Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Double spending digital payment: Double-spending occurs when 3.

To assist e-governance to encourage the use and acceptance


someone alters a blockchain network and inserts a special one that of electronic records and digital signatures.
allows them to reacquire a cryptocurrency. Double-spending can
happen, but it is more likely that a cryptocurrency is stolen from a 4. Provide legal recognition to digital signatures and
wallet that wasn't adequately protected and secured. documents filed electronically.

Difference between digital payment and cryptocurrency: Digital 5. Enable finalization of contract and creation of rights and
payments are electronic payments that transfer value from one account obligation in digital space.
to another using a digital device or channel. Cryptocurrencies are
decentralized digital currencies that use cryptography to manage their 6. A provide for appointment of a controller to supervise the
ledgers and balances. certifying authorities who issue digital signature certificates.

Hash key  Asymmetric keys 7. Deal with tampering of computer source document, public
information which is obscene in nature and issues related to
Crypto mining: Crypto mining is the process of validating a damage to computers and computer systems.
cryptocurrency transaction. Cryptocurrencies like Bitcoin use
distributed public ledgers to record all financial transactions. Each 8. Make consequential amendments in IPC, Evidence Act and
transaction is linked to the previous and subsequent transactions, to provide for essential changes in other related legal laws
which creates a chain of time-stamped records called a blockchain. too.

Who will be liable if anything is posted on social media? Digital Signature

Digital signature: is an electronic signature that can be used to The technical behind digital signature. Digital signature is most
authenticate the identity of the sender of a message or the signer of the developed and secured technology for electronic authentication it is
document and to ensure that the original content of the message or based on cryptography which data encryption technic. It uses
document that has been sent is unchanged. A person has to obtain a mathematics to encrypt and decrypt data. The process work through a
digital signature certificate from certifying authorities. The person cryptographic algorithm which is called Cipher. Cipher is a
whose name the certificate is issued is know as the subscriber. Main mathematical function used for encryption and decryption of the
uses of affixing digital signature: 1. To authenticate the identity of message it works in the combination of keys. The key is used to
signature, 2. To authenticate the document sent, 3. Non repudiation. encrypt sender’s plain text and decrypt the encrypted text for the
receiver’s access.
Asymmetric key system: it means there is 2 keys one is private key
and other one is public key. Data which can be read without any special means is called the plain
text whereas the one that needs to be decoded is the Cipher text so
Private key and public key and how do you create and verified digital plain text + key that will result in Cipher text (When sender aapne
signature? plain text ko private key se pair karega vo encrypt hoga them it will
become Cipher Banega, public key is open to the open domain which
Enactment of information technology act. is use for Decrypting and private key is available to encrypting person
which is sender) private key is accessible to each party it is not
Advancement in technology made transaction a lot easier faster and available in the public domain.
cheaper. Traditional paper, documents were replaced by transactions
taking place in electronic medium with a help of Electronic Data What is Hash function is?
Interchange (EDI). In the modern times most of the transaction of a
daily life for instance e-transactions, e-banking and e-contracts have A hash function is a mathematical algorithm that transforms data of
incalculable benefits, however, people reluctant to interact arbitrary size into fixed-size values. These values are commonly
electronically because there was no legal protection under existing referred to as hash codes, hash digests, or simply hashes. Here are
laws. Internationally countries switched their trade and commerce to some key points about hash functions:
e-commerce from traditional paper-based arrangement it benefited the
international trade tremendously. The UN citral united nation 1. Purpose: Hash functions are used for various purposes,
commission on international trade law (UN Citral)adopted the model including data storage, retrieval, and security. They take an
of on electronic commerce in 1996 for the first time and there was a input (called a key) and produce a fixed-length output (the
need felt toward bringing uniformity in laws of different countries the hash value).
general assembly of the united nations by resolution number 51/162
2. Mapping: A hash function maps the input key to an integer
dated 30th January 1997, recommended that all states should give
value, which is typically used as an index in a data structure
favorable consideration to this modern law when they enact and revise
like a hash table.
their laws modern law provides for equal legal treatment of users of
electronic communication and paper based communication. 3. Fixed Size: Regardless of the input size, the output from a
hash function is always of fixed length.
Furthermore, in Indian contest there was no suitable law to deal with
tampering of computer source documents, publishing information 4. Deterministic: Hash functions are deterministic, meaning
which is obscene in nature and issues relating to damage o computers the same input will always produce the same hash value.
and computer system through a system of appropriate penalties and
punishments. 5. Uniform Distribution: Good hash functions aim for
uniform distribution of hash values to minimize collisions
After the adoption of modern law on electronics in 1996 India being a (when two different inputs produce the same hash).
signatory had to modify its national laws therefore Information
technology act, 2000 was pass sence their was no controller or body to 6. Examples: Common hash functions
supervise the certifying authorities (sec 2g) who would issue digital include SHA-256, MD5, and SHA-2.
signatures. It was also absorve in 1998 the WTO switched there work
programme to e-commerce this was the one reason of enactment of
proper law to recognize and facilitate any thus IT law.
What is PKI process?
The objectives of IT law:
Public Key Infrastructure (PKI) encompasses everything used to
1. The most important objective was to make the law in tune establish and manage public key encryption. It plays a crucial role in
with modern law on e-commerce adopted by UN Citral in securing and authenticating digital communications. Let’s delve into
1996. the details:

2. To provide legal recognition to transactions caried out by 1. Digital Certificates: PKI relies on digital certificates.
means of electronic communication it also facilitates These certificates cryptographically link a public key with
electronic filing of documents.
the device or user who owns it. They serve as digital incompatible with the signature. It is the technologically specific act
passports, ensuring that the sender is who they claim to be. that accept digital signature section: 2(1)(p) as an authentication
standard.
2. Components of PKI:
Digital signature means authentication of an electronic record by a
o Certificate Authority (CA): The CA is a trusted subscriber by means of an electronic method in accordance with
entity that issues, stores, and signs digital section: 3.
certificates. They sign the certificate with their
private key and publish the corresponding public Section: 3 talks about the whole process
key.
Asymmetric Signature
o Registration Authority (RA): The RA verifies
the identity of users or devices requesting digital Sec. 3: authenticating physical signature, corresponding to something
certificates. It can be a third party or the CA itself. which is similar to physical, it is technologically specific. Only that
digital signature is valid in which asymmetric technology is been used.
o Certificate Database: This database stores digital Works on the asymmetric algorithm. Technology should be
certificates and their metadata (e.g., validity asymmetric signature. Digital signature endorses the electronic
period). signature
o Central Directory: A secure location where In government
cryptographic keys are indexed and stored.
1. Basic
o Certificate Management System: Manages
certificate delivery and access. 2. b/w parties

3. Use Cases: 3. product sharing contract (contract b/w government and


private entity) revenue sharing model, E-tenders, high-tech
o Web Security: PKI secures and authenticates news, notices by the RBI.
traffic between web browsers and servers. For
instance, when you visit a website, PKI ensures Certain amendments in 2008 in IT Act:
secure communication between your browser and
the server. Fishing, identity theft, imp. Insertion of sec 3A.

o Internal Communications: PKI can also secure Sec 3a: international contract which not based on the cryptography
internal communications within organizations, based on those contract parties are contentesting that they have right
ensuring confidentiality and integrity. over those, what is the imp and enforceability of that contract, if your
saying it will authenticate only if it asymmetric contract what will we
4. Goals of PKI: do about contract which are not asymmetric technology.
giving room for other kind of signature. It doesn’t mean that every
o Privacy: Ensures the privacy of messages being signature is right.
sent.
Who has the power under sec 3 and 3a to take away signature? Ans.
o Authentication: Verifies that the sender is who Central government
they claim to be.
Digital signature is full of statutory obligations having certain
Remember, PKI is foundational for technologies like digital signatures evidentially attributes such as signers’ identity, intent and approval and
and encryption, enabling secure interactions across large user therefore they are like power with hand written signatures. Law
populations. doesn’t give recognition to digital signature alone but recognizes the
whole PKI (public key infrastructure process) including standards
Sec 3, 3a which verify and create digitals signatures. The PKI is the regulation
and management of keys and listing the licensing the norms for
1. Authentication of Electronic Records (Section 3): certifying authority and establishing different processes the idea is to
o Any subscriber may authenticate an electronic develop a rational and efficient PKI for systematic allocation and
record by affixing their digital signature. verification of digital signature certificates. 1. The first step the
subscriber can apply for digital signature certificate to certifying
o The authentication process uses an asymmetric authority, 2. certifying authority would check the identity of the
crypto system and a hash function to transform subscriber and verify the documents and the issues the certificate
the initial electronic record into another electronic accordingly. 3. Third the certifying authority forwards the certificate to
record1. the repository maintained by the controller of certifying authority. 4.
Next step subscribers send the digital signed message to relying party
2. Electronic Signature (Section 3A): (could be individual or organization acts and reliance on certificate). 5.
Next the relying party verify the digital signature by using public key
o Subject to the provisions of this section, any of the subscriber and check the validity of the certificate from the
subscriber may authenticate an electronic record depository. 6. Lastly the depository checks the status of certificate and
by affixing their electronic signature. inform the relying party accordingly.
o The concept of electronic signatures ensures the Countries that have adopted the technologically neutral approach:
integrity and authenticity of digital transactions India, Canada, Germany, France, Austraia, US and UK.
and communications2. Technologically specific: Italy, Columbia, Argentina
These sections play a crucial role in establishing the legal framework Hand written digital signature is electronic signature. Retina scanner is
for electronic records and signatures in India, promoting secure and also a electronic signature.
reliable digital interactions
Read the document on Electronic Signature in India
31.01.2024
Digital signature being the most advanced and secured method has
The IT act 2000 has facilitated the development of Digital Signature been endorsed and recognized by sec 3 of the IT Act, 2000. However,
which is the functional equivalent of hand written or physical sec. 3 faces a lot of criticism as it only recognizes digital signature and
signatures. In cyber space the basic legal functions of a signature are excluded all other methods of signing a electronic record. Existing
performed by way of method that identify the sender of an electronic laws are incompatible with technological changes and 2008
record and confirmed that the sender approves the content of that amendment ended the monopoly of digital signatures. The objective
record any attempt to change the content must be seen to be
was to maintain balance between security and flexibility and therefore This case significantly shaped the concept of intermediary liability in
sec 3a was added. India and clarified the responsibilities of online platforms regarding
objectionable content
Electronic signature: is a generic in nature and it technologically
neutral term which includes all methods by which an electronic record *Intermediary platforms must abide by the safe harbor mechanism
can be signed. given in the IT Rules 2021 in order to get the protection from third
party content on their platforms.
Digital Signature: it is a specific way of signing the electronic records.
The courts have, in the past, in cases of obscenity over the internet,
Electronics signature allows all kind of digital signature and Digital considered the provisions of both the IPC as well as the IT Act. For
Signature uses publicly also know as asymmetric technology. instance, in Maqbool Fida Husain v Raj Kumar Pandey, in which an
allegedly obscene painting was offered for sale over the internet, the
KN Govind acharya vs. Union of India: directed the central govt. to Delhi High Court reasoned that since the test to determine obscenity
make its stands clear on second schedule. under both the IT Act as well as the IPC was similar, it was 'necessary
Intermediary carrier(BSNL, Airtel, intermediary publisher(yahoo), to understand the broad parameters of the law laid down by the courts
intermediary seller(Amazon, Flipkart), Avnish Bajaj vs. NCT Delhi in India, in order to determine obscenity.
(Bazzi.com case) read section. 79 of the Act This judgment of the Supreme Court gives welcome relief to
Avinsh Bajaj v. State (NCT) of Delhi (Bazee.com Case) intermediaries. The apex court, in reaffirming the principle of
generalia specialibus non derogant, held that in cases of obscenity
In the Bazee.com case, Avnish Bajaj, the then Managing Director of appearing on the web, once the criminal act had a nexus with the
Bazee (later taken over by E-Bay), faced legal proceedings related to electronic record, the provisions of the IT Act, particularly the safe
online content. Here are the key details: harbor principle under Section 79, could not be ignored.

