Skip navigation

Cyber Security and Surveillance in India

Mar. 28, 2022   •   Bhawna Pawar

The author Rishika Jain is pursuing law from Amity University Rajasthan. She is currently in her 2nd year and has a great inclination toward criminal law and socio-legal issues.


INTRODUCTION

Digital Intrusions and Attacks have expanded significantly in the course of the most recent decade, uncovering delicate individual and business data, upsetting basic activities, and forcing significant expenses on the economy. The issue of network protection and reconnaissance, particularly unapproved observation, however generally unprioritized, has as of late increased a lot of footing because of the expanding number of news reports with respect to different examples of unapproved reconnaissance and digital violations. On account of unapproved observation, more than the recurrence of the occurrences, it is their sheer size that has stunned common society and particularly social liberties gatherings. Digital secret activities utilize subtle IT malware to enter both corporate and military information workers so as to acquire plans and knowledge.

LEGAL LANDSCAPE FOR SURVEILLANCE

The Indian Telegraph Act, 1885

The Indian Telegraph Act, passed in 1883, was expected to give the Central Government capacity to build up telegraphers the utilization of wired and remote telecommunication, phones, print, radio correspondences and computerized information interchanges. It was as of late held that Information on authorizations given to focal organizations for telephone tapping can't be revealed as it would preferentially influence premiums of the state, may jeopardize an individual or block the cycle of examination, the Home Ministry said in light of an RTI question. The candidate had looked to know the number of approvals given by the service to focal organizations allowing them to block telephones somewhere in the range between 2009 and 2018. He had likewise requested information identified with the occasions an organization had looked for consent to tap telephones and about authorizations being denied by the service.

Information Technology Act, 2000

The Information Act, of 2000 is the essential law for managing cybercrime and computerized trade in the nation. The Act was first detailed in 2000, and afterwards was overhauled in 2008 and came into power a year late. The Information Technology (Amendment) Bill, 2008 altered various areas that were identified with computerized information, electronic gadgets and cybercrimes. In the Information Technology Amendment Act, 2008, network safety is practised under sections 43 (information insurance), 66 (hacking), 66A (measures against sending hostile messages), 66B discipline for illicitly having taken PC assets or specialized gadgets), 67(protection against unapproved admittance to information), 69 (cyberterrorism), 70 (making sure about access or endeavouring to tie down admittance to a secured framework) and 72 (protection and classification) among others.

Code of Criminal Procedure, 1973

Section 91 of the Code of Criminal Procedure, 1973 manages focused on observation. Specifically, area 91 states that a Court in India or any official responsible for a police headquarters may bring an individual to deliver any report or whatever other thing that is important for the motivations behind any examination, request, preliminary or other continuing under the Code of Criminal Procedure. Under area 91, law implementation organizations in India can get to put away information. The Code additionally permits District Magistrates and Courts to give bearings requiring report, bundle or "things" inside the guardianship of any postal or transmit power to be created before it if necessary with the end goal of any examination, request, preliminary or other continuing under the Code[i].

NEED OF REFORMS

In this climate of consistent computerized and information development, it is basic that associations are furnished with the fundamental assets, including workforce and preparation, to give successful network protection and information security. The vast majority of the web traffic in India is done over portable information – more than 450 million clients access the web from their mobiles to convey and peruse media, yet in addition to the shop, moving cash, exchanging stocks and products, trading urgent archives, take care of utility tabs – these versatile exchanges have been encouraged by modest information plans, the spread of 4G organizations, and reasonable smartphones[ii]. A more vigilant citizenry can actually contribute to the development of laws relating to cyber-terrorism. It is their active participation which can help in coping with this crime The general public should undertake effective protective measures and report the instances of such crimes to the concerned authorities.

India will before long have another digital protection strategy, reported Prime Minister Narendra Modi in his discourse on India's 74th Independence Day. Modi said that his legislature knows about the dangers exuding from the internet and how they could affect India's general public, economy and improvement[iii]. The Internet Crime Report for 2019, delivered by the USA's Internet Crime Complaint Center of the Federal Bureau of Investigation, has uncovered that India stands the third number among the top 20 nations that are survivors of web violations. Privacy constitutes the basic, irreducible condition necessary for the exercise of personal liberty and the freedoms guaranteed by the constitution. It is the inarticulate major premise in Part III of the Constitution[iv].

The Judiciary has a very important role to play when it comes to controlling the menace of cyber-terrorism. With the advent of judicial activism, or rather judicial adventurism, the Indian Judiciary has got a new dimension to venture into. An active Judiciary must be backed with laws that are generic and living in nature, further watered by way of precedents. Lack of precedents causes hindrances in the development of the law as without judicial interpretation, the law remains confined to its literal meaning and there is little scope to fill up the lacunae therein.

CONCLUSION

It has been established that cyberattacks have the potential to destabilise the entire market and thus without effective reforms or controls in place, it could jeopardise the entire State of the economy. A comprehensive network safety methodology with a potential alteration in the IT Act, as a portion of its arrangements, has gotten excess and can't address issues emerging from the developing dangers. The government needs to consider making a Cyber Defense Agency, which is to be endowed with the obligation to actualize the digital guard technique for public security.


Disclaimer: This article is an original submission of the Author. Niti Manthan does not hold any liability arising out of this article. Kindly refer to our Terms of use or write to us in case of any concerns.


References:

[i] Section 92, Code of Criminal Procedure, 1973.

[ii] Bhasker Gupta, State Of Cybersecurity In India 2020 – By Jigsaw Academy & AIM, (Feb. 20, 2020), https://analyticsindiamag.com/state-of-cybersecurity-in-india-2020-by-jigsaw-academy-aim/.

[iii] Ananya Bhardwaj, India to get a new, ‘robust’ cyber security policy soon, says PM Modi, (Aug. 15 2020, 2:11 PM), https://theprint.in/india/india-to-get-new-robust-cyber-security-policy-soon-says-pm-modi/482356/.

[iv] KS. Puttaswamy and another v. Union Of India, (2017) SCC OnLine SC 996.


Liked the article ?
Share this: