Professional Documents
Culture Documents
SSRN-id1097695 Spamming
SSRN-id1097695 Spamming
JUDICIARY
TABLE OF CONTENTS
TABLE OF CONTENTS...........................................................................................................I
TABLE OF CASES..................................................................................................................I
TABLE OF ABBREVAITIONS.................................................................................................II
INTRODUCTION...................................................................................................................1
CYBER STAKING..................................................................................................................2
EMAIL STALKING..........................................................................................................4
CHAT STALKING............................................................................................................4
COMPUTER STALKING...................................................................................................6
OFFENDERS...................................................................................................................6
VICTIMS................................................................................................................................8
CYBER DEFAMATION.........................................................................................................11
WHAT IS DEFAMATORY?.....................................................................................................11
JURISDICTION.....................................................................................................................12
POSITION IN INDIA..............................................................................................................13
CONCLUSION.....................................................................................................................15
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
SUGGESTIONS.....................................................................................................................16
BIBLIOGRAPHY..................................................................................................................III
ARTICLES............................................................................................................................ III
BOOKS REFERRED............................................................................................................... VI
LEGISLATIONS USED...........................................................................................................VII
Websites used....................................................................................................................vii
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
TABLE OF CASES
Joyce v. Senagupta
1970 Cr LJ 286...................................................................................................................23
Permiter v. Coupland
Sim v. Stretch
Whalen v. Rao
TABLE OF ABBREVAITIONS
INTRODUCTION
The advent of the third millennium has brought in an era of information society.
The new era is the result of rapid changes brought about by the new technology and the
cyber world. Obviously the information society offers vast scope and opportunities to
human beings to identify information, to evaluate information, and to exchange
information for the benefits of the citizens the world over. The in formation technology
provides for a new environment, new work culture, new business links and trading
networks. It allows information and knowledge based work to be located anywhere. It is
virtually transforming and revolutionizing the world.
Among the various problems emerging out of the internet are the menace of
hackers, cyber terrorism, spamming, Trojan horse attacks, denial of service attacks,
pornography, cyber stalking etc.
Through this paper the researcher will try to study the problem of cyber stalking,
cyber defamation, various types of data theft and the laws relating to it. An effort will
1
.Mishra,RC , “ Cyber crime: impact in the new millennium”, 2002 ed., p.53
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
also be made to recommend some suggestions to fight these dangerous problems, with
the response of Indian judiciary to it.
CYBER STAKING
2
Laughren, J, CYBERSTALKING AWARENESS AND EDUCATION.
Available on – http://www.acs.ucalgary.ca/~dabrent/380/webproj/jessica.html, last visited on ( 02-11-2007)
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
Sexual attractions and motives are other very important reasons for cyberstalking.
In USA, the federal law enforcement agencies have encountered numerous instances in
which adult paedophiles have made contact with minors through online chat rooms,
established a relationship with the child, and later made contact for the purpose of
engaging in criminal sexual activities.3
The nature of cyber stalking is ascertains by the medium which is used for its execution.
According to … cyber stalking had been classified into four kinds4
a) E-mail stalking
b) Chat stalking
c) Bulletin board systems
d) Computer stalking.
3
Mishra,RC , CYBER CRIME: IMPACT IN THE NEW MILLENNIUM, 2002 ed., p.54
4
Jewkeys, Yuonne (ed.), DOT.COMS CRIME, DEVIENCE AND IDENTITY, THEFT ON THE INTERNET,,p.108
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
EMAIL STALKING
Electronic mail is an electronic postal service that allows individuals to send and
receives information in matter of seconds. This sophisticated use of telephone lines
allows communication between two people who may or may not know each other but can
‘speak’ to each other using a computer. In general Email is an insecure method of
transmitting information or messages. Everyone who receives an email from a person has
access to that persons email id. With some online services as AOL, a person’s screen
name is also an email address. In addition, when a person posts an item on a newsgroup,
that peson’s email id may be available to anyone who reads that item. It is unsurprising,
then, that email is a favoured medium for cyber stalkers.
Technologically sophisticated email harassers send ‘mail bombs’, filling a persons
inbox with hundreds or even thousands of unwanted mails in the hope of making the
account useless. Others send electronic viruses that can infect the victim’s files.5
CHAT STALKING
5
Ogilvie, E. (2000).Cyberstalking., TRENDS AND ISSUES IN CRIME AND CRIMINAL JUSTICE, 166.
Available at http://www.aic.gov.au
6
Jewkeys, Yuonne (ed.), DOT.COMS CRIME, DEVIENCE AND IDENTITY, THEFT ON THE INTERNET,,p.109
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
During ‘chat’, participants type instant messages directly to the computer screens of other
participants.
When a person posts a message to a public news group this is available for
anyone to view copy and store. In addition, a persons name, email address and
information about the service provider are easily available for inspection as a part of the
message itself. Thus, on the internet, public messages can be accessed by anyone
anytime- even years after the message were originally written. In IRC, the harasser may
chose to interrupt a person’s chat electronically or otherwise target a chat system, making
it impossible for someone to carry on a conversation with anyone else. The Cyberstalker
can engage in live chat harassment or abuse of the victim( otherwise known as ‘flaming’)
or he/she may leave improper message o the message board or in chat rooms for or about
the victim.
A bulletin board system (BBS) is a local computer that can be called directly with
a modem7. Usually they are privately operated and offer various services depending on
the owner and the users. A bulletin board allows leaving messages in group forums to be
read at a later time. Often a BBS is not connected to a network of other computers, but
increasingly BBSs are offering internet access and co Cyber stalkers area using bulletin
boards to harass their victims.8
Online have been known to known to post insulting messages on electronic
bulletin boards signed with email addresses of the person being harassed. The Cyber
stalker can also post statements about the victims or start rumours which spread through
the BBS. In addition a Cyber stalker can ‘dupe’ another internet users into harassing or
threatening a victim by posting a controversial or enticing message on the board under
the name , phone numbers or email address of the victim, resulting in subsequent
responses being sent to the victim.9
7
Jewkeys, Yuonne (ed.), DOT.COMS CRIME, DEVIENCE AND IDENTITY, THEFT ON THE INTERNET ,p.109
8
id
9
id at p.110
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
COMPUTER STALKING
With computer stalking, cyber stalker exploits the internet and the windows
operating system in order to assume control over the computer of the targeted victim. An
individual ‘windows based’ computer connected to the internet can be identified,
allowing the online stalker to exercise control over the computer of the victim. A cyber
stalker can communicate directly with his or her target as soon as the target computer
connects to the internet. The stalker can also assume control over the victim’s computer
and the only defensive option for the victim is to disconnect and relinquish his or her
current internet address.10
An example of this kind of cyber stalking was the case of a woman who received
a message stating ‘ I’m going to get you’. The cyber stalker then opened the woman’s
CD-ROM drive in order to prove that he had control over her computer.
OFFENDERS
Previous studies that have investigated stalking offenders by and large, have
focused on the offline stalking offender
Regardless for the offenders group such as ‘simple’, ‘love’ or ‘erotomanic’
statistics reports, male offenders to account for the majority of offline stalking offenders.
Working to Halt Online Abuse (2000) statistics also support the gender ratio of offenders
claiming, 68% of online harassers/cyber stalkers are male.
Furthermore, common social and psychological factors have been found within
offline stalking offender population. For example, social factors such as the diversity in
socio-economic backgrounds and either underemployment or unemployment have been
found significant factors in offline stalking offenders11.
10
id at p.110
11
Meloy, J.R. & Gothard, S.). DEMOGRAPHIC AND CLINICAL COMPARISON OF OBSESSIONAL FOLLOWERS
AND OFFENDERS WITH MENTAL DISORDERS. American Journal of Psychiatry, 152(2), 1995 ed., 258-26
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
12
McCann, J.T. (2000). A DESCRIPTIVE STUDY OF CHILD AND ADOLESCENT OBSESSIONAL FOLLOWERS .
Journal of Forensic Sciences, 45(1), p.195-99
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
VICTIMS
Currently, there are limited studies on the victims of cyber stalking. Although,
anyone has the potential to become a victim of offline stalking or cyber stalking, several
factors can increase the statistical likelihood of becoming a victim. Studies 13 that have
investigated offenders of offline stalking, have found some common factors within the
selection of victims. For example, contrary to public belief, a large proportion of stalking
victims are regular people rather than the rich and famous.
Goode claimed14, up to 80% of offline stalking victims are from average socio-
economic backgrounds. In addition, the statistical likelihood of becoming a victim
increases with gender.
Working to Halt Online Abuse (2000) reports, 87% of online harassment/cyber
stalking victims are female. However, victim gender statistics may not represent true
victims, as females are more likely to report being a victim of online harassment/cyber
stalking than males.
Although studies have shown that the majority of victims are female of average
socio-economic status, studies have also shown that offline stalking is primarily a crime
against young people, with most victims between the age of 18 and 29.15 Stalking as a
crime against young people may account for the high prevalence of cyber stalking
victims within universities. For example, the University of Cincinnati study showed, 25%
of college women had been cyber stalked.16.
Nevertheless, previous relationships have been shown to increase the likelihood
of being stalked offline. For example, it was reported, 65% offline victims had a previous
13
Sinwelski, S.A. & Vinton, L. ,STALKING: THE CONSTANT THREAT OF VIOLENCE. AFFILIA: THOUSAND
OAKS 2001 ed..
14
Goode, M., STALKING: CRIME OF THE NINETIES?., Criminal Law Journal, 19, 1995, p.21-31.
15
Brownstein, A. (2000). IN THE CAMPUS SHADOWS, WOMEN ARE STALKERS AS WELL AS THE STALKED,
The Chronicle of Higher Education, 47(15),2002 ed., 40-42.
16
Tjaden, P. & Thoennes, N. (1997). STALKING IN AMERICA: FINDINGS FROM THE NATIONAL VIOLENCE
AGAINST WOMEN SURVEY. National Institute of Justice and Centres for Disease Control and Prevention.
Washington DC. Available at http://www.ncjrs.org
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
relationship with the stalker17. Although studies of offline stalking claim the majority of
victims have had a previous relationship with the stalker
Working to Halt Online Abuse Statistics 18 fails to support a previous relationship
as a significant risk factor, for online harassment/cyber stalking. For example, 53% of
victims had no prior relationship with the offender. Therefore, the risk factor of a prior
relationship with the stalker may not be as an important factor in cyber stalking, as it is in
offline stalking.
Currently, there are few studies on the psychological impact on victims. However,
Westrup19studied the psychological effects of 232 female offline stalking victims. He
found out that the majority of victims had symptoms of PTSD, depression, anxiety and
experienced panic attacks.
Additionally, it was found that 20% of victims increased alcohol consumption and
74% of victims suffered sleep disturbances20. Nevertheless, social and psychological
effects of offline stalking cannot be separated as social effects can impact on
psychological effects and psychological effects can impact on the social effects. Although
the majority of studies have focused on the offline stalking victims, there is no evidence
to suggest that cyber stalking is any less of an experience than offline stalking (Minister
for Justice and Customs, 2000), As shown, there are many common themes between
offline stalking and cyber stalking.
For example, offenders are most likely to be male and offline stalking or cyber
stalking is the response to a failed (offline/online) relationship. Additionally, young
females account for the majority of victims. Furthermore, victims experience significant
social and psychological effects from offline stalking or cyber stalking.21
17
Zona, M.A., Sharma, K.K. & Lone, J. “A COMPARATIVE STUDY OF EROTOMANIC AND OBSESSIONAL
SUBJECTS IN A FORENSIC SAMPLE”, Journal of Forensic Sciences, 1993 ed. 38,p. 894-903.
18
For more details refer to - http://www.haltabuse.org/resources/stats/relation.shtml
19
Westrup, D., Fremouw, W.J., Thompson, R.N. & Lewis, S.F. THE PSYCHOLOGICAL IMPACT OF STALKING
IN FEMALE UNDERGRADUATES. Journal of Forensic Sciences, (1999), 44(3), pp.554-557.
20
Mullen, P.E. & Pathe, M. (1997). THE IMPACT OF STALKERS ON THEIR VICTIMS. British Journal of
Psychiatry,”,pp. 12-17.
21
http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
Cyber stalking is are a relatively new phenomenon and many countries are only
now beginning to address the problem. India has also witnessed cases of cyber stalking,
cyber harassment and cyber defamation. However, as there is no specific law or provision
under the IT Act, a number of these cases are either not registered or are registered under
the existing provisions of Indian Penal Code—which are ineffective and do not cover the
said cyber crimes.22
Since its promulgation, the IT Act 2000 has undergone some changes. One big
change is the recognition of electronic documents as evidence in a court of law. Market
players believe this will go a long way in giving encouragement to electronic fund
transfers and promoting electronic commerce in the country.
However, all hope is not lost as the cyber crime cell is conducting training
programmes for its forces. It also has plans to organize special courses for corporate to
combat cyber crime and use the IT Act effectively.
22
Keane Insight, WHAT'S WRONG WITH OUR CYBER LAWS? , Avaliable on –
(http://www.expresscomputeronline.com/20040705/newsanalysis01.shtml)
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
CYBER DEFAMATION
Another key feature of the Internet is that users do not have to reveal their identity
in order to send e-mail or post messages on bulletin boards. Users are able to
communicate and make such postings anonymously or under assumed names. This
feature, coupled with the ability to access the internet in privacy and seclusion of one's
own home or office and the interactive, responsive nature of communications on the
Internet, has resulted in users being far less inhibited about the contents of their messages
resulting in cyber space becoming excessively prone to defamation.
WHAT IS DEFAMATORY?
23
Sallie Spilsbury, MEDIA LAW, 2000, p.60.
24
Malicious falsehood is primarily concerned with damage to profits or earnings caused by the publication
of untrue statement or fact. It is immaterial whether the untrue statement causes damage to the claimant’s
reputation. If the untrue words are also defamatory then a claim for malicious falsehood is not excluded ,
although the courts will not allow the claimant to recover damages for both defamation and malicious
falsehood for the same loss; Joyce v. Senagupta [1993] 1 All ER 897; Sallie Spilsbury, MEDIA LAW, 2000,
p153.
25
(1840) 6 M&W 105
26
(1934) 50 TLR 581
27
Supra n.5,p.108
28
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
the test whether the words tend to lower the plaintiff in the estimation of the right-
thinking members of society in general.
A person's good name can only be damaged if maligning statements are made to
someone other than that person; that is, the defamatory statement must be disclosed to a
third person, thereby satisfying the requirement of publication. Thus the law of
defamation places a heavy burden on the defendant. All that a plaintiff has to prove, in a
defamation action, is the publication of defamatory matter. The onus then lies on the
defendant to prove innocence.
JURISDICTION
It is a fact that the tried and true real world legal principles do not apply in the
digital generation. Even seemingly ubiquitous, time honoured principles must be
examined, including whether a court has the power to exercise jurisdiction over a
defendant because of the defendant's ties to or use of the Internet or Internet related
technologies. This jurisdictional rethinking requires us to address the concept that
involves the right of the sovereign to exert its power and control over people or entities
that use the Internet
One of the complexities of the Internet is the fact that Internet communications
are very different than telephone communications. The telephone communication system
is based on circuit-switching technology, where a dedicated line is allocated for
transmission of the entire message between the parties to the communication. A dedicated
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
line, on the other hand, does not accomplish Internet communications. A message sent
from an Internet user in India may travel via one or more other countries before reaching
a recipient who is also sitting at a computer in India. Therefore, the lack of a physically
tangible location and the reality that any Internet communication may travel through
multiple jurisdictions creates a variety of complex jurisdictional problems29.
POSITION IN INDIA
Cases of cyber defamation do not fit neatly in the accepted categories of crimes.
