Professional Documents
Culture Documents
It Law Combined Lecture Notes 1 37
It Law Combined Lecture Notes 1 37
OSMANIA UNIVERSITY
Information Technology Law
Combined Notes, All Units
What is Cyberspace?
History of cyberspace
Cyber Law
The relationship between law and technology creates two distinct areas for
discussion and debate, but the two are interconnected and no discussion is
complete without acknowledging the other. In any conversation on the future of
the legal profession, there should be a real consideration of the role that
technology takes in shaping and enhancing that future. Likewise, in any discussion
on technology it is necessary to consider proper acknowledgment and the legal
framework in which it operates.
The use of new technologies in law firms is similar to what is happening in the
wider business economy, where the emergence of new technologies, processes
and automation has brought exciting change and vast consumer and business
benefits, but also a new modern working structure. Colloquially referred to as the
gig economy, it is a way of working where temporary status prevails, freelance
work is standard and organization contracts with individuals on a short-term
basis.
Advocates argue that the gig economy provides boundless innovation and
empowers both workers and entrepreneurs, while critics suggest that it violates
the workforce and reduces workers' rights. New technologies present exciting
opportunities but they also present uncertainty. Companies can automate
processes efficiently, add needs more quickly and allow companies to have a
wider pool of 'workers' on standby, and we are on the verge of potentially
massive turmoil. Without careful consideration, individual rights can suffer
considerable loss.
As recent cases related to the gig economy such as Uber, Dewhurst v City Sprint
and now Pimico Plumbers are disappointing, the courts survive for the disparity of
bargaining power faced by individuals under these circumstances. The Law
Society has suggested that this is an area for reform and proposed that the
government conduct a comprehensive review and reappraisal to assess whether
current legal definitions of employment status fit for purpose Are.
An echo of this situation is taken by Nigel Reim, Director of Drafting, Forms and
Predictions, LexisNexis: 'New technology is exciting, but we shouldn't let that
cloud the fact that we work in an industry built on people - we believe We will
reduce this situation. Successful deployment of any new technology 'He writes
LexisNexis report' for lawyers and robots? 'Which considers the questions facing
the legal industry regarding the adoption of new technology.
Lawyers and others in the legal industry need to engage with these issues or face
irrelevance to their clients. Clients (and attorneys) have high expectations of what
technology can deliver and this expectation is judged against their experience
given by large technology firms such as Google and Apple. Lawyers may well find
that they are acting very differently from their predecessors.
Jurisdiction in Cyberspace
Introduction
Jurisdiction
In the case of Hriday Nath v. Ram Chandra, the Court has defined
jurisdiction as the right of courts to decide cases on the basis of their
judicial powers. The Indian judiciary has invoked the classical legal adage
"ubi jus ibi remedium" that where there is a right there is a remedy.
Therefore, jurisdiction is generally a lie in which wrongdoing is done.
Section 9 of the Code of Civil Procedure describes the jurisdiction of a civil
court to entertain a civil suit unless it is implied or expressly prohibited.
Ganga Bai Vs. The situation was confirmed in the case of Vijay Kumar, in
which the court held that it is a "reasonable right" unless it is barred by a
statute. No authorization is necessary for the stability of the suit, if the
statute does not bar the suit. Sankaer Naryan Potti Vs. In the case of
Sridevi, the Supreme Court has interpreted Section 9 stating that unless the
jurisdiction is removed, expressly or implicitly, from a civil court, the court
has jurisdiction to try a civil dispute.
Civil nature
The civil is not defines or mentioned properly. Any suit which is not criminal
in nature can be called a suit of civil nature. Any suit relating to the
determination and enforcement of civil rights can be defined as a civil suit.
Civil courts have "vested" jurisdiction to try a case unless a statute prohibits
it.
Custodian General, the court elaborated on the concept of civil
proceedings. It was defined as the grant of private rights to individuals or
corporations of society. The purpose of the action is to compensate or
recover private rights. In other words, civil action can be explained as an
action between two parties for the enforcement or redress of a private
right. The burden of proof is on the claiming party to prove the exclusion of
jurisdiction.
