wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

profile
28_Christy Pachikkal
Mar 14, 2022
1 Like
0 Discussions
221 Reads

Computer forensics which is also called cyber forensics or digital forensics is the process of extracting information and data from computers to serve as digital evidence. Computer forensics integrates the fields of computer science and law to investigate crime. For digital evidence to be legally admissible in court, investigators should follow proper Legal procedures when recovering and analyzing data from computer systems. The laws written before the era of computer forensics are often outdated and cannot adequately assess the techniques used in a computer system search. The inability of the law to keep pace with technological advancements may ultimately limit the use of computer forensics evidence in court.
The legal issues relevant to computer forensics are vast, and range from the qualification of experts, the reliability and accuracy of the forensic evidence that is being proffered, to the scope and result of an expert’s testimony. Computer or Digital Forensic Investigation encounters various inconsistencies in its Indian system. The reasons mentioned are Ethical issues, Security issues, Lack of Standardization and Globalization, Evolution of new Technology, Increasing Use of Social Network & Lack of expertise. 
Cyber law enforcement and regulation is passing through a bad phase in India. On one hand, India has bad and weak cyber law whereas on the other hand law enforcement is hardly aware about the basics of cyber law and cyber. forensics. India has become a safe heaven for cyber criminals. 
The latest statistics show that cybercrime is actually on the rise. However, it is true that in India, cybercrime is not reported too much about. The fact is that people in our countries do not report cybercrimes for many reasons. Many do not want to face harassment by the police. There is also the fear of bad publicity in the media, which could hurt their reputation and standing in society. Also, it becomes extremely difficult to convince the police to register any cybercrime, because of lack of orientation and awareness about 
cybercrimes and their registration and handling by the police. 
As per the report of National Crime Records Bureau and survey conducted in 2005, a total 179 cases were registered under IT Act 2000, of which about 88 cases were related to Obscene Publications/Transmission in electronic form, normally known as cyber pornography in which 125 persons were arrested for committing such offences during 2005. There were 74 cases of Hacking of computer systems during the year wherein 41 persons were arrested. Out of the total 74 Hacking cases, those relating to Loss/Damage of computer resource/utility under Sec 66(1) of the IT Act were 33 cases whereas the cases related to Hacking under Section 66(2) of IT Act.
Moreover with the increase in the cybercrimes like hacking etc., the need of cyber forensics have felt , thus various tools and techniques have been developed for tracing the crime, making the exact report in order to make it admissible in the court of law. Existing legislations need to be updated regularly to cater for the emerging changes in new technology and ones enacted to address this gap as well as training judicial and law enforcement personnel who are charged with adjudicating cases in which digital evidence is involved. Our law enforcement agency needs to be more aware about the basics of Cyber Crime and they need to be oriented about the Cyber Laws in India. The judges also need to be aware about the cybercrimes as well as the conviction need to be faster.


Comments ()


Sign in

Read Next

CSI and Organizational Change

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Functions Of Operating Systems

Blog banner

WomenEmpowerment

Blog banner

Decoding Confusion Matrix

Blog banner

BharatPe

Blog banner

IoT Architecture Based Security

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Firewall

Blog banner

MAILFENCE

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

EFT

Blog banner

City of Mumbai (Bombay):

Blog banner

SQL Injection Techniques

Blog banner

Electronic Funds Transfer

Blog banner

VIRTUAL MACHINES

Blog banner

CONCURRENCY

Blog banner

MEMORY HIERARCHY

Blog banner

Go Daddy

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Mumbai Metro 3

Blog banner

Top 10 Logos and their meanings

Blog banner

Threads

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Key to success in Sports

Blog banner

Deadlock and Starvation

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Traveling

Blog banner

The IT Service Lifecycle

Blog banner

"Audit" In Data Science

Blog banner

Segmentation and paging concept

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

Memory input output management

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Amazon

Blog banner

Virtual memory

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Working with Sniffers for monitoring network communication

Blog banner