Information Technology Law

IT laws are set of legal enactments adopted by various countries in the present day. This relates to a well-channeled movement of digital information. IT laws deal with various dimensions of Information Technology. It includes computer software, access to digital information, access to software, protection of software, fire walling and proxy server set ups, confirming to the norms of internet usage and keeping the domain of e-commerce clean. Information technology is a huge domain. It creates quite many chances for humans to benefit but at the same time imposes a lot of evil within its territory. The hackers and internet criminals thrive on the feeling of searching loopholes. This endangers the entire IT network. The rut is all-pervasive. The social networking sites are in danger. The educative institutions and corporate workplaces are in peril. Hackers are all there. They can intend to malign a person or an organization for some personal vengeance. They can do it on behalf of somebody for money or the most contorted ones do it for the sake of sadist pleasure. This has forced countries to upgrade their IT law structures to efficiently combat cyber crimes and crime within the broader domain of information technology. Apart from the global laws relating to IT, many countries are also forming individual laws relating to such crimes. Few years ago India strengthened its commitment against such dubious crimes by passing the Information technology act 2000. It aims at barring any individual or organization from misusing or subverting computer terminals and network places belonging to the Indian Territory. It also bars similar misuse outside the country’s territory when the set-up is being owned or run by an Indian. The misuse can relate to the broadest and narrowest thread of information Technology. Reformed IT laws of today have necessitated certain amendments. Few additions that it has brought to its territory are: · Electronic Signature In Global And National Commerce Acts · Uniform Electronic Transactions Act · Uniform Commercial Code · Digital Signature And Electronic Authentication Law The idea is to tap the destructive movement of hardened internet criminals. Few lawyers in Munich are working on stronger precepts of Information Technology laws presently. Hopefully something more stern and concrete should come out of their endeavor.

Posted in Uncategorized

Leave a Reply