Team Legistify | Legistify

Team Legistify
Answered on 28 Sep 2018

Any offence under law in which an electronic document is involved can be termed generally as a "Cyber Crime". Such an electronic document can be a tool of Crime or an object of Crime. The crime can be an "Internet Crime" where a website or an e-mail might be used as a tool or a crime involving a LAN or even a single computer. A Crime using a Mobile or ATM is also generally covered under the term "Cyber Crime" since electronic documents are involved. Out of the crimes some crimes come under Information Technology Act 2000 and some may come under other statutes such as IPC. For the purpose of determining the jurisdiction of specially designated Cyber Crime Police Stations, offences under IT Act 2000 alone may be considered as "Cyber Crime". This is a limited definition. eg: A defamatory/threatening message sent through e-mail or SMS is an offence under IPC and not under IT Act 2000. If the message is "Obscene" it may be an offence under Section 67 of IT Act 2000. A Fraud committed using web or e-mail such as the Nigerian Fraud or a Lottery fraud is an offence under IPC and not under IT Act 2000. Any offence in which an Electronic Document is accessed or altered causing a wrongful harm to some body may be an offence under Section 66 of IT Act 2000.Read More

Posted on 09 Mar 2016 | 2 Answers

Team Legistify | Legistify

Team Legistify
Answered on 28 Sep 2018

Phishing is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information. By spamming large groups of people, the phisher counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with legitimately.  YES! Phishing is a cyber ccrime. Read More

Posted on 10 Mar 2017 | 1 Answer

Team Legistify | Legistify

Team Legistify
Answered on 28 Sep 2018

With the rapid increase in the usage of internet, technology and ability to reach out to anyone in the world, crimes have also started to take place with the use of the same technology. Online fraud is one of these and it mainly involves online money fraud and identity theft. The methods used by these criminals are evolving constantly. Since these are frauds are often done using a computer only, identifying is the location of the criminal or deciding the jurisdiction for these cases is comparatively difficult than physical crimes. Offenders can be in the next door to the victim or even in the country several thousand kilometres away. You must hire the best Cyber Crime Lawyers in India whom will explain to you the concept of online financial scams which will make this situation simpler for you. You must take action quickly by contacting the authorities and Advocates if you are facing a cybercrime of any sort. You should never transfer money like this with a phone conversation without meeting the person, at least once no matter what he has told you about himself. Authorities never really ask you to pay anything upfront based on a phone call without a proper introduction to the situation. This money might be in some overseas account which makes it almost impossible to recover. In your case, you transferred the money willingly without contacting any authorities or the bank, there’s little that can be done. You can, however, notify the authorities and file for an enquiry over the matter under Section 46 of the IT act,2000. Under this section, an adjudicating officer is appointed who will make the required inquiries. You must hire the best Cyber Crime Attorneys in India to help you out of this situation. Read More

Posted on 19 Jul 2018 | 1 Answer

Team Legistify | Legistify

Team Legistify
Answered on 28 Sep 2018

Phishing is the criminal and fraudulent act of attempting to acquire sensitive information such as usernames, password and credit card details by masquerading as a trustworthy entity or person in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging and it often directs users to enter details at a fake website whose look and feel almost identical to the legitimate one. Read More

Posted on 03 Mar 2017 | 1 Answer

Sufian is a regular internet user. Sufian clicked a rogue link in an email, cyber criminals succeeded to get hold of his account details. They called his bank and asked to extract one million rupees before his card was blocked. Notably, after a second, he clicked on the website link and Sufian realized that something was wrong, but it's just too late by then. What is this kind of Cyber Crime and what can be done in such a situation?Read More

Posted on 03 Sep 2019 | No Answers Yet

Team Legistify | Legistify

Team Legistify
Answered on 28 Sep 2018

Cybercrimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail, and cyber-stalking. The trafficking, distribution, posting, and dissemination of obscene material including pornography, indecent exposure, and child pornography, constitutes one of the most important Cybercrimes known today. The potential harm of such a crime to humanity can hardly be overstated. This is one Cybercrime which threatens to undermine the growth of the younger generation as also leave irreparable scars and injury on the younger generation, if not controlled. Read More

Posted on 03 Mar 2017 | 1 Answer

Team Legistify | Legistify

Team Legistify
Answered on 28 Sep 2018

You husband has allegedly hacked into your email without your permission, therefore, he has committed an offence under section 66 of the IT act and is liable to be punished accordingly on submission of proof. The relevant provision is reproduced herein below: Sec 66: Hacking with computer system. (1) Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack: (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend upto two lakh rupees, or with both. Read More

Posted on 05 Mar 2016 | 1 Answer

Team Legistify | Legistify

Team Legistify
Answered on 28 Sep 2018

Cyber crimes are defined as : "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS / MMS)"Read More

Posted on 06 Mar 2016 | 1 Answer

Team Legistify | Legistify

Team Legistify
Answered on 28 Sep 2018

There are various modes or methods by which cyber crime can be committed such as -Unauthorized access to computer systems or networks / Hacking -Theft of information contained in electronic form -Email bombing -Data diddling -Salami attack -Denial of Service attack -Virus / worm attacks -Logic bombs -Internet time thefts Read More

Posted on 03 Mar 2017 | 1 Answer

Team Legistify | Legistify

Team Legistify
Answered on 28 Sep 2018

Cyber Crimes can be categorized in two ways: 1. The crimes in which the computer is the target. Examples of such crimes are hacking, virus attacks, DOS attack etc.  2. The crimes in which the computer is used as a weapon. These types of crimes include cyber terrorism, IPR violations, credit card frauds, EFT frauds, pornography etc. Read More

Posted on 10 Mar 2017 | 2 Answers