Cyber Law Notes
Cyber Law Notes
Cyber Law Notes
Unit- I
Introduction
Cyberspace Introduction and UNCITRAL Model Law - Information Technology Act,
2000 with recent Amendments-jurisdictional Issues- Digital Signatures- Regulation
of Certifying Authorities- Cyber Regulation Appellate Tribunal.
Unit- II
·online Contracts
Formation of online Contracts- E-Banking Transactions- Online Payment Options-
Online Advertising- Electronic and Digital Signature- Taxation Issues in Cyber
Space- Indirect Tax - Tax evasion - Double Tax- International Tax- Permanent
Establishment- Protection of Trade secrets and Deceptive trade Practices.
Unit-ill
Cyber Crimes
Understanding Cyber Crimes- Actus Reus and Mens Rea-Types of crimes in the
internet- Against Person, Against Property, Against Government- Digital Evidence-
Investigation and Adjudication of cyber crimes in India- Cyber Arbitration- Cyber
Conflict Investigation.
Unit-IV
IPR and Cyber Space
Copyright Issues in the Internet- Protection of computer software- Caching-
international regime- OSS-DMCA- Data Protection Directive- Trademark Issues in
the Internet- Domain Name- registration -Domain Name Disputes- ICANN-UDRP
Policy- Linking- Framing - Meta tagging -database issues in the Internet.
3
UNIT-1
CyberLaws
Limitations of Traditional Law and Need for a Separate Law for Cyber Crime
Traditional laws pose several constraints in dealing with cyber-crimes:
(iii) Creation of New Crimes: Cyber space bas given birth to several new
crimes which are not recognized by conventional laws. For Example,
a website can handle only a fixed number of viewer or request (for
information) at a given point of time. A cyber-criminal an prevent the
website from functioning by overloading it with requests (known as a
denial of service attack). This kind of attack can cause huge losses to
an online business, but, there would be no clear remedy under ordinary
law. Similarly, the Act elevates the offence of denial of access and
introducing computer viruses with the intent of striking terror in a
section of people to the status of 'cyber-terrorism' and provides for
significant punishment for the same. Under section 66F the IT Act, the
provision relating to cyber-terrorism, is worded similar to Section 3 of
the Prevention of Terrorism Act, 2002.
(iv) Issues with Gathering Evidence: The intangible nature of
cyberspace and cybercrime make traditional methods of gathering
evidence inadequate. The 'scene of crime' m cyberspace is completely
virtual and so 1s the object of the crime (data / information),
Additionally, this type of evidence can be modified very easily. For
example, a criminal may set up a program which erases all evidence
from the computer if it is accessed by someone other than himself. In
this case, mere access to the computer may erase the evidence.
Therefore specific rules are required for extraction of evidence and
maintaining its' authenticity.
(v) Anonymity of Netizens: A cybercriminal can easily guard bis
identity. A cybercriminal can use fake identities or create identify
clones, for example. This makes gathering of evidence difficult.
(vi) Monitoring of Crime: The sheer volume of information involved and
being processed every second makes monitoring and tracking of crime
very difficult. Countries like United States of America, including
India, have put in place extensive internet surveillance programmes to
deal with this issue. However, such programmes can also be extremely
invasive in the personal lives of individuals, raising
6
to the enactment of the Computer Misuse Act, 1990. This was among the first cyber
laws to be enacted. It recognized the following offences:
For example, Article 5 of the Model Law states that the legality of information
shall not be denied merely because it is contained in an electronic document.
(ii) Technological neutrality: This principle mandates that the provisions adopted
in a law should be neutral with respect to the technology involved. This ensures that
the rapid pace of development of technology does not lead to the law becoming
redundant in no time.
For examples, Article 7 of the Model Law which lays down rules regarding a
valid signature of an electronic document prescribes a reliable 'method' which is used
to indicate that person's approval. Since the method has not been specified, the
9
rule is not restricted to the currently accepted method, which is digital signatures, and
the law would continue to apply regardless of any new development.
(iii) Functional equivalence: Terms like 'writing', original', 'signed' etc. are
specific to paper based documents. This principle sets out the corresponding criteria
for electronic communication.
For examples, the law of evidence generally required that the original
document should be presented as evidence. For a paper based document, if would
mean a document that was actually issued, or with original signatures, or which is not
a photocopy or fax of another document. Article 8 describes an original electronic
document to be one where the information if contains is the same as that when it was
first generated in its final form.
India's First Cyber Law: The information Technology Act, 2000 This
Resolution recommended that. 'all states give favourable consideration is the
UNCITRAL. Model law an Electronic Commerce when they enact or revise their
laws, in view of the need for uniformity of the law applicable to alternatives to paper
based forms of communication and strange of information'.
l. Objectives of the 'IT Act': The preamble to the 'IT Act' states as follows:
'An Act to provide legal recognition for the transactions carried out by means
of electronic data interchange and other weans of electronic communication,
commonly referred to as 'Electronic Commerce_', which involves the use of
alternatives to paper based methods of communication and storage of information, to
facilitate electronic flings of documents with the Government agencies and further to
10
amend the Indian Penal Code, Indian Evidence Act, 1872, The Bankers' Books
Evidence Act, 1891, and the Reserve Bank of India Act, 1934 and for matters
connected therewith or incidental thereto.
AND WHERAS the said resolution recommends inter alia that all States give
favourable consideration to the said Model Law when they enact or revise their laws,
in view of the need for uniformity of the law applicable to alternatives to peper-based
methods of communication and storage of information.
3. Legislations Amended by the 'IT Act': In order to fully achieve the objectives
of the 'IT Act', corresponding changes were required in other laws. For instance, the
Model Law requires that there should be no discrimination between electronic records
and normal documents. This mean that the law of evidence would have be amended
to recognize electronic records as admissible evidence. Therefore, the 'IT Act' made
amendments to the following Acts:
(iii) Duties and liabilities of the signatory the relying party and the
certification service provider.
equivalent in their legality and enforceability to paper based communications. It's key
provisions are:
JURISDICTION
Sovereignty
Under traditional international law, a sover ign, independent state is one which has
absolute rights and power with respect to a particular defined territory. The conduct
of its internal affairs and of its relations with other states _is entirely at its discretion
and free from external interference from any other state. It has the exclusive and
inalienable right to prescribe and enforce the law applicable to its territory. This
traditional concept of sovereignty is now restricted by international law, international
relations and international concerns. This has been discussed by Jungle Alvarez in the
Corfu Channel Case.
'By sovereignty, we understand the whole body of rights and attributes which
a state possesses in its territory, to the exclusion of all other states, and also in its
relations with other states. Sovereignty confers rights upon states and imposes
obligations on them....
... This notion has evolved, and we must now adopter a conception of it
which will be in harmony with the new conditions of social life. We can no longer
regard sovereignty as an absolute and individual right of every state, as used to be
14
done under the old law founded on the individualist regime, according to which state
were only bound by the rules which they had accepted. Today owing to social
interdependence and to the predominance of the general interest, the states are bound
by many rules which have not been ordered by their wall".
Jurisdiction
The sovereign state alone enacts the laws applicable and the methods of
enforcement in its territory. The State had the exclusive right to prosecute persons
for offences committed within its territory. The power to hear and decide a given
matter is conferred on a court of law by the state alone. This power is known as
jurisdiction.
15
The criteria which establish the jurisdiction of a court to deal with a given matter, as
laid down under this definition are:
(i) The power of the court to judge that particular matter must be
constitutionally conferred.
(ii) The facts in question must be subject to the tribunal's investigation under law.
(iii) The persons in whose favour/against whom the judgment is passed must be
present /brought before the court.
(iv) These persons must be presented brought before the Court in the manner
sanctioned.
These criteria imply that legal sanction 1s the most important aspect of
jurisdiction. The first requirement. Therefore, is the prescription of jurisdiction. The
prescription of jurisdiction serves the purpose of specifying the matters which are
within the limits of a given court. This prevents the chaos which can result from there
being no specified forum for any matter. It would mean that every court can hear
every matter. Jurisdiction of a court was traditionally decided on two grounds the
place where the cause of action arises, or on grounds of territory and the nationality
of the parties involved, or no grounds, of nationality.
16
affects the national interests of the state, is committed abroad, and does not
involve a national of the state, either, as an offender of victim.
Jurisdiction in cyberspace
Cyberspace has no geographical boundaries which lends a transnational
element to cybercrimes. Traditional national and international law are not designed to
adequately deal with such a transnational nature of cybercrimes. A transnational
crime is identified with reference to:
(i) Jurisdiction
(ii) Evidence
Where any part of the offence occurred so as to require investigation
in another territory, even though the connection isn't sufficient to
establish jurisdiction over the often.
The main issues, therefore, which arise with reference to the jurisdiction for a state
over a transnational cyber-crime, are with respect to the following.
The former requires adequate domestic and international law prescribing extra
territorial jurisdiction over a cybercrirne, and the latter requires international co-
operation, in the form of multilateral or bilateral treaties, international conventions
and mutual legal assistance agreements.
The CPC has laid down various rules based on which the Court which will
have jurisdiction over a particular matter will be determined. For instance, a suit with
respect to immovable property is to be instituted in the Court within whose territorial
jurisdiction the property is situated in whole or in part. The application of this rule is,
therefore, restricted to immovable property which is situated within India. For a suit
for compensation for wrongs to person / movable property, the Court which will have
jurisdiction will be either one of the following within whose territorial jurisdiction,
the wrong was done, of where the defendant resides I carries on business / personally
works for gain. This rule will be applicable only to situations where the wrong against
the person/his movable property was committed within lndia. Section 20 of CPC.
Provides for any situations apart from these that have been specifically provided for,
and also situations such as where the parties
19
(i) All the defendants reside / carry on a business within the territorial
limits of the court's jurisdiction.
(ii) Any of the defendants reside/carry on a business within the territorial
limits of the Court's jurisdiction.
(iii) The cause of action arises wholly or partly within the territorial limits
of the Court's jurisdiction.
The courts have used this section to exercise personal jurisdiction over entities
owning websites that could be accessed within their local jurisdiction, on the grounds
that theses websites were 'carrying on business; within the local limits of the Court's
jurisdiction.
Jurisdiction under the Criminal procedure code. 1973 (the "CrPC) is determined based
on the rules for the place of inquiry and trial under chapter Xlll. These rules can be
summarized as follows:
(i) An offence shall be inquired into and tried by a Court within whose local
jurisdiction the offence is committed.
(b) The place of commission is partly in one local area and partly another.
The offence may be inquired into and tried in a court having Jurisdiction over any of
these local areas.
(i) For an act which is an offence on account of an act which is done and a
consequence which has ensued inquiry and trial maybe at the Court within
whose jurisdiction either the act was done/ the consequence has ensued.
(ii) For an act which is an offence on account of its relation with another offence
inquiry and trial may be at the court within whose jurisdiction either of the
offences was committed.
2. Section 75 of the IT Act: Section 75 of the IT Act prescribes the extra- territorial
jurisdiction over offence or contraventions committed outside of India.
"( 1) Subject to the provisions of sub-section (2) the provisions of the Act
shall apply also to any offence or contravention committed outside India by
any person irrespective of his nationality.
r
(2) For the purpose of sub-section (1), this Act shall apply to an offence or
contravention committed outside India by any person if the act or conduct
constituting the offence or contravention involves a computer, computer
system or computer network located in India."
This section extends the jurisdiction of the IT Act to every person, irrespective
of Nationality, who commits an offence on foreign territory using a computer within
India.
This section grants 'long arm' jurisdiction to this Act. It extends the jurisdiction
of the Act to cover any act by any person which involves a computer situated in India
and leads to any offence/contravention outside India. When read with section 4 of the
IPC, this section is applicable to any offence which affects a computer located within
India. The two most important points to be noted are that this section will apply only
if the offence involves a computer system located in India, and that this section is
applicable irrespective of the nationality of the person committing the offence.
(a) The word "offence" includes every act committed outside India. Which if
committed in India, would be punishable under this Code.
(b) The expression "computer resource" shall have the meaning assigned to it in
clause (k) of sub-section (1) of section 2 of the information Technology Act,
2000."
This section constitutes the long arm provision of the IPC. Clause (3) was
inserted vide the Amendment Act. Under sub-clause (3), the fPC will be applicable
to:
(i) Any offence which is punishable under the IPC.
(ii) Which is committed by any person, whether a citizen or non-citizen.
(iii) Which is committed outside Indian territory and
(iv) The offence targets a computer resource which is located in lndia.
The main achievement of this treaty since its adoption has been to create a
minimum harmonization of cyber laws globally, and so initiate a series of reforms in
existing g legislation.
(iii) When the state refuses to extradite the individual on grounds of his nationally,
due measures are to be taken to exercise jurisdiction over him for the offences
committed. This clause indicates the adoption of the principle of out dedere out
judicare, which means that a state which refuses to extradite a person is bound
to prosecute him for the crime committed.
(iv) The exercise of criminal jurisdiction by the state under its domestic law is not
excluded under this convention. This clause indicates and attempt by the
convention to provide due respect to municipal law as well.
.(v) The Article further takes care to preserve the sovereignty of a state by allowing
the states to reserve the application of some of its clauses.
(vi) Finally, the Article emphasizes the need to foster international cooperation, by
requiring signatory states with concurrent jurisdiction over an offence to
consult each other to resolve the issue.
(i) Sufficiency of evidence for the making of a request for mutual assistance, to
be determined usually by domestic legislation.
(ii) Requirement of dual criminally, i.e. act based on which mutual assistance is
sought to be criminal in both requesting and requested state.
(iii) Option of waiving requirement of dual criminally.
(iv) Limitation of use of information obtained as a result of mutual assistance.
(v) Proscribing grounds of refusal of mutual legal assistance protection national/
public interest, consideration of severity of punishment requesting state,
political offences, human rights considerations, for example, the grant of a
right against self-incrimination.
(ii) lfhe commits a tortuous act within the territory of the state.
25
The rules for the application of this test have been developed over various case laws,
and a non-resident defendant will have minimum contacts who the state if the state.
(i) Direct contact with the state.
(ii) Purposefully availed himself of the privilege of conducting activities
within the Forum State, thus invoking the benefits and protections of
its laws, i.e. he deliberately engaged in conduct that created contact
with the state.
(iii) Entered into a contract which has substantial connection with the state,
such as with a resident of that state.
(iv) Satisfied the Calder effects test which looks at the effects of the out of
state conduct in the forum state, or the state where the suite is brought.
(v) Placed his product into the stream of commerce such that it reaches the
forum state : or
(vi) An intention to serve residents of the forum state.
26
3. Effects Test: Under this test, a court can exercise jurisdiction over a
party's conduct in another state if the contact in another state if the conduct
causes effects in the forum state. This usually involves conduct that is
expressly aimed at the forum state.
This test was laid down in the case of Calder v. jones, as a rule for
determining minimum contacts with the forum state. Here, a resident of
California sued an author for libel with respect to a article that was circular in
a magazine in California. Both the author and the editor were residents of
Florida. The U.S. Supreme Court found that the defendant knew that the
article would have a potentially devastating impact upon the plaintiff,
especially since the magazine had its largest circulation in California.
Therefore they must reasonably anticipate being hauled into a court there, and
were held to be Liable for this international and tortuous act.
(i) The defendant has contact with the forum which are related to
the cause of the action,
(i) Commercial websites. These are websites which clearly to business over the
internet. These provide a definite for personal jurisdiction.
(ii) Passive websites: These are websites that provide information only. Usually,
personal jurisdiction does not apply to these websites. If the nature of the
transaction between the plaintiff and the defendant fulfils the minimum
contact tests then personal jurisdiction with apply despite the website being
passive.
(iii) lnteractive websites: These are websites that provide information, to which
personal jurisdiction may apply depending on the commercial nature of the
transaction. Here, also, the minimum contact test needs to be applied. The
Court opined.
29
However, courts have implicitly rejected the Zippo test, criticizing the level
of interactivity and commercialism sufficient to justify purposeful availment.
Therefore, although courts continue to cite the Zippo case, the sliding scale test
articulated in the case is being applied inconsistently in practice.
Traditional laws provide criteria for establishing the legality and validity of
transactions in their paper based form. For example, a contract is usually formalized
by both parties signing the document containing the contract. The signature serves as
a method of identification of the parties to the contract, and therefore, it indicates their
assent to the term of the contract and makes it legally binding on them. Under the law
of evidence, the 'original' document constitutes primary evidence, while a copy of the
'original' document constitutes primary evidence. While a copy of the 'original'
document constitutes secondary evidence. The 'originality' of paper based documents
is usually established with the presence of original handwritten signatures. Can such
a formalized version of a contact be made electronically? How would one identify the
parties to such a contract? How does one establish the originally of an electronic
document?
The IT Act defines the asymmetric crypto system under section 2(l)(f):
30
Key Pair
The IT Act defines a key pair under section 2(1)(x):
"Key pair, in an asymmetric crypto system, means a private key and its
mathematically related public key, which are so related that be public key can verify
a digital signature created by the private key.
The public key and the private key as used in the asymmetric crypto system
are collectivity known as a key pair.
Private key
The IT Act defines a 'private key' under section 2(1) (zc):
'Private key means the key of a create a digital signature.
The private key is used to create a digital signature, i.e., to affix the digital
signature.
Public key
The IT Act defines a 'public key' under section 2 (1) (zd):
"Public key means the key of a key pair used verify a digital signature and
issued in the Digital signature certificate."
The public key is used to verify the digital signature.
Digital Signatures
The IT Act define a 'digital signature' under section 2 (1) (p):
combination of asymmetric crypto system with the 'hash functions' another method
of verification, to affix a digital signature. A digital signature would be valid only if
it is used by a 'subscriber', i.e., the person holding a valid digital signature certificate..
Subscriber
The IT Act define's a subscriber under Section 2(1) (ZG):
"Subscriber means a person in whose name the Electronic Signature
Certificate.
Authentication of electronic record using digital signatures
Section 3 of the IT Act prescribes a method of affixation of digital signatures
that combines tow processes the asymmetric crypto system and the hash function.
Encryption using a public /private key: The asymmetric crypto user a process
known an encryption for the purpose of authentication. It is a process which is used
to mathematically encode and decode text in such a way that only intended parties can
read it. When, an electronic document is mathematically encoded. Converted into a
code, it is said to be encrypted. The coded version of the documents is said to be in
the form of cipher text. When this encrypted document is mathematically decoded.
i.e. converted into plain text, it is said to be decrypted. The private key is used to
encrypt the electronic document, and the public key is used to decrypt it.
For Example, if the sender is A, his private key is Al and his public key is A2
and the recipient is B. Here, A applies Al to encrypt the electronic record and
sends it is to B. A2 made available to B who uses it to decrypt the electronic
record received by him.
