SNIGDHACYBER TORT [ Ty p e t h e c o m p a n y n a m e ] [ Ty p e t h e c o m p a n y address] [Type the abstract of the document here. The abstract summary [ T y p eis ttypically h e p haoshort ne n u m b e rof ] the contents of the document. Type the abstract of [ Ty p e t h e f a x n u m b e r ] the document here. The abstract is typically a short summary of the contents of the document.] CHANAKYA NATIONAL LAW UNIVERSITY PROJECT WORK LAW OF TORTS :- CYBER TORTS SUBMITTED BY:PRADHAN SINGDHA My thanks and appreciations also go to my colleagues in developing the project and people who have willingly helped me out with their abilities. it would not have been possible without the kind support and help of many individuals. I would like to extend my sincere thanks to all of them. I would like to express my special gratitude and thanks to seniors for giving me such attention and time.ACKNOWLEDMENT I have taken efforts in this project. . I would like to express my gratitude towards my parents & my friends for their kind co-operation and encouragement which help me in completion of this project. I am highly indebted to my Torts teacher for his guidance and constant supervision as well as for providing necessary information regarding the project & also for her support in completing the project. However. 3. TYPES OF CYBER TORTS 2.1. REASONS FOR OCCURRENCE OF CYBER TORTS 2.TABLE OF CONTENTS 1. CHAPTERIZATION 2.4. CONCLUSION BIBLIOGRAPHY . REMEDIES AVAILABLE IN CYBER TORTS 2. INTRODUCTION RESEARCH METHODOLOGY HYPOTHESIS OBJECTIVE 2.2. logic bombs. The extent of loss involved worldwide on account of cyber crimes will be tremendous as it is estimated that about 600 million people who use internet can be affected by emergence of cyber crimes. e-mail bombing. salami attacks. web . pornography. transnational in nature. Human ingenuity has also used the same technology for committing crimes. Therefore the importance and urgency of the problem cannot be understood. commerce. communication entertainment and companionship. with the purpose of influencing the functioning of computer systems. Trojan attacks. forgery. The computer may be used as a tool in the following kinds of activity. as evidenced by the ever-changing information technology. A new type of crime. It has affected profoundly almost all human activities including education. industry. The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/computer system/computer networks. data didling. Human nature did not change inspite of the profound technological and information revolutions in society. cyber stalking. The proliferation and integration of computers into every aspect of society has inevitably led to computer related criminal activities. sale of illegal articles. internet time thefts. The progress of civilization. theft of information contained in the electronic form. A generalized definition of cyber tort may be unlawful act wherein the computer is either a tool or target or both. intellectual property crime. Legislation also needs to move faster than the Criminals. online gambling. governance. Information technology has become a valuable source for development of commerce. The law enforcement machinery is looking to find solutions faster than the criminal invents problems. cyber defamation. e-mail spoofing.INTRODUCTION Human intelligence and endeavor brought in technological and information revolutions in the society. known as ‘Cyber Crime’ has become an integral part of our modern society. personal life styles and social life around the world. They are crimes committed with the help of computer and telecommunication technology. easily accessible by use of computers was no doubt put to use for improvement in standard of living of human beings.financial crimes. Cyber crimes have virtually no boundaries and may affect every country in the world. taking. criminal threats. especially through the internet. Computer crime involves the use of a computer as primary instrument to facilitate the commission of crime. this includes traditional crimes that have been transformed by computer technology such as internet auction fraud. we may define cyber crime as. The Cambridge Dictionary defines cyber crime as crime committed with the use of computers or relating to computers. altering. misusing and destroying information through computer manipulation of cyber space. physically damaging the computer system. The manual uses the term ‘computer related crime’. unethical or unauthorized behaviour involving automatic processing and/or transmission of data. modems. deleting. In 1994. Different organisation has defined cyber crime in following way.a criminal offense that has been created or made possible by the advent of computer technology. Various terms are used to define cyber crime. Generally. These crimes usually include the unauthorized use. introducing viruses into any computer or system. in the investigation being processed or transmitted in computer system. stalking. Cyber crime has been defined as the act of creating. theft of computer system. identity theft. United Nations also has