Professional Documents
Culture Documents
IT Act (Cyber Context)
IT Act (Cyber Context)
IT Act (Cyber Context)
(CYBER CONTEXT)
COURSE WRITER
Ms. Vaishali Bhagwat Ms. Shivanjali Bhoite
EDITOR
Ms.
Acknowledgement
Every attempt has been made to trace the copyright holders of materials reproduced in this book. Should any
infringement have occurred, SCDL apologises for the same and will be pleased to make necessary corrections
in future editions of this book.
PREFACE
With the rise in the use of computer and internet technology, the business as well as our personal world
acquired a whole new dimension. Communication, calculations and transactions became possible at
a click of a button and we lost patience to tolerate even a delay of a mere few seconds. However, this
technology gave rise to a whole new breed of legal issues which could not be addressed by existing
laws. As we all know technology is always ahead of law and the same was in the case of computer
and internet technology. Admissibility of electronic records, digital evidence, digital signatures and
regulation of crimes involving computers required new rules to handle and the existing laws were
insufficient.
India in the year 2000 enacted the Information Technology Act which was based on the UNCITRAL
MODEL LAW OF E-COMMERCE to give legal recognition to electronic records, promote
e-commerce and e-governance, treat electronic records at par with paper based documents and
regulate cyber crimes.
Use of Computer and Internet technology has also raised questions about international jurisdiction
and choice of law. Intellectual Property in Cyberspace is also an area which has assumed a great
significance and importance as these intangible properties are valuable corporate assets which need
to be protected from unauthorised use and disclosure.
This book makes an effort to address all these topics in a simplified manner so as to make the readers
aware of all the existing issues and related laws, rules and regulations for better understanding and to
make your experience of using the computers and internet a safe one!
Vaishali Bhagwat
Ms. Shivanjali Bhoit
iii
ABOUT THE AUTHOR
Vaishali Bhagwat is an advocate and a graduate in Computer Science with about five years experience
in the field of software development and systems analysis while working with a leading software
development company based in Pune. She is a practising civil and a cyber lawyer with an experience
of about thirteen years. Her work includes civil and cyber crime litigation at the Trial Courts and
District Courts, Pune and High Court of Judicature at Mumbai. Presently she is handling some major
cyber crime cases in Pune.
Her work also focuses on drafting and vetting of Commercial Contracts, Service Regulations,
Employment Contracts, NDA, JV Agreements, Technology Transfer Contracts, Computer Use
Policies, Software Development Contracts, etc.
Vaishali is a visiting faculty at various leading Law Colleges in Pune including the Symbiosis Law
College. She is a regular resource person at conferences and workshops organized by Mahratta
Chamber of Commerce Industries and Agriculture (MCCIA), Institute of Advanced Legal Studies
(IALS), National Institute of Bank Management (NIBM), National Insurance Academy (NIA), State
Bank of India (SBI) and Cyber Crime Cell, Pune, CDAC, etc.
She was invited to speak at the
• Round Table Conferences organized by Sakal Papers Ltd. on IT Act 2000
• As Panel Expert in the event organized by KPMG and CSI on Computer Security
• Nasscom – Technology Law Forum, Pune on IT Act 2000
• Training Program for Judicial Officers of Pune, Kolhapur and Satara Districts on Cyber Law
• Nasscom and Pune Police Cyber Safety Week – for judicial officers
She is a member of various organizations like Rotary (Vice President 09-10), British Business Group,
Cop Tech Forum (Pune Police and NASSCOM initiative), Shelter Associates to name a few.
Swapnil Bangali was kind enough to incorporate the amendments to the IT Act, 2000 which became
effective from October 27th, 2009.
Ms. Shivanjali Bhoite has completed her B.Sc., D.B.M., LL.M., C.F. & M.J. with good marks. She is
UGC NET qualified in Law. She has participated in number of seminars and conferences.
iv
CONTENTS
vi
Unit No. TITLE Page No.
8 Constitutional Rights Vs. Cyber Crime 137-152
8.1 Right to Privacy and Art. 21 of the Constitution of India
8.2 Right to Privacy and Art. 19 (1) (a) and Art. 19 (2) of the
Constitution of India
8.3 Right to Privacy and Technological Invasion
8.4 Right to Privacy and Information Technology Act 2000
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
9 Intellectual Property in Cyberspace 153-168
9.1 Introduction to Intellectual Property
9.2 Copyright in Cyberspace
9.3 Trademark in Cyberspace
9.4 Patent in Cyberspace
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
10 Cyber Jurisprudence 169-182
10.1 Introduction to Jurisprudence
10.2 Cyber Jurisprudence
10.3 Some Landmark Cases
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
11 Cyber Laws International Perspective 183-198
11.1 What is Jurisdiction
11.2 Civil Jurisdiction
11.3 Criminal Jurisdiction
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
vii
Unit No. TITLE Page No.
12 Case Studies 199-205
12.1 Dow Jones & Company Inc vs. Gutnick Case
12.2 Groff vs. America Online, Inc. Case
12.3 Yahoo! Inc. vs. Akash Arora Case
Summary
Keywords
Self-Assessment Questions
References 206
viii
Introduction to Cyber Laws
UNIT
1
Structure:
1.1 What is Cyber Law
1.2 Uncitral Model Law
1.3 Information Technology Act, 2000 Object and Applicability
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- • State which other related laws underwent amendments and for what
purpose
----------------------
---------------------- Cyber law is therefore the law relating to computers, communications and
internet. It is also referred to as ICT law or Information and Communications
---------------------- Technology Law which covers Electronic Commerce, Electronic Governance,
Intellectual Property, Cyber Crimes, Telecommunications, Data Protection and
---------------------- Privacy, etc.
---------------------- The scope and ambit is very vast and covers each and every transaction
which involves the computer or the internet.
----------------------
Let us now look at each of these topics briefly to understand the scope of
---------------------- cyber laws.
----------------------
Check your Progress 1
----------------------
Fill in the blanks.
----------------------
1. The objectives of the Model Law were to facilitate the use of electronic
---------------------- commerce and to provide_________ to paper-based documentation
---------------------- and electronic documents.
2. The Model Law is a “________” that provides the outline and basic
---------------------- structure and concepts.
---------------------- 3) The Model law adopts a “_________approach”.
----------------------
---------------------- Activity 1
----------------------
Make a list of countries that have adopted UNCITRAL model law.
----------------------
----------------------
1.3 INFORMATION TECHNOLOGY ACT, 2000 OBJECT
---------------------- AND APPLICABILITY
---------------------- Object
---------------------- New communication systems and digital technology has brought about
a revolution in the manner in which we live and transact business. Businesses
---------------------- and Consumers are increasingly using computers to create, transmit and store
information in the electronic form instead of traditional paper documents.
----------------------
Information stored in electronic form has many advantages. It is cheaper, easier
---------------------- to store, retrieve and speedier to communicate. The development and growth
---------------------- ●● Any Contract for the sale or conveyance of immovable property or any
interest in such property.
---------------------- ●● Any such class of documents or transactions as may be notified by the
Central Government in the Official Gazette.
----------------------
----------------------
Activity 2
----------------------
---------------------- Observe the functioning of the Cyber Appellate Tribunal (CAT) and
report the type of cases.
----------------------
---------------------- Summary
---------------------- ●● he Information Technology Act, 2000 facilitates e-commerce, legal
T
recognition to electronic transactions, digital and electronic signatures.
----------------------
Information Technology Act, 2000 also deals with wrongs which are
---------------------- treated as contraventions and offences as well. The contraventions are
civil wrongs and remedy for which is compensation for the victim.
---------------------- Contraventions are less serious than offences. Offences are criminal
wrongs for which the remedy lies in the form of punitive action like
----------------------
imprisonment and fine. Because of the coming in to force of Information
---------------------- Technology Act, 2000 many changes, amendments were necessary in
the existing laws. Along with this new legislation, existing legislations
---------------------- such as Indian Penal Code, The Indian Evidence Act 1872, The Bankers
Book Evidence Act 1891, The Reserve Bank of India Act 1934 and the
----------------------
Negotiable Instruments Act 1881 also underwent some amendments to
---------------------- give full effect to the aforesaid objects. Due the amendments carried out
Keywords ----------------------
---------------------- ●● Information: As per sec 2(v) of the Information Technology Act 2000,
information includes data, message, text, images, sound, voice, codes,
---------------------- computer programmers, software and databases or micro film or computer
generated micro fiche.
----------------------
●● E-mail: It means messages sent, received or forwarded in a digital form
---------------------- via a computer based communication mechanism.
●● LAN: A Local Area network which is geographically a small network of
----------------------
computers and supporting components.
----------------------
----------------------
Self-Assessment Questions
---------------------- 1. Why is The Model Law of e-commerce called the framework law?
2. What are the primary objects of the IT Act, 2000?
---------------------- 3. Electronic record does not satisfy the conventional definition of ‘writing’
---------------------- and ‘original’. Elaborate with illustrations.
4. An electronic file stored in the floppy disk is not an original document
---------------------- under conventional legislation. True or False? Support your answer with
explanation.
----------------------
5. IT Act, 2000 was enacted to give legal recognition to e-commerce
---------------------- transactions. Discuss.
---------------------- 6. Explain in detail the nature and scope of cyber law.
7. Define computer and computer network.
---------------------- 8. Name two countries other than India that have an e-commerce legislation
---------------------- based on the UNCITRAL Model law.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
2
Structure:
2.1 Definition
2.2 Time and Place of Formation of Electronic Contracts
2.3 Legal Recognition to Electronic Records
2.4 Legal Recognition to Digital and Electronic Signatures
2.5 What is e-Governance
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
----------------------
2.1 DEFINITION
----------------------
The term ‘Electronic Commerce’ is generally used in relation with internet
----------------------
based commercial activities or commercial communications. For e.g. – Websites
---------------------- on which one can book movie tickets or do railway or airline reservation,
buy clothes, laptops, cell phones, etc. from auction sites and so on. However,
---------------------- the term is not limited to that but also includes electronic communication or
exchange of electronic data between commercial entities. The commercial data
----------------------
that is exchanged can be data relating to business such as stocks, financial data,
---------------------- customer information, etc. Such communications known as Electronic Data
Interchange or EDI has been in practice for more than 30 years.
----------------------
Electronic commerce eliminates or reduces paper work and is a fast,
---------------------- inexpensive and safe method to communicate and conclude transactions.
Electronic commerce is now a very popular and a convenient method
----------------------
of transacting business. It is popular is Business to Business commercial
---------------------- transactions (B2B Commerce) and also Business to Consumer commercial
transactions (B2C Commerce).
----------------------
Electronic Data Interchange (EDI)
---------------------- Definition
---------------------- For a successful and effective business, quick, easy and cost effective
method of exchange of information both within and outside the organization
---------------------- is very important and crucial. This information or documents can be Purchase
---------------------- Orders, Spreadsheets and other office documents, Engineering Drawings,
etc; that might be exchanged between business partners. This exchange is
---------------------- cumbersome if it is on paper. If this exchange is done electronically, this process
is called EDI or Electronic Data Interchange.
----------------------
Electronic communication between commercial entities over closed
---------------------- network is known as ‘EDI’ or Electronic Data Interchange. The parties agree on
Definition ----------------------
As opposed to EDI which is Electronic Data exchange or interchange ----------------------
over closed networks like file the virtual private networks (VPNs), people
increasingly are using the internet which is an open network for commercial ----------------------
transactions. Commercial transactions over the internet can be broadly
----------------------
classified as business to business (B2B) or business to consumer (B2C). Such
commercial transactions over the internet can be in respect of tangible products ----------------------
to be delivered offline, such as books, DVDs etc. or intangibles such as data or
information which can be delivered online or offline. Thus electronic commerce ----------------------
is a very wide term which includes in its scope all commercial transactions done
----------------------
wholly or partially over closed or open electronic networks.
However, a new medium always comes with some new challenges and ----------------------
the existing legislations were not enough to give legal validity for EDI and
----------------------
other e-commerce transactions. One of the objects of the IT Act 2000 was
to give legal recognition for transactions carried out by means of electronic ----------------------
communication which involve the use of alternatives to paper based methods of
communication and storage of information. ----------------------
---------------------- c. The acceptance of the offer must be communicated by the other party.
d. Conditions such as payment of money must flow between the parties and
----------------------
e. The parties must intend to be legally bound.
----------------------
The parties must also be aware of the terms of the contract they are
---------------------- entering into. Further a contract is formed when and where acceptance takes
place.
----------------------
Thus even when offer and acceptance is communicated electronically, it
---------------------- will amount to a valid contract without a need to amend the existing Contract
Act.
----------------------
The Act recognizes three parties in connection with an electronic record.
---------------------- The Originator is the person who sends, generates, stores or transmits the
---------------------- electronic message or causes it to be sent, generated or stored or transmitted to
any other person.
---------------------- The Addressee is the person who is intended to by the originator to receive
---------------------- the electronic message.
The “intermediary”, with respect to any particular electronic records,
---------------------- means any person who on behalf of another person receives, stores or transmits
---------------------- that record or provides any service with respect to that record and includes
telecom service providers, network service providers, internet service providers,
---------------------- web hosting service providers, search engines, online payment sites, online-
auction sites, online-market places and cyber cafes.
----------------------
In a contract, the time of contract formation or the time at which the
---------------------- offer is accepted is important as it decides the priority of claims. The place of
contract is equally important i.e. the place where acceptance takes place as it
----------------------
decides the law applicable and jurisdiction of courts in case of disputes.
---------------------- In a contract formed online, the mode of formation of the contract i.e. the
method of communicating the offer and the acceptance is different from the
----------------------
offline contract and therefore this aspect needs to be addressed a little differently.
18 IT Act (Cyber Context)
The rules regarding formation of contact can be broadly grouped into two Notes
categories:
----------------------
a. Mailbox rule or postal rule which is applicable when the means of
communication is non-instantaneous like post which state the contract is ----------------------
concluded or comes into effect when the acceptance is ‘posted’.
----------------------
b. Receipt rule which is applicable when communications are instantaneous
like telephone, telex or fax. It lays down that a contract is complete when ----------------------
the acceptance is received by the offeror.
----------------------
In the electronic context, two situations need to be considered:
1. E-mail Contracts ----------------------
----------------------
----------------------
----------------------
---------------------- Activity 1
----------------------
Analyze the case of Quadricon Pvt. Ltd. Vs Shri Bajrang Alloys Ltd and
---------------------- make a comparative study of the UK and Indian contract law.
----------------------
2.3 LEGAL RECOGNITION TO ELECTRONIC RECORDS
----------------------
Certain types of contracts require particular formalities to be observed
---------------------- if they are to be enforceable. The most common of these is that the contract
---------------------- must be made in writing and that it must be signed. E.g. a) Loan Agreement, b)
Contract of guarantee, etc.
----------------------
The question then arises whether a document in the electronic form or
---------------------- the electronic record complies with this formality of writing and what is the
electronic equivalent of a signature.
----------------------
Electronic record is defined u/s 2(t) of the IT Act, 2000 as “data, record or
---------------------- data generated image or sound stored, received or sent in an electronic form or
micro film or computer guaranteed micro fiche.”
----------------------
Electronic form with reference to information means any information
---------------------- generated, sent, recovered or stored in media, magnetic, optical, computer
memory, micro film, computer generated micro fiche or similar device as per
---------------------- S2(r) of the IT Act, 2000.
---------------------- One of the objects of the IT Act, 2000 was to enable the conclusion
of contracts and the creation of rights and obligations through the electronic
---------------------- medium. In order to achieve this, it was necessary to bring the electronic record
---------------------- at par with paper based documents and also identify an electronic method of
authenticating or signing the electronic record.
---------------------- The IT Act 2000 has conferred legal recognition to e-commerce by
---------------------- including Section 4 and Section 6 in the Said Act.
Section 6 provides for use of electronic records, digital as well as electronic
---------------------- signatures in Government and its agencies thus ushering in the era of e-governance.
----------------------
Check your Progress 2
----------------------
Multiple Choice Single Response. ----------------------
1. Electronic record is defined under section ______ of the IT Act 2000. ----------------------
i. 2(a)
----------------------
ii. 2(f)
----------------------
iii. 2(t)
2. Electronic form with reference to information means any information ----------------------
generated, sent, recovered or stored in media, magnetic, optical,
----------------------
computer memory, microfilm, computer generated microfiche or
similar device as per Section _____ of the IT Act, 2000. ----------------------
i. 2 (e) ----------------------
ii. 2 (r)
----------------------
iii. 2 (g)
----------------------
----------------------
2.4 LEGAL RECOGNITION TO DIGITAL AND
ELECTRONIC SIGNATURES ----------------------
S3 and S5 of the IT Act, 2000 has given legal recognition to digital ----------------------
or electronic signatures as a legally acceptable method of authentication of
----------------------
‘signing’ electronic records. Wherever law requires any document to be signed,
this formality stands complied with if a digital signature is affixed to a document ----------------------
in the electronic form. Digital or electronic signatures are therefore treated at
par with the requirement of ‘signature’ on a paper based document. This digital ----------------------
or electronic signature performs the three vital functions of a handwritten ----------------------
signature i.e. it provides evidence of three themes:
----------------------
a. Identity of the signatory,
b. Intention to sign, and ----------------------
----------------------
3. Then the signer sends the original message along with the digitally signed ----------------------
message to the receiver.
----------------------
(Note that this Digital Signature will be different for each message.)
----------------------
Digital Signature Verification
Steps - On receiving the message ----------------------
1. The receiver uses the sender’s public keys to decrypt the signature ----------------------
changing it back to the hash result or message digest.
----------------------
2. The receiver computes the hash result from the original message using the
same hash function as used by the sender. ----------------------
3. Then he compares the message digest computed by him to the decrypted ----------------------
hash.
----------------------
If it is the same, it means that the identity of the sender is authenticated
and also that the message was unaltered in transit. ----------------------
Section 3 of the Information Technology Act, 2000 provides for ----------------------
authentication of electronic records by affixing a digital signature and the
authentication shall be effected by the use of an asymmetric crypto system and ----------------------
hash function which envelops and transforms the initial electronic record into
another electronic record. ----------------------
----------------------
----------------------
2. Connectivity ----------------------
3. Content ----------------------
4. Consumers
----------------------
5. Confidence building
----------------------
However, we need to overcome the resistance to e-governance, such as
cultural resistance, which are - ----------------------
1. The government culture of secrecy, which is deep rooted in the government ----------------------
body.
----------------------
2. Corruption.
3. The strictly observed hierarchy in organization as the younger and junior ----------------------
staff has better knowledge of technology.
----------------------
4. Lack of imagination.
----------------------
e-Governance in Maharashtra
With the commissioning of its dedicated communications network that ----------------------
covers the entire state, Maharashtra has taken one more step in the direction of ----------------------
total e-governance. The network has enabled government departments to use
e-mail and is estimated to save around Rs. 150 crore over the next five years ----------------------
against its instalment cost of Rs. 27 crore.
----------------------
In the aftermath of a natural calamity, for example, floods and earthquakes,
the first hurdle faced by the government is lack of information as the tools of ----------------------
communications like telephone lines get affected. This delays the organization
of rescue and relief work. So online connectivity achieved by Maharashtra ----------------------
----------------------
Activity 2
----------------------
---------------------- Summary
---------------------- ●● With the enactment of the IT Act, 2000 some of the fundamental issues
that had arisen because of the wide use of electronic communications
----------------------
commercially and otherwise are solved. As per the IT Act, 2000 an
---------------------- electronic record is treated at par with a written document while digital
signatures are the legally acceptable equivalents of a physical signature.
----------------------
●● The underlying principles of contract formation have not changed. The
---------------------- only change that has taken place is the medium of communication. The
electronic medium of communication thus needed a different treatment
---------------------- than the ordinary mode of communication to identify the time and place of
contract. These two ingredients are crucial in a contract formation as they
----------------------
define reciprocating rights and liabilities. Further, the place of contract
---------------------- is equally important as it decides the applicable law and jurisdiction of
courts. To tackle these issues, rules relating to time and place of formation
---------------------- of electronic contracts were inserted in the IT Act, 2000. The Contract
Act did not require any amendment as the basic contracting principles
----------------------
remained unchanged.
---------------------- ●● A new era of e-governance has been ushered in due to the IT Act, 2000
that will ensure transparency, accountability and speedier processing
----------------------
not only between intra governmental departments but also in respect of
---------------------- transaction of the public with the government.
----------------------
----------------------
●● Asymmetric Crypto System: A system of a secure key pair consisting of a
private key for creating a digital signature and a public key to verify a digital ----------------------
signature.
●● Authentication: A process used to confirm the identity of a person or ----------------------
to prove the integrity of specific information. Message authentication ----------------------
involves determining its source and verifying that it has not been modified
in transit. ----------------------
●● Cryptographic Algorithm: A clearly specified mathematical process for ----------------------
computation.
●● Encryption: The process of transforming plain text data into an ----------------------
unintelligible form (cipher text). ----------------------
●● Key Pair: In an Asymmetric Crypto System, a private key and its
mathematically related public key, are so related that the public key can ----------------------
verify the digital signature created by the private key. ----------------------
●● Private Key: Means the key of the key pair used to create a digital
signature. ----------------------
●● Public Key: Means the key of the key pair used to verify a digital ----------------------
signature.
----------------------
Self-Assessment Questions ----------------------
1. Explain in detail the system and functioning of EDI. ----------------------
2. Describe in detail the EDI standards. ----------------------
3. What is e-commerce? Was the Contract Act without any amendments
----------------------
sufficient to address all issues arising out of e-commerce transactions?
4. Provisions of the IT Act, 2000 addresses which issues relating to ----------------------
e-commerce?
----------------------
5. Explain in detail what is a Digital Signature and its working with illustrations.
----------------------
6. What is e-governance. What are the e-governance initiatives taken by the
Government of India? ----------------------
7. www.ebay.com is a popular e-commerce site? Explain its functioning in ----------------------
detail with the terms and conditions.
----------------------
Answers to Check your Progress
----------------------
Check your Progress 1 ----------------------
State True or False.
----------------------
1. False
2. True ----------------------
----------------------
Check your Progress 4
----------------------
Fill in the blanks.
---------------------- 1. The short role of ‘e’ is very small or like a catalyst in e-governance policy
and governance has a prime importance.
----------------------
2. The system of e-governance is supported by five major pillars.
----------------------
3. MAHAFOOD is Web based food grains allotment and lifting information
---------------------- system for the department of civil supplies and its 35 district offices.
---------------------- 4. KIS is the software used to generate daily board to deliver information of
case listed for various courtrooms in the office of Motor Accident Claims
---------------------- Tribunal, Mumbai.
----------------------
Suggested Reading
----------------------
1. Nandan, Kamath. Law relating to Computer, Internet and E-Commerce.
----------------------
2. Ahmed, S.S. A Guide to Information Technology: Cyber Law and
---------------------- E-Commerce.
3
Structure:
3.1 Who is a Certifying Authority and Controller
3.2 License to issue Electronic Signature Certificates (ESC)
3.3 Appointment of a Controller
3.4 Functions of a Controller
3.5 Functions of a Certifying Authority
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
----------------------
3.1 WHO IS A CERTIFYING AUTHORITY AND CONTROLLER
----------------------
Due to the enabling provisions of the IT Act 2000, the electronic signature
---------------------- is given legal recognition and is now the electronic equivalent of the physical
signature. Thus an electronic record which bears the electronic signatures of
---------------------- the signatory or the subscriber can now be treated at par with a paper based
---------------------- document bearing the physical signature of the signatory and is therefore legally
acceptable.
---------------------- However, for a person to rely on an electronic record which is electronically
---------------------- signed, the person should be sure that the electronic signature is that of the
subscriber only and of nobody else. Thus a need was felt to have a trusted third
---------------------- party who could independently certify that the electronic signature is that of the
signatory or the subscriber and of nobody else.
----------------------
Such authorities were established as per the provisions of the IT Act,
---------------------- 2000 who could issue the aforesaid certifications. These independent, unbiased,
reliable entities formed under this Act are called Certifying Authorities and the
----------------------
certificate issued by them is called the Electronic Signature Certificate.
---------------------- Certifying Authority thus means a person who has been granted a license
by the Controller to issue Electronic Signature Certificate under section (u/s 24)
----------------------
of the IT Act, 2000.
---------------------- A Electronic Signature Certificate is a Public Key Certificate issued
by the Certifying Authority in the name of the subscriber. This means that it
----------------------
certifies that a electronic signature belongs to the specific signer or subscriber.
---------------------- The Electronic Signature Certificate confirms the identity of the subscriber and
also the subscriber’s Public Key.
----------------------
In addition to this function of certifying the identity of the subscriber so
---------------------- that any person can rely on it, Certifying Authority also dispenses the Public
Keys of the subscribers or makes them accessible to the public.
----------------------
In order to carry out these functions, the Certifying Authority has to
---------------------- receive a license from higher authorities established under the Act known as
Root Certifying Authority or Controller. This establishes a hierarchical system
---------------------- known as the Public Key Infrastructure or (PKI).
