top of page

Online Identity Theft In India




Manjeet Singh, Lovely Professional University

INTRODUCTION

Identity theft is present in society since identity-related information is becoming increasingly important in e-government, business, and interpersonal interactions. In the past, business and daily transactions were dominated by a "good name" and solid personal relationships. Became nearly impossible with the shift to electronic commerce, what's more, as a consequence, identity-related information became far more important for economic and social engagement. For e-governance and e-commerce enterprises, non-physical means of identity are becoming the standard. For example, when a consumer inputs their credit card information when making an online purchase, this not only recognizes the person, but it also authorizes the transfer of funds from the identified customer.

The ease of conducting transactions, a lack of sufficient cyber education, and breaches in cyber security all contribute to identity theft, in which the unwary victim's digital identity is stolen or unauthorized access to the victim's account is used to achieve illicit financial gains. "I would argue that security is our top concern because, for all the good things you will indeed be able to do with technology - managing your lifestyle, maintaining contact with others, being creative - if we don't tackle these security challenges, people will hold back." BILL GATES is a writer who lives in the United States.

Indian Journal of Law and Legal Research

Abbreviation: IJLLR

ISSN: 2582-8878

Website: www.ijllr.com

Accessibility: Open Access

License: Creative Commons 4.0

Submit Manuscript: Click here

Open Access Logo

Licensing:

​All research articles published in The Indian Journal of Law and Legal Research are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the IJLLR or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the IJLLR.

bottom of page