initiated certain action towards harmonizing the concept of computer crime and cyber. . altering. Hardware consist of the physical and tangible units making up a computer. misuse of someone else’s internet domain name. its hardware and the software. distribution of child pornography. online gambling. WHAT IS COMPUTER? A computer consist of two things. web cameras etc. that includes CPU. speakers. denying computer services to an authorized user. It also involves the use of computer to commit a crime and/or as a repository of evidence related to the crime. without the use of physical force against the will or the interest of the victim. For present purpose. Offences committed via Information Technology have taken within its orbit any criminal offence. or a traditional crime. Organization for economic cooperation and development (OCED) gave the simplest and one among the first official definition of cyber crime as any illegal. output device like monitor. data storage units like hard disk.jacking. input devices like keyboard. scanner etc. floppy drivers. or destroying computer data or programs. access or damage to computer system. copying. stealing. and their associated peripheral equipments such as printers. A . which has been so transformed by the use of a computer that law enforcement investigators need a basic understanding of computers in order to investigate the crime. disturbing. UN published a manual on the prevention and control of computer related crime. which has information processing capabilities to perform or achieve a particular task. DOS. It further divides into two parts: program and data. Anything that can be stored electronically is software. The hardware is the brain and software is what we call the mind in a computer. A computer programme is a series of inter related instructions capable of causing a machine. It is the software that makes computer different from its hardware components. Programs may be expressed in a permanent form (ROM) or in a transient form (RAM) where the capacitors require periodic charging or refreshing.computer could be relatively simple microcomputers or it could be mainframes computers or even sophisticated super computers. . In contradistinction of hardware.g. software is that part of the computer which is in tangible. e. Linux. RESEARCH METODOLOGY For the purpose of research the researcher has relied on primary sources to look for information relating to the laws and statutes relating to CYBER TORTS. The researcher has aimed at doctrinal method of research and will try to critically analyze and provide an un-biased account of the CYBER TORTS from past to present world. The researcher has done this keeping in mind the frequently asked questions rising out of this topic. . such as malicious hacking. are becoming common . . etc.HYPOTHESIS From the initial research it appears that the ‘CYBER TORTS’ is a topic of heated discussion due because of day by day new and serious problems posed by attacks against computers and information systems. dissemination of viruses. statutes and legislations which provide a platform in CYBER TORTS. The researcher will provide its all aspects in present scenario.OBJECTIVE The researcher prime objective is to introduce ‘CYBER TORTS’ from its inception in the past to present world. It aims to critically provide a vivid account of the case law. . indecent exposure and Trafficking and Financial Crimes. a textile manufacturer. reliable and consistent information on various accounts and this is an essential factor for the government. REASONS FOR OCCURRENCE OF CYBER TORTS:- 1 Handbook Of Cyber Laws-Macmillan-Vakul Sharma 2 Cybercrimes And Law (An Overview)-C. corporate or industrial sector to introduce appropriate automation to increase efficiency and quality of products and services and this in turn has led to increasing dependence of organizations and individuals on internet for a number of reasons like efficient administration in the workplace. Cyber Pornography.Vidya . E-mail spoofing. 2Cyber torts against individual and society includes Cyber-harassment and Cyber-stalking. Intellectual Property Crimes and Internet time thefts. Cyber Defamation.REASONS FOR OCCURRENCE OF CYBER TORTS With the advent of Information technology and globalization. unauthorized control/access over computer systems. So the rapid growth and application of internet is changing the ways of lives and also providing techniques to the criminals to operate in a new way. The wide connectivity. 1The first recorded cyber crime took place in the year 1820 in which a loom was developed by Joseph-Marie Jacquard. an evil having its origin in the growing dependence on computers in modern life. speed and accuracy and most importantly the advantage of anonymity has given rise to new ways of infringement of individual rights over the cyber space which can be broadly termed as Cyber Torts. large scale use of internet has become commonplace due to timely availability of accurate. which allowed repetition of series of steps in weaving of special fabrics which resulted in discontent among the employees of the manufacturer because of the fear of loss of employment and they committed acts of sabotage to discourage the use of new technology. recreation and entertainment and also a source of information for awareness and education of both adults and children . advanced voice recorders.com/www. This affords to remove or derive information either through physical or virtual medium makes it much easier. By secretly implanted logic bomb. Easy to access-The problem encountered in guarding a computer system from unauthorized access is that there is every possibility of breach not due to human error but due to the complex technology. Negligence. Complexity of systems-The computers work on operating systems and these operating systems in turn are composed of millions of codes. 4 MODE AND MANNER OF COMMITTING CYBER TORT:1. It is therefore very probable that while protecting the computer system there might be any negligence. 5. However the framers of The Information Technology Act 2000 have no where used this term so to avoid any confusion.The computer has unique characteristic of storing data in a very small space. Loss of evidence. The reasons for the vulnerability of computers may be said to be: 1. key loggers that can steal access codes. retina imagers etc.org/pati/pati_cybercrimes_dec03.oup.This kind of offence is normally referred as hacking in the generic sense.htm . Unauthorized access to computer systems or networks/Hacking. 3 http://fds. which in turn provides a loop hole to gain access and control and in turn misuse the computer system. Further collection of data outside the territorial extent also paralyses this system of investigation.3 Hart in his work ‘The Concept of Law’ has said ‘human beings are vulnerable so rule of law is required to protect them’. that can fool biometric systems and bypass firewalls can be utilized to get past many a security system. These lucanas can be taken advantage of and computer security systems can be penetrated into. Human mind is fallible and it is not possible that there might not be a lapse at any stage.Negligence is very closely connected with human conduct.oup. Applying this to the cyberspace we may say that computers are vulnerable so rule of law is required to protect and safeguard them against cyber tort. 3.naavi. Capacity to store data in comparatively small space.Loss of evidence is a very common & obvious problem as all the data are routinely destroyed as they are updated every next moment.com/pdf/13/9780198259879. 4.pdf 4 http://www. 2. Theft of information contained in electronic form-This includes information stored in computer hard disks. Denial of Service attack. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.g.com/misc/cyber_crime.The computer of the victim is flooded with more requests than it can handle which cause it to crash. Virus/worm attacks.g.2. The Electricity Board faced similar problem of data diddling while the department was being 5.pdf 6 http://dict. 6. removable storage media. 5 http://www. E. Distributed Denial of Service (DDoS) attack is also a type of denial of service attack. either by altering or deleting it. Theft may be either by appropriating or rather misappropriating the data physically or by 3. Yahoo. Data diddling.mizoram. E. The losses were accounted to be $ 10 million. in which the offenders are wide in number and widespread.This kind of activity refers to sending large numbers of mail to the victim. They usually affect the data on a computer. The world's most famous worm was the Internet worm let loose on the Internet by Robert Morris sometime in 1988 which almost brought the development of Internet to a complete halt.gerardsylvester. Worms. love bug virus.This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. 5 Email bombing.g.This kind of an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed. unlike viruses do not need the host to attach themselves to. Amazon. 4. which affected at least 5 % of the computers of the globe. flash memory devices etc. magnetic disks. tampering them through the virtual medium.in/uploads/attachments/cyber_crime/Evolution_of_Cyber_Crime. 7.Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. which deducted 10 cents from every account and deposited it in a particular account. The Ziegler case wherein a logic bomb was introduced in the bank’s system. 6 Salami attacks.pdf .gov. E. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory. computerized. which may be an individual or a company or even mail servers there by ultimately resulting into crashing. 9. which passively gains control over another’s system by representing itself as an authorized programme.pdf . E. This is done by gaining access to the login ID and the password. Colonel Bajwa’s Case. 7 http://www.g. However this case made the police infamous as to their lack of understanding of the nature of cyber tort. This was perhaps one of the first reported cases related to cyber crime in India.8. Internet time thefts. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs.g. The most common form of installing a Trojan is through e-mail. Trojan attacks. The cyber criminal through the web cam installed in the computer obtained her nude photographs. while chatting.the Internet hours were used up by any other person. E.g. He further harassed this lady.S.This term have its origin in the word ‘Trojan horse’. 7 Logic bombs. E.Normally in these kinds of thefts the Internet surfing hours of the victim are used up by another person. a Trojan was installed in the computer of a lady film director in the U.gtslearning. 10.com/professor_messer/g633eng-logicbombs. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus). In software field this means an unauthorized programme.These are event dependent programs. in/uploads/files/cyber-pornography-it-act. forgery. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act. or listener. repulsive”. Pornography on the Internet is available in different formats. The Supreme Court has defined obscene as “offensive to modesty or decency. such as email spoofing and cyber defamation. let us satisfactorily define "cyber torts" and differentiate it from "conventional torts". Defining cyber crimes. filthy. as "acts that are punishable by the Information Technology Act" would be unsuitable as the Indian Penal Code also covers many cyber crimes. lewd.mizoram. see live sex acts. it has been held that a law against obscenity is constitutional. shall be punished on first conviction with imprisonment of either description for a term which may extend to three years and with fine 8 http://www. These range from pictures and short animated movies.police. to read.gov. all of which are subject to the Indian Penal Code. viewer. A simple yet sturdy definition of cyber crime would be "unlawful acts wherein the computer is either a tool or a target or both". Section 67 of the Information Technology Act. fraud. 8 CYBER PORNOGRAPHY A generic term that can refer to materials that are either "legal" or "illegal" to disseminate under the circumstances.pdf . The Internet also makes it possible to discuss sex. having regard to all relevant circumstances. "Pornography" encompasses all sexually oriented material intended primarily to arouse the reader. defamation and mischief. 2000 deals with this act and penalizes cyber pornography. Some examples are. any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely. such as theft. sending threatening emails etc. see or hear the matter contained or embodied in it. to sound files and stories. Section 67 reads as under:Whoever publishes or transmits or causes to be published or transmitted in the electronic form. Although the Indian Constitution guarantees the fundamental right of freedom of speech and expression. 166 Computer crime can involve criminal activities that are traditional in nature. and arrange sexual activities from computer screens.TYPES OF CYBER TORTS At the onset. 2000. there is no real way to prevent spoofing from occurring. 10 Cyber stalking involves following a person's movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim. health or accident insurance. Gambling does not include bona fide business transactions valid under the law of contracts.cyber-rights.tcu.org/documents/stalking_article. entering the chat-rooms frequented by the victim. it is recommended to delete the email message or use an antivirus program to scan the message before opening it.pdf 10 http://www.edu/files/Email_Spoofing. constantly bombarding the victim with emails etc. Spoofing can be used legitimately. such as the purchase or sale at a future date of securities or commodities. CYBER STALKING The Oxford dictionary defines stalking as "pursuing stealthily". 9 EMAIL SPOOFING E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.which may extend to five lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to five years and also with fine which may extend to ten lakh rupees. This is usually done for malicious reasons.pdf . Distributors of spam often use spoofing in an attempt to get recipients to open. and possibly even respond to. their solicitations. CYBER DEFAMATION It is an act of imputing any person with intent to lower the person in the estimation of the rightthinking members of society generally or to cause him to be shunned or avoided or to expose 9 https://security. either to distribute unsolicited email or to distribute email viruses. If you receive an email that has questionable content. Unfortunately. upon an agreement or understanding that he or someone else will receive something of value in the event of a certain outcome. ONLINE GAMBLING A person engages in gambling if he stakes or risks something of value upon the outcome of a contest of chance or a future contingent event not under his control or influence. contracts of indemnity or guaranty and life. The Hyderabad Court has in a land mark judgement has convicted three people and sentenced them to six months imprisonment and fine of 50. hate websites and hate emails. which has domestic as well as international consequences. However there is a compelling need to distinguish between both these acts. copyright infringement. 