Protecting online informational privacy

Internet privacy is a subset of the larger world of data privacy that covers the collection, use, and secure storage of PI generally. Internet privacy is concerned primarily with how PI is exposed over the Web, through tracking, data collection, data sharing, and cyber security threats. The global spread of COVID-19 has generated numerous privacy, data…

Causes and how to prevent Cybercrime

Following are the causes of cybercrimes: i. Huge capacity to store data: The computer features in carrying a huge amount data on a little space. This makes easier for a cybercriminal to get easy access to that data and he can also get secret and official data and can misuse them for his personal profit….

International Convention on Cybercrime

The Council of Europe’s Cybercrime Convention which is also known as Budapest Convention on Cybercrime was opened for signature in 2001 and came into force in 2004. It is the sole legally binding international multilateral treaty on Cybercrime. Key features: i. This facilitates the detection, investigation and prosecution of crimes that are committed through internet…

History and Nature of Cybercrimes

The very first recorded cybercrime was even before the internet came into existence in 1820. A textile manufacturer in France, Joseph-Marie Jacquard, produced the loom. The device allowed the repetition of a series of steps within the weaving of special fabrics. A fear grew amongst the employees that they lose their job. They committed the…

CERTIFYING AUTHORITY IN CYBER LAW(PART 2)

A Certificate Authority (or Certification Authority) is an entity that issues digital certificates that contain a public key and therefore the identity of the owner. The private key is not made available to the public in general but kept secret by the end-user who generates the key pair. Further, the certificate is also working as…

CERTIFYING AUTHORITY IN CYBER LAW (PART 1)

A Certificate Authority (or Certification Authority) is an entity that issues digital certificates that contain a public key and therefore the identity of the owner. The private key’s not made available to the general public generally but kept secret by the end-user who generates the key pair. Further, the certificate is also working as a…

The Personal Data Protection Bill, 2019

The Personal Data Protection Bill, 2019 was introduced in Lok Sabha on December 11, 2019. The Bill seeks to supply for cover of private data of a private , and establishes a knowledge Protection Authority. • Applicability: The Bill provides for the processing of private data by: (i) Government, (ii) Companies incorporated in India, and…

DATA PROTECTION AND SECURITY

Over the last few years, there has been a considerable increase within the amount of knowledge that’s generated through the usage of varied electronic devices and applications. Today’s businesses derive considerable value by analyzing the ‘big data’ and sometimes determine their business strategies supported such analysis. While there’s no denying the business efficiency involved, the…

Women Empowerment in India

Women Empowerment in India has become the most important matter of discussion in recent times because women in the earlier were not given the equal role, status, value and affection in the society. So all around the world that how to improve the status of the women in society and how should they get the…

CHALLENGES FACED IN INVESTIGATION OF CYBER CRIME

Jurisdiction Jurisdiction is a very important notion while execution of any law in any country. Jurisdiction is of two types that are territorial and personal. Cybercrime often transgress the national boundaries there is when jurisdiction becomes a complicated matter. Countries differ in civil & criminal offences standards, substantive & procedural law, data collection & preservation…

Search and Seizer in Cyber Crime investigation

The Cybercrime has no physical boundaries. The criminals seeking information stored in computers with dial-in-access can access the information virtually from anywhere. The quantity of data that can be stolen or the level and amount of damage that can be caused by malicious programming code may be limited only by the speed of the network…