1. Background:
o Bazee.com was an online platform and 2008 amendment act what were the changes in
marketplace where sellers listed goods and intermediary(originator-intermediary-receiver)
services, and buyers could choose to purchase.
Gate keeper liability in art. 19(1) of Constitution of India
o An obscene advertisement for a pornographic
video titled “DPS Girls having fun” was listed on Certifying authorities
Bazee’s website. The safety filters failed to detect Intermediary liability is defined under Sec 2(w) of the IT Act, 2000
this listing initially.
Read the document on intermediary liability GATEKEEPER
o Although the listing was removed within a couple LIABILITY AND ARTICLE 19(1)(A) OF THE CONSTITUTION OF
of days, several buyers had already purchased the INDIA (manupatra.in)
videos during that short period.
[(w) ―intermediary, with respect to any particular electronic records,
2. Charges: means any person who on behalf of another person receives, stores or
o Avnish Bajaj was accused of committing offenses transmits that record or provides any service with respect to that
under: record and includes telecom service providers, network service
providers, internet service providers, web-hosting service providers,
▪ Section 292 of the Indian Penal Code search engines, online payment sites, online-auction sites, online-
(IPC): Related to the advertisement/sale market places and cyber cafes;]
of obscene objects.
Function of intermediary can be understood in terms of its role as a
▪ Section 67 of the Information facilitator with respect to particular electronic message between an
Technology Act (IT Act): Related to originator and an addressee. Different role that the intermediary can
causing the publication of obscene identify with are: information carrier (are intermediaries they
objects on the internet. transmit the electronic message without examining its content. These
intermediaries provide access to the internet and are mainly network
3. Legal Proceedings: service provider like Airtel and BSNL, information publishers (they
publish and transmit information like Yahoo and Google, etc.) and
o A summoning order was issued against Avnish information seller (these are intermediaries which sell the
Bajaj by the competent court. information like Amazon, Flipkart, etc.).
o Avnish Bajaj filed a petition under Section Before the amendment in 2008 safe harbor protection was not there for
482 before the Delhi High Court seeking the intermediaries. Before amendment safe harbor protection was only
quashing of the summoning order. provided to the network service provider or information carriers but
information publishers and E-commerce websites were exempted from
o The court observed a prima facie case for the it.
offense under Section 292 (2) (a) and 292 (2) (d)
IPC against the website, both in respect of the AVNISH BAJAJ VS. STATE OF NCT DELHI.
listing and the video clip.
CHRISTIAN LOUBOUTIN SAS Versus NAKUL BAJAJ & ORS.,
o Notably, the Indian Penal Code does not recognize 2018 253 DLT 728: In this case, Delhi High Court had to decide on
automatic criminal liability attaching to the the liability of an e-commerce platform, darveys.com for infringement
director when the company is an accused. As a of trademark rights of Christian Louboutin whose products were being
result, Avnish Bajaj could be acquitted under sold on the platform. The court distinguished ‘active’ and ‘passive’
Sections 292 and 294 of IPC1. intermediaries and held that Section 79 of the IT Act is to protect
genuine intermediaries and cannot be abused by extending it to those
4. Supreme Court Clarification: persons who are not intermediaries and are active participants in the
o In 2012, the Supreme Court overturned the earlier unlawful act. The Court also laid down certain factors to identify an
judgment, ruling that Avnish Bajaj wasn’t active intermediary, namely identification of the seller and providing
vicariously liable for the company’s actions. He details of the seller; providing quality assurance, authenticity
couldn’t be implicated under the provisions of the guarantees or storage facilities; assistance for placing a booking of the
IT Act because the company wasn’t arraigned as product; creating a listing of the product; packaging of the product
an accused in the case2. with its own packing; transportation; delivery; and advertising
products on the platform, etc. If a large number of elements
enumerated above are present, then such intermediary shall be deemed expression guaranteed under Article 19(1)(a) of the Indian
to be an active participant and would not be exempted under Section Constitution.
79 of the IT Act.
2. Overbreadth and Vagueness: The provision was found to
Google France Sarl vs. Louis Vuitton Malletier SA and Ors. : lay be overbroad and vague, allowing for arbitrary interpretation
down the liability of intermediaries and how do you limit the and misuse.
intermediary liability. Purpose to forter the environment of
intermediary liabilities. 3. Chilling Effect: The court emphasized that the provision
had a chilling effect on free speech, leading to self-
Syllabus of Tutorial: Topic 1: Digital signature and digital signature censorship.
certificate (A Digital Signature Certificate (DSC) is a secure digital
key that verifies the identity of the certificate holder. It's the electronic 4. No Saving under Article 19(2): The court ruled
equivalent of a physical certificate, such as a driver's license or that Section 66A was not saved by the reasonable
passport. DSCs are used to sign documents electronically, and are restrictions provided under Article 19(2).
embedded in emails, electronic documents, and other digitally
transmitted documents.), Public key and Private key (The public key Impact:
is used to encrypt the data, while the private key, which is securely • The judgment clarified the boundaries of free speech in the
stored on the recipient's device, is used to decrypt the data. This digital age.
asymmetric encryption ensures that only the intended recipient can
access and read the encrypted information, even if the data passes • It set a precedent for challenging restrictive laws related to
through unsecured networks), Asymmetric Cryptography online expression.
(Asymmetric cryptography, also known as public-key cryptography,
is a method for encrypting and decrypting messages using a pair of • Section 66A was struck down, ensuring greater protection
related keys. The keys are a public key and a private key), electronic for online speech and expression3.
signature (An electronic signature (e-signature) is a digital version of
a handwritten signature. It is a legally binding computer data This case remains a significant milestone in safeguarding digital
compilation that is used to sign documents online.), Certifying liberties and upholding the right to express opinions freely in India
Authorities and there role, read IT Act along IT certifying authorities
rules, 2000, the types of certificate (class I,II ,III) and uses, issuance
and renewal of certificate (issuance process-application, verification, https://www.tandfonline.com/doi/epdf/
key pair generation, certificate issuance) (renewal- application for 10.1080/13600869.2022.2164838?needAccess=true-Look due
renewal, verification of continued legitimacy, renewal issuance), diligence norms, significant social media intermediary (rule 4), normal
Regulatory Compliance and standard in digital signatures (read IT Act intermediary (rule 3), due diligence requirement, [read page no. 1-13]
and CA rules, 2000), Functions and responsibility of CA, and
obligation and standards they must adhere to in term of issuance and
management of digital signature certificates, used cases and practical
aspects of digital signature (eg: E-governance, E-tenders, Business & https://www.mondaq.com/india/social-media/1266276/a-brief-into-
commercial transaction, Banking & finance, use in legal regulatory the-information-technology-guidelines-for-intermediaries-and-digital-
documents) (Trimex international FZE Ltd. Vs. Vedanta Aluminum media-ethics-code-rules-2021
Ltd.- dispute relating to authenticity and legal validity of electronic
records and digital signature in a contractual agreement between A Brief Into The Information Technology (Guidelines For
Trimex and Vedanta Aluminum, the key issues were: 1. Examination Intermediaries And Digital Media Ethics Code) Rules, 2021
of legal recognition of Digital Signature and there status under IT Act,
2000, . determination of the admissibility of electronic signed Introduction
documents as evidence in the court; the court upheld the legal validity The Information Technology (Guidelines for Intermediaries and
of digital signature and recognized the electronic signature and records Digital Media Ethics Code) Rules of 2021 (hereinafter referred to as
as evidence. 'the Rules') has been enacted by the Central Government under the
Topic 2 Intermediary Liability: What is Safe Habor Protection for powers conferred to it by Section 69A(2), 79(2)(c) and 87 of the
intermediary under section 79 (Shreya Singhal vs. Union of India, Information Technology Act, with thorough coordination with the
2015- section 62A held unconstitutional in India), Due Diligence Ministry of Electronics and Information Technology and the Ministry
Guidelines which is the IT Intermediary Guidelines Rule, 2011 and of Information and Broadcasting. The formulation of these Rules is in
also Digital Ethic Media Code, 2021[Social media intermediary-rule response to the growing criticism against the government, while it
3&4], conditions for availing safe harbor protection given under recognizes the right to criticize and disagree as an essential element of
section 79, (Avnish Bajaj vs. State of NCT of Delhi) (safe harbor democracy. It aims to provide a robust complaint mechanism for social
protection and its scope) media and OTT platform users to address their grievances, a
mechanism earlier inexistent.
Shreya Singhal v. Union of India (2015)
The proposed framework has been quoted to be progressive, liberal
In a landmark judgment, the Supreme Court of India declared Section and contemporaneous, as it lays a special emphasis on the protection
66A of the Information Technology Act, 2000 unconstitutional. This of women against the progression of sexual offences on social media.
ruling, delivered on March 24, 2015, had significant implications for It emphasizes on the need of social media intermediaries and online
free speech and expression in India12. content providers, whether for entertainment or informative purposes,
to strictly comply with the Constitution and domestic laws of India. It
Background: extends its approach to instill a sense of accountability against misuse
and abuse by social media users and is the first of its kind to bring
• Section 66A was inserted into the Information Technology social media use under the regulatory framework of the Information
Act in 2009. Technology Act.
• It criminalized the sending of offensive messages through These rules have been in light of the recent run-down on the OTT
computer resources or communication devices. platforms by the government, which have been actively, rather
vehemently, lobbying for stronger and more stringent regulations in
• The section was widely criticized for its vague language and place. However, contrary to such a view, as per the PIB, the Rules
potential misuse to curb free speech. have been formulated keeping in mind the importance of free speech
Key Points from the Judgment: and journalistic and creative freedoms. Regardless of the political
connotations, the enactment of these Rules puts India at par with
1. Unconstitutionality: The court held that Section international regimes on digital media regulation, providing a more
66A violated the fundamental right to free speech and comprehensive and holistic protection to its users.

