How to register a cyber crime complaint

How to register a cyber crime complaint

The meaning of cybercrime is entirely difficult to find in today's age, where internet is spreading like rapidly spreading fire and snowballing into a colossal torrential slide. In any case, the fundamental meaning of a cybercrime is any unlawful action that uses a computer as its essential methods for commission. The rate of digital wrongdoing in India is additionally on the ascent however the figures may caution you more. To handle the issue of digital wrongdoings, CIDs (Criminal Investigation Departments) of different urban communities opened up Cyber Crime Cells in various urban areas. The Information Technology Act of India states plainly that when a cybercrime has been carried out, it has a worldwide ward. What’s more, thus a protest can be recorded at any digital cell.

The steps which someone has to follow to file a cyber crime complaint.

STEP 1: Remember that you should give name, postage information and phone number alongside an application letter tending to the head of a cybercrime investigation cell when you go to file a complaint.

Similarly as with all police cases, the complainant should give the accompanying papers and documents at the time of filing the complaint. The legitimate documents are:
In case of hacking of servers:
1) Server Logs
2) A copy of  the defaced web page in soft copy as well as hard copy format, if victim’s website is defaced If data are compromised on  the victim’s server or computer or any other network equipment, soft copy of original data and soft copy of compromised data.
3) Access control mechanism details i.e. - Who had the access to the computer or email of the victim?
4) List of suspects if the victim is having any suspicion on anyone.
5) All relevant information leading to the answers to following questions.

  • What is compromised?
  • Who might have compromised the system?
  • When was the system compromised?
  • Why might have been the system compromised)
  • Where is the impact of the attack-identifying the target system from the network?
  • How many systems have been compromised by the attack)

In case of e-mail abuse, vulgar e-mail, etc. the following information should be provided:
1) The extended headers of offending e-mail and
2) The offending e-mail from



PLEASE NOTE

These articles are given unreservedly as general aides. While we do our best to ensure these aides are useful, we don't give any assurance that they are exact or proper to your circumstance, or assume any liability for any misfortune their utilization may cause you. Try not to depend on data given here without looking for experienced legitimate guidance first. If all else fails, please dependably counsel a lawyer and fill the query box or call us at +91-8521228202 or drop us a mail at consult@beingyourlawyer.com.