CSCL Unit 3
CSCL Unit 3
TEXT BOOK:
1. Cyber Laws and IT Protection, Harish Chander, PHI, 2012
Chapter 4: Legal aspects of Electronic records /
Digital signatures
(a) if the originator or the addressee has more than one place of business, the
principal place of business shall be the place of business;
(b) if the originator or the addressee does not have a place of business, his usual
place of residence shall be deemed to be the place of business;
(c) “Usual Place of Residence”, in relation to a body corporate, means the place
where it is registered.
Chapter 5: The roles and regulations of Certifying Authorities in India
So, CA must also make its own public key available to the parties who want to
verify the certificates of consumers or users and if CA fails to perform its duties ,
results significant loss to large number of innocent parties.
Appointment of controller and his functions
In the context of a certifying authority (CA), the appointment of a controller is an important aspect of
ensuring effective governance and oversight of the CA's operations. The controller, sometimes referred to
as the Certifying Authority Controller or CA Controller, is responsible for various functions within the CA.
The primary role of the controller is to oversee and regulate the activities of the certifying authority. Their
functions typically include:
1. Regulatory Compliance: The controller ensures that the CA operates in compliance with applicable
laws, regulations, and industry standards. They monitor and enforce adherence to legal and regulatory
requirements related to certificate issuance, security practices, data protection, and privacy.
2. Policy Formulation: The controller participates in the formulation of policies and guidelines that govern
the CA's operations. They contribute to the development of rules and procedures related to certificate
issuance, revocation, renewal, and other aspects of the CA's services.
3. Auditing and Monitoring: The controller conducts audits and regular monitoring of the CA's activities to
ensure compliance, accuracy, and security. They review the CA's processes, systems, and controls to
identify any vulnerabilities, risks, or non-compliance issues.
4. Dispute Resolution: The controller may play a role in resolving disputes or complaints related to the
CA's services. They assess complaints, investigate any alleged misconduct or breaches, and take
appropriate actions to address disputes and maintain the integrity of the CA's operations.
5. Key Management: The controller may have responsibilities related to the management and protection
of the CA's cryptographic keys. They ensure the secure generation, storage, and handling of keys, which
are crucial for signing and verifying digital certificates.
6. Collaboration and Coordination: The controller collaborates with other regulatory bodies, industry
stakeholders, and government agencies to ensure effective oversight, coordination, and alignment of
the CA's operations with broader policies and initiatives.
The appointment of a controller helps provide independent oversight and accountability for the certifying
authority. By fulfilling their functions, the controller contributes to the trust, integrity, and reliability of the
CA's services and the overall digital certificate ecosystem.
Chapter 6 : Protection of intellectual property rights in cyberspace in india
The Cyberspace :
Web-based technology through the internet has increased our capacity to access it easily with rapid speed
which is very useful for e-commerce and having quick electronic business transactions.
Information stored in electronic form is cheaper, easy to store, retrieve and speedier to communicate.
The advantages of the internet have naturally attracted many business people to conduct the business
through e-commerce.
Internet has made it possible to replace traditional paper-based communication by paperless communication
which does not know physical or geographical boundaries, and is possible on any part from any part of
global between the parties known or unknown to each other.
The relevance of domain names in intellectual property rights
In the new e-commerce economy it is important a company must be easily traceable on the internet. This
means that the company must have an address in the cyberspace. This requires the company must have
registration under a particular domain name and a website of its own.
The domain name system (DNS) has made it possible for the registration of a company which enable a
company to conduct online transaction and make it easily traceable by the customers, suppliers and other
users.
The representation of the company’s both name and address on the internet can serve as a typical
trademark function of showing a company’s recognition and goodwill in the market place. Therefore,
domain name is relevant as the consumers often see them as performing in e-commerce.
Various types of domain name disputes have come for consideration before the court all over the world.
one of the most serious kind of disputes has been about "cybersquatting" which involves the use of a
domain name by a person with neither registration nor any inherent rights to the name.
what is cybersquatting ?
The term cybersquatting refers to the unauthorized registration and use of Internet domain
names that are identical or similar to trademarks, service marks, company names, or personal
names.
They use special software applications to monitor the expiry of some specific domain names. After
registering the expired domain names, cyber squatters duplicate the original websites and thus
misleading the genuine visitors of such websites
Deception by squatting in cyberspace
The consumer when looking to find the name of the brand on the internet, the easiest way for them is to type a
domain name of the brand or the company.
Generally, in india, a domain name has at least two key parts. The second level domain describes like .Com
or .Gov and third level domain contains familiar name that describes product, service or topic that the website
address.
Deception by squatting in cyberspace refers to the practice of registering domain names that are similar to
well-known brands or trademarks with the intention of misleading or deceiving consumers.
To combat this issue, ICANN, the Internet Corporation for Assigned Names and Numbers, has implemented
the Uniform Domain Name Dispute Resolution Policy (UDRP). This policy provides an expedited
administrative process for trademark holders to challenge and resolve cases of abusive domain name
registrations. The UDRP allows for the cancellation, suspension, or transfer of domain names by the registrar.
The advantages of ICANN's dispute system include its quick resolution of disputes and relatively low costs.
The proceedings can be conducted entirely through electronic filings, offering convenience and efficiency to
the involved parties.
Bad Faith in Relation to Domain Name Infringement
In order to establish “bad faith” in the proceeding for infringement of a domain name a complainant has to
establish the following points in order to obtain relief:
• The respondent's domain name is identical or confusingly similar to a trademark or service mark owned
by the complainant.
• The respondent has no legitimate right or interest in the domain name. They cannot demonstrate a
valid reason for owning or using it.
• The respondent registered and is using the domain name in bad faith. This means they intended to
cause confusion, deceive consumers, or unfairly benefit from the reputation or goodwill associated with
the complainant's trademark.
In order to file administrative proceedings successfully the complaint must prove that each of the above three
elements are present for the purpose of proof of bad faith on the part of the defendant.
It has also to be shown that the complainant had its registered domain name and the defendant is using it in bad
faith.
• Registering the domain name with the primary aim of subsequently selling it at a profit.
• Registering the domain name primarily for disrupting the business of the competitor.
• Registering the domain name in order to prevent the owner of the trade mark from reflecting the mark in a
corresponding domain name.
• Using the domain name to attract internet users to one’s website by creating a likelihood of confusion with the
complainant’s trademark.
Some Leading Cases Involving Complaints From India before WIPO
Before World Intellectual Property Organization (WIPO), the number of complaints have been filed in Indian
corporate houses or media companies.
In most of the cases the Indian complaints involving domain names before WIPO have been decided in favor
of the complaints.
We may cite two cases.
In Tata Sons Ltd. V. The advanced information Technology Association, it was decided by the WIPO
Administrative panel, Instructing Network Solutions Inc. to transfer the impugned domain name tata.org to
the complainant Tata Sons Ltd.
The administrative panellist relied on the decisions that had been earlier given in favour of Tata Sons Ltd. By
the Indian courts providing protection to the Tata trademark from abusive registrations.
Similarly in tridenthotels.com case the complainant was Oberoi hotels which owned trade marks ‘Trident’
and ‘Trident Hotels’ in India. In this case the panel held that the use of the word ‘Trident’ in combination
with the word hotels has a certain distinctive character as it indicates a chain hotels such as the complainants
group.
The domain name tridenthotels.com signifies that the domain name was intended to be used for a chain of
hotels.
Protection of Copyright on Cyberspace
The new technology which is multi-functional IT or the Internet poses number of challenges for
laws to protect copyrights. Copyright being an intellectual property gives right to the authors in
literay, artistic, dramatic and musical works.
As in other intellectual property rights available under the copyright are essential negative in nature,
similarly these are basically the rights to stop others from doing certain things as for example, right
to stop privacy, counterfeit, copying or imitation.
Rights of Software Copyright Owners
We have brief pointed out the rights of the copyright owner as provided for under Section 14 of the
copyright Act, 1957. Here we will explain to understand the copyrights particularly of the software
copyright owners.
• First the author of the s/w has the right to reproduce and make any number of copies of his work as
he hikes.
• Secondly the s/w copyright owner may display his software on the internet which would amount to
display to the public which right is provided.
•The owner of the copyright s/w enjoys an exclusive right to distributed copies of the work to the
public by sale or by transfer of ownership or by rental. This right to distribute in India flows from
Section 14 of the Copyright Act, 1957, which provides the right to publication.
•Similarly, the owner of the S/W copyright has the right to adaption of his work by updating,
changing and modifying his s/w copyright.
Cyber Space, the Internet, Websites and the Nature of the Copyright
In the context of intellectual property laws, the digital nature of works on the internet is a crucial
characteristic. Unlike traditional analog methods of recording intellectual property on physical mediums
such as paper or film, digitization converts all elements—words, images, sounds, graphics, and films—
into binary numbers, represented as ones and zeros.
When creating a website, it is important for the website creator to ensure that they own the copyright in
all aspects involved in its creation. This includes original content, images, graphics, code, and any other
elements used to make the website function.
Downloading copyrighted works from the internet and saving them permanently on a computer's hard
drive constitutes reproduction of the copyrighted work. This act of making permanent copies without
permission from the copyright owner infringes on their exclusive rights.
Overall, the digital nature of intellectual property on the internet requires careful consideration of
copyright ownership and proper adherence to copyright laws to protect the rights of creators and prevent
infringement.
Linking, Hyper-Linking and Framing
The internet or the web was initially created for the purpose of enabling hypertext capabilities
allowing one side to link or hyperlink and access another sight.
In this way the user could make sense of the great mass data contained on the internet.
As linking or hyperlinking was used for education or research purpose, it was both accepted and
encouraged when internet was a research network.
On the commercial internet the sight owner have contended that before employing a link, the
website must seek permission from the website to which it want to link.
Compensatory remedies
A compensatory remedy is also available to the plaintiff which includes
damages, account of profit and delivery of infringing copies.
Damages are granted to a owner of the copyright for the loss or damange
caused to him by the infringement of copyright.
The Liabilities of an Internet Services Provider (ISP) in
Cyberspace
The liabilities of ISPs may arises in a verity of legal areas, such as criminal law,
Torts law, Trade secret law, Copyright law, Trademark law, Unfair Competition law.
Many countries have tried to define the liability of ISOs in disseminating third
party contents.
The function of service provides is to host content, such as web pages of subscriber,
over which the service provider exercises no control.
It is impossible practically to monitor or screen the activities of users of network
services.
The law of patents is very relevant for the information technology industry as it is
in other industries.
The owner of a patent is granted certain exclusive right to a particular invention.
The rights of patent owner include the right to make, the right to use, and the right
to sell the invention and also the obvious extensions connected with the rights of
inventions.
In the computer technology which is fast-paced, being the first to develop and to
patent an invention which satisfies the demand in a market can provide significant
leverage over competitors.
The patent owners can also have an agreement to let others make use of the
patented invention.
We can see the effects of IBM’s (Indian Business Machines) decision to license the
operating system for its personal computer from a company which has become
famous like Microsoft.