Obligation of Due Diligence on Intermediaries


General Guidelines for All Intermediaries following due diligence ought to be observed by such intermediaries
within three months of publication of these rules:8
These general guidelines extent their scope over all intermediaries,
including social media intermediaries as well as significant social i. Appointment of a Chief Compliance Officer, assuming the
media intermediaries. Rule 2(1)(z) omits from the scope of social responsibility to ensure compliance and oversight of the
media intermediaries those intermediaries that facilitate commercial or functions of significant intermediaries
business transactions, provide access to networks, search-engines and
certain other types as specified. ii. Appointment of a nodal person of contact, who would act as
a link between law enforcement agencies
Due Diligence: Rule 4 enlists certain due diligence obligations of an
intermediary, which include the duty to publish their rules and iii. Appointment of a Resident Grievance Officer, whose
regulations, privacy policies and user agreements for access, either on responsibilities would lay parallel to that of the Officer
its website and/or application, to allow its users to access the same. appointed under Rule 4(1)(n)
The material so published must crystalize the user's responsibility not
to "host, display, upload, modify, publish, transmit, store, update or iv. Publishing the compliance report on a periodical basis of six
share"1 any form of information which: months, containing the details and contents of complaints
handled and information removed or interrupted by
i. Belongs to another person intermediaries in pursuit of their monitoring activities

ii. Is defamatory, obscene, pornographic, pedophilic, invasive In order to facilitate the processing of complaints, with respect to the
of one's privacy, libelous, or inconsistent to the laws of the violations mentioned under this Rule, an appropriate mechanism shall
land be developed by the significant intermediary under Rule 5(6). In such
a process, the intermediary must notify the complainant of the extent
iii. Is dangerous for minors of action taken.