(ii) Symmetric encryption: Here, instead of having one private key known
only to the sender and a public key known to the public, there is only
one single secret key. This secret key is known to both the sender and
recipient, and to no one else. The key is used by the sender to encrypt
his electronic record, and the same key is used by the recipient to
decrypt the electronic record.
A locks B unJocks
Message sent message using
message using
to B the same key
his key
In the same example given above, this form of encryption will not involve A's
key pair. It will instead involve only one private key, Al. Therefore, A
encrypts the electronic record using Al, and sends it to B. B will decrypt the
record using the same key. Al, which had been made known to him.
(a) First the sender encrypts the electronic record using his private key. This
ensures that it is the sender himself who is sencling the electronic record.
(b) Next, the sender again encrypts this encrypted electronic record using the
receiver's public key. This step ensures that no one other than the recipient
can access the encrypted electronic record.
(c) On receiving the doubly encrypted electronic record, the receiver first
decrypts the electronic record using his own private key. He now know
that no one else had access to this electronic record.
(d) Next he again decrypts the electronic record using the sender's public key.
The recipient now knows that the sender himself sent this electronic record.
In the example given above, this method of encryption will also involve B's key pair.
Bl, isprivate key, and B2, his public key, along with A's key pair. Here, first A
applies Al to encrypt the electronic record. Then he encrypts it again using B2, and
sends it to B. B first decrypts the record using B1, and then decrypts it again using
A2.
message
Message
q
electronic record yields the same hash result every time the algorithm is executed with
the same electronic record as its input making it computationally infeasible.
(a) to drive or reconstruct the original electronic record from the hash result
produced b the algorithm:
(b) that two electronic records can produce the same has result using the
algorithm.
The hash function uses a method that is very similar to the process of
encryption used in the asymmetric crypto system. It consists of a simpler form of
encoding and decoding that converts information of one length no information of a
smaller length using a mathematical algorithm.
For a given hash function, the smaller length to which the information is to
be converted is fixed. This means that, a given 'has function' will always produce a
hash result of the same length, regardless of the length of the information to which it
is applied. Therefore, the hash function consists of a many: I translation in comparison
with encryption, which uses a l: 1 translation. A given electronic record will always
produce the same hash result on the application of the same hash function, and no two
electronic records will produce the same hash result on the application of the same
has function. Even a slight change in the document will produce a completely
different hash result. Therefore, the application of a hash function to an electronic
record produces a hash result that is completely unique to the record. This guarantees
the integrity of the document, since, even the slightest modification to the document
can be detected by an application the same has function to the information.
(iv) A given set of information produces the same result every time the
hash function is applied. It is impossible (computationally infeasible)
to calculate or derive the original information from its hash result.
It is impossible for two separate electronic records to produce the same hash result
using the same bash function.
Use of Asymmetric Crypto System and Hash Function for a Digital signature
under the IT Act.
(1) Subject to the provisions of this section any subscribes the following method of
authentication used by Digital Signature.
(2) The authentication of the electronic record shall be effected by the use of
asymmetric crypto system and hash function which envelop and transform the initial
electronic record into another electronic record.
Explanation -
For the purpose of this sub-section, 'Hash function' means an algorithm mapping or
translation of one sequence of bits into another, generally smaller, set known as "Hash
Result" such that an electronic record yields the same hash result every time the
algorithm is executed with the same electronic records as its input making it
computationally infeasible.
(b) that two electronic records can produce the same hash result using the
algorithm.
(3) Any person by the use of a public key of the subscriber can verify the electronic
record.
(4) The private key and the public key are unique to the subscriber and constitute a
functioning key pair.
In order to understand how the asymmetric crypto system and hash function are used
to affix a digital signature, reference needs to be made to Rules 3, 4 and 5 of the IT
(Certifying Authorities)Rules, 2000 )(the"CA Rules)").
Under this rule, the affixation of a digital signature involves two steps - creation and
verification. This is done using cryptography, which involves the conversion of the
message into an unintelligible form and vice-versa. The method of cryptography that
is adopted here is 'public key cryptography;, which involves two keys, one which
converts the information into an unintelligible form, and the other which reconverts
38
it into the original form. The first key, the private key, creates the digital signature,
while the second, the pubic key, verifies it.
(i) if the Digital Signature was created using the corresponding private
key:and
(ii) if the newly computed hash result matches the original result which
was transformed into Digital Signature during the singing process. The
verification software confirm the Digital Signature as verified if:-
(a) the singer's private key was used to digitally sign the electronic
record, which is known to be the case if the singer's public key used to verify
the signature because the singer's public key will verify only a digital
Signature created with the singer's private key: and
Upon receipt of the digital signature and the original record, the recipient will
need to verify the digital signature. For this purpose, the public key will have
to be made available to the recipient, either, prior to sending the digital
signature, or along with the record with the digital signature, or made publicity
available for use by any recipient. The Process of verification involves the
following steps:
(i) Creation of a New Hash Result: The first step in the process
of verification is the application of the same hash function to
the electronic record received by the recipient. This result in
the creation of a new hash result.
(ii) The sender's private key is applied to the hash result , to produce an
encrypted form of the electronic record. This step indicates the
creation of the digital signature.
(iii) This encrypted record is sent along with the original document to the
receiver.
(iv) The receiver applies the sender's public key to the document, and
decrypts it to obtain the original hash result of the document.
(v) He applies the hash function to the original document sent along with
the encrypted record to obtain a hash result again.
(vi) He compares this hash result with the one obtained from the
decryption.
(vii) If the hash results are equal, the digital signature is verified.
(iii) Integrity: The hash function guarantees the integrity of the record, i.e.,
the record had not been altered while being transmitted to the recipient.
Article 7 of the Model Law which lays down the requirement for the functional
equivalence of an electronic signature, reads as follows:
"(I) Where the law requires a signature of a person, that requirement is met in
relation to a data message if:
(a) a method is used to identify that person and to indicate that person's
approval of the information contained in the data message: and
(b) That method is as reliable as was appropriate for the purpose for which
the data message was generated or communicated, in the light of all
the circumstances, including any relevant agreement.
(2) Paragraph (1) applies whether the requirement therein is in the form
of an obligation or whether the law simply provides consequences for the
absence of a signature.
(3) The provisions of the article do not apply to the following: I l"
Thus, the Model law prescribes the following requirements for a valid
electronic signature.
Section 3A of the I.T. Act has been enacted keeping in mind these requirements under
the Model Law and the need for maintaining technological neutrality.
(2) For the purpose of this section any electronic signature or electronic
authentication technique shall be consider reliable if.
(a) the signature creation data or the authentication data are, within the
context in which they are used, linked to the signatory or, as the case may be,
the authenticator and of no other person:
(b) the signature creation data or the authentication data were, at the time of
signing, under the control of the signatory or, as the case may be, the
authenticator and of no other person:
(c) any alternation to the electronic signature made after affixing such
signature .is detectable.
(3) The central Government may prescribe the procedure for the purpose of
ascertaining whether electronic signature is that of the person by whom it is
purported to have been affixed or authenticated.
(4) The Central Government may, by notification in the official Gazette, add
to or omit any electronic signature or electronic authentication technique and
the procedure for affixing such signature from the second schedule:
(5) Every notification issued under sub-section (4) shall be laid before each
House of parliament.
(i) The data or technology used for the authentication / creation of the
signature can be linked to the signatory /authenticator only.
The prescription of these criteria has given the Government the freedom to
keep pace with rapidly evolving technology without needing to amend the IT Act.
Clauses (4) and (5) of this section gives the Central Government the power to
add/omit signatures/authentication techniques from the second schedule of the Act,
provided such signature/authentication techniques meet the requirements specified
under this section.
(i) The data used to create the signature. i.e., a private key in the case of
a digital signature was, at the time of affixing the signature, under the
exclusive control of the subscriber only.
(ii) The data used to create the signature was stored and affixed in a
prescribed, exclusive manner.
The concepts of secure electronic signature and secure electronic record have
been introduced to indicate the requirement of adoption safety practice by the parties
involved. This is crucial for the maintenance of the security and integrity of
information, especially from the perspective of digital evidence.
The purpose of the PK.I is to generate trust in the electronic environment. In the
absence of trust in the security of the transmission and the content of communication,
e-commerce and e-government will not find acceptance among parties. The PKI is the
medium that establishes the validity and legality of the digital signatures being used
by subscribers and of the bodies issuing digital signatures to
45
l
Certifying Authorities
l
Subscriber
At the top of the hierarchy is the controller certifying Authorities, which licenses
Certifying Authorities, which in turn issue digital signature certificates to subscribes.
It has been defined under Section 2(1) (m) of the IT Act as follows:
The Controller has set up two subsidiary bodies, the Root Certifying Authority
of India and the National Repository of Digital Certificates.
The RCAI issues the 'Certification practice Statement' (the "CPS") which is adopted
by the Controller, which is defined as follows:
"Certifying Authority means a person who has been granted a license to issue
an Electronic Signature Certificate under section 24".
(ii) Maintain a web site and publish the license, sub-CA certificates.
(iii) Publish the name and contact infonnation of the party responsible for
the CA.
(vi) E-Mudhra
Subscriber: As the bottom of the PKJ hierarchy is the sub criber. The subscriber is
imposed with the obligations of obtaining a valid DSC from a licensed CA and
thereafter, maintaining its authenticity by suitably protecting the privat key, ,\ DSC
acts as proof linking a particular subscriber to a particular key pair. It contain!> the
following information.
(i) Serial Number (assigning of serial number to the DSC by CA to distinguish
it from other certificate):
(ii) Signature Algorithm Identifier (which identifies the algorithm used by CA to
sign the DSC);
(iii) Issuer Name (name of the CA who issued the DSC).
(iv) Validity period of the DSC;
(v) Name of the subscriber (whose public key the certificate idenlifies); and
(vi) Public key information of the subscriber.
48
Thus, the DSC enables a relying party to identify the subscriber, obtain the
public key used by him, and verify the legality of the DSC through the public
key of the CA issuing it. The relying party, before relying on the digital
signature, should also verify the purpose of the DSC, its validity period, key usage
and class. Once verified both the relying p · and the subscriber are bound
by the electronic transaction.
(ii) DSCs are usually issued with a lifetime of one two years.
(v) The CA must publish notices of such suspensions/ revocation in the CRis.
49
(ii) Duties: The subscriber shall perform such duties as prescribed with respect to
an electronic signature.
(v) Control of Private Key. The subscriber shall exercise reasonable care to retain
control over the private key and prevent its disclosures.
(vi) Compromise of private key: to the event of a compromise of the private key,
the subscriber shall inform the CA of the same as soon as possible. Until the
CA is informed, the subscriber will continue to be liable for the use of the
private key.
*******************************
50
UNIT-2
ELECTRONIC CONTRACTS
Regulation of E-Contracts
Conh·acts entered into electronically are referred to as electronic contracts.
The Model Law recognizes electronic contracts. This recognition comes in view of
the increase in "electronic commerce". Electronic commerce involves the use of
alternatives to paper-based methods of communication and storage of information.
The importance of electronic commerce lies in its ability to 'improve the efficiency of
commercial activities, enhance trade connections and allow new access
opportunities.for previously remote parties and markets, thusplaying a fundamental
role in promoting trade and economic development, both domestically and
internationally'.
(i) Proper Offer and Acceptance: An offer or proposal4 refers to the intimation
of one person's (the offeror) willingness made to another person (the offeree)
to do or abstain from doing something. When theofferee signifies his assent
to the offer, the offer is accepted5.
(iv) Free consent: Two or more persons are said to consent when they agree to
the same thing in the same sense. Consent is free if it is not caused by
coercion, undue influence, fraud, misrepresentation, and/or mistake. An
agreement without free consent is voidable.
(vi) Lawful Object: The object of the contract must be lawful, i.e., it should not
be forbidden by law, defeat the provisions of law, be fraudulent, cause injury
to person/ property, be immoral or opposed to public policy. An agreement
with an unlawful object will be void.
(viii) Agreements not expressly Declared Void: The agreement should not have been
expressly declared to be void, for example, an agreement in restraint of
marriage, an agreement in restraint of trade, etc.
Types of E-Contracts
Click-Wrap Agreements: This is the most common form of e-contracts found online.
It consists of a list of terms and conditions, to which the party can either agree to by
clicking on the "I agree' icon, or disagree by clicking the 'Cancel' T Disagree' icon.
There is no scope for any negotiation in these contracts. The party only bas the option
to reject or accept the terms of contract in their entirety. Such agreements have been
extensively challenged in the US courts, primarily on the ground that such contracts
do not provide adequate notice to the internet user. A few important decisions are
discussed:
(ii) In CoStar Realty Info., Inc. v. Fie/cf1 and Segal v. Amazon.com, Inc., it was
held that a click wrap agreement would be binding even if the user had failed
to read the contract before accepting it.
(iii) In Fteja v. Facebook, Inc., the terms of service in the form of a hyperlink
below the sign up button was held to amount to adequate notice to the user:
(ii) In Ticketmaster v. Tickets.com 25, it was held that knowledge of the defendant
ofthe terms and conditions to the website which were contained at the bottom
of the home page in small print would have to be proved.
(iii) In Hubbertv. Dell Corp, The Illinois Court of Appeal held that the a browse
wrap agreement to which the consumers received repeated exposure in the
form of the words "All sales are subject to Dell'sTerm[s] and Conditions of
Sale" in a series of pages which had to be accessed to complete a purchase,
and a conspicuous blue hyperlink to the terms and conditions, was enforceable.
54
Shrink Wrap Agreements: Shrink wrap agreements were found inside the sealed
packaging of tangible products, where one cannot see the agreement until the product
has been purchased or used. For example, software CD came packaged in plastic with
a notice that by tearing the plastic, the user will be deemed to have assented to the
terms of use which are enclosed in the CD. The plastic packaging usually contained
some of the essential clauses of the terms of use in brief so as to constitute adequate
notice to the user. Such agreements are likely to be found tmenforceable on grounds
of inadequate notice to the user, unless constructive notice can be established. It is
from the term 'shrink wrap' that the terms 'click wrap' and 'browse wrap' have been
derived.
Not only is the notice in large font, and in bold, caps and italics, it also
specifically mentions a key provision of the agreement (the mandatory arbitration
agreement) so that the user cannot deny notice later in time by saying, for example,
that she did not read the agreement in entirety.
Means: Section 1OA of the IT Act provides for the recognition of contracts
formed through electronic means:
2. Article 11 of the Model Law: Section 1OA of the IT Act has been
drafted along the lines of Articles 11 of the Model Law on the formation
and validity of contracts. It provides that:
on how the acceptance is to be made. This exception will apply even to cases where
the contract is formed through electronic means. Thus, this section cannot be applied
to hold a contract as enforceable in cases where a mode of communication other than
by electronic means was specified by one of the parties, but, the communjcation was
instead made by the other party through electronic means. Additionally, this section
does not affect any other rules that may be applicable for the validity of the contract,
for instance, the requirement of notarization.
This is in line with the intention behjnd Article 11 of the Model Law. With
respect to this Article, the Guide to the Model Law that are annexed with the text of
the Model Law as to their interpretation stated that the main purpose behind this
article was not to interfere with the national law of contract formation, but, instead to
settle the prevalent uncertainties in various countries as to the validity of a contract
that is concluded through electronic means:
''Article 11 is not intended to interfere with the law on formation of contracts but
rather to promote international trade by providing increased legal certainty as to the
conclusion of contracts by electronic means. It deals not only with the issue of
contract formation but also with the form in which an offer and an acceptance may
be expressed...
Though, the IT Act is modelled on the Model law, there are many differences
in the actual wording of the Act. Therefore, it is to be seen if the Guide to the Model
Law will be accepted by the Courts as a guide to the interpretation of the clauses of
57
the IT Act. For instance, the judgments and literature under the UNCITRAL Model
Law on International Commercial Arbitration were not accepted by the Supreme
Court as a guide to the interpretation of the Arbitration and Conciliation Act, 1996.
However, the Guide may still provide direction as to the intent behind and scope of
the clauses of the IT Act which are similar to the Model Law.
E-Commerce
E- Commerce is a new way of conducting, managing and executing business
transactions using modem information technology.
convemence from the place and time of his choice. It is about a new shopping
experience, through an electronic version of catalogue (mail order) shopping.
noted that the Information Technology Act bas expressly recognized EDI as a mode
of communication. EDI transactions now have legal sanctity in India and it is a
foregone conclusion that valid and enforceable contracts can be formed using EDI.
However, the inapplicability of the Information Technology Act, to certain types of
contracts which are required by existing law to be in writing and which also requires
signature makes the applicability of EDI narrow. The exact processes involved in the
EDI mechanism are intricate and an elaborate discussion into the field may be beyond
the scope of this chapter. In an EDI transaction, the persons entering into such
transaction agree on the technology to be used for such communication by way of a
separate agreement. Such agreement is referred to as an 'umbrella agreement'.
Credit cards in fact are a subset of the general category of payments cards, i.e., cards
whose production (whether or not any other action is required) enables the person to
whom it is issued (the holder) , to discharge his obligations to a supplier in respect of
payments for the acquisition of goods, services, accommodation or facilities, the
supplier being reimbursed by a third party, whether or not the issuer of the card, and
I
A credit card has been defined as a payment card, the holder of which is permitted
under his contract with the issuer of the card to discharge less than the whole of any
outstanding balance on his payment card amount on or before the expiry of a specified
period, subject to any contractual requirements with respect to minimum or fixed
amount of payments. The card permits the holder to obtain credit up to a stated
maximum amount from the issuer upon the card's presentation to a merchant. The
card issuer sends the cardholder periodic statements (usually monthly) describing the
purchase made. The cardholder may settle the indebtedness without interest by paying
the entire amount on receipt if the statement or the cardholder may settle the
indebtedness by installments, paying interest on the outstanding amount.
60
One of the simplest methods in use is simply de-linking the purchase process from
internet. Thus once the item is selected over the Net, the credit card number has to
be independently delivered through a phone call to the retailer.
The next method that was developed which is currently used by many sites, is hosting
the WWW site on a secure server. A secure server is one that uses a protocol such as
SSL or S-HTTP to transmit data between the browser and the server. These protocols
encrypt the data being transmitted, so when you submit your credit card number
through their www form it travels to the server encrypted.
In order to ensure customer trust and still maintain the security of credit card
transactions on the net, some companies evolved a systems to cater to the unique
nanµ-e of the internet. One of these was First Virtual.
The First Virtual system ensures the security of credit card numbers through the use
of sub titute numb rs namely "first virtual personal identification numbers" (PIN
numbers). These numbers are of no use, even if intercepted because purchases cannot
be charged to them. The first virtual system works by ensuring that a
61
person's account is never charged without e-mail verification from them, whereby the
cardholder accepts the charge.
