Results 1 to 10 of 14

Thread: Computer Crimes and the Act

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Investigation of cyber crimes

    Any police officer, not below the rank of a Deputy Superintendent of Police, can search and arrest without warrant any person found therein who is reasonably suspected or having committed or of committing or of being about to commit any offence under this Act.

    Things which can be confiscated are Hardware which can include any data-processing devices (such as central processing units, memory typewriters, "laptop" or "notebook" computers); internal and peripheral storage devices (such as fixed disks, external hard disks, floppy disk drives and diskettes, tape drives and tapes, optical storage devices, transistor-like binary devices, and other memory storage devices), peripheral input/output devices (such as keyboards, printers, scanners, plotters, video display monitors, and optical readers); and related communications devices (such as modems, cables and connections, recording equipment, RAM or ROM units, acoustic couplers, automatic dialers, speed dialers, programmable telephone dialing or signaling devices, and electronic tone-generating devices).

  2. #2
    Join Date
    Sep 2006
    Location
    Kerala, India
    Posts
    17,476

    Default Crime Investigation

    The Indian Penal Code (IPC) was amended according to the IT Act 2000. Amendments include making false electronic record, forgery (for purpose of cheating, of Court or public register etc, for purpose of harming reputation), forged electronic record, falsification accounts.

    India needs more computer savvy police, lawyers, judiciary and computer forensic experts who can help prevent, detect and fight these crimes. Forensic experts do the following :

    1. make the equipment operate properly;
    2. retrieve information;
    3. unblock "deleted" or "erased" data storage devices;
    4. bypass or defeat passwords;
    5. decipher encrypted data.

  3. #3
    Join Date
    Feb 2009
    Location
    Natick, MA
    Posts
    19

    Default Much Thanks

    Perfection, thank you for posting this information. To all on here: keep in mind that although this seems to cover everything, I personally know that there's many many loopholes that make certain instances 100% legal... You just need to know how and when to get out of a situation. Alot of things require that the defaulter know what he's doing, and, purposfully intends to damage the system in some way... If said defaulter does not plan to harm anyone of any information, etc, or.. the prosocutor cannot prove beyond resonable doubt, that such was the intent, than the trial must be dismissed..

    Just my two cents..

  4. #4
    Join Date
    Mar 2009
    Posts
    11

    Default

    Hi,

    Very useful information :)

  5. #5
    Join Date
    Apr 2009
    Posts
    4

    Default

    Thanks a lot

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •