Skip to main content

Cyber Crime: - In Indian Perspective


Author: Deepanshi Singh, ICFAI University, Dehradun


Cybercrime is an offence involving targeting or attacking a computer or computer network with the objective of performing an illegal activity such as committing fraud, trafficking in child pornography, software vulnerability exploits or social engineering.

Cybercrime, also known as computer crime, the use of a computer as a device to in addition unlawful ends, which include committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.


Cyber-crimes against persons like harassment occur in cyberspace or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.

Cybercrimes against property like computer wreckage (destruction of others' property), transmission of harmful programs, unauthorized trespassing, unauthorized possession of computer information.

Cyber-crimes against government like Cyber terrorism


  CYBER PORNOGRAPHY- Pornography has no legal or consistent definition. The reason why we do not have a clear definition as far as pornography is concerned is that we do not have uniform standard culture and ethics in the world nor do we have uniform laws which defines the pornography. The Indian law doesn’t define the term pornography and not deal with this term.

TEST OF OBSCENITY AND PORNOGRAPHY- The test of obscenity was first laid down in the case of Regina V. Hicklin[1]( (1868) 3 QB 360.)as the tendency “to deprave and corrupt those whose minds are open to such influences and into whose hands a publication of this sort may fall”, and it was understood that this test would apply only to the isolated passage of the work.

In Miller v. California[2]( 413 US 15(1973), the Supreme Court of United States in landmark judgment gave the basic guidelines and three point tests to determine obscenity in the work i.e.

1. That the average person, applying contemporary “community standards”, would find that the work, taken as a whole, appeals to the prurient interest.

2. That the work depicts or describes, in an offensive way, sexual conduct or excretory functions, as specifically defined by applicable state law or applicable law.

3. Whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value.

In Samresh Bose v. Amal Mitra[3]( AIR 1986 SC 967) the Supreme Court has held that “A vulgar writing is not necessarily obscene. Vulgarity arouses a feeling of disgust and revulsion and also boredom but does not have the effect of depriving, debasing and corrupting the morals of any reader of the novels, whereas obscenity has the tendency to deprave and corrupt those whose minds are open to such immoral influences''. In this case the court differentiated between vulgarity and obscenity and further held that while judging the question of obscenity “the Judge should place himself in the position of a reader of every age group in whose hands the book is likely to fall and should try to appreciate what kind of possible influence the book is likely to have in the minds of the readers.

 CYBER STALKING- Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM), or messages posted to a discussion group or forum. Cyber stalkers take advantage of the anonymity afforded by the internet to stalk or harass their victims, sometimes without being caught, punished or even detected.

 CYBER TERRORISM- Cyberterrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.

 HACKING- Cyber hacking, also known as cyber attacking, is the practice of intentionally exploiting weaknesses in an organization's computer systems. Cyber hacking can be used for purposes such as compromising or stealing data, disrupting communication or procedures, or to satisfy other harmful objectives


The FEDERAL BUREAU OF INVESTIGATION(FBI) offers a number of tips to companies wishing to better protect themselves from Business Email Compromise attacks:

 Use secondary ways or two-factor authentication to verify request for changes in account details.

Ensure the URL in emails is associated with the business/individual it claims to be from.

 Be cautious about hyperlinks that may contain misspellings of the actual domain name.

Refrain from supplying login credentials or PERSONALLY IDENTIFIABLE INFORMATION of any sort via email. Many mails requesting your personal details may seem to be authentic but are actually not authentic, one has to be aware.

 Verify the email address to which you are sending mail, be careful that you send mail to the correct address.

 Ensure the settings in employees’ computers are enabled to allow full email extensions to be viewed.

 Monitor your personal financial accounts on a regular basis for irregularities, like missing deposits.”


Actus Reus means “Such result of human conduct as the law seeks to prevent”. There must be commission or omission to constitute a crime. As far as mens rea is concerned, it means “A guilty state of mind”. The mental element forms the other important ingredient of crime. The act remains the same while the state of mind makes the act ‘reus’ and hence an offence. In Cybercrimes, one should see what the state of mind of the hacker was and that the hacker knew that the access was unauthorized. Thus, a “Particular Computer” needs not to be intended by the hacker, it is enough if the unauthorised access was to “any computer”.

Actus Reus in cybercrimes has become a challenge as the entire act is committed in intangible surroundings. The perpetrator may leave some footmarks in the machine itself though it becomes a herculean task for the law enforcement machinery to prove it in the courts, as it is required to be in physical form or at least in such a form where it becomes admissible in evidence.