----------------------
----------------------
Controller
----------------------
C.A. ----------------------
----------------------
Subscriber ----------------------
----------------------
----------------------
----------------------
(Issues Electronic Signature Certificate (ESC), Identifies and authenticates the Subscriber
----------------------
----------------------
Establishes a relationship of trust ----------------------
Subscriber Relying party
----------------------
Thus, the Certifying Authority who is approved by the Controller or who has a
valid license from the Controller performs the following functions - ----------------------
a. Issues an ESC to the subscriber. ----------------------
b. Identifies and authenticates the subscriber for the third party. ----------------------
c. Establishes a relationship of trust between the subscriber and the third
party. ----------------------
----------------------
3.2 LICENSE TO ISSUE ELECTRONIC SIGNATURE
CERTIFICATES (ESC) ----------------------
Any person i.e. a legal entity may make an application to the Controller for ----------------------
a license to issue ESC. The Central Government has the power to prescribe the
----------------------
requirements the Applicant has to fulfil in respect of qualifications, expertise,
manpower, financial resource and other infrastructure facilities. ----------------------
As per rule 8(1) of the Information Technology (certifying authorities) ----------------------
Rules 2000, the following persons may apply for grant of a license to issue
ESC. ----------------------
The license shall not be suspended for a period exceeding ten days unless ----------------------
the Certifying Authority has been given a reasonable opportunity of showing
----------------------
cause against the proposed suspension.
The Certifying Authority whose license has been suspended has no ----------------------
authority to issue any Electronic Signature Certificate during such suspension. ----------------------
---------------------- The Certifying Authority has to submit its application for renewal of its
license not less than 45 days before the date of expiry of the period of validity
---------------------- of license as per rules.
----------------------
Check your Progress 1
----------------------
State True or False.
----------------------
1. The Controller has the authority or power to grant the license or reject
---------------------- the application.
---------------------- 2. The license shall be valid for a period of ten years from the date of its
issue.
----------------------
3. The license is transferable as per the Information Technology
---------------------- (Certifying Authorities) Rules, 2000.
----------------------
3.3 APPOINTMENT OF A CONTROLLER
----------------------
---------------------- The highest authority established under the Act known as Root Certifying
Authority is the Controller. The Controller is at the top of the hierarchical
---------------------- system known as the Public Key Infrastructure or (PKI) exercising control over
----------------------
Check your Progress 2
----------------------
Fill in the blanks.
----------------------
1. __________ has the power to appoint controller.
----------------------
2. The Controller discharges its functions under the general control and
supervision of the ________. ----------------------
----------------------
3.4 FUNCTIONS OF A CONTROLLER ----------------------
The Controller is the highest controlling authority appointed under the Act ----------------------
whose primary function is to regulate and supervise the Certifying Authorities
appointed under the Act. ----------------------
The main functions of the Controller are as follows: ----------------------
1. Supervise the activities of the Certifying Authorities.
----------------------
2. Certify Public keys of the Certifying Authorities.
----------------------
3. Lay down standards to be followed and maintained by Certifying Authorities.
4. Specify the qualifications and experience which the employees of the ----------------------
Certifying Authorities must possess. ----------------------
5. Specify the conditions under which the Certifying Authorities must
----------------------
conduct their business.
6. Specify the contents of written, printed, or visual materials and ----------------------
advertisements that may be distributed or used in respect of Electronic
----------------------
Signature Certificates and the Public Key.
7. Specify the form and contents of Electronic Signature Certificates and ----------------------
public key.
----------------------
----------------------
Check your Progress 3 ----------------------
----------------------
---------------------- b. The private key and the public key are a functional part capable of creating
a electronic signature.
---------------------- c. The public key to be listed in the certificate can be used to verify the
---------------------- electronic signature of the appellant which is affixed by using his private
key.
---------------------- In addition to the above, the Certifying Authority shall also ensure the
---------------------- following -
1. The Electronic Signature Certificate application has been submitted by
----------------------
the subscriber to the Certifying Authority in the form provided by the
---------------------- Certifying Authority and the same has been approved by it.
2. The application form contains, inter alia, the particulars given in the
----------------------
model form given in Schedule IV of the Act.
---------------------- 3. No interim Electronic Signature Certificate is issued.
---------------------- 4. The Electronic Signature Certificate is generated by the Certifying
Authority upon receipt of an authorized and validated request for new
---------------------- Electronic Signature Certificates or Electronic Signature Certificate
---------------------- renewal.
2. The period for which a Electronic Signature Certificate has been issued ----------------------
shall not be extended, but a new Electronic Signature Certificate may be
----------------------
issued after the expiry of such period.
Compromise of Electronic Signature Certificate ----------------------
Electronic Signature Certificate in operational use that becomes ----------------------
compromised shall be revoked in accordance with the procedure defined in the
Certification Practice Statement of Certifying Authority. ----------------------
Explanation - Electronic Signature Certificates shall - ----------------------
A. Be deemed to be compromised where the integrity of - ----------------------
i) the private key associated with the Electronic Signature Certificate
is in doubt; ----------------------
ii) the Electronic Signature Certificate owner is in doubt, as to the use, ----------------------
or attempted use of his key pairs, or otherwise, for malicious or
----------------------
unlawful purpose.
B. Remain in the compromised state for only such time as it takes to ----------------------
arrange for revocation.
----------------------
The Certifying Authority to ensure that all the Electronic Signature
Certificates issued by it are valid and trustworthy and confirm to the standards ----------------------
and rules and regulations laid down under the Act can exercise the following ----------------------
additional powers –
---------------------- c. the Certifying Authority’s private key or security system was compromised
in a manner materially affecting the Electronic Signature Certificate’s
---------------------- reliability;
---------------------- d. the subscriber has been declared insolvent or dead or where a subscriber
is a firm or a company, which has been dissolved, wound-up or otherwise
---------------------- ceased to exist.
b. provide a reasonable level of reliability in its services which are reasonably ----------------------
suited to the performance of intended functions;
----------------------
c. adhere to security procedures to ensure that the secrecy and privacy of the
electronic signatures are assured; and ----------------------
d. observe such other standards as may be specified by regulations. ----------------------
Other Compliances
----------------------
Certifying Authority to ensure that every person employed or otherwise
engaged by it complies, in the course of his employment or engagement, with ----------------------
the provisions of this Act, rules, regulations or orders made thereunder. ----------------------
Every Certifying Authority shall display its license at a conspicuous place
of the premises in which it carries on its business. ----------------------
---------------------- In this PKI system, the subscriber also has a duty to discharge to ensure
the smooth and effective use and implementation of the electronic signatures in
---------------------- between, concerned and other applications.
----------------------
Check your Progress 4
----------------------
State True or False. ----------------------
1. The subscriber’s public key and private key constitute a functioning ----------------------
key pair.
2. Electronic Signature can be given to the subscriber whose name is in ----------------------
the compromised users list.
----------------------
3. The electronic Signature Certificate continues to have validity even
after the death of the subscriber. ----------------------
----------------------
Activity 1 ----------------------
----------------------
---------------------- Keywords
---------------------- ●● Certifying Authority: It means a person who has been granted a license
to issue Electronic Signature Certificate under S 24 of the Act.
----------------------
●● Certification Practice Statement: It means a statement issued by a
----------------------
----------------------
----------------------
----------------------
Check your Progress 4
----------------------
State True or False.
----------------------
1. True
---------------------- 2. False
---------------------- 3. False
----------------------
----------------------
----------------------
----------------------
Structure:
4.1 Contraventions under the Information Technology Act, 2000
4
4.2 Power to Adjudicate
4.3 Cyber Appellate Tribunal
4.4 Appeal to Cyber Appellate Tribunal
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- After going through this unit, you will be able to:
• Discuss offences in respect of damage to computers, computer system
----------------------
and computer network and the punishments prescribed under the Act
---------------------- • Explain the role of adjudicating officers
---------------------- • Identify the role of the Cyber Appellate Tribunal
----------------------
---------------------- b) Trojans
Worm
----------------------
A computer worm is a self-contained program that is able to spread functional
---------------------- copies of itself or its systems to other computer systems. Unlike viruses, worms
do not attach themselves to a last program.
----------------------
The first worms were actually designed to do good rather than harm to
---------------------- computers and computer networks. First worm was developed for assistance
as a traffic controller when the controls of a plane moved from one computer
----------------------
to another. This worm named ‘creeper’ would travel from one computer screen
---------------------- to another sharing the message I’m creeper! Catch me ‘if you can!’ Another
worm was ‘town crier’ whose job was only to post announcements on all the
---------------------- computers of the network. Although these worms were apparently helpful, they
had some internet destructive capabilities such as the internet worm in 1998
----------------------
clogged all the machines on the network called ‘ARPANET’. All the machines
---------------------- on the network were disabled as the worm made copies of itself which resulted
in clogging the machines.
----------------------
Trojan
---------------------- Similar to the wooden horse from Greek mythology, a Trojan horse
---------------------- program pretends to do one thing while actually doing something completely
different. Most Trojan are used for malicious purposes, to irritate, scare people
---------------------- or harm computers. Password Trojan searches the victim’s computer for
passwords and then sends them to the attacker or the author of the Trojan. Key
---------------------- logger Trojans are very simple. They log all of the victim’s keystrokes on the
---------------------- keyboard and then either save them on a file or e-mail them to the attacker once
in a while. Key loggers usually don’t take much disk space and can masquerade
---------------------- as important utilities, thus making them very hard to detect. Destructive Trojans
can destroy the victim’s entire hard drive, encrypt or just scramble important
---------------------- files. Some might seem like joke programs, while they are actually destroying
---------------------- every file they encounter to pieces.
This clause takes into account all attempts made to introduce or successful
---------------------- introduction of any computer contaminant or virus into a computer, computer
---------------------- systems or computer network. By such an act, the damage that may be caused
can be much more than the compensation of Rs. 1 crore that has been provided
---------------------- for under the Act.
----------------------
4.2 POWER TO ADJUDICATE
----------------------
As per Section 46(1) of the Information Technology Act 2000, the Central
Government has powers to appoint any officer not below the rank of a Director ----------------------
to the Government of India or an equivalent officer of a State Government to ----------------------
be an adjudicating officer for holding an inquiry in the manner prescribed by
the Central Government for the purpose of adjudging whether any person has ----------------------
committed a contravention of any of the Provisions of this Act or of any rule,
regulation, direction or order made thereunder. ----------------------
The adjudicating officer is bound to follow the procedure laid down by ----------------------
the Central Government in conducting the inquiry and shall give a reasonable
opportunity to the person for making representation in the matter. The ----------------------
principles of natural justice are to be followed by the adjudicating officer. If ----------------------
Activity 1 ----------------------
----------------------
Preeti sends an e-mail to her friend Rohit. Rohit opens the e-mail and his
computer is infected by a virus, which has come through Preeti’s e-mail. ----------------------
Can he claim compensation from Preeti?
----------------------
----------------------
All orders passed by the Adjudicating Officer appointed under the Act are
appealable to the Cyber Appellate Tribunal established under the Act. ----------------------
The Central Government shall, by notification, establish one or more
----------------------
appellate tribunals to be known as the Cyber Appellate Tribunal. The Central
Government shall also specify, in the notification referred to in sub-section (1), ----------------------
the matters and places in relation to which the Cyber Appellate Tribunal may
exercise jurisdiction. ----------------------
Composition of Cyber Appellate Tribunal ----------------------
The Cyber Appellate Tribunal shall consist of a Chairperson and ----------------------
such number of members as the Central Government may appoint with the
notification in the official gazette. Before the Amendment in 2008 the head ----------------------
of Cyber Appellate Tribunal was called the Presiding Officer now after the
Amendment the designation of the head is Chairperson. ----------------------
On receipt of an appeal, the Cyber Appellate Tribunal may, after giving ----------------------
the parties to the appeal an opportunity of being heard, pass such orders thereon
----------------------
as it thinks fit, confirming, modifying or setting aside the order appealed against.
The Cyber Appellate Tribunal shall send a copy of every order made by ----------------------
it to the parties to the appeal and to the concerned Controller or Adjudicating
----------------------
Officer.
The appeal filed before the Cyber Appellate Tribunal is to be dealt with ----------------------
by it as expeditiously as possible and endeavour shall be made by it to dispose
----------------------
off the appeal finally within six months from the date of receipt of the appeal.
Procedure and Powers of the Cyber Appellate Tribunal ----------------------
The Cyber Appellate Tribunal shall not be bound by the procedure laid ----------------------
down by the Code of Civil Procedure, 1908 (5 of 1908), but shall be guided by
the principles of natural justice and, subject to the other provisions of this Act ----------------------
and of any rules, the Cyber Appellate Tribunal shall have powers to regulate its ----------------------
own procedure including the place at which it shall have its sittings.
----------------------
The Cyber Appellate Tribunal shall have, for the purposes of discharging
its functions under this Act, the same powers as are vested in Civil Court under ----------------------
----------------------
Check your Progress 2
----------------------
State True or False. ----------------------
1. Any order, even if passed with consent of the parties is appealable in
----------------------
the Cyber Appellate Tribunal.
