An account can be hacked in a variety of ways, including through an email account or a social networking site like Facebook or Twitter. The first and most frequent is when someone accidentally gives their password to someone else. This is typically one of the most popular ways that people exact revenge. Another common act of carelessness is failing to log off from public computers.
Phishing, Cookie Hijacking, and Key logging are more sophisticated hacking techniques. Phishing is the practice of giving personal information to a website that seems just like the real one, but is actually a phoney one designed to steal your identity while you are under the impression that the website is legitimate. Cookies utilising a person's computer's user data to obtain information about their internet accounts is known as "hijacking." Key logging is a more sophisticated form of hacking where the hacker can learn your passwords by seeing the keys you press on your computer with the use of specific software and hardware.
Block the Account:
It is the responsibility of the person who has had their social media account hacked to have the account blocked as soon as possible so that it cannot be used inappropriately. If a hacker has automatically signed into your Facebook account, there is no need to be concerned. They should immediately access the menu, choose settings, and respond to the security questions that were posed to them when they first created their account. The user will have access to the location of the hacker's login via the social media account. People can click End Activity to end the session if they notice that the person has not logged in from that location. Temporarily locking out the hacker, the user should update their password as soon as they can. The user should then go directly to the support page, select "I suspect my account was hacked or someone is using it without my permission," and then select "secure it." Your account will then be secured in the end.
Legal Action Against Hacker:
The Information Technology (IT) Act of 2000 does in fact offer legal recourse for suing a hacker. "Hacking with a computer system" is an offence that can be committed by "anyone with the purpose to cause or knowing that is likely to cause," which means that the offender must have means rea for the crime to be declared a crime. By altering any data without the individual's consent or understanding, the offence entails wrongfully producing misery and injury to all individuals generally or to a specific individual.
Unscrupulous methods must be used to secure account access, and the person must suffer severe harm as a result. According to subsection (2), the maximum penalty is three years in jail, a fine of up to two lakh rupees, or both. This shows that Indian courts take the crime of hacking seriously and that the punishment is nearly identical to that for robbery. The Act's Section 66C addresses the penalties for identifying theft in a similar manner. The use of an electronic signature or password dishonestly or inappropriately is punishable by up to three years in prison and a fine of one lakh rupees, according to this clause. The legal provisions shall be better understood by the Lawyers In Mumbai.
The majority of states have websites for their cybercrime units where you can submit a complaint along with the necessary paperwork. You can find the contact information for the appropriate cyber crime cell that is assigned to your jurisdiction by performing a quick Google search.
Additionally, anyone can go to the closest police station to address any of their complaints. If you are unable to understand the legal implications of hacking, you might contact the Lawyers In Jaipur.
Procedure to File Complaint:
There are numerous cyber cells in India, where a person can report cybercrime. A written application with the applicant's name, address, phone number, and email must be submitted to the director of the cyber cell department. Documents must be sent to the cyber cell leader. To get a better understanding of how to file a case in the cyber cell, you can consider contacting the Lawyers In Gurgaon. The following documents must be submitted:
Server logs - When a complaint form is submitted on the website, the server files and log files instantly open up a list of the necessary actions.
Soft and hard copies of corrupted data - The material of the tempered statement, which is submitted by the person against whom the cybercrime has been committed, is regarded to be a piece of substantial evidence.
A hard copy of the original page and the tarnished page must be sent in order to facilitate the cyber cell's work and make it easier to identify the tempered statement's supporting documentation.
It is crucial for the informant to provide all the information regarding the individual who used his or her password to access the account as well as the computer from which he or she logged in. To be able to regulate the process of cybercrime, it is crucial to reveal all the information.
A person whose account has been hacked may provide information on the person he believes to be responsible for the alleged offence, or hacking.
For the head of the cyber cell to simply conduct an investigation, it is crucial that the informant provide as much information and proof as possible.
Visit Us: - https://www.leadindia.law
Call Us: - +91-8800788535
Email: care@leadindia.law
Facebook: - https://www.facebook.com/leadindialaw
LinkedIn: - https://www.linkedin.com/company/76353439
Twitter: - https://twitter.com/leadindialaw
Pinterest: - https://in.pinterest.com/lawleadindia
Instagram: -https://www.instagram.com/leadindialawofficial
Comments