Boycott of jurisdiction
The general belief is that the civil court has jurisdiction to try the case. The
jurisdiction of the Court cannot be questioned unless it is expressly or
impliedly evicted. A.P. V. In the case of Majiti Laxmi Kanth Rao's state, the
apex court conducted a test to determine the exclusion of jurisdiction of
civil courts. First, the legislative intention to exclude the suit is to be
determined. It can be direct or implicit.
The court must find out and deduce the reasons for the exclusion of civil
courts and its justification, but the justification is not open to judicial
scrutiny. After the court is satisfied with the reasons, the court must find
Types of jurisdiction
Arbitral jurisdiction
Section 15 of the Code directs the institute of suit in the lowest class court.
It refers to the exclusive jurisdiction of the civil court. It is a rule of
procedure and does not affect the jurisdiction of the court. Thus, the
decree passed by a highly hierarchical court is not void per se.
The main purpose of defining peculiar jurisdiction is to prevent a high level
of court from being burdened and to facilitate the parties. Usually, the
court accepts the plaintiff's assessment. However, the court will intervene if
the assessment finds it incorrect. Like, Z wants to sue Y for breach of
contract. 5000 in Bombay. The Bombay High Court has original jurisdiction
and due to petty reasons the Court has a fine of Rs. 50000.
In the case of Karan Singh v. Chaman Paswan, the plaintiff filed subordinate
court's Rs. Sued in 2950 But the court dismissed the case. The plaintiff's
appeal in the District Court was also dismissed. Later, his second appeal
was accepted by the High Court, but it ordered him to pay the amount of
the loss. With the assessment amended it came under the jurisdiction of
the subordinate judge, but the appeal would be directly to the High Court.
The appellant argued that the decision of the District Court would be a
nullity, but the High Court dismissed the contention. Later, the appellant
approached the Supreme Court, which upheld the decision of the High
Court and held that the decision of the district court would not be void.
Territorial jurisdiction
Section 20 of the CPC covers cases not envisaged in the previous section. The
plaintiff is at liberty to prosecute at any of the following places:
The purpose of this section is to secure justice and protect the defendants from
unreasonable expenses of long distance travel in cases in which it may be
involved.
Subject jurisdiction
Subject matter can be defined as the power vested in the court to hear and
try matters relating to a particular type and subject. This is related to the
nature of the claim. In other words, it means that some courts are excluded
from hearing cases of nature.
No question of merit can be decided by the courts which do not have
subject jurisdiction. The court, in that case, can only decide on jurisdiction
and return the plaintiff. For example, Kavira, a resident of Raipur, bought a
ZZ brand food item that was infested with pests. He should sue ZZ Company
in Raipur District Forum instead of Raipur District Civil Court.
Section 21 of the Code deals with the phase challenging the jurisdiction. In
the Harishh Chimaan Case, DLF Universal Limited and Anar, in cases of
territorial and peculiar jurisdiction, objections should be raised as soon as
possible before opportunity and issues are settled. However, with respect
to the jurisdiction of the subject matter, the court cannot take suit without
jurisdiction over the subject matter. Any order passed by such court shall
be void.
Original jurisdiction
It refers to the right of the court to take cognizance of cases which may be
adjourned in those courts at first. Unlike appellate jurisdiction, where
courts review pre-decided cases, cases are heard afresh. For example, the
Madras High Court has original jurisdiction in relation to matrimonial,
probate, company matters and testament.
Appellate jurisdiction
lex loci deliciti. While in a property suite, it is based on the law of lex situs
or physical location.
Contrary to the traditional understanding of jurisdiction, cyber transactions
pose difficult circumstances to determine jurisdiction. It may happen that
there may be multiple jurisdictions related to the same suit. Enforcement
and implementation of foreign decrees is a major challenge. In order to
enforce the foreign decree, it must be the final order in respect of the
subjects and, therefore, should be mutually agreed between the parties.
In relation to the provision stated above, it is implied that the foreign
decrees are binding provided that the said exceptions are taken into
consideration while postponing them.
Also, if an individual or corporate has expressly accepted foreign
jurisdiction, such person or corporate is bound by its decision. Therefore,
cognizance of any internet transaction across the country can be taken. The
foreign decree passed against the Indian defendant is probably not
enforceable on the basis of the procedure laid down in Section 13 of the
CPC. It should be noted that the agitated party should approach the Indian
courts to obtain the foreign decree made under section 44A or to file an
entirely new suit on the decision of its enforcement.
Thus, with a decree being obtained in a foreign court, the aggrieved party
presents the principal evidence in India, but faces major problems under
Section 13. Therefore, it can be said that if the foreign defendant is a
resident of India, he should file a claim in India. As internet transactions will
have a large amount of documentary evidence and there will not be the
The conclusion
There is no proper judicial procedure laid down in any law other than CPC.
Cybermob’s jurisdiction issues often become a hindrance to the institution
of a civil suit. The universal nature of cyber laws has crossed geographical
boundaries and requires an external jurisdiction. Additionally, execution is a
complex process that appears to be fruitless with respect to extroverted
jurisdiction. However, the use of CPC can help resolve issues within the
jurisdiction of cyber law. It is suggested that CPC should be modified to
avoid complex application i.e. to simplify processes.
In addition, the General Assembly of the United Nations recommended that all
countries should consider this model law before making changes to their own
laws. India became the 12th country to enable cyber law after passing the
Information Technology Act, 2000.
While the first draft was created by the Ministry of Commerce, Government of
India as the Ecommerce Act, 1998, it was remodeled as the Information
Technology Bill, 1999 ', and was passed in May 2000.
Further, the Act amended the Indian Penal Code 1860, the Indian Evidence
Act 1872, the Bankers Books Evidence Act 1891 and the Reserve Bank of
India Act 1934. Its Objectives are:
Provide legal recognition to all transactions made by data or other
electronic means of communication or electronic means of e-commerce in
place of the earlier paper-based method of communication.
Legal recognition of digital signature for authentication requiring legal
authentication of any information or case
Electronic filing facility with government agencies and departments
Electronic storage facilities
Provide legal approval and facilitate electronic transfer of funds between
banks and financial institutions
To provide legal recognition to bankers under the Evidence Act, 1891 and
Reserve Bank of India Act, 1934 for keeping books of accounts in electronic
form.
Appeal against the order of the Cyber Appeal Tribunal is possible only in the
High Court
The digital signature will use an asymmetric crypto system and a hash
function
Provision for appointment of Certification Authorities of Certification
Authorities (CCA) to license and regulate the functioning of Certifying
Authorities. The controller acts as a repository of all digital signatures.
This Act applies to offenses or violations committed outside India.
Senior police officers and other officers can enter any public place and
search and arrest without warrant.
Provisions for constitution of a Cyber Regulations Advisory Committee to
advise the Central Government and the Controller.
Applicability
According to Section 1 (2), the Act extends to the entire country, including
Jammu and Kashmir. To include Jammu and Kashmir, the Act uses Article
253 of the Constitution. Furthermore, it does not take into account
citizenship and provides additional jurisdiction.
Section 1 (2) along with Section 75 specifies that the Act is applicable to any
offense or violation committed outside India. If the conduct of the person
committing the offense involves a computer located in India or a
computerized system or network, the person is punishable under the Act,
irrespective of his nationality.
Non applicability
As per Section 1 (4) of the Information Technology Act, 2000, the Act is not
applicable to the following documents:
The central government appoints only one person to the tribunal - the presiding
officer of the Cyber Appellate Tribunal.
Appellate Tribunal
The term of office of the Presiding Officer of a Cyber Appellate Tribunal is five
years from the date of entering the office or till he attains the age of 65 years,
whichever is earlier.
If there is a vacancy in the Tribunal, other than temporary absence due to any
other reason, the Central Government hires another person as per the Act to fill
the vacancy. Further, proceedings before the tribunal continue from the stage at
which the post is filled.