2. The limitation period for filing the appeal under IT Act is 30 day. ----------------------
3. Powers vested in the Cyber Appellate Tribunal are same as the Civil ----------------------
Courts under the Code of Civil Procedure.
----------------------
4. The Adjudicating Officer and the Controller have exclusive jurisdiction
in respect of the matters prescribed under the Act and there cannot be ----------------------
any interference with its power from the Civil Courts.
----------------------
----------------------
Summary
----------------------
●● The new and advanced computer technology increased the efficiency of
people at work and ensured more accurate and timely results but at the ----------------------
same time this new technology gave rise to peculiar issues and offences
which were unknown earlier. Threats of virus, trojans and worms, the ----------------------
Denial of Service attacks that could cripple websites in a fraction of a
----------------------
second and internet time thefts are some of the challenges that one requires
to face as a trade off for using better and advanced technology. Thus a ----------------------
need was felt not only to address these issues and penalize the offender
but at the same time establish a machinery who is specially equipped to ----------------------
handle such issues effectively and in a time-bound manner.
----------------------
----------------------
Keywords
---------------------- ●● Access: Gaining entry into, instructing or communicating with the logical,
arithmetical or memory function resources of a computer, computer
---------------------- system or computer network.
---------------------- ●● Damage: To destroy, alter, delete, add, modify or rearrange any computer
resource by any means.
---------------------- ●● OSI: Open System Interconnection.
---------------------- ●● TEMPEST: Transient Electromagnetic Pulse Emanation Standard.
●● Phishing: Webpage spoofing.
----------------------
●● Copy: Storing, saving or making an exact replica of a file (data) on
---------------------- the same storage medium or some other removable storage medium or
internal computer memory.
----------------------
●● Extract: To take out or derive a part or some contents from a data or a
---------------------- file.
---------------------- ●● Computer Contaminant: Virus, Trojan, Worm, Cookie, etc.
●● DOS: Denial of Service
----------------------
----------------------
Answers to Check your Progress ----------------------
Check your Progress 1 ----------------------
Fill in the blanks.
----------------------
1. Before the Amendment in 2008, the head of Cyber Appellate Tribunal
was called the Presiding Officer. ----------------------
----------------------
Check your Progress 2
----------------------
State True or False.
----------------------
1. False
2. False ----------------------
3. True ----------------------
4. True ----------------------
----------------------
Suggested Reading ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
5
Structure:
---------------------- After going through this unit, you will be able to:
• Explain the special powers conferred on police officers under the act
----------------------
• Discuss the power vested in the central government to make rules to
---------------------- supplement the legislation
---------------------- • Describe the procedure to be followed in case the offences are
committed by companies
----------------------
----------------------
5.1 POWERS OF THE POLICE OFFICER UNDER THE ACT
----------------------
Investigation means and includes the procedure laid down under Criminal
---------------------- Procedure Code of India (CrPC) for collection of evidence in respect of the
---------------------- crime by a police officer or by any person authorized by the magistrate in this
behalf.
---------------------- Investigation includes gathering of all types of evidence including oral,
---------------------- documentary and electronic evidence and includes proceeding to the spot where
crime took place, making of panchnama, taking statements, search and arrest
---------------------- of the accused, take custodial interrogation of the accused, seize and seal crime
instruments.
----------------------
Procedure for investigation of any offence is laid down under the CrPC.
---------------------- But as per Section 4 of CrPC, all offences under any other law i.e. other than
Indian Penal Code (IPC) shall also be investigated, inquired into, tried and
---------------------- otherwise dealt with according to the provisions of CrPC, if there is no special
---------------------- enactment regulating the manner or place of investigation. Which means if
there is any special enactment regulating the manner or place of investigation,
---------------------- then those rules will prevail over CrPC.
---------------------- Even Information Technology Act incorporates a section which enables
the Act to have an overriding effect which means that the provisions of this Act
---------------------- shall have effect even if there is anything inconsistent therewith contained in
any other law for the time being in force including CrPC.
----------------------
The Information Technology Act, 2000 states that notwithstanding
---------------------- anything contained in the Code of Criminal Procedure, 1973 (2 of 1974), any
police officer, not below the rank of a Deputy Superintendent of Police, or any
----------------------
other officer of the Central Government or a State Government authorized by
---------------------- the Central Government in this behalf may enter any public place and search and
arrest without warrant any person found therein who is reasonably suspected of
---------------------- having committed or of committing or of being about to commit any offence
under this Act.
----------------------
The expression “public place” has been defined under the Act to include
---------------------- any public conveyance, any hotel, any shop or any other place intended for
As per the said Act, where any person is arrested by an officer other than ----------------------
a police officer, such officer shall, without unnecessary delay, take or send the
----------------------
person arrested before a magistrate having jurisdiction in the case or before the
officer-in-charge of a police station. ----------------------
----------------------
----------------------
Check your Progress 1
----------------------
State True or False. ----------------------
1. The Negotiable Instruments Act, 1881 (26 of 1881) was amended in ----------------------
2002 to include the electronic bill of exchange.
2. The IT Act is not applicable to bill of exchange and promissory note. ----------------------
3. The electronic cheque contains the exact mirror image of a paper ----------------------
cheque and to secure minimum safety standards, digital signature is
----------------------
used.
----------------------
5.3 CONTROLLER, DEPUTY CONTROLLER AND ----------------------
ASSISTANT CONTROLLERS TO BE PUBLIC SERVANTS
----------------------
The Presiding Officer and other officers and employees of a Cyber
Appellate Tribunal, the Controller, the Deputy Controller and the Assistant ----------------------
Controllers shall be deemed to be public servants within the meaning of section
21 of the Indian Penal Code (45 of 1860). ----------------------
A distinction is made between the general public and certain classes of ----------------------
persons in the service and pay of the government, or exercising various public
functions, who are included in the word ‘public servant’. Public Servants in ----------------------
discharge of their duties have many privileges peculiar to themselves. ----------------------
In continuation of the privilege conferred on the Presiding Officer and
----------------------
other officers and employees of a Cyber Appellate Tribunal, the Controller, the
Deputy Controller and the Assistant Controllers appointed under the Act, the ----------------------
Act provides them with further protection against any suit, prosecution or other
legal proceeding to be filed against them for anything which is done in good ----------------------
faith or intended to be done in pursuance of this Act or any rule, regulation or
----------------------
order made thereunder.
----------------------
Check your Progress 2
----------------------
State True or False. ----------------------
1. The Presiding Officer and other officers and employees of a Cyber ----------------------
Appellate Tribunal are not public servants under section 21 of the
Indian Penal Code (45 of 1860). ----------------------
2. Public Servants in discharge of their duties have many privileges ----------------------
peculiar to themselves.
----------------------
2. If the accused person proves that the contravention took place without ----------------------
his knowledge or that he exercised all due diligence to prevent such
----------------------
contravention, he can escape liability under the Act.
3. All such persons, who are responsible in the management of the ----------------------
business of the company and in-charge of its business at the material
----------------------
time when the offence was committed by the company, shall be
deemed to be guilty of the offence. ----------------------
----------------------
---------------------- Write a case comment on K.P.G. Nair v/s. Jainbal Menthol India Ltd.,
2002 S.C.C. (Cr) 1038.
----------------------
(n) the form in which application for issue of a Digital Signature Certificate ----------------------
may be made under sub-section (1) of section 35;
----------------------
Rules 23 & 25 of the Information Technology (Certifying Authorities)
Rules, 2000 ----------------------
(o) the fee to be paid to the Certificate Authority for issue of a Digital ----------------------
Signature Certificate under sub-section (2) of section 35;
----------------------
Rule 30 of the Information Technology (Certifying Authorities) Rules, 2000
(p) the manner in which the adjudicating officer shall hold inquiry under sub- ----------------------
section (1) of section 46; ----------------------
Rules 4-12 of the Information Technology (Qualification and Experience
of Adjudicating Officers and Manner of Holding Enquiry) Rules, 2003 ----------------------
(q) the qualification and experience which the adjudication officer shall ----------------------
possess under sub-section (3) of section 46;
----------------------
Rule 3 of the Information Technology (Qualification and experience of
Adjudicating Officers and Manner of Holding Enquiry) Rules, 2003 ----------------------
---------------------- (t) the salary and allowances and other conditions of service of other officers
and employees under sub-section (3) of section 54;
---------------------- No Rule as yet prescribed
---------------------- (u) the form in which appeal may be filed and the fee thereof under sub-
section (3) of section 57;
----------------------
Rules 3-22 of the Cyber Regulations Appellate Tribunal (Procedure)
---------------------- Rules, 2000
---------------------- (v) any other power of a civil Court required to be prescribed under clause (g)
of sub-section (2) of section 58; and
----------------------
Rule 3 of the Information Technology (Other Powers of Civil Court vested
---------------------- in Cyber Appellate Tribunal) Rules, 2003
---------------------- (w) any other matter which is required to be, or may be, prescribed.
May be prescribed by Specific Rules, Orders, etc.
----------------------
Every notification made by the Central Government and every rule
---------------------- made by it shall be laid, as soon as may be after it is made, before each House
of Parliament, while it is in session, for a total period of thirty days which
----------------------
may be comprised in one session or in two or more successive sessions, and
---------------------- if, before the expiry of the session immediately following the session or the
successive sessions aforesaid, both Houses agree in making any modification in
---------------------- the notification or the rule or both Houses agree that the notification or the rule
should not be made, the notification or the rule shall thereafter have effect only
----------------------
in such modified form or be of no effect, as the case may be. So, however, that
---------------------- any such modification or annulment shall be without prejudice to the validity of
anything previously done under that notification or rule.
----------------------
The Central Government shall, as soon as may be after the commencement
---------------------- of this Act, constitute a Committee called the Cyber Regulations Advisory
Committee.
----------------------
The Cyber Regulations Advisory Committee shall consist of a Chairperson
---------------------- and such number of other official and non-official members representing the
interests principally affected or having special knowledge of the subject-matter
---------------------- as the Central Government may deem fit.
----------------------
----------------------
5.6 AMENDMENTS TO EXISTING LAWS
----------------------
1. Amendments made to The Indian Penal Code
----------------------
The definitions of the electronic record and the digital signature were
introduced by amending the Indian Penal Code, and all provisions ----------------------
applicable to documents were made applicable to electronic records and ----------------------
further all provisions applicable to signatures were made applicable to
digital signatures. Throughout the code, wherever the word document ----------------------
occurs, it is substituted with the word document or electronic record. This
----------------------
amendment ensured that the electronic record is treated at par with paper
based documents and the digital signature is a functional equivalent of a ----------------------
physical signature.
----------------------
The world electronic record as it appears in the said Act has the same
meaning as assigned to it in the Information Technology Act 2000. ----------------------
Electronic record means data, record or data generated, image or sound
----------------------
stored, received or sent in an electronic form or a micro film or computer
generated micro fiche. ----------------------
Further Section 464 which deals with making a false document has been ----------------------
amended and the following instances have been enumerated of making a
false document – ----------------------
1) a. Dishonestly or fraudulently making or transmitting any electronic ----------------------
record or part of any electronic record.
----------------------
b. Dishonestly or fraudulently affixing any digital signature on any
electronic record. ----------------------
c. Unauthorized affixation or transmission of any digital signature ----------------------
or electronic record by a person who dishonestly or fraudulently
intends to use it as evidence. ----------------------
----------------------
----------------------
----------------------
Fill in the blanks.
1. The definitions of the_____________ and the digital signature were ----------------------
introduced by amending the Indian Penal Code.
----------------------
2. An amendment ensured that the electronic record is treated ______
with paper-based documents. ----------------------
3. Section____, which deals with making a false document, has been ----------------------
amended.
----------------------
4. The Indian Evidence Act has been amended to include the electronic
record and_______. ----------------------
5. The nature of ________ is such that it cannot be categorized as original ----------------------
and primary evidence and the definition of the word document cannot
be made applicable to it. ----------------------
----------------------
----------------------
----------------------
---------------------- Keywords
---------------------- ●● IPC: Indian Penal Code
---------------------- ●● CrPC: Criminal Procedure Code
●● DSP: Deputy Superintendent of Police
----------------------
●● Public Place: Place which includes any public conveyance, any hotel,
---------------------- any shop or any other place intended for use by, or accessible to the public.
●● NI Act: Negotiable Instruments Act
----------------------
●● Cheque: a negotiable instrument as defined under the NI Act
----------------------
●● Company: means any body corporate and includes a firm or other
---------------------- association of individuals
5. Explain in your own words the amendments carried out in the Indian ----------------------
Penal Code by the virtue of IT Act.
----------------------
6. An electronic record is now admissible in evidence. Discuss in detail.
----------------------
----------------------
Check your Progress 3
State True or False. ----------------------
1. True ----------------------
2. True ----------------------
3. True ----------------------
----------------------
----------------------
----------------------
---------------------- v. –f
vi. – c
----------------------
----------------------
Check your Progress 5
---------------------- Fill in the blanks.
---------------------- 1. The definitions of the electronic record and the digital signature were
introduced by amending the Indian Penal Code.
----------------------
2. An amendment ensured that the electronic record is treated at par with
---------------------- paper-based documents.
---------------------- 3. Section 464, which deals with making a false document, has been
amended.
----------------------
4. The Indian Evidence Act has been amended to include the electronic
---------------------- record and digital signature.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
6
Structure:
6.1 Definition
6.2 Types of Cyber Crimes
6.3 Instances of Cyber Crimes where Computer is used as a Tool
6.4 Instances of Cyber Crimes where Computer is used as a Target
6.5 E-mail related Crimes
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- After going through this unit, you will be able to:
• Explain the meaning of cyber crimes
----------------------
• List various types of cyber crimes and their classification
----------------------
• Describe various tools used to commit a cyber crime
----------------------
----------------------
----------------------
----------------------
Activity 1
---------------------- Visit the nearest cyber cell and collect information as to how many cyber
crimes against the property are reported.
----------------------
----------------------
6.3 INSTANCES OF CYBER CRIMES WHERE COMPUTER
---------------------- IS USED AS A TOOL
---------------------- Financial Fraud
---------------------- These form a special category of crimes which involve theft, misappropriation,
fraud, forgery, etc. for illegal financial gain.
----------------------
BPO Fraud
----------------------
India’s first major e-banking fraud was reported and the five of the
---------------------- employees who masterminded this fraud did it without having to break through
any security barriers or by decoding encrypted software and were neither
---------------------- hackers nor geeks. The employees of a BPO were privy to confidential details
---------------------- Pornography and obscenity on the internet and computers may take
various forms.
---------------------- Following are just a few examples:
---------------------- 1. Uploading of nude photographs on a website
---------------------- 2. Writing on blog sites which are obscene in nature
3. Uploading video clips on a website which are obscene in nature
----------------------
4. Creating a profile on a social networking website which is obscene in nature
----------------------
5. Transmission of sms/mms on mobile phones which is obscene in nature
---------------------- 6. Hosting of a website containing these prohibited/obscene materials
---------------------- 7. Use of computers for producing the obscene materials
---------------------- 8. Downloading through the Internet of obscene materials
---------------------- A reader and vice-principal of a reputed Law College in Pune, has fallen
victim to internet fraud, commonly called as phishing. Her e-mail ID was
---------------------- hacked and several mails were forwarded to her friends and relatives seeking
financial help.
----------------------
The Vice Principal on Saturday approached the cyber crime cell of Pune
---------------------- police complaining about false mails being sent to her relatives and friends
asking for financial aid. “The mail mentioned that my health is in bad shape and
----------------------
that I require finance for medical treatment,” the VP said. The matter came to
---------------------- light after a relative of hers called the VP to inquire about her health on reading
the mail. She did not lose any money as the matter came to light before any
---------------------- financial transaction could be made”. Her e-mail ID was hacked and password
was changed subsequently. Later, the suspect sent an array of mails to the VP’s
----------------------
relatives and friends to earn money.
---------------------- E-mail Spoofing
---------------------- E-mail spoofing can be defined as an act of sending e-mail by a person
from another person’s account. Thus the e-mail appears to have originated from
---------------------- one account but is actually from another account. This is generally done with
a malicious intent to cause harm. E-mail spoofing is a term used to describe
----------------------
fraudulent e-mail activity in which the sender address and other parts of the
---------------------- e-mail header are altered to appear as though the e-mail originated from a
different source. E-mail spoofing is a technique commonly used for spam e-mail
---------------------- and phishing to hide the origin of an e-mail message.
----------------------
Match the following.
----------------------
i. Jerusalem a. 2007
ii. Tequila b. 2000 ----------------------
iii. I Love You c. 2001 ----------------------
iv. Nimda d. 1987
----------------------
v. Storm e. 1991
----------------------
----------------------
Activity 2
----------------------
Make a survey on virus attacks till date and find out the most widespread
----------------------
attack that crippled the cyber world.
----------------------
6.5 E-MAIL RELATED CRIMES ----------------------
----------------------
Check your Progress 4
----------------------
●● Statistics indicate that cyber crimes are on the rise. The number of crimes ----------------------
registered with the police in whom a computer is involved either as a tool
----------------------
or as a target is definitely increasing every year. Cyber Crime is a reality
which is closer to you than you may think. A teacher’s e-mail account ----------------------
was hacked into as a result of a phishing attack which resulted in a lot
of inconvenience and hardship not only to the teacher but also to her ----------------------
friends and relatives. Several girls are victims as someone intentionally
----------------------
to malign the reputation of the girl creates her fake profile on a social
networking site with obscene photographs and real phone numbers. A lot ----------------------
of companies have faced tremendous losses due to data theft and such
cases mostly involve some insider. It is necessary for every individual ----------------------
to have knowledge about what cyber crimes are and how to protect
----------------------
themselves from being victims of cyber crimes.
●● Cyber crimes are broadly classified into two categories. One, where the ----------------------
computer is used as a tool and another, where the computer is used as
----------------------
a target. Crimes where computer is used as a target are new age crimes
which have come into existence only after the invention of computer ----------------------
technology such as transmission of virus or worms. Financial frauds,
Cyber Pornography, unauthorized access, data theft and transmission or ----------------------
virus, worms top the list of cyber crimes today.
----------------------
Keywords ----------------------
----------------------
----------------------
----------------------
----------------------
Answers to Check your Progress
----------------------
Check your Progress 1
----------------------
Multiple Choice Single Response.
----------------------
1. Into how many categories can cyber crimes be broadly classified?
---------------------- ii. Two
---------------------- 2. Which of the following are cyber crimes?
---------------------- iv. All of the above
3. Which of the following cyber crimes can be committed against a person?
----------------------
iv. Spoofing
----------------------
----------------------
----------------------
----------------------
Check your Progress 4
----------------------
State True or False.
1. False ----------------------
2. False ----------------------
----------------------
----------------------
Suggested Reading
----------------------
1. Collins, Matthew. The Law of Defamation and the Internet.
2. Caloyannides, Michael. Privacy Protection and Computer Forensics. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
7
Structure:
7.1 Source Code Theft or Tampering with Computer Source Documents
7.2 Computer related Offences
7.3 Publishing of Information which is Obscene in Electronic Form
7.4 Power of Controller to give Directions
7.5 Protected System
7.6 Penalty for Misrepresentation and Penalty for Breach of Confidentiality
and Privacy
7.7 Offences relating to Electronic Signature Certificates
7.8 Liability of Network Service Providers
7.9 Additional Provisions
7.10 Computer related Crimes under Indian Penal Code
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- After going through this unit, you will be able to:
• Explain the meaning of cyber crimes as defined under the Information
----------------------
Technology Act, 2000
---------------------- • Discuss the scope of Information Technology Act, 2000 relating to
protection of Electronic signatures
----------------------
• Describe the nature and scope of liabilities in respect of Network
---------------------- Service Providers
---------------------- • State the provisions relating to confiscation and seizure
----------------------
Section 66A provides for punishment for sending offensive messages through ----------------------
communication service.
----------------------
----------------------
----------------------
Section 66C provides for the punishment for Identity Theft. Any person ----------------------
who makes use of Electronic Signature or password or any other unique
----------------------
identification feature of any other person fraudulently or dishonestly is liable
for the punishment for imprisonment up to three years or with fine up to Rupees ----------------------
One Lakh.
----------------------
Section 66D provides for punishment for Cheating by personation by
using computer resource. The punishment provided for such an act is up to three ----------------------
years of imprisonment or with fine up to Rupees One Lakh.
----------------------
Section 66E provides for Punishment for Violation of Privacy. Under
this Section if any person intentionally or knowingly captures, publishes or ----------------------
transmits the image of a private area of any person without his or her consent
he is liable for the punishment imprisonment up to three years or with fine not ----------------------
exceeding Rupees Two Lakh.
----------------------
Section 66F provides for Punishment for Cyber Terrorism. Under this
provision if any person- ----------------------
---------------------- Activity 1
----------------------
Analyze state-wise rate of cybercrimes in India and find the reasons for
---------------------- growth of such crimes.
----------------------
7.3 PUBLISHING OF INFORMATION WHICH IS OBSCENE
----------------------
IN ELECTRONIC FORM
----------------------
Obscenity or pornography in any form is banned in India. As an extension
---------------------- of this principle, obscenity in the electronic form is also banned. The Information
Technology Act makes publication and transmission of obscene material in the
---------------------- electronic form a cognizable non-bilable offence.
---------------------- As per the Section 67 of the said Act, whoever publishes or transmits or
causes to be published in the electronic form, any material which is lascivious
---------------------- or appeals to the prurient interest or if its effect is such as to tend to deprave and
---------------------- corrupt persons who are likely, having regard to all relevant circumstances, to
read, see or hear the matter contained or embodied in it, shall be punished on
---------------------- first conviction with imprisonment of either description for a term which may
extend to three years and with fine which may extend to five lakh rupees and
---------------------- in the event of a second or subsequent conviction with imprisonment of either
---------------------- description for a term which may extend to five years and also with fine which
may extend to ten lakh rupees.
---------------------- Publication or transmissions are essential ingredients of the offence.
---------------------- Further all those entities that cause or help or allow publication or transmission
of such material in the electronic form are also liable. Thus the scope of
---------------------- this section is vast as it covers Network Service Providers, Internet Service
Providers, Website Owners, Cyber Café Owners, Organizations having a
---------------------- computer network, etc. Thus all such entities become liable to face a penalty of
---------------------- imprisonment of either description for a term which may extend to five years
and with fine which may extend to one lakh rupees for the material that is
---------------------- transmitted through their resource or computer network though the said material
is not owned by them or even if they do not exercise any control over the said
---------------------- material.
Section 67A provides that if any person publishes or transmits any ----------------------
material in electronic form which contains sexually explicit acts is liable for
first conviction for imprisonment up to five years and with fine up to Rupees ----------------------
Ten Lakh and for second or subsequent conviction for imprisonment up to seven ----------------------
years and with fine up to Rupees Ten Lakh.
----------------------
Section 67B provides punishment for publishing or transmitting of material
depicting children in sexually explicit act in electronic form. This provision ----------------------
makes child pornography as an offence. Any one who uses or compels the
children for committing such acts is liable for first conviction for imprisonment ----------------------
of five years and fine up to Rupees Ten Lakh and for second or subsequent
----------------------
conviction for imprisonment up to seven years and fine up to Rupees Ten Lakh.
----------------------
----------------------
Activity 2
----------------------
State True or False.
1. IT Act 2000 describes the function, duties and powers of the controller. ----------------------
2. If a person fails to comply with any order of the controller, he will not ----------------------
be liable or guilty of any offence.
----------------------
3. Breach to the right to privacy is not applicable to electronic medium.
----------------------
4. The subscriber or any person in charge of the computer resource when
called upon by any agency will be liable to give technical assistance ----------------------
to that particular agency.
----------------------
----------------------
The appropriate Government may, by notification in the Official Gazette,
declare any computer, computer system or computer network to be a protected ----------------------
system. The appropriate Government may, by order in writing, authorize the
persons who are authorized to access protected systems notified under sub- ----------------------
section. Further, any person who secures access or attempts to secure access
----------------------
to a protected system in contravention of the provisions of this section shall be
punished with imprisonment of either description for a term which may extend ----------------------
to ten years and shall also be liable to fine.
----------------------
Any National Nodal Agency may be appointed by the Central Government
for the purpose of development, protection and security of the Protected System ----------------------
or the critical information system.
----------------------
Section 70 of the Information Technology Act is the only provision which
----------------------
----------------------
----------------------
----------------------
7.6 PENALTY FOR MISREPRESENTATION AND PENALTY
----------------------
FOR BREACH OF CONFIDENTIALITY AND PRIVACY
----------------------
Penalty for Misrepresentation - Whoever makes any misrepresentation
---------------------- to, or suppresses any material fact from, the Controller or the Certifying
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
7.8 LIABILITY OF NETWORK SERVICE PROVIDERS
----------------------
A Network Service Provider means an intermediary.
----------------------
An intermediary is defined under the Information Technology Act 2000
as - with respect to any particular electronic message, means any person who on ----------------------
behalf of another person receives, stores or transmits that message or provides
----------------------
any service with respect to that message.
----------------------
---------------------- Third party information - means any information dealt with by a network
service provider in his capacity as an intermediary.