First Virtual uses email to communicate with a buyer to confirm charges against their
account. Sellers use either email, Telnet or automated programs that make use of First
Virtual's Simple MIME Exchange Protocol (SMXP) to verify accounts and initiate
payment transactions.
Cyber Cash
CyberCash operates on a different footing from First Virtual. It simply ensures
encrypted passage over the Internet for the credit card data. Moreover, CyberCash
requires a special program (Cyber cash Wallet Software program). The user must then
register with CyberCash. Registration would include creation of a "wallet ID" and a
password. Additionally, one or more credit cards must be attached to the wallet.
Merchants must firstly open an account with an acquiring bank that supports Internet
transaction using CyberCash payment systems. They must also install their part of
their part of the Cybercash software namely Cybercash Internet Payment Software
(SMPS), which will enable communication with both the customers CyberCash
wallet, and Cybercasb's own servers.
The SET system functions on generally the same pattern as the CyberCash system.
Thus there is a need for special SET software, processing is like ordinary carets
transactions, etc. However, with SET there will be no active role to be played by one
. single entity such as CyberCash. Rather, any entity appointed by the Banks or the
Banks themselves may perform the function of translating the request format used by
acquiring banks.
62
UNIT-3
Cyber Crime
Resultant
Civil suit Criminal prosecution
Proceedings
"If any person without permission of the owner or any other person who is incharge
of a computer, computer system or computer network,-
65
f) denies or causes the denial of access to any person authorised to access any
computer, computer system or computer network by any means;
If any person steals, conceals, destroys or alters or causes any person to steal,
conceal, destroy or alter any computer source code used for a computer resource with
an intention to cause damage, he shall be liable to pay damages by way of
compensation not exceeding one crore rupees to the person so affected.
66
(i) "Computer Contaminant" means any set of computer instructions that are
designed -
(b) by any means to usurp the normal operation of the computer, computer
system, or computer network;
(iv) "Damage" means to destroy, alter, delete, add, modify or re-arrange any
computer resource by any means.
Section 43 of the IT Act, lists out certain acts which when committed without the
permission of the owner or the person in-charge of the computer and which amount
to a contravention. The lack of authorisation is therefore the primary condition
required to establish any contravention under this section. An act which exceeds the
permission granted will also amount to contravention. A contravener under this
section is liable to pay damages by way of compensation. The IT Act originally
67
provided for an upper limit of Rupees I Crore on the amount of damages that could
be awarded. However, this upper limit has now been removed by the l.T.
(Amendment) Act. 2008 (the 'Amendment Act').The contraventions listed under
Section 43 of the IT Act, when committed dishonestly or fraudulently, constitute
offences under Section 66 of the IT Act and are punishable with imprisonment and
fine.
The first requirement of 'unauthorised access' is that the access was made
without the permission of the person in charge of the computer. As mentioned earlier,
this also includes a case where a person exceeds the permission granted. For example,
if a person who is permitted a one-time access to a computer for "a specific purpose
instead explores other information stored in the computer, he exceeds the permission
granted to him, and is therefore liable for unauthorisedaccess. It is important to
establish that the person knows that his access to the S computer is unauthorised. The
requirement of a password or any other form of authentication for gaining access can
be considered to be an adequate indication of the need for authorization. As a result,
attempting to crack the password of a computer indicates knowledge that the access
is unauthorised, and amounts to an attempt to gain unauthorised access.
This clause refers to 'access' as well as 'securing access'. 'Access' implies the
actual access of a computer by a person, while 'securing access' implies obtaining the
means to access a computer. For example, a person who obtains the password of a
computer with the intention of accessing the computer at a later point of time has
'secured access' to that computer.
Section 43(a) of the IT Act, acts as a foundation for establishing most of the
other cyber-crimes, since, successful access is often the first step for the commission
68
of a crime. For example, crimes like hacking, identity theft, etc., all first require
securing access to a computer resource.
'Access' constitutes any action which leads to the availability or usage of any
of a computer's resources, whether logical, arithmetic or memory. This includes
actual physical access by a person physically present, as well as remote acc ess
through mediums like the internet and wireless systems.It includes the following:
(i) 'Gaining entry': This implies physically accessing the computer, computer
system or computer network. For example, a person who plugs a memory
device into a physical terminal of the computer has 'gained entry' into the
computer.
(ii) 'Instructing': This implies an instruction or order which is given to the logical,
arithmetical or memory function resources of a computer, computer system
or computer network. For example, a person typing into the keyboard of a
computer is giving instructions to the computer. Similarly, a person operating
a computer remotely using remote access software like "Team Viewer" is
giving instructions to the computer.
This clause constitutes the basic law governing data theft. The data stored in a
computer may include personal data, financial data, trade secrets, intellectual
property, and business methods and so on. Theft of this data can result in crimes like
credit card frauds using :financial data, extortion using personal data and sale of trade
secrets to a business rival. This can lead to immeasurable damage, along with being a
severe breach of privacy. In New South Communication Corp v. Universal Telephone
Co.17, an ex-employee of a company who mailed certain confidential financial
information of the company, which amounted to a trade secret, to his personal e-mail
account, was found guilty of trade secret misappropriation. This unauthorised copying
of confidential financial information from the company's computer system clearly
attracts the provisions of Section 43(b).
'Data': This clause needs to be studied with reference to the definition of "data" and
"computer database" as provided under the IT Act:
Data includes any material that is prepared formally for the purpose of
processing by a computer. It may be any form, whether in hard copies or soft copies,
and whether stored internally on the computer's memory or in any other storage
device. Therefore, this includes information on computer printouts, information
stored on CDs, any information stored in a computer's hard disk, etc.
'Computer Database': Section 43, Explanation (ii) of the IT Act read as follows:
infected e-mail attachment or other file from the internet, runmng of a.CD of
installation of software that contains malware or transfer through an infected external
device like a pen drive. The introduction may be through direct ('introduces') or
indirect means ('causes to be introduced').
(ii) By a virus:·
(i) 'Ransomware 'is a form of malware that prevents access of the computer by
the owner, and demands a ransom for its removal.
(v) 'Botnet malware' is any kind of malware that is used to infect and take over a
large number of computers for the commission of large scale cyber-crime,
such as distributed denial of service attack.
(vi) 'Smartphone Malware' is any malware that can affect a smartphone, For
example, 'Antammi' for Android phones is in the form of a Trojan horse; it
appears to be a ringtone application, but once installed collects information
like contact lists, GPS coordinates, SMS archives, etc.
(vii) 'Industrial Malware' includes malware like 'Duqu' and 'Stuxnet', 'Duqu' is used
for industrial espionage,- i.e., it collects information that can be used for
attacks of industrial control systems, such as stealing public and private keys.
'Stuxnet' is used for industrial sabotage, i.e., it attacks the PLCs or
'Programmable Logic Controllers' of the industry. PLCs are programs that
automate and control industrial processes and machine functions, like control
of machinery on factory assembly lines, light fixtures, etc.
The term 'damage' has been explained in Explanation (iv) to Section 43 of the
IT Act:
This clause will be applicable to the unauthorised action of any person that
results in a destruction, alteration, deletion, addition, modification or rearrangement
of a computer resource. This damage can be done directly or indirectly. A direct from
of damage is if a person modifies a file while working on a computer, while an indirect
from of damage is if the person inserts a virus that modifies files on the computer. The
term 'destroys' includes actual physical damage done to the tangible components of a
computer, for example, when someone actually removes a computers' hard disk and
breaks it. On the other hand, the remaining terms 'alters, deletes, adds, modifies or
rearranges' indicate damage to the intangible components of the computer, for
example, when s.omeone erases a hard drive. Another example of damage is an
alteration or rearrangement of the instructions contained in the soft form of a computer
programme. The section does not specify whether the damage caused should be
temporary or permanent, indicating that it covers both.
The term 'disruption' has not been defined under the IT Act. It is explained in
the Oxford Dictionary to mean any disturbance _or problems which interrupt an
'event, activity or process. Therefore, this clause will cover, any action 'which "creates
a disturbance to the normal usage of a computer, computer system or computer
network. This includes for example of a disruption caused by a virus which prevents
the usage of the internet browser (like Chrome, Firefox, etc.) by showing error
messages, corrupting files that, are downloaded, etc. Another example is the disruption
caused by a reduction in the speed of computer's operation because it bas been made
part of a "botnet".
6. Section 43(0: Denial of Access: Section 43(f) of the IT Act reads as follows:
"(/) denies or causes the denial of access to any person authorised to access
any computer, computer system or computer network by any means."
This clause deals with the unauthorised prevention of access to a person who
1s entitled to access the computer, computer system or computer network. The
prevention can be caused through any means and includes both direct and indirect
denial of access. It includes physical denial of access, i.e., when a person changes the
password of a computer, and virtual denial of access i.e., when a person introduces a
virus that affects the BIOS of the computer, therefore, preventing it from starting up.
Another example of this is where a person changes the network settings and thereby,
blocking a particular computer from the local area network.
Any person who provides access to a computer, etc., to a third person will
also be liable for the unauthorised access. Whether the person providing access is
himself authorised or unauthorised to access the computer is irrelevant, provided that
he is providing the access without the permission of the owner of the computer.
Additionally, the access provided may be physical or remote.
This clause applies where a person uses services and charges them to another
person's account. Acquiring the information required for violation of this clause, such
as user IDs, passwords, etc. usually involves other preliminary crimes, such as
hacking, phishing21, installation of spy ware, etc. This is the crime of internet time
theft, which occurs when a person uses internet hours which have been paid for by
another person. Similarly, this clause applies to crimes involving financial identity
theft, like online banking and credit card frauds, where a person makes a purchase
using the credit card/ online banking details of another person.
This clause penalizes any act which brings about an unauthorised effect on the
information residing in a computer resource. There is no specification as to the
method by which this effect can be brought about. Therefore, for a cyber-crime, this
clause is usually applied in conjunction with the previous clauses depending on bow
the effect was produced. The effect on the information includes:
(i) its destruction, for example, formatting a CD, which is a computer resource
destroys the information stored in it.
(ii) its deletion, for example, erasing a file on the computer.
(iii) its alteration, for example, data diddling results in an alteration of information.
(iv) any act which reduces its value, for example, a person converts a high
resolution photograph into a low resolution photograph. This reduces the
value of the photograph.
(v) any act which reduces its usefulness, for example, a person introduces a
virus, leading to an alteration in the code of a program, because of which
the program crashes every time it is run. This affects the utility of the
program.
(vi) any act which produces any kind of injurious effect on it, for example, a
person brings a magnetic force near a computer's hard drive, causing it to
get corrupted. This will affect the hard drive 'injuriously'.
10. Section 43(j): Modification, etc. of Computer Source Code: Section 43(j) of
the IT Act reads as follows:
78
"(j) steals, conceals destroys or alters or causes any person to steal, conceal,
destroy or alter any computer source code used for a computer resource with
an intention to cause damage."
The term 'computer source code' has been explained under Explanation (v) of
Section 43 of the IT Act:
Under this clause, a 'body corporate' will be liable for causing wrongful loss
or gain to a person due to the disclosure, in whatever form, of the sensitive personal
data in its possession. The disclosure should be as a result of negligence in
implementation of suitable security measures in respect of the data. Therefore, a body
corporate will not be liable under this clause for a disclosure that occurs despite the
implementation of suitable security measures. The body corporate will be required to
pay damages by way of compensation to the person to whom wrongful loss is caused.
The upper limit of Rupees 5 Crore for the quantum of damages was removed by the
Amendment Act of 2008.
(i) Specified in an agreement between the body corporate and the individual in
question, or
(ii) Specified by a law in force, or
(iii) ln the absence of both of the above, prescribed by the Central Government.
'
In view of this, the Central Government has issued the IT (Reasonable Security
Practices and Procedures and Sensitive Personal Data or Information) Rules' 2011
(the "Reasonable Security Practices Rules") under Section 43A of the Act to prescribe
the required parameters for 'reasonable security practices' and 'sensitive personal
data'. Some important provisions under these Rules are:
(i) password;
(ii) financial information such as Bank accouni.. vi credit card or debit card
or other payment instrument details;
(vii) any detail relating to the above clauses as provided to body corporate
for providing service; and
(viii) any of the information received under above clauses by body corporate
for processing, stored or processed under lawful contract or otherwise:
"If any person who is required under this Act or any rules or regulations
made there under to:
(a) furnish any document, return or report to the Controller or the Certifying
Authority, fails to furnish the same, he shall be liable to a penalty not
exceeding one lakh and fifty thousand rupees for each such failure;
(b) file any return or furnish any information, books or other documents within
the tune specified therefore in the regulations, fails to file return or furnish
83
the same within the time specified therefore in the regulations, he shall be
liable to a penalty not exceeding five thousand rupees for every day during
which such failure continues:
(c) maintain books of account or records, fails to maintain the same, he shall be
liable to a penalty not exceeding ten thousand rupees for every day during
which the failure continues."
In this section, the following penalty will be applicable to any person who fails
to fulfill a requirement under the IT Act or any Rules there under:
(ii) Failure to file a return or provide any information within the time
period specified, such as the requirement of a Certifying Authority to
submit a copy of an audit report to the Controller within 4 weeks of
completion of the audit.
"Whoever contravenes any rules or regulations made under this Act, for the
contravention of which no penalty has been separately provided, shall be liable to pay
a compensation not exceeding twenty-five thousand rupees to the person affected by
such contravention or a penalty not exceeding twenty- five thousand rupees."
time being in force that required a computer source code to be maintained, and
therefore an offence under Section 65 of the Act could not be made out.
Here, the Court rejected this argument, holding that Section 65 of the Act
outlined two separate situations, one where a computer source code was required to
be kept, and the other where a law required it to be maintained. The Court found that
the former situation was applicable to this case, but, whether or not the source code
was in fact maintained by the cell phone operator was a matter of evidence:
This Court, however, hastens to add that whether a cell phone operator
is maintaining computer source code, is a matter of evidence. So far as
this question is concerned, going by the allegations in the complaint, it
becomes clear that the second respondent is in fact maintaining the
computer source code."
Fraudulently/
Intention to cause dishonestly + Intentionally/
Mens Rea
damage Intention to cause knowingly
damage
Imprisonment
Imprisonment upto 3
Damages by way oi upto 3 years
Penalty years and/ or fine
compensation and/or fine upto
upto Rupees 2 lakhs
Rupees 5 lakhs
This section criminalizes the cyber contraventions under Section 43 of the Act
when they are committed with a criminal intent) i.e., when they are committed
dishonestly or fraudulently. Section 43 of the Act only requires that the act be done
without the required authorization and without specifying the mensrea.
Therefore, the two ingredients for an offence under this section read with
Section 43 of the Act are:
For the meanings of the terms 'wrongful gain and 'wrongful loss', reference can
be made to Section 23 of the IPC:
"Fraudulently": The term 'fraudulently' has been defined under Section 25 of the
l.P.C. as follows:
"(l) Whoever with the intent to cause or knowing that he is likely to cause
wrongful loss or damage to the public or any person destroys or deletes or alters
any information residing in a computer resource or diminishes its value or utility or
affects it injuriously by any means, commits hack:
The main reason for this criticism was the requirement of the act being
conducted 'dishonestly/ fraudulently' under the current Section 66 of the Act. This
means that a person is liable for an offence under this section only if the act was
committed with an intention to defraud, or with the intention of causing wrongful
loss, or wrongful gain. This implies a much higher level of mens rea than in the old
Section 66 of the Act, where a person who even had mere knowledge of the likelihood
of injury could be held liable. For example, suppose a software consultant hired to
install certain software, proceeds with the installation without reading the
instructions. Upon installation, the computer automatically reboots, as a result of
which the owner loses vital unsaved data. Under the old section on backing, since,
the level of his expertise implies that he had knowledge of the likelihood of injury,
he could have been held liable for the negligent 'destruction of information residing
in the computer resource'. Since this loss was not caused dishonestly or fraudulently,
there will be no remedy under the current Section 66 42
of the Act.
90
(b) any information which he knows to be false, but for the purpose of causing
annoyance inconvenience, danger, obstruction, insult, injury, criminal·
intimidation, enmity, hatred, or ill will, persistently by making use of such
computer resource or a communication device,
(c) any electronic mail or electronic mail message for the purpose of causing
annnoyance or inconvenience or to deceive or to mislead the addressee or
recipient about the origin of such message.
Shall be punishable with imprisonment for a term which may extend to three·years
and with fine."
Explanation: For the purposes of this section, terms "Electronic mail" and
"Electronic Mail Message" means a message or information created or transmitted
or received on a computer, computer system, computer resource or
communication device including attachments in text, iniage audio, video and
any other electronic record, which may be transmitted with the message.
This section applies to the use of a computer resource or communication device for
sending messages which are:
(ii) False, and are sent repeatedly for causing annoyance, inconvenience,
danger, obstruction, insult, injury, criminal intimation, enmity, hatred
or ill will, or
(iii) E-mails or electronic message (SMSs) sent for causing annoyance or
inconvenience, on with an intent to deceive or mislead.
The first clause of this section deals with the sending of information that is
'grossly offensive' or which has menacing character'. Examples of cyber-crimes to
which this clause would apply are cases of online defamation, text bullying online
stalking, transmission of morphed/ obscene images, etc.
"Both these terms, 'menacing' and 'grossly offensive' are undefined in the II
Act. Some guidance may be drawn from the similarity of Section 66A to Section 127
of the Communications Act, 2003, of the U.K., which deals with the improper use of
public electronic communications network:
(3) A person guilty of an offence under this section shall be liable, on summary
conviction, to imprisonment for a term not exceeding six months or to a fine
not exceeding level 5 on the standard scale, or to both.
(4) Subsections (1) and (2) do not apply to anything done in the course of
providing a programme service (with in the meaning of the Broadcasting
Act 1990 (c. 42))."
On 'Grossly offensive': The meaning of the term 'grossly offensive 'as used in this
section was discussed in the case of by the House of the Lords. It was (explained to
mean something more than a message that was merely offensive as considered by a
reasonable man. What is 'grossly offensive' is to be determined by the Judges] having
due regard to the context, surrounding circumstances and the notions of society in
general
(ii) On 'Menacing': Messages which were 'menacing' in nature under this section
were discussed by the U.K. High Court in Director of Public Prosecutions v.
Collins 44to be messages that sought to instill fear in the recipient:
This clause applies to the repeated sending of false messages for the purpose
of causing inconvenience, etc. as listed therein! This applies to cyber-crimes such as
online intimidation, net extortion, online insult, hate mails, cyber stalking and
extortion through morphed images. An explanation for the terms used in this clause
can be found with reference to similar sections under the IPC, for example:
(ii) 'Danger' has not been defined under the IPC, but has been used certain
sections such as Section 336 of the IPC, which deals with an act endangering
life or personal safety of others.
