The Impact of Cyber Law on Digital Rights and Privacy
Today we use computers for storing confidential data from various sectors such as banking, finance, health, personal property, etc. We also use the internet for transactions of information related to these sectors. But in many situations, the confidential data may be illegally used, and corrupted by unauthorized users. The increase in Internet traffic has led to a higher proportion of legal issues worldwide. So, it is very necessary to protect such data from Cyber criminals. Cyber cases related to interference and investigation are increasing at an alarming rate. To control such crimes, it is necessary to follow ethics in the field of computers. We discuss about the Impact of Cyber Law on Digital Rights and Privacy.
Introduction to Cyber Law
Cyber Law deals with the Internet’s relationship to technological and electronic elements, including computers, software, hardware, and information systems (IS).
Cyberlaw is part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues. Cyberlaw covers a broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy.
Advantages of Cyber Law
The IT Act 2000 attempts to change outdated laws and provides ways to deal with cybercrimes. We need such laws so that.
- People can perform transactions over the Internet through credit cards without fear of misuse.
- The IT Act offers the much-needed legal framework so that information is not denied legal effect, validity, or enforceability, solely on the ground that it is in the form of electronic records.
- The IT Act has also proposed a legal framework for the authentication and origin of electronic records/ communications through digital signature.
- Given the growth in transactions and communications carried out through electronic records, the Act seeks to empower government departments to accept the filing, creating, and retention of official documents in digital format.
Ethics and Morals
Also called moral philosophy is the discipline concerned with what is morally good and bad, right, or wrong.
The standards of behavior; principles of right and wrong behavior. Thus, morals are dictated by society, culture, or religion while ethics are chosen by the person himself which governs his life.
Computer Crime is alternatively referred to as cybercrime, e-crime, (electronic crime), or hi-tech crime. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker who illegally browses or steals a company’s or individual’s private information. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files. Nowadays knowledge about the Impact of Cyber Law on Digital Rights and Privacy is play vital role in our life.
Cyber Crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation, and mischief, all of which are subject to the Indian Penal Code.
Some Examples of Cyber Crime
Below is a list of the different types of computer crimes –
Software piracy is nothing, but copyright violation of software created originally by an individual or an institution. It includes stealing codes/ programs and other information and creating the imitated copy by unauthorized means and utilizing this data either for their benefit or for profit making.
Example: When you download a copy of a licensed software. For example, downloading games from a file-sharing website without paying for it, it is software piracy.
Gaining access without the user’s permission is known as unauthorized access. Authorization means granting access rights to resources, which is related to information security computer security, and access control in a particular sector. This is typically possible when the software/service is purchased through legal and formal procedures. Attempting to get information (like emails, bank accounts, intellectual or any other personal and confidential information) from an unauthorized person is known as accessing the machine illegally. Examples of unauthorized access are:
- Hacking financial/bank account-related information.
- Stealing organizational/ intellectual information.
- Illegal monitoring of information owned by other users.
- Illegal use/break of login and password of other users.
- Causing intentional irritation to other users using damaging software and important information.
A copyright is a legal right that gives the creator of a literary, artistic, musical, or other creative work the sole right to publish and sell that work. Copyright owners have the right to control the reproduction of their work, including the right to receive the royalty payment for that reproduction. © is a copyright symbol.
Activity such as deciphering codes or passwords and breaking security systems for illegal reasons is called Cracking. The Cracker will use a program or script known as a crack that has been written specifically to do what they are hoping to achieve.
Cyberbully or Cyberstalking
Cyberstalking is a criminal practice where an individual uses the Internet to systematically harass or threaten someone. This crime can be performed through email, social media, chat rooms, instant messaging clients, and any other online medium.
This a technique of extracting confidential information such as credit card numbers and username password combos by pretending as a legal enterprise. Phishing is typically carried out by email spoofing.
Plagiarism is presenting someone else’s work or idea as your own without their consent. The widespread use of computers and the rise of the Internet has made it easier to plagiarize the work of others. For example, plagiarism is found in a document such as an essay, report, etc.
Hacking refers to unauthorized checking into a computer or a network. A hacker is a person strongly interested in the deep and hidden or masked working of any computer operating system and programming language. They might discover defects within systems and reasons for such defects.
Protecting Ourselves from Cyber Crime
Cyber Safety and Security
Cyber safety is the safe and responsible use of information and communication technology. It is not just about keeping information safe and secure, but also about being responsible with that information. In recent years, all systems are exposed to the Internet; hence there is an increased challenge in maintaining and protecting them from attackers.
Any organization that plays a key role in promoting internet safety. They are primarily responsible for keeping systems/ computers/ network devices secure and functional. We must be aware of the Impact of Cyber Law on Digital Rights and Privacy is play vital role in our life. The overall sequence from identifying threats to protecting and recovering from Cyber-attacks and threats for organizations.
Identify threats and risks
- The computer operates slowly with more response time.
- If the system crashes suddenly and is unable to download updates.
- Appearance of new, unfamiliar icons or messages on the desktop.
Protection of data
- Create different logins and strong passwords for different users.
- Protect the network with a firewall.
- Use only verified open-source or licensed software and operating systems.
- Prohibit the use of personal devices on the network, such as personal USBS or hard drives.
- Protect your Wi-Fi Connection with a secure password, WEP encryption, etc. Encrypt the network traffic.
Recovery from cyber-attack
- After the cyber-attack data should be cleaned, recovered, and restored, as much as possible.
- Investigation should be carried out with support from a professional expert.
- Measures should be taken to avoid re-occurrence.
Educate your stakeholders (students, staff, etc)
- Introduce courses lessons/activities for students and teachers on major components of cyber security and safety.
A lot of cybercrimes revolve around unsuspecting teenagers and schoolchildren. Parents play a vital role in ensuring that their children are safe on the internet and not vulnerable to hackers and identity theft. To start with, treat confidential information as confidential. Never reveal sensitive data on the internet. Tell children not to give out personal information like address or telephone number or Facebook password to friends. Ensure, children do not do that as vital information should be kept secret.
Major Features of I.T. Act
The major features of the I.T Act are as follows:
- Digital signature has been replaced with electronic signature to make it a more technology-neutral act.
- It elaborates on offenses, penalties, and breaches.
- It outlines the Justice Dispensation Systems for cybercrimes.
- It defines in a new section that a cybercafe is any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public.
- It provides for the constitution of the Cyber Regulations Advisory Committee.
- The IT Act 2000 was amended in 2008 and 2011 and it includes rules for cybercafes, cyber security, delivery of services by the service provider, Audit of electronic documents, etc.