Professional Documents
Culture Documents
10 Year Cyber Law Part-3
10 Year Cyber Law Part-3
(161)
162 B.Com./1I Year / SEMESTER-I / Paper BC 3.4 (b) [CBCSI
Or
(a) Define the term Domain Name'. What are the different types of disputes
with respect to domain name? 9
(6) How is Conventional Crime different from Cyber Crime? 6
Ans. (a) Domain name is your website name. A domain name is the address where
Internet users can access your website. A domain name is used for finding and identifying
computers on the Internet. Computers use IP addresses which are a series of number.
However, it is difficult for humans to remember strings of numbers. Because of this, domain
names were developed and used to identify entities on the Internet rather than using IP
addresses. A domain name can be any combination of letters and numbers, and it can be
used in combination of the various domain name extensions, such as .com, .net and more.
The domain name must be registered before you can use it. Every domain name is unique.
No two websites can have the same domain name. On the Internet, your domain name is
your unique identity. Any individual, business or organization planning to have an Internet
presence should invest in a domain name. Having your own domain name, website and
email addresses will give you and your business a more professional look. Another reason
for a business to register a domain name is to protect copyrights and trademarks, build
creditability, increase brand awareness and search engine positioning.
Domain name disputes are generally occurred in the form of Cyber Squatting. Cyber
Squatting means where two persons or business entities claim for the same Domain Name
either by claiming that they are the legitimate owner of the domain name as they had
registered the name first or using something similar to the previously registered domain
name. It is usually done to give deceptive impression that there is some kind of afiliation
with the trademark which is being used as a web address. For example two similar names
i.e. www.yahoo.com and www.yaahoo.com are used by two different identities in order to
gain profits by using the name of popular business identity in its own domain name.
CASES OF DISPUTES
1. Bharti Cellular Ltd.-It is the most widely known case. Bharti Cellular Ltd. fileda
case in the Delhi High Court that some cyber squatters had registered domain names such
as barticellular.com and bhartimobile.com with Network solutions under different fictitious
names. The court directed Network Solutions not to transfer the domain names in question
to any third party and the matter is sub-judice.
2. Yahoo Inc. vs. Akash Arora-Facts of the case-Yahoo had sued one Akash Arora
for use of the domain name "Yahooindia.com deceptively similar to its "Yahoo.com. The
defendant raised the issue that its website had a disclaimer that it was not connected to the
plaintiffs website and due to this there was no confusion of any kind.
Judgement-The court found that the marks were similar and the disclaimer would not
avoid confusion. Moreover the word yahoo was protected as it is well known trademark
used by the plaintiff and was distinctive.
Domain names have become precious commodities as the internet has no boundaries
and no closing hours and unlike trade marks cach domain name is unique. This means there
can often be some pressure to be the first to register a domain name, and this can lead to
disputes on the "right" to register. As a result domain name disputes can arise. Domain
names and disputes are managed according to policies set by ICANN (Internet Corporation
for Assigned Names and Numbers). ICANN passes over
responsibility
for the registration
of domain names to registrars. There are over 1,500 accredited registrars each with their own
policies and procedures tor registering, maintaining and handling domain names. Registrars
are determined not to be included or accept liability for any dispute. The courts have
maintained this protection for registrars.
Disputes concerningsocalled generic Top Level Domains(gTLD) such as biz, com
info, name, .net, and .or8. are managed by an ICANN-authorised dispute resolution servie
provider.
Cyber Crime and Laws: 2017 163
(b)
Basis Cyber Crimes Conventional Crimes
No.
1. EvidenceCyber
1. Evidence criminals use digital medium Traditional criminals usually
of offences which does not require their physical leave traces of a crime,
presence in committing a crime. Thus, it through either fingerprints or
leaves very little evidence about the|other physical evidences.
cyber crime which makes it a difficult
task for forensic investigators to catch|
the cyber criminals.
2. Fake The Internet also allows the anonymityIt is difficult for traditional
identity of its users, and this implies that cyber criminals to fake their
| criminals can use any fake identitygender, race, or age.
|while committing a crime.
