechanism can be built, or the foundation of cyber security be made effective for the public at large as cyber sovereignty is of utmost importance in today’s world to defend a country from any possible cyber-attacks. The acknowledgment of a weak and meagre framework should be done and preventive measures should be taken as soon as  possible. Since in this time a nation to be a superpower must have a proper defense on cyber security and tools to attack the
country when needed. This paper aims to critically and comprehensively review the existing cyber laws in India and propose a  standard mechanism and framework for the same. In addition, the various method proposed by the stakeholders of cyber security to prevent cyber threats, attacks, and cyber-crimes are also studied in the paper.

References

[Ben Tarnoff], [How the internet was invented], [The Guardian], (Jun. 20, 2022, 07:43 PM), https://www.theguardian.com/technology/2016/jul/15/how-the-internet-was-invented-1976-arpa-kahn-cerf.

[Kaspersky], https://www.kaspersky.com/resource-center/threats/deep-web (Jun. 21, 2022, 06:10 AM).

[Anmol Mathur], [Cybersecurity: How is India Faring?], [The Economics times], (Jun. 24, 2022, 01:18 PM) https://economictimes.indiatimes.com/industry/services/education/cybersecurity-how-is-india-faring/articleshow/90092428.cms.

[The Times of India] https://timesofindia.indiatimes.com/blogs/toi-editorials/another-reminder-that-india-needs-to-invest-more-to-combat-cyber-threats/ (Jun. 24, 2022, 01:48 PM).

[The times of India] https://timesofindia.indiatimes.com/india/pegasus-spyware-used-to-hack-phones-of-journalists-politicians-in-india-report/articleshow/84531126.cms (Jun. 25, 2022, 03:26 AM).

[Ananthakrishnan G], [SC order independent probe into Pegasus, says Govt can’t get free every time ‘national security’ is raised], [The Indian Express], (Jun. 25, 2022, 04:02 AM) https://indianexpress.com/article/india/supreme-court-pegasus-spyware-surveillance-verdict-

/.

[Aryan Prakash], [Chinese hackers’ bid to target India’s power system near Ladakh blocked: Centre], [Hindustan Times], (Jun. 28, 2022, 09:15 AM) https://www.hindustantimes.com/india-news/chinese-hackers-bid-to-target-india-s-power-system-near-ladakh-blocked-centre-101649324525345.html.

[IBM Report], [X-force threat Intelligence Index 2022] Rev.3, 37 (2022), https://www.ibm.com/downloads/cas/ADLMYLAZ.

[Digital India], https://www.digitalindia.gov.in/ (July. 02, 2022).

The Information Technology Act, 2000, § 66-B,66-E,72, No. 21, Acts of Parliament, 2000(India) https://www.indiacode.nic.in/bitstream/123456789/13116/1/it_act_2000_updated.pdf.

[ICCS 2022], https://iccs.fordham.edu/event/3531209d-0830-4915-a527-ca09a707d6cb/summary, (July. 05, 2022).

Published

2022-08-09