Você está na página 1de 16

DETAILS OF AUTHOR

Author

1. Name: ALMAS FATIMA

2. Institution: Faculty of Law, Jamia Millia Islamia, New Delhi

3. Address: B 101, Noor Nagar, Jamia Nagar, New Delhi- 110025

4. Email: almasf.26@gmail.com

5. Contact No: +91 8700315489

Co-author

1. Name: RAUNIQUA BISHT

2. Institution: Faculty of Law, Jamia Millia Islamia, New Delhi

3. Address: Block 17, H.NO 903, Lodhi Colony, New Delhi - 110003

4. Email: rauniquabisht15@gmail.com

5. Contact No: +91 9911595099

Title : SOCIAL MEDIA: A platform for exploration or a ground of victimization?


ABSTRACT
Earlier social media was considered much safer than wandering the streets at night but in the
recent times social media has become a hotbed for crime. The popularity of social media
platforms have transformed the way we understand and experience crime and victimization.
Social media has been in the spotlight for more than a decade. These sites have made a great
impact in the history of cyberspace impacting netizens in their own circle and also at proficient
level. It isn't simply a medium of correspondence to stay in contact with companions but instead
have turned into an open gathering to voice conclusions and activate individuals for worldwide
revolutions. The development and effect of these sites at an exponential rate have pulled in the
digital guilty parties to carry out cybercrimes in online networking presenting danger to
protection of people and additionally national security.
Further, the authors would like to focus on what impact the social media has on a person’s Right
to Privacy. Right to Privacy is recognized as a Fundamental Right under Article 21 of the
Constitution of India but till what extent can it protect us against Cyber Crimes or from a Cyber
Attack?
Through this paper the authors would like to discuss the various types of Cyber Crimes, which
are:
 Cyber Defamation
 Cyber Pornography
 Cyber Stalking
 Fraudulent Transaction and Misrepresentation
 Hacking

The authors would lay emphasis on what legislations are in action to deal with such crimes and
how strictly the offenders are punished. The authors would also like to discuss the competency of
the present legislations and how the loopholes, if any can be filled to make the virtual world a
better place for everyone.
Introduction
We live in a period and age where data is only a catch press away. We are influenced by
information surrounding us. We want to know, read, comprehend and afterward talk our brains
about it. That is how the social media life becomes an integral factor. Social media is one of the
greatest components that we live with and can't disregard it.
Social media can be defined as a platform for communication and sharing through websites,
applications, etc. It permits social interaction and is currently turning into one of the largest
means of communication and is achieving acceptance rapidly. Social media has created human
interaction rather more convenient and far quicker than real life human interaction, and it
conjointly helps in developing international relationships whether or not its business or social.
The influence of social media on society is irrefutable. Social media has completely altered and
changed the way in which we see ourselves today and communicate with others as well. While
there are countless interesting advancement in social media technology, the negative effects of
this revolution cannot be ignored. The overuse/misuse of social media is currently a worldwide
issue affecting all generations and has been proven to hurt the emotional and mental health of
people too.
The authors would like to discuss the positive and negative impacts of social media:
Positive Impacts
 Social media comes with a lot of benefits; in fact we owe a considerable part of our society’s
growth to social media.
 Social media is broadly used to create awareness for causes that are essential for the general
public. Social media can also help many upright causes run by NGOs and other social welfare
societies.
 Social media can likewise help government in spreading alertness and also to fight crime.
 For some organizations, social media platforms are a solid instrument for business
advancement and promotion.
 Many groups are built through online networking platforms which are crucial for our general
public's growth.
Negative Impacts1
 Cyber-bullying: Many people have become the victims of cyber-bullying that has caused
them a lot of harm.
 Hacking: The loss of personal data that can lead to security issues. There are crimes like
identity theft and bank details theft that can harm any individual.
 Addiction: Prolonged use of social media can lead to addiction in youth. Addiction causes to
lose focus of other important things like studying etc. People get so absorbed that they get
cut off from the society and harm their personal lives.
 Scams: Many predators are looking for vulnerable users that they can scam and make profit
off.
 Relationship frauds: Honey-traps and MMS porn are the most caused frauds online. People
are lured in to relationships and love schemes and then they are cheated on.
 Health issues: The excess use of social media can affect your physical and mental health in a
big way. People often complaint of becoming lazy, fat, itchy eyes, loss of vision and stress
issues after excessive use.
 Loss of social and family life: Everyone busy on phone is one of the most common sites in a
family gathering nowadays.
Social media tremendously affects both individual and society. We saw that there had been
numerous positive accomplishments of social media, however it has additionally drawn out a few
wrongs in the society.
The authors would like to focus on the one wrong which blankets all i.e. Cyber Crime.

