12 Chapter 5
12 Chapter 5
125
CYBER LAWS
The virtual world of internet is known as cyberspace and the laws governing this area are
known as Cyber laws and all the netizens of this space come under the ambit of these laws as
it carries a kind of universal jurisdiction. Cyber law can also be described as that branch of law
that deals with legal issues related to use of inter-networked information technology. In short,
cyber law is the law governing computers and the internet. The growth of Electronic Commerce
has propelled the need for vibrant and effective regulatory mechanisms which would further
strengthen the legal infrastructure, so crucial to the success of Electronic Commerce. All these
regulatory mechanisms and legal infrastructures come within the domain of Cyber law. Cyber
law is important because it touches almost all aspects of transactions and activities on and
involving the internet, World Wide Web and cyberspace. Every action and reaction in
cyberspace has some legal and cyber legal perspectives. In today’s techno-savvy environment,
the world is becoming more and more digitally sophisticated and so are the crimes. Internet
was initially developed as a research and information sharing tool and was in an unregulated
manner. As the time passed by it became more transactional with e-business, e-commerce, e-
governance and e-procurement etc. All legal issues related to internet crime are dealt with
through cyber laws. As the number of internet users is on the rise, the need for cyber laws and
their application has also gathered great momentum.6 In today's highly digitalized world,
almost everyone is affected by cyber law. For an example: 1)Majority of transactions in shares
are in demat form. 2)Today each and every companies extensively depend upon their computer
networks and keep their valuable data in electronic storage form. 3) Our state and central
Governments all types of forms including income tax returns, company law forms etc. are now
filled in electronic form in all departments 4) We as Consumers are increasingly using credit
cards for shopping and all related transactions 5)People are using email, cell phones and SMS
messages for communication. 6)Youth are increasingly using internet on smart phones and
other Devices.7)Many tims even in "non-cyber crime" cases, important evidence is found in
computers / cell phones e.g. in cases of divorce, murder, kidnapping, tax fraud, organized
crime, some terrorist operations, counterfeit currency and many as well.8)All kind of Cyber
crime cases like online banking frauds, online share trading fraud, source code theft, credit card
fraud, tax evasion,” virus attacks, cyber sabotage, phishing attaccks, email hijacking, denial of
service, hacking, pornography” etc are becoming common and increasing day by day. 9) Digital
signatures/autographs or impression and e-contracts are fast replacing conventional methods
126
of transacting business. Technology per se is never a disputed issue but for whom and at what
cost has been the issue in the ambit of governance. The cyber revolution holds the promise of
quickly reaching the masses as opposed to the earlier technologies, which had a trickledown
effect. Such a promise and potential can only be realized with an appropriate legal regime based
on a given socio-economic level.
PERSONAL DATA PROTECTION BILL:
Personal Data protection bill has been realesed in Parliement.It has been sent to joint parliament
committee for analysis.
127
56sandesh news paper
128
Applicability57: The Bill governs the processing of personal data by: (i) government,
(ii) companies incorporated in India, and (iii) foreign companies dealing with personal
data of individuals in India. Personal data is data which pertains to characteristics, traits
or attributes of identity, which can be used to identify an individual. The Bill
categorises certain personal data as sensitive personal data. This includes financial
data, biometric data, caste, religious or political beliefs, or any other category of data
specified by the government, in consultation with the Authority and the concerned
sectoral regulator.
Rights of the individual:”The Bill sets out certain rights of the individual (or data
principal). These include the right to: (i) obtain confirmation from the fiduciary on
whether their personal data has been processed, (ii) seek correction of inaccurate,
incomplete, or out-of-date personal data, (iii) have personal data transferred to any other
data fiduciary in certain circumstances, and (iv) restrict continuing disclosure of their
personal data by a fiduciary, if it is no longer necessary or consent is withdrawn”
57
www.prsindia.org
129
to respond to a medical emergency.
Social media intermediaries: The Bill defines these to include intermediaries which
enable onliine interaction between users and allow for sharing of information. All such
intermediaries which have users above a notified threshold, and whose actions can
impact electoral democracy or public order, have certain obligations, which include
providing a voluntary user verification mechanism for users in India.
Data Protection Authority58: The Bill sets up a Data Protection Authority which may:
(i) take steps to protect interests of individuals, (ii) prevent misuse of personal data, and
(iii) ensure compliance with the Bill. It will consist of a chairperson and six members,
with at least 10 years’ expertise in the field of data protection and information
study. Orders of the Authority can be appealed to an Appellate Tribunal. Appeals from
the Tribunal will go to the Supreme Court.