iv. Results in the infringement of any intellectual property right First Originator: Rule 5(2) provides an additional responsibility on
significant social media intermediaries involved in providing
v. Is deceiving or misleading regarding the origin of the messaging services to assist the law enforcement agencies to identify
message and track the first originator of any contentious or problematic
information. This can only be executed through an order of a
vi. Impersonates another person competent court or the Competent Authority under Section 69 of the
vii. Hampers the integrity, defense, security or sovereignty of Act. This power can only be exercised in order to curb any offence
the country, friendly relations with foreign states, public threatening the integrity or security of the State, inciting the
order or results in the incitement of any cognizable offence commission of rape, child sexual abuse or other grievous offences.
However, this may not be resorted to on the availability of less
viii. Contains any software virus or any program designed to intrusive means and must be employed as a measure of last resort.
corrupt or interrupt the functionality of any computer
resource Special Measures for Sexual Offences: Other means have been
provided to significant intermediaries in order to curb the commission
ix. Or is patently false and untrue, regardless of its form is or instigation of the offences of rape or child sexual abuse, such as
published or in order to mislead or harass a person under Rule 5(4). Such intermediaries must deploy certain technology-
based measured to promptly identify any material that may depict or
Notifications provided to the User: Apart from merely publishing simulate such offences. This must be done in the absence of any bias
such obligations, the intermediary must notify the user that non- or discrimination, with the highest regard to privacy and free speech.
compliance with the above mentioned may result in the termination of
their access or usage rights.2 Also, these rules and regulations, privacy Voluntary Verification of Users: Users of significant social media
policies or user agreements may be subject to periodical amendments, intermediaries must be provided a facility to voluntarily verify
which ought to be notified to the users in due time.3 themselves under Rule 5(7). The verification can take place on the
basis of their number or account and would provide the user with a
Enforcement Action to be Undertaken: Intermediaries are amenable visible mark of verification. This method to regulate the users has
to halt the hosting, storage or publication of any information been undertaken to eliminate the misuse of these services and provides
prohibited by law, in the interest of national sovereignty, integrity, a greater level of surveillance over their activities.
security, etc., as prescribed under Rule 4(1)(d), on the knowledge of
the same through an order of a court of competent jurisdiction or a Notification to Originators on Removal of Information: In the
Government notification. The intermediary has been provided a strict situation that a significant intermediary has removed or restricted
time limit of thirty-six (36) hours to remove or restrict access to such access to any information or data, they must ensure that the originator
information. Following the removal of such information, the evidence is made aware of the same, including the grounds for such action, after
collected must be preserved for one hundred and eighty (180) days for providing them a reasonable opportunity. Further, Rule 5(8) provides
investigative purposes.4 Further, the process has been prescribed that this process must be overseen by the Resident Grievance Officer.
under Rule 4, with respect to the intermediaries' duty to fully
cooperate with Government and law enforcement agencies. In order to Procedure and Safeguards for Digital/Online Media
address the complaints raised by users or victims, the intermediaries Digital media, as defined under Rule 2(1)(k), represents any digitized
must appoint a Grievance Officer, whose details must be made public, content transmittable through the internet or other networks and
who would acknowledge and resolve such complaints within a period includes the same content as stored or transmitted by intermediaries as
of one month.5 well as publishers of news or online curated content. It includes:9
Additional Compliance Measures for Significant Social Media • news and current affairs publishers,
Intermediaries
• intermediaries enabling the transmission of news and current
Due Diligence: A peculiar feature about the Rules is that it creates a affairs,
distinction between social media intermediaries and significant social
media intermediaries. The demarcation is based on the user size and • online curated content publishers, and
once it has been defined through the notification of the Government, it
would act as the threshold between the two.6 The reason behind this is • intermediaries enabling the transmission of online curated
clarified through Rule 5 which provides additional compliance content,
measures for significant social media intermediaries due to the large
volume of users and content that they process. Barring the criteria of which operate in India and conduct their business activities by making
the user size, the Government can prescribe the provisions of Rule 5 content available in India, targeting Indian users10. However, these
on any other intermediary as well through a notification.7 The following rules applicable to such entities would only come into force
after the lapse of a three month period from the publication of these • 'U/A 13+' which requires parental guidance for viewers
rules.11 below the age of 13 years

