Many Indian official websites have been hacked, including state government and defence websites. Defense officials were unable to view their compensation information when the website of the Principal Comptroller of Defense Accounts was hacked. The government has agreed to DEITY’s recommendation to cease using popular email ids for official purposes, and has sanctioned a budget of Rs. 100 cores to protect the data, in order to reduce hacking of precise work. State government websites have previously been compromised.
Images of Hacker vs. Cracker
Following the revision of the IT Act in 2008, a very thin line of demarcation has been formed between the two words: hacking and cracking. Hackers are persons who are highly talented at computer programming and utilise their expertise to help the government and numerous other companies protect their sensitive information and trade secrets. They look for flaws in the software and try to figure out why they exist.
The Cracker’s Liability
Liability in civil cases
The IT Act’s Section 43A addresses the legal culpability of cyber criminals. The section deals with the compensation that should be paid in the event that the date is not protected. His was included as part of the Act’s modification in 2008. Section 43A, which requires corporations to establish reasonable security policies, emphasises corporate responsibility for data protection.
Liability for the consequences
When the cracker’s intent or liability to destroy the system or steal crucial information is demonstrated, criminal liability for cracking arises. If the cracker simply trespasses the system without intending to do harm, section 43A only applies to civil culpability. Criminal trespass can lead to further criminal behaviours that are punishable under the Indian Penal Code, such as computer theft, which is penalised under section 378.
India’s cybercrime laws
Data theft and hacking are covered by sections 43 and 66 of the IT Act, respectively, as civil and criminal offences.
A simple civil crime under section 43 occurs when a person gains access to a computer without the owner’s authorization and removes or damages the data stored on it. The cracker will have to compensate the persons who have been harmed. The maximum compensation cap under the ITA 2000 was Rs. One crore in fines. This ceiling, however, was eliminated in an amendment issued in 2008. Section 43A was inserted in the 2008 amendment to encompass the corporate shed, when employees took information from the secret files of the company.
Receiving a stolen computer resource or information is punishable under Section 66B. A year in prison or a fine of one lakh rupees, or both, are possible punishments. Under section 66A, mens rea is an important component. The existence of criminal purpose and the wicked mind, i.e. the concept of mens rea, destruction, deletion, alteration, or diminishment in the value or utility of data, are all major factors to bring any act under this Section. 2
How to File a Hacking Complaint
Any cyber cell in the world can receive a complaint regarding cybercrime. In India, there are several cyber crime units where a complaint can be filed.
To begin, write an application to the director of the cyber cell department, including your name, address, e-mail address, and phone number.
Second, accompany the cell with the following documents:
1. Log files that are automatically sent to the server when files are opened are known as server logs. It keeps track of daily activities.
2. All material that has been tampered with by the hacker must be submitted to the cyber unit as proof, in both hardcopy and soft copy format.
3. A tangible copy of both the original and defaced web pages should be submitted so that the work may easily identify the defaced or manipulated material.
4. Details of the control mechanism, including who had access to the password and the computer, as well as the complainant’s contact information.
5. If any person is suspected, a list of suspects should be provided for future reference, since this will aid the cyber cell in their investigation.
Conclusion
Hacking is an undeniable danger to the virtual world. This theft is largely unknown throughout the country. Hacking and cracking must be made more widely known throughout the country. The government’s rules are strict, yet they lack the power to be enforced and public knowledge. The majority of minor hacking cases go undiscovered because people are hesitant to file criminal charges for minor offences, even if the penalties are severe. Additionally, due to a lack of equipment, it is extremely difficult to track a virtual hacker. Because hacking can occur anywhere on the planet, it is difficult for authorities to track him down and prosecute him in another country.