Transfer of data outside India59: Sensitive personal data may be transferred outside
India for processing if explicitly consented to by the individual, and subject to certain
additional conditions. However, such sensitive personal data should continue to be
stored in India. Certain personal data notified as critical personal data by the
government can only be processed in India.
Exemptions: The central government can exempt any of its agencies from the
provisions of the Act: (i) in interest of security of state, public order, sovereignty and
integrity of India and friendly relations with foreign states, and (ii) for preventing
incitement to commission of any cognisable offense/s (i.e. arrest without warrant)
relating to the above matters. Processing of personal data is also exempted from
provisions of the Bill for certain other purposes such as: (i) prevention, investigation,
or prosecution of any offense/s, or (ii) personal, domestic, or (iii) journalistic
purposes. However, such processing must be for a specific, clear and lawful purpose,
with certain security safeguards.
58
www.prsindia.org
59
www.prsindia.org
130
Offense/s: Offense/s under the Bill include: (i) processing or transferring personal data
in violation of the Bill, condemned with a fine of Rs 15 crore or 4% of the annual
turnover of the fiduciary, whichever is higher, and (ii) failure to conduct a data audit,
condemned with a fine of five crore rupees or 2% of the annual turnover of the
fiduciary, whichever is higher. Re-identification and processing of de-identified
personal data without consent is puniishabale with imprisonnment of up to three years,
or fine, or both.”
Sharing of non-personal data with government: “The central government may direct
data fiduciaries to provide it with any: (i) non-personal data and (ii) anonymised
personal data (where it is not possible to identify data principal) for better targeting of
services”.’
“CYBER LAWs”
131
U/Secct.463 “Indian Penall.Code1860: “Email spoofing"
U/Secct.464 Indian Penall.Code1860: “Makiing a fakes report”
U/Sectt. 468 “Indian Penal.Code”: “Falsification for cause of dishonest”
U/Secct. 469 Indian Penal.Code: ‘Falsification for cause of harmingg recognition’
U/Secct. 499 Indian Penal.Code: ‘Sending defammatory messaages through electronic
mail’
U/Secct. 5OO ‘Indian Penal.Code1860’: ‘E-mail abuase’
U/Secct. 5O3 ‘Indian Penal.Code1860: ‘Sending threatening messages through
electronic mail’
U/Secct. 5O6 ‘Indian Penal.Code1860’: ‘Punishment for crook intimidation’
U/Secct. 5O7 Indian Penal.Code1860: ‘Criminal intimidation through an nameless
communique’
Few first-rate instances in records of cybercrimeare: -
The TamilNadu v. Suhaash.. Kattee may be taken into consideration as a landmark case
withinside the records of Cyber Crime Management in India. This become the primary case in
India in which the culprit become convicted below S.sixty seven of IT ACT 2000 of India.
The case of Nassccom v. Ajjay S0ood and Others is every other landmark judgement brought
in March 2005, wherein the ‘Delhi High Court” declared ‘Phishing’ at the net to be an unlawful
act. Though there may be no precise regulation in India to penalize phishing, the courtroom
docket described it below Indian Law as “a misrepresentation made withinside the direction of
change main to confusion as to the supply and foundation of the email inflicting massive
damage now no longer best to the patron however even to the man or woman whose call,
identification or password is misused”.
Cyber Offense under purview of IT Act 2000 and further Amendmentt/(reformation)
along with few case studies
IT Act, 2000 and IT (Amendmentt/Reformation) Act, 200860
“These two pieces of legislation form the bedrock of cyber law infrastructure in India.
“The Information Study (IT) Act”, 2000 was passed by the Indian Parliament in May 2000 and
came into force in October of the same year. Its prime purpose is to provide the legal
infrastructure for e-commerce in India. It was the first legal instrument to provide legal sanctity
to electronic records and contracts expressed through electronic means of communication”.
60
www.digit.in/study-guides/indian-cyber-crime-laws.html
132
The act was later amended in December 2008 through the ITAct, 2008. Some of their salient
points are:
Digital Signnature -Autograph or endorsements: “Electronic records may be authenticated
by a subscriber by affixing digital signtatur (autograph or endorsements); further, the autograph
or endorsement may be verified using the public key provided by the subscriber”.
Certifying Authorities: domestic and foreign certifying authorities (which provide digital
autograph or endorsement certificates) are recognized by the law; a “Controller of Certifying
Authorities” shall supervise them.
Electronic governance: Documents required as per law by any arm of the government may
be supplied in electronic form, and such documents are to be treated the same as handwritten,
typewritten or printed documents.