The Presiding Officer may resign from his office after sending a notice in
writing to the Central Government:
Unless the Central Government receives such information, he shall hold
office until the end of his three-month term (unless the Government
permits him to leave his office), or
He holds office until the appointment of a successor, or
Until the end of his office; whichever is earlier.
In case of misconduct or incapacity, the Central Government may pass an
order to remove the Presiding Officer of the Cyber Appellate Tribunal.
However, this is only when the Supreme Court judge conducts an inquiry
where the Presiding Officer is aware of the charges against him and gets a
fair chance to defend.
The Central Government may regulate the procedure for investigation of
misbehavior or incapacity of the Presiding Officer.
The orders constituting the Appellate Tribunal shall be final and shall not
invalidate its proceedings (Section 55).
According to this section, no order of the Central Government appointing
any person as the Presiding Officer of the Tribunal can be questioned in any
manner. Further, no one can question any proceedings before the Cyber
Appellate Tribunal on the basis of any defect in the constitution of the
Tribunal.
The person filing the appeal must do so within 25 days from the date of receipt of
the order from the Comptroller or Assistant Officer. In addition, he must appeal
with the prescribed fees. However, if the Tribunal is satisfied with the reasons
behind the delay in filing the appeal, it can entertain it even after the expiry of 25
days.
The Cyber Appellate Tribunal sends a copy of every order made to all parties to
the appeal and the concerned Comptroller or Assistant Officer.
The tribunal tries to deal expeditiously with the appeals received under sub-
section (1). It also seeks to dispose of the appeal until finally within six months of
receiving it.
The Code of Civil Procedure, 1908 is not bound by the Cyber Appellate Tribunal.
However, the principles of natural justice dictate it and it is subject to other
provisions of the Act. The tribunal has powers to regulate its process.
To discharge its functions efficiently, the Tribunal has the same powers vested in
a civil court under similar procedure, 1908, while trying for a suit in the following
cases:
Calling and enforcing the presence of any person and examining them
under oath
Ensuring availability of required documents or electronic records
Obtaining evidence on affidavits
Issue of commission for examination of witnesses or documents
Every proceeding before the Cyber Appellate Tribunal is like a judicial proceeding
within the sections 193 and 228 and for the purposes of section 196 of the Indian
Penal Code. Further, the Tribunal is like a civil court for the purposes of Section
195 and Chapter XXVI of the Code of Criminal Procedure, 1973.
The appellant may either appear in person or authorize one or more legal
practitioners to present their case before the tribunal.
The provisions of the Limitation Act, 1963 apply to appeals made to tribunals.
If the IT Act, 2000 empowers the Assistant Officer or the Cyber Appellate
Tribunal for certain cases, no civil court can entertain any suit or
proceeding.
Further, no court can pass an injunction on any action that takes a person
in pursuance of any power that the act relies upon.
Explain that a person is not satisfied with the decision or order of the tribunal. In
such cases, he can file an appeal in the High Court. He should do so within 60 days
of receiving communication of the order / decision from the Tribunal.
The appeal may be on any fact or law arising out of such order. The High Court
can extend the term for another 60 days if it feels that the appellant had sufficient
reasons and reasons for the delay.
The Controller or any other officer whom he or the adjacent authorizes may
prevent any violation. Compounding is possible either before or after the
installation operation. This is subject to the conditions that the Controller or such
other officer or assistant officer specifies. Provided that the amount does not
exceed the maximum amount of the penalty which the Act allows for compound
violation.
Nothing in sub-section (1) applies to a person who applies the same or similar
contraceptives within a period of three years from the date on which her first
miscarriage took place. Therefore, if the person performs a second abortion after
the expiry period of three years from the date on which her first contraceptive
compound was performed, it becomes her first contraceptive.
If the penalty imposed under this Act is not paid, the land is recovered as arrears
of revenue. In addition, the license or digital signature certificate is suspended
until the penalty is paid.
