wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

profile
28_Christy Pachikkal
Mar 14, 2022
1 Like
0 Discussions
222 Reads

Computer forensics which is also called cyber forensics or digital forensics is the process of extracting information and data from computers to serve as digital evidence. Computer forensics integrates the fields of computer science and law to investigate crime. For digital evidence to be legally admissible in court, investigators should follow proper Legal procedures when recovering and analyzing data from computer systems. The laws written before the era of computer forensics are often outdated and cannot adequately assess the techniques used in a computer system search. The inability of the law to keep pace with technological advancements may ultimately limit the use of computer forensics evidence in court.
The legal issues relevant to computer forensics are vast, and range from the qualification of experts, the reliability and accuracy of the forensic evidence that is being proffered, to the scope and result of an expert’s testimony. Computer or Digital Forensic Investigation encounters various inconsistencies in its Indian system. The reasons mentioned are Ethical issues, Security issues, Lack of Standardization and Globalization, Evolution of new Technology, Increasing Use of Social Network & Lack of expertise. 
Cyber law enforcement and regulation is passing through a bad phase in India. On one hand, India has bad and weak cyber law whereas on the other hand law enforcement is hardly aware about the basics of cyber law and cyber. forensics. India has become a safe heaven for cyber criminals. 
The latest statistics show that cybercrime is actually on the rise. However, it is true that in India, cybercrime is not reported too much about. The fact is that people in our countries do not report cybercrimes for many reasons. Many do not want to face harassment by the police. There is also the fear of bad publicity in the media, which could hurt their reputation and standing in society. Also, it becomes extremely difficult to convince the police to register any cybercrime, because of lack of orientation and awareness about 
cybercrimes and their registration and handling by the police. 
As per the report of National Crime Records Bureau and survey conducted in 2005, a total 179 cases were registered under IT Act 2000, of which about 88 cases were related to Obscene Publications/Transmission in electronic form, normally known as cyber pornography in which 125 persons were arrested for committing such offences during 2005. There were 74 cases of Hacking of computer systems during the year wherein 41 persons were arrested. Out of the total 74 Hacking cases, those relating to Loss/Damage of computer resource/utility under Sec 66(1) of the IT Act were 33 cases whereas the cases related to Hacking under Section 66(2) of IT Act.
Moreover with the increase in the cybercrimes like hacking etc., the need of cyber forensics have felt , thus various tools and techniques have been developed for tracing the crime, making the exact report in order to make it admissible in the court of law. Existing legislations need to be updated regularly to cater for the emerging changes in new technology and ones enacted to address this gap as well as training judicial and law enforcement personnel who are charged with adjudicating cases in which digital evidence is involved. Our law enforcement agency needs to be more aware about the basics of Cyber Crime and they need to be oriented about the Cyber Laws in India. The judges also need to be aware about the cybercrimes as well as the conviction need to be faster.


Comments ()


Sign in

Read Next

MOBILE DEVICE FORENSIC

Blog banner

Disk scheduling

Blog banner

Deadlock

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Why we fail after giving 100% ?

Blog banner

Web Site

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Difference Between Classification And Clustering

Blog banner

Memory Management of Operating System(OS)

Blog banner

Child labour

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

Deadlock

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

Intrusion Detection System

Blog banner

Why is online marketing is important in current scenario

Blog banner

PHONE TECHNOLOGY

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

VIRTUAL MEMORY

Blog banner

Data Security must be your Priority!

Blog banner

A Traveller’s Guide to Offbeat Places in Arcadia, Florida

Blog banner

INTERNET SECURITY

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Banaras

Blog banner

Artical on FreshBooks

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Memory Management

Blog banner

Yahoo! mail

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Data Structures

Blog banner

Not anti-social, but pro-solitude

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Modern operating systems (OS)

Blog banner

Outlook mail

Blog banner

RAID - LEVELS OF RAID

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

An Overview of Virtual Machines

Blog banner

Computer Security

Blog banner

Twisted world

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner