Obligations for Companies Requiring companies
implement security measures,
report breaches, and comply
with industry specific cyber
security standards.
6 Regulation of social media The scope of cyber laws extends
and content platforms to platforms that host user
generated content
Content moderation Rules requiring platforms to
moderate illegal or harmful
content, such as hate speech, fake
news, defamatory posts etc.
Intermediary (Platform) Laws determining when plat
Liability forms can be held liable for the
content posted by users
7 Digital payment and These laws govern the use of
banking systems electronic payment systems,
crypto currencies and digital
banking
Digital payment systems Regulations ensuring the
security and legal recognition of
electronic transactions.
Crypto currency regulation Laws controlling the use of
digital currencies like bitcoin,
ensuring legal compliance and
preventing their use in illegal
activities.
Cross border jurisdiction The global nature of the Internet
and enforcement creates challenges for juris
diction and enforcement
Cross border cyber crime This address issues when cyber
crimes span multiple countries.
International co-operation Frameworks like the Budapest
convention on cyber crimne
facilitate international colla
boration in combating cyber
offenses.
,Cyber Laws
Cyberspace is the virtual environment created by the
Internet and digital networks. This requires a unique set of
legal concepts to regulate activities, safeguard rights, and
address emerging challenges. Below are the key legal concepts
in cyberspace.
Jurisdiction in cyberspace
Jurisdiction refers to the authority of a legal body to make
legal actions. As Internet is borderless, cyber crime in one
country may affect users in another country. Jurisdiction
issues become complex when cyber crimes occur across
multiple countries. The parties involved may be located in
different countries. Each of these countries have its own
legal framework. Moreover, a country may claim jurisdiction
over cyber crimes that affect its citizens or interests, even if
those activities occurred outside its physical borders.
Cyber crime
Cyber crime include illegal activities done via the Internet
or digital networks. Cyber laws address these specific offenses,
which often require new legal frameworks or adaptations of
existing laws.
Intermediary Liability
Intermediary are online platforms like social media,
Internet service providers etc. The contents of these are
created and shared by users. In this case, it is crucial to
determine whether intermediary is liable for illegal content
like hate speech, copyright infringement etc done by users.
Many countries provide intermediary protection from liability,
, 12
Cvber Laws and Securit
uno
if they complv with rules like removing illegal content
safe harho
notification by affected parties. This is known as
protection.
Data Protection and Privacy
Data protection laws govern the collection, storage, and
processing of personal data in cyberspace, safeguarding
individuals' privacy rights. Any information that can identify
financial
an individual, such as names, email addresses,
records, etc. are considered as personnel data. Many data
protection laws require companies to obtain user consent
before collecting and using personal data. Right to be forgotten
is a legal right that allows individuals to request the deletion
of personal data, especially if it's no longer necessary for its
original purpose. Data breach notification is the legal
requirement that companies must inform users and
authorities if personal data is compromnised in a cyber attack.
Encryption
Encryption is the process of converting information into
code to prevent unauthorized access. Legal frameworks
governing encryption involve are
End-to-End encryption: This is a method where only
the communicating users can read the messages like
in messaging app WhatsApp.
Export controls on encryption: Some countries
impose restrictions on the export of strong encryption
technologies due to national security concerns.