They represent harm of greater magnitude than the traditional crimes and of a nature
different from them. Unlike the traditional crimes, they are not in the shape of positive
aggressions or invasions30. They may not result in direct or immediate injury;
nevertheless, they create a danger, which the law must seek to minimize. Hence, if
legislation applicable to such offences, as a matter of policy, departs from legislation
applicable to ordinary crimes, in respect of the traditional requirements as to mens rea
and the other substantive matters, as well as on points of procedure, the departure would
be justified31
An effort is still wanted to formulate an international law on the use of Internet to
curb this imminent danger of cyber crimes and to achieve a crime free cyber space.
Defamation laws should be sufficiently flexible to apply to all media.
The difficulty is that the defamation laws world over were principally framed at a
time when most defamatory publications were either spoken or the product of
unsophisticated printing.
We do need a stronger legal & enforcement regime in India to combat the
increasing cyber crimes or in other words, efficacy in dispensation of justice will be
instrumental in curtailing such activities.
29
Cyberspace, 55 F. Supp. 2d at 745 (citing American Civil Liberties Union v. Johnson, 4 F. Supp. 2d 1029,
1032 (D.N.M. 1998); American Libraries, 969 F. Supp. at 171)); Eugene R. Quinn, Jr., THE EVOLUTION
OF INTERNET JURISDICTION: WHAT A LONG STRANGE TRIP IT HAS BEEN, SYRACUSE LAW AND
TECHNOLOGY JOURNAL, Spring, 2000: www.westlaw.com
30
Chris Reed (Ed.), COMPUTER LAW, 5th ed., 2000, p.392.
31
Ibid.
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
The position in Indian law is not very clear and amendments should be brought to
Section 67 of the Information Technology Act, 2000 32 and also to Section 499 of the
Indian Penal Code33, by expressly bring within their ambit offences such as defamation in
cyber space, which is certainly a socio-economic offence.
32
Publishing of information which is obscene in electronic form.
Whoever publishes or transmits or causes to be published in the electronic form, any
material which is lascivious or appeals to the prurient interest or if its effect is such
as to tend to deprave and corrupt persons who are likely, having regard to all
relevant circumstances, to read, see or hear the matter contained or embodied in it,
shall be punished on first conviction with imprisonment of either description for a
term which may extend to five years and with fine which may extend to one lakh
rupees and in the event of a second or subsequent conviction with imprisonment of
either description for a term which may extend to ten years and also with fine which
may extend to two lakh rupees.
33
Defamation: - Whoever, by words either spoken or intended to be read, or by signs or by visible
representations, makes or publishes any imputation concerning any person intending to harm, or knowing
or having reason to believe that such imputation will harm, the reputation of such person, is said, except in
the cases hereinafter expected, of defame that person.
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
CONCLUSION
In May 2000, at the height of the dot-com boom, India enacted the IT Act and became
part of a select group of countries to have put in place cyber laws. Three years down the
line, is the Internet a better place to live in? Are those cyber criminals behind bars? Are
we shopping mad online?
Well, not really. The Internet is still a dirty place to hang out; beware those viruses
and spam mails. Cyber hooligans are growing in numbers and are very much at large.
And we are still wary of using our credit card online.
Despite the enactment of cyber laws and their existence for three years, a lot more
needs to be done, both online and offline, as well as within the judiciary and law
enforcement agencies, experts feel. However, a number of right steps have also been
taken to make the IT Act more relevant in today's context.34
Despite the Information Technology Act, 2000, there are still several grey areas that
exist within the law. "The IT Act, 2000, is primarily meant to be a legislation to promote
e-commerce. It is not very effective in dealing with several emerging cyber crimes like
cyber harassment, defamation, stalking and so on."35
In all five years, despite the growing crime rate in the cyber world, only less than 35
cases have been registered under the IT Act 2000. And no final verdict has been passed in
any of these cases as they are now pending with various courts in the country.
The information technology has spawned new legal issues that do not have a
precedent in the common law world, which has been evolved and established in a
physical world with political boundaries and in tangible medium. The principles of
common law, in many cases, are inapplicable to the legal issues that have emerged in
cyberspace that knows no boundaries and physical environment. These issues do not have
34
Vipin V. Nair, DARK DEEDS REMAIN IN THE DARK, available on the website-
( http://www.thehindubusinessline.com/ew/2003/09/10/stories/2003091000080100.htm)
35
Gopika Vaidya-Kapoor, BYTE BY BYTE. available on the website -
http://www.rediff.com/netguide/2003/feb/18crime.htm
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
express solution in the existing legal regime. Although, the Information Technology Act,
2000 has been passed, yet it is simply a gap filler and in many situations it is not
applicable. The legal position regarding the electronic transactions and civil liability for
the acts executed in cyberspace is still hazy. Thus courts will be, time and again, called to
resolve nebulous issues and in the process, it is hoped that cyber jurisprudence will be
evolved and ultimately established.
SUGGESTIONS
At the last count, there are 43 member countries, including the US and South
Africa. India is not yet a part of this group and being a member would go a long way in
addressing this issue of cross-border cyber terrorism.
The Indian IT Act also needs to evolve with the rapidly changing technology
environment that breeds new forms of crime and criminals. "We are now beginning to see
new categories and varieties of cyber crimes, which have not been addressed in the IT
Act. This includes cyber stalking, cyber nuisance, cyber harassment, cyber defamation
and the like.
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
Another glaring omission in the Act, which contradicts the very objective of
passing such a law - encouraging e-commerce by giving it legal validity — is the fact that
the IT Act does not cover electronic payment. However, some steps such as amendments
to the Negotiable Instruments Act have been taken to address this issue. Also in the
making is a law on data protection.
CRIMES IN CYBER AGE AND ITS RESPONSE BY INDIAN JUDICIARY
BIBLIOGRAPHY
ARTICLES
ed.
(http://www.cbsnews.com/stories/2005/06/0/eveningnews/main699362.shtm)
CRIMINAL PROSECUTION MADE EASY FOR CYBER PSYCHOS , (Vol. 42, 2002),
LONG STRANGE TRIP IT HAS BEEN, Syracuse Law and Technology Journal,
Goode, M., STALKING: CRIME OF THE NINETIES. Criminal Law Journal, 19,
1995.
http://www.rediff.com/netguide/2003/feb/18crime.htm
Hardy, "THE PROPER LEGAL REGIME FOR CYBER SPACE" 55 Utah L Rev 993
ON THE INTERNET
San Jos Mercury News 9th Apr 1999 available online from Lexis-Nexis.
(http://www.expresscomputeronline.com/20040705/newsanalysis01.shtml)
(02-11-2007)
Murdock, "THE USE AND ABUSE OF COMPUTERIZED IN FORMAT ION " 44 ALB
www.westlaw.com
Suzi Seawell (et al), CYBER DEFAMATION: SAME OLD STORY OR BRAVE NEW
WORLD? : http://gsulaw.gsu.edu/lawand/papers/su98/defamation
Justice and Centres for Disease Control and Prevention. Washington DC.
Available at http://www.ncjrs.org
Vipin V. Nair, DARK DEEDS REMAIN IN THE DARK, available on the website-
(http://www.thehindubusinessline.com/ew/2003/09/10/stories/200309100008
0100.htm)
Westrup, D., Fremouw, W.J., Thompson, R.N. & Lewis, S.F. THE
Yatinder Singh, CYBER CRIME ,(Vol. 44, 2002), Journal of India Law Institute,
New Delhi
BOOKS REFERRED
Charlotte Waelde and Lilian Edwards (Ed.), LAW AND THE INTERNET-A
Oxford
Chris Reed (Ed.), COMPUTER LAW, (5th ed., 2000), Blackstone Press, London
Gerald R. Ferrera (et al), CYBER LAW-TEXT AND CASES, (2nd ed.) Thomson
Graham J H Smith, INTERNET LAW AND REGULATION, (3rd ed. 2002), Sweet
Rodney D. Rider, GUIDE TO CYBER LAWS, (2nd ed. 2003), Wadhwa and Co.,
Nagpur
LEGISLATIONS USED
Indian Constitution
WEBSITES USED
www.manupatra.com
www.westlaw.com
www.thehindubussinessonline.com
www.ncjrs.org
www.gsulaw.gsu.edu
www.cbsnews.com
www.rediff.com
www.aic.gov.au
www.acs.ucalgary.ca