Page 358 - Web_Application_v2.0_C12_Fb
P. 358
Ð Ð Be Cautious with Personal Information: Avoid sharing personal details, such as email addresses, phone
numbers, or financial information, on unfamiliar websites or applications you don’t fully trust.
Ð Ð Avoid Untrusted Downloads: Only download software or files from reliable and verified websites to
minimize the risk of malware infections.
Ð Ð Keep Systems Updated: Regularly update your operating systems, software, and applications to ensure
they have the latest security patches.
Ð Ð Stay Alert Against Identity Theft: Be cautious of sharing personal information online and monitor your
accounts regularly to detect any unauthorized activities.
Ð Ð Manage Social Media Privacy Settings: Customize and maintain privacy settings on social media
platforms to control who can view or access your personal information.
4.7 CYBER LAWS IN INDIA
India’s cyber laws are primarily regulated by
the Information Technology Act, 2000 (IT 94 Sections
Act) and its subsequent amendments. This 13 Chapters
comprehensive legislation is designed to India IT Act of 2000
combat various cybercrimes and safeguard (Information Technology Act)
electronic transactions and records.
Additionally, the IT Act establishes a legal
framework to ensure the recognition and 4 Schedules Section 66A
Declared
validity of electronic records and activities Unconstitutional
conducted electronically. The original Act
comprised 94 sections, organised into 13 chapters and 4 schedules. Notably, the law permits the prosecution
of individuals from other countries if the crime involves a computer or network located within India.
Key Provisions of the Information Technology Act, 2000
Key provision of the IT Act,200 are as follows:
Ð ÐLegal Recognition of Electronic Records and Digital Signatures: The IT Act provides legal validity to
electronic documents and digital signatures, equating them with traditional paper-based records.
Ð ÐData Protection and Privacy: The Act outlines measures to protect individual privacy and secure
sensitive personal data. Despite these provisions, there is ongoing debate about the need for stronger
safeguards.
Ð ÐCybercrime offenses: The IT Act outlines several categories of cybercrime offenses, such as:
○ Hacking: Unauthorized access to or manipulation of computer systems.
○ Data Theft: Stealing sensitive or confidential information from a system or network.
○ Identity Theft: Misusing someone’s personal information for fraudulent purposes.
○ Spreading Online Obscenity: Publishing or transmitting obscene content through digital platforms.
○ Cyberterrorism: Using cyberspace to commit acts of terrorism or threaten national security.
Ð ÐPenalties and offenses: The Act specifies punishments for various cybercrime offenses, which may include
imprisonment, fines, or both, depending on the severity of the crime.
Ð ÐEstablishment of the Cyber Appellate Tribunal: The Cyber Appellate Tribunal was created to handle and
resolve disputes that emerge under the framework of the Information Technology Act, 2000. It serves as a
specialized authority to adjudicate appeals related to the decisions of adjudicating officers under the Act,
ensuring efficient resolution of cyber-related cases.
356 Touchpad Web Applications (Ver. 2.0)-XII

