Information Technology and Cyber Lawyers in Dehradun

Home » Dehradun » Information Technology and Cyber Lawyers in Dehradun


  • IT-and-Cyber-Lawyers-in-Dehradun

    Region of Practice

    • High Court for the State of Uttarakhand, Nainital
    • District and Sessions Judge, Dehradun
    • Criminal Courts, Dehradun

    Legal Advice & Consultation

    • Strictly by appointment.
    • For appointment reservation, call +91-7710777770, or fill the form given below.
    • Available methods:
      1. In-person 2. Email 3. Telephonic
    • Consultation Charges: INR 800/-

    Lawyers with over 38 years of standing and thousands of rightly resolved matters. START CONSULTING:

    Cyber Law Advocates in Dehradun

    The Indian Government upholds cybersecurity through Information Technology Act, 2000. The Act prevents, controls and punishes cyber misconducts. Cybercrimes are basically unlawful acts performed by using or targeting a computer technology and therefore come under the ambit of Cyber Law. With the emergence of e-banking, e-commerce, and e-governance, such crimes are on an upsurge. In the wake of this, it was rather a necessity to encompass the world of technology with a specific law. Today, every unlawful activity such as fraud, harassing, defaming, spoofing, stalking, pornography, gambling etc. come under the ambit of cybercrime. Our expert cyber law advocates in Dehradun adopt a tactical approach while dealing in cybercrime cases.

    Collaboration Of Cyber Lawyers + Cyber Forensics:

    B&B Associates LLP is the only law firm in Dehradun which has an active collaboration with private cyber forensics. This collaboration effectively helps our cyber lawyers in matters of evidence determination. Besides, our forensic partners are renowned for having worked on some of the most crucial cybercrime cases, as well as other cases of national significance.

    Nature Of Cybercrime Matters Taken Up By Our Cyber Lawyers:

    The law firm takes up matters of cybercrimes against person, personal property, government, against the society at large, and against international subjects.

    Firm’s Cyber Law Advocates in Dehradun offer expert consulting and representation in various cyber crimes such as:

    • 1. Hacking

      Hacking is a remote intrusion caused by accessing a computer system without the permission of its owner. Hackers is the term denoted to people who conduct hacking. Hackers, generally, are computer programmers with an advanced understanding of computers, and a melafide intent of using their knowledge. Hackers, sometimes, even have the capability of remaining highly disguised and thoroughly untraceable. Hackers can also have a developed skill set in a particular program or language. Hackers may have varied motives behind their attack. The most common emerge out of the three common human yearnings of greed, fame, and power. While some hackers hack for the fun of it, some do it to demonstrate their expertise and earn reward in the hacking underworld (yes it exists). A hacking attempt by a hacker who only wishes to demonstrate his superiority or domain expertise by casting his trick, may not even cause any actual damage to his subject, nevertheless, it is counted as an illegal act of breach and is a punishable offense.Besides, hackers pose a serious threat of damage to the intellectual property of the subject by modifying software and programs. On an extreme end, hacking can cause damage to property and lives by taking control of hardware devices and carrying out destruction and terrorist activities (as seen in sci-fi movies).

      Types of Hackers:

      a. Crackers:

      Negative tendencies such as lust and voyeuristic intent can also play as motivator behind hacking, besides, some hackers hack for the purpose of causing annoyance and satisfying their whim by being destructive. Such hackers are generally referred to as “Crackers”.

      b. Black Hats

      The “Black Hats” hack systems and programs purely out of an intellectual curiosity. These black hat hackers are hired by an IT companies to find errors/ lapse/ flaw/ vulnerability in programs and security systems and develop methods of making them more secure. When hired for an ethical purpose, these “black hat” hackers are referred to as “White Hat” hackers.

      c. White hats:

      You saw it coming didn’t you? Ironically, these hackers legally hack to prevent the abuse of a computer system ‘by an unauthorized/ wrong person’. Their work essentially is to find the vulnerability and breach into a computer program/ systems. However, the purpose of a white hat hacker does not always remain altruistic. At times, white hat hackers turn back to being back hat hackers for garnering further fame or to land even better paying jobs with top IT companies. While at other times, the white hats turn black to quench a fetish of being termed as “security experts”.

      “Grey Hat” hacking:

      Interestingly, as always, here too is a zone between the black and the white called the “Grey Hat” hacking. For example, hacking done for a client under an assignment of which the scope is ambiguous. Or, any hacking done with an intent of causing a benefit.

      A few computer geniuses who once use to be hackers:

      • The creators of UNIX operating system – Dennis Ritchie & Ken Thompson.
      • Developer of Napster – T. Shawn Fanning.
      • Founder of Facebook – Mark Zuckerberg.

      We do not promote hacking or idealize it. As cyber lawyers, however, we cannot rule out the chances of hacking committed by an impersonator. It is our job to make a distinction between various sorts of hacking, and ensure that an innocent person or an accused is not wrongfully tried. Besides, we ensure that the due process of law is adopted.

      Type of Hacking:

      a. SQL Injections: A breach in an unprotected SQL Database. Hackers track down the vulnerabilities in a website’s software program and inject SQL hacking code in web-entry fields such as username and password fields. The SQL hack is an additional command which manipulates the contents of the database to enable a successful login. By this method, a hacker can take control of the backend as well as user accounts and cause serious harm by stealing and misusing valuable propriety, business, and financial information.

      b. FTP Password theft: Another way of tampering with the websites, this method plays on the vulnerability of webmasters who store confidential login information on poorly protected computers. The hacker pulls FTP login details and relays it to a remote computer to log into a website to pose threat and cause damage.

      c. Cross-Site Scripting: Formerly known as CSS but to avoid confusing with “Cascading Style Sheets”, Cross-Site Scripting was renamed as XSS. In absence of a firewall, it becomes easy for hackers to circumvent a security system. Hacker injects a malicious program or script onto a webpage and when a user visits the page, the script automatically gets downloaded and executed on the user’s system. To achieve this end, a hacker may use any script such as HTML, VBScript, Java, Flash, ActiveX etc.

    • 2. Virus dissemination
      A virus is a computer program which remains disguised by keeping attached to a file or system. It is programmed to disrupt computer operation and conduct undesired operations. It can be programme to circulate to other computers on a network and to adversely affect targeted data by modifying or deleting it. Popular forms of virus:
      a. Worm: Unlike viruses, worms don’t need a host. Their tendency is to replicate to cover up all the available system memory.b. Trojan horse: Borrowed from Homer’s Odyssey, the name has been rightly attributed to a kind of malware (malicious + software) which masquerades a regular file such as an email attachment from a believable source, and does not disseminate itself. A Trojan-horse can get downloaded along a program while surfing internet and accessing various games, sites, applications etc. Like other viruses, Trojan Horse can cause theft of information and damage in numerous ways.
    • 3. Logic bombs
      Also called “slag code”, a logic bomb is a malicious code inserted in a software and it behaves similar to virus. Stealthily inserted in a program, it is supposed to remain dormant until a specific command or a particular time/ event triggers it. A user may have no clue as to when it will get triggered and what it will do. Logic bombs are usually deployed by disgruntled employees and is more of an insider job.
    • 4. Denial-of-Service attack
      An explicit denial of service to its intended users, a DoS attack is achieved by flooding a computer with series of requests to consume all bandwidth, overload and slow down or crash the server.
    • 5. Phishing
      A scheme of extracting confidential information such as financial details, username, password etc. Depending on the targeted audience, different schemes are plotted. At times a believable picture is shown to the end user, while at other times, a too-good-to-be-true deal can be plotted to exploit the vulnerability of a greedy user. As there is no end to how people can be fooled, new techniques of phishing evolve on daily basis. A common way of large scale phishing is bulk circulation of misleading information/ deals. This is mostly achieved through email and whatsapp medium.
    • 6. Email bombing and spamming
      The abuser sends meaningless emails in huge volume to crash the victim’s mail servers. Because mail bombing can be detected by spam filters, therefore, it is carried out using botnets, hacked computers and DDoS attack. The attackers use multiple source addresses and programmed bots to create unique messages which can bypass spam filters.Spamming is a form of email bombing in which unsolicited emails are indiscriminately sent to a large number of users. Spamming emails often attempt phishing or direct users to websites which host malware or contain infected files.
    • 7. Web jacking
      Like hijacking, the hacker takes an illegal control on a website and owner is left at the mercy of the attacker. There can be varied reasons behind web-jacking – asking for ransom, eliminating competition, eliminating evidence, creating nuisance, causing harassment or defamation, taking revenge, or for sadistic pleasure.
    • 8. Cyber Stalking
      A new form of cybercrime which deals with being virtually followed over the internet by a stalker who harvests information and poses threat, intimidation, and invasion in one’s online privacy. An aggravated form of Cyber stalking is accompanied by physical stalking. Women and children are a major victim group being stalked by predators and pedophiles. Novice users who are not aware of internet safety are at maximum risk. The abusers use various mediums to threaten, harass, or slander the victim, such as personal messaging, sending an email, making a publically visible online post etc.
      Computer Stalking:
      Stalkers with advanced computer skills gain unauthorized access of victim’s computer stealthily, and spy on their victim.
    • 9. Data diddling
      Basically, it is an unauthorized alteration of a computer data. In order to avoid getting tracked, the attackers often restore the data to the original form. Data diddling can be done by a programmer, or anyone involved in the process of creating/modifying/ handling that data, or even through a malware. Examples of data diddling include wrongfully editing financial entries and forging documents.
    • 10. Credit Card Fraud and Identity Theft (impersonation)
      Abusers steal the identity of a user to access and exploit resources in their name such as credit cards, bank accounts, subscriptions etc. Misuse of a pre-approved credit card is the simplest form of Identity Theft. Aggravated form includes credit card cloning and forging online financial accounts.
    • 11. Salami slicing attack
      Also referred to as a “salami fraud”, the cyber-criminals usurp only a negligible and non-noticeable amount of money per user. However, by targeting a huge user-group, they end up looting big. A classic salami slicing attack is pulled by a technique called ‘collect-the-roundoff’, wherein, calculations are rounded to the nearest number and the perpetrators debit the excess amount to a separate account, thereby, reflecting no loss to the system. Till the time the systems managers become aware of the malicious activity, the perpetrators end up embezzling a huge amount of money.
    • 12. Software Piracy
      Be it knowingly or unknowingly, at some point of time, most people have contributed to cyber piracy and cut the profits of the resource developers by illegal usage of the intellectual property or by its circulation in their circle. Such unauthorized usage bereft developers of the entitled profits and hamper sustainable application development. Software piracy adversely affects the global economy by obstructing economic circulation and reinvestment in further research, development and marketing.
      Common forms of software piracy:
      Software Cloning, using unlicensed software or single-licensed software on multiple systems, using a cracked version of a software or using a key generator to validate a copy. Torrent download and circulation.

    Apart from the above-mentioned cybercrimes, our qualified and experienced cybercrime lawyers in Dehradun have an expertise in dealing matters of cyber extortion, cyberbullying, child pornography, revenge-porn, libel, and defamation, cyber fraud etc.


    Golden Rules

    • Things to do at B&B

    • Things NOT to do at B&B

    **We deject un-ethical and immoral practices, and reserve our rights of extending legal services only to a select clientele which exhibits civility, faith in law, sound moral footing, and good conscience. Our legal counsels defend the ones who have falsely been implicated, and prosecute for those who have actually been victimized – in either case, our counsels reserve their right of exercising discretion in accepting or rejecting a brief/ lawsuit.


    Public Dealing and Work Timings
    Mon – Fri: 10:00am to 6:00pm
    Saturday & Sunday: on prior and special request, depending on availability.
    Office Address
    A-14, Pinnacle Residency, Rajpur Road, Dehradun
    Get Directions

    Submit a Comment

    Your email address will not be published. Required fields are marked *

  • ‘Revenge Porn’ In India

    ‘Revenge Porn’ In India

    Overview: Technology has affected every sphere of our lives, and personal relationships aren’t untouched from it. With the increasing numb

    Read more
    PIL Cases of India which changed the Legal System

    PIL Cases of India which changed the Legal System

    Introduction Public Interest Litigation, as the name suggests, means litigation for the protection of the public interest. This kind of laws

    Read more
    Hacking

    Hacking

    Hacking is one of the types of cyber crimes in India. Cyber crimes basically are the unlawful acts that involve the use of a computer either

    Read more
    Article on E-commerce Laws in India

    Article on E-commerce Laws in India

    Overview The E-commerce sector in present days is witnessing an unprecedented rise, wherein the online buyers are no more limited to the you

    Read more
    Cyber and E-Commerce Crimes

    Cyber and E-Commerce Crimes

    Cybercrime is a broad term which is used to define a criminal activity in which computers or computer networks are either a tool or a target

    Read more
  • No Record Found
  • US Justice Department To File Landmark Antitrust Case Against Google

    US Justice Department To File Landmark Antitrust Case Against Google

    On Tuesday, the Justice Department sued Google for abusing its dominance in online search and advertising the government’s most significant attempt

    Read more
    Man Claims Wife’s Photo Being Circulated As Hathras Victim; Delhi HC Directs Centre To Look Into The Matter

    Man Claims Wife’s Photo Being Circulated As Hathras Victim; Delhi HC Directs Centre To Look Into The Matter

    In spite of the fact that social media is a great tool for information, it has been misused by people at large. One such incident came to light wherei

    Read more
    SC issues notices to Centre, Google, Amazon and FB in a plea seeking data protection on UPI platforms

    SC issues notices to Centre, Google, Amazon and FB in a plea seeking data protection on UPI platforms

    The Supreme Court on Thursday issued notice to the Centre, Google, Amazon, Facebook, and WhatsApp in a Public Interest Litigation seeking directions t

    Read more
    Over 80K Fake Social Media Accounts Created to Defame Mumbai Police, FIR Registered

    Over 80K Fake Social Media Accounts Created to Defame Mumbai Police, FIR Registered

    Following the death of Bollywood actor Sushant Singh Rajput, over 80,000 fake accounts were created on various social media platforms to discredit the

    Read more
    Facebook India Moved Supreme Court Seeking Withdrawal of Notices by Delhi Assembly Panel

    Facebook India Moved Supreme Court Seeking Withdrawal of Notices by Delhi Assembly Panel

    Facebook India’s VP and MD Ajit Mohan has moved Supreme Court against notices issued by Delhi Assembly Panel on September 10 and September 18. T

    Read more
    Digital Media Spreading “Venomous Hatred”, Regulate It First; Centre to SC

    Digital Media Spreading “Venomous Hatred”, Regulate It First; Centre to SC

    Centre government on Monday has submitted its response regarding reforming the guidelines for electronic and print media which states that digital med

    Read more
    Paytm App is Back on Google Play Store, Hours After It Was Removed

    Paytm App is Back on Google Play Store, Hours After It Was Removed

    One of India’s leading digital payments application, Paytm has accused Alphabet Inc.’s Google of violating the competition rules after it removed

    Read more
    Chhattisgarh Police Booked Facebook’s Ankhi Das and Two Others for Hurting Religious Sentiments, Inciting Communal Animosity

    Chhattisgarh Police Booked Facebook’s Ankhi Das and Two Others for Hurting Religious Sentiments, Inciting Communal Animosity

    A day after Ankhi Das, the public policy director of Facebook for India, South and Central Asia, filed a complaint over alleged online death threats,

    Read more
    Can Spectrum Be Sold by Telecos Undergoing IBC Proceedings? – SC Asks the Solicitor General

    Can Spectrum Be Sold by Telecos Undergoing IBC Proceedings? – SC Asks the Solicitor General

    On 10th August 2020, the Supreme Court has asked the Solicitor general, Tushar Mehta (representing the Department of Telecommunications (DoT)) of whet

    Read more
    Delhi High Court Accords Anticipatory Bail to DMC Chief Zafarul Islam Khan in Sediton Case

    Delhi High Court Accords Anticipatory Bail to DMC Chief Zafarul Islam Khan in Sediton Case

    Delhi High Court on Friday, has granted the anticipatory bail to the chairman of Delhi Minority Commission, Zafarul Islam Khan who was booked in May o

    Read more
    CBI Booked 18, Including 4 Navy Officials for Submitting Fake Bills Worth Rs 6.76 Crore

    CBI Booked 18, Including 4 Navy Officials for Submitting Fake Bills Worth Rs 6.76 Crore

    Central Bureau of Investigation (CBI) has booked four Navy officials of Western Naval Command and fourteen other accused of submitting forged continge

    Read more
    Australian Regulator ACCC Sues Google for Misleading Consumers Over Personal Data Use

    Australian Regulator ACCC Sues Google for Misleading Consumers Over Personal Data Use

    Court proceedings have been launched against Alphabet’s Google by the Australian Competition and Consumer Commission (ACCC) for misleading the c

