top of page

Analyzing The Effectiveness Of Laws Addressing Cybercrime In India: The Regulations On Hacking




Jyoti Pathak, Amity Law School, Amity University Noida, Uttar Pradesh


Legal Framework on Cybercrime and Hacking in India


1.1 Overview of the Information Technology Act, 2000


The Information Technology Act, 2000 (IT Act) is the cornerstone legislation governing cyber activities in India. Enacted to provide legal recognition to electronic transactions and to facilitate e-commerce and e-governance, the IT Act has evolved into India’s primary legal instrument for regulating cybercrime, including hacking and other malicious online activities. As technology has progressed, the Act has undergone key amendments to address emerging cyber threats, notably through the Information Technology (Amendment) Act, 2008.


1.1.1 Historical Background and Need for the Act


The need for comprehensive cyber legislation in India emerged in the late 1990s as the internet began to expand rapidly, creating new forms of communication, commerce, and, consequently, crime. Before 2000, India did not have any dedicated laws to recognize electronic records, digital signatures, or offences committed in cyberspace. The UNCITRAL Model Law on Electronic Commerce (1996) provided the framework that India adopted while drafting its IT Act. The legislation aimed to fill the legal vacuum concerning issues like electronics authentication, cyber fraud and digital evidences.




Indian Journal of Law and Legal Research

Abbreviation: IJLLR

ISSN: 2582-8878

Website: www.ijllr.com

Accessibility: Open Access

License: Creative Commons 4.0

Submit Manuscript: Click here

Licensing: 

 

All research articles published in The Indian Journal of Law and Legal Research are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

 

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the IJLLR or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the IJLLR.

bottom of page