We Moreover the people are not in the

observed large differences in concerns about identity theft between
the subjects in India and in the US. Nearly 82% of the US subjects
were concerned about identity theft, while only 21% of the Indian
subjects were concerned about this issue. This typical responses of
the subjects in India were no absolutely not, I have never felt a
threat to identity and no nothing I don’t have concerns about my
identity being stolen.1

is still lacking behind in enacting efficient laws in order to
control Identity Theft. But it true to note that Identity Theft is
also emerging in India to a greater extent. This is the right time to
alarm and stop this technical white collar crime.Even though the
India is facilitated with well-established IT Act, 2000 it is a
worrying factor to state that it has no specified provision for ID
Theft. Thus there is urgent need in enacting the Law
for preventing ID Theft.2

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

per the report, India is fast emerging as a soft target for organized
cybercrime with four in five online adults becoming victims of
identity theft in 20113.Identity
theft can happen easily and quickly. Since this sensitive personal
information is readily available, fraudsters get easy access to plan
ID theft.

key recommendation is that researchers separate out the many crimes
that are lumped together as identity theft, i.e., credit card fraud,
account takeover, “phishing,” database theft, etc. and
examine these crimes from the point of view of the three stages of
identity theft (the initial offense of acquiring the personal
information; the identity theft crime or crimes, i.e., fraud; and the
outcomes, which are likely to be multiple).4

protect the people from the cyber criminals there must be sufficient
and stringent laws. People are ignorant regarding the cyber laws.
Moreover the people are not in the position to know the laws
governing cyber world. The laws which are in the regard to the cyber
arena in our country are Information Technology Act, Information
Technology (Certifying Authorities) rules, 2000, Cyber regulations
appellate tribunal(Protected) rules,2000, The information technology
(Certifying Authority) regulations, 2001, The information
technology(other powers of civil court vested in cyber appellate
tribunal)rules, 2003, The information Technology(other standards)
rules, 2003, The information technology(qualification and experience
of adjudicating officers and manner of holding enquiry) rules, 2003,
The information technology (use of electronic records and digital
signatures)rules, 2004, The information technology(security
procedure) rules, 2004, The cyber appellate tribunal( salary,
allowances and other terms and conditions of services of chairperson
and member) rules, 2009, The cyber appellate tribunal (procedure for
investigation of misbehavior or incapacity of chairperson and
members) rules, 2009, The information technology(procedure ands
safeguards for interception, monitoring and decryption of
information) rules, 2009, The information technology(procedure and
safeguards for blocking for access of information by public) rules,
2009, The information technology(procedure and safeguard for
monitoring and collecting traffic data or information) rules, 2009,
The information technology(reasonable security practices and
procedures and sensitive personal data or information) rules, 2011,
the information technology(intermediaries guidelines) rules, 2011,
The information technology (guidelines for cyber café) rules, 2011,
the information technology(electronic service delivery) rules, 2011,
guidelines for submission of application for license to operate as a
certifying authority under the IT act, 2000,and WTO: Information
technology agreement, Articles of TRIPS and EPC, Uniform domain name
dispute resolution policy, Rules for uniform Domain name dispute
resolution policy.5

See Privacy perceptions in India and the United
States; An interview study

Guide To
Cyber Laws (Information Technology Act, 2000e-Commerce,
Data Protection and The Internet) by Rodney D Ryder – published
by Lexis Nexis India – 2007 edition



Source: Cyber Crimes, Eastern Book Company 2nd
Edition; Authored by Talat Fatima.