    Read more
    Tamil Actress Vijayalakshmi Hospitalized After Suicide Attempt Over Alleged Harassment by a Politician

    Tamil Actress Vijayalakshmi Hospitalized After Suicide Attempt Over Alleged Harassment by a Politician

    Tamil actress Vijayalakshmi has been admitted to a Chennai hospital after she attempted suicide on Sunday. Before her suicide attempt, Vijayalakshmi p

    Read more
    Punjabi Singer Sidhu Moosewala Again Booked for Promoting Violence and Gun Culture in His Latest Song “Sanju”

    Punjabi Singer Sidhu Moosewala Again Booked for Promoting Violence and Gun Culture in His Latest Song “Sanju”

    Another case has been registered against the famous Punjabi singer Sidhu Moosewala for glorifying gun culture and violence in his latest trending song

    Read more
    Delhi High Court Directed Google, Facebook, Twitter to Delete the Defaming Posts Against Suspended IAS Officer

    Delhi High Court Directed Google, Facebook, Twitter to Delete the Defaming Posts Against Suspended IAS Officer

    Delhi High Court has issued notice to Google, Facebook, and Twitter to take down the objectionable and defaming posts against the suspended IAS office

    Read more
    Vadodara Police Detained Youtuber Shubham Mishra for “Open Rape Threats” to Stand-up Comedian Agrima Joshua

    Vadodara Police Detained Youtuber Shubham Mishra for “Open Rape Threats” to Stand-up Comedian Agrima Joshua

    After taking suo moto cognizance, Cyber Crime Cell of Vadodara police has detained Youtuber Shubham Mishra on Sunday evening, alleged of making “

    Read more
    Various complaints filed against the makers of web series ‘Paatal Lok’ alleging maligning, demeaning and derogating few communities

    Various complaints filed against the makers of web series ‘Paatal Lok’ alleging maligning, demeaning and derogating few communities

    ‘Paatal Lok’, a web series streaming on Amazon Prime Video, has been generating a lot of buzz online, with various complaints being registered aga

    Read more
    Plea in Supreme Court to Ban Zoom Application, Citing Privacy Breach

    Plea in Supreme Court to Ban Zoom Application, Citing Privacy Breach

    A PIL has been filed in the Supreme Court seeking a ban on usage of the software application ‘Zoom’ by the Indian public, raising security and pri

    Read more
    ‘Bois Locker Room’ Admin arrested by cyber crime cell of the Delhi Police

    ‘Bois Locker Room’ Admin arrested by cyber crime cell of the Delhi Police

    On Wednesday, the Cyber Crime cell of Delhi police arrested the admin of Bois Locker Room, the Instagram private chat group, where schoolboys planned

    Read more
    Suo-motu action against ‘Bois Locker Room’ – Delhi Commission for Women

    Suo-motu action against ‘Bois Locker Room’ – Delhi Commission for Women

    The Delhi Commission for Women on Monday took suo-moto cognizance of a group called ‘Bois Locker Room’, an Instagram chat group where objectionabl

    Read more
    ‘Sneeze in Open, Spread the Virus’; Infosys employee detained in Bengaluru for a Facebook post

    ‘Sneeze in Open, Spread the Virus’; Infosys employee detained in Bengaluru for a Facebook post

    On 27 March, an Infosys employee in Bengaluru has been arrested by the City Crime Branch for a shocking social media post, urging people to ‘go out

    Read more
    Mobile application to track home-quarantined persons

    Mobile application to track home-quarantined persons

    In an attempt to ensure home quarantine orders are strictly followed, preventing the spread of pandemic disease, the Gujarat government on Friday laun

    Read more
    Mobile internet and broadband services restored in parts of Jammu and Kashmir

    Mobile internet and broadband services restored in parts of Jammu and Kashmir

    On 14 January, the Jammu and Kashmir government declared the restoration of 2G mobile connectivity in five districts of the Jammu region. Further, bro

    Read more
    High Court Denies Social Media Linking with Aadhaar, Pan / Voter ID

    High Court Denies Social Media Linking with Aadhaar, Pan / Voter ID

    According to the source, the Delhi High Court on Monday denied linking of Social media accounts with Aadhaar, Pan/ Voter ID stating “it would lead t

    Read more