You are on page 1of 1

ABSTRACT

Crime in a developing nation is an obstacle to its development. In this world, where the whole
thing is available at a click, crimes are also been committed at a click. The Computer Technology
has boosted up the human life but as the saying goes that “Every coin has two sides”, similarly
this technology has its unlawful use done by the Criminals leading to what we call as Cyber Crime.
However, India got armed herself with The Information Technology Act, 2000 as drastically
amended in 2008, to fight against the unlawful use of Computer Technology.

This paper will try to define the word ‘Cyber Crime’ and will focus on the major amendments
made in IT Act in 2008. The paper will also deal with the word computer crimes which has the
wider meaning than that of Cyber Crime. Further, it will also deal with different computer related
offences including Hacking, Virus, Trojans and Worms, Cyber Pornography, Cyber Stalking,
Logic Bombs and many more.

Cyber criminals always opt an easy way to make big money. Catching such criminals is pretty
much difficult. Computers are vulnerable, so laws are required to protect and safeguard them
against cyber criminals. Thus, this paper will try to analyze different reasons for Computer’s
Vulnerability.

Further, the main focus of the paper will be analyzing of the Computer related offences with special
reference to S. 66 of Information Technology Act. The paper will also analyze judicial views and
important judgements relating to S. 66 of the Information Technology Act such as Shreya Singhal
v. Union of India, K.R.Ravi Rathinam vs The Director General of Police, CBI vs Arif Azim and
many other important case laws relating to all the clauses of S. 66 of the IT Act. Further, the paper
will conclude by providing the remedial measures and suggestions so as to decrease the Computer
related Offences.

Keywords: The Computer Technology, Unlawful use of Computer Technology, The Information
Technology Act, 2000 (as amended in 2008), Computer related Offences, Cyber Crimes,
Computer’s Vulnerability, S. 66 of Information Technology Act, judicial views, remedial
measures.

You might also like