Page 358 - Web_Application_v2.0_C12_Fb
P. 358

Ð Ð Be Cautious with Personal Information: Avoid sharing personal details, such as email addresses, phone
                 numbers, or financial information, on unfamiliar websites or applications you don’t fully trust.
              Ð Ð Avoid Untrusted Downloads: Only download software or files from reliable and verified websites to
                 minimize the risk of malware infections.
              Ð Ð Keep Systems Updated: Regularly update your operating systems, software, and applications to ensure
                 they have the latest security patches.
              Ð Ð Stay Alert Against Identity Theft: Be cautious of sharing personal information online and monitor your
                 accounts regularly to detect any unauthorized activities.
              Ð Ð Manage Social Media  Privacy Settings:  Customize and  maintain  privacy  settings on  social media
                 platforms to control who can view or access your personal information.

                4.7  CYBER LAWS IN INDIA

              India’s cyber laws are primarily regulated by
              the Information Technology Act,  2000 (IT          94 Sections
              Act) and its subsequent amendments. This                        13 Chapters
              comprehensive legislation is designed to        India IT Act of 2000
              combat various cybercrimes and safeguard        (Information Technology Act)
              electronic   transactions   and    records.
              Additionally, the IT Act establishes a legal
              framework to ensure the recognition and                     4 Schedules                   Section 66A
                                                                                                          Declared
              validity of electronic records and activities                                           Unconstitutional
              conducted  electronically.  The  original  Act
              comprised 94 sections, organised into 13 chapters and 4 schedules. Notably, the law permits the prosecution
              of individuals from other countries if the crime involves a computer or network located within India.
              Key Provisions of the Information Technology Act, 2000

              Key provision of the IT Act,200 are as follows:

              Ð ÐLegal Recognition of Electronic Records and Digital Signatures: The IT Act provides legal validity to
                 electronic documents and digital signatures, equating them with traditional paper-based records.

              Ð ÐData Protection and Privacy: The Act outlines measures to protect individual privacy and secure
                 sensitive personal data. Despite these provisions, there is ongoing debate about the need for stronger
                 safeguards.

              Ð ÐCybercrime offenses: The IT Act outlines several categories of cybercrime offenses, such as:
                 ○  Hacking: Unauthorized access to or manipulation of computer systems.
                 ○  Data Theft: Stealing sensitive or confidential information from a system or network.
                 ○  Identity Theft: Misusing someone’s personal information for fraudulent purposes.
                 ○  Spreading Online Obscenity: Publishing or transmitting obscene content through digital platforms.
                 ○  Cyberterrorism: Using cyberspace to commit acts of terrorism or threaten national security.

              Ð ÐPenalties and offenses: The Act specifies punishments for various cybercrime offenses, which may include
                 imprisonment, fines, or both, depending on the severity of the crime.

              Ð ÐEstablishment of the Cyber Appellate Tribunal: The Cyber Appellate Tribunal was created to handle and
                 resolve disputes that emerge under the framework of the Information Technology Act, 2000. It serves as a
                 specialized authority to adjudicate appeals related to the decisions of adjudicating officers under the Act,
                 ensuring efficient resolution of cyber-related cases.

                356   Touchpad Web Applications (Ver. 2.0)-XII
   353   354   355   356   357   358   359   360   361   362   363