email crimes and it law-nasscom cyber safe 2010
DESCRIPTION
email crimes and cyber law, email crimes and the Indian IT Act, 2000,Adv. Prashant MaliTRANSCRIPT
![Page 1: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/1.jpg)
Cyber Safe Thane - 2010
Cyber Safe Thane - 2010
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
Adv. Prashant Mali [BSc.(Phy.), MSc.(Comp. Sci.), CNA, LLB]Cyber Law & IPR Expert
Email Crimes & Indian Cyber Law
![Page 2: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/2.jpg)
Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
INTRODUCTION INTRODUCTION
• Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is where a computer is the target of a crime or is the means adopted to commit a crime.
• Most of these crimes are not new. Criminals simply devise different ways to undertake standard criminal activities such as fraud, theft, blackmail, forgery, and embezzlement using the new medium, often involving the Internet
![Page 3: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/3.jpg)
Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
DIFFERENT TYPES OF CYBERCRIMES• Data Theft • Source Code Theft (Stealing Computer Programs)• Hacking• Denial of Service• Spreading Virus & Malicious Codes• Defamation & Social Networking Abuse(eg. FACEBOOK etc)• Cyber pornography , Child Pornography• Email related crimes• Cyber Stalking• Phishing • Cyber terrorism • Intellectual Property crimes- software piracy, copyright
infringement, trademarks violations.
![Page 4: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/4.jpg)
Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
E-MAIL RELATED CRIMES
Some of the major email related crimes are:• 1. Email Lottery Scam(Nigerian 419 Scam) • 2. Sending malicious codes through email • 3. Email bombing• 4. Illegal Email Forwarding• 5. Sending threatening emails• 6. Emails containing sexually explicit act etc• 7. Communal Disharmony thru emails• 8. Email Spoofing (identity theft)
![Page 5: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/5.jpg)
Cyber Safe Thane - 2010
1. Email Lottery Scam (Nigerian 419 Scam)
w w w . c y b e r l a w c o n s u l t i n g . c o m
An Email Sample showing email received from Microsoft , for winning A lottery amount of $8000000 USD
![Page 6: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/6.jpg)
Cyber Safe Thane - 2010
1. Email Lottery Scam (Nigerian 419 Scam)
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
![Page 7: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/7.jpg)
Cyber Safe Thane - 2010
1. Email Lottery Scam (Nigerian 419 Scam)
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
![Page 8: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/8.jpg)
Cyber Safe Thane - 2010
1. Email Lottery Scam (Nigerian 419 Scam)
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
![Page 9: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/9.jpg)
Cyber Safe Thane - 2010
1. Email Lottery Scam (Nigerian 419 Scam)
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
![Page 10: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/10.jpg)
Cyber Safe Thane - 2010
1. Email Lottery Scam (Nigerian 419 Scam)
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
Legal StatusThe nearest provision which is provided by the IT (Amendment) Act, 2008 is section 66-D whereby the offender is punished for cheating by impersonation and also Section 66-C which speaks punishment for Identity theft
Also Applicable Section 415,416, 417 420 of IPC
![Page 11: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/11.jpg)
Cyber Safe Thane - 2010
2. Sending Malicious Codes through email
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
The attachment is actually a Trojan file which still can escape detection by some antivirus products
![Page 12: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/12.jpg)
Cyber Safe Thane - 2010
3. Email bombing
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
The email bomber jams your inbox continuously with same emails
![Page 13: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/13.jpg)
Cyber Safe Thane - 2010
4. Illegal Email Forwarding
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
![Page 14: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/14.jpg)
Cyber Safe Thane - 2010
4. Illegal Email Forwarding
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
![Page 15: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/15.jpg)
Cyber Safe Thane - 2010
4. Illegal Email Forwarding
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
![Page 16: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/16.jpg)
Cyber Safe Thane - 2010
4. Illegal Email Forwarding
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
Section(43)(b) If any person without permission of the owner Downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium;Civil Liability : Compensation to be paidSection(66) : Imprisonment upto 3yrs OR
Fine up to 5 Lakhs OR Both
Also Applicable Section 379,405,420 of IPC
![Page 17: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/17.jpg)
Cyber Safe Thane - 2010
5. Sending threatening/Defamatory emails
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
New Delhi, May 15: Noted lyricist Javed Akhtar has received death threats via email after he apparently called an Islamic cleric “insane” during a television debate about the fatwa against working women.Akhtar has informed the police about the messages which told him that “your countdown has begun”.
![Page 18: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/18.jpg)
Cyber Safe Thane - 2010
5. Sending threatening/Defamatory emails
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
Section 66-A Punishment for sending offensive messages through communication service, etc. Any person who sends, by means of a computer resource or a communication device,-a) any information that is grossly offensive or has menacing character; orb) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device,c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of suchshall be punishable with imprisonment for a term which may extend to two three years and with fine.
