IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

LEGAL DEFICIENCIES IN REGULATING ARTIFICIAL INTELLIGENCE AND CYBERSECURITY UNDER THE INFORMATION TECHNOLOGY ACT, 2000: ADDRESSING PHISHING ESCALATION IN 2024-2025

AUTHORS:
Nirmit Singh Chaudhry
Mentor
Shambhavi Mishra
Affiliation
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

The inexorable integration of artificial intelligence (AI) with cybersecurity infractions has laid bare profound lacunae in the regulatory edifice enshrined under the Information Technology Act, 2000 (IT Act)[1]. This dissertation undertakes a doctrinal and empirical scrutiny of the legislative inadequacies in circumscribing AI-enabled cybersecurity menaces, with particular emphasis on the aggravated incidence of phishing contraventions during the period 2024-2025. Phishing, metamorphosed through AI instrumentalities such as deepfake artefacts, generative adversarial networks, and algorithmic social engineering, evinces a dissonance with the IT Act's antiquated provisions, inter alia Sections 43, 66, 66D, and the now-expunged Section 66A. Predicated upon CERT-In advisories and National Crime Records Bureau (NCRB)[2] compendia documenting a 150% augmentation in phishing cognizances from 2023 to 2025, the inquiry elucidates the paucity of AI-tailored nomenclatures, vicarious liability paradigms for AI progenitors, and compulsive ethical probity audits, thereby vitiating prosecutorial efficacy.


A cardinal infirmity resides in the IT Act's techno-agnostic conspectus, antecedent to contemporaneous AI architectures encompassing machine learning and vast parametric reservoirs. Section 43A, mandating "reasonable security practices" for sensitive personal data, proscribes perspicuity vis-à-vis AI-orchestrated phishing, exemplified by phoneme-cloned impostures or hyper-granular assaults leveraging exfiltrated sociometric intelligence. The 2024-2025 phishing efflorescence manifest in emblematic precedents like AI-abetted impostures upon UPSC supplicants and pecuniary institutions (vide RBI circulars) bespeaks adjudicative impediments: retarded CERT-In intimation pursuant to Section 70B, attenuated intermediary safe harbours under Section 79, and the absenation of preemptive AI peril valuations. Juxtaposed against supranational precedents, including the European Union's Artificial Intelligence Act, 2024[3] (classificatory high-risk impositions) and the NIST AI Risk Management Framework, India's retardance is accentuated, notwithstanding the Digital


Keywords
Article Metrics
Article Views
30
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

Chaudhry, N. S. (2026). Legal Deficiencies in Regulating Artificial Intelligence and Cybersecurity under the Information Technology Act, 2000: Addressing Phishing Escalation in 2024-2025. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.261

Chaudhry, Nirmit. "Legal Deficiencies in Regulating Artificial Intelligence and Cybersecurity under the Information Technology Act, 2000: Addressing Phishing Escalation in 2024-2025." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.261.

Chaudhry, Nirmit. "Legal Deficiencies in Regulating Artificial Intelligence and Cybersecurity under the Information Technology Act, 2000: Addressing Phishing Escalation in 2024-2025." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.261.

References
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
A Study on Total Productivity Maintenance Systems in Mahindra Logistics at Salem
string(15) "B.Siva Chandran" Chandran, B.
(2026)
DOI: 10.55041/ijsmt.v2i3.175
Online Resort Booking System
string(11) "ABHIJITH AR" AR, A.
(2026)
DOI: 10.55041/ijsmt.v2i3.146
Estimation of Hypertension and Associated Risk Factors in a Community-Based Medical Camp in Jaipur- A Cross-Sectional Study
string(15) "Dhananjay Singh" Singh, D.et al.
(2026)
DOI: 10.55041/ijsmt.v2i3.370
Scroll to Top