Offense/s and Penalties61: An Adjudicating Officer shall judge whether a person has
committed an offense/s in contravention of any provision of the IT Act, 2000; the maximum
penalty for any damage to PC(Computer/s System) or PC(COMPUTER/S SYSTEM) systems
is a fine up to `1 crore
Appellate Tribunals: A Cyber Regulations Appellate Tribunal shall be formed which shall
hear appeals against orders passed by the Adjudicating Officers.
Investigation: Offense/s shall only be investigated by a police officer of the rank of the Deputy
Superintendent of Police or above.
Amendmentt/(reformation) to other laws: Other acts such as the Indian Penal Code, 1860,
the Indian Evidence Act, 1872, the Bankers’ Books Evidence Act, 1891, the Reserve Bank of
India Act, 1934 were to be amended to align them with the IT Act
Groups of Machines Service Providers: Intermediaries in the data transmission process, such
as Internet Service Providers, are not liable in certain cases, so long as the intermediary
expeditiously acts to prevent the cybercrime on getting such instruction from the Government
or its agency
Cases Studies as per selected IT Act U/Ss:Here are the case studies for selected IT Act U/Ss.
For the sake of simplicity and retaining readability, information at the IT Act U/Ss had been
omitted. Kindly refer the Appendix on the ultimate segment for the distinctive account of all
of the consequences and Offense/s referred to in IT Act.
U/Sec. 43 – Penalty” and Compensation for damage to PC(COMPUTER/S SYSTEM),
PC(COMPUTER/S SYSTEM) system, etc.
61
www.digit.in/study-guides/indian-cyber-crime-laws.html
133
Related Case62 : In December 2004,Four middle personal name were operated an outsourcing
facilty operated through ‘Mphasis’iin India These personnel had been now no longer legal to
gain the PINs. In affiliation with others, the decision middle personnel opened new bills at
Indian banks the use of fake identities. Within months, they used the PINs and account statistics
gleaned at some point of, the Indian police had tipped off to the rip-off through a U.S. financial
institution, and fast recognized the people concerned withinside the rip-off. Arrests had been
made while the ones people tried to withdraw coins from the falsified bills, dollor $426,000
become stolen; the quantity recoveredwas US dollor $230,000.
62
cyberlawsinindia.wordpress.com
63
cyberlawsinindia.wordpress.com
64
cyberlawsinindia.wordpress.com
65
cyberlawsinindia.wordpress.com
134
mail that he planned five bombs in Mumbai City.It was realy hard to discover bombs tin
Mumbai city by cops.later on he was arrested and punished accordingly.
U/S 66D – Punishment for dishonest through impersonation through the use of
PC(COMPUTER/S SYSTEM)resourceRelevant Case: “Sandeep Varghese v/s State of
Kerala”66
Main accused along with Preethi and Mr.Charan has done offence of cyber defamation.they
together done act of forgery and cheated the agency also.they use official email aids,records
and done malified use of company website.This case has been filed through one of the
consultant of the company.They faux the bills of clients on mails and banks mails.Company
went in to huge loss from service provders,producers,distributirs and other clients because of
this impersonation.
66
cyberlawsinindia.wordpress.com
67
cyberlawsinindia.wordpress.com
68
cyberlawsinindia.wordpress.com
69
IT ACT 2008
135
U/S 73Seventy Three1 -Penalty for publishing digital Autograph or endorsement
Certificate fake in positive details.
U/S 74Seventy Four – Publication for fraudulent cause:
U/S 75Seventy Five – Act to use for offense/s or contraventions devoted outdoor India
Subject.
U/S 77A Seventy Seven A – Compounding of Offense/s.
U/S 77B Seventy Seven B – Offense/s with 3 years’ imprisonment to be cognizable
136
Breach of Confidentiality and Privacy U/Sec.72
U/S IT Act
Offence/Crime Penalty-Fine
2000
Failure to furnish
document, return or
U/Sec.44{a} Penalty or fine not exceeding 1.5 Lac
report to the
INR to affected person/authority
Controller or the
Certifying Authority
137
Compensation or penalty not
Where no penalty has been exceeding 25K INR to the person
U/Sec.45
separately provided affected by such contravention.
138
subsequent conviction with
imprisonment of either description for
a term which may extend to 5 Yrs with
fine of 10 Lacs INR or both.
139
Misrepresentation to the
Controller or the Certifying
Authority for obtaining Imprisonmentt up to 2Yrs, &/or with
U/Sec.71
license fine up to 1 Lac INR, or both with.
or Electronic
Signature Certificate
140
document purporting to be an settlement containing the virtual singture autograph or
endorsements of the events become so concluded through affixing the virtual autograph or
endorsement signature of the events.