The IT Act 2000, being the first law on technology, computers, e-commerce and e-
communication, was the subject of widespread debate, a hands-on detailed
review of the industry criticizing certain sections of the act and other topics
making it very thin. And is lighter. There were also some obvious lapses, which
resulted in investigators relying more and more on the time-tested (another half-
century-old) Indian Penal Code, even in technology-based cases with the IT Act
more in process with reliance Is being referred to. IPC, not ITA.
Thus the need for an amendment - a detailed - I.T. Act. Consultations with major
industry bodies were held and came. T. Advisory groups were formed to go to the
alleged Lakune. Comparing with the Act and similar legislation in other countries
and suggesting recommendations. Such recommendations were analyzed and
later taken as a Comprehensive Amendment Act and following considerable
administrative procedures, the Consolidated Amendment called the Information
Technology Amendment Act 2008 was placed in Parliament and passed in late
2008 (Mumbai on 26 November After the terrorist attack) took place 2008). The
IT Amendment Act 2008 received the assent of the President on 5 February 2009
and was made effective from 27 October 2009.
Structure of IT Act
The Act extends to the whole of India and except as otherwise provided, it also
applies to any offense or violation committed outside India.
The rules and procedures outlined in the Act are also laid out in a phased manner,
most recently defined as of April 2011.
For simplicity, here we will only discuss various penalties and offenses defined
according to the provisions of ITA 2000 and ITAA 2008. Please note that wherever
the IT Act 2000 or 2008 is used, they refer to the same Act as the IT Act now
includes amendments as per the IT 2008 Amendment Act.
What is Cybercrime?
Cybercrime is not officially defined in the IT Act or any other law. In fact, it cannot
be either. Under the Indian Penal Code, 1860 and related legislations, the crime
or crime has been dealt with, listing various acts and punishments of each in
detail. Therefore, the concept of cybercrime is just a "combination of crime and
computer".
through any illegal behavior, such as illegal possession and means of a computer
system or network Convey or distribute information to.
For simplicity and to maintain clarity, details on IT Act sections have been
omitted. For a detailed description of all the penalties and offenses mentioned in
the IT Act, refer to the Appendix in the last section.
Related Case: Mphasis BPO Fraud: 2005In December 2004, four call center
employees working at an outsourcing facility operated by MphasiS in India
received PIN codes from four clients of MphasiS, Citigroup's client. These
employees were not authorized to obtain PINs. In collaboration with others, call
center employees opened new accounts in Indian banks using false identities.
Within two months, he used flashing PINs and account information during his
employment at MphasiS, to transfer money from bank accounts of CitiGroup
customers to new accounts in Indian banks.
As of April 2005, the Indian police had taken over the U.S. The scam was ended by
the bank, and the persons involved in the scam were quickly identified. Those
arrested, when they attempted to extort cash from wrong accounts, $ 426,000
were stolen; The recovered amount was $ 230,000.
Verdict: The court considered that section 43 (a) was applicable here due to the
nature of unauthorized access to conduct transactions.
Related case: Syed Asifuddin and ORS v. State of Andhra Pradesh In this case, Tata
Indicom employees were arrested for the manipulation of electronic 32-bit
numbers (ESNs) that were programmed into cell phone theft, specifically Reliance
Infocomm was given franchises.
Verdict: The Court held that tampering with the source code enforces Section 65
of the Information Technology Act.
Related case: Kumar v / s Whiteley In this case the accused gained unauthorized
access to the Joint Educational Network (JANET) and deleted, added files and
changed passwords to deny access to authorized users. BSNL broadband internet
connection as if it was an authorized real user and 'change in computer database'
related to the broadband internet user accounts of the customers. The CBI had
registered a cybercrime case against Kumar and investigated based on the
database, a complaint by the Press Information Bureau, Chennai, which traced
the unauthorized use of broadband internet. It has also been said in the
complaint that due to wrong actions of Kumar, customers have suffered a loss of
Rs 38,248. He said that 'hack' sites also used to come from Bangalore, Chennai
and other cities.
Relevant matters:
A complaint filed by a company representative, who was engaged in the trade and
distribution of petrochemicals in India and abroad, an offense was registered
against nine persons, including offenses under sections 65, 66, 66A, C and D
Were. Information Technology Act along with sections 419 and 420 of Indian
Penal Code.
The company has a web-site in its name and style www.jaypolychem.com 'But,
another web site www.jayplychem.org' was set up in the internet by the first
accused Samdeep Varghese @ Sam, (who was dismissed Was) company) in a
conspiracy with Preity and Charanjeet Singh along with other accused, who are
the sisters and brothers-in-law of Sam.
Defamatory and malicious cases about the company and its directors were made
available in that website. The accused sister and brother-in-law were based in
Cochin and were working in connivance with known and unknown persons, who
have collectively cheated the company and committed acts of forgery,
impersonation etc.
Amardeep Singh and Rahul, two of the accused, went to Delhi and Cochin. First
the accused and others sent e-mails from fake e-mail accounts of many
customers, suppliers, banks etc. to tarnish the name and image of the company
and its directors. The defamation campaign conducted by all the above persons
has caused huge damage to the name and reputation of the company.
The company lost several crores of rupees from producers, suppliers and
customers and was unable to do business.
Relevant matters:
Jawaharlal Nehru University MMS Scam As a serious blow to the prestigious and
renowned institution - Jawaharlal Nehru University, a pornographic MMS clip was
apparently made on campus and transmitted outside the university. Some media
reports claimed that two students initially tried to extort money. From the girl in
the video, but when they failed, the criminals put the video on mobile phones, on
the Internet, and even sold it as a CD in the blue film market.
Nagpur police leader's son's MMS scam On January 05, 2012, Nagpur police
arrested two engineering students, one of whom was the son of a Congress
leader who harassed a 16-year-old girl for broadcasting MMS clips of her sexual
activities Did it According to Nagpur (Rural) Police, the girl was in a relationship
Relevant Case: The Mumbai Police has registered a case of cyber terrorism - since
the amendment in the Information Technology Act - where a threatening email
was sent to the BSE and NSE on Monday. The MRA Marg Police and Cyber Crime
Investigation Cell are jointly investigating the case.The wrongdoer was
arrested/detained. Police said that an Shadab MD sent an email to BSE's
administrative email ID corp.relations@bseindia with an ID
sh.itaiyeb125@yahoo.in, challenging the security agencies to prevent a terrorist
attack. Com on Monday at around 10.44 am. The sender's IP address has been
traced to Patna in Bihar. ISP is Sify. The email was sent from the email address
which was created some moments ago. “While creating the new ID, the sender
had given two mobile numbers in the Personal Details column. Both numbers
belong to a photo frame maker in Patna, '' said an official.
Status: MRA Marg Police has registered fraud under IPC in cases of fraud, criminal
intimidation and cyber terrorism under IT Act.
Relevant Case: This case is about posting a vulgar, abusive and annoying message
about a divorced woman in Yahoo Message Group. Through the false e-mail
account opened by the victim in her name, the accused sent e-mails to the victim
for information. These postings received harassing calls to the woman. Based on
the woman's complaint, the police arrested the accused. The inquiry revealed
that he was an acquaintance of the victim's family friend and was interested in
marrying her. He had married another man, but that marriage ended in divorce
and the accused once again started contacting him. He began harassing her via
the internet over her reluctance to marry him.
Verdict: The accused was found guilty of offenses under sections 469, 509 IPC and
67 of the IT Act 2000. He is convicted and sentenced for the crime as follows:
As per IPC 469, he will have to pay rigorous imprisonment for 2 years and a
fine of Rs 500 / -.
As per 509 of the IPC, he will have to pay a simple imprisonment of 1 year
and a fine of Rs.500 / -.
As per Section 67 of IT Act 2000, he has to undergo 2 years and Rs. 4000 / -
will have to be fined.
All sentences were to run concurrently.
The accused paid a good amount of money and was lodged in the Central
Jail, Chennai. It is believed to be the first case convicted in India under
Section 67 of the Information Technology Act 2000.