Grievance Mechanism • 'U/A 16+' for persons below 16 years requiring parental
guidance, and
An Online Grievance Portal, established by the Ministry within three
months of the commencement of the rules, would act as the central • 'A' for content solely reserved for viewing by adults
repository for accepting and disposing of grievances, with respect to
the Code of Ethics, as per Rule 9(1). In pursuance to this, the Rules Further classifications may be made on the basis of themes and
provides a three-tiered grievance mechanism, consisting of: messages, violence, sex, nudity, drug and substance abuse, etc. These
classification ratings must be displayed in a conspicuous and
i. Level I: Self-regulation by the applicable entity unambiguous manner and place, allowing the user to be aware and
informed. Provisions for access control mechanisms, such as parental
ii. Level II: Self-regulation by the self-regulating bodies of the locks, ought to be made for content classified as U/A 13+ or higher,
applicable entities and in spirit of the same, establishing a reliable verification
mechanism of the age of the viewer for content rated 'A'.
iii. Level III: Oversight mechanism by the Central Government
Criticism
Level I: Under Rule 9(4), the applicable entity would be informed of
the grievance and encouraged to address it themselves, while keeping The introduction of the concept of tracking the first originator
the complainant and the Grievance Portal in the loop. In exercise of under Rule 5(2) has been perceived as rather contentious and
such a power, the applicable entity is required to appoint a Grievance worrisome. It enables significant social media intermediaries
Redressal Officer, who would be governed by the Code of providing messaging services to allow the enforcement mechanism to
Ethics.12 The applicable entity is to classify the online curated content access the originator of any information. This is attempted towards
that it transmits, granting it with an appropriate certificate, as per the curbing the spread of fake news and illegal activities taking place over
Schedule.13 The certification may take place on the basis of the messaging applications. However, cyber experts fear that this would
content, its impact, target audience, etc. and must be displayed in a eventually result in the overriding of the end-to-end encryption,
conspicuous place, allowing the users to be notified of the same before allowing for the formation of a surveillance state. This may result in a
accessing the content14. major privacy breach, which most messaging applications wear on
their sleeve as a badge of honor. The authority of tracking the
Level II: If the procedure under the first level does not take place originator can also be enforced in order to prevent or investigate into
within 15 days, the matter would escalate with the appeal of the an offence relating to the sovereignty, integrity and security of the
complaint to a Self-regulating Body, of which the entity is a member. State. What the Rules fail to identify is the unimaginable scope of
Such bodies ought to be independently constituted by such entities or misuse of such a wide and discretionary power.
their association and headed by a retired judge of the Supreme Court
or a High Court.15 This body would provide guidance on the Code of In addition to this, members of the media fraternity emphasize on the
Ethics and decide on the grievances passed on from the first level. For Rule's implementation to dissolve the freedom of speech. While
the enforcement of such decisions, a self-regulating body can issue analyzing the grievance redressal mechanism, the executive has been
warnings, censoring, require an apology, reclassify ratings of online authorized to rule over the suitability of content published by the
curated content, make appropriate modifications in the content media through the Oversight Mechanism, an unprecedented move that
descriptor, or refer the matter to the Oversight Mechanism under Rule may be perceived as ultra vires of the Constitution. The inter-
12. 16 ministerial committee of bureaucrats have been granted the authority
to adjudicate on matters relating to free speech and journalistic
Level III: In case the Self-regulating bodies fail to offer any solace to freedoms, which may in turn prove not to be conducive for the same.
the complainant, they have the last resort of the Oversight Mechanism
of the Central Government for a resolution, under Rule 12. Such a
measure would be coordinated by the Ministry, who would constitute
an Inter-Departmental Committee for addressing grievances,
under Rule 13. This committee would consist of representatives from
the Ministry of Information and Broadcasting, Ministry of Women and Safe Harbor Protection:
Child Development, Ministry of Law and Justice, and other relevant
Ministries as mentioned.17 The purpose of this Committee is to obtain Safe Harbour Protection for E-Commerce Platforms in India
a holistic and all-encompassing view on the violations under the The concept of safe harbour protection is crucial for e-commerce
Rules. The violations may arise through grievances of Level I and II, platforms operating in India. It shields intermediaries from liability for
on a suo motu basis, or those referred by the Ministry.18 Similar third-party content hosted on their platforms, provided they meet
powers granted under Rule 11(5) would be applicable, including the certain conditions. Let’s explore this topic and relevant case laws:
right to initiate the procedure under Rule 14. This allows the
Committee to take action to ascertain the creator of violative content 1. Definition of Intermediaries:
and block the same content.
o E-commerce entities acting as third-party
Code of Ethics facilitators between buyers and sellers fall under
the category of intermediaries.
The underlying thread that binds the whole Rules together is the Code
of Ethics, mentioned under the Appendix. This spans over News and o Inventory-based e-commerce entities directly
Current Affairs, Online Curated Content and Advertisements. selling goods/services they own do not qualify as
intermediaries.
Online Curated Content
2. Section 79 of the Information Technology Act, 2000 (IT
Providing a comprehensive and an in-depth take on regulating online Act):
curated content, the Code makes reservation for the multi-racial and
multi-religious sphere of India, where due caution and respect ought to o Section 79(1) provides safe harbour immunity to
be paid in the depiction of their activities, beliefs or practices. It intermediaries for third-party information, data, or
classifies content on the basis of its target audience, assigning a: communication links hosted by them.
• 'U' rating for content suitable for children and people of all o To avail this protection, intermediaries must fulfill
ages conditions specified in Sections 79(2) and 79(3).
• 'U/A 7+' for content that can only be viewed by a person 3. Active vs. Passive Intermediaries:
below the age of 7 years with parental guidance
o The distinction between ‘active’ and ‘passive’
intermediaries is crucial.
o In the Louboutin Case, the Delhi High Court • The appellant’s counsel stated that the appellant was
identified factors that determine whether an e- immune as per Section 79 of the Information Technology
commerce platform qualifies for safe harbour Act, 2000, as it acted as an intermediary.
protection:
• The appellant’s counsel states that Section 79 should be read
▪ Identification of the seller and providing in consonance with Section 81. This would mean that
seller details. intermediaries would not be liable if they carry due diligence
and have no actual knowledge of infringement.
▪ Quality assurance, authenticity
guarantees, or storage facilities. • The respondent’s counsel stated that the respondent incurred
business losses as the infringing content was uploaded on
▪ Assistance for product booking the appellant’s site.
(including call center support).
• The respondent’s counsel also states that exceptions under
▪ Creating product listings, packaging, Section 51(a)(ii) of the Copyright Act, 1957 would not be
transportation, delivery, and advertising. applicable as the appellant had the knowledge that infringed
content is being uploaded on their website.
o When an e-commerce website actively participates
in these elements, it crosses the line from being an Opinion of the Bench
intermediary to an active participant1.
• The court opined that Sections 79 and 81 of the Information
4. Impact and Ongoing Evolution: Technology Act, 2000 and Section 51(a)(ii) of the Copyright
Act, 1957 have to be harmonious.
o The jurisprudence around safe harbour standards
for e-commerce entities is still evolving in India. • The bench concluded that to impose liability on an
intermediary, the conditions mentioned under Section 79 of
o Recent developments, such as the 2021 the Information Technology Act, 2000 have to be fulfilled.
Intermediary Rules, have brought safe harbour
protection into the spotlight. • The bench held that having apprehension of unlawful
activities and having precautions for that would not amount
o Courts continue to interpret and refine the scope of to actual knowledge.
safe harbour for e-commerce platforms1.
• The court ordered the respondent to furnish the list of work
In summary, safe harbour provisions play a critical role in balancing to the appellant to be removed within one week.
free speech, innovation, and liability concerns in the digital
ecosystem. E-commerce platforms must navigate these legal nuances • In the case of internet intermediaries, interim relief should
to ensure responsible and compliant operations directly point at the rights being infringed.

