We crimes, i.e., fraud; and the outcomes,
Weobserved large differences in concerns about identity theft betweenthe subjects in India and in the US. Nearly 82% of the US subjectswere concerned about identity theft, while only 21% of the Indiansubjects were concerned about this issue. This typical responses ofthe subjects in India were no absolutely not, I have never felt athreat to identity and no nothing I don’t have concerns about myidentity being stolen.
1Indiais still lacking behind in enacting efficient laws in order tocontrol Identity Theft. But it true to note that Identity Theft isalso emerging in India to a greater extent. This is the right time toalarm and stop this technical white collar crime.Even though theIndia is facilitated with well-established IT Act, 2000 it is aworrying factor to state that it has no specified provision for IDTheft. Thus there is urgent need in enacting the Lawfor preventing ID Theft.
2Asper the report, India is fast emerging as a soft target for organizedcybercrime with four in five online adults becoming victims ofidentity theft in 20113.Identitytheft can happen easily and quickly. Since this sensitive personalinformation is readily available, fraudsters get easy access to planID theft. Anotherkey recommendation is that researchers separate out the many crimesthat are lumped together as identity theft, i.e., credit card fraud,account takeover, “phishing,” database theft, etc. andexamine these crimes from the point of view of the three stages ofidentity theft (the initial offense of acquiring the personalinformation; the identity theft crime or crimes, i.e.
, fraud; and theoutcomes, which are likely to be multiple).4 RULEOF LAWS GOVERNED IN OUR COUNTRY REGARDING CYBER WORLD: Toprotect the people from the cyber criminals there must be sufficientand stringent laws. People are ignorant regarding the cyber laws.Moreover the people are not in the position to know the lawsgoverning cyber world. The laws which are in the regard to the cyberarena in our country are Information Technology Act, InformationTechnology (Certifying Authorities) rules, 2000, Cyber regulationsappellate tribunal(Protected) rules,2000, The information technology(Certifying Authority) regulations, 2001, The informationtechnology(other powers of civil court vested in cyber appellatetribunal)rules, 2003, The information Technology(other standards)rules, 2003, The information technology(qualification and experienceof adjudicating officers and manner of holding enquiry) rules, 2003,The information technology (use of electronic records and digitalsignatures)rules, 2004, The information technology(securityprocedure) rules, 2004, The cyber appellate tribunal( salary,allowances and other terms and conditions of services of chairpersonand member) rules, 2009, The cyber appellate tribunal (procedure forinvestigation of misbehavior or incapacity of chairperson andmembers) rules, 2009, The information technology(procedure andssafeguards for interception, monitoring and decryption ofinformation) rules, 2009, The information technology(procedure andsafeguards for blocking for access of information by public) rules,2009, The information technology(procedure and safeguard formonitoring and collecting traffic data or information) rules, 2009,The information technology(reasonable security practices andprocedures and sensitive personal data or information) rules, 2011,the information technology(intermediaries guidelines) rules, 2011,The information technology (guidelines for cyber café) rules, 2011,the information technology(electronic service delivery) rules, 2011,guidelines for submission of application for license to operate as acertifying authority under the IT act, 2000,and WTO: Informationtechnology agreement, Articles of TRIPS and EPC, Uniform domain namedispute resolution policy, Rules for uniform Domain name disputeresolution policy.
5 1 See Privacy perceptions in India and the United States; An interview study 2 Guide To Cyber Laws (Information Technology Act, 2000e-Commerce, Data Protection and The Internet) by Rodney D Ryder – published by Lexis Nexis India – 2007 edition 3 http://tech2.in.com/features/general/identity-theft-a-reality-in-india/270972 4 https://www.ncjrs.
gov/pdffiles1/nij/grants/210459.pdf#page=86 5Book Source: Cyber Crimes, Eastern Book Company 2nd Edition; Authored by Talat Fatima.