Cyber Crime
Cyber Crime is not defined in Information Technology Act, 2000 neither in the IT Amendment
Act, 2008 nor in any other legislation in India, hence to define cyber-crime, we can say it is just a
combination of crime and computer. In simple terms any offence or crime in which a computer is
used is a cyber-crime.2

1
Essay on social media: importance, advantages, disadvantages, available at:
https://www.indiacelebrating.com/essay/essay-on-social-media/ (visited on October 25,2018)
2
Indian Institute Of Banking & Finance, IT Security of IIBF(Taxmann Publishers), 2016
Cyber Crime can also be defined as a crime in which a computer is the object of the crime or
used as a tool to commit an offence. Cyber criminals may use computer technology to access
personal information, business trade secrets or use the internet for exploitative purposes.
Criminals who perform these criminal activities are often referred to as hackers.3
Cyber space crimes may be committed against persons, property, government and society at
large. The authors would like to lay emphasis on the various types of cyber-crime:

Classification of cyber-crime:

1. Crimes Against Persons:


 Harassment via E-Mails: Harassment through causation letters, add-ons of files &
folders i.e. via e-mails. at the moment harassment is common as usage of social sites i.e.,
Facebook, Twitter , Instagram etc. increasing day by day.
 Cracking: it's amongst the intense cyber-crimes noted until date. in this a cyber-criminal
bust into your computer systems without your data and permission and city along with
your valuable confidential information and data.
 Cyber-Stalking: It suggests that expressed or understood a physical threat that generates
terror through the utilization to technology like web, e-mail, phones, text messages,
webcam, websites or videos.
 Hacking4: An unauthorized user who attempts to or gains access to an information system
is known as hacker. Hacking is a cyber-crime even if there is no visible damage to the
system, because it is an invasion in to the privacy of data.
There are 3 different classes of Hackers.
a) White Hat Hackers – They are those hackers who believe that information sharing
is good, and that it is their duty to share their expertise by facilitating access to
information. However there are some white hat hackers who are just “joy riding” on
computer systems.

3
Cyber Crime, available at https://www.techopedia.com/definition/2387/cybercrime (Visited on October 26, 2018).
4
Mohak Rana, Crime in Cyberspace: Right to Privacy and Other Issue(2014) (Unpublished Article, Mumbai
NMIMS, School of Law)
b) Black Hat Hackers – Black hat hackers cause damage after intrusion. They may
steal or modify data or insert viruses or worms which damage the system. They are also
known as crackers.
c) Grey Hat Hackers – These type of hackers are typically ethical but occasionally
they can violate the hacker ethics. They will hack into networks, stand-alone computers
and software. Network hackers try to gain unauthorized access to private computer
networks just for challenge, curiosity, and distribution of information.

2. Cyber Crimes Against Government:

There are certain offences done by group of persons intending to threaten the governments by
using internet facilities:

 Cyber Terrorism: Cyber terrorism could be a major issue within the native also as
international concern. The collective type of these terrorist assaults on the web is by
distributed denial of service attacks, hate websites and hate e-mails, attacks on sensitive
computer networks etc. Cyber act of terrorism activities threaten the autonomy and
uprightness of the state.
 Cyber Warfare: It refers to politically driven hacking to conduct interruption and spying.
It’s a type of data war generally seen as the same as conservative warfare thought this
analogy is polemic for each its accuracy and its political motivation.
 Distribution of pirated software: It means distributing pirated software from one
computer to another aiming to terminate the data and official records of the government.
3. Cybercrimes Against Society at large:
An illegal act done with the tenacity of causing damage to the cyberspace will disturb large
quantity of persons:
 Child Pornography: It involves the utilization of computer networks to get, distribute, or
contact materials that sexually feat juvenile. It conjointly includes actions relating to
offensive exposure and obscenity.
 Cyber Trafficking: It may be trafficking in drugs, masses, arms weapons etc. that affects
lots of abundance of persons. Trafficking within the cyberspace is additionally a
significant crime.
 Online Gambling: Online fraud and cheating is one of the most lucrative businesses that
are growing today in the cyber space. There are many cases that have come to light are
those pertaining to credit card crimes, contractual crimes, offering jobs, etc. 5
 Financial Crimes: This type of offence is common as there is rapid growth in the users of
networking sites and phone networking where culprit will try to attack by sending bogus
mails or messages through internet. Ex: Using credit cards by obtaining password
illegally. 6
 Forgery: It means to deceive large number of persons by sending threatening mails as
online business transactions are becoming the habitual need of today’s life style. 7

