Issues and challenges with changing perspective of time in cyber tort

https://doi.org/10.53730/ijhs.v6nS5.8863

Authors

  • Shivam Charaya Student of 10th semester BA.LLB at Law College Dehradun, Uttaranchal University Dehradun, 248007, Uttarakhand, India
  • Deependra Nath Pathak Asst. Professor at Law College Dehradun, Uttaranchal University Dehradun, 248007, Uttarakhand, India

Keywords:

Identity theft, personal information, password, credit card

Abstract

Private details such as usernames, Cybercriminals often collect the victim's identification numbers, credit card information, and social security number in order to conduct fraud in the name of the other person.  These confidential details may be used for a number of illegal purposes, including requesting loans, making online purchases, and getting entry to the victim's financial and health details. The use of an individual’s identity for wrongful purposes like fraud and other getting their information illegally is known as identity theft. It can range from using their surname, social security number, or credit card details, against their authorization. The term "identity theft" was created in 1964. Both in the United Kingdom and the United States, identity fraud is now legally characterized by loss of personally identifiable information. Identity fraud is the fraudulent use of some other particular personality to get financial or other rewards.

Downloads

Download data is not yet available.

References

Halder and Jaishankar, Cyber Crime and Victimization of Women: Laws, rights and Regulations, 2011, ISBN no. 978-1-60960-830-9

Dr SR Myneni, Information technology law (cyber laws), 1 st Edition, Asia law house, Page no. 33.

Easttom and Taylor (2011).

https://www.livemint.com/companies/news/cyber-crime-cases-in-india-almost-doubled-in-2017- 11571735243602.html.

National Crime Record Bureau, Crime Report 2018, Page no.- xiii

Defined under section 2(1) (ta) of the IT ACT, 2000 as "electronic signature" means authentication of any electronic record by a subscriber by means of the electronic technique specified in the Second Schedule and includes digital signature.

Added by Information Technology Amendment Act, 2008

I.L.R. 2010 (3) Kerala.

https://www.securitas.in/globalassets/india/files/about-us/news---related-documents/identity-theft-is-thelargest-contributor-to-fraud-in-india.pdf

Un handbook on identity theft

The Identity Theft Penalty Enhancement Act, 2004& The Identity Theft Enforcement and Restitution Act of 2008.

B Singh, Regulations and Guidelines for Effective Investigation of Cyber Crimes in India | Centre of Excellence for Cyber Security Research and Development in India (CECSRDI) Perry4law.org (2013), available at http://perry4law.org/cecsrdi/?p=302 (last visited Oct 14, 2015)

F Cassim, Protecting personal information in the era of identity theft: just how safe is our personal information from identity thieves?, 18 Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad 68 (2015).

Dsci.in, Cyber Labs | Data Security Council of India, available at www.dsci.in/taxonomypage/283 (last visited Oct 14, 2015).

Data Protection Act in India with Compared to the European Union Countries, 11 International Journal of Electrical & Computer Sciences (2011), available at www.ijens.org/Vol_11_I_06/112206-7474-IJECSIJENS.pdf

The purpose of Criminal Punishment, (1 ed. 2004), http://www.sagepub.com/sites/default/files/upmbinaries/5144_Banks_II_Proof_Chapter_5.pdf (last visited Oct 14, 2015).

Rajlakshmi Wagh, Comparative Analysis of Trends of Cyber Crime Laws in USA and India, 2 International Journal of Advanced Computer Science and Information Technology pp. 42-50 (2013).

History of Computers, available at http://homepage.cs.uri.edu/faculty/wolfe/book/Readings/Reading03.html (last visited Oct 13, 2015).

Vivek Tripathi, Cyber Laws India Cyberlawsindia.net, http://www.cyberlawsindia.net/index1.html (last visited Oct 13, 2015).

India Risk Survey, 2014, (1 ed. 2014), http://www.ficci.com/Sedocument/20276/report-India-Risk-Survey2014.pdf (last visited Oct 13, 2015).

India Risk Survey, 2014, (1 ed. 2014), http://www.ficci.com/Sedocument/20276/report-India-Risk-Survey2014.pdf (last visited Oct 13, 2015).

Dazeinfo, Internet Users In India: 354M, 60% Access From Mobile [REPORT] - Dazeinfo (2015), available at http://dazeinfo.com/2015/09/05/internet-users-in-india-number-mobile-iamai/ (last visited Oct 13, 2015).

THE EVOLUTIONAL VIEW OF THE TYPES OF IDENTITY TH EFTS AND ONLINE FRAUDS IN THE ERA OF THE INTERNET, Internet Journal of Criminology © (2011), available at www.internetjournalofcriminology.com/wang_huang_the_evolutional_view_of_the_types_of_identity_theft s_and_online_frauds_in_the_era_of_internet_ijc_oct_2011.pdf (last visited Oct 13, 2015).

Siddharth Buxy, IDENTITY THEFT ON THE INTERNET: SUGGESTIONS FOR THE INFORMATION TECHNOLOGY ACT (1 ed.), http://thegiga.in/LinkClick.aspx?fileticket=KX1_Imk_gDs%3D&tabid=589 (last visited Oct 13, 2015)

LARRY J. SIEGEL, E-STUDY GUIDE FOR: CRIMINOLOGY: THEORIES, PATTERNS, AND TYPOLOGIES (11 ED. 2014)

Rohas Nagpal, Is it legal to open a Facebook account in a fake name? | Facebook Law (India) Facebooklaw.in (2013), http://www.facebooklaw.in/is-it-legal-to-open-a-facebook-account-in-a-fake-name/ (last visited Oct 13, 2015).

Neeraj Aarora, Identity Theft or Identity Fraud | A Platform to discuss & analyse Financial and Cyber ForensicsA Platform to discuss & analyse Financial and Cyber Forensics Neerajaarora.com (2009), available at www.neerajaarora.com/identity-theft-or-identity-fraud/ (last visited Oct 13, 2015)

Privacymatters.com, Computer Hacking and Identity Theft | PrivacyMatters.com, available at www.privacymatters.com/identity-theft-information/identity-theft-computer-hacking.aspx (last visited Oct 13, 2015).

Australian Competition and Consumer Commission, Nigerian scams, https://www.scamwatch.gov.au/typesof-scams/unexpected-money/nigerian-scams (last visited Oct 13, 2015).

Published

12-06-2022

How to Cite

Charaya, S., & Pathak, D. N. (2022). Issues and challenges with changing perspective of time in cyber tort. International Journal of Health Sciences, 6(S5), 1287–1299. https://doi.org/10.53730/ijhs.v6nS5.8863

Issue

Section

Peer Review Articles