2009 Edition . theft of computer source code. CYBER TERRORISM AGAINST THE GOVERNMENT ORGANIZATION At this juncture a necessity may be felt that what is the need to distinguish between cyber 12 terrorism and cyber torts. UNAUTHORIZED CONTROL/ACCESS OVER COMPUTER SYSTEM This activity is commonly referred to as hacking. which may have international consequences. contempt or ridicule.Sita Manikyam. Both are dangerous acts. etc. The common form of IPR violation may be said to be software piracy. the LTTE. E. The Indian law has however given a different connotation to the term hacking.Sita Manikyam. and 11 Cyber Crimes-Dr. Any unlawful act by which the owner is 11 deprived completely or partially of his rights is an offence.g. Cyber defamation is not different from conventional defamation except the involvement of a virtual medium. attacks on sensitive computer networks. The recent example may be cited of Osama Bin Laden. etc. K. the mail account of Rohit was hacked and some mails were sent from his account to some of his batch mates regarding his affair with a girl with intent to defame him. trademark and service mark violation. so we will not use the term "unauthorized access" interchangeably with the term "hacking" to prevent confusion as the term used in the Act of 2000 is much wider than hacking. Mrs. A cyber tort is generally a domestic issue. The common form of these terrorist attacks on the Internet is by distributed denial of service attacks. however cyber terrorism is a global concern. INTELLECTUAL PROPERTY CRIMES / DISTRIBUTION OF PIRATED SOFTWARE Intellectual property consists of a bundle of rights. Mrs. Technology savvy terrorists are using 512-bit encryption. which is next to impossible to decrypt. 2009 Edition 12 Cyber Crimes-Dr.him to hatred. K.000 each for unauthorized copying and sell of pirated software. in cyber space. with the intention to further social. These forms of trafficking are going unchecked because they are carried on under pseudonyms.000. they had replaced the word 'goldfish' with the word 'piranhas'.pdf . did not take the threat seriously. 13Cyber terrorism may be defined as to be the premeditated use of disruptive activities. Subsequently. A racket was busted in Chennai where drugs were being sold under the pseudonym of honey. or the threat thereof. The owner. It may assume different forms. It was three days later that she came to know. In all the places where it had been mentioned. religious. Azim was asked to furnish a personal bond of Rs 20. following many telephone calls from all over the country. or to intimidate any person in furtherance of such objectives. Metropolitan magistrate Gulshan Kumar convicted Azim for cheating under IPC. of fraudulently gaining the details of Campa's credit card and bought a television and a cordless phone from Sony website. that the hackers had web jacked her website. WEB JACKING This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). Instead. It may be trafficking in drugs.nato. The actual owner of the website does not have any more control over what appears on that website In a recent incident reported in the USA the owner of a hobby website for children received an e-mail informing her that a group of hackers had gained control over her website. human beings. Recently the Court of Metropolitan Magistrate Delhi (17) found guilty a 24-year-old engineer working in a call centre. Some of the cases of online fraud and cheating that have come to light are those pertaining to credit card crimes.attack on America’s army deployment system during Iraq war. Piranhas are tiny but 13 http://www. She felt that it was just a scare tactic and ignored the e-mail. but did not send him to jail. FRAUD & CHEATING Online fraud and cheating is one of the most lucrative businesses that are growing today in the cyber space. etc. contractual crimes. arms weapons etc. TRAFFICKING Trafficking may assume different forms. and was released on a year's probation. they had altered a portion of the website which was entitled 'How to have fun with goldfish'. political or similar objectives. ideological. They demanded a ransom of 1 million dollars from her. a schoolteacher.int/structur/library/bibref/cyberterrorism. offering jobs. either by altering or deleting it. and were very seriously injured! VIRUS / WORM ATTACKS Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network.extremely dangerous flesh-eating fish. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory. tried to play with piranhas. unlike viruses do not need the host to attach themselves to. Worms. They usually affect the data on a computer. These unfortunate children followed the instructions. . which they bought from pet shops. Many children had visited the popular website and had believed what the contents of the website suggested. internet and software in the country as well as to provide a legal framework for the promotion of e-commerce and etransactions in the country. Section 65-Tampering with computer source documents-Whoever knowingly or intentionally conceals.)