Professional Documents
Culture Documents
Ipr in Cyberspace
Ipr in Cyberspace
UNIT-III
EVOLUTION OF IP IN CYBERSPACDE
• With the mass increase in the use of cyber space, availability of content (electronic form) across
digital platforms increased by many folds; innovation gave rise to the creation of original and
novel content, and intellectual property was disseminated overcoming all geographical
boundaries.
• Cyberspace being a tool of access to data and resources, it expanded human reaches towards
global information. As a result, there developed an undeniable relationship between cyberspace
and IP.
• However, while on one hand, content of various kind including elements of copyright, trademark
and patent became easily available to one and all across digital platforms, on the other, there
arose instances of violation of intellectual property owing to theft of such content which in turn
resulted in complications of piracy and infringement of the rights accruing from such intellectual
properties.
2
Insert Image
• Consequently, the necessity of protecting digital content was acknowledged, and accordingly,
the legal framework of Cyber Law was established to address all concerns of misuse and
misappropriation of intellectual property on cyberspace.
• Intellectual property is fundamentally associated with territoriality, while cyberspace cannot be
restricted within territorial boundaries. As a result of intellectual property being available on
cyberspace, the inherent nature of intellectual property underwent an evolution, thereby giving
rise to newer interpretations of both cyberspace and intellectual properties.
3
Insert Image
COPYRIGHT IN CYBERSPACE
• Cyberspace provides to copyright law a platform to promote and channelize its objectives and
purposes, the most significant of which is to provide to the society access to knowledge for
establishing overall societal advancement.
• The intrinsic philosophy of copyright law is aimed at fostering creativity and innovation which the
copyright owner and/or holder may subject to commercial exploitation; and cyberspace served as
the perfect medium for fulfilling such purposes.
• Not only does the internet eliminate all distinction between private and public use, but it also
creates complications towards the interpretation of use of copyrighted materials thereby diluting the
grounds of copyright infringement.
• The fundamentals of the copyright law state that infringement shall be deemed to have occurred if
the exclusive rights of the copyright owner are exercised without express authorization of the owner
or right-holder. Since the copyright law validates the use and/or reproduction of copyrighted
material for personal/private use, it is essential to understand whether copyrighted content has been
subjected to private use or not for determining the occurrence of infringement
4
Insert Image
• Copyright compliance in cyberspace is hampered by the use of computers, the internet, and
streaming, copying, copy-cutpaste, deep linking, and peer-to-peer file sharing.
• The Indian Copyright Act, which was first enacted in 1957. The Act hasbeen amended five times
since its enactment i.e., in 1983, 1984, 1992, 1994, 1999 and 2012.
• The Copyright (Amendment) Act, 2012 is the most substantial and in alignment with digital
transformation in general ad internet in particular. The Copyright Act is now considered a piece of
law, and the general outlook is that the revised Act will be able to withstand copyright problems
arising from emerging technology, particularly those arising from the Internet.
• The Act has adapted to the modern age by dropping some limiting clauses and phrases and
extending the meanings of works like cinematograph films (motion pictures) and sound recordings
(phonograms) to allow certain works in “any format” within their purview. It does not, however,
cover all facets of the digital problems that are now surfacing.
• The great majority of user-generated material on social networking platforms is classified as one of
four types of works: (1) texts, (2) images, (3) music recordings, or (4) videos.
5
Insert Image
• Kelly v Arriba Soft Corp the plaintiff, Leslie Kelly, a professional photographer who had
copyrighted many of his images of the American West. Some of these images were located on
Kelly’s website or other websites with which Kelly had license agreement.
• The defendant, Arriba Soft Corp. operated an Internet search engine that displayed its results in the
form of small pictures rather than the more usual form of text.
• Arriba obtained its database of pictures by copying images from other websites. By clicking on one
of these small pictures, called ‘thumbnails’, the user could view a large version of that same picture
within the context of the Arriba web page.
• The circuit court held that “the creation and the use of the thumbnails in the search engine is a fair
use, but the display of the larger image is a violation of Kelly’s exclusive right to publicly display
his works.