(iii) 'Insult' is covered under Section 504 of the IPC, with reference to an
intentional insult with intent. To provoke a breach of peace. Insult in
94
(iv) 'Injury' is defined under Section 44 of the IPC as any harm cause illegally to
a person's body, mind or reputation.
(v) 'Criminal intimidation' is defined under Section 503 of the I. P.C. as a threat
to injure a persons' body, reputation or property made with the intention of
causing alann/ causing the person to perform some act.
(vi) 'Enmity, hatred and ill-will' are covered under Section 505 (2) of the IPC,
with reference to creating or promoting enmity, hatred or if will between
classes.
"any electronic mail or electronic mail message for the purpose of causing
annoyance or inconvenience or to
(ii) Mails or messages sent with the purpose of deceiving or misleading the
recipient as to the origin of such mails.
This clause was inserted specifically for the purpose of dealing with spam and
unsolicited mails. It will also be applicable to cases of e-mail spoofing and phishing,
i.e., e-mails which imitate mails from financial institutions such as banks and credit
card companies in an attempt to extract confidential or financial information from the
recipient.
(a), or the Right to Freedom of S_peech. The main cause of this is the broad phrasing
of the section and the lack of any guidance as to their interpretation which can bring
any statement which a person may find annoying, insulting, inconvenient, etc. within
the purview of the section. These terms are subject to wide interpretation that varies
greatly based on the perceptions of people, such as the people writing a message,
people reading and people affected by it. This is quite evident in the case of the arrest
of two women under this section for posting comments on Face book on Bal
Thackeray's death. Comments and personal opinions such as these on blogs, Twitter,
Face book and other such sites are very common and in the absence of any parameters
to define when taking action under this section is justified, the opportunities of abuse
of this section is very high. A higher degree of harm to the people affected by such
comments should be required in order to prevent the violation of the right to freedom
of speech and maintain the constitutionality of Section 66A. The Government has
2
taken one step in terms of an advisory on the implementation of Section 66A,
wherein, it has.advised to State Governments (to not allow arrests under Section 66
A without the prior approval of a superior officer. The relevant part of the advisory is
as follows:
Illustration:
(a) 'A' cheats by pretending to be a certain rich banker of the same name.
'A' cheats by personation.
(b) 'A' cheats by pretending to be 'B', a person who is deceased. 'A' cheats
by personation."
Cheating: The term' cheating' is defined under Section 415 of the IPC as:
The crime of cheating, defined under Section 415 of the IPC, requires the
deception of a person which results in one of the following:
98
(i) Inducement to deliver property: The first part-of the section refers to a
fraudulent or dishonest inducement of the person to_ deliver any
property, or consent to the retention of any property.
(ii) Inducement to Act/ Omission Resulting in Harm: The second part of the
section refers to an intentional inducement of the person to do something
which he would not do without the deception, or not do something, which
he would normally do where such act/ omission results in harm to his body,
mind, reputation or property.
(i) Identity theft refers to the theft of an actual person's identity, while
cheating by personation may be of a real person or an imaginary person.
(ii) Identity theft specifically requires the use of a unique identifier, while
the means of personation has not been specified for the offence of
cheating by personation. Therefore the personation may be done using
an identifier or through-any other means.
(a) "transmit" means to electronically send a visual image with the intent
that it be viewed by a person or persons;
(c). "private area" means the naked or undergarment clad genitals, pubic
area, buttocks or female breast;
(ii) any part of his or her private area would not be visible to the
public, regardless of whether that person is in a public or
private place."
This section applies to the violation of the bodily privacy of any person,
Capture, publication and transmission refer to three different stages in the violation
of bodily privacy. This section •criminalizes any of these stages that are done without
the victim's consent.
It is als? essential that the capture takes place under 'circumstances violating
privacy', i.e., under circumstances where a person would normally expect to have
privacy, such as washrooms, changing rooms, hotel rooms and bedrooms. This
includes such circumstances in both public and private places. This section also
imposes a restriction on measures in the name of surveillance and security, whether
taken by a private party or the Government, for example, installation of a CCTV
camera in an office's washroom in the name of security, or a sting operation which
results in the capturing of such images.
websites and CDs. The phrase 'making it available' indic tes that it does not matter
that the images should have actually been accessed by_the publi9, so long as it is
intended for the public to access the image. For example, if such an age was
published in a magazine, the section would be attracted.regarqless of whether or not
the magazine was actually purchased or viewed by a member of th public, such as,
if the magazines were seized before their distribution. Also, the. publication must be
done without consent, for example, if such an image was captured with the victim's
consent, but, printed in the magazine without consent, the section would still be
applicable regardless of the consent to th initial capturing of the image.
Applicability of Section 354C of the IPC: An offence under this section would also
attract Section 354C of the IPC. This section, which was introduced by the Criminal
Law (Amendment) Ordinance, 2013, deals with violation of a woman's privacy:
Explanation 1- For the purposes of this section, "private act" includes an act
carried out in a place which, in the circumstances, would reasonably be expected to
provide privacy, and where the victim's genitals, buttocks or breasts are exposed or
covered only in underwear; or the victim is using a lavatory; or the person is doing a
sexual act that is not of a kind ordinarily done in public.
Explanation 2. -Where the victim consents to the capture of images or any act,
but not to their dissemination to third persons and where such image or act is
disseminated, such dissemination shall be considered an offence under this section."
Cyber Terrorism
Forms of Cyber terrorism: Cyber terrorism can take many forms, and the increasing
use of IT means that anytltjng can be its target. Some of these possibilities of cyber
terrorism and their impact have been outlined below5 6:
103
(ii) Large scale defacement and semantic attacks on websites, which can lead to
national embarrassment? total or partial disruption of services, dissemination
of false or misleading information, etc.
(iii) Malicious code attacks, like virus, worms, trojans and botnets, which can
target large and key national and economic databases like tax information
networks, citizen databases -or hospital information systems, and control
systems of sectors like power, petroleum, transport and air.
(iv) Large scale SPAM attacks which can target entities like internet service
provider networks, large corporate networks or key government networks.
(v) Identity Theft ·attacks including large-scale spoofing, phishing and social.
engmeenng attacks which can target users of banks, large
e-commerce organizations, key e-govemance entities, etc. and lead to loss
of sensitive personal.data, monetary loss and loss of image and trust.
(vi) Denial of service attacks and distributed denial of service attacks which can
cause total or partial·disruption of public utility services like fire and water
supply.
(vii) Domain name server attacks which can target country level domain registry
systems like NlXl "'.IN" registry
(x) Router Level attacks which can target gateway/ internet service provider
routers, routers of large and key economic targets like bank networks and
corporate networks and Wi-Fi Routers used by small offices and home users,
which can lead to total or partial disruption of internet traffic or online
economic activities.
In India, attacks similar to those described above have been carried out. A total
of 90 in 2008, 119 in 2009, 252 in 2010 and 219 in 2011 Indian government websites
have reported to have been backed. Currently, the Delhi police has been directed by
the courts in an application (titled Tanikella Rastogi Associates v. State) under
Sections 156(3) and 200 of the Criminal Procedure Code to investigate the hacking
of hundreds of Indian and international websites, including critical
105
The use of computers in the carrying out of the 26/11 attacks in Mumbai
intensified the need for a legislation dealing with cyber terrorism, and this was part
of the reason for the passing of the Amendment Act which introduced the provisions
dealing with cyber terrorism. However, these provisions are still inapplicable to the
actual use made of the IT by the terrorists, who did not attack the computers or IT
systems, but, instead exploited them to aid their purpose. For instance, conventional
cell phones and VoIP were used to command and control the attack,.Google Earth
was used to plan the mission, a picture posted on the Internet of commandos landing
on the roof of the hotel was used by the terrorists to ambush the attack and the
computer databases of the hotel were accessed to identify and kill guests from other
countries like the US and UK. The use of computers in the 26/11 attacks indicates an
indirect from of cyber terrorism, where the easily and publicly available information
on computers was used for perpetrating terrorism. The provisions of the IT Act in its
present form do not deal with this form of cyber terrorism.
Section 66F along with Sections 70, 70A and 70B comprise the sections of
theIT Act dealing with cyber terrorism.
Section 66F: Cyber terrorism: Section 66F of the IT Act reads as follows:
"(I) Whoever,-
(A) with intent to, threaten the unity, integrity, security or sovereignty of India or
to strike terror in the people or any section of the people by
and by means of such conduct causes or is likely to cause death or injuries to persons
or damage to r destruction of property or disrupts or knowing that it is likely to cause
damage or disruption of supplies or services essential to the life of the community or
adversely affect the critical information infrastructure specified under section 70,
or(B) knowingly or intentionally penetrates or accesses a computer resource without
authorisation or exceeding authorized access, and by means of such conduct obtains
access to infonnation, data or computer database that is restricted for reasons of the
security of the State or foreign relations; or any restricted information, data or
computer database, with reasons to believe that such information, data or computer
database so obtained may be used to cause or likely to cause injury to the interests of
the sovereignty and integrity of India, the security of the State, friendly relations with
foreign States, public order, decency or morality, or in relation to contempt of court,
defamation or incitement to an offence, or to the advantage of any foreign nation,
group of individuals or otherwise, commits the offence of cyber terrorism.
Clause l (A) deals with cyber terrorism that directly affects or threatens to affect the
people. The first requirement is an intention to threaten the unity, integrity, etc. of the
nation, or to strike terror in the people. With this intention, amrc3ftfle"following acts
may be committed:
Clause 1(B) deals with cyber .terrorism that affects the State. This clause requires
intentional or knowing unauthorised access of a restricted, information, data or
computer database. The access to such information, data or database must be either
restricted for reasons of State security/ foreign relations or the access must be made
with the knowledge that it will be used for:
(2) The appropriate Government may, by order in writing, authorise the persons
who are authorised to access protected systems notified under sub-section
(I)
(3) Any person who secures access or attempts to secure access to a protected
system in contravention of the provisions of this section shall be punished
with imprisonment of either description for a term which may extend to ten
years and shall also be liable to fine.
(4) The Central Government shall prescribe the information security practices
and procedures for such protected system."
"The Information Infrastructure is the term usually used to describe the totality
of inter-connected computers and networks, and the essential information
flowing through them. There are certain parts of the Information
109
(ii) The Central Government declared m 2010 that .the TETRA Secured
Communication System Network and its hardware and software installed at
specified places like the Traffic Control Room (Delhi Police), Jawabar Lai
Nehru Stadium (New Delhi), etc. was a protected system.
work' under the Copyright Act could be declared to be a 'protected system' under the
IT Act:
Section 70 of the IT Act is not against but subject to the provisions of the
Copyright Act and Government cannot unilaterally declare any system
as "protected" other than "Government work" falling under Section 2(k)
of the Copyright Act on which Govt. 's copyright is
. recognised under Section 17(d)of the said Act."
Section 70 A National Nodal Agency: Section 70A of the IT Act reads as follows:
(2) The national nodal agency designated under sub-section (1) shall
be responsible for all measures including Research and
Development relating to protection of Critical Information
Infrastructure.
The National Nodal Agency is the body designated by the Central Government
for the purposes of protection of the critical information infrastructure, including-
research and development. The National Critical Infrastructure Protection Centre
(NCIIPC) the National Technical Research Organisation (NTRO) has been designated
as the nodal agency under this section 76.Tbe IT National Critical Information
Infrastructure Protection Centre an,dManner of Performing Functions
111
and Duties) Rules, 2013, which were issued under sub-clause (3) of this section,
prescribe its functions and duties under Rule 4.
(2) The Central Government shall provide the agency referred to in sub-
section (I) with a Director General and such other officers and
employees as may be prescribed.
(3) The salary and allowances and terms and conditions of the Director
General and other officers and employees shall be such as may be
prescribed.
(4) The Indian Computer Emergency Response Tearn shall serve as the
national agency for performing the following functions in the area of
Cyber Security,-
(5) The manner of performing functions and duties of the agency referred to in
sub-section (1) shall be such as may be prescribed.
(6) For carrying out the provisions of sub-section (4), the agency referred to in
sub-section (I) may call for information and give direction to the service
providers, intermediaries, data centers, body corporate and any other person
(7) Any service provider, intermediaries, data centers, body corporate or person
who fails to provide the information called for or comply with the direction
under sub-section (6), shalJ be punishable with imprisonment for a term
which may extend to one year or with fine which may extend to one lakh
rupees or with both.
(8) No Court shall take cognizance of any offence under this section, except on
a complaint made by an officer authorised in this behalf by the agency
referred to in sub-section (I)."
(i) The CERT-In scans the Indian cyber space to detect traces of any untoward
incident that poses a threat to the cyber space.
(ii) CERT-In performs both proactive and reactive roles in computer security
incidents prevention, identification of solution to security problems,
analyzing product vulnerabilities, malicious codes, and web defacements,
open proxy servers and in carrying out relevant research and development.
(iii) Sectoral CERTs have been functioning in the areas of Defence and Finance
for catering critical domains. They are equipped to handle and respond to
domain specific threats emerging from the cyber systems.
Obscenity: The concept of obscenity can be understood under the following points:
(i) Hicklin Test: In the case of Regina v. Hicklin the test for obscenity was
laid down as whether the tendency of the matter charged as obscenity
is to deprave and corrupt those whose minds are open to such immoral
influences and into whose hands a publication of this sort may fall.
This test questioned the effect of certain isolated passages- of the text
in question on persons whose 'minds are open to immoral influences'.
Though, primarily, reference was being made to the youth, the effect
on older persons was also considered, if it was quite certain that the
passages would suggest to me minas of the young of either sex, or even
to persons of more advanced years, thought of a most impure and
libidinous character.'
(ii) Test laid out under United States v. One Book Entitled 'Ulysses': In this
case, the criterion for obscenity was 'whether a publication taken as a
whole has a libidinous effect'.
This case broadened the Hicklin test, stating that a work to be judged
for obscenity was to be considered in its entirety, as opposed to judging
the effect of isolated passages.
115
(iii) Test laid out under Roth v. United States: In this case, the standard for
judging obscenity was 'whether, to the average person, applying
contemporary community standards, the dominant theme of the
material, taken as a whole appeals to prurient interest.
This test requires that the 'dominant theme' of the entire text be of a prurient
nature and its effect on the 'average person' of society was to be taken into
consideration. This test rejected the Hicklin test on the grounds that the judgment of
obscenity based on the effect of a few isolated passages on a susceptible person may
result in the rejection of even a legitimate text dealing with such a subject.
(iv) Miller Test: The case of Miller v. California laid down a 'three-prong'
test for the evaluation of obscenity:
Under this test, on fulfillment, of all three criteria, the material in question can
be declared to be obscene. For the first two criteria, whether the matter 'appeals to the
prurient interest', or is 'patently offensive' is to be determined on the basis of what is
acceptable by local contemporary society, or the state, as opposed to a national
standard. For the third criterion, whether the work as a whole has any literary,
scientific, political or artistic value, as per the notions of a reasonable person (and not
an average person of contemporary society) is to be considered.
(ii) Section 293, IPC: Sale, etc., of obscene objects to young person,
Section 292 of the IPC which bans the sale, distribution, renting, exhibition or
circulation of obscene material provides a definition of obscenity) in its first clause
which bears a huge resemblance to the international tests of obscenity:
{l) For the purposes of sub-section (2), a book, pamphlet, paper, writing,
drawing, painting, representation, figure or any other object, shall be
deemed to be obscene if it is lascivious or appeals to the prurient interest
or if its effect, or (where it comprises two or more distinct items) the
effect of any one of its items, is, if taken as a whole, such as to tend to
deprave and corrupt person, who are likely, having regard to all relevant
circumstances, to read, see or hear the matter contained or embodied in
it."
A study of these tests along with the Indian case laws adopting them for the
interpretation of Section 292 is necessary for a better understanding of 'obscenity' as
used under the related sections of the IT Act:
In this case, Section 292 of the IPC was challenged as being violative of the
fundamental right to freedom of speech and expression under Article 19 of the
Constitution of India. Here, the Court adopted the Hicklin test to uphold its
constitutionality as a law imposing a reasonable restriction on the right to freedom of
speech and expression on the grounds of decency and morality, as permissible
117
under clause (2) of Article 19. This clause, in fact, embodies the most fundamental
law against obscenity in India.
In its discussion on the Hicklin test, the Court laid down the following
guidelines on the basis of which obscenity was to be judged:
(i) Consider both the work as a whole and the effect of the obscene matter
by itself, to judge whether it is so gross and its obscenity so decided that
it is likely to deprave and corrupt those whose minds are open to
influences of this sort.
(iii) Where obscenity and art are mixed, either the art must be so dominant
that it overshadows the obscenity or the obscenity must be so trivial and
insignificant that it can have no effect and may be overlooked.
(iv) If the obscenity has a dominant social purpose or profit, then it may be
overlooked.
In this case, the Supreme Court observed that the concept of obscenity is
molded to a very great extent by the social outlook jot the people who are generally
expected to read the book. It usually differs country to country depending on the
standards of morality of contemporary society in different countries. In consideration
of the need to ensure that an objective assessment was made of the obscenity of the
material at hand, it discussed the manner in which the assessment could be made
independent of each Judge's individual outlook:
118
(i) The Judge should first place himself in the position of the author and try to
understand what the author intends to convey and whether that has any
literary or artistic value.
(ii) Then the Judge must place himself in the position of the readers of the book
of every age group and try to understand what possible influence the book
will have on their minds.
(iii) A Judge should thereafter apply his judicial mind dispassionately to decide
whether the book in question can be said to be obscene within the meaning
of Section 292 of the IPC.
Some other important points discussed in this judgment which aid the
understanding of obscenity are:
(ii) 'To corrupt' meant to render morally unsound or rotten, to destroy the
moral purity or chastity, to pervert or ruin a good quality, to debase, to
defile.
In this case, the Supreme Court expressed concern at the liberal decision in the
case of Samaresh Bose, which essentially gives the judge the power to decide what
he or she thinks is obscene. The Court then adopted the three-prong Miller test in place
of the Hicklintest for the determination of obscenity.
While evaluating the tests for obscenity, the court held that the test for judging
a work should be that of an ordinary man of common sense and prudence and not an
"out of the ordinary or hypersensitive man".
This case dealt with the issue of whether, the controversial 'Bharat Mata'
minting by M.F. Hussain was obscene under Section 292 and 294 under the IPC.