Need for Cyber Law


Information and technology has spread all through the world. As the user of the internet
increases diversely and the scope of online connection extends, there is development in the
digital wrongdoings i.e. break of online contracts, execution of online torts and wrongdoings and
so on. Because of the results there was a need to have strict laws by the cyberspace authority to
control criminal exercises identifying with cyber and to give better administration of equity to
the sufferer of cybercrime. In the advanced cyber technology world it is especially important to
manage digital violations and in particular cyber law ought to be made stricter on account of
hackers and programmers.
Cyber law, it is a term that embodies the legitimate issues identified with use of open, value-
based, and distributive parts of organized data gadgets and innovations. It is less a particular field
of law than property or contract law, as it is a space covering numerous zones of law and
direction. IT Law is an arrangement of later legal enactments, presently present in a few nations,
which governs the procedure and dispersal of data carefully.
These lawful authorizations cover an expansive extent of various perspectives relating to PC
programming, assurance of PC programming, access and control of advanced data, protection,
privacy, security, web access and usage, and electronic trade. These laws have been portrayed as
"paper laws" for "paperless condition"

5
Cyber Crimes and the Law, available at: https://www.legalindia.com/cyber-crimes-and-the-law/ (visited on
October 27,2018)
6
General tips, available at: http://cybercellmumbai.gov.in (visited on October 27,2018)
7
Ibid
In regard to Indian state of affairs of cyber-crimes and cyber laws, there was no statute in India
for governing Cyber Laws involving privacy matters, jurisdiction problems, intellectual property
rights issues and a number of other legitimate questions. With the tendency of misusing of
technology, there arisen a requirement of strict legal provisions to control the criminal activities
within the cyber world and to and to safeguard verity sense of technology, IT ACT, 2000 was
enacted by Parliament of India to safeguard the arena of e-commerce, e-governance, e-banking
as well as penalties and punishments within the field of cyber-crimes. The IT Act was further
amended in the form of IT Amendment Act, 2008. Conjointly certain sections of IPC and as
some cyber space crime are invading right to privacy, article 21 of Indian constitution are some
governing laws for cyber space crime which imposes several liabilities in India.
Criminal liability
Criminal liability in India for cybercrimes is outlined under the Indian Penal Code (IPC).
Following sections of IPC agitate the varied cyber-crimes:
1. Sending threatening messages by e-mail.8
2. Word, gesture or act intended to insult the modesty of a woman.9
3. Sending defamatory messages by e-mail.10
4. Bogus websites, Cyber Frauds.11
5. E-mail Spoofing.12
6. Making a false document.13
7. Forgery for purpose of cheating.14
8. Forgery for purpose of harming reputation.
9. Web-Jacking.15
10. E-mail Abuse.16
11. Criminal intimidation by an anonymous communication.17
12. Obscenity.18

8
Indian Penal Act,1860, s.503
9
Indian Penal Act,1860,s.509
10
Indian Penal Act,1860,s.499
11
Indian Penal Act,1860,s.420
12
Indian Penal Act,1860,s.463
13
Indian Penal Act,1860,s.464
14
Indian Penal Act,1860,s.468
15
Indian Penal Act,1860,s.383
16
Indian Penal Act,1860,s.500
17
Indian Penal Act,1860,s.507
13. Printing etc. of grossly indecent or scurrilous matter or matter intended for blackmail.19
14. Sale, etc., of obscene objects to young person.20
15. Theft of Computer Hardware.21
Constitutional Liability
Hacking into someone’s personal estate or stealing some one’s intellectual work could be a
complete violation of his right to privacy. The Indian constitution doesn't specifically offer the
“right to privacy” as one of the fundamental rights guaranteed to the Indian citizens however it's
protected under IPC.
Right to privacy is an important natural need of every individual because it creates limitations
around an individual where the other person’s access is restricted. The right to privacy forbids
interference or disturbance in others private life. The apex court of India has clearly stated in its
judicial verdicts that right to privacy is very much a part of the fundamental right guaranteed
under article 21 of the Indian constitution.
Thus the authors would now like to discuss Right to privacy in the light of Article 21 of the
Indian Constitution.

