Cybersecurity Laws in India and Beyond: A Comparative Legal Perspective
Main Article Content
Abstract
In an increasingly Digitalized world, cybersecurity has emerged as a crucial pillar of national security, economic stability, and individual privacy. With the rise in cyber threats, including data breaches, ransomware attacks, and state-sponsored cyber warfare, governments worldwide have enacted comprehensive cybersecurity laws to safeguard essential systems, businesses, and individuals. The comparative analysis of cybersecurity laws in India and other major jurisdictions, such as the United States, the European Union, and China, to assess their effectiveness, enforcement mechanisms, and adaptability to emerging threats. India’s cybersecurity legal framework is primarily governed by “The Information Technology Act, 2000, alongside the recently implemented “Digital Personal Data Protection Act, 2023”. It examines the scope and limitations of these laws, particularly in addressing modern cyber risks and ensuring compliance with global standards. Comparatively, the paper delves into the cybersecurity policies of the United States, including the Cybersecurity Information Sharing Act and Executive Orders on critical infrastructure protection; “The European Union’s GDPR” and the “Network and Information Systems” (NIS) Directive; and also mandates strict government control over cyber operations and data governance. The study concludes with recommendations for strengthening India’s cybersecurity legal framework by integrating global best practices, enhancing enforcement capabilities, and fostering international collaboration.
Downloads
Article Details
Section
How to Cite
References
Ali, A., Shah, M., Foster, M., & Alraja, M. N. (2025). Cybercrime Resilience in the Era of Advanced Technologies: Evidence from the Financial Sector of a Developing Country. Computers, 14(2), 38. DOI: https://doi.org/10.3390/computers14020038
Exposing the Impact of GenAI for Cybercrime: An Investigation into the Dark Side. Truong, Luu, Binny M. Samuel. (2025). arXiv preprint. https://arxiv.org/abs/2505.23733
Cryptologic Techniques and Associated Risks in Public and Private Security: An Italian and European Union Perspective with an Overview of the Current Legal Framework. Zana Kudriasova. (2025). arXiv preprint. https://arxiv.org/abs/2505.08650
AllahRakha, N. (2024). Cybercrime and the Legal and Ethical Challenges of Emerging Technologies. International Journal of Law and Policy, 2(5), 28–36. DOI: https://doi.org/10.59022/ijlp.191
Transformation of Crimes (Cybercrimes) in the Digital Age. AllahRakha, N. (2024). International Journal of Law and Policy, 2(2).
DOI: https://doi.org/10.59022/ijlp.156
Some New Challenges of Cybercrime and the Reason for Its Outdated Regulations. Anri Nishnianidze. (2023). European Scientific Journal, 19(39), 92. DOI: https://doi.org/10.19044/esj.2023.v19n39p92
United States Congress. (2015). Cybersecurity Information Sharing Act (CISA), 2015. Public Law 114-113. https://www.congress.gov
European Parliament and Council. (2016). General Data Protection Regulation (GDPR), Regulation (EU) 2016/679. Official Journal of the European Union, L119, 1–88. https://eur-lex.europa.eu
European Parliament and Council. (2016). Directive (EU) 2016/1148 on Security of Network and Information Systems (NIS Directive). Official Journal of the European Union, L194, 1–30. https://eur-lex.europa.eu
United Kingdom Parliament. (2018). Data Protection Act, 2018. c.12. https://www.legislation.gov.uk/ukpga/2018/12
United Kingdom Parliament. (2018). Network and Informatics Data Action Systems Regulations, 2018. SI 2018/506. https://www.legislation.gov.uk/uksi/2018/506
Federal Bureau of Investigation (FBI). (2022). Internet Crime Report 2022. Internet Crime Complaint Centre (IC3). https://www.ic3.gov
 
							 
						 
            
         
             
            