While evaluating the tests for obscenity as laid down in the Ranjit Udeshi case and
other important judgments, the Court observed that knowledge was not part of the
guilty act, i.e., the offender's knowledge of the obscenity of the matter was not
required under the law and it was a case of strict liability in view of this, the obscenity
contemplated under these sections of the IPC was not to be equated with the
dictionary definition of obscenity which takes within its fold anything which is
offensive, indecent, foul, vulgar, repulsive etc. To fall within the scope of 'obscene'
under Section 292 & 294 IPC, the ingredients of the matter/art under consideration
must lie at the extreme end of the spectrum of the offensive matter.
Section 67 prior to amendment was the sole provision of the IT Act dealing with
obscene publications. This would include all forms of obscene publications, including
those that dealt with pornography - and child pornography. The prescribed punishment
was upto 5 years and Rupees 1 lakh. For the first conviction and upto 10
121
years and Rupees '2 lakbs for a subsequent conviction. With a view of bringing the IT
Act in tune with legislations prevalent in other advanced democracies, this section
was amended to introduce more stringent provisions for pornography, and especially
for child pornography.
[Section 67 of the IT Act in its current form deals with publishing of 3scene
information, Section 67A of the Act deals with publishing of sexually explicit/
pornographic material and Section 67B of the Act deals with child pornography.
This section has been framed along the same lines as Section 292 of the IPO
This will apply when the obscene material is published or transmitted in an electronic
form. The prescribed punishment for a first conviction was changed to imprisonment
upto 3 years, fineupto Rupees 5 lakbs or both. The punishment for a second
conviction was changed to imprisonment of 5 years, fine of Rupees 11 lakhs or both.
'Obscenity': For the term 'obscenity' under this section, reference should be
made to the judgments discussed above for the interpretation of obscenity under
Section 292 of the IPC. The Supreme Court in the case of Maqbool Fidi Hussainv.
Raj Kumar Pandey1, observed that the tests for obscenity under this in section and
Section 292 of the IPC were similar:
122
"...Section 67 is the first statutory provisions dealing with obscenity on the Internet.
It must be noted that the both under the Indian Penal Code, 1860 and the Information
Technology Act, 2000 the test to determine obscenity is similar."
An exception has been made for obscene information that is published for the
public good or which is used for religious/ heritage purposes.
(i) Once the interested buyer gets on to Baazee.com and views the listing,
he then opts to buy the said product and then makes payment.
(ii) Only then the remaining part of the chain is complete and the product,
which in this case is the video clip in electronic form, is then transmitted
through an email attachment and then can get further transmitted from
one person to another.
123
In. fact in the present case, the transmission of the clip to eight buyers located
in different parts of the country took place in a very short span of time.
In view of this 'chain of transactions', the Court held that, the ultimate
transmission of the obscene material wouldn't have been possible without the initial
facilitation by the website, an.d therefore the website had prima facie 'caused' the
publication:
"...it cannot be said that baazee.com in this case did not even prima facie
"cause" the publication of the obscene material. The ultimate transmission of
the video clip might be through the seller to the buyer but in a fully automated
system that limb of the transaction cannot take place unless all the previous
steps of registration with the website and making payment take place. It is a
continuous chain."
(ii) If a penal provision is capable of two interpretations, the one which is most
favourable to the accused is to be adopted.
124
(iii) The fact that other sections of the Act expressly require mens red does not
in itself imply that a section silent with respect to mensrea creates an
absolute offence.
Therefore, as per these rules, though the lack of mensrea in Section 67 of the
IT Act indicates that it imposes strict liability on a publisher or transmitter, such an
assumption cannot be made exclusively on this basis. This assumption can, however
be made based on the strict liability imposed under Section 292 of the IPC, which is
also similarly silent on mensrea. In Ranjit D. Udeshiv. State of Maharashtra, discussed
above, the Court held that, for an offence under Section 292 of the IPC, the
prosecution was not required to prove that the accused had knowledge that the
material on sale, etc. was obscene. In the Baazeecase, the Court observed that 'in view
of the strict liability imposed under Section 292', the website's knowledge of the
obscene material was presumed. The Court further held that this presumption,
however, was rebuttable, and it was a matter of evidence to prove that the website had
exercised due care to prevent the publication or transmission.
Any material': The term 'any material' implies that the section covers obscene
material in any 'electronic form', i.e., images like photographs, morphed images,
audio files, video files, of software programmes and text messages like e- mails,
SMSs and through instant messaging.
This case is considered to be the first ever conviction under Section 67 of the
IT Act in India. Some obscene, defamatory and annoying messages were posted on
a Yahoo messaging group about the victim, who was a recently divorced woman.
125
This message resulted in annoying phone calls to the victim. Upon filing an FIR the
accused, who was a former family friend of the victim was arrested and found guilty
for offences under Sections 469 and 509 of the IPC, and Section 67 of the IT Act.
(a) Article 9 of the Convention mandates the adoption of legislative and other
measures to criminalize the production, offer, distribution, transmission,
procurement or possession of child pornography through a computer system
(a) Article 2(b) of the Convention defines "child prostitution" as the use
of a child in sexual activities for remuneration or any other form of
consideration.
(c) Under Article 3(b) of the Convention, the consent of the trafficked
victim is irrelevant if brought about by these means.
2. Indian Laws Against Sexual Exploitation of Children: Many Indian laws contain
provisions protecting children against sexual abuse, prostitution, trafficking,
pornography, etc. Some of the important provisions are:
(i) The Constitution of India: The most fundamental protections to children against
sexual exploitation are embodied in the Constitution:
(ii) The Indian Penal Code, 1860: Sexual offences in general, applicable to
both minors and adults are covered under the IPC. The IPC also contains
130
(a) Section 372 punishes the selling, letting, etc. of a minor for prostitution,
illicit intercourse, or any unlawful or immoral purpose with imprisonment
upto ten years and fine.
(b) Section 373 punishes the buying, hiring, etc. of a minor for prostitution,
illicit intercourse, or any unlawful or immoral purpose with imprisonment
upto ten years and fine.
(c) Section 366A punishes the procurement of a mmor girl for illicit intercourse
with imprisonment upto ten years and fine.
(d) Section 366B punishes the importation of a girl under 21 years of age from
a foreign country for illicit intercourse with imprisonment upto ten years
and fine.
(iii) The Immoral Traffic (Prevention) Act, 1956: This Act deals with immoral
traffic for the purposes of sexual exploitation in brothels and other similar premises.
The Act also contains detailed provisions for the use of a child for prostitution:
(a) Se tion 2(f) of the Act defines 'prostitution' as the sexual exploitation or
abuse of persons for commercial purposes or for consideration in money
or in any other ind.
(d) Section 6(2) of the Act relates to the detention of a child in a brothel.
(e) Section 7(1) of the Act punishes prostitution carried on with a child in
the vicinity of a public place with 7 years upto life, or l O years with fine.
(f) Section 7(2) of the Act deals with the case of prostitution being permitted
with respect to a child in a hotel.
131
(a) Section 3 of the Act defines a 'penetrative sexual assault' and Section 7 of
the Act defines 'sexual assault'.
(b) Section 5 of the Act punishes aggravated penetrative sexual assault, such as
assault by police officer, staff of educational or religious institution or a
relative with rigorous imprisonment of a minimum of ten years and upto
life, along with a fine.
(c) Section 9 of the Act punishes aggravated sexual assault with simple or
rigorous imprisonment of a minimum of 5 years upto 7 years and fine.
(d) Section 11 of the Act defines 'sexual harassment' which includes enticing
the child using or for pornography and stalking the child.
(e) Section 13 of the Act defines the use of a child for pornographic purposes
as use of the purposes of sexual gratification in any form of media, including
the internet, electronic form, etc.
(f) ,The explanation to Section 13 of the Act explains that the term 'use a child'
• I
shall include involving a child through any medium like print, electronic,
computer or any other technology for preparation, production, offering,
transmitting, publishing, facilitation and distribution of pornographic
material.
132
(g) Section 21 of the Act mandates the reporting of an offence under the Act
and failure to do so is punishable with 6 months imprisonment and/ or fine.
(h) Chapter Vil establishes Special Courts for trial of offences under the Act.
(e) For investigations requiring help from outside India, approach CBI
Interpol Division or contact G8 24x7 Help Desk of CBI. Provisions
of Mutual Legal Assistance Treaties and Letter of Rogatories (LR)
ifiay be used.
Prior fd· the IT Act, the provisions of the IPC and the Indecent Representation
of Women (Prohibition) Act were used to deal with issues of pornography. These
provisions included visual representations in their scope, but, other electronic
materials like audio materials and computer-generated photographs were, not
specifically covered. Further, these Acts did not deal with the issue of child sexual
abuse and more importantly with child pornography adequately. While the issue of
whether pornography and prostitution should be legalized is regularly
133
debated, a line has always been drawn with child pornography and sexual abuse. The
IT Act (prior to amendment) introduced some protection for the publication and
transmission of obscene materials, but stringent punishment for child pornography
and sexual abuse came were still required.
With a view to imposing this stringent punishment and bringing India in line
with the international instruments listed above, Section 67 was amended to introduce
safeguards against the online sexual exploitation of children through Section 67B.
This resulted in the criminalizing of acts like the possession, viewing and creation of
child pornography in addition to its publication and transmission. Another important
addition is the clause to deal with grooming of children for these purposes.
Whoever,-
(e) records in any electronic form own abuse or that of others pertaining
to sexually explicit act with children, Shall be punished on first
conviction with imprisonment of either description for a term which
may extend to five years and with a fine which may extend to ten lakh
rupees and in the event of second or subsequent conviction with
134
Explanation: For the purposes of this section, "children" means a person who
has not completed the age of 18 years."
The scope of this clause is not restricted to material involving actual children
only. On comparison between this clause and Section 67A of the Act, it can be
observed that Section 67B of the Act criminalizes material 'depicting' children in
sexually explicit acts, as opposed to Sec.tion 67 A of the Act, which criminalizes
material 'Containing' sexually explicit acts. The use of the word 'depict' indicates the
adoption of the explanation of 'child pornography' under Article 9 of the Budapest
Convention on Cyber-crime, which states that:
conduct.
(ii) Legal interests protected under this clause: The legal interests protected under
each clause is different: Clause (a) focuses on direct protection against child
abuse, while Clauses (b) and (c) focus on behavior that may indirectly harm
the child, such as material which may be used to encourage or seduce the
child.
iv) Data capable of conversion: Visual depiction includes data stored or computer
diskette or on other electronic means of storage, which are capable of
conversion into a visual image.
(v) Real/ simulated: It is irrelevant whether the 'sexually explicit conduct' is real
or simulated.
On the basis of this explanation, it can be assumed that the term material
depicting children in sexually explicit act' under Section 67B (c) of the IT Act includes
the following-
This clause incorporates a total ban on any material that sexually exploits
children. It relates to electronic material depicting children in an obscene, indecent
or sexually explicit manner. The following acts in relation to such material have been
criminalized:
(i) Creation: The creation of text or digital images is covered under this
clause. This will include the creation of morphed images,
pornographic images and written material containing- references to
children in an obscene, indecent or sexually explicit manner.
(ii) Consumption: The consumption of such material, i.e., the col lection,
seeking, browsing and downloading of such material is also included
in this section. Therefore, acts like searching for or browsing through
child pornography on the internet, downloading, storing it on a
compl:lter or in any other electronic form, will be an offence. The
reason for banning the consumption of obscene or pornographic
material depicting children, while permitting the consumption of other
obscene or pornographic material, is due to the fear that allowing it
will encourage the actual commission of sexual abuse against children.
(iii) Distribution: The clause also includes any step leading to the spread
of such material, such as its advertisement, promotion, exchange or
distribution. Some convictions in the U.S. for distribution of such
material includes cases of sending e-mails advertising the creation of
a Yahoo! Group for sharing child pornography, for publishing a
137
This section covers the online solicitation of a child or the grooming of a child
for sexual purposes. It must have been the intention of the legislature to include pre-
offence grooming by anyone, an adult or a child, which results in an online relationship
with this adult or anyone else for the purposes of a sexually explicit act. However, the
drafting of the section seems to indicate that its scope is restricted to instances of where
the online relationship which the child is being cultivated, enticed or induced into is
with another child only and not with an adult. It is not specified whether the person
actually doing the grooming is an adult or another child, so long as the purpose is for
an online relationship with another child. A clear interpretation of this section is
required in order to include grooming in its entirety, and not restrict it to a relationship
between children.
This clause covers any act that facilitates or aids the abusing of children online)
For example, a person involved in on-line practices like the exchange of ideas,
fantasies and advice among pedophiles, or a website that permits such activities, which
can play a role in encouraging sexual offences against children, would be covered
under this. This clause may also be used against intermediaries such as cyber cafes
that omit to take due care.
This clause refers to the recording of a sexually explicit act with a child,
whether the abuser is the person recorcting or any other person. This will include any
recording in electronic form, such as videotaping, taking photographs through a digital
camera or smartphone or recording or photographing through a webcam. The purpose
for which the recording is done is irrelevant, i.e., the mere act of recording a sexually
explicit act with a child is an offence.
This was the first case charged under Section 67B of the Act. Wilhelmus was
a Dutch national who came to India as a tourist in 1980 and was running an
orphanage. He was arrested in 2002 on receiving a tip-off from INTERPOL thai he
was uploading pornographic content. It was found that he was sexually abusing 5
boys in his orphanage.
(The Bazeecase)
In this case, the website Bazee.com carried a listing whfoh offered for sale a
video clip shot using a mobile phone of two school children indulging in a sexually
explicit act. The listing escaped the filters installed in the website, but was brought
to the notice of the website on the same day that it was put up by another user.
Despite this, the listing was available for sale for a period of 3 days and was
thereafter purchased by 8 persons. The key findings of the High Court of Delhi in
petition to quash the criminal proceedings against the petitioner were as follows:
(i) Prima facie obscene: The listing contained explicit words that left a person in
no doubt that what was sought to be sold was lascivious, and therefore the
listing was prima facie an obscene material or text.
(ii) Failure of filters: Website owners and operators need to employ filters if they
want to prove that they did not knowingly permit the use of their website for
sale of pornographic material. However, if the filters fail, then, the website's
139
(iv) Website 'caused' the publication: In view of the chain of transactions, most of
which are under the direct control of the website, the website did prima facie
'cause the publication' under Section 67 (prior to Amendment) of the IT Act.
(v) Petitioner not liable in individual capacity. The IPC does not recognise the
concept of 'automatic criminal liability' attaching it to the director, where the
company is an accused. In the absence of a specific allegation in the charge
sheet that despite knowing the failure of the filters, he nevertheless, did
nothing about it, the petitioner cannot be held liable in his individual capacity.
(vi) Petitioner is liable in his capacity as MD: Section 85 of the IT Act attaches a
deemed criminal liability on a person who, at the time of commission of the
offence, was in "charge of, and was responsible to, the company". On this
basis, the petitioner is liable in his capacity as the Managing Director.
Proviso to Sections 67, 67A and 67B: The Proviso to Sections 67, 67A and 67Bof
the IT Act reads as follows:
"Provided that the provisions of section 67, section 67A and this section does not
extend to any book, pamphlet, paper, writing, drawing, painting, representation or
figure in electronic form-
This excludes the application of Section 67, 67A and 67B of the Act to any
and electronic material:
140
This section is similar to the first exception provided under Section 292 of.the
IPC. The first exception has been inserted for the protection of material which
is published for the public good, such as material dealing with medical
information, art, social causes, etc. For example, the film 'Bandit Queen' was held
to be a film that carried a message of social evil, and the depictions of nudity
and rape were not obscene or pomographic42 . The second exception protects
material used for religious or heritage purposes, such as the sculptures in the temples
of Bhubaneshwar, Konark and Puri in Orissa and Khajuraho in Madhya Pradesh.
(2) Any person who intentionally or knowingly fails to comply with any
order under sub-section (1) shall be guilty of an offence and shall be
liable on conviction to imprisonment for a term not exceeding .two.
years or to a fine not exceeding one lakh rupees or to both."
Under this section ah offence will be committed when certain orders of the
Controller are not followed. The orders may be with respect to any issue requiring
compliance with the IT Act or Rules, for example, licensing of Certifying Authorities
("CA"), issue of electronic signature certificates or prescribing the
141
"Whoever makes any misrepresentation to, or suppresses any material fact from,
the Controller or the Certifying Authority for obtaining any license or Electronic
Signature Certificate, as the case may be, shall be punished with imprisonment for
a term which may, extend to two years, .or with fine which may be extended one
lakh rupees, or with both".
(ii) A suppression of a material fact from the Controller or CA, i.e. the
concealment of a material fact. A material fact is any information that is
sufficiently significant so as to influence an individual into doing something,
in this case into issuing the license or Electronic Signature Certificate.
(a) the Certifying Authority listed in tbe,certi.ficate has not issued it; or
(b) the subscriber listed in the certificate has not accepted it; or
142
(c) the certificate has been revoked or suspended, unless such publication is for
the purpose of verifying a digital signature created prior to such suspension or
revocation.
(2) Any person who contravenes the provisions of sub-section (1) shall be
punished with imprisonment for a term which may extend to two years, or with fine
which may extend to one lakb rupees, or with both."
(i) is not issued by the CA listed as the issuing authority in the certificate.
(ii) has not been accepted by the subscriber listed in the certificate.
(iii) has been revoked or suspended, unless the publication is for the
purpose of verification prior to such revocation or suspension.
"Save as otherwise provided in this Act or any other law for the time being
in force, any person who, in pursuance of any of the powers conferred under this Act,
rules or regulations made there under, has secured access to any electronic record,
book, register, correspondence, information, document or other material without the
consent of the person concerned discloses such electronic record, book, register,
correspondence, information, document or other material to any other person shall
be punished with imprisonment for a term which may extend to two years, or with
fine which may extend to one lakh rupees, or with both."
This section confers the right of privacy over any information acquired in
official capacity. The disclosure made should be without consent and should not be
permitted or required under any other law.
Right to Privacy not Absolute: The right to privacy is implicit in the right to life
and liberty guaranteed under Article 21 of the Constitution. Anything concerning the
private matters of a person, whether truthful or otherwise, which is published without
his consent amounts to a violation of privacy'. This right to privacy is,
144
"Save as otherwise provided in this Act or any other law for the time being
in force, any person including an intermediary who, while providing services
under the terms of lawful contract, has secured access to any
. material containing personal information about another person, with the
intent to cause or knowing that he is likely to cause wrongful loss or
wrongful gain discloses, without the consent of the person concerned, or in
breach of a lawful contract, such material to any other person shall be
punished with imprisonment for a term which may extend to three years, or
with a fine which may extend to five lakh rupees, or with both."