Right to privacy
The web has ended up being an ideal setting for publicizing and promoting which affects the
security of its users. Along these lines there is an increasing need for a characterized law to
direct the activities on the internet. Individual privacy can be encroached upon from numerous
points of view on the web through treats, spyware, malware, web bugs and even by apparently
harmless exercises like perusing by means of an internet searcher.
Thus in 2012, the United Nations Human Rights Council affirmed that freedom of expression on
internet is a basic human right which infers that the privileges of an individual existing offline
should likewise be ensured on the web. Here in India, the privilege to privacy is a fundamental
right directly under Article 21 of our Constitution and in this way; one's privacy on the internet
likewise should be defended as in the case of privacy in general sense.

18
Indian Penal Act,1860,s.292
19
Indian Penal Act,1860,s.292A
20
Indian Penal Act,1860,s.293
21
Indian Penal Act,1860,s.378
India today has nearly 900 million mobile subscribers, 160 million Internet users and close to 85
million citizens on social media. Internet and social media users are expected to double by
2015.22 The right to privacy enjoys a status of fundamental right in India and it is an obligation
of the State to ensure this privilege by embracing appropriate administrative and legislative
policy measures. Until now, there is no far reaching law for security of privacy or for giving
lawful solutions for its infringement. The principal law governing net use in Republic of India is
that the information Technology Act, 2000, that contains some provisions, that are relevant to
protection of privacy in India. Numerous provisions of the information Technology Act and
therefore the Rules there give for defense of privacy of user is summarized as follows:
1. These provisions need the corporate bodies to implement and maintain affordable
security practices regarding the data that they receive, store, deals, transfers etc.
2. It is mandatory for the corporate bodies to declare their privacy policy to the user and
obtain their consent to the same.23
3. It is necessary to obtain consent of the users before collecting any sensitive information
and to state the lawful purposes for which the same shall be used by the corporate
body.24
4. The rules prohibit the retention of the information collected beyond reasonable time for
the purpose for which it is collected.25
5. The rules require the corporate bodies to allow the user to access the information that has
been shared and to correct it if the user intends.26
6. It is also provided that any failure on the part of corporate body in this regard shall
attract a penalty in the form of compensation to the person affected by any such failure
and may also result in incurring a criminal liability if the consequence of any such
failure is wrongful loss or gain.27

22
Lethal surveillance versus privacy, available at https://www.thehindu.com/opinion/lead/lethal-surveillance-
versus-privacy/article4837932.ece (visited on 25th October ,2018)
23
Section 43A of the Act and Rule 4 of the Information Technology (Reasonable security practices and procedures
and sensitive personal data or information) Rules, 2011
24
Section 43A of the Act and Rule 5(1) of the Information Technology (Reasonable security practices and
procedures and sensitive personal data or information) Rules, 2011
25
Section 43 of the Act and Rules 5(5)
26
Section 43A of the Act and Rule 5(6) of the Information Technology (Reasonable security practices and
procedures and sensitive personal data or information) Rules, 201
27
Under Section 43A, anybody corporate who fails to observe data protection norms may be liable to pay
compensation if : it is negligent in implementing and maintaining reasonable security practices, and thereby causes
7. The law also provides for the grievance mechanism, which can be used by the affected
person to claim the remedy for privacy violation.28
8. The Act provides for the stringent punishments to the offences like hacking, sending
offensive messages, voyeurism, child pornography etc. The protection is also provided to
the copyrighted data by disallowing any use of this data without proper authorization.29
9. The cybercafés are regulated by providing for different security measures to be adopted
by them and also for their timely inspection in this regard by the authorities created there
forth.30
10. The Interception of the electronically transmitted information is possible only by the
order and under the control of Ministry of Home Affairs strictly in accordance with the
rules laid down there under.31
The Supreme Court of India, in a landmark verdict of Justice K. S. Puttaswamy and Anr. vs
Union Of India And Ors32., ruled that the Indian citizens have a fundamental right to privacy.
The key highlights of the judgment, which originates from the guarantee of life and personal
liberty in Article 21 of the Constitution, are as follows:
 Life and personal liberty are inalienable, which are inseparable from a dignified
human existence.
 Privacy includes at its core the personal intimacies, the sanctity of family life,
marriage, procreation, the home and sexual orientation.
 Privacy safeguards individual autonomy and recognises the ability of the individual
to control vital aspects of his or her life.
 Those who are governed are entitled to question those who govern, about the
discharge of their constitutional duties including in the provision of socio-economic
welfare benefits.

wrongful loss or wrongful gain to any person. "Wrongful loss" and "wrongful gain" have been defined by Section 23
of the Indian Penal Code.
28
Section 43A of the Act and Rule 5(9) of the Information Technology (Reasonable security practices and
procedures and sensitive personal data or information) Rules, 2011
29
Sec.66 and all its subsections of IT Act. 2000.
30
Information Technology (Guidelines for Cyber Cafe) Rules, 2011.
31
The Information Technology (Procedure and Safeguards for Interception, Monitoring, and Decryption of
Information) Rules 2009.
32
(2012) SCC 494
The Supreme Court passed an ad-interim order in Unique Identification Authority of India and
anr. v. Central Bureau of Investigation33, where it held that the Unique Identification Authority
of India was restrained from transferring anyone’s biometric information with an Aadhaar
number to any other agency without such person’s consent in writing.
More importantly, the Apex Court also held that the Aadhar number would not be mandatory to
be eligible for any service. Any government authority that had made the Aadhar number
mandatory was asked to modify its circulars so that the Aadhar number would not be mandatory
for the provision of such service.

In Kharak Singh v. The State of U.P.34 a minority opinion recognized the right to privacy as a
fundamental right. The minority judges said that right to privacy was both the right to personal
liberty and freedom of movement as well.
In Govind v. State of M.P.35, the SC confirmed that the right to privacy is a fundamental right.
The right was said to include and protect personal intimacies of the home, marriage, family,
motherhood, etc. but it also observed that it was subject to “compelling state subject”.
In R. Rajagopal v. Union of India36, the apex court said that the right is a part of the right of a
personal to personal liberty that is guaranteed under the Constitution. It further recognized that
the right to privacy can be both an actionable claim and also a fundamental right.
In People’s Union for Civil Liberties v. Union of India37, the Supreme Court laid down
regulations in interception provisions in the country like such orders were to be issued by the
home secretaries only, necessity of the information was the considered, etc. Further it capped
two months onto the life of an interception order.
In District Registrar and Collector, Hyderabad and another v. Canara Bank and another38,
Supreme Court referred to personal liberty, freedom of expression and freedom of movement as
the fundamental rights that further gives rise to the right to privacy.

33
(2014) SCC Crl. No. 2524
34
(1964) SCR (1) 332
35
(1975) SCR 3 946
36
(1994) 6 SCC 632
37
(1997) 1 SCC 301
38
(2005) 1 SCC 496
In Selvi and others v. State of Karnataka and others39, the SC made a difference between
physical privacy and mental privacy. The case also established a connection of the right to
privacy with Article 20(3) (self-incrimination).

Right to Privacy and Social Media


Social media is a web based communication. Several forms of social media like blogs,
micro-blogs, wikis social networking sites, widgets, virtual
worlds conjointly exist. However, social networking sites like Facebook, Twitter, WhatsApp,
Instagram and Snapchat became voguish within the past few years. However, so as to use a
social networking web site and see people’s posts the person has got to first create a profile. The
most purpose of those social networking sites is to ascertain a relationship within the virtual
world. But very little did the users apprehend that this boon can slowly evolve as a crime too.
The concept of cyber-crime emerged throughout 1990’s and has climbed the ladder of
success reaching a whole new level. However it is us who signed this deal to compromise our
privacy. IP address, key words employed in searches, websites visited that appear harmless, from
information that we have a tendency to share on social media, to on-line transactions, to
cookies assembling user browser history, to mobile registration- personal details of an
individual is threatened by use of internet. The websites instantly records our personal
details. They are doing it as a result of, the additional personal info they supply, the more
alluring they're to potential advertisers. As a result, cases of identity thefts, sexual predators,
unintentional fame, cyber staking and defamation have started to gain focus.
Usually, teenagers are those who simply fall prey. Nowadays, they don’t even hesitate to share
their personal details with people whom they don’t even recognize. This happens because of the
dearth of enough mental maturity and capability to judge right and wrong. As a result these
sexual predators and identity thieves are capable of hunting them down. Twitter has itself
admitted that they had scanned the phone contacts of their users and imported them onto
their web site thus to get additional concerning their users. The oxymoronic nature of Facebook
is seen when it initially says that we own all our contents that we tend to post on the Facebook
and on the opposite hand it says that we as users grant Facebook the permission to use
any information processing content that we tend to post on it.

