Issues and challenges with changing perspective of time in cyber tort
Keywords:
Identity theft, personal information, password, credit cardAbstract
Private details such as usernames, Cybercriminals often collect the victim's identification numbers, credit card information, and social security number in order to conduct fraud in the name of the other person. These confidential details may be used for a number of illegal purposes, including requesting loans, making online purchases, and getting entry to the victim's financial and health details. The use of an individual’s identity for wrongful purposes like fraud and other getting their information illegally is known as identity theft. It can range from using their surname, social security number, or credit card details, against their authorization. The term "identity theft" was created in 1964. Both in the United Kingdom and the United States, identity fraud is now legally characterized by loss of personally identifiable information. Identity fraud is the fraudulent use of some other particular personality to get financial or other rewards.
Downloads
References
Halder and Jaishankar, Cyber Crime and Victimization of Women: Laws, rights and Regulations, 2011, ISBN no. 978-1-60960-830-9
Dr SR Myneni, Information technology law (cyber laws), 1 st Edition, Asia law house, Page no. 33.
Easttom and Taylor (2011).
https://www.livemint.com/companies/news/cyber-crime-cases-in-india-almost-doubled-in-2017- 11571735243602.html.
National Crime Record Bureau, Crime Report 2018, Page no.- xiii
Defined under section 2(1) (ta) of the IT ACT, 2000 as "electronic signature" means authentication of any electronic record by a subscriber by means of the electronic technique specified in the Second Schedule and includes digital signature.
Added by Information Technology Amendment Act, 2008
I.L.R. 2010 (3) Kerala.
Un handbook on identity theft
The Identity Theft Penalty Enhancement Act, 2004& The Identity Theft Enforcement and Restitution Act of 2008.
B Singh, Regulations and Guidelines for Effective Investigation of Cyber Crimes in India | Centre of Excellence for Cyber Security Research and Development in India (CECSRDI) Perry4law.org (2013), available at http://perry4law.org/cecsrdi/?p=302 (last visited Oct 14, 2015)
F Cassim, Protecting personal information in the era of identity theft: just how safe is our personal information from identity thieves?, 18 Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad 68 (2015).
Dsci.in, Cyber Labs | Data Security Council of India, available at www.dsci.in/taxonomypage/283 (last visited Oct 14, 2015).
Data Protection Act in India with Compared to the European Union Countries, 11 International Journal of Electrical & Computer Sciences (2011), available at www.ijens.org/Vol_11_I_06/112206-7474-IJECSIJENS.pdf
The purpose of Criminal Punishment, (1 ed. 2004), http://www.sagepub.com/sites/default/files/upmbinaries/5144_Banks_II_Proof_Chapter_5.pdf (last visited Oct 14, 2015).
Rajlakshmi Wagh, Comparative Analysis of Trends of Cyber Crime Laws in USA and India, 2 International Journal of Advanced Computer Science and Information Technology pp. 42-50 (2013).
History of Computers, available at http://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading03.html (last visited Oct 13, 2015).
Vivek Tripathi, Cyber Laws India Cyberlawsindia.net, http://www.cyberlawsindia.net/index1.html (last visited Oct 13, 2015).
India Risk Survey, 2014, (1 ed. 2014), http://www.ficci.com/Sedocument/20276/report-India-Risk-Survey2014.pdf (last visited Oct 13, 2015).
India Risk Survey, 2014, (1 ed. 2014), http://www.ficci.com/Sedocument/20276/report-India-Risk-Survey2014.pdf (last visited Oct 13, 2015).
Dazeinfo, Internet Users In India: 354M, 60% Access From Mobile [REPORT] - Dazeinfo (2015), available at http://dazeinfo.com/2015/09/05/internet-users-in-india-number-mobile-iamai/ (last visited Oct 13, 2015).
THE EVOLUTIONAL VIEW OF THE TYPES OF IDENTITY TH EFTS AND ONLINE FRAUDS IN THE ERA OF THE INTERNET, Internet Journal of Criminology © (2011), available at www.internetjournalofcriminology.com/wang_huang_the_evolutional_view_of_the_types_of_identity_theft s_and_online_frauds_in_the_era_of_internet_ijc_oct_2011.pdf (last visited Oct 13, 2015).
Siddharth Buxy, IDENTITY THEFT ON THE INTERNET: SUGGESTIONS FOR THE INFORMATION TECHNOLOGY ACT (1 ed.), http://thegiga.in/LinkClick.aspx?fileticket=KX1_Imk_gDs%3D&tabid=589 (last visited Oct 13, 2015)
LARRY J. SIEGEL, E-STUDY GUIDE FOR: CRIMINOLOGY: THEORIES, PATTERNS, AND TYPOLOGIES (11 ED. 2014)
Rohas Nagpal, Is it legal to open a Facebook account in a fake name? | Facebook Law (India) Facebooklaw.in (2013), http://www.facebooklaw.in/is-it-legal-to-open-a-facebook-account-in-a-fake-name/ (last visited Oct 13, 2015).
Neeraj Aarora, Identity Theft or Identity Fraud | A Platform to discuss & analyse Financial and Cyber ForensicsA Platform to discuss & analyse Financial and Cyber Forensics Neerajaarora.com (2009), available at www.neerajaarora.com/identity-theft-or-identity-fraud/ (last visited Oct 13, 2015)
Privacymatters.com, Computer Hacking and Identity Theft | PrivacyMatters.com, available at www.privacymatters.com/identity-theft-information/identity-theft-computer-hacking.aspx (last visited Oct 13, 2015).
Australian Competition and Consumer Commission, Nigerian scams, https://www.scamwatch.gov.au/typesof-scams/unexpected-money/nigerian-scams (last visited Oct 13, 2015).
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.