7
Insert Image
• Evolution of cyberspace has given rise to ample scope of misuse of such trademarks by unauthorized
parties which in turn has resulted in misleading consumers and violating the rights of the original
trademarks.
• Domain names have become a kind of ‘e-commerce marks’ in the online medium. These are digital
business addresses – a point of business contact or transaction. Domain names provide a system of
easy-to-remember Internet addresses, which can be translated by the Domain Name System (DNS)
into the numeric addresses (Internet Protocol (IP) numbers) used by the network.
• The inter-relationship between trademarks and cyberspace was developed in exclusive association
with the concept of domain names. In simple words, domain names represent the IP address used in
surfing the world wide web. It is owing to use of domain names on cyberspace that the strictly
territorial nature of trademarks has now broadened to become global.
8
Insert Image
9
Insert Image
• While on one hand such domain names may refer to internet based digital platforms associated
with certain goods and/or services and in turn substantiate the commercial prospects of online
businesses, on the other, they would be indicative of the identity, goodwill and quality
complimenting such goods and/or services.
• Evidently, misappropriation of domain names could not only cause immense damage to the
business of infringed chain of goods/services, they could completely destroy the goodwill
associated with such brands which may have taken ages to build
• Additionally, domain name registrations being done on a ‘first come first served’ basis, there are
various instances of fraudulent registration of domain names whereby the party registering, in spite
of having no legitimate interest in the brand, deliberately infringed the rights of the original
trademark owners to acquire registration in an unauthorized manner.
• Infringement of trademarks through abuse of domain names on cyberspace is hence a very serious
concern for flourishing trades and businesses
10
Insert Image
CYBERSQUATTING
• Cybersquatting, which literally means ‘sitting on another person’s property’, may be described as
instances of fraudulent use and misappropriation of domain names which involve exploitation of
online identities of brands that result in violation of rights of the original right-owners.
• Cybersquatting often give rise to situations wherein parties who have no legitimate rights in certain
trademarks get domain names registered in their names and subsequently sell those to the original
owner or other parties at exorbitant prices It may be done inter alia with the intent of preventing the
original owner of brands from having access to such domain names, diverting the traffic off the
cyberspace associated with the websites of competing brands, and selling such domain names to
earn profits.
11
Insert Image
• Subsequently, in the case of Tata Sons Ltd. &Anr.v. ArnoPalmen&Anr, the Delhi High Court
dealt with a landmark case on domain name disputes and cybersquatting.
• The plaintiffs sought permanent injunctions against the defendant’s use of the domain name
‘www.tatainfotech.in’ or such domain names deceptively similar to the plaintiff’s registered
trademark which, they alleged, had been registered only with the intention of earning illegal gains
by commercially exploiting the same.
• The defendant however, argued that ‘Tata Infotech’ had been their trade name since 1997, and
claimed to have earned a goodwill in the trade owing to a flourishing business.
• The court held that similarity in domain names could indeed result in diversion of traffic across
websites, and could even cause economic loss to the registered right-holders of the original
trademark owing to the outreach of e-commerce and cyberspace.
• It was hence held that the impugned website had been registered with mala fide intentions in bad
faith with the sole objective of acquiring advantage from exploitation of the plaintiff’s registered
trademark.
13
Insert Image
• There are also instances called ‘Reverse Domain Name Hijacking’, wherein, parties come up with
false allegations of cybersquatting against rightful owners through legal actions, as a result of
which, such rightful owners end up transferring their rights to the fraudulent claimants for the sake
of avoiding legal costs. Cases of reverse domain name hijacking hence has been seen to happen
majorly against small entities or individual owners of trademark who often lack the financial
strength to take up expenses involved in litigation.
14
Insert Image
15
Insert Image
16
Insert Image
17
Insert Image
• The Act categorises the services provided by Internet Service Providers into three types:
transmission of third-party information, links hosted by the providers, and storage of third-party
data.
• This legislation essentially offers a protective shield for search engines and Internet Service
Providers, allowing them to distance themselves from third-party content.
• This, in turn, absolves them from the responsibility of implementing stringent measures to curb
piracy. However, the Act falls short when it comes to addressing situations where a service provider
is alerted about the use of pirated content on their platform.