Relevant Case: Public Interest Forum and Organization. v. The Union of India
10.03.2010 Public Interest Litigation: The petition calls for a ban on pornographic
websites. The NGO had argued that websites displaying sexually explicit content
were adversely affected, leaving the youth on a difficult path.
Relevant Case: In August 2007, Lakshman Kailash K., a technical expert from
Bangalore was arrested on suspicion of posting derogatory pictures of
Chhatrapati Shivaji, a prominent historical figure in the state of Maharashtra, on
the social-networking site Orkut. The police identified him based on the IP
address details obtained from Google and Airtel-Lakshmana's ISP. He was brought
to Pune and detained for 50 days before it was revealed that the IP address
provided by Airtel was incorrect. The mistake was due to the fact that while
requesting information from Airtel, the police did not specify precisely whether
the suspect posted the material at 1:15 p.m.
Verdict: Taking cognizance of their plight from newspaper accounts, the State
Human Rights Commission later ordered the company to pay Rs 2 lakh as
damages. This incident highlights how minor privacy violations by ISPs and
intermediaries may impact which severely curtails other basic human rights.
Let us look at some common cyber-crime scenarios, which can attract prosecution
according to the penalties and offenses set out in the IT Act 2000 (as amended
through 2008) Act.
A fake profile of a person is created on the social networking site with the correct
address, residential information or contact details, but is labeled as a 'prostitute'
If the victim's email account is hacked and pornographic emails are sent to people
in the victim's address book. Applications apply: - Sections 43, 66, 66A, 66C, 67,
67A and 67B of the IT Act.
Web defacement
All of the above are some types of malicious programs that are used to destroy or
gain access to certain electronic information. Applications apply: - Section 43, 66,
Section 4A of the IT Act and Section 426 of the Indian Penal Code.
Cyber terrorism
Many terrorists are using virtual (GDrive, FTP sites) and physical storage mediums
(USB, hard drives) to hide their illegal business information and records.
Applicable: Traditional counterterrorism laws may apply with Section 69 of the IT
Act.
Cyber pornography
Among the largest businesses on the Internet. Child Porn is banned and being
repelled in every country while there might be some countries where porn might
not be. The provisions apply: - Section 67, 67A and Section 67B of the IT Act.
Phishing involves scamming the site as a trusted entity to commit fraud to obtain
sensitive information. (Eg password, credit card information) Provisions
applicable: - Sections 66, 66A and 66D of IT Act and section 420 of IPC
A source code is usually the most prestigious and important "Crown Jewel"
property of a company. Applicable provisions: - Section 43, 66, Section 63 of IT Act
and Section 63 of Copyright Act.
Money launders and all people who are indulged in White-Collar Crimes does
save their data and information on computers. The provisions apply: Income Tax
Act and Prevention of Money Laundering Act. IT Act may apply case-wise
It has become imperative for investors to associate their demat accounts with
their online banking accounts, which are usually accessed unauthorized, thereby
sharing trading fraud.
Whoever, -
For a term either a description of imprisonment which may extend to five years
and with fine up to ten lakh rupees and for the event of a second or subsequent
conviction with imprisonment of either description and up to seven years and
fine. Can also be up to ten million rupees.
May cultivate, entice or induce children to have sex with one or more children or
to have an online relationship in that manner or may prevent a reasonable adult
on a computer resource
Provided that the provisions of Section 67, Section 67A and this Section are not in
any book, pamphlet, paper, writing, drawing, painting, representation or
electronic form.
Where the Central Government or the State Government or any of its officers is
specifically authorized by the Central Government or the State Government, as
may be the case, if it is satisfied that it is necessary or expedient to do in the
interest of the sovereignty of India or Integrity, defense of India, security of the
state, friendly relations with foreign states or public order or prohibiting the
commission of any of the above cognizable offenses Sector or to investigate a
crime, it can be subjected to it. The provisions of sub-section (2), for reasons to be
recorded in writing, to intercept, monitor or decrypt any agency of the
appropriate government or to monitor or decrypt the cause or to transmit or
store any information To direct to. Any computer resource.
