Hacking as a term was first coined in as late as the 1960s in the Massachusetts
Institute of Technology and the word has since then till date has undergone
massive evolutions into the disciplines that are abided by the computer
fraternity. [ii]
However, such intrusion with a person’s permission makes the entire process
legal. There are often specialists appointed in the computer field for hacking
their own computer networks in order to look for possible vulnerabilities and
weaknesses. Such precautions are taken to protect vital information and
credentials from such a person who intends to cause unwanted loss. [iv]
Thus, people who intrude into someone’s system without malicious intention and
with proper permission are referred to as Ethical hackers and the process they
have undertaken is what is referred to as Ethical Hacking.
Potential threats and data breaches and other vulnerabilities are identified
through bypassing system security by a cybersecurity engineer in Ethical
Hacking. It is a planned and legally approved process opposite to the hacking
which is conducted with ill-intent.[v] Ethical Hacking is carried to detect
various attacks and threats to the network which includes; Injection Attacks,
Breach of authentication protocols, Changes in security settings, remote access
attacks or even exposure of sensitive data.
The fact that ethical hacking is actually ethical rather say, is legal has
caught a lot of debates. Hacking, when the term was first coined, was not to be
done as a criminal activity. However, the same has gained a bad name over time.
Hacking thus can also be ethical and legal. Some forms of hacking do not
constitute criminal activity. Say, for example, any data or potential
information gathered during the first stage of hacking is not illegal for the
same can be used even for research purpose. Again, since ethical hacking is
authorized and is done with prior permissions, it is legal.[vi]
Cybercrime today has threatened the entire world with data breach, online frauds
and other security related issue. A vast array of legislation has been brought
to action to protect the rights of the netizens and their dealings over the
virtual space. Such laws are to be kept in mind by an ethical hacker in order to
enter into a system or network with bona fide intent.
In the era of Internet and Information Technology, when India adopted the
E-Commerce model law inspired by the United Nations Commission on International
Trade Law, the Information Technology Act came into effect in the year 2000. The
act came into force with the object to provide legality to electronic data
exchange and such other e-transactions (particularly E-Commerce). [vii]
S. 84 of the Information Technology Act, 2000 provides for the safeguard that is
given to the government or any other person appointed by the government to
undertake hacking activities in good faith. For such ethical hackers, it is a
must to abide by the said Act of 2000 and such other rules, regulations and
bylaws associated with the information Technology Laws.[viii]
Again if we look at S. 43 of the IT Act, 2000, we find that in case a person
tends to damage, modify, destroy or extract any information that can be harmful
if used in an ill-manner by entering into the computer or network of any person
without prior permission of such person would be liable to be penalised for any
damage caused. However, in case there is permission obtained, there lies no
liability. [ix] And s. 43 A of the same Act in case an ethical hacker or any
person having authorised access to vital information shall be penalized in case
he is not successful in protecting such data/information.[x]
The provision stated under S. 66 of the Information Technology Act, 2000
includes fraud and dishonest people indulging in acts mentioned as offences
above under the provision of S. 43 of the said Act to be punished with 3 years
of imprisonment.[xi]
The term Government Agency as under S. 70 A and B, in order to appoint cybersecurity experts for Critical Information Infrastructure Protection and
other cyber-terrorist attacks (as under S. 66 F) means and includes Army, CBI,
Ministry of Communication and Information Technology, Intelligence Bureau and
other law enforcement bodies.[xii]
In India, the Information Technology Law puts into question and penalizes people
hacking through a network or computer system without proper permission/authorisation.
However, the obvious flaw is that the law only provides safeguards ethical
hacking only if he is appointed by the government and not those others who have
authorised access to hacking but are not government-appointed [as mentioned
under S. 84]. [xiii]
With the growing use of internet in every walk of life and the resultant
increase in vulnerability of vital data of individuals stored virtually, it
becomes indispensable to also appoint and protect the ethical hackers working in
the private sphere to detect such vulnerabilities and in turn protect against
cyber attacks and cyber-terrorism.
Conclusion
To conclude with, we looked into what is hacking, types of hacking as well as
hackers, basics of Ethical Hacking and laws associated with Ethical Hacking.
There are major drawbacks faced by the legislations in India with regard to
Hacking. The Indian Penal Code fails to describe the intentions of a hacker.
Again, the Criminal Procedural Code in India lacks appropriate provisions for
investigation by a police officer in aid with ethical hackers, in order to gain
e-evidences intruding into delicate data/information. Proper comprehensive laws
are to be framed and enforces in this regard. Also, to a certain extent, the
white hat hackers are often confused with the black hats, which should be
avoided and the former must be given adequate, appropriate identity.
End-Notes:
How To File For Mutual Divorce In Delhi Mutual Consent Divorce is the Simplest Way to Obtain a D...
It is hoped that the Prohibition of Child Marriage (Amendment) Bill, 2021, which intends to inc...
One may very easily get absorbed in the lives of others as one scrolls through a Facebook news ...
The Inherent power under Section 482 in The Code Of Criminal Procedure, 1973 (37th Chapter of t...
The Uniform Civil Code (UCC) is a concept that proposes the unification of personal laws across...
Artificial intelligence (AI) is revolutionizing various sectors of the economy, and the legal i...
Please Drop Your Comments