Final Decision
“Myspace Inc. v. Super Cassettes Industries Ltd., (2017) 236 DLT • The impugned order was set aside.
478 (DB)”
• The appeal allowed.
Statutes and Provisions Involved
• The Information Technology Act, 2000 (Section 79, 81)
Electronic signatures in India
• The Copyright Act, 1957 (Section 51(a)(ii))
Introduction to electronic signatures.
• The Information Technology (Intermediary Guidelines)
Rules, 2011 (Rule 3(4)) Indian law has recognised electronic signatures, or e-signatures, under
the Information Technology Act, 2000 (IT Act) for over 18 years. With
Relevant Facts of the Case its increased emphasis on improving the ease of doing business;
• The appellant was a social media website owner where third streamlining the storage of records; and improving the safety, security,
parties could upload and review content. The respondent is a and cost-effectiveness of records, the Government of India has
well-known audio and video cassette production music promoted the use of digital technologies by Indian citizens and
company. corporations. As a result, there has been a recent increase in the use of
e-signatures,
• The appellant claimed to be an Internet Service Provider
(ISP) and an internet intermediary having global outreach. with more and more services using them.
• In 2008, the appellant offered the respondent the registration The IT Act treats electronic signatures recognized under it as
for its Rights Management Tools upon which the respondent equivalent to physical signatures, subject to a few exceptions. It also
found infringing content on the appellant’s website. generally allows documents to be signed using any form of e-
• The appellant in turn told the respondent that their content signatures. However, an e-signature must satisfy a number of
has been taken down and placed in a filter to prevent future conditions, and certain checks must be done before it can be relied
violations. upon. This white paper provides an overview of the law in India in
relation to e-signatures and briefly describes how Adobe Sign, an
• The respondent claimed to have sent notice to the appellant electronic signature solution from Adobe, simplifies electronic
for the removal of content to which no heed was paid by the signatures and allows you to sign documents securely.
appellant.
Requirements for validity.
• The plaintiff was granted an interim injunction. The
appellant was dissatisfied with the order of the court and The IT Act broadly provides for the enforcement of electronic
hence, filed an appeal in the High Court. signatures and recognises two types of electronic signature as having
the same legal status as handwritten signatures. This lets companies
Prominent Arguments by the Advocates
choose the method best suited to their unique requirements. The
• The appellant’s counsel argued that the relief provided by methods specifically recognised under the IT Act are:
the single Judge was vague, general, and near impossible to
comply with.
• Electronic signatures that combine an Aadhaar consideration, and capacity of the parties are satisfied. Multiple
identity number with an electronic Know-Your- judgments by Indian courts have held that the formation of a contract
Customer (eKYC) method (such as a one-time can be inferred based on the conduct of parties and that they need not
passcode). This method is known as the eSign online be in writing. This means that a party cannot successfully argue that a
electronic signature service. contract was never formed when he/she has acted upon the contract.
• Digital signatures that are generated by an For instance, an employee cannot dispute the existence of an
“asymmetric crypto-system and hash function.” In electronic contract, if she acted upon it by coming to the workplace
this scenario, a signer is typically issued a long term and performing her duties or drawing salaries or benefits under the
(1- to 2-year) certificate-based digital ID stored on employment contract.
USB token, which is used—along with a personal
PIN—to sign a document. The documents that are executed using such other methods are not
treated the same as documents signed with wet signatures. Therefore,
For the two types of e-signatures to be valid under Indian law, they if the validity of an electronic contract is disputed, the party claiming
must satisfy these additional conditions (Reliability Conditions): validity of the contract must be able to demonstrate that the essentials
of a valid contract are fulfilled and that the parties in fact did execute
• E-signatures must be unique to the signatory (they must be the contract using a technology that followed the Reliability
uniquely linked to the person signing the document and no Conditions.
other person). This condition is met with a certificate-based
digital ID. If email or another form of authentication is used to sign a document
electronically, then the following industry best practices should be
• At the time of signing, the signatory must have control over implemented to help satisfy the requirements of the IT Act:
the data used to generate the e-signature (for example, by
directly affixing the e-signature to the document). • Include a mechanism for verifying the identity of the party
who signed the document (for example, by sending a
• Any alteration to the affixed e-signature, or the document to verification request to a unique email address, or sending an
which the signature is affixed, must be detectable (for OTP to the signing party’s mobile phone).
example, by encrypting the document with a tamper- evident
seal). • Obtain the signing party’s consent to do business
electronically.
• There should be audit trail of steps taken during the signing
process. • Be able to demonstrate clearly that the signing party intended
to sign the document electronically by the particular method
• Signer certificates must be issued by a Certifying Authority used.
(CA) recognised by the Controller of Certifying Authorities
appointed under the IT Act. Only a CA licensed by the • Track the process securely and keep an audit trail that logs
Controller of Certifying Authorities can issue e-signature or each step.
digital signature certificates. View a list of licensed
Certifying Authorities. • Secure the final document with a tamper-evident seal.

