Cyber Law

Cyber Law

One of our core areas of expertise, our practice involves every aspect of cyber law and covers the entire gamut of the field. Our cyber law practice involves:

Cyber crime law

We provide consultancy on cyber crime investigation, prosecution and defence.

The scope of our consultancy extends to providing expert opinions, drafting of complaints and analyzing existing evidence to come to a conclusion about the viability of litigation. We also advise on policy matters within an organization to minimize its cyber liability and to minimize risks of cyber crimes being committed by employees.

We conduct litigation as well as provide litigation support in cyber crime cases.

Electronic commerce, digital signatures and public key infrastructure (PKI)

Digital signatures, being specifically a form of signatures for which the Information Technology Act has laid down detailed guidelines and standards, it comes as no surprise that they are the preferred authentication mechanisms in electronic commerce transactions.

An application of public key cryptography, PKI is a very important tool in planning and deploying information security measures. At Techjuris, we draft security policies relating to and advise on the implementation of digital signatures and PKI in organizations.

We also advise on the legal compliances that are an inevitable part of such implementations.

Data protection and privacy laws

In today’s electronic world, data protection has significant implications. Sensitive data which may be personal, financial, legal or medical is being routinely processed by computer systems and transmitted to or stored in different geographic locations.

Often, a compromise of such data has resulted in massive frauds, resulting in tremendous financial losses and causing major embarrassment to end customers, outsourcing firms, banks and credit card companies, among others.

Due to such incidents, data protection legislations in several jurisdictions around the world have incorporated stringent provisions providing for fines, imprisonment terms and compensation for not complying with data protection law.

In India, the Information Technology Act 2000, in its most recent avatar, provides for strict liabilities for organizations negligent in handling personal information. Our practice extends to giving advice and guidance to ensure compliance with current data protection laws and framing necessary policies where required, to minimize liability under such laws.

Digital Evidence

In today’s computerized world, evidence in electronic form assumes supreme importance since it is to be found in every field of law; be it corporate, financial, civil, criminal or family.

This is recognized by the significant amendments made to the Indian Evidence Act 1872 by the Information Technology Act 2000 for the admissibility of digital evidence.

Techjuris personnel have been dealing with all facets of digital evidence with more than twenty years of collective experience in all conceivable kinds of cases, from insider trading matters and tax evasion cases to forgery cases and divorce matters.

Whether it is inspecting digital evidence at the Securities and Exchange of India for major companies or analyzing evidence for law enforcement and tax authorities, we are equally at home when dealing with digital evidence.

With regards to digital evidence, our practice extends to:

  1. Inspection
  2. Discovery
  3. Acquisition
  4. Analysis
  5. Reporting
  6. Presentation; and
  7. Providing expert opinion

Cyber Compliance Audits

The Information Technology Act 2000 with its allied Rules and Regulations puts substantial liability on organizations for not complying with its compliance requirements. Compensation, penalties and imprisonment may result for non-compliance with the provisions of the Act. Examples of compliance requirements include:

  1. Taking adequate security measures to ensure cyber crimes are not committed by employees using organizational infrastructure or resources;
  2. Taking adequate measures for data protection and privacy while collecting, storing or handling sensitive personal data or information;
  3. Reporting cyber incidents to the CERT – IN if such incidents have occurred in an organization.

We organize workshops, conduct comprehensive audits, suggest and implement measures with regards to cyber law compliance for organizations.