Cybercrime And Computer-Related Offences
Cybercrime refers to unlawful acts committed using a computer, digital device, network, or the internet, either as the target or as the tool of the offence. Cybercrimes may involve theft, fraud, unauthorized access, privacy invasion, hacking, data manipulation, or harmful online behaviour like cyber harassment.
Main Categories of Cybercrime
1. Cyber Offences Against Persons
These target individuals:
Cyberbullying, online harassment
Cyberstalking
Publishing private images
Identity theft
Morphing of images
Defamation via digital platforms
2. Cyber Offences Against Property
These affect digital or electronic assets:
Hacking
Unauthorized access
Data theft
Intellectual property infringement
Online fraud, phishing, ransomware
3. Cyber Offences Against Government / Organization
These are carried out against national security or institutional infrastructure:
Cyberterrorism
Denial-of-service attacks
Attacks on government databases
Unauthorized access to confidential national data
4. Computer-Related Offences
These include crimes committed through or using computer systems:
Unauthorized access
Data manipulation
Computer fraud
Software piracy
Spreading malware or ransomware
Many countries have enacted cyber-specific laws—for example:
India: Information Technology Act, 2000
USA: Computer Fraud and Abuse Act (CFAA)
UK: Computer Misuse Act, 1990
DETAILED CASE LAWS (More than Five)
Below are seven important cybercrime cases with full explanations.
1. Shreya Singhal v. Union of India (2015, Supreme Court of India)
Issue: Constitutionality of Section 66A of the IT Act (criminalizing offensive messages online).
Facts:
Two girls were arrested for a Facebook post and a "like" criticizing shutdown of Mumbai after a political leader’s death. The arrests raised concerns about misuse of Section 66A, which was vague and broadly worded.
Judgment:
The Supreme Court struck down Section 66A completely.
Reasoning:
The provision violated freedom of speech (Article 19(1)(a)).
Terms like “offensive,” “annoying,” etc., were vague.
It permitted excessive police discretion.
Criminal law cannot be used to curb legitimate expression.
Importance:
A landmark case strengthening digital free speech and preventing misuse of vague cybercrime laws.
2. State of Tamil Nadu v. Suhas Katti (2004, India)
Issue: Cyberstalking, posting obscene material online, defamation.
Facts:
The accused created a fake Yahoo! group using the victim’s name and posted obscene, defamatory messages and her phone number. The woman began receiving harassment calls.
Judgment:
The accused was convicted under Sections 67 of the IT Act and IPC provisions.
This was one of India’s first cybercrime convictions.
Importance:
Demonstrated the applicability of IT Act provisions.
Established that online harassment and defamation would be treated seriously.
3. R v. Gold & Schifreen (UK, 1988)
(Leading to the enactment of the UK Computer Misuse Act, 1990)
Issue: Unauthorized access to computer systems.
Facts:
Two hackers accessed British Telecom’s Prestel mailbox system by obtaining login credentials. They demonstrated that system was insecure.
Judgment:
They were initially convicted, but the convictions were overturned because there was no specific law in the UK at the time covering unauthorized access.
Impact:
This incident prompted the UK Parliament to pass the Computer Misuse Act, 1990, one of the earliest cybercrime laws globally.
Set the groundwork for modern cyber legislation.
4. United States v. Kevin Mitnick (1995–1999, USA)
Issue: Hacking, wire fraud, unauthorized access.
Facts:
Kevin Mitnick, one of the world’s most famous hackers, hacked into systems of major corporations including Motorola, Nokia, and Sun Microsystems.
He stole software, altered data, and accessed email servers.
Judgment:
He was convicted under the Computer Fraud and Abuse Act (CFAA) and sentenced to prison.
Importance:
Highlighted vulnerabilities in corporate systems.
Became a landmark case in U.S. cybercrime history.
Helped define “unauthorized access” under CFAA.
5. Sony Sambandh Case (Sony India Pvt. Ltd. v. State) (2004, India)
Issue: Online cheating, credit card fraud.
Facts:
Fraudsters used a stolen Japanese credit card to purchase goods from Sony India’s website. Goods were delivered, but the payment was later discovered to be fraudulent.
Judgment:
The accused were traced and charged under
Section 66 (computer-related offences)
Section 420 IPC (cheating)
Importance:
One of the earliest cases of online credit card fraud in India.
Established that online commercial transactions fall under IT Act protections.
6. Bazee.com Case (Avnish Bajaj v. State, 2008, India)
Issue: Liability of online platforms for user-generated content.
Facts:
A pornographic MMS involving minors was listed for sale on the auction website Bazee.com (predecessor to eBay India).
CEO Avnish Bajaj was arrested.
Judgment:
The court held:
CEO could not be personally liable unless he had knowledge of the content.
But the platform was required to have reasonable diligence.
Importance:
Led to the development of Section 79 IT Act (safe harbour), clarifying that intermediaries are not liable if they follow due diligence.
7. Zee Telefilms Case (Jagtar Singh & Ors.) (2010, India)
Issue: Hacking of television signal distribution network, causing financial loss.
Facts:
The accused hacked into the conditional access system (CAS) of a TV broadcaster and illegally decrypted pay channels, enabling unauthorized viewing.
Judgment:
Conviction under Section 66 IT Act and related IPC provisions.
Importance:
Treated hacking of digital broadcast systems as “computer-related offences.”
Extended cybercrime definitions beyond personal computers to digital TV systems.
CONCLUSION
Cybercrime and computer-related offences have expanded with technological growth. Courts across the world have shaped the interpretation of cyber laws through landmark judgments. The case laws above show how:
Digital speech must be protected (Shreya Singhal),
Online harassment is punishable (Suhas Katti),
Unauthorized access requires strong legislation (Gold & Schifreen),
Corporate systems must be secured (Kevin Mitnick),
E-commerce and intermediaries require regulation (Sony, Bazee.com),
Digital infrastructure can itself be a cybercrime target (Zee Telefilms).

comments