Module III Flashcards

1
Q

Original Intent of the IT Act

A

The IT act was primarily drafted to facilitate and protect e commerce, not to be a comprehensive code regulating aspects of internet or cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Terminology of crimes in IT act

A

Does not use the general term cybercrime instead identifies and defines some specific offences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can a computer be defined in a cyber crime

A
  1. As the target or object of the crime
  2. As the physical site of the crime
  3. As the instrument used to commit the crime
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What constitutes cybercrime?

A

Crimes Using Internet/computer - Traditional crimes committed using computers or networks.
Crimes against the internet/computer - Target the integrity or availability of a computer/network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Definition of cybercrime in the IT Act

A

IT Act does not provide a definition for computer crime, cyber crime or internet crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Knowledge-based focus for defining computer crimes

A

A common definition of computer crimes is “any violations of the law that involve knowledge of computer technology for their perpetration, investigation or prosecution”. For example: Stealing a laptop is theft, but stealing it and destroying it to destroy data involves computer knowledge, making it closer to a computer crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Characteristics of Cybercrime

A
  1. Prevalence
  2. Low Conviction Rates
  3. Low Perpetration Cost
  4. Encryption protects cybercrime (e2e for example)
  5. Involvement of third parties (ISPs)
  6. Anonymity and evasion easy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the concept of access

A

Access related offences like trespass and hacking are fundamental types of internet crimes. Defined under the IT act. Means gaining entry into the computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Plugging in a pen drive is considered access?

A

Yes, plugging it into a computer and attempting to bypass is an attempt to communicate with the device. Clearly access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Broad Provisions

A

IT Act has intentionally broad provisions to maximize consent based protections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Relevance of “Secures access” in the penalising provision of IT Act - Section 43

A

Ability to access, like having the key/password, is treated similarly to actively accessing in the cyber context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Broad scope of computer definition

A

Critical and intentional, means even devices like pen drives and external hard drives qualify, even when not physically connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hacking originally

A

Section 66 of the original IT Act, whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to public or any person destroys or deletes or alters any information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Criticism of original definition of hacking

A
  1. Focus on Damage, Not acess
  2. Ignored Consent (which was the core issue)
  3. Dictionary definition v legal definition (dictionary also focused on unauthorized access, while the legal one focused on the resultant harm)
  4. Impact (Doing nothing after accessing would not have constituted hacking)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Comparison of old hacking definition with Trespass

A

Section 441 - Criminal tresspass involves entering property with intent to commit offence, intimidate, insult, or annoy or remaining there unlawfully after lawful entry with such intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Comparison of old hacking definition with Mischief

A
  • Mischief (IPC Sec 425) involves causing wrongful loss or damage by destroying property or making changes that diminish its value or utility.
  • The original Sec 66 definition of hacking showed more resemblance to Mischief (due to its emphasis on destruction/damage/diminishing value) than to Trespass.
17
Q

Breaking down the original 66 in terms of intent and actus

A
  1. Required Mens Rea (with the intent to cause or knowing that likely to cause
  2. Actus Reus
18
Q

Difference between Section 43 and Section 66

A

Section 43 lists various wrongful acts related to computers and establishes civil liability. The forum is the Adjudicating Officer (often the State IT Secretary), not a civil court.
Section 66: Establishes criminal liability if down dishonestly or fraudulently

19
Q

Dishonestly Meaning

A

Dishonestly (IPC Sec 24): Doing anything with the intention of causing wrongful gain to one person or wrongful loss to another.

20
Q

Fraudulently meaning

A

Fraudulently (IPC Sec 25): Doing anything with intent to defraud.

21
Q

What is the impact of the amendment to hacking section?

A
  1. Wider Scope from just “hacking”
  2. Higher Mens Rea standard
  3. Potential Negative Effect on Conviction rate as burden of mens rea is higher now
  4. Exclusion of negligence from criminal section
22
Q

Some notes about Section 43

A
  1. Independent of Copyright, even though copyright infringement might apply as well
  2. Extraction means transferring contents, permanently or temporarily, inspired by EU directives
23
Q

How broad is the scope for 43(g), providing assistance to any person to facilitate access? Will a blog post explaining hacking techniques constitute facilitation?

A

Section 84B already covers abetment; requires more direct involvement/nexus/intent; information might have legitimate educational uses. Depends on facts, circumstances, intent, nexus. “Facilitation” might imply more direct aid than just publishing information.

24
Q

Facts of USA v. Morris

A

Robert Morris, a Cornell PhD student, created an internet worm intended to gauge internet size non-disruptively. Authorized to use Cornell systems. When released onto the internet, a flaw caused rapid self-replication, crashing many computers.

25
Legal issue in USA v Morris
Did morris "intentionally access" computers without authorization and thereby cause damage? The key here is whether "intentionally" applied only to the ACCESS or also to the RESULTING DAMAGE. Was access to VICTIM CMOPUTERS authorised?
26
District Court in USA v Morris
Acquitted, held that the initial access was authorised and the damage was unintentional
27
Court of Appeals in USA v. Morris
- His authorization was limited to Cornell systems, not the wider internet victim computers. Accessing those was unauthorized. - The term "intentionally" qualified the access, not necessarily the resulting damage. Unauthorized access that *causes* damage met the criteria.
28
Difference between Protected systems and others
even an ATTEMPT to access unauthorizedly constitutes a crime under the Act
29