-If any person who is required under the Act or any rules or regulations made there-under to – (a)furnish any document. etc. return. he shall be liable to a penalty not exceeding five thousand rupees for every day during which such failure continues. destroys or alters or intentionally or knowingly causes another to conceal.f 17th 14 October.net/Information-technology-act-of-india. for the contravention of which no penalty has been separately provided.gov. or 14 http://www.e. he shall be liable to a penalty not exceeding ten thousand rupees for every day during which the failure continues. books or other documents within the time specified therefore in the regulations fails to file return or furnish the same within the time specified therefore in the regulations.REMEDIES AVAILABLE IN CYBER TORTS The Information Technology Act was enacted in the year 2000 and implemented w. 2000 to give a fillip to the growth and usage of computers. shall be liable to pay a compensation not exceeding twenty-five thousand rupees" to the person affected by such contravention or a penalty not exceeding twenty-five thousand rupees. he shall be liable to a penalty not exceeding one lack and fifty thousand rupees for each such failure.html 15 http://deity.(b) file any return or furnish any information. Section 44-(Penalty for failure to furnish information. 2000 which consist of 94 Sections in 13 Chapters and with Four Schedules provides for a legal framework for evidentiary value of electronic record and computer crimes which are of technological nature.cyberlawsindia. Section 45-(Residuary penalty) further covers all other offences that may possibly arise under the act. It provides that "whoever contravenes any rules or regulations made under the Act.(c) Maintain books of account or records fail to maintain the same.in/content/view-it-act-2000 . 15The Information Technology Act. return or report to the Controller or the Certifying Authority fails to furnish the same. destroy. computer programme. . or with fine which may extend up to two lack rupees. shall be punishable with imprisonment up to three years. It further states that whoever commits hacking shall be punished with imprisonment up to three years. or with both. when the computer source code is required to be kept or maintained by law for the time being in force. or with fine which may extend up to two lack rupees Section 66-(Computer related offences)-This Section deals with hacking the Computer System and states that whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means. computer system or computer network. commits hacking.alter any computer source code used for a computer. There is no doubt that such law is absolutely necessary in the country today. It is not possible to eliminate cyber crime or either cyber torts from the cyber space. 2000 is a great step forward and it is the right initiative at the right time. It is perhaps only in hindsight. The medium that the act seeks to regulate and facilitate has so profound an impact on human life that it is beyond the comprehension of contemporary visionaries. Though cyber space is global phenomenon that cannot be easily tackled but the Information Technology Act. Undoubtedly the Act is a historical step in the cyber world. The law has not. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. It could not therefore have been allowed to run lawlessly without any system of checks and without clearly defined rights and liabilities and forums in which to enforce them effectively. . It is quite possible to check them. We would conclude with a word of caution for the pro-legislation school that it should be kept in mind that the provisions of the cyber law are not made so stringent that it may retard the growth of the industry and prove to be counter-productive and at the same time a vigil check should be kept on its misappropriation and further consequences. several years later that the extent and scale of the impact could be gauged.CONCLUSION Capacity of human mind is unfathomable. therefore. come a moment too soon and it is sincerely hoped that the act would pave way for proper legal control regime at national level. The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to keep a check. 8:00pm IST) 7. Mrs. 3. https://security.pdf (assessed on 12/10/13.cyberessays.8:00pm IST) 6.Ul77lJDPLWA (assessed on 12/10/13. http://www. 5.8:30pm IST) 10.Sita Manikyam.cyberlawsindia.8:50pm IST) 11. http://delhidistrictcourts.8:20pm IST) 9.com/articles/Cyber-Crimes-and-Torts 3412. http://www.tcu.org/documents/stalking_article. http://searchsecurity. K.pdf (assessed on 12/10/13.techtarget.net/Information-technology-act-of-india. 2.html (assessed 12/10/13. 2009 Edition www.pdf (assessed on 12/10/13.com/professor_messer/g633eng-logicbombs.cyber-rights.com/lists/cyber-torts/-(assessed on 09/10/13.edu/files/Email_Spoofing.gtslearning.pdf (assessed on 12/10/13.asp#.com/definition/cyberstalking (assessed on 12/10/13.in/CYBER%20LAW.BIBLIOGRAPHY 1.8:55pm IST) on .10:00pm IST) http://www.nic.8:10pm IST) 8. Handbook Of Cyber Laws-Macmillan-Vakul Sharma Cybercrimes And Law (An Overview)-C. 4.Vidya Cyber Crimes-Dr. http://www.lawyersclubindia.