145
Provided that nothing contained in this sub-section shall render any such
person liable to punishment if he proves that the contravention took place
without his knowledge or that he exercised all due diligence to prevent such
contravention.
Explanation-
(iii) for the conduct of the business of the company and for the company.
(iv) This liability is subject to the person being proceeded against proving that:
Clause (2) - Liability of person with whose consent, connivance or neglect the
offence takes place: This clause imposes liability on:
(ii) and if it is proved that the contravention took place with such person's
consent or connivance, or because of its neglect.
This liability is in addition to the liability imposed under clause (1). The
explanation to this section provides that for a firm, the director would mean the
partner of the firm.
(ii) Every person who, at the time the contravention was committed, was in
charge of, and was responsible to, the Company for the conduct of the
business of the Company, and
(iii) Any director, manager, secretary or other officer of the Company with whose
consent or connivance or because of neglect attributable to whom the offence
has been committed.
Formerly, any one, or more than one or all of the persons could be held liable
for the offence. In the case of Sheoratan Agarwal v. State of Madhya Pradesh, it was
held that:
"there is no statutory compulsion that the person -in-charge or an officer of the
company may not be prosecuted unless he be ranged alongside the company itself.
Each or any of them may be separately prosecuted or along with the company if there
is a contravention By the company.
contrasted with the role of the Senior Manager, Trust and Safety, who were
responsible for maintaining the subject and banned key word list and ensuring that no
lascivious item is listed for sale on the website. The Court observed that though &
prima facie case had been made out against the company, there was no specific
allegation against the petitioner in his individual capacity. The court, therefore, held
that the liability could be attached to the petitioner only in his capacity as MD under
Section 85 of the IT Act and not in his individual capacity under Section 292 of the
IPC:
(i) A director does not automatically become criminally liable for the
criminal acts of the company.
(ii) In the absence of the company being made an accused and in the absence
of specific allegations concerning the MD of the company, it is not
possible to make out even a prima facie case against the petitioner in his
individual capacity under Section 292 of the IPC.
(iii) A prima facie offence against the company has been made out under
Section 67 of the IT Act.
(iv) Without the company being made an accused, its directors can be
proceeded against under Section 67 read with Section 85 of the IT Act.
(v) A prima facie offence is made out against the petitioner under Section
85. Since, the law recognises·the deemed criminal liability of the
directors even where the company is not arraigned as an accused and
particularly since it is possible that BIPL may be hereafter summoned to
face trial.
This decision with respect to Section 85 of the IT Act was overruled in appeal
before the Supreme Court 58. The Court observed that companies can no longer claim
immunity from prosecution on the grounds that they were incapable of possessing the
required mensrea .However, the normal rule in cases involving criminal liability is
against the imposition of vicarious liability, subject to an exception on account of a
specific provision being made in a statute, which extends liability to others. In such
situations the conditions laid down are to be strictly
149
complied with. With respect to Section 141 of the Negotiable Instruments Act, 1881,
the Court held that:
The Court further observed that, this analysis was squarely applicable to
lection 85 of the IT Act. On the grounds that the company was not arraigned as n
accused in the Baazeecase, the proceedings against the petitioner were
(i) Sections 66A, 66C, 66D, 67, 67A, 67B, 67C, 69, 69A, 69B and 70 of
the IT Act prescribe imprisonment and fine.
(iii) Sections like 65, 66E, 66F, 67C, 68, 69B and 74 of the IT Act
specifically require an element of mensrea, i.e., the offences should
have been done intentionally or knowingly
(iii) 1997: Only a fine can be imposed on a company for an offence where
imprisonment and fine are mandatory: In the case of M.V. Javali v.
Mahajan Borewell & Co. and Ors:
(iv) 2004: No choice to impose only a fine on a company for an offence where
imprisonment and fine are mandatory: In the case of The Assistant
Commissioner, Assessment-JI, Bangalore &Ors. v. VelliappQ Textile, the
Supreme Court overruled the position taken in M.V. Javali:
Miscellaneous Provisions
Provided that the Court shall not compound such offence where the accused
is by reason of his previous conviction, liable to either enhanced punishment
or to a punishment of a different kind.
Provided further that the Court shall not compound any offence where such
offence affects the socio-economic conditions of the country or has been
committed against a child below the age of 18 years or a woman.
(2) The person accused of an offence under this act may file an application
for compounding in the court in which offence is pending for trial and the
provisions of section 265 B and 265 C of Code of Criminal Procedures, 1973
shall apply."
(ii) Any offence where the accused is liable to enhanced or different punishment
on account of a previous conviction.
(iii) Any offence which affects the socio-economic conditions of the country.
(iv) Any offence which affects a child below the age of 18 years or a woman.
The application for compounding can be filed by the accused in the same court
where his offence is to be or being tried. The provisions of Criminal Procedure Code
with respect to plea bargaining, i.e., Section 265 B, Application for Plea bargaining
and Section 265C, Guidelines for Mutually Satisfactory Disposition, will be
applicable to the filing of this application.
"{1) Any contravention under this Act may, either before or after the institution
of adjudication proceedings, be compounded by the Controller or such other
officer as may be specially authorised by him in this behalf or by the adjudicating
officer, as the case may be, subject to such conditions as the Controller or such
other officer or the adjudicating officer may specify:
Provided that such sum shall not, in any case, exceed the maximum amount of
the penalty which may be imposed under this Act for the contravention so
compounded.
154
(2) Nothing in sub-section (1) shall apply to a person who commits the same or
similar contravention within a period of three years from the date on which the
first contravention, committed by him, was compounded.
(3) Where any contravention has been compounded under sub-section (1), no
proceeding or farther proceeding, as the case may be, shall be taken against the
person guilty of such contravention in respect of the contravention so
compounded. "
Contravention Compound
/ Offence Imprisonment Cognizability Bail ability
ability
43-Damage to
computer, Damages Not
Computer system Not Applicable Compoundable
(no limit) Applicable
or computer
Upto 3 yrs/
66-Computer
Fine Bailable Compoundable
Related Cognizable
Rupees5L/
offences both
66A-Sending
offensive
messages through 3 yrs and Fine Cognizable Bailable Compoundable
communication
service
66B-Dishonestly
receiving stolen Upto 3 yrs/
computer resource Fine RupeesIL/ Cognizable Bailable Compoundable
or communication both
device
Upto 3 yrs/
66C-Identity theft Fine Rupees1 L/ Cognizable Bailable Compoundable
both
66D-Cheatingby
personation by Upto 3 yrs and Compoundable
Cognizable Bailable
using computer Fine Rupees 1L
resource
Upto 3 yrs/
66E-Violation of Bailable Compoundable
Fine Rupees2L/ Cognizable
pnvacy
both
1stConviction:
Upto 3 yrs and Non-
67-Publishing or Fine Rupees 5L Compoundable
transmitting 2nd Conviction: Cognizable Non-bailable
on 2nd
obscene material Upto 5 yrs and Conviction
Fine Rupees
IOL
IstConviction:
67A-Publishingor Upto 5 yrs and
transmitting of Fine Rupees
material containing lOL Non-
Cognizable Non-bailable
sexually explicit 2nd Conviction: Compoundable
act, etc. in Upto 7 yrs and
electronic form Fine Rupees
lOL
156
l51Conviction:
67B-Publishingor Upto 5 yrs and
transmitting of Fine Rupees
material depicting lOL Non-
Cognizable Non-bailable
children in sexually 2nd Conviction: Compoundable
explicit act, etc.in Upto 7 yrs and
electronic form Fine Rupees
lOL
67C-Non-
compliance with the Upto 3 yrs and
Non-cognizable Bailable Compoundable
directions of the Fine
government for
preservation and
Retention of
information by
intermediaries
68-Failure to
comply with the
Upto 2 yrs/
directions issued
Fine Rupees1L/ Non-cognizable Bailable Compoundable
through an order of
both
the Controller under
section 68
69-Failure to assist
agency in
intercepting or
monitoring or Upto 7 yrs and Non-
Cognizable Non-bailable
decrypting any Fine Compoundable
information through
any computer
source.
69A-Failure to
comply with
directions for
blocking of public Upto 7 yrs and Non-
Cognizable Non-bailable
access of any Fine Compoundable
information through
any computer
resource
157
69B-Failureof
intermediary to
assist agency
appointed by the
government to
Upto 3 yrs and Compoundable
monitor and collect Cognizable Bailable
Fine
traffic data or
information through
any computer
resource for cyber
security.
72-Penalty for
breach of Upto 2 yrs and Compoundable
Non-cognizable Bailable
confidentiality and Fine Rupees IL
privacy
Breach of lawful
contract
73-Penalty for Upto 2 yrs/ Non- Bailable Compoundable
publishing Fine Rupees cognizable
Electronic IL/ both
Signature
Certificate false in
certain particulars
74-Publication for Upto 2 yrs/ Non- Bailable Compoundable
fraudulent purpose Fine Rupees cognizable
lL/ both
the punishment of such abetment, be punished with the punishment provided for
the offence under this Act.
Under this section, the abetment of an offence shall be punishable with the same
punishment as that provided for the offence, provided that:
(i) The offence that is abetted is actually committed as a result of the abetment.
The explanation to the section provides that the act should be the result of
the instigation, conspiracy or aid that constitutes the abetment. This
explanation is similar to that provided under Abetment under the IPC.
(ii) The abetment of that offence has not been otherwise expressly provided for
under the IT Act. For example, Section 43(g) of the IT Act expressly
provides for a person who aids unauthorised access of a computer.
(iv) Procedure of CPC not Applicable: The procedure laid down by the Code of
Civil Procedure, 1908, is not applicable to the CAT. It is, however, to be guided
by the principles of natural justice.
(v) Power to regulate its Procedure: The CAT has the powers to regulate its own
procedure including the place at which it would hear the matters before it.
(vi) Powers of a Civil Court: The CAT has the same powers as are vested in a civil
court under the Code of Civil Procedure, 1908, for the purposes of discharging
its functions under the IT Act in respect of the following matters:
(a) summoning and enforcing the attendance of any person and examining
him on oath;
(viii) CAT Deemed to be a Civil Court for Certain Purposes: The CAT is
deemed to be a civil court for the purposes mentioned in section 195 (which
lists offences which the court may not take cognizance of unless the conditions
provided therein are satisfied) and Chapter XXVI of the Code of Criminal
Procedure, 1973 (Provisions as to offences affecting the administration of
justice).
161
(ix) Provisions of Limitation Act: As the CAT enjoys the powers of a judicial
court, hence, as per section 60 of the Act, the provisions of the Limitation Act,
1963, have been made applicable to the proceedings of the CAT.
(x) Civil Court not to Have Jurisdiction: No civil court shall have a jurisdiction
to entertain a suit or proceeding, or grant an injunction over a matter in respect
of which the CAT or Adjudicatory Officers have jurisdiction. However, a
Court may exercise jurisdiction over a claim for injury or damage that exceeds
the maximum amount which can be awarded under this Chapter·
(xi) Appeal to High Court: Any appeal on any question of fact or law arising in
a decision of the CAT lies with the High Court of the concerned state within
60 days of the date of communication of the decision. The High Court may
extend the period of filing an appeal by another 60 days for sufficient cause.
Certain rules have been laid out by the Central Government in exercise of its
powers under Section 87 of the IT Act:
(i) Cyber Regulations Appellate Tribunal (Procedure) Rules, 2000
(iii) IT (Other Powers of Civil Court Vested in Cyber Appellate Tribunal) Rules,
2003
(iv) Cyber Appellate Tribunal (Salaries, Allowances and Other Terms and
Conditions of Service of Chairperson and Members) Rules, 2009
(v) Cyber Appellate Tribunal (Procedure for Investigation of Misbehaviour
and/or Incapacity of Chairperson and Members) Rules, 2009
Adjudicatory Officers
The IT Act provides for appointment of an Adjudicating Officer by the Central
Government for inquiring into and adjudicating contraventions under the Act under
Sections 46 and 47 of the IT Act:
In the case of S. Sekarv. The Principal General Manager, the petitioner was
prosecuted under Sections 406, 420 and 468 of the IPC and Section 43(g) of
the IT Act for offences committed by the manipulations of a computer
system. The Madras High Court held that it did not have the jurisdiction to
hear a matter which involved a criminal charge under Section 43(g) of the
IT Act. This jurisdiction had been expressly vested in the Adjudicatory
Officer under Section 46(1) of the IT Act.
(iii) Powers of a Civil C urt: Every Adjudicatory Officer shall have the powers
of a civil court which are vested in the CAT under Section 58(2).
(iv) For the purposes of section 193 and 228 of the IPC, the proceedings before
an Adjudicating Officer are considered to be judicial proceedings.
(v) The Adjudicatory Officer will be deemed to be civil court for the purpose of
Sections 345 (Procedure in cases of contempt), 346 (Procedure when Court
thin.ks that the case should not be dealt under Section 345) and Order XXI
(Power to try summarily) of the Code of Criminal Procedure1•
(vi) The Adjudicating Officer while adjudging the quantum of compensation
is required to take the following factors into account:
(b) the amount of loss caused to any person as a result of the default;
(c) the repetitive nature of the default2.
163
Section 292
(Sale, etc. of
Section 67-B obscene Section 11, (Sexual
(Punishment for books, etc.) Harassment) and
Child Pornography publication or Section 293 Section 13, (Use of a
(viewing, downloading, transmission of (Sale etc. of child for
2 creation, publication, material obscene pornographic
transmission, depicting objects to purposes), of
downloading, exchange, children in young Protection of
etc.) sexually explicit person) Children from
act, etc. in Section 294 Sexual
electronic form) (Obscene Offences Act, 2012
acts and
songs)
Section 65 computer
Example - Alteration of
(Tampering with programme) of
computer source code of
computer source Copyright Act,
a cell phone )
code 1957"
164
deceive/ mislead
as to origin)
Section 66C
(Identity Theft)
Section 66D
(Cheating by
Personation)
Section 66-A
(Punishment for
sending offensive
Cyber Bullying messages through
communication
(Bullying of a person service)
through the internet in a
deliberate and repeated Section 67
manner. Methods may (Publication of '
6. include publication of obscene material
defamatory matter, in electronic
hacking into the persons' form)
accounts, online stallcing
and creation of fake Same as Cyber
accounts in the person's Defamation
name) (No.7), Hacking
(No.40), Identity
Theft (No.26)
Section 66A
(Punishment for Section 499
Cyber Espionage
Cyber Harassment
Same as Cyber
9
(A more serious form of Bullying (No.6)
cyber bullying)
10 Cyber Squatting Section 27
(Registration or (Passing off)
acquisition of website, or and Section 29
domain name, that is (Infringement
identical to another's of registered
trademark, with the trademarks) of
intention of selling it to the Trademarks
trademark holder at a Act, 1999
higher price or diverting
the customers of the
trademark holder, etc.)
Sections
S.No. Cyber-crime Sections under IT Sections
under Misc.
Act underIPC
Laws
16 Denial of Service Attacks Section 43 (a)
and Distributed Denial of (Unauthorised
Service Attacks Access)
(Attack by overloading a Section 43 (c)
website or network with (Introduction of
requests, making the computer
website unavailable for contaminant /virus)
regular users. A distributed Section 43 (d)
denial of service attack (Damaging
involves requests being Computer)
sent from several Section 43(e)
computers, which are (Disruption of
known as a 'botnet'. Computer)
Thebotnetis created Section 43(f) (Denial
through the introduction of of access)
viruses in others' Section 43 (i)
computers without their (Destruction of
knowledge. Information)
May be used as a form of Section 66(Computer
cyber terrorism, to disrupt Related Offences)
the business of a rival, as a Section 66F(l)(A)(i)
form of cyber threatening, (Cyber Terrorism
etc.) using a denial of
service attack)
17 Digital Signature Section Section 464
Certificates and related 73(Publication of (Creation of
crimes false electronic false
signature certificate) electronic
Section 74 (Creation record
or publication of through
false electronic dishonest/
signature) fraudulent
affixation of
electronic
signature)
18 Disclosure of sensitive and Section 43A
personal information (Compensation for
failure to protect
data)
Section 72 (Breach
of Confidentiality
and Privacy)
169
Sections Sections
S.No. Cyber-crime Sections under IT Act
underIPC under Misc.
19 Dishonestly receiving Section 66B Section 411
stolen computer, computer (Dishonestly (Dishonestly
system, computer network, receiving stolen receiving
data, computer data base computer stolen
or software resource or property)
(For eg- Accepting stolen communication
laptop, usage of pirated device)
software, etc.)
Section
474(K.nowing
. possession of a
forged electronic
record with
intention of using it
as genuine.)
Section 476
(Counterfeiting
device or mark
used for
authenticating
electronic
records or
25 Hacking Section 43(a)
(Unauthorised (Unauthorised
access of a Access)
computer resource Section 43(b)
through the (Downloading/
exploitation of Extracting Data)
some weakness in Section 43(c)
the security (Introduction of a
system, or through Computer
the insertion of a Contaminant/
virus, password Virus)
cracking, or any Section 43(d)
other means) (Damaging a
Computer)
Section 43(e)
(Disrupting a
Computer)
Section 43(f)
(Denying Access)
Section 43(i)
(Destruction of
Tnfonn t on in
172
Sections
Sections
S.No. Cyber-crime Sections under IT Act under Misc.
underIPC
Laws
44 Theft of Data Section 43 (a)
(Unauthorised (Unauthorised Access)
extraction, downloading Section 43 (b)
or copying of (Unauthorised
confidential downloading/ copying/
infonnation, sensitive extraction of data)
and personal Section 43-A
information, other data (compensation for
or databases.) failure to protect data)
Section 66 (Computer
Related Offences)
Section 66B
Dishonestly receiving
stolen
computer resource)
Section 72 (Breach of
Confidentiality and
Privacy)
Section 72A
(Disclosure of
information in breach
of lawful contract)
45 Time Bomb Sarne as Virus (No. 49)
(Form of software
program that is
programmed to stop
functioning at a pre-
determjoed time.
Example - Use of a time
bomb for industrial
sabotage, by causing a
critical software to stop
functioning)
179
Sections
Sections
S.No. Cyber-crime Sections under IT Act under Misc.
under IPC Laws
46 Trademark Trademarks
Infringement (Example Act, 1999
- Cybersquatting,
typosquatting, reverse
domain name hijacking,
trademark infringement
through metatags,
framing and linking)
Section 66
(Computer Related
Offences)
UNIT-4
ln the virtual world of cyberspace, the objects present are not in a tangible
form like land is, but, are instead in the intangible form of digital information.
