Skip to main content

Posts

Showing posts from April 18, 2020

Corona and Sec 188 of Indian Penal Code, 1860

Introduction  Corona (Covid -19) has been declared a http:// pandemic. Cases of corona are increasing day by day and matter is of great concern to the government as well as to the general masses.  Amidst the outbreak, it is necessary for people to abide by the instructions provided by the government and duly follow the orders given by the public servant.  When we speak about order given by public servant, it is certainly meant to be mandatorily followed and disobedience of which would certainly put you behind the bars.  Provision Stated in Indian Penal Code, 1860 Section 188 in The Indian Penal Code 188. Disobedience to order duly promulgated by public servant.—Whoever, knowing that, by an order promulgated by a public serv­ant lawfully empowered to promulgate such order, he is directed to abstain from a certain act, or to take certain order with certain property in his possession or under his management, disobeys such direction, shall, if such disobedi

Technological crimes : Issues and future weapons for prevention

INTRODUCTION MEANING OF CYBER CRIME Cyber crime or computer related crime is a crime that involves a computer and a network . The computer may have been used in the commission a crime, or it may be the target. Cybercrimes can be defined as offences that are committed against individuals or group of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including but not limited to chat rooms, emails, notice board and groups) and mobile phones (Bluetooth/SMS/MMS) TYPES OF CYBER CRIMES 1. Hacking 2. Copyright infringement 3. Unwarranted mass surveillance 4. Child pornography 5. Child grooming 1. Hacking It is unauthorized intrusion into a computer or network. The person engaged in hacking activities is generally referred to as a hacker .This hacker may alter system or securi