Cybersecurity Laws in India and Beyond: A Comparative Legal Perspective
Authors/Creators
- 1. Assistant Professor, KL College of Law, Koneru Lakshmaiah Education Foundation, Vaddeswaram (Andhra Pradesh), India.
Contributors
Contact person:
Researcher (2):
- 1. Associate Professor, Department of Law, Sri Padmavati Mahila Visvavidyalayam, Tirupathi (Andhra Pradesh), India.
- 2. Associate Professor, Damodaram Sanjivayya National Law University, Visakhapatnam (Andhra Pradesh), India.
- 3. Assistant Professor, KL College of Law, Koneru Lakshmaiah Education Foundation, Vaddeswaram (Andhra Pradesh), India.
Description
In an increasingly Digitalized world, cybersecurity has emerged as a crucial pillar of national security, economic stability, and individual privacy. With the rise in cyber threats, including data breaches, ransomware attacks, and state-sponsored cyber warfare, governments worldwide have enacted comprehensive cybersecurity laws to safeguard essential systems, businesses, and individuals. The comparative analysis of cybersecurity laws in India and other major jurisdictions, such as the United States, the European Union, and China, to assess their effectiveness, enforcement mechanisms, and adaptability to emerging threats. India’s cybersecurity legal framework is primarily governed by “The Information Technology Act, 2000, alongside the recently implemented “Digital Personal Data Protection Act, 2023”. It examines the scope and limitations of these laws, particularly in addressing modern cyber risks and ensuring compliance with global standards. Comparatively, the paper delves into the cybersecurity policies of the United States, including the Cybersecurity Information Sharing Act and Executive Orders on critical infrastructure protection; “The European Union’s GDPR” and the “Network and Information Systems” (NIS) Directive; and also mandates strict government control over cyber operations and data governance. The study concludes with recommendations for strengthening India’s cybersecurity legal framework by integrating global best practices, enhancing enforcement capabilities, and fostering international collaboration.
Files
B184312021025.pdf
Files
(514.8 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:12af5f7e1065689fcf747061622d776d
|
514.8 kB | Preview Download |
Additional details
Identifiers
- EISSN
- 2394-0913
- DOI
- 10.35940/ijmh.B1843.12021025
Dates
- Accepted
-
2025-10-15Manuscript received on 21 September 2025 | First Revised Manuscript received on 28 September 2025 | Second Revised Manuscript received on 09 October 2025 | Manuscript Accepted on 15 October 2025 | Manuscript published on 30 October 2025
References
- Ali, A., Shah, M., Foster, M., & Alraja, M. N. (2025). Cybercrime Resilience in the Era of Advanced Technologies: Evidence from the Financial Sector of a Developing Country. Computers, 14(2), 38. DOI: https://doi.org/10.3390/computers14020038
- Exposing the Impact of GenAI for Cybercrime: An Investigation into the Dark Side. Truong, Luu, Binny M. Samuel. (2025). arXiv preprint. https://arxiv.org/abs/2505.23733
- Cryptologic Techniques and Associated Risks in Public and Private Security: An Italian and European Union Perspective with an Overview of the Current Legal Framework. Zana Kudriasova. (2025). arXiv preprint. https://arxiv.org/abs/2505.08650
- AllahRakha, N. (2024). Cybercrime and the Legal and Ethical Challenges of Emerging Technologies. International Journal of Law and Policy, 2(5), 28–36. DOI: https://doi.org/10.59022/ijlp.191
- Transformation of Crimes (Cybercrimes) in the Digital Age. AllahRakha, N. (2024). International Journal of Law and Policy, 2(2). DOI: https://doi.org/10.59022/ijlp.156
- Some New Challenges of Cybercrime and the Reason for Its Outdated Regulations. Anri Nishnianidze. (2023). European Scientific Journal, 19(39), 92. DOI: https://doi.org/10.19044/esj.2023.v19n39p92
- United States Congress. (2015). Cybersecurity Information Sharing Act (CISA), 2015. Public Law 114-113. https://www.congress.gov
- European Parliament and Council. (2016). General Data Protection Regulation (GDPR), Regulation (EU) 2016/679. Official Journal of the European Union, L119, 1–88. https://eur-lex.europa.eu
- European Parliament and Council. (2016). Directive (EU) 2016/1148 on Security of Network and Information Systems (NIS Directive). Official Journal of the European Union, L194, 1–30. https://eur-lex.europa.eu
- United Kingdom Parliament. (2018). Data Protection Act, 2018. c.12. https://www.legislation.gov.uk/ukpga/2018/12
- United Kingdom Parliament. (2018). Network and Informatics Data Action Systems Regulations, 2018. SI 2018/506. https://www.legislation.gov.uk/uksi/2018/506
- Federal Bureau of Investigation (FBI). (2022). Internet Crime Report 2022. Internet Crime Complaint Centre (IC3). https://www.ic3.gov