• To claim exemption, providers must prove that they neither initiated, received, nor altered any
transmission of the work.
• The Ministry of Communication and Information Technology has introduced mandatory guidelines
outlining the due diligence required by intermediaries during the transmission of work.
• These guidelines, which subscribers must also adhere to, are outlined under Section 79 of the Act,
2000.
• Rule 3(4) of the Act stands out as a beneficial provision for copyright owners.
• It mandates the removal of pirated content from services once identified and communicated to the
respective service provider. Failure to comply can lead to legal action against the service provider.
18
Insert Image
JUDICIAL STANCE
• For instance, in the 2006 Microsoft case (Microsoft Corporation v. Deepak Raval ), the Delhi High
Court recognised the defendant’s infringement of copyrighted products like Microsoft Office 2000 and
Microsoft Office 9.
• The court emphasised the pressing need to combat piracy, given the escalating instances of copyright
violations, and consequently ordered the defendant to pay significant damages to Microsoft.
• In the renowned case of Super Cassettes Industries v. Yahoo Inc., the plaintiff argued that Yahoo had
violated their copyrighted content via its portal.
• The court responded by issuing an injunction, preventing Yahoo from reproducing and transmitting the
plaintiff’s copyrighted material on its platform.
• Another case, Microsoft Corporation v. Mr. Kiran and Anr., saw the court highlighting the growing
threat of software piracy in India and the urgent need for robust laws to deter such infringements.
19
Insert Image
• In Syed Asifuddin and ors v The State of Andhra Pradesh & Anr , the Tata indicom employees
were arrested on charges of hacking a computer source code under Section 65 of the IT
Act,2000 for altering the electronic 32 bit number (ESN) programmed into cellphones that were
to be exclusively used only on Reliance infocomm’s service network. The court observed that
such tampering of code is punishable offence under Section 65 of IT Act. The court observed
that in view of Section 2(o) & (ffc) section 13 and 14 of Copyright Act computer programme is
a literary work protected by copyright and as per Section 63 (copyright act) any infringement of
computer programme is punishable. However , the court observed that this issue will be
decided by the trial court after evidence is led before trial court.
20
Insert Image
• The Information Technology Act, 2000 also Known as an IT Act is an act proposed by the
Indian Parliament reported on 17th October 2000. This Information Technology Act is
based on the United Nations Model law on Electronic Commerce 1996 (UNCITRAL
Model) which was suggested by the General Assembly of United Nations by a resolution
dated on 30th January, 1997. It is the most important law in India dealing with Cybercrime
and E-Commerce.
• The main objective of this act is to carry lawful and trustworthy electronic, digital and
online transactions and alleviate or reduce cybercrimes. The IT Act has 13 chapters and 94
sections. The last four sections that starts from ‘section 91 – section 94’, deals with the
revisions to the Indian Penal Code 1860.
• The IT Act, 2000 has two schedules:
• First Schedule –
Deals with documents to which the Act shall not apply.
• Second Schedule –
Deals with electronic signature or electronic authentication method. offences and the punishments in IT Act 2000 :
The offences and the punishments that falls under the IT Act, 2000 are as follows :-
21
Insert Image
• Chapter 1 deals with the applicability of the Act and definitions of various
terminologies used in the Act.
• Chapter 2 talks about digital and electronic signatures.
• Electronic governance and electronic records are given under Chapters 3 and 4
respectively.
• Chapter 5 is related to the security of these records and Chapter 6 deals with
regulations of certifying authorities.
• Chapter 7 further gives the certificates needed to issue an electronic signature.
• Chapter 8 gives the duties of subscribers and Chapter 9 describes various
penalties.
• Chapter 10 provides sections related to the Appellate Tribunal.
• Chapter 11 describes various offences related to breach of data and their
punishments.
• Chapter 12 provides the circumstances where the intermediaries are not liable for
any offence or breach of data privacy.
• The final chapter, i.e., Chapter 13 is the miscellaneous chapter.