----------------------
As per the definition of a Network Service Provider, the following are
---------------------- Network Service Providers –
1. Internet Service Providers
----------------------
2. Cellular Service Providers
----------------------
3. Call Centres
---------------------- 4. Cable Operators
---------------------- 5. Website owners
---------------------- Under the act, all these entities are held liable for the third party content
made available by it unless he is able to show that he had no knowledge of the
---------------------- violative content or that he has shown due diligence to prevent the commission
of the offence.
----------------------
Knowledge means actual and constructive knowledge while due diligence
---------------------- means reasonable steps taken by a person of ordinary prudence.
---------------------- This section has been criticized as draconian as NSPs are required to
shoulder an excessive and unwarranted responsibility for third party information
---------------------- over which they have no control.
----------------------
Check your Progress 7
----------------------
----------------------
7.9 ADDITIONAL PROVISIONS
----------------------
Confiscation
----------------------
Any computer, computer system, floppies, compact disks, tape drives
---------------------- or any other accessories related thereto, in respect of which any provision
of this Act, rules, orders or regulations made thereunder has been or is being
----------------------
contravened, shall be liable to confiscation;
----------------------
No penalty imposed or confiscation made under this Act shall prevent ----------------------
the imposition of any other punishment to which the person affected thereby is
----------------------
liable under any other law for the time being in force.
----------------------
7.10 COMPUTER RELATED CRIMES UNDER INDIAN
----------------------
PENAL CODE
The definition of the electronic record was added to the Indian Penal Code ----------------------
in the year 2000 at the time of enactment of the Information Technology Act ----------------------
and had the same meaning as per Section 2(1) (t) of the Information Technology
Act. By virtue of this addition, all offences relating to documents became ----------------------
applicable to electronic records.
----------------------
1. Forgery (Section 463)
----------------------
Whoever makes any false document or a false electronic record or part of
a document or electronic record, with an intent to cause damage or injury ----------------------
to the public or to any person or to support any claim or title, or to cause
any person to part with property or to enter into any express or implied ----------------------
contract or with intent to commit fraud or that fraud may be committed
----------------------
commits forgery.
2. Making a false document (Section 464) ----------------------
A person is said to make a false document or false electronic record – ----------------------
Firstly, Who dishonestly or fraudulently ----------------------
a) makes, signs, seals or executes a document or part of the document
----------------------
b) makes or transmits any electronic record or part of any electronic
record ----------------------
c) affixes any electronic signature on any electronic record ----------------------
d) makes any mark denoting the execution of a document or the
----------------------
authenticity of a electronic signature with the intention of causing
it to be believed that such document or part of the document, ----------------------
electronic record or electronic signature was made, signed, sealed,
executed, transmitted, affixed by or by the authority of a person by ----------------------
whom or by whose authority he knows that it was not made, signed,
----------------------
sealed, executed or affixed.
---------------------- l Such imputation should have been made (a) by words either spoken
or written (b) by signs or (c) by visible representations
---------------------- l The said implications should have been made with intent to harm or
---------------------- knowing or having reason to believe that it will harm the reputation
of such persons.
---------------------- The defamatory matter must be published; i.e. communicated to some
---------------------- person other than the person about whom it is addressed. Thus this section
finds applicability when defamatory material is posted on a website or a blog.
---------------------- However, communication of defamatory material by email to the person
concerned will not amount to defamation.
----------------------
Section 501, IPC states that whoever prints any matter, knowing or having
---------------------- good reason to believe that such matter is defamatory of any person would be
liable to imprisonment up to two years or fine or both. Thus the publisher of a
----------------------
newspaper in which the defamatory matter is printed is liable under this section.
----------------------
Summary
----------------------
●● The primary objective of the Information Technology Act, 2000 was to
----------------------
promote
●● e-commerce and e-governance and thus cyber crimes were not addressed ----------------------
thoroughly. However the Act addressed three primary issues in respect of
----------------------
cyber crimes which are source code theft, hacking and cyber pornography.
All these three are made cognizable and non-bailable offences. In addition ----------------------
to this liability of third party, content is fixed on the Network Service
Providers or the intermediaries unless the NSP is able to show that he had ----------------------
no knowledge of the violative content or that he had shown due diligence
----------------------
to prevent the commission of the offence. This section was put to test
when the NRI CEO of an auction site ebay was arrested in the year 2004 ----------------------
for hosting an obscene clip on its website.
----------------------
●● The object of the Act was also to establish an infrastructure for creating,
circulating and authenticating Electronic Signature Certificates. Hence ----------------------
the Public Key Infrastructure was established (PKI) which is a three tier
structure consisting of Controllers, Certifying Authorities and Subscribers. ----------------------
Each constituent of the PKI have certain roles and responsibilities defined
----------------------
under the Act. In order to ensure the compliance of these roles and
responsibilities by the constituent in letter and in spirit, any violation by ----------------------
the constituent has been made a criminal offence.
Cyber Offences 133
Notes ●● In addition, as the electronic record has been defined under the Indian
Penal Code, all provisions/offences applicable to the document are now
---------------------- applicable to the electronic record.
----------------------
Keywords
----------------------
●● NSP: Network Service Provider.
---------------------- ●● Phishing: Method of stealing user id and password (also referred to as
---------------------- identity theft).
●● DSC: Electronic Signature Certificate.
----------------------
●● CA: Certifying Authority.
---------------------- ●● ISP: Internet Service Provider.
----------------------
Self-Assessment Questions
----------------------
1. Is Hacking nothing but Electronic mischief?
----------------------
2. What is the law against cyber pornography in India? Discuss with case
---------------------- studies.
---------------------- 3. Is data theft a criminal offence? What are the provisions under Indian
law that will protect data and source code against unauthorized access,
---------------------- copying or theft.
---------------------- 4. What is an intermediary. Discuss the liabilities of network service
providers under the Act. Discuss with the help of ebay case.
----------------------
5. What is cyber defamation? What is the punishment for cyber defamation?
---------------------- 6. What are the powers of the Controller in respect of Electronic tapping and
---------------------- decryption?
7. What is a protected system? How is it ‘protected ‘ against unauthorized
---------------------- access?
---------------------- 8. Discuss the offences relating to Electronic Signature Certificates.
---------------------- 9. Is making a forged electronic record a crime? Discuss.
---------------------- i. –c
ii. –d
----------------------
iii. – a
----------------------
iv. – b
134 IT Act (Cyber Context)
Check your Progress 2 Notes
State True or False.
----------------------
1. False
----------------------
2. True
3. False ----------------------
----------------------
Check your Progress 3
----------------------
State True or False.
----------------------
1. True
2. False ----------------------
3. False ----------------------
4. True ----------------------
----------------------
Check your Progress 5
----------------------
Multiple Choice Single Response.
1. Whoever makes any misrepresentation to, or suppresses any material fact ----------------------
from, the controller or the certifying authority for obtaining any license
----------------------
shall be punished with imprisonment for a term of
i. Up to 2 Years ----------------------
2. In order to obtain a license from controller, the certifying authority has to ----------------------
fill up a prescribed form and submit
----------------------
i. Certification practise statement
----------------------
3. The Act confers powers to the following authority.
iv. All of the above ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
8
Structure:
---------------------- After going through this unit, you will be able to:
• Clarify the ambit and meaning of the Right to Life guaranteed under
----------------------
Art. 19 (1)(a), Art. 19 (2) and Art. 21 under the Constitution of India
---------------------- • Explain the inclusion of the Right to Privacy under the Right to Life
guaranteed under the Constitution of India
----------------------
• Recognize and evaluate the protection available to the Right to Privacy
---------------------- under the existing Cyber Laws
---------------------- • Discuss the Right to Privacy in light of the crimes driven by technology
----------------------
----------------------
---------------------- Any act that may amount to outraging the modesty of a woman is a
criminal offence under the IPC.
----------------------
----------------------
Check your Progress 1
----------------------
Match the following.
----------------------
i. Defamation a. Obscenity
---------------------- ii. Hicklin Test b. Judicial law making
---------------------- iii. Privacy law c. Criminal law
---------------------- Web bugs are programs used by online advertisers to create a database
containing some details of the users. Web bugs could be a part of a banner ad
---------------------- on a website’s web page that a person is viewing. The embedded instructions
would cause the person’s browser to transmit to the advertiser’s server, the URL
---------------------- of the page the person is visiting. Armed with this information, the advertiser’s
---------------------- server is then able to place on the web page, the person is about to view, a
banner ad that it thinks will interest the person. Surprisingly, this is one-way
---------------------- exchange of information and it occurs even though the person has not clicked
on the banner ad.
----------------------
E) E-mail Bugs
---------------------- “The most popular tool is a program which sends intimation to the
---------------------- originator of the e-mail once the recipient opens it. E.g. “Read Notify”
F) Spyware
----------------------
These programs cause the user’s computer to transmit information back
---------------------- to the software developer via Internet. One use of technology is to deliver
advertising content to the user that is tailored to the information that spyware
----------------------
gathers. It could also be used to scan the user’s hard drive to see what other
---------------------- software he has installed, adding this information to a profile of the user that
will be used for marketing purposes. Several developers have been discovered
---------------------- using this technology without informing the user or seeking his consent. The
software can do anything - from generating annoying pop-up advertisements to
----------------------
collecting passwords and credit card numbers.
----------------------
----------------------
Fill in the blanks.
----------------------
1. Internet Protocol Addresses are ____________of the internet user.
2. IP addresses are misused by “_________”. ----------------------
----------------------
----------------------
Suggested Reading
----------------------
1. Caloyannides, Michael. Privacy Protection and Computer Forensics.
----------------------
2. Mittal, D.P. Law of Information Technology.
3. Verma, Amita. Cyber Laws. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
9
Structure:
9.1 Introduction to Intellectual Property
9.2 Copyright in Cyberspace
9.3 Trademark in Cyberspace
9.4 Patent in Cyberspace
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- After going through this unit, you will be able to:
• Explain intellectual property in connection with computers and internet
----------------------
• Discuss copyright in cyberspace, infringement, action against
---------------------- infringement and existing law
---------------------- • Relate trademarks and patents to cyberspace action against infringement
and existing law
----------------------
• Recommend the provisions under various laws for protection of
---------------------- intellectual property in cyberspace
----------------------
----------------------
9.2 COPYRIGHT IN CYBERSPACE
----------------------
What is Copyright?
----------------------
Copyright is about protecting original expression. Copyright protects
“original works of authorship” that are fixed in tangible medium of expression ----------------------
from which they can be perceived, reproduced, or otherwise communicated
either directly or with aid of a machine or device. Copyright arises as soon as a ----------------------
‘work’ is created (or fixed) and registration of it is not compulsory for the owner
----------------------
to seek protection. Copyright does not extent to any idea, procedure, process,
system, method of operation, concept, principle or discovery, unless fixed in a ----------------------
tangible form.
----------------------
Copyright is a right given by the law to creators of literary, dramatic,
musical and artistic works and producers of cinematograph films and sound ----------------------
recordings. In fact, it is a bundle of rights including, inter alia, rights of
reproduction, communication to the public, adaptation and translation of the ----------------------
work.
----------------------
Copyright in Cyberspace
----------------------
As per the Copyright Act, literary work includes computer programmes,
tables, and compilations, including computer databases and thus the scope of ----------------------
the Copyright Act has been extended to cover certain elements in cyber space.
----------------------
A Computer database means a representation of information, knowledge,
facts, concepts, or instructions in text, image, audio, video, that are being ----------------------
prepared or have been prepared in a formalized manner or have been produced
by a computer, computer system, or computer network. Computer programme ----------------------
means a set of instructions expressed in words, codes, schemes, or in any other ----------------------
form, including a machine-readable medium, capable of causing a computer to
perform a particular task or achieve a particular result. ----------------------
Thus software is copyrightable in India. ----------------------
Constituents of Computer Software are -
----------------------
●● Preparatory design materials, like flowcharts, diagrams, written specifications,
form and report layouts, designs for screen displays, etc. ----------------------
----------------------
----------------------
----------------------
Trademark is a mark or sign by which a trader or manufacturer
distinguishes his goods from other traders or manufacturers. In the course of ----------------------
time, when the mark is used frequently by the trader, the trader earns goodwill
and reputation. Thus a trademark has commercial and business value and is a ----------------------
valuable corporate asset which needs protection from misuse.
----------------------
Some peculiar issues relating to trademark violation in cyberspace are
discussed below – ----------------------
Domain Name Disputes ----------------------
The entire basis of the internet is the IP address or the Internet Protocol ----------------------
address. It is that unique address expressed in 4 octets which defines a computer
or a server. This address is an all numeric address which is difficult to remember ----------------------
and hence we have the domain names which correspond to a particular IP address.
