• Home /Exam Details (QP Included)>Main Exam>Optional Subject-Medical Group>Management / Management Notes On – Cyber Laws – For W.B.C.S. Examination.
  • Management Notes On – Cyber Laws – For W.B.C.S. Examination.

    In technology driven society, internet has huge contribution for the growth of humans. Many investigators explained that cyberspace is a physical space but actually were a computer-generated construction representing abstract data. It is a virtual medium.Continue Reading Management Notes On – Cyber Laws – For W.B.C.S. Examination.

    It has no boundaries, no geographical mass, or gravity. Numerous advancements are done due to cyber activities but the major question is that whether it should be regulated or not. Cyber Law is the law that controls cyber space. Cyber space is a very broad term and includes computers, networks, software, and data storage devices such as hard disks, USB disks, the Internet, websites, emails and even electronic devices such as cell phones, ATM machines. The increased dependence of individuals and organizations on cyberspace has resulted in many cybercrimes.

    Cyber crimes are illegal acts where the computer is used either as a tool or a target or both. The massive growth in electronic commerce (e-commerce) and online share trading has led to an unusual erupt in incidents of cybercrime. Although, there is system to protect devices from infected with computer virus to the data and computer networks such as firewalls, antivirus software, and other technological solutions, but in India efforts must be done towards effective use of these technologies to protect the valuable data and to combat cyber-crime.

    Even expert users of IT tools may not be aware of cyber victimization. Along with the progression in technology it is similarly important to be aware of cyber-crime and other related issues thereof. The cyber safety depends on the knowledge of the technology and the care taken while using internet and that of the defensive measures adopted by user and servers systems. Cyber law portrays the legal issues associated with the use of communications technology, mainly “cyberspace”, i.e. the Internet. It is a junction of numerous legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction. It is established that cyber law applies to regulations designed for the physical world, to human activity on the Internet. Cyber law basically deals with almost all aspects of transaction and activities concerning Internet, World Wide Web and Cyberspace in India.

    The law for cyberspace is to control the man and the machine. The fundamental goal of cyber laws is to legalize human behaviour and not technology. Cyber laws are technology intensive laws, advocating the use but not the mishandling of technology. Cyber law comprises of all the cases, statutes and legal provisions that affect persons and institutions who control the entry to cyberspace, provide access to cyberspace, create the hardware and software which enable people to access cyberspace or use their own devices to go ‘online’ and enter cyberspace. Law covers the rules of conduct that have been accepted by the government, and which are in force over a certain region, and which must be followed by all people on that region. Breach of these rules could lead to government action such as captivity or fine or an order to pay compensation. Cyber law encompasses laws relating to Cyber Crimes, Electronic and Digital Signatures, Intellectual Property, and Data Protection and Privacy.

    There are many grounds why it is difficult for conventional law to manage with cyberspace. The first reason is that Cyberspace is an intangible dimension that is unfeasible to govern and regulate using conventional law. Secondly, cyberspace has complete disregard for jurisdictional boundaries. Another reason is that cyberspace handles huge traffic volumes every second. Billions of emails are crisscrossing the globe even as we read this, millions of websites are being accessed every minute and billions of dollars are electronically transferred around the world by banks every day. Cyberspace is absolutely open to sharing by all.

    Cyberspace offers enormous potential for secrecy to its members. Readily available encryption software and steganographic tools that flawlessly hide information within image and sound files ensure the confidentiality of information exchanged between cyber-citizens. Electronic information has become the main aim of cyber-crime. It is considered by extreme mobility, which exceeds by far the mobility of persons, goods or other services. International computer networks can transfer huge amounts of data around the globe within seconds. A software source code worth crores of rupees or a movie can be pirated across the globe within hours of their release. Theft of corporeal information such as books, papers, CD ROMs, floppy disks is easily covered by conventional penal provisions. Nevertheless, the difficulty begins when electronic records are copied quickly, inconspicuously and often via telecommunication facilities.

    In digital world, most of the areas are affected by cyber law. Approximately all transactions in shares are in demat form. All companies comprehensively depend upon their computer networks and keep their valuable data in electronic form. Government forms including income tax returns, company law forms are filled in electronic form. Consumers are progressively more using credit cards for shopping. Most people are using email, cell phones and SMS messages for communication. Even in “non-cyber crime” cases, important evidence is found in computers / cell. Cyber crime cases such as online banking frauds, online share trading fraud, source code theft, credit card fraud, tax evasion, virus attacks, cyber sabotage, phishing attacks, email hijacking, denial of service, hacking, pornography are very common. Digital signatures and e-contracts have reinstated usual methods of transacting business.

    To control cyber-crime, Electronic signatures are used to validate electronic records. Digital signatures are one type of electronic signature. Digital signatures satisfy three major legal requirements – signer authentication, message authentication and message integrity. The technology and efficiency of digital signatures makes them more trustworthy than hand written signatures. Intellectual property refers to the creations of the human mind e.g. a story, a song, a painting, a design etc. The facets of intellectual property that relate to cyber space are covered by cyber law.

    These include copyright law in relation to computer software, computer source code, websites, cell phone content, software and source code licences, trademark law with relation to domain names, meta tags, mirroring, framing, linking, semiconductor law which relates to the guard of semiconductor integrated circuits design and layouts, patent law in relation to computer hardware and software. Data protection and privacy laws intend to accomplish a fair balance between the privacy rights of the individual and the interests of data controllers such as banks, hospitals, and email service providers. These laws try to address the challenges to privacy caused by collecting, storing and transmitting data using new technologies.

    Please subscribe here to get all future updates on this post/page/category/website

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

     WBCS Foundation Course Classroom Online 2024 2025 WBCS Preliminary Exam Mock Test WBCS Main Exam Mock Test WBCS Main Language Bengali English Nepali Hindi Descriptive Paper