Page 101 - Cyber Safety C-8
P. 101

It requires companies to take permission from users before collecting or using their personal
                    information.

                     It allows people to seek compensation if their personal data is misused or damaged.

                     It enables the Government of India to punish cybercrimes such as hacking and spreading
                    computer viruses.

                 Objectives of the IT Act 2000

                 The main goals of the IT Act 2000 are to prevent cybercrimes and support secure digital transactions
                 by setting clear rules for using the Internet. The following are the objectives of the IT Act:

                     To promote smooth and safe delivery of online government services and digital transactions.
                     To discourage cybercrimes by imposing penalties for offences like hacking, identity theft and
                    data theft.

                     To set rules and regulations for safe and responsible use of the Internet.

                     To support growth and innovation in India’s information technology sector.

                 Important Cybercrime Issues

                 The IT Act addresses several critical issues related to cybercrime, aiming to protect individuals
                 and organisations from digital harm. The following sections highlight key areas of concern in the
                 digital world:


                                            Identity Theft             Breach of Confidentiality
                                           Pretending to be            Sharing someone’s private
                                         someone else online           information online without
                                        or using their personal               permission.
                                           details without.





                         Privacy Violation                                                Unauthorised Access
                     Using someone’s personal                                          Using or entering someone’s
                      information without their                                          computer, device or data
                      consent or invading their                                            without permission.
                           privacy online.



                         Obscene Material                                                  Cybercrime
                         Posting or sharing                                               Any crime done
                        indecent or offensive                                           using the Internet or
                       content on the Internet.                                         technology, such as
                                                                                      hacking or online fraud.


                                                       Child-Related Material
                                                         Creating or sharing
                                                        content that harms or
                                                       exploits children online.



                                                                                             Cyber Law Awareness  99
   96   97   98   99   100   101   102   103   104   105   106