The system that relates the IP address to an alphanumeric string of characters or ----------------------
name or Universal Resource Locator (URL) is called the Domain Name System ----------------------
or DNS. For example the IP address “207.82.250.251’ corresponds to the URL
http://www.hotmail.com. The last three letters of a domain name are called the ----------------------
extension. In the US, a vast majority of domains are assigned by a single registry
Network Solutions Inc. (NSI) which uses a multi-level system including top ----------------------
level domain names such as .com, .net, .org etc. Individual country extensions ----------------------
are also assigned such as .in for India, .ca for Canada, .fr for France.
The Internet Corporation for Assigned Names and Numbers (ICANN) ----------------------
a non-profit organization was formed to assume responsibility for IP address ----------------------
space allocation, root server management, etc.
The first step in acquiring a domain name is to contact the ICANN ----------------------
administrator and request for a domain name. If the same is not already assigned ----------------------
In the case of Playboy Enterprises Inc. Vs. Calvin Designer Label, the ----------------------
defendant was using the registered trademark ‘PLAYMATE’ and ‘PLAYBOY’
----------------------
as meta tags as well as domain names on the internet within their site. The
court was pleased to grant preliminary injunction in favour of Playboy Inc. ----------------------
observing that Playboy Inc. had made out a prima facie case or irreparable harm
and injustice. ----------------------
----------------------
Check your Progress 2
----------------------
Fill in the blanks. ----------------------
1. Trademark is a mark or sign by which a trader or manufacturer
_________ his goods from other traders or manufacturers. ----------------------
----------------------
---------------------- Analyse the case Yahoo!Inc. vs. Akash Arora and another.
----------------------
9.4 PATENT IN CYBERSPACE
----------------------
A patent is a monopoly or exclusive right granted by State in favour of an
---------------------- inventor in respect of an invention. It excludes the rights of others for a limited
duration to do certain acts in relation to that invention. It is granted to the person
---------------------- who is entitled to it and who fulfils the prescribed conditions imposed by the
state for such grant. It may also be described as official documentation which
----------------------
gives the patentee right of ownership of an invention.
---------------------- The object of patent law is to encourage scientific research, new technology
---------------------- and industrial progress. The grant of exclusive privilege to own, use or sell the
method or product patented for a limited period, stimulates new inventions of
---------------------- commercial utility. As observed in the case of Bishwanath Radhey Shyam vs.
Hindustan Metal Industries reported in AIR 1982 SC 1444, a patent is granted only
---------------------- for an invention which must be new and useful. It must have novelty and utility.
---------------------- India, like the European Union, does not allow patents for inventions
related to software. The following are not inventions within the meaning of the
---------------------- Patents Act. A mathematical or business method or computer program per se or
---------------------- algorithms.
In the year 2004-2005, Government of India brought an ordinance to make
---------------------- invention related to computer software imbedded in hardware like computer,
---------------------- mobile, televisions, etc. and having industrial application under the definition
of patentable invention by amending the clause (k) of section 3 under chapter II
---------------------- of Indian Patent Act, 1970. However, the same has not been notified as yet.
---------------------- It is therefore clear that computer program per se is not a subject matter
of the Patents Act but can only be the subject matter of Copyright Act in India.
----------------------
The reason for not considering the software as patentable subject matter
---------------------- was to avoid duality of protection available to software.
Keywords ----------------------
----------------------
Self-Assessment Questions
----------------------
1. Define intellectual property and write a brief note on the law relating to
---------------------- intellectual property in India.
---------------------- 2. Is software protectable? Under which law? Discuss in detail.
3. What is cyber squatting? Describe the dispute resolution mechanism
----------------------
relating to cyber squatting.
---------------------- 4. Explain with the help of case laws as how domain name disputes are
---------------------- treated as trademark violation in India.
5. Are contents of a website protectable? What other intellectual property
---------------------- exists in a website which requires protection.
---------------------- 6. What is deep linking and meta tagging.
---------------------- 7. Is framing illegal in India?
8. Discuss the case of Yahoo! Inc. Vs. Akash Arora in detail.
----------------------
----------------------
Answers to Check your Progress
----------------------
Check your Progress 1
----------------------
Fill in the blanks:
----------------------
1. Copyright does not extent to any idea, procedure, process, system, method
---------------------- of operation, concept, principle or discovery, unless fixed in a tangible
form.
----------------------
2. Software is copyrightable in India.
---------------------- 3. Copyright protection of computer programmes may extend beyond the
---------------------- programmes literal code to their structure, sequence and organization.
4. Copyright in computer programmes mean an exclusive right to make any
---------------------- translation.
---------------------- 5. Research or private study does not infringe the copyright of the work.
----------------------
----------------------
Check your Progress 3
----------------------
State True or False.
1. False ----------------------
2. False ----------------------
3. True ----------------------
----------------------
----------------------
1. Cornish, W.R. Intellectual Property Law.
2. Bainbridge, David. Software Copyright Law. ----------------------
3. Dryer, Rodney. Intellectual Property and the Internet. ----------------------
4. Unni, V.K. Trade Marks and the emerging concepts of Cyber Property ----------------------
Rights.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
10
Structure:
10.1 Introduction to Jurisprudence
10.2 Cyber Jurisprudence
10.3 Some Landmark Cases
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- After going through this unit, you will be able to:
• Explain the concept of jurisprudence in general
----------------------
• Describe cyber jurisprudence
----------------------
• Elaborate on the present position and progress under cyber law for the
---------------------- past 8-9 years in India
---------------------- Cyber terrorism once again came to the fore in India in the form of the
Mumbai attacks. The terrorists were extremely technology savvy, and were
---------------------- using satellite phones with impunity.
---------------------- It was the year, when pushed by the Mumbai attacks, the government
swung into action and got the amendments to the Information Technology Act,
---------------------- 2000 passed in both the houses of Parliament in February 2009.
---------------------- 2008 was also the year in which network service providers started feeling
the heat of the process of law. Various litigations were filed insisting upon
---------------------- them to disclose third party information rendered and made available in their
computer systems. A network service provider got a taste of the result of giving
----------------------
wrong subscriber information to the law enforcers.
----------------------
----------------------
----------------------
10.3 SOME LANDMARK CASES
----------------------
A few landmark judgements were also given under the Information
---------------------- Technology Act, 2000.
---------------------- 1. Bazee.com - Brief Facts
A 17-year-old Delhi schoolboy who, sometime in July 2004, captured his
----------------------
own indiscretion with a female classmate on his mobile phone camera. He
---------------------- then transmitted the images to two friends on their mobile phones, from
whom a three-minute clip got circulated among 50 students. Thereafter,
---------------------- an Indian Institute of Technology (IIT) Kharagpur student, picked up the
video clip from the IIT’s Local Area Network and then posted it on bazee.
----------------------
com, said to be India’s largest Internet auction site. He did this with the
---------------------- help of an electronics firm in Kharagpur. Eight people are reported to
have bought the CD from the site. There is also a report that the CD was
---------------------- available in the Delhi market for atleast a few days.
---------------------- 2. Avnish Bajaj Vs. State (N.C.T) New Delhi
----------------------
---------------------- Shiv Sena activists vandalised cyber cafes in Mumbai and Pune between
November 2006 and May 2007 to protest Orkut communities that ‘hurt’
---------------------- their religious sentiments, it has Google to deviate from its policy on
sharing private user data and set up an arrangement which enabled
---------------------- Mumbai police to directly ask Google to delete ‘objectionable’ content
---------------------- and ask it for IP addresses and service providers.
7. Rediff Communication Limited Vs. Cyber booth
----------------------
Protection to Domain names as trademarks - Action in passing off.
----------------------
Rediff Communication Limited filed suit for a permanent injunction
---------------------- restraining the defendants from using the mark/domain name “RADIFF”
or any other similar name so as to pass off or enable others to pass off
---------------------- their business or goods or services as for the business or goods or services
of the plaintiffs.
----------------------
According to the plaintiffs, the action of the defendants in registering
---------------------- the domain “RADIFF” with NSI and establishing and broadcasting a
web page on the Internet with the title “RADIFF ONLINE” is clearly
----------------------
intended to cause members of the public to believe that the defendants
---------------------- are associated with the plaintiffs and/or part of the Rediffusion group with
whom the words and mark “REDIFF” are exclusively associated.
----------------------
The plaintiffs submit that the defendants have adopted the word
---------------------- “RADIFF” as part of their trading style deliberately with a view to pass
of their business services as that of the plaintiffs and to induce members
---------------------- of the public into believing that the defendants are associated with the
plaintiffs and/or the Rediffusion group by so adopting and using the word
----------------------
“RADIFF” which is deceptively similar to “REDIFF” which is trading
---------------------- name and style of the plaintiffs. The plaintiffs submit that the adoption of
the word “RADIFF” which is deceptively similar to the plaintiffs’ trade
---------------------- name and style by the defendants is dishonest and has been done with
the deliberate intention to pass off the defendants business, goods and
----------------------
services as those of the plaintiffs and thereby illegally trade upon the
---------------------- reputation of the plaintiffs.
----------------------
However, the court found no merit in the contention of the defendant and ----------------------
held that as the websites were widely publicized in the newspapers and
----------------------
magazines, etc, there is always a possibility of the first user accessing the
defendants’ website believing it to be the plaintiffs’ website because of the ----------------------
close similarity in the domain names. A first time visitor to website cannot
possibly distinguish one website from another website which also he has ----------------------
not visited. Besides this, as a result of the adoption of the domain name
----------------------
“RADIFF”, the public are likely to associate the defendants’ domain name
with the plaintiffs and/or as part of the Rediffusion group. Injunction as ----------------------
prayed for was therefore granted.
----------------------
8. Obscene pictures on laptop of a fashion photographer
A Mumbai Sessions court acquitted Belgian fashion photographer, Van de ----------------------
Gaetan, in an obscenity case after the prosecution failed to make out any
----------------------
case against him.
Gaetan had clicked nude pictures of two aspiring models, Tushar ----------------------
Narvekar and Nitin Gupta, following which Mumbai police booked him ----------------------
for obscenity. Ironically, none of the two models ever approached the
police, and the pictures were never circulated, but only sent to the models ----------------------
through e-mail.
----------------------
In the order the court has held that Gaetan’s laptop (which had nude
pictures of models he had taken) was akin to a personal diary, and hence ----------------------
obscenity laws don’t stretch to such personal possessions. The court
held that possession of nude photographs on one’s laptop by itself is no ----------------------
offence...even if they are of male models. ----------------------
----------------------
Check your Progress 2
----------------------
Match the following.
----------------------
i. Bazee.com a. Defamation
----------------------
ii. Avnish Bajaj vs. State b. Obscenity
----------------------
iii. Barkha Dutt case c. Possession of nude photographs
iv. Rediff Communication d. Circulation of Pornography ----------------------
v. Gaetan case e. Trademark ----------------------
----------------------
----------------------
---------------------- 10. Discuss the case of Satyam Infoway Ltd. Vs. Sifynet Solutions (P) Ltd
reported in (2004) 6 SCC 145.
----------------------
----------------------
----------------------
Suggested Reading
----------------------
1. Caloyannides, Michael. Privacy Protection and Computer Forensics.
2. Mittal, D.P. Law of Information Technology. ----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
11
Structure:
11.1 What is Jurisdiction
11.2 Civil Jurisdiction
11.3 Criminal Jurisdiction
Summary
Keywords
Self-Assessment Questions
Answers to Check your Progress
Suggested Reading
---------------------- After going through this unit, you will be able to:
• Specify the problems of jurisdiction in the field of cyber transactions
----------------------
and cyber crimes
---------------------- • Enumerate the challenges of policing the cyberspace
---------------------- • Evaluate the impact of the conflict of laws in respect of cyber
transactions
----------------------
----------------------
11.1 WHAT IS JURISDICTION
----------------------
The most simple definition of the term jurisdiction would be the power
---------------------- of the Court to decide a dispute between two parties. It is the power of the
---------------------- court to decide a matter in controversy and presupposes the existence of a duly
constituted court. This power is conferred on the court by various statutes. The
---------------------- court which has the power to decide a particular dispute is then required to
apply the relevant law of the land to pass a judgment. If a court not having
---------------------- jurisdiction over a particular dispute passes an order, the same is deemed to be
---------------------- void and not binding on parties.
Jurisdiction can be territorial jurisdiction and pecuniary jurisdiction.
---------------------- Pecuniary jurisdiction is the limit of the monetary claim which the court can
---------------------- enquire into and adjudicate. Territorial jurisdiction is the geographical limits to
which the powers of the courts extend to adjudicate disputes.