3. Length of The length of investigations is also Traditional crimes take
investigati- |different between traditional crimes and |shorter time period to
on cyber crimes. Since cyber crime involves investigate because the
|fake identities and remote locations, it criminals usually leave
usually takes longer to locate and|evidenc such as DNA,
identify the true cyber criminals and fingerprints,
apprehend them. photographs
and videos captured on
Surveillance cameras, identity
cards that can be used to
identify and capture the
4. Easy culprits.
Cyber criminals can use the Such rescue is not available in
rescue Constitution to protect themselves from conventional crimes where
prosecution. This implies that even in other evidences can be
situations where cyber criminals are |generally found.
apprehended, investigator cannot force
| them to present a proof for a committed
crime due to the existing legal provision|
saying that nobody can be forced to|
|become a witness against himself in any
criminal case. Thus the investigation
may take long time unless the|
investigators 8athered irrefutable
evidence about the crimes.
5. Force Cyber crimes do not require the use of| Most of the iraditional crimes
involved any force over victim since the criminals| (such as rape, murder, arson,
merely get face to face with the victim to and burglary among others)
steal from them. For example, cyber|involve the use of excessive
criminals use spoofing and pishing to| force that results in physical
obtain personal information such as injury and trauma on the
credit card numbers from their victims, |victims.
or use encrypted emails to coordinate a
theft remotely.
164 B.Com./II Year / SEMESTER-IIl/ Paper BC 3.4 (6) [CBCS]
Q. 2. (a) What are the various advantages and disadvantages of using the
internet? 9
(6) What are the 'e-forms'? Describe the advantages of using e-forms. 6
Ans. (a) See Q.1, Page 22.
(6) As per section 2(r) "electronic form", with reference to information, means any
information generated, sent, received or stored in media, magnetic, optical, computer
micro film, computer generated micro fiche of similar device.
memory,
Electronic Form-An e-form (electronic form) is a computer program version of a
paper form. Aside from eliminating the cost of printing, storing, and distributing pre-
printed forms, and the wastage of obsolete forms, e-forms can be filled out faster because the
programming associated with them can automatically format, calculate, look up, and
validate information for the user. With digital signatures and routing via e-mail, approval
cycle times can be significantly reduced. With electronic submission of completed forms,
you can eliminate the cost of rekeying data and the associated errors. Compared to paper
forms, e-fornms allow more focus on the business process or underlying problem for which
they are designed (for example, expense reporting, purchasing, or time reporting). They can
understand the roles and responsibilities of the different participants of the process and, in
turn, automate routing and much of the decision making necessary to process the form.
Some e-form products now support many of the well established Internet/ intranet
protocols. Organizations that rely on intranets and the Internet for internal, public. and
business-to-business communications can further benefit by integrating intelligent e-forms
for data collection and process automation. Many software programs include e-forms as an
integral part of the application.
Electronic records have the advantage that they are reusable. One can very quickly
adapt a record or compile a new record on the basis of an existing one. This digital
advantage is at the same time vulnerability because adaptations or changes are not always
observable. Because of this, the reliability of electronic records might be questioned. Finding
methods for guaranteeing the reliability of digital documents in general, or electronic
records in particular, is the subject of researching various professional fields. At present, ne
of the most widely suggested solutions is digital signing electronic records. More
specifically, the use of asymmetric cryptography and the digital signature is advanced as a
proof of authenticity and integrity for electronic records. This technique might also be usable
to ensure the reliability of electronic records.
Dr
(a) Describe the term 'e-contract'. What are the essentials of e-contract? 9
(b) What is 'Internet Governance'? Who governs the internet?
Ans. (a) See Q.5.(b), Page 154.
(b) Internet governance is the development and application of shared principles, norms,
rules, decision-making procedure and program that shape the evolution and use of the
internet.
According to Yochai Benkler, there are three layers of governance
1. Physical infrastructure layer (through which information travels).
2. Code or logical layer (controls the infrastructure).
3. Content layer (contains the information signalled through the network).
Who governs the internet?