1.  Cyber crimes under the IT Act:

o    Tampering with Computer source documents - Sec.65

o    Hacking with Computer systems, Data alteration - Sec.66

o    Publishing obscene information - Sec.67

o    Un-authorised access to protected system Sec.70

o    Breach of Confidentiality and Privacy - Sec.72

o    Publishing false digital signature certificates - Sec.73 

2.  Cyber Crimes under IPC and Special Laws:

o    Sending threatening messages by email - Sec 503 IPC

o    Sending defamatory messages by email - Sec 499 IPC

o    Forgery of electronic records - Sec 463 IPC

o    Bogus websites, cyber frauds - Sec 420 IPC

o    Email spoofing - Sec 463 IPC

o    Web-Jacking - Sec. 383 IPC

o    E-Mail Abuse - Sec.500 IPC 

3.  Cyber Crimes under the Special Acts:

o    Online sale of Drugs under Narcotic Drugs and Psychotropic Substances Act

o    Online sale of Arms Arms Act

Poona Auto Ancillaries Pvt. Ltd., Pune v. Punjab National Bank, HO New Delhi & Others(2013)

In 2013, Maharashtra’s IT secretary Rajesh Aggarwal ordered Punjab National Bank (PNB) to pay Rs 45 lakh to the complainant Manmohan Singh Matharu, MD of Pune-based business Poona Auto Ancillaries, in one of the biggest compensation awards in a judicial adjudication of a cybercrime case. After Matharu responded to a phishing email, a fraudster deposited Rs 80.10 lakh from his PNB account in Pune. Since he reacted to the phishing email, the complainant was requested to share the blame, but the bank was deemed responsible owing to a lack of appropriate security checks against fraud accounts created to deceive the Complainant.


Cyber crime is much serious crime and there must be strict laws and amendments, social media hacking, pornography these are much offensive crime, harming one’s dignity is not a joke when one is even not aware about wrong that has happened to her/him. The IT Act and the Rules promulgated thereunder regulate the cyber law regime. When the IT Act is unable to provide for any specific sort of offence or if it does not include exhaustive provisions with regard to an offence, one may also turn to the provisions of the Indian Penal Code, 1860. Hence, the current cyber law system is still insufficient to cope with the wide range of cybercrimes that exist.


  1. This article is written very nicely, & very much informative. It covers entire concept of cyber crime with respect to Indian prospects by mentioning various legal provisions.

  2. In the Era of 21st Century there is a rapid change in technology, which is beneficial for humans but also there are so many negative consequences of such technology upgradation the one is cyber crime, As some people are using the technology in wrong way and they even don't have idea about the consequences.
    Through this article the author is providing such a good information for all the users.

  3. In todays world and time people really took disadvantage of technology by harassing other peoples and their families , so its a great work to spread such an amazing information regarding this to keep everyone alert about the offense.


Post a Comment

Share your views

Popular posts from this blog

Attestation , Revocation, Alteration and Revival of Wills

  Author: Amit Sheoran, Symbiosis Law School, Nagpur People were worried about their lives after the corona pandemic. Because in Corona, no one was aware that anything could happen at any time. That is why they start thinking that if they die, then what will happen with their property and, as a result, they start making plans. A question arises in our mind after hearing the word will. What is will? It is defined under 2(h) of the Indian Succession Act, 1925. A will is a testamentary document by which a person bequeaths his property in the name of any other person. It will be effective after the death of the testator. The property will devolve on the person in whose favour it is bequeathed after the death of the testator. A will can be changed, revoked, or altered at any point of time after it is made. A will can be written more than once.All wills are revocable at any time during the life of the person and are confidential documents. A will can be attested, revoked, altered, and also r

Registration of LLP and Laws

  Name – Shweta Pandit College - National Law School Of India University, Bangalore. Introduction- LLP(Limited Liability Partnership) is a limited liability company, you will find the characteristics of both a corporation and a partnership in this form of a company. LLP came into effect in 2008 when the Limited Liability Partnership Act was passed in India..  LLP- Limited Liability Partnership, is a partnership where partners have limited liability and are responsible only for the loss/damage created by themselves and not by any of their partner or partners. Partners in LLP have a fair share of say in the workings of the business.  Registration of LLP- It is a long process to register a LLP, the few steps involved in the process are discussed as follows: First step is to get the DSC, which is a Digital Signature Certificate from the government agencies such as E-Mudra, NSDL, IDRBT Certifying Authority, National Informatics Center, CDAC and each agency has its own costs of providing ser

Indian Depository Receipts: Requisites and Benefits

  Yash Miniyar Maharashtra National Law University, Aurangabad A. INTRODUCTION Depository Receipts are a form of transferable instruments, which aid in the flow of general trade in a stock exchange at a given time. They are classified as financial securities in the form of equity that are issued by listed companies. The depository receipt is a form of certificate which denotes the valid holding of the security or shares of a given company. One of the most recognised and busiest forms of depository receipts in the world is the American Depository Receipts, which allows in trading of shares or securities of foreign companies. These receipts act as a form of investment for potential investors in order to diversify their assets and hold shares of their desired companies. This not only allows the economic diversification but also the geographic diversification. These depositories act as mediums to curb the hindrances or the obstacles which prevented people from making foreign investments,