22
Insert Image
23
Insert Image
24
Insert Image
In public key encryption, a public key and a private key are generated for
an application. The data encrypted with the public key can be decrypted only
with corresponding private key. Only the owner can access the private key to
decrypt messages that are encrypted with the corresponding public key.
The terms public key and private key are frequently used in the field of
encryption and decryption. They play a significant role in securing sensitive
information and critical data.
A private key is a tool that allows a user to both encrypt and decrypt data.
Shared between the sender and receiver of encrypted information, this key is
also known as a symmetric key because it is common to both parties.
A public key, on the other hand, is used to encrypt data, while the private key
is used for decryption. Simply put, a user can encrypt data using a single
(public) key, and then the receiver uses a private key to decrypt the ciphertext
and read the message. This is also referred to as asymmetric cryptography.
Ex: Bob wants to send Alice an encrypted email. To do this, Bob takes Alice's
public key and encrypts his message to her. Then, when Alice receives the
message, she takes the private key that is known only to her in order to
decrypt the message from Bob.
25
Insert Image
26
Insert Image
• Types of E-commerce
• E-commerce/e-business may be classified at large in the following six basic types:
• Business to Business (B2B)
• Refers to all electronic transactions of goods and sales that are conducted between two
companies, generally between the producers and wholesalers. The famous website acting
as a catalyst between such wholesalers and producers maybe India-mart.
• Business to Consumer (B2C)
• Various predominant e-commerce persisting in India wherein the customer gets a big
market to purchase goods and services. Here, the E-commerce website serves as a
platform for the sale of the goods directly to the end-consumer of the products. For
instance Flipkart, Amazon, Myntra etc.
• Consumer to Consumer (C2C)
• Generally this model uses the online platform of money and various social media for its
existence. The widespread known phenomenon of “OLX pe Bech de!” can be the best
example to understand E-Commerce at the consumer to consumer-level basis. Example:
eBay is one global example of this kind of e-commerce.
27
Insert Image
28
Insert Image
Electronic Contract
• refers to a contract that takes place through e-commerce, often without the parties
meeting each other. It refers to commercial transactions conducted and concluded
electronically.
• A customer drawing money from an ATM machine is an example of electronic
contract. Another instance of e-contract is when a person orders some product from
an online shopping website.
• Globalization and diffusion of technology has accelerated the presence of e-commerce
companies throughout the world. Online auctions are also gaining popularity whereby
buying and selling takes place through bidding using the Internet.
29
Insert Image
• A browse wrap agreement is intended to be binding on the contracting party by the use of the
website. Such contracts are usually used by websites wherein the continued use of a website by
a user is deemed to be acceptance of its revised terms of use and other policies.
• A shrink wrap contract is a license agreement where the terms and conditions of the contract
are enforced upon the consumer as soon as he opens the package. Such contracts can be
generally observed in the case of buying of software products. The license agreement
indemnifies the user for any copyright or intellectual property rights violation of the
manufacturer as soon as the buyer opens the pack (containing the software product).
• Click wrap or click through agreements require the user to manifest his consent or assent to
the terms and conditions governing the licensed usage of the software by clicking "ok" or "I
agree" button on the dialog box. A user may choose to disagree or reject the terms by clicking
cancel or closing the window. Such a user will not be able to buy or use the service upon
rejection. One regularly comes across such a type of contract during online transactions, while
downloading software or creating an e-mail account. Unlike the shrink wrap agreements where
the terms of the agreement are hidden inside the box, in case of click wrap agreements, all the
terms and conditions are accessible prior to acceptance, either in the same window or through a
hyperlink.
30
Insert Image
OFFENCES
Section 65-Section 71
31
Insert Image
CYBER CRIMES
• Hacking: The Most common and popular type of cyber crime that we might
have heard since our childhood. Hacking is the most prevalent cyber crime in
almost every part of the World, were technology is being rapidly used by the
Human Race. It’s the un-authorized access and use of the victim’s computer
by a Hacker to take all the sensitive information like data and images from
the target device, who is a learnt person in Cyber Programming. The hacker
mis-uses the information being obtained by him via the un-authorized access
against the Victim, in order to blackmail or defame him.