Internet is not governed by any organisation rather it is coordinated by many volunteer
arganizations. ISOC (Internet Society), an open membership professional society is the
hiogest organisation which works for internet development and benefit the
the world. A large number or organizations, corporations, government people arouna
agencies ana
individuals are the members ot IsC. IsOC's membership is open for alil. It mainly
Cyber Crime and Laws: 2017
165
summoning and entorcing the attendance of any person and examining himn
() on oath;
b) requiring the discovery and production of documents or other electronic
records;
) receiving evidence on affidavits;
(d) issuing commissions for the examination of witnesses of documents;
e) reviewing its decisions;
dismissing an application for default or deciding it ex parte;
g) any other matter which may be prescribed.
0) Every proceeding before the Cyber Appellate Tribunal shall be deemed to be a
dicial procceding within the meaning of sections 193 and 228.
Appeal to High Court: Any person aggrieved by any decision or order of the Cyber
ppellate Tribunal may file an appeal to the High Court within sixty days from the date of
ommunication of the decision or order of the Cyber Appellate Tribunal to him on any
uestion of fact or law arising out of such order: Provided that the High Court may, if it is
atisfied that the appellant was prevented by sufficient cause form filing the appeal within
he said period, allow it to be filed within a further period not exceeding sixty days.
(ii) Cyber contravention is a violation of a cyber law that does not result in criminal
roceedings but may result in civil proceedings. The punishment may range from payment
f compensation or penalty while cyber offences can be defined as the executions of an act
hat is prohibited by cyber laws. This type of crime may result in criminal prosecution and
fender may be punished with imprisonment or heavy fine.
Cyber contraventions are "civil wrong" for which compensation is payable by the
lefaulting party. Cyber offences on the other hand constitute cyber frauds and crimes which
are "criminal wrong" for which punishment, imprisonment or fine is prescribed by the IT
Act, 2000.
(h) See Q. (b), Page 147.
Or
a) How is a Controller of Certifying Authority appointed? What are his
unctions under the IT Act, 2000? 9
(b) Briefly discuss meaning and punishment for publishing or transmitting
bscene material in electronic form.
Ans. (a) See Q. 1(a) Page 127.
(b) See Q. 1(b)i), Page 128.
Q.5.(a) What do you mean by intellectual property? Briefly discuss the various
ypes of intellectual property.
(b) What do you understand by 'Digital Signature Certificate' as per the IT Act
000? What purpose does this certificate serve? 6
Ans. (a) See Q. 4(b), Page 151.
(b) See Q. 3, Page 110.
Or
(a) Discuss the role of "Certifying Authority" as per the Information
echnology Act, 2000. 9
(b) What do you understand by the term 'Copyright'? Explain the provisions
eiating to copyright infringement.
Ans. (a) See Q. 4(a)(ii), Page 148.
Copyright is a legal right created by the law of a country that grants the creator of an
Sinal work exclusive rights for its use and distribution. This is usually only for a limited
Me.
168 SEMESTER III
B.Com./II Year [CBCS]
Cyber Crime and Laws-2017
to authorise or
Copyright infringement : Copyright owners generally have the right
prohibit any of the following things in relation to their works: copying the work in any way.
For example, photocopying, reproducing a printed page by handwriting, typing or scanning
into a computer, or making a copy of recorded music issuing copies of the work to the
of the work to the public. However, Some lending of
public renting or lending copies
Scheme and this lending does not
copyright works falls within the Public Lending Right work in
intringe copyright performing, showing or playing the public. Obvious examples
are performing plays and music, playing sound recordings
and showing films or videos in
involves performance of music
public. Letting a broadcast be seen or heard in public also
and other copyright material contained in the broadcasting the
work or other
communication to the public by electronic transmission. This includes puting copyright
material on the internet or using it in an on demand service where members of the public
choose the time that the work is sent to them making an adaptation of the work, such as by
translating a literarydramatic work, transcribing a musical work and converting a
or
code. Copyright is infringed when
computer program into a different computer language or
whether directly or indirectly and
any of the above acts are done without permission,
within
whether the whole or a substantial part of a work is used, unless what is done falls
the scope of exceptions to copyright permitting certain minor uses.
that
Copyright is essentially a private right so decisions about how to enforce your right
is what to do when your copyright work is used without your permission, are generally for
Deliberate infringement of copyright on a commercial scale may be a criminal
you to take.
offence.