88A. Presumrption as to digital messagesx.—The Court might also additionally presume that
an piece of email, forwarded through the originator thru an email server to the addressee to
whom the message purports to be addressed corresponds with the message as fed into his
PC(Computer/s System) for transmission; however the Court shall now no longer make any
presumption as to the man or woman through whom such message become
despatched.three[88A. Presumption as to electronic messages.—The Court may presume that
an electronic message, forwarded by the originator through an electronic mail server to the
addressee to whom the message purports to be addressed corresponds with the message as fed
into his PC(COMPUTER/S SYSTEM) for transmission; but the Court shall not make any
presumption as to the person by whom such message was sent".
142
a) while any man or woman, with out a license granted through the proprietor of the copyright
or the Registrar of copyrights below this Act, or in contravention of the situations of a license
so granted or of any circumstance imposed through a able authority below this Act-
i) does something, the distinctive proper to do that's through this Act conferred upon the
proprietor of the copyright;
ii) lets in for earnings any location for use for the communique of the paintings to the general
public wherein such communique constitutes an infringement of copyright withinside the
paintings, except he become now no longer conscious and had no affordable floor for believing
that such communique to the general public could be an infringement of copyright or while any
man or woman i) makes or sale or rent, or sells or shall we for rent, or through manner of
change shows or gives on the market or rent or ii) distributes both for the cause of change or to
such an volume as to have an effect on prejudicially the proprietor of the copyright; or iii)
through manner of change famous in public; or iv) imports into India In all above referred to
instances copyrighted paintings will be taken into consideration as infringed. The software
program copyright proprietor will must show the misleading similarity, prima facie case &
irreparable loss to assert the damages from infringer.
PC(COMPUTER/S SYSTEM) Software & Copyright Law
According to segment 2(face) of the Copyright Act, a PC(Computer/s System) programmer is
a "set of commands expressed in phrases, codes, schemes or in every other shape, inclusive of
a system readable medium, able to inflicting a PC(Computer/s System) to carry out a selected
project or acquire a selected outcomes". PC(COMPUTER/S SYSTEM) software program is
"PC(Computer/s System) programmer" withinside the which means of the Copyright Act. This
PC(Computer/s System) softwareis additionally situation count of copyright safety below the
Copyright Act. PC(COMPUTER/S SYSTEM) programmed are blanketed withinside the
definition of literary paintings below the Copyright Act. Owner of the PC(Computer/s System)
software program possesses with diverse proper inclusive of the proper to supply software
program licenses. Software licenses may be of diverse types.
Software Licenses
Freeware licenses:
Freeware is PC(COMPUTER/S SYSTEM) software that is copyrighted, available for use free
of charge, available for an unlimited time. Freeware licenses are generally created and
distributed free of cost by software developers who want to contribute something to the society.
However, there are some limitations as well. For e.g. A freeware license is personal,
nonexclusive, non-transferable and with limited use. Many freeware licenses restrict the use of
143
the software for commercial purposes. The license is non-exclusive as it does not confer any
exclusive rights on a particular user. Moreover, the license is nontransferable and does not
permit the licensee to transfer any rights to a third person.
Open Source Licenses:
As the word itself indicates, this license is open for all without any limitations. To qualify as
"open source" particular software must comply with several conditions. Once any person has
developed such open source license, then there must be free distribution, redistribution of such
software. Owner of the Open source license cannot restrict any person from selling, modifying,
distributing or using such license for genetic research etc.
Shareware:
This is also known as "try before you buy" software. This software usually come with full
functionality for a limited period. After this trial period users must either buy the software or
uninstall it from their PC(Computer/s System). The trial period could be in terms of number of
days.
Demo ware:
Demo ware is meant only for demonstrations. The demo ware does not have any functional
features, it only serves to demonstrate the features to potential users. Software copyright owner
has the right to reproduce and make any number of copies of his work as he likes.
144
Very simply put, a domain name is the linguistic counterpart ofwhat we call an Internet
Protocol address. Every PC(COMPUTER/S SYSTEM) has anaddress, which is asking to a
telephone number. If one wants to callup a friend, he needs to dial the friend’s number. In much
thesame way, if he needs to access a website has to type out its IPnumber. But since it is very
difficult for one to remember acomplete number such as 202.162.227.12 a system evolved
underwhich a name is mapped to the concerned number or IP address.Thus, today, instead of
typing 202.162.227.12, one has merely totype in www.tata.com.What is there in a domain
name? These unmemorable lines by thegreat poet, William Shakespeare, were no doubt written
in an erawhen neither trademarks, nor domain names were ever heard of.If only Shakespeare
knew that Shakespeare.com had beenavailable for sale, he would have thought twice before
penning
those lines. Thus, value of domain names can’t beunderestimated.