---------------------- In respect of extra territorial jurisdiction, it has been recognized under
---------------------- the international law that a state may assert extra territorial jurisdiction under
certain circumstances. The principles governing the extra territorial jurisdiction
---------------------- are the following –
---------------------- 1. Territorial Principle
State’s territory for jurisdictional purposes extends to its land and
----------------------
dependant territories. The objective territorial principle is one in which
---------------------- the state exercises jurisdiction over all activities that are completed
within its territory though they may have been initiated elsewhere and
---------------------- the subjective principle is one in which the state exercises jurisdiction
over all activities that commence within its territory even though the final
----------------------
outcome may have occurred elsewhere.
---------------------- 2. Nationality Principle
---------------------- It is for each state to determine under its own law who are its nationals. A
person who is conferred a nationality enjoys its rights and is bound by its
---------------------- obligations irrespective of the place they are. Thus the state may assume
---------------------- extra territorial jurisdiction.
---------------------- It has been held that as per provisions of the Contract Act (1872), S.2(a)
- in Order Confirmation acknowledging receipt of order, registering it subject
---------------------- to terms and conditions overleaf and the general terms are mentioned overleaf
containing clause making dispute subject to jurisdiction of particular court,
---------------------- such a clause forms part of agreement.
---------------------- In the online context, this will find application in a click wrap contract
which is discussed in detail below.
----------------------
It has been further held that as per Contract Act (1872), Sec. 23 and 28 -
---------------------- Contract to vest jurisdiction in one of the courts within whose jurisdiction cause
of action arises is not against public policy.
----------------------
In the online context, this will find application when the contracting
---------------------- parties are from two different countries. Then this ‘forum selection’ clause in
the contract assumes a great significance.
----------------------
It has also been held that as per provisions of Civil P.C. (1908), S. 20(c), to
---------------------- determine the jurisdiction of Court where more than one court has jurisdiction,
---------------------- a contract to vest jurisdiction in one of them is not against public policy.
It is observed by the hon’ble court in the present case that “where there
---------------------- may be two or more competent courts which can entertain a suit based upon a
---------------------- part of cause of action having arisen therein within, if the parties to the contract
agreed to vest jurisdiction in one of such courts to try the dispute which might
---------------------- arise as between themselves the agreement would be valid. If such a contract is
Long-arm statute went a step ahead of ‘minimum contacts’ to look into ----------------------
whether the contacts were sufficient or insufficient to establish “purposeful
availment”, like ----------------------
----------------------
Match the following.
i. Civil Jurisdiction a. US approach on claim of personal jurisdiction ----------------------
ii. Choice of law b. Civil court ----------------------
iii. Long Arm Statute c. Limitation on powers of the court ----------------------
iv. Due Process of law d. Place of performance or location of parties
----------------------
----------------------
11.3 CRIMINAL JURISDICTION
----------------------
The Information Technology Act 2000 is silent about the jurisdiction of
courts and therefore offences under chapter XI of the Information Technology ----------------------
Act will be tried by the JMFC of the Court of Session as per provisions of CrPC
based on the term of imprisonment prescribed under the section. ----------------------
Cyber crimes under the Indian penal code will be tried as per provisions ----------------------
of CrPC.
----------------------
Jurisdiction under Criminal Procedure Code and Indian Penal Code
Jurisdiction under Criminal Procedure Code: ----------------------
As per Section 1 (2) of CrPC, the Code extends to the whole of India. ----------------------
Section 77 states that a warrant of arrest may be executed at any place in
India. ----------------------
---------------------- As per Section 3 of the IPC – Any person liable by any Indian Law to
be tried for an offence committed beyond India shall be dealt with according to
---------------------- this Code for any act committed beyond India in the same manner as if such act
had been committed within India.
----------------------
Section 4 of the IPC provides for extension of the code to extra-territorial
---------------------- offences.
---------------------- The provisions of this code apply to any offence committed by
---------------------- a) any citizen of India in any place without and beyond India
b) any person on any ship or aircraft registered in India wherever it may be.
----------------------
Special Jurisdiction
----------------------
Adjudicating Officer
----------------------
Adjudicating officers have been appointed under the act and has
---------------------- jurisdiction to try contravention of chapter IX of the Act. As per the Information
Technology Act, 2000 jurisdiction of the Civil Court stands ousted.
----------------------
Cyber Appellate Tribunal
----------------------
The Cyber Appellate Tribunal has been constituted to hear appeals from
---------------------- the order of the Adjudicating Officer.
----------------------
State True or False.
----------------------
1. IT Act, 2000 provides for criminal jurisdiction of courts.
2. Section 3 and 4 of IPC deals with extra-territorial jurisdiction of ----------------------
Indian courts. ----------------------
3. The Cyber Appellate Tribunal has been constituted to hear appeals
from the order of the Adjudicating Officer. ----------------------
4. India is a signatory to the Cyber Crime Convention; hence, the Act ----------------------
has adopted the principle of universal jurisdiction.
----------------------
----------------------
Summary
----------------------
●● Cyber Jurisdiction is the extension of principles of international
jurisdiction in cyberspace. As there are no geographical boundaries to ----------------------
transactions/actions on the internet be it civil or criminal issues relating
to multiple jurisdictions and procedural law are inevitable while dealing ----------------------
with disputes arising out of internet based transactions or cyber crimes.
----------------------
●● This unit broadly discusses principles of jurisdiction evolved in India as
well as the US in respect of both civil and criminal jurisdictions. The ----------------------
principles are found in various statutes such as CPC, Contract Act, CrPC,
----------------------
IPC and Information Technology Act 2000. The law is further evolved
through various decisions of the Supreme Court, few of which have been ----------------------
discussed hereinabove.
----------------------
Keywords ----------------------
●● CPC: Civil Procedure Code. ----------------------
●● CrPC: Code of Criminal Procedure.
----------------------
●● IPC: Indian Penal Code.
----------------------
●● SC: Supreme Court.
---------------------- 2. True
3. True
----------------------
4. False
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
12
Structure:
---------------------- After going through this unit, you will be able to:
• Explain the implications of the provisions of the cyber laws that you
----------------------
have learnt in the earlier units by studying real life cases
---------------------- • Interpret various provisions under cyber laws in light of the cases
discussed
----------------------
----------------------
12.1 DOW JONES & COMPANY INC VS. GUTNICK CASE
----------------------
[2002] HCA 56 (Austl.)
----------------------
Online publication of a defamatory article – Jurisdiction
----------------------
Barron’s Online is the online version of the Dow Jones Company’s print
---------------------- publication Barron’s. This publication was available to subscribers of wsj.
com Joseph Gutnick, an Australian resident of the State of Victoria instituted a
---------------------- suit for defamation against the Dow Jones Company for allegedly publishing
a defamatory article in its online publication Barron’s Online in the Victoria
----------------------
Court. Dow Jones challenged the suit on the point of jurisdiction contending
---------------------- that the State of Victoria has no jurisdiction to try and entertain the suit on the
following grounds –
----------------------
a) Barron’s Online was published in New Jersey.
---------------------- b) Location of the server hosting the website wsj.com was located in New
---------------------- Jersey.
Thus the court having jurisdiction would be that of New Jersey and the
---------------------- applicable law would be the New Jersey Law.
---------------------- The point under consideration before the Victoria Court was where the
article was deemed to be published.
----------------------
The Court held that – publication of a defamatory statement is a bilateral
---------------------- act in which the publisher makes it available and the third party has it available
for his or her comprehension. Thus the alleged defamatory article was published
----------------------
with respect of Joseph Gutnick’s cause of action, not when Dow Jones placed it
---------------------- on its hosting web server but only when the subscribers in Victoria accessed it.
The site recorded about 550,000 hits and several hundred downloads had taken
---------------------- place in Victoria by use of credit cards. For these reasons it was held that the
defamation occurred in Victoria. Thus it was held that the jurisdiction of the
----------------------
Victorian Court was legal and proper and applicability of the Victorian law of
---------------------- defamation legal and proper.
The court observed as follows on the policy arguments of Dow Jones
----------------------
company –
----------------------
---------------------- The court dismissed the suit of the preliminary pint of jurisdiction.
The court held that the plaintiff expressly agreed to AOL’s terms of
---------------------- service online by the click of an “I Agree” button. The terms of service included
---------------------- a clause stating that jurisdiction lies to courts in Virginia only. AOL’s customers
must first click on “I Agree” button indicating assent to be bound by AOL’s
---------------------- terms of service before they can use the service. This button first appears on the
web page in which the user is offered a choice either to read, or simply agree
---------------------- to be bound by, AOL’s terms of service. It also appears at the foot of the terms
---------------------- of service, where the user is offered the choice of clicking either an “I Agree”
or “I Disagree” button, by which he accepts or rejects the terms of service. The
---------------------- court held that a valid contract existed, even if the plaintiff did not know of the
forum-selection clause:
----------------------
“Our Court …stated the general rule that the party who signs an instrument
---------------------- manifests his assent to it and cannot later complain that he did not read the
instrument or that he did not understand its contents. Here, plaintiff effectively
---------------------- “signed” the agreement by clicking “I Agree” button not once but twice. Under
---------------------- these circumstances, he should not be heard to complain that he did not see,
read, etc. and is bound to the terms of his agreement.”
----------------------
Citing Bremen vs. Zapata, the court considered whether the enforcement
---------------------- of the clause would be “unreasonable”. It did so by application of a nine-
factor test, including such criteria as the place of execution of the contract,
---------------------- public policy of the forum state, location of the parties and witnesses, relative
bargaining power of the parties, and “the conduct of the parties.” The court
----------------------
concluded that enforcement of the clause would not be unreasonable, and so
---------------------- dismissed the case.
Similarly, in Steven J. Caspi, et al. vs. Microsoft Network, L.L.C., et al,
----------------------
the user could not use the Microsoft Network unless she clicked the “I agree”
---------------------- button next to a scrollable window containing the terms of use. Each plaintiff
In the case of Groff vs. America Online, Inc., the court had also taken ----------------------
into consideration the “place of execution” of the online contract. It opined the
----------------------
place where the transaction has been performed appears to take place where
defendant’s mainframe is located (Virginia).” And not the place Rhode Island ----------------------
when the plaintiff clicked the “I agree” button.
----------------------
It thus can be concluded that the Courts have started taking into
consideration the location of computer network to ascertain where the cause of ----------------------
action for a suit arose in order to confer jurisdiction on a particular court.
----------------------
Thus Click Wrap contracts are enforceable contracts and cannot be set
aside at the instance of the user on the ground that he was not aware of the ----------------------
terms and conditions to which he has given his assent to provide the terms and
conditions were brought to his notice by some means. ----------------------
----------------------
12.3 YAHOO! INC. VS. AKASH ARORA CASE
----------------------
1999 PTC (19) 201
----------------------
In Yahoo! Inc. vs. Akash Arora; the defendant was restrained from using
the domain name “yahooindia.com” which had the format, content and colour ----------------------
scheme identical to the plaintiff’s “yahoo.com”. It was observed by Dr. M.K.
Sharma, J. of the Delhi High Court that “if an individual is a sophisticated ----------------------
user of the Internet, he may be an unsophisticated consumer of information and
----------------------
such a person may find his/her way to the different internet site which provides
almost similar type of information as that of the plaintiff and thereby confusion ----------------------
could be created in the mind of the said person who intends to visit the Internet
site of the plaintiff, but in fact reaches the Internet site of the defendant”. ----------------------
Further, The Delhi High Court rejected the argument that the provisions ----------------------
of the Indian Trademark Act would not be attracted to the use of the domain
trade name or domain name on the Internet. It held that although the word ----------------------
‘services’ may not find place in the expression used in sections 27 and 29 of the ----------------------
Act, services rendered have to be recognized for an action of passing off. That
is, the two marks/domain names “Yahoo!” of the plaintiffs and “yahooindia” of ----------------------
the defendants are almost similar excepting for the use of suffix ‘India’ in the
latter. ----------------------
---------------------- Summary
---------------------- ●● All the aforesaid cases highlight the jurisdictional aspect when it comes to
dealing with online transaction and disputes arising therefrom. Jurisdiction
----------------------
is a very important and crucial area when it comes to online transactions
---------------------- and its implications on civil as well as criminal actions. Some well
established principles on the point of jurisdiction which have been laid
---------------------- down by precedents from a catena of decisions of various national and
international courts have been applied to transactions on the internet as
----------------------
we have seen from the cases discussed hereinabove. Though the internet
---------------------- and computer law is in its nascent stage and developing, some age old
principles still have application to the transactions carried out using this
---------------------- new and dynamic medium without much difficulty.
----------------------
Keywords
----------------------
●● Defamation: An intentional false communication – either published or
---------------------- publicly spoken.
---------------------- ●● Jurisdiction: Power of the Court to adjudicate a dispute.
●● Damages: A pecuniary compensation or indemnity, which may be
---------------------- recovered in the courts by any person who has suffered loss, detriment
---------------------- or injury.
●● Publication: To make public, to make known to people in general.
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------
----------------------