Information available in cyberspace in the form of computer software, trade secrets,
literary works like writings, novels and journals, creative works like paintings,
photographs and sound recordings, etc. constitutes a valuable resource for their
creator. However, this wealth of digital information contained in cyberspace is subject
to a big risk which can be easily misused. The ease with which digital information
can be created and disseminated implies that it can just as easily be accessed, used
and modified without the knowledge of its owner. The result of this is that digital
information also needs to be made the subject of property rights, and its use and access
needs to be restricted.
The TRIPS Agreement sets down the mjnimum standards for the regulation
of IPR, including the grant of rights to the owner of intellectual property, the
requirements concerning enforceability under the national laws and the settlement of
disputes and relevant remedies in case of infringement. Since, it lays down minimum
standards, the member nations of the TRIPS Agreement are allowed to provide more
extensive protection to IPRs.
(i) Standards: Members are firstly required to provide minimum standards for the
protection of IPRs. These standards have been established by imposing the obligation
of meeting the requirements of the international treaties such as the Berne Convention
and the Paris Convention. The substantive provisions of these conventions have been
incorporated by reference. In addition, the TRIPS agreement imposes several
obligations where these treaties were inadequate. The main elements of protect ion
with respect to IPRs are:
(ii) Enforcement: Members are secondly required to ensure that the enforcement
procedures specified in the TRIPS Agreement are available under their law for the
effective enforcement of rights. The TRIPS Agreement specifies general obligations,
civil and administrative procedures and remedies, provisional measures, special
requirements related lo border measures and criminal procedures.
183
2. TRIPS Agreement and IT: The TRIPS Agreement has some specific provisions
which are applicable to IPRs for IT:
(i) Patenting in any field of technology Article 27 states that patents are available for
any inventions, whether products or processes, in all fields of technology, provided
that they are new, involve an inventive step and are capable of industrial application.
This provides for the grant of a patent in 'any field of technology' that is capable of
industrial application. Thus, members are required to provide patents protection for
all inventions, including in the field ofIT, forexample, for software.
India became a member of the WTO and the TRIPS Agreement in 1995. The
following laws were enacted to lay down the minimum standards for protection of
IPR, in fulfillment of India's obligations under the TRIPS Agreement:
(i) Copyright Act, 1957: This Act provides exclusive rights to use reproduce and
publish copies of original literary, dramatic, artistic and musical works, sound
recordings, films, broadcasts, etc. A copyright is valid for a period of 60 years.
(ii) Patents Act, 1970: This Act grants an exclusive right to prevent unauthorized
use, production, sale and import with respect to an 'invention', i.e., a new product or
process involving an inventive step and capable of industrial application. A patent is
valid for a period of 20 years.
(iii) Trademarks Act, 1999: This Act protects a mark capable of being represented
graphically and which is capable of distinguishing the goods or services of one
184
person from those of others and may include shape of goows, their packaging and
combination of colours. A trademark is valid for a period of 10 years.
(v) Designs Act, 2000: This Act gives an exclusive right over the features of
shape, configuration, pattern, ornament or composition of lines or colours applied to
any article whether in two dimensional or three dimensional or in both forms. The
right exists in the form of a copyright for a period of 10 years.
(vi) Semiconductor Integrated Circuit layout Design Act, 2000: This Act protects
a product having transistors and other circuitry elements which are inseparably
formed on a semiconductor material or an insulating material or inside the
semiconductor material and designed to perform an electronic circuitry function. This
right exists for a period of 10 years.
(vii) Protection of Plant Varieties and Farmers' Rights Act, 2001: This Act protects
the rights of plant breeders in order to stimulate investment for research and
development of new plant varieties. The duration of this right varies based on the plant
variety, for example, six years for crops, nine years for trees and so on. The maximum
possible period including renewal is 18 years for trees.
Online copyright infringement may occur with respect to any material that is
copyrighted (and not computer programmes or computer generated works). For
example, printing of copyrighted material can lead to the creation of unauthorized
physical copies, while acts like scanning create unauthorized digital copies. Both acts
amount to reproduction of the copyrighted work, which is the author's exclusive right
and constitutes infringement. For example, Section 52 of the Indian Copyright Act,
which is explained below, permits reproduction done only for the purposes of a
judicial proceeding, for use by the Legislature or under a law for the time being in
185
force. Reproduction for any other purpose would constitute infringement. Similarly,
the posting of copyrighted material on a networking site will amount to unauthorized
publication, another exclusive right of the author.
The Indian law on copyright, the Copyright Act was enacted in 1957. The Act
is compliant with most international copyright conventions, including the Berne
Convention, the Universal Copyright Convention and Articles 9 to 14 of TRIPS-The
most recent amendments were made in 2012 specifically to bring India in line with
the WIPO Copyright Treaty and the WIPO Performances and phonograms Treaty.
In addition to these three treaties, India is also a signatory to the Geneva Convention
for the Protection of rights of Producers of Phonograms.
Section 17 of the Act provides that the author of a work shall be the first owner
of a copyright, and such author may assign or license the copyright to another person
under Sections 18 and 30 of the Act respectively. The term of the copyright is
provided for under Section 22-29 of the Act. For a literary, dramatic, musical or
artistic work, the term s 60 years after the author's death, for anonymous and
pseudonymous publications, photographs, cinematograph films and records, the term
is 60 years from the date of publication, etc. The rights of copyright societies and
broadcasting authorities and performers are also covered under this Act.
Under Section 51 of the Act, a copyright work will be infringed if any person
does any of the acts which constitute an exclusive right of the author under Section
14 of the Act. If any person makes, sells, lets for hire, distributes, exhibits or imports
copies of an author's work, he will also be liable for infringement. Several exceptions
to this section have been provided under Section 52 of the Act, such as a fair dealing
for the purpose of research, criticism, for reporting of current events (newspaper/
radio), reproduction for a judicial proceeding or in any work of the legislature or under
the requirements of any law, the reading or reciting of a work in public and publication
for any bona fide educational purposes. Chapter XII of the Act provides for civil
remedies by way of injunction, damages, accounts and otherwise for copyright
infringement, and Chapter XIII of the Act provides for criminal remedies.
International Copyrights
Chapter IX of the Copyright Act provides for the extension of the provisions
of this Act to international copyrights. The Indian Government promulgated the
International Copyright Order, 1999, for this purpose, and has extended the provisions
of the Act to a work first made or published in the territory or by a citizen/ national,
etc. of a country which is signatory to the Berne Convention, the Phonograrn
Convention, the Universal Copyright Convention and the World Trade Organization.
The term of such as copyright will not be longer than that granted by the country of
origin.
There are several provisions m the Copyright Act that are specific to computer
programmes. These have been covered in detail in the next section.
(ii) Computer programmes (object code and source code) and other executable
code;
187
• Original
• Fixation
• Art 9.2 TRIPs : Copyright protection shall extend to expression and not to
ideas, procedures, method of operation or mathematical concepts
object code
source code
► Non Literal Elements (functional part)
Judicial interpretation of originality Concept (Literary work):
The word 'original' does not in this connection mean that the work must be
the expression of original or inventive thought. Copyright Acts are not
concerned with the originality of ideas, but with the expression of thought,
and, in the case of 'literary work,' with the expression of thought in print or
writing.
The originality which is required relates to the expression of the thought. But
the Act does not require that the expression must be in an original or novel
form, but that the work must not be copied from another work- that it should
originate from the author.
189
Feist Publication Inc. v. Rural Telephone Service Co. Inc., 499 US 340
(1991):
• Original, as the term is used in copyright, means only that the work was
independently created by the authors (as opposed to copied from other works),
and that it possesses at least some minimal degree of creativity.
• Doctrine of Merger
The use of the art is a totally different thing from a publication of the book
explaining it. [n using the art, the ruled lines and headings of accounts must
necessarily be used as incident to it.
Ratio...
• Whether the art might or might not have been patented is a question which is
not before us. It was not patented, and is open and free to the use of the public.
And of course, in using the art, the ruled lines and headings of accounts must
necessarily be used as incident to it.
• An idea per se has no copyright. But if the idea is developed into a concept
fledged with adequate details, then the same is capable of registration under
the Copyright Act.
Literal Element
Apple Computer Inc. v. Franklin Computer Corp (1983)-
• Ratio- the copyright law protects the means of expressing an ideas and it is
as near the whole truth as generalization can usually reach that if the same idea
can be expressed in a plurality of totally different manners, a plurality of
copyright may result.
• sso
• Structure Sequence and Organization (Total look and feel)
• The purpose or function of a utilitarian work would be the work's idea, and
everything that is not necessary to that purpose or function would be part of
the expression of the idea. Where there are various means of achieving the
191
desired purpose, then the particular means chosen is not necessary to that
purpose, hence there is an expression of idea. (End sought to be achieved).
Lotus Development Corp. v. Paperback Software international (1999)-
1. When the idea- expression distinction applies is to conceive and define the
idea in a way that places it somewhere along the scale of abstraction
Computer Associates International Inc. v. Altai Inc. 982 F.2d 693 (3rd cir.
1992)-
• Abstraction.
• Filtration.
• Comparison.
Facts CA Scheduler
AFC Test-
Abstraction test : reverse engineering - this process begins with the code and
ends withand Adapter
• Lotus 123
• Quattro
• 17 USC Sec 102 (b) - In no case does copyright protection for an original work
of authorship extend to any idea, procedure, process, system, method of
operation, concept, principle or discovery, regardless of the form in which it
is described, explained, illustrated or embodied in such work.
• The term method of operation refers to the means by which a person operates
something, whether it be a car, a food processor or a computer. Thus a text
describing how to operate something would not extend to copyright protection
to the method of operation itself other people would be free to employ that
method and to describe it in their own words. Similarly, if a new
193
method of operation is used rather than described, other people would still be
free to employ or describe that method.
Network Externalities:
games designed for the Sony play station. This innovation affords
opportunities for game play in new environment specifically anywhere a Sony
PlayStation console and television are not available, but a computer with a
CD- ROM drive is more important the virtual game Station itself is a wholly
new product notwithstanding the similarity of users and function between the
Sony play station and the virtual game station.
• Sec. 52 (1) (ab) Indian Copyright Act
• (ab) doing of any act necessary to obtain information essential for operating
inter-operability of an independently created computer program with other
programs by a lawful possessor of a computer program provided that such
information is not otherwise readily available;
(i) in order to utilise the computer programme for the purposes for which it was
supplied; or
• Transformative test- Whether the new work merely supersedes the object of
original creation or instead adds something new with a further purpose or
different character, altering the first with new expression, meaning or
message, it asks in other words whether and to what extent the new work is
transformative.
• Although Arriba made exact replications of Kelly's images, the thumbnails
were much smaller, lower resolution images that served an entirely different
function than Kelly's original images. Kelly's images are artistic works
intended to inform and to engage the viewer in an aesthetic experience.
Arriba's search engine function as a tool to help index and to improve access
to images on the internet and their related web sites.
• Liability of internet service providers- Religious technology center v.
Netcom on line Communication services inc (1995).
198
'
' ,,,
'"
,,,,,,.,,,,.
_,./
/. '
•
■
Ratio ....Thecourt does not find workable a theory of infringement that would
hold the entire internet liable for activities that cannot reasonably be deterred.
Billions of BITS of data flow through the internet and are necessarily stored
on se1vers throughout the network and it is thus practically impossible to
screen out infringing bits from non infringing bits. Because the court cannot
see any meaningful distinction between the Netcom(without regard to
knowledge) b twcen what Netcom did and what every other Usenet server
does, the court finds that Netcom cannot be held liable for direct infringement.
1. Mere conduit
2. System catching
3. Search engine
4. Providing a platform to store information
"Co tracting Parties shall provide adequate legal protection and effective legal
remedies against the circumvention of effective technological measures that are
used by authors in connection with the exercise of their rights under t111:; treaty
or the Beme Convention and that restrict acts, in respect of their works,
,. :,i,·h arc not authorized h, 11,,, ,ll't'1nrs concerned or pt·•-.i11cd bylaw.''
199
Circumvention:
• Circumvention means to "descramble a scrambled work, to decrypt an
encrypted work, or otherwise avoid, bypass, remove, deactivate, or impair a
technological measure".
Individual Acts of Circumvention:
• Section 1201 (f)(2) Notwithstanding the provision of subsection (a)(2) and (b),
a person may develop and employ technological means to circumvent a
technological measure, or to circumvent protection afforded by a
technological measure, in order to enable the identification and analysis under
paragraph (1), or for the purpose of enabling interoperability of an
independently created computer program with other programs, if such means
are necessary to achieve such interoperability, to the extent that doing so does
not constitute infringement under this title.
• Section 1201 (f)(3) The information acquired through the acts permitted under
paragraph (1), and the means permitted under paragraph (2), may be made
available to others if the person referred to in paragraph (1) or (2), as the case
may be, pro-vides such information or means solely for the purpose of
enabling interoperability of an independently created computer program with
other programs, and to the extent that doing so does not constitute
infringement under this title or violate applicable law other than this section.
• Section 1201 (f)(4) For purposes of this subsection, the term "interoperability"
means the ability of computer programs to exchange information, and of such
programs mutually to use the information which has been exchanged.
• (2) Nothing in sub- section (1) shall prevent any person from, -
(a) doing anything referred to therein for a purpose not expressly prohibited
by this Act:
Provided that any person facilitating circumvention by another person of
a technological measures for such a purpose shall maintain a complete
record of such other person including his name, address and all relevant
particulars necessary to identify him and the purpose for which he has
been facilitated.
Digital Distribution of Copyrighted Material
The digital distribution of copyrighted material such as music through the
internet is another major form of copyright infringement. The primary mode of
distribution is through peer-to-peer file sharing sites and online bulletin board
services.
Peer-to-Peer File Sharing - the Napster case: Peer-to-peer file sharing, or P2P file
sharing, allows users to access and share media files such as music, movies, books,
games, etc. over the internet using P2P software. The P2P site enables the users to
search for and locate the desired file on the computer of other users, which are
202
interconnected through the P2P software. The file can then be directly downloaded
from the other user's computer. Several copyright issues that arise through the P2P
file sharing system were discussed in the Napster case in the US, including:
1. The Napster Case - Facts:The Napster case is the landmark decision given by the
United States Court of Appeals in the Ninth Circuit with respect to peer-to-peer file
sharing. In this case, Napster had designed and operated a P2P file sharing system
which permitted the transmission and retention of sound recordings employing digital
technology. The system facilitated the transmission of MP3 files, which were created
through a process colloquially called "ripping", between and among its users.
Napster's 'MusicShare' software, made the MP3 files available free of charge from
Napster's Internet site. Through a process commonly called "peer-to-peer" file
sharing, Napster allows its users to:
(i) make MP3 music files stored on individual computer hard drives
available for copying by other Napster users;
(ii) search for MP3 music files stored on other users' computers; and
(iii) transfer exact copies of the contents of other users' MP3 files from one
computer to another via the Internet.
The Napster site functioned as follows:
(i) Access: A user must first access Napster's Internet site and download and install
the "MusicShare" software to his individual computer, after which the user can access
the Napster system.
(ii) Listing of Files by the User: The user then creates a "user library" directory on
his computer's hard drive, and saves his MP3 files in thelibrary directory. Once
uploaded to the Napster servers, the user's MP3 file names are stored in a server-side
"library".
203
(iii) Searching for Files: The files can be searched for by a user either through
Napster's "search index" of its collective directory, or through its "hotlist function".
(iv) Transferring Files: To transfer a copy of the contents of a requested MP3 file, the
Napster server software obtains the Internet address of the requesting user and the
Internet address of the "host user" (the user with the available files). The
requesting user's computer uses this information to establish a connection with the
host user and downloads a copy of the contents of the MP3 file from one computer
to the other over the Internet, "peer-to-peer."
The findings of the Court affirming the decision of the United States District Court
for the Northern District of California, which found Napster liable for copyright
infringement, are given below:
(a) Direct Infringement of Copyright: The first finding of the District Court that
was upheld in appeal was that the users of the Napster site were engaged in the
wholesale reproduction and distribution of copyrighted works, all constituting direct
infringement. The requirements to be satisfied by the plaintiffs for proving direct
infringement were as follows:
(i) they must show ownership of the allegedly infringed material, and
(ii) they must demonstrate that the alleged infringers violate at least one
exclusive right granted to copyright holders.
The Court found that the plaintiffs had sufficiently demonstrated ownership
of the material. It was also found that the Napster users violated at least two of the
exclusive rights of a copyright holder- the Napster users who had uploaded file names
to the search index for others to copy violated plaintiffs' distribution rights, while the
Napster users who had downloaded files containing copyrighted music violated the
plaintiffs' reproduction rights.
(b) Defence of Fair Use: Napster contended that its users were not directly
infringing the plaintiffs copyrights because the users were engaged in fair use of the
material. For the determination of whether the Napster users were engaged in fair use,
firstly, the following factors, as listed in 17 U.S.C. § 107 were taken into
consideration, and secondly, the fair uses alleged by Napster were considered.
Factors under 17 U.S.C. § 107:
204
(i) Purpose and Character of the Use: For determining the purpose and character of
use, the Court considered the following:
(a) Was the use transformative: The Court considered whether the new work merely
replaces the object of the original creation or instead adds a further purpose or
different character .The Court observed that courts have generally been reluctant to
find fair use when an original work is merely retransmitted in a different medium.
The District Court's conclusion that downloading MP3 files does not transform the
copyrighted work was upheld in appeal.
(b) Was the use commercial/ non-commercial: Direct economic benefit was not
required to demonstrate a commercial use. Rather, repeated and exploitative copying
of copyrighted works, even if the copies are not offered for sale, may constitute a
commercial use. TheNapster users were found to be engaged in commercial use of
the copyrighted materials because "a host user sending a file cannot be said to engage
in a personal use when distributing that file to an anonymous requester" and "Napster
users get for free something they would ordinarily have to buy". Therefore,
commercial use was also demonstrated by the repeated and exploitative unauthorised
copies of copyrighted works.
(ii) Nature of the Copyrighted Work: Works that are creative in nature are "closer to
the core of intended copyright protection" than are more fact-based works. The
appellate Court upheld the District Court's determination that the plaintiffs'
copyrighted musical compositions and sound recordings were creative in nature, and
therefore went against a finding of fair use.
(iii) Amount and Substantiality of the Portion Used: The district court determined
that Napster users engaged in "wholesale copying" of copyrighted work because the
file transfer necessarily "involved copying the entirety of the copyrighted work". The
Court upheld this, taking note that under certain circumstances, a court may conclude
that a use is fair even when the protected work is copied in its entirety.
(iv) Effect of the Use upon the Potential Market for the Work: The proof required to
demonstrate present or future market harm varies with the purpose and character of
the use:
"A challenge to a noncommercial use of a copyrighted work requires proof either that
the particular use is harmful, or that if it should become widespread, it would
adversely affect the potential market for the copyrighted work If the intended use is
205
for commercial gain, that likelihood [of market harm] may be presumed. But if it
is for a noncommercial purpose, the likelihood must be demonstrated."
The Court upheld the District Court's finding that Napster harmed the market
for the plaintiffs in at least two ways- it reduces audio CD sales among college
students, and it "raises barriers to plaintiffs' entry into the market for the digital
downloading of music, since having digital downloads available for free on the
Napster system necessarily harmed the copyright holders' attempts to charge for the
same downloads.
2. Fair Uses Alleged by Napster: The following fair uses were alleged by
Napster:
(i) Sampling: Napster contended that its users downloaded the MP3 files to "sample"
the music in order to decide whether to purchase the recording. It was held that
sampling remains a commercial use even if some users eventually purchase the
music. The Court also took into consideration that the plaintiff collected royalties for
their 36 second long song samples available on retail Internet sites, which were self-
programmed to time out. In comparison, Napster users could download a full, free
and permanent copy of the recording.
(ii) Space-shifting: Napster alleged that space shifting of musical compositions and
sound recordings was previously held to be a fair use. Space-shifting occurs when a
Napster user downloads MP3 music files in order to listen to music he already owns
on audio CD. The Court, however, refused to apply the decisions on space shifting to
the Napster case, since the time or space-shifting discussed in the previous judgments
did not also simultaneously involve distribution of the copyrighted material to the
general public; it exposed the copyrighted material only to the original user.
The Appellate Court therefore upheld the District Court's determination that the
Napster users do not have a fair use defense.
(a) Knowledge: Traditionally, one who, with knowledge of the infringing activity,
induces, causes or materially contributes to the infringing conduct of another, may be
held liable as a 'contributory' infringer.
Thus, the Court found that Napster had knowledge of and had materially contributed
to the infringement, and was, therefore, liable under the doctrine of contributory
copyright infringement.
to supervise the infringing activity and also has a direct financial interest in such
activities."
207
(a) Financial benefit: The District Court determined that plaintiffs had
demonstrated they would likely succeed in establishing that Napster has a direct
financial interest in the infringing activity. The Appellate Court agreed with this,
observing that financial benefit existed where the availability of infringing material
"acts as a 'draw' for customers." Ample evidence supported the district court's finding
that Napster's future revenue was directly dependent upon increases in its user base.
(b) Supervision: The plaintiffs demonstrated that Napster retained the right to
control access to its system, through a "reservation of rights policy", on its website
that it expressly reserves the "right to refuse service and terminate accounts in [its]
discretion, including, but not limited to, if Napster believes that user conduct violates
applicable law ... or for any reason in Napster's sole discretion, with or without cause."
The Court held that the District Court had correctly determined that Napster
had the right and ability to police its system, and failed to exercise that right to prevent
the exchange of copyrighted material.
Thus, the Court found that Napster had financially benefited from the
infringement and had failed to exercise its powers of supervision, and was, therefore,
liable under the doctrine of vicarious copyright infringement.
4. Safe Harbor Provisions under Copyright Law: The District Court recognized
that a preliminary injunction against Napster's partici ation in copyright infringement
was not only warranted but required. Napster asserted protection under the safe harbor
rules of the Audio Home Recording Act and the Digital Millennium Copyright Act as
defences for the injunction that was granted against it.
5. [US] Audio Home Recording Act: The relevant provision of this Act is:
"No action may be brought under this title alleging infringement of copyright
based on the manufacture, iIJlportation, or distribution of a digital audio recording
device, a digital audio recording medium, an analog recording device, or an analog
recording medium, or based on the non-commercial use by aconsumer of such a
device or medium for making digital musical recordings or analog musical
recordings."
Napster contended that the MP3 file exchange is the type of "non- commercial
use" as protected from infringement actions by the statute. This
208
argument was rejected on the ground that the Audio Horne Recording Act is
"irrelevant" to the action because the Audio Horne Recording Act does not cover the
downloading of MP3 files to computer hard drives.
6. [US] Digital Millennium Copyright Act: Napster also argued based on the
statutory limitation on liability by asserting the protections of the "safe harbor" from
copyright infringement suits for "Internet service providers" contained in the Digital
Millennium Copyright Act. The District Court did not give this statutory limitation
any weight favoring a denial of temporary injunctive relief. The court concluded that
Napster "has failed to persuade this court that subsection 512(d) shelters contributory
infringers."
On appeal, the Court did not accept a blanket conclusion that § 512 of the Digital
Millennium Copyright Act will never protect secondary infringers. The Court instead
recognized the following issues to be fully developed at trial:
(ii) Whether copyright owners must give a service provider "official" notice of
infringing activity in order for it to have knowledge or awareness of infringing activity
on its system; and
(iii) Whether Napster complies with § 512(i), which requires a service provider to
timely establish a detailed copyright compliance policy.
Bulletin Board Systems
Bulletin board systems are similar to P2P File sharing systems, where the
software allows users to connect and log into a computer system using a terminal
program. The users can upload and download software, data, share news, e-mail or
chat with other users and even play online games.
In the case of Playboy Enterprises, Inc v George Frena, the defendant opened
a subscription BBS, where photographs copyrighted by the plaintiff were uploaded
for without the required permission. The BBS was accessible for a fee via telephone
modem to customers. Once logged in, the users could browse through the pictures as
well as download them onto their home computers. The U.S. District Court for the
Middle District of Florida held that the defendant had violated the plaintiffs exclusive
right to distribute and display its copyrighted works. The defendant's
209
argument that the images had not been uploaded by him, but were uploa_ded by the
subscribers to his system, was rejected. The Court
(ii) The nature of the copyrighted works was in the category of fantasy and
entertainment.
(iii) A substantial amount of the plaintiff's copyrighted work is used, since
the pictures are a major factor for the success of its magazine.
(iv) The effect of the use on the potential market of the plaintiffs work was found
to be adverse if the conduct of the defendant were to become very widespread.
On these grounds, the defendant was found to be liable for copyright
infringemeot
Patenting of Software
Article 27.1 of the TRIPS Agreement as discussed above, indicates that
software may also be patented subject to the fulfillment of the three criteria
mentioned, i.e., it must be new, it must involve an inventive step and must be capable
of industrial application. The main drawback of copyright is that it protects only the
expression of the software, the protectfon does not extend to the underlying ideas,
which are often of immense commercial value. Despite this, there are still many
advantages that a copyright offers. Patents, as opposed to copyright, need to fulfill
more tringent technical and scientific criteria in order to qualify for protection, whi
h. vary from one country to another. As a result, patents need to be filed in every
country in which protection is sought, while international protection of copyright is
automatic. Finally, the period of protection for a patent is shorter, usually for about
20 years, while copyright protection is usually of 50 years or more.
1. Patenting of Computer Programmes under Indian Patent Act: The Indian
Patent Act specifically excludes 'computer programmes per se' from the scope of the
term 'inventions'.
210
An amendment made to section 3(k) of the Indian Patents Act, 1970, through
the Patents (Amendment) Ordinance, 2004 was later rejected, and was not included
under the Patents (Amendment) Act of 2005. The amended clause was to read as
follows:
"(k) a computer programme per se other than its technical application to industry or
a combination with hardware ".
It is therefore unclear, if, patents may be granted for computer programmes which
have technical application to industry or for computer programmes that work in
combination with hardware.
35 USC§ 101:
® "Whoever invents or discovers any new and useful process, machine,
manufacture, or composition of matter, or any new and useful improvement
thereof, may obtain a patent thereof, subject to the conditions and
requirements of this title."
® Laws of nature, abstract ideas and mathematical formula are also not patentable.
(I) The method was so abstract as to cover both kno n and unknown uses of the
binary- coded- decimal to pure binary conversion,
(2) The end use could vary and could be performed through any existing
machinery or future devised machinery or without any apparatus,
(3) A final step in which the actual alarm limit is adjusted to the updated value.
212
® The method for updating alarm limits was not patentable under § 101 of the
Patent Act, the identification of a limited category of useful though
conventional, post -solution applications of the formula not making the
method eligible for patent protection.
® Post solution activity
The notion that post -solution activity, no matter how conventional or obvious
in it, can transform an unpatentable principle into a p,atentable process exalts
form over substances. A competent draftsman could attach some form of post
-solution activity to almost any mathematical formula, the Pythagorean
theorem would not have been patentable or partially patentable because a
patent applicatiqn.90ntained a final step indicating that the formula when
solved could be usefully applied to existing surveying techniques.
Diamond v. diehr (1981):
® Process for molding raw, uncured synthetic rubber into cured prec1s1on
products. The individuals claimed that their process insured the production of
molded articles which are properly cured. Although it is possible by using
well-known time, temperature and cure relationships to calculate by means of
an established mathematical equation when to open the molding press and
remove the cured product, the individuals argued that the industry had not been
able to obtain uniformly accurate cures because the temperature of the press
could not be precisely measured, making it difficult to do the necessary
computation to determine cure time.
Ratio:
® The physical and chemical process for molding precision synthetic rubber
products fell within the categories of subject matter eligible for patent
protection and this result was not altered by the fact that in several steps of the
process a mathematical equation and programmed digital computer were used,
since
1. No attempt was being made to pte empt the use of the equafo:m(Arrhenius
equation) but only to foreclose others from the use of that equation in
conjunction with all of the other steps in the claimed process, and
2. Use of the computer in the process did not render the process as a whole
unpatentable subject matter in view of the fact that the computer was used
to achieve a result previously unknown in the art, the fact that one or more
of the steps in the process might not, in isolation, be novel or
independently eligible for patent protection being irrelevant to the
question of whether the claims as a whole recited subject matter eligible
for patent protection.
Freeman-Walter-abele test:
Walter:
® In Walter, the claims were directed to a process for correlating and cross -
correlating signals. All of the claims steps were algorithm steps for
214
Abele:
Io re kuriappao P. Alappat:
® Ratio...
® Law of nature, natural phenomena, and abstract ideas can never be the subject
of patents.
® Practical applications provide "useful, concrete and tangible results".
216
The machine -or-transformation test may well provide a sufficient basis for
evaluating processes similar to those in the industrial age- for example,
inventions grounded in a physical or other tangible form. But there are reasons
to doubt whether the test should be the sole criterion for determining the
patentability of inventions in the information age.
The patents at issue, which belonged to the Appellant, disclosed a scheme for
mitigating 'settlement risk', i.e., the risk that only one party to a financial exchange
will satisfy its obligation, using a computer system as a third party intermediary. This
scheme was styled as a method for exchanging financial obligations, a computer
system configured to carry out the method and a computer-readable medium
containing program code for causing a computer to perform the method.
Respondents. The District Court held that these claims were ineligible because they
were directed to the abstract idea of 'employing a neutral intermediary to facilitate
simultaneous exchange of obligations in order to minimize risk'. A divided panel of
the US Court of Appeals for the Federa Circuit reversed this decision on the grounds
that it was not 'manifestly evident' that the claims were directed to an 'abstract idea'.
The Respondents then petitioned the same Federal Circuit Court for an en bane
hearing. This resulted in a :fractured panel of seven different opinions by ten judges.
A majority of 5 judges reversed the decision and held that the claims were patent
ineligible, without addressing the issues relating to patentability of software. As a
result, the Appellant applied .for a writ of certiorari with the US
Supreme Court.
The Supreme Court found that the appellant's first claim to the method was
ineligible because it amounted to an abstract idea, which was ineligible for a patent
as per the test of Mayo Collaborative Services v. Prometheus Laboratories, Inc..The.
claim was found to be 'nothing significantly more' than an instruction to apply the
abstract idea of intermediated settlement, which was a fundamental economic
practice long preva_lent in the system of commerce, using some unspecified, generic
computer. The second and third claims were also found to be ineligible for the
reason that the combination with computers did not transform the abstract idea into a
patent-eligible invention, as per the rule laid down in Bilski v. Kappos. It was found
that the generally-recited computers in the claim were merely linked to the method
for use, and added nothing of substance to the underlying abstract idea.
Notably, the judgment did not specifically exclude computer programs from
patentability, nor did it impose any special requirements for eligibility of software and
business models. The Court emphasized the difference between patents that claim the
'building blocks' of human ingenuity, and those that integrate the building blocks into
something more, finding that only the latter were patent - eligible. Examples of
abstract ideas that were considered in the judgment as patent-ineligible include:
(i) Fundamental economic practices;
(ii) Certain methods of organising human activities;
(iii) Meaningful uses beyond generally linking the use of an abstract idea to a
particular technological environment.
(i) First determine whether the claim is directed to one of the four statutory
categories of invention, i.e., process, machine, manufacture, or composition of matter.
If the claim does not fall into one of the categories; reject the claim as being directed
to non-statutory subject-matter.
(ii) Next, if the claim falls within one of the statutory categories, determine
whether the claim is directed to a judicial exception (i.e., law of nature, natural
· phenomenon and abstract idea) and if so, determine whether the claim is a patent-
eligible application of an exception.
International Trademarks
What are Domain Names: A domain name is the human friendly name of an Internet
address. It is technically known as a "Unique Resource Locator", or URL. The actual
name of a website is in the form of an "Internet Protocol address", or IP address. For
example, one IP address of Google is 216.239.51.104. Such sets of number can be
quite difficult to remember, unlike the URL of Google, which is "www.google.com".
Thus a domain name is a unique alias for an IP address, and the system that locates
and translates a domain name into an IP address and vice versa is known as a domain
name system. A domain name system exists in the form of databases around the
world, and is commonly referred to as the address book of the
internet.
,
1. The ICANN: It is essential that domain names be unique across the globe, in orcfer
to e able one computer to find another. The ICANN, or the Internet Corporation for
Assigned Names and Numbers, is the body responsible for the coo dination of domain
names around the world. It is an internationally organized non-profit corporation, with
membership from different countries and experts in the field. The ICANN is the
coordinator of the functions of the IANA,
or the Internet Assigned Numbers Authority, which is responsible for managing the
DNS root zone, i.e., the gTLDs and the ccTLDs, along with the allocation of internet
numbering resources.
2. Domain Levels:
At the top of the domain name hierarchy are top level domains, or TLDs, which are
of two types- generic TLDsorgTLD, and country-code TLDs, or ccTLDs.. Examples
of gTLDs are .com', '.biz', '.info', etc. For a country, the top level domain is the country
code top level domain, or the ccTLD. The label for a ccTLD consists of two character
abbreviations of the name of the country, for example, India's ccTLD is '.in', the
ccTLD for the US id '.us', etc. There are currently 252 ccTLDs reflected in the
database of the Internet Assigned Numbers Authority (IANA). This numberissubject
to change based on the creation of new countries.
(i) Registration may be for a minimum period of 1 year and a maximum period
of 10 years.
(ii) The domain names are between 3 and 63 characters in length, consisting of
letters, digits and hyphens only.
(iii) Single and double character domain names are reserved by the government
and NIX], and are not available to the public.
(vii) Registrants are allowed to transfer domain names to the registrar of their
choice.
The policy of domain name registration has been made extremely liberal and
market friendly in a number of countries, in order to encourage a large number of
registrations. This is because the number of registrations is seen as a measure of a
country's popularity in the internet space, and as a means to facilitate the prolifer ation
of internet in a country.
Types of Domain Name Disputes:
I
• Use of a sign in the form of affixation onto goods or packaging, offer for sale,
import or export or in advertising.
Passing Off:
• Lord Diplock in ErvenWarnink v. J. Townend& Sons Ltd. (1979).
(1) Misrepresentation
(2) Made by a trader in the course of trade
(3) To prospective customers of his or ultimate consumer of goods or services
supplied by him
The court observed the following with regard to the importance of protecting
domain name as a trademark:
"what emerges from these authorities is that the Internet domain names are of
importance and can be a valuable corporate asset. A domain name is more than
an Internet Addresses and is entitled to the equal protection as trade mark. With
the advancement and progress in the technology, the services rendered in the
internet site have also come to be recognized and accepted and are being given
protection so as to protect such provider of service from passing off the services
rendered by others as his services. "
• Panavision alleged claims for dilution of its trademark under the Federal
Trademark Dilution Act, 15 U.S.C. § 1125 (c). The section provides:
'the owner of a famous mark shall be entitled to an injunction against another
person's commercial use in commerce of a mark or trade name, if such use
226
begins after the mark bas become famous and causes dilution of the distinctive
quality of the mark... '
Issues:
A plaintiff must show that
(3) The defendant's use began after the mark become famous, and
(4) The defendant's use of the mark dilutes the quality of the mark by diminishing
the capacity of the mark to identify and distinguish goods and services.
COMMERCIAL USE:
A person shall be liable in a civil action by the owner of a mark... if, without
regard to the goods or services of the parties, that person
(i) Has a bad faith intent to profit from that mark, including a personal name
which is prote': '.!d as a mark under this section; and
(I) In the case of a mark that is distinctive at the time of registration of the
domain name, is identical or confusingly similar to that mark
(2) Jn the case of a famous mark that is famous at the time of registration of the
domain name, is identical or confusingly similar to or dilutive of that mark.
creates, exhibits and markets cartoons under the names "Joe cartoon" and "The
Joe Cartoon Co."
• On 1997, Shield registered the domain name joecartoon.com, and he has
operated it as a web site ever since.
(2) Zuccarini's domain names are "identical or confusingly similar to" Shields's
mark,
(3) Zuccarini registered the domain names with the bad faith intent to profit
from them.
(ii) Extent of the person's legal name or identifier used in the domain name
(iii) Prior use in bona fide offering of goods or services
(iv) Bona fide non-commercial or fair use of the mark in the site.
(v) intention to divert consumers from the trademark owner's site.
(vi) Offer to sell, transfer, otherwise assign to the mark owner or a third party for
financial gain.
(i) circumstances indicating that you have registered or you have acquired the
domain name primarily for the purpose of selling, renting or otherwise
transferring the domain name registration to the complainant who is the owner
of the trademark or service mark or to a competitor of that complainant, for
valuable consideration in excess of your documented out of pocket costs
directly related to the domain name; or
(ii) You have registered the domain name in order to prevent the owner of the
trademark or service mark from reflecting the mark in a corresponding domain
name, provided that you have engaged in a pattern of such conduct; or
(iii) You have registered the domain name primarily for the purpose of
disrupting the business of a competitor; or
(iv) By using the domain name you have intentionally attempted to attract, for
commercial gain, internet users to your web site or other on -line location, by
creating a likelihood of confusion with the complaint's mark as to the source,
sponsorship, affiliation, or endorsement of your web site or location or of a
product or service on your website or location.
Remedies:
"The Movie Buf:fs Movie Store" covering retailk store services featuring
video cassettes and video game cartridges and rental of video cassettes and
video game catridges. Registered the domain name moviebuff.com
Issue...