Dispute between Trademark and Domain Names:-
The Trademark Act, 1999 has been enacted with an object toamend and consolidate the law
relating to trademarks for goodsand services and for the prevention of the use of fraudulent
marks. However, trademark owners desirous of using their marksas domain names have
found that such domain names have beenrecognized by unauthorized parties, often as a
deliberate attempt to violate the rights of the original trademark owner. Actually,domain
names are registered on ‘first come first serve basis’ whichleads many a time to what are
commonly referred to as ‘abusiveregistrations’ i.e. registration by a person of a domain name
containing a trademark, in which such person/entity has nolegitimate right or interest.
Various Forms of Infringement of Trademark throughCyberspace:-
A. Cybersquattting
Various types of domain names disputes come forconsideration before the courts all over
world. One of themost serious kinds of disputes have been about‘Cybersquatting’ which
involves the use of a domain nameby a person with neither registration nor any inherentrights
to the name. Trademarks and domain names beinganother person. The practice of
‘cybersquatting’ is abusivedomain names back to the trademark’s owners or thirdparties at a
high profit. This is known as ‘cybersquatting’similar, have been exploited by some people who
registertrademarks of others as domain names and sell thosewhich means some person sitting
on the property of?whereby one entity registers a domain name that includesthe name or the
trademarks of another. This practiceshows the importance of the role played by domain
namesin establishing onliine identity. This practice is usually .amous in order to either block
the legitimate userregistering its most sought-after domain name or hoping tosell the names for
145
profit in the market. Such a trend ofcybersquatting has led the courts to consider therelationship
between trademarks and domain names. Tofile a complaint to prevent cybersquatting, the
complainantwill have to prove the dishonest intention, lack oflegitimate rights and interests
and similarity of domainname with the trademark.
B. Reverse domain name hijacking
It is also known as reverse cybersquatting. It happens whena trademark owner tries to secure a
domain name bymaking false cybersquatting claims against a domainname’s rightful owner
through legal action. Sometimes,domain names owner has to transfer ownership of thedomain
name to the trademark owners to avoid legal action and costly expenses, particularly when the
domainnames belong to the smaller organizations or individualwho are not economically sound
to fight the case? Reversedomain name hijacking is most commonly done by larger
corporations and famous wealthy individuals.
C. Meta tags
Meta tag is an element of web pages that is also known asMeta elements. Meta tags provide
information about pagedescriptions, key words and other relevant data.Originally, Meta tags
were used in search engines to definewhat the page was about when the internet was in the
early stages, Meta tags were used to help the place webpages in the correct categories.
Nowadays, people beganabusing Meta tags to build false page rankings for web
pages that were poorly constructed. Meta tags can becategorized into title, description and
keywords.
147
6) 6) Amendmentt(Reformation) of Sec.85B – In segment 85B, - for the phrases "virtual
autograph or endorsement", anywhere they arise, the phrases "digital autograph or
endorsement" will be substituted.
7) 7) Amendmentt(Reformation) of Sec.85C –
In segment 85C, for the phrases "Digital Autograph or endorsement Certificate", the
phrases "Electronic Autograph or endorsement Certificate" will be substituted
8) 8) Amendmentt(Reformation) of Sec.90A –
In segment 90A, the phrases "virtual autograph or endorsement", at each locations
wherein they arise, the phrases "digital autograph or endorsement" will be substituted.
CYBER LAW UNDER THE BANKERSs BOOK(BBE) EVIDENCE
This very important act named BBE Act was amended as: "’bankers 'bookss’It comparises of
ledgers, day-books, coins-books, “account-books and all different books used withinside the
normal enterprise of a financial institution whether or not saved withinside the written shape
or as printouts of facts saved in a floppy, disc, tape or every other shape of electro-magnetics
facts garage” “tooll”.
CYBER LAW UNDER RESERVE BANK OF INDIA ACT
Reserve Bank of India Act, 1934. U/S fifty eight of the Act sub-segment (2), after clause (p), a
clause referring to the law of price range switch thru digital approach among bank transactions
become inserted, to facilitate such digital price range switch and make sure felony admissibility
of files and information therein. Here once more, allow us to reiterate that the regulation does
now no longer kingdom that any PC(COMPUTER/S SYSTEM)ised print-out despite the fact
that now no longer signed, constitutes a legitimate document.
148
149