top of page

Analysis Of Cyber Laws In India, USA And UAE





Aisha Saleem Khan, Jagran Lakecity University Bhopal (M.P)


INTRODUCTION


We are presently living in the era where we spend most of our time over the Internet starting from online shopping to online transactions. Internet is the source which helps to connect us with the rest of the world, by giving us access to the information. This set of information can be misuse to commit crimes in the cyberspace. Cyberspace is a virtual world inside the computer where all the data and information are stored and can be transfer to the other network with the help of Internet. Any crimes that take place in this cyberspace are called cybercrime.


Cybercrime consist of using of data in unauthorized form or any scam over the cyberspace with the help of Internet like E-mail fraud, lottery scam etc. Due to increase in such crimes over the Internet there was need for a regulation in order to punish the criminals and impose restriction, “CYBER LAW” was introduced which basically explain the penalties and offences committed in the cyberspace.

Cyber Law plays a vital role in building the new technology system around the world as most of the transactions nowadays are done through Internet which basically gives rise to the crimes in cyberspace using computers. In this article we will emphasis on the prevailing cyber laws in country India, United States of America and United Arab Emirates along with the analysis.


留言


Indian Journal of Law and Legal Research

Abbreviation: IJLLR

ISSN: 2582-8878

Website: www.ijllr.com

Accessibility: Open Access

License: Creative Commons 4.0

Submit Manuscript: Click here

Open Access Logo

Licensing:

​All research articles published in The Indian Journal of Law and Legal Research are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the IJLLR or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the IJLLR.

bottom of page