Analysis Of Cybercrime Offences
1. Understanding Cybercrime Offences
Cybercrime involves illegal activities carried out using computers, networks, or digital devices. Broadly, it can be categorized into:
Hacking and Unauthorized Access
Accessing someone’s computer, network, or system without permission.
Identity Theft and Phishing
Stealing personal data (like banking details) to commit fraud.
Cyberstalking and Online Harassment
Using online platforms to harass, threaten, or intimidate individuals.
Financial Fraud / Cyber Fraud
Online scams, fake websites, or phishing to steal money.
Cyber Terrorism
Targeting critical infrastructure to cause widespread disruption.
Intellectual Property Crimes
Piracy, software theft, or distributing copyrighted material online.
Relevant Law in India:
The Information Technology Act, 2000 (IT Act), and sections of the Indian Penal Code (IPC) apply to cybercrime:
Sec 66: Hacking and data theft
Sec 66C: Identity theft
Sec 66D: Cheating by personation using computer resources
Sec 66E: Violation of privacy
Sec 67: Obscene content on the internet
2. Case Law Analysis
Here are five detailed cases illustrating different cybercrime offences:
Case 1: State of Tamil Nadu v. Suhas Katti (2004) – Cyber Stalking / Defamation
Facts: Suhas Katti created fake profiles of a woman on online forums, posting obscene messages and defamatory content.
Offence: Cyber harassment, defamation, and violation of privacy under IT Act and IPC.
Judgment: The Madras High Court convicted the accused under Section 66 of IT Act and sections of IPC relating to defamation.
Significance: This was one of the first cases in India to recognize cyberstalking and online harassment as punishable offences.
Case 2: Shreya Singhal v. Union of India (2015) – Freedom of Speech vs Cyber Offences
Facts: The case challenged Section 66A of the IT Act, which criminalized offensive online messages.
Issue: Whether Section 66A violated the constitutional right to free speech.
Judgment: The Supreme Court struck down Section 66A, stating it was vague and unconstitutional, leading to misuse against innocent users.
Significance: Set a precedent on balancing freedom of expression with cybercrime laws.
Case 3: Avnish Bajaj v. State (2004) – Online Cheating / E-Commerce Fraud
Facts: Avnish Bajaj, owner of a popular e-commerce website, was accused of cheating customers by selling fake products.
Offence: Fraud and cheating under IT Act and IPC.
Judgment: Initially convicted, but the Supreme Court highlighted intermediary liability and responsibility of platforms.
Significance: Clarified the role of online intermediaries in preventing cyber fraud.
Case 4: Anvar P.V. v. P.K. Basheer (2014) – Hacking and Digital Evidence
Facts: A dispute arose regarding the validity of electronic evidence obtained through hacking.
Issue: Whether electronic records could be admitted without proper authentication.
Judgment: The Supreme Court held that electronic evidence must comply with IT Act standards (Sections 65A and 65B).
Significance: Strengthened the legal framework for digital evidence in cybercrime cases.
Case 5: Mumbai Cybercrime Case – Financial Fraud via Internet Banking
Facts: Hackers accessed bank accounts of multiple victims and transferred money to foreign accounts.
Offence: Cyber fraud, identity theft, unauthorized access under Section 66 and 66C of IT Act.
Judgment: The accused were convicted; banks were ordered to compensate victims for lapses in security.
Significance: Showed the importance of cybersecurity in financial transactions and accountability of service providers.
3. Key Takeaways from Case Laws
Cybercrime laws are evolving; courts balance public interest and fundamental rights.
Digital evidence is crucial; IT Act provides specific standards for its admissibility.
Intermediary liability has been clarified; platforms must ensure security but are not automatically responsible for user actions.
Early cases focused on cyber harassment and defamation, while later cases deal with financial fraud and e-commerce.
Cybercrime enforcement requires specialized investigation, like tracking IP addresses, hacking tools, and digital forensics.

0 comments