• Cyber Stalking: The most common cyber crime these days, stalking simply
means constantly following any person, usually females and threatening or
messaging them repeatedly even after their objection on the same. Cyber
Stalking is punishable u/s.66-A, 67 of Information and Technology Act, 2000
and Section 354-D of IPC, 1860
33
Insert Image
• Phishing: Phishing attacks are fraudulent emails, text messages, phone calls or web sites designed
to manipulate people into downloading malware, sharing sensitive information (e.g., Social Security
and credit card numbers, bank account numbers, login credentials), or taking other actions that
expose themselves or their organizations to cybercrime.
• Successful phishing attacks often lead to identity theft, credit card fraud, ransomware attacks, data
breaches, and huge financial losses for individuals and corporations.
• Identity theft: Any digital identity theft definition includes a malicious actor that illegally acquires
personal information (date of birth, social security number, credit card details etc.) and uses it for
identity fraud (cloning credit cards, applying for loans, extorting the victim etc.).
• Online, identity theft works largely as it does offline, with a remarkable difference. The massive
volume of information attackers can find about you on the Internet and its level of detail makes
their “job” much easier and significantly more lucrative.
35
Insert Image
• Telecommunications is the electronic exchange of any type of data over a variety of information
transmitting technologies and systems.
• The Act prioritizes user protection but also extends powers to the government to intercept
communications.
• The government under the act can take control of telecommunication networks in certain situations.
36
Insert Image
• The DPDP Act applies to Indian residents and businesses collecting the data of Indian residents.
Interestingly, it also applies to non-citizens living in India whose data processing “in connection
with any activity related to offering of goods or services” happens outside India.This has
implications for, say, a U.S. citizen residing in India being provided digital goods or services
within India by a provider based outside India.
• The 2023 act allows personal data to be processed for any lawful purpose. 14 The entity
processing data can do so either by taking the concerned individual’s consent or for “legitimate
uses,” a term that has been explained in the law.
• Consent must be “free, specific, informed, unconditional and unambiguous with a clear
affirmative action” and for a specific purpose. The data collected has to be limited to that
necessary for the specified purpose.
• A clear notice containing these details has to be provided to consumers, including the rights of
the concerned individual and the grievance redress mechanism. Individuals have the right to
withdraw consent if consent is the ground on which data is being processed.
37
Insert Image
• Legitimate uses are defined as: (a) a situation where an individual has voluntarily provided
personal data for a specified purpose;
• (b) the provisioning of any subsidy, benefit, service, license, certificate, or permit by any agency
or department of the Indian state, if the individual has previously consented to receiving any other
such service from the state (this is a potential issue since it enables different government agencies
providing these services to access personal data stored with other agencies of the government);
• (c) sovereignty or security;
• (d) fulfilling a legal obligation to disclose information to the state;
• (e) compliance with judgments, decrees, or orders;
• (f) medical emergency or threat to life or epidemics or threat to public health; and
• (g) disaster or breakdown of public order.16
38
Insert Image
39
Insert Image
• Napster was an online platform used to download and access compressed digital music files in MP3
formats, making it one of the most popular peer-to-peer services in 1999. It was created by Shawn
Fanning, an 18-year-old freshman in computer science at Northwestern University.
• Napster consisted of a central service that indexed its users and the files available on their machines,
thus creating a list of music files that are available on Napster’s network. Napster gained immense
popularity due to the fact that it was one of the most accessible services to use.
• In 2001, several record companies such as Sony Music Entertainment, Atlantic Records, MCA
Records, Island Records, Motown Records, Capitol Records, and BMG Music collectively filed a
lawsuit against Napster.
• The lawsuit, A&M Records, Inc. v. Napster Inc., was an Intellectual Property case that was
adjudicated by the United States Court of Appeals for the Ninth Circuit (upon affirming the ruling of
the United States District Court for the Northern District of California). The Court held that the
defendant (Napster) was held liable for contributory infringement and vicarious infringement of the
plaintiff’s copyrights. The Napster case gained immense popularity since it explored the intersection
of copyright laws and peer-to-peer file sharing systems
40
Lorem ipsum dolor sit amet, consectetuer adipiscing elit.
42
43