Skip to main content

Importance of knowing Cyber Law for Techies


The world of internet is known as cyberspace and the laws prevailing in this area are known as Cyber laws. All its users, including the IT people or “techies” come under the ambit of these laws as it carries a kind of worldwide jurisdiction.
 
An IT organization is the department within a company that is charged with establishing, monitoring and maintaining information technology systems and services. It may also be charged with strategic planning to ensure that all IT initiatives support the respective business goals. 
Cyber law is important because it touches almost all aspects of transactions and activities involving the cyberspace. Every action and reaction in the virtual world has some cyber legal angles.This field deals with the legal problems with cyber space as it helps businesses to prevent any kind of online crimes such as identities and data theft, privacy violation, banking frauds, cyber terrorism spreading malware and viruses, etc.
 
Cyber-Crime has not been defined in the IT Act, 2000 or in the National Cyber Security Policy, 2013 or in any other regulation in India. Hence, to define cyber-crime, one can say, it is just a combination of crime and computer. In other words, ‘any offence or crime in which a computer is used is a cyber-crime’. Even a petty offence like stealing or pick pocket can be brought within the broader purview of cyber crime if the basic data or aid to such an offence is a computer or information stored in a computer used (or misused) by the fraudster. The IT Act, 2000 defines a computer, computer network, data, information and all other necessary ingredients that form part of a cyber-crime.IT People usually deal with such problems so they should know how to solve them, and for that, they need to be well aware of Cyber laws.
 
Importance
It’s a “the more the merrier” scenario for the people with inappropriate motives and a criminal mindset. The more the usage of the web, the more are going to be the propensity of the people with inappropriate motives to commit an unlawful activity over it. According to a survey showed that the maximum amounts as Rs. 1.2 trillion were stolen by the cyber criminals in 2019. In today’s techno-savvy environment, the world is becoming more and more digitally sophisticated and so are the crimes. This brings us to the need for regulating the online usage of internet facilities that touches every action and every reaction in cyberspace.
 
One of the major IT functions is Governance. It refers to the implementation of operational parameters for working units and individuals' use of IT systems, architecture, and networks. In layman’s terms, they enact the rules about how you and your team can use the company’s technology and what you can use it for. This is part of the conventional IT security as well as the data assurance for which the IT department is also responsible. For this purpose, the team needs to know the basics of IT laws as it assists them to plan and build security strategies.
 
Cyber security strategies cover the following areas:
  • Ecosystem: A strong ecosystem helps prevent cyber crime. Your ecosystem includes three areas—automation, interoperability, and authentication. A strong system can prevent cyber attacks like malware, attrition, hacking, insider attacks, and equipment theft.
  • Open Standards: Open standards lead to improved security against cyber crime. They allow business and individuals to easily use proper security. Open standards can also improve economic growth and new technology development.
  • Strengthening Regulation: This includes promoting cyber security, proving education and training, working with private and public organizations, and implementing new security technology.
  • IT Mechanisms: These measures include end-to-end, association-oriented, link-oriented, and data encryption.
 
Along with the basic security strategies, the network needs advanced security. The most effective way to improve network security is by using the right technology. Network security technology includes the following:
  • Active Devices: These devices can include either software based or hardware based firewalls, antivirus devices or software, and content filtering devices.
  • Passive Devices: These devices help to recognize unwanted internet traffic.
  • Preventative DevicesMany devices are focused on preventing network threats. These are called preventative devices. These devices can include network scanners and penetration testers.
  • Unified Threat Management: These are complete security devices. They can include content filtration, firewall technology, and web caching.
 
The right IT role has a significant impact on your organization. Depending on the organizational objectives, the business might also benefit from more strategic areas, including:
  • Cyber security roles: Information security analyst, cyber security architect, cyber security engineer.
  •  IT roles: IT developer, IT architect, IT product manager
  • Developers roles: Develps manager, automation architect, security engineer, software developer.
  • Artificial intelligence roles: Machine learning engineer, data scientist, business intelligence developers.
For all the above-mentioned purposes, the vital role is played by Cyber or Web laws. Hence, it is required for the people working in various IT departments of different spheres to learn these laws for the optimum usage of the technology as well as to enhance businesses.
 
 
                                                                                             By: Hemangee Sharma
                                                                                     (Pursuing BA.LLB, FIMT, Delhi)
 
 
Stay connected with us: www.worldcybersecurities.com
To get latest updates on various cyber related events & other things, you can join our Whatsapp group/Telegram Channel
 

Comments

  1. The security of any personal data is upto you and by using comman sence General people can prevent the some extent of Cyber crime. Government should make strict rule regarding Cyber crime and due to changing nature of act IT professional should help the government to detect the new Cyber threat.

    ReplyDelete
  2. Cyber law yields legal recognition to all electronic documents and covers all transactions over the internet, which makes it highly significant for everyone to have a clear idea of it.

    ReplyDelete
  3. The IT act facilitates and protects the interchange of information and legalizes these transactions done by means of electronic communication. As internet have become a significant part of contemporary lifestyle it is important to know the basics of these laws.

    ReplyDelete
  4. It is not only important for the techies to know the cyber laws but the general public who use cyberspace as well. For without knowledge, even the unintentional wrongs committed in cyberspace may bring in legal consequences.

    ReplyDelete
  5. Really well researched and informative blog

    ReplyDelete
  6. Quite an informative article; it familiarised me with so many tech terms.

    ReplyDelete
  7. Cyber laws are one of the most budding laws which are extremely essential for a nation to adopt. Both the techies, students and general public are benefitted from this field in some or the other way. The only concern is that people should get aware of these provisions where they can get justice and raise their voice against cyber attacks and crimes. I feel its the duty of our generation to promote awareness regarding the same.

    ReplyDelete

Post a Comment

Popular posts from this blog

UNESCO Guidelines on Generative AI in Schools

The advent of artificial intelligence has assumed prominence amongst all industries and various facets of people's personal lives. The integration of AI in education has been inevitable, given the significance and role of information, knowledge production and administration in the sector. This is especially so as its capabilities entail replicating higher-order thinking. Besides assisting in the education process, it also brings the element of real-life relevance, allowing education to be imparted against the backdrop of the evolving world due to the same AI. It tends to have implications on the subject matter that needs to be imparted, which tends to be something that constantly needs to answer the question of "Why and how is this particular subject matter relevant for learning?".  This induces policy-makers and educational institutions to rethink what they need to impart as knowledge, the area of matter, and the manner of thinking to be emphasised. This is because educa

Dark Web: Safe or unsafe? Truth Revealed!

  The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind.  A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing. It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR. Advantages of Dark Web  Humans are allowed to hold privacy and express their views freely. Privacy is considered to be critical for honest persons through the different criminals and stalkers.  The growing tendency of employers to track

Need for Anti-Spam Laws in India: Comparative Analysis

  Introduction Spam is unsolicited, usually commercial messages (such as e-mails, text messages, or internet postings) sent to a large number of recipients or posted in a large number of places. The spamming activity is usually considered to cause a lot of nuisance and mental annoyance. Spamming is carried out with the help of an electronic mechanism to send unsolicited messages and advertisements. It can also be termed “An unsolicited e-mail” from which the sender attempts to gain an advantage. "India is the seventh biggest spammer in the world 7.8 billion spam e-mails sent in past 24 hours". It’s high time that India has to come up with its legislation to curb the activity.  The author will also argue the need for anti-spam legislation in India with a comparative analysis of various other jurisdictions. Why is it a concern? The term spam emerged due to the spread of unsolicited commercial messages in the internet space. The main challenge is that it has varied charact