![Page 19: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/19.jpg)
Cyber Safe Thane - 2010
6. Emails containing sexually explicit act etc
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
Section 67- A Punishment for publishing or transmitting of material containing sexually explicit act,etc. in electronic form (Inserted vide ITAA 2008) Whoever publishes or transmits or causes to be published or transmitted in the Electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees.Exception: This section and section 67 does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form-(i)the publication of which is proved to be justified as being for the public good on the(ii) ground that such book, pamphlet, paper, writing, drawing, painting, representation (iii)or figure is in the interest of science,literature,art,or learning or other objects of (iv)general concern; or(ii) which is kept or used bona fide for religious purposes
![Page 20: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/20.jpg)
Cyber Safe Thane - 2010
Section 66 and 43(d) : DATA DIDDLING• Section 66 and 43(d) of the I.T. Act covers Data DiDDling (CHANGING DATA BEFORE ENTERING INTO COMPUTER)Civil Liability : Compensation to be paidSection(66) : Imprisonment upto 3yrs OR
Fine up to 5 Lakhs OR BothCase in point : NDMC Electricity Billing Fraud Case:
A private contractor who was to deal with receipt and accounting of electricity bills by the NDMC, Delhi. Collection of money, computerized accounting, record maintenance and remittance in his bank who misappropriated huge amount of funds by manipulating data files to show less receipt and bank remittance.
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
![Page 21: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/21.jpg)
Cyber Safe Thane - 2010
7. Spreading Communal Disharmony thru Emails
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
Section 66-F(1) Defines Cyber Terrorism and Section 66-F(2) Specifies Punishment of imprisonment which may extend to imprisonment for life
![Page 22: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/22.jpg)
Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
Section 66C: IDENTITY THEFT
Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person,
Penalty : up to three years and shall also be liable to fine which may extend to rupees one lakh.
Section 419 of IPC also applicable
![Page 23: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/23.jpg)
Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
Section 66C: IDENTITY THEFT- CASE STUDY• Pranab Mitra , former executive of Gujarat Ambuja
Cement posed as a woman, Rita Basu, and created a fake e-mail ID through which he contacted one V.R. Ninawe an Abu Dhabi businessmen . After long cyber relationship and emotional massages Mitra sent an e-mail that ‘‘she would commit suicide’’ if Ninawe ended the relationship. He also gave him ‘‘another friend Ruchira Sengupta’s’’ e-mail ID which was in fact his second bogus address. When Ninawe mailed at the other ID he was shocked to learn that Mitra had died and police is searching Ninawe. Mitra extorted few lacs Rupees as advocate fees etc. Mitra even sent e-mails as high court and police officials to extort more money. Ninawe finally came down to Mumbai to lodge a police case.
![Page 24: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/24.jpg)
Cyber Safe Thane - 2010
Section(66) : CREDIT CARD FRAUD
Penalty : Imprisonment upto 3yrs And OR
Fine up to 5 Lakhs
Section 120(B), 420, 467, 468, 471 of IPC.
![Page 25: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/25.jpg)
Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
Section(66) : PHISHING
Phishing is the process by which someone obtains private information through deceptive or illicit means in order to falsely assume another person’s identity.
The Phisher will use spoofed emails to lead the recipient to counterfeit websites. Once here, the victim is tricked into divulging credit card information, account usernames and passwords, social security numbers, etc. Sec 419, 420, 465, 468, 471 of I.P.C r/w Sections 51, 63 and 65 of Copyright Act, 1957 which attract the punishment of 3 years imprisonment and fine up to 2 lakhs rupees which accused never thought of .
![Page 26: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/26.jpg)
Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
Section(66) : PHISHING Case Study
April 13,2010
In the verdict in the first case filed under the Information Technology Act in the country, Tamil Nadu IT secretary and adjudicator for the state, P W C Davidar on Monday directed ICICI Bank to pay Rs. 12.85 lakh as compensation
to an NRI customer, who complained he lost money from his account due to phishing in 2007 in Chennai.
![Page 27: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/27.jpg)
Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
EMAIL DEFAMATION CASE
• SMC Pneumatics (India) Pvt. Ltd. v. Jogesh Kwatra: No. 1279/2001 Delhi HC• India’s first case of cyber defamation was reported when a
company’s employee (defendant) started sending derogatory, defamatory and obscene e-mails about its Managing Director. The e-mails were anonymous and frequent, and were sent to many of their business associates to tarnish the image and goodwill of the plaintiff company.
The plaintiff was able to identify the defendant with the help of a private computer expert and moved the Delhi High Court. The court granted an ad-interim injunction and restrained the employee from sending, publishing and transmitting e-mails, which are defamatory or derogatory to the plaintiffs.
![Page 28: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/28.jpg)
Cyber Safe Thane - 2010
Tata Sons v. Greenpeace International Delhi HC IA 9089/2010 in CS (OS) 1407/2010
• [Cyber defamation Injunction not granted]• Justice S. Ravindra Bhat, authoring the judgment noted that,
though the internet has a wider reach and potential for injury, traditional standards for the grant of injunctions in cases of libel will be applicable. The court reasoned that these traditional standards are well developed and there is no constitutional mandate which allows the court to create a differentiation. If this reasoning is strictly applied it would mean that the conventional rules of defamation will be applied in cases of internet defamation. If applied liberally, courts may in cases of a legislative vacuum, apply other developed legal principles without differentiation.
w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
![Page 29: Email crimes and IT Law-Nasscom cyber safe 2010](https://reader036.vdocument.in/reader036/viewer/2022062514/5590edca1a28ab16748b4725/html5/thumbnails/29.jpg)
Cyber Safe Thane - 2010 w w w . c y b e r l a w c o n s u l t i n g . c o mCONFIDENTIAL
Thank You
Contact:
[email protected] [email protected] Cell: 9821763157
QUESTIONS