If each of the Reliability Conditions is satisfied, then there is a legal Government use of e-signatures.
presumption in favour of the validity of any document signed using an
Government authorities such as the Ministry of Corporate Affairs,
electronic signature.
Department of Revenue, and Ministry of Finance accept electronic
Validity of other forms of electronic signing: records authenticated using digital signatures. In the case of e-filing
with the Ministry of Corporate Affairs, income tax and GST (goods
Documents signed using an electronic means, other than an e- and service tax) filings, digital signatures are the preferred mode of
signature as prescribed under the IT Act, are not invalid. Section 10A execution.
of the IT Act states that contracts that are otherwise validly concluded
will not be rendered invalid merely because they were made in The Reserve Bank of India (RBI) has allowed small finance banks and
electronic form. In the case of Tamil Nadu Organic Private Ltd G payment banks to rely on electronic authentication for confirmation of
Others v. State Bank of India,* the Madras High Court observed that the terms and conditions of the banking relationship. The RBI also
“contractual liabilities could arise by way of electronic means and that allowed a one-time PIN (OTP) based eKYC process for onboarding
such contracts could be enforced through law.” The High Court further customers by all regulated entities, subject to certain conditions.
stated that Section 10A of the IT Act enables the use of electronic
These examples indicate the shii towards the use of e-signatures.
records and electronic means for the conclusion of agreements,
contracts, and other purposes. Where electronic signatures cannot be used:
A contract executed using email as the first authentication method or The following documents cannot be electronically signed and must be
that adds a second factor of authentication, such as a password or executed using traditional “wet” signatures in order to be legally
phone PIN, may be valid under Indian enforceable:
law, provided it satisfies the requirements of the IT Act. The Supreme • Negotiable instruments such as a promissory note
Court in the case of Trimex International Fze Limited, Dubai v. or a bill of exchange other than a cheque
Vedanta Aluminium Limited† held that unconditional offer and
acceptance through emails constituted a valid contract under the • Powers of attorney
Indian Contract Act, 1872 (Contract Act). The Apex Court ruled that
once the contract is concluded orally or in writing, the mere fact that a • Trust deeds
formal contract is yet to be prepared and initialed by the parties would • Wills and any other testamentary disposition
not affect either the acceptance of the contract so entered into or
implementation thereof, even if the formal contract has never been • Real estate contracts such as leases or sale
initialed. agreements
This follows the principles enumerated under the Contract Act, which Other considerations when signing electronically:
recognizes even oral and unwritten contracts, provided that principles
relating to contract formation such as offer, acceptance, lawful Requirement to stamp.
In India, certain documents must be stamped before or at the time of under the provisions of IT Act, 2000. There are a total of eight
execution. Currently, no law in India prescribes a method for stamping Certification Agencies authorised by the CCA to issue Digital
electronic documents. Signature Certificates (DSCs). The details of these Certification
Agencies are available on the portal of the Ministry Certifying
Some states such as Maharashtra, Karnataka, and Delhi specifically Authorities External link image.
extend the requirement for stamping to electronic records. When
stamps are accepted electronically, solutions like Adobe Sign can be 3. Class of DSCs: The Ministry of Corporate Affairs has stipulated
tailored to meet those requirements. a Class-II or above category signing certificate for e-Filings
under MCA21. A person who already has the specified DSC for
Companies should always confirm with their internal legal team any other application can use the same for filings under MCA21
whether a document needs to be stamped before signing and executing and is not required to obtain a fresh DSC.
the document electronically. If a document is signed and executed
electronically and is required to be stamped, then the company should 4. Validity of Digital Signatures: The DSCs are typically issued
ensure that a physical copy of the document is prepared and stamped. with one year validity and two year validity. These are renewable
on expiry of the period of initial issue.
If a document is not properly stamped, then in some circumstances,
financial penalties may be imposed. Some states penalise deliberate 5. Costing/ Pricing of Digital Signatures: It includes the cost of
non-stamping of documents with imprisonment and/or fine (although medium (a UBS token which is a one time cost), the cost of
these provisions are rarely enforced). issuance of DSC and the renewal cost after the period of validity.
The company representatives and professionals required to obtain
If a document is not properly stamped, then in some circumstances DSCs are free to procure the same from any one of the approved
financial penalties may be imposed. Some states penalise deliberate Certification Agencies as per the MCA portal. The issuance costs
non-stamping of documents with imprisonment and/or fine (although in respect of each Agency vary and are market driven.
these provisions are rarely enforced).
However, for the guidance of stakeholders, the Ministry has
Summary: obtained the costs of issuance of DSCs at the consumer end from
the Certification Agencies. The costs as intimated by them are as
The Government of India’s Digital India initiative focuses on digital
under:
infrastructure and aims to transform India into a paperless economy. In
the past few years, the government’s initiative to promote a digitised 6. Obtain Digital Signature Certificate
economy has resulted in a widespread acceptance of electronic records
and electronically signed documents by government authorities. • Digital Signature Certificate (DSC) Applicants can directly
approach Certifying Authorities (CAs) with original
For organisations implementing e-signatures, it is recommended that supporting documents, and self-attested copies will be
only electronic and digital signatures as recognised by the IT Act be sufficient in this case
used to avoid any risks, such as admissibility and enforceability of
documents or contracts signed electronically, before the authorities. • DSCs can also be obtained, wherever offered by CA, using
Aadhar eKYC based authentication, and supporting
Application service providers, like Adobe, offer electronic signature documents are not required in this case
based dedicated solutions designed to address the requirements
discussed in this paper. • A letter/certificate issued by a Bank containing the DSC
applicant’s information as retained in the Bank database can
be accepted. Such letter/certificate should be certified by the
Bank Manager.

Certifying Authorities (CAs) are entities designated under


the Information Technology Act, 2000 (IT Act). Their primary role is
to issue Digital Certificates and manage public-private key pairs.
CAs verify the identity of individuals or organizations before granting
digital certificates, ensuring the authenticity of electronic transactions.
They play a crucial role in maintaining trust and security in the digital
realm by adhering to established standards and guidelines. Certifying
Authorities (CA) has been granted a license to issue a digital signature
certificate under Section 24 of the Indian IT-Act 2000. One can
procure Class 2 or 3 certificates from any of the certifying authorities.

Obtain Digital Signature Certificate

About Digital Signature Certificate (DSC)

The Information Technology Act, 2000 has provisions for use of


Digital Signatures on the documents submitted in electronic form in
order to ensure the security and authenticity of the documents filed
electronically. This is secure and authentic way to submit a document
electronically. As such, all filings done by the companies/LLPs under
MCA21 e-Governance programme are required to be filed using
Digital Signatures by the person authorised to sign the documents.

1. Legal Warning: You can use only the valid Digital Signatures
issued to you. It is illegal to use Digital Signatures of anybody
other than the one to whom it is issued.

2. Certification Agencies: Certification Agencies are appointed by


the office of the Controller of Certification Agencies (CCA)

You might also like