39
(2010) 7 SCC 263
A lot of individuals have reportedly committed suicide once their embarrassing videos had been
uploaded on YouTube.
This lack of invisibility of the social networking sites and therefore the day to day
crimes happening within the cyberspace have forced us to critically understand what we
actually wish to share and the way our info is being handled. Therefore, the privacy
policies ought to be scanned carefully before giving our consent.
However, Facebook has helped by introducing choices of block, reporting, defend etc. Twitter
has the option of sharing info solely with followers.

Conclusion
Social media has opened doors to numerous possibilities for its users. We can easily get
information about the most remote parts of the world, we can connect to millions of people
through one click, we can express our views, and we can educate ourselves about the various
things that are going around in the world. But have we been ignoring the red signs amidst the
glittering and shimmering world of social media?
Yes, we can do anything possible with just a click of the button but how long before we realize
that anything can be done with just a click of button, the line between social media and it
becoming a crime is blurred. Aren’t we inviting a lot of predators when we post something
personal on such a huge public platform?
Right to privacy is our fundamental right but till what extent can it be protected when we are the
ones who are letting someone else into our personal lives. This dependency on social media can
become a threat any day. Social media is the root cause of the increase in cyber-crimes today.
Cyber-crime and right to privacy are very much inter-connected. Infringement of right to privacy
in the online world becomes a cyber-crime.
The social media sites that we use regularly infringe our privacy, there are a lot of loopholes in
the terms and conditions of such sites and a lot of us don’t even bother to go through the terms
and conditions mentioned. Social networking sites such as Facebook has also been in the news as
personal data of the users was being shared and traded.
The one thing that the social media provides is transparency. There have been instances when
such transparency has helped in solving crimes, creating awareness, providing help to the people
who need it but this transparency is both a pro and con. Transparency on an online platform lets
in a lot of predators too, anyone can easily use our data, photographs and misuse them.
There are laws present which deals with cyber-crimes but there needs to be stricter regulations
and punishments for the cyberspace violators, the implementation of such laws are still not strict.
The Indian judiciary is still uncomfortable when dealing with crimes relating to cyber space, the
Indian courts are squeamish and culturally shy of confronting the issue of pornography as was
observed in the case of Fatima Riswana v. Chennai & Ors40both the public prosecutor and
counsel for the petitioners applied to the court for transfer to another (male) judge, to save the
district lady judge from embarrassment of having to view certain CDs that are part of the
evidence. The order for transfer was passed and the justification for this was that the “said trial
would be about the exploitation of women and their use in sexual escapades by the accused, and
the evidence in the case is in the form of CDs. and viewing of which would be necessary in the
course of the trial, therefore, for a woman Presiding Officer it would cause embarrassment.”
In the case of Anonymous v The Commissioner of Police41, yet another encounter takes place
between the embarrassed law and the pornographic text. It is an encounter of two women
advocates asked by the court to examine what movies are being exhibited at a specific theatre. In
the peculiar clash of social mores that ensure who has access to pornography and the law that
ensures equal access to all legally sanctioned media to everyone, the movie theatre was held
responsible for violating the fundamental right of women to have access to their premises – and
thus access to pornography. India as of now does not have law which clearly bans or defines
pornography albeit the increase in violence. Against women and sexual abuse of children has
forced the Indian executive and legislature to enter in the forbidden territory of understanding,
identifying pornography.
However, attempt to control and regulate pornography has also brought in a myriad of issues
ranging to violating the right of individual liberty, choice and freedom of speech and expression
as enshrined under the Indian Constitution along with jurisdiction issue pertaining to website
hosted via internet.

40
2005 SC (Crl) 61-62
41
1997 (1) ALD Cri 333
Crime done behind the computer is one of the biggest glitches of the 21st century. With
technology increasing, criminals don’t have to rob banks in order to commit crimes. Their
weapons are not guns anymore, but mouse cursors and passwords.
Thus with the huge positive impact of the internet in the world, there is still a need to be careful
and aware about all its drawbacks, till there are better laws governing the cyber-crimes.

Você também pode gostar