Subscriber or arbitrator or any person who fails to assist the agency referred to in
sub-section (3) shall be sentenced to imprisonment for a term of up to seven
years and a fine will also be imposed.
Section 69A - Power to issue instructions for blocking for public use of any
information through any computer resource
In this regard, it has been specially authorized by the Central Government or any
of its officers, where satisfied that it is necessary to do so in the interest of
sovereignty and integrity of India, defense of India, security of the State, friendly
relations with foreign or Is expedient. To prevent the provocation of the State or
the public order or commission of any cognizable offense relating to the above, it
may be subject to the provisions of sub-sections (2) for reasons to be recorded in
writing, of the Government or of the arbitrator. By direct order to any agency to
publicly access any information generated, transmitted, received, stored or
hosted in any computer resource. To block access by the public or blocked.
The procedure and safety subject under which such barriers to access by the
public can be excluded as may be prescribed.
The arbitrator who fails to follow the guidelines issued under sub-section (1) shall
be punished with imprisonment which may extend to seven years and may also
be liable to fine.
The central government may authorize any agency of the government to increase
cyber security and to identify, analyze and prevent the spread of any intrusion or
The process and security measures for monitoring and storing traffic data or
information will be determined in this way.
Any arbitrator who knowingly or willfully violates the provisions of subsection (2)
shall be sentenced to an imprisonment which may extend to three years and shall
also be liable to fine.
Subject to the provisions of sub-section (2), the provisions of this Act shall also
apply to any offense or violation outside India by any person irrespective of his
nationality.
For the purposes of sub-section (1), this Act shall apply to any offense or violation
committed outside India by any person, if the act or conduct complying with the
offense or violation involves the computer, computer system or computer
network located in India Is included.
A court of competent jurisdiction may prevent offenses other than offenses, for
which imprisonment for life or imprisonment of not more than three years is
provided under this Act. It further states that the court will not commit any crime
where this crime affects the socio-economic circumstances of the country or
against a child or a woman under 18 years of age.
Under this Act, a person accused of an offense can file an application for
compounding in the court where the offense is pending for trial and the
provisions of sections 265B and 265C of the Code of Criminal Procedure, 1973 will
apply.
Section 77B - Offenses with imprisonment for three years for being cognizable.
UNICTRAL MODEL
Objective:
Summary:
Model law has two parts: Part I includes e-commerce in general; Part II
covers e-commerce in specific areas, where goods are transported.
In addition to formulating legal notions of non-discrimination, technical
neutrality, and functional equivalence, MLEC establishes rules for the
formation and validity of contracts obtained by electronic means, for the
characterization of data messages, for the receipt of receipts and for the
receipt of time. To determine and the location of sending and receiving
data messages.
It should be noted that some provisions of MLEC were amended by the
Electronic Communications Convention in light of the recent electronic
commerce practice. In addition, Part II of the MLEC deals with electronic
commerce in relation to the movement of goods, supplemented by other
legislative texts, including the United Nations Convention on Contracts on
Goods of Carly or partly C ("Rotterdam" Rules). ") And may be the purpose
of additional work of UNCITRAL in the future.
Model law is enactment with a guide, which provides background and
explanatory information to assist states in formulating necessary legislative
provisions and can guide other users of the text. There are cases related to
the application of model law on electronic commerce to the CLOUT (case
law on UNCITRAL texts) system.
Patents
On December 17, 1991, the EPC and the law amended the EPC on
November 29, 2000.
Trademarks
The Nairobi Convention for the Protection of Symbols, October 26, 1981,
the Olympics, adopted on September 26, 1981, Agreement 40/94 on
Trademark Laws (TLT) of December 20, 1993 was adopted in Geneva on
October 27, 1994.
Industrial Design
The owner is protected in one or more of the 29 countries that are parties
to the treaty.
The system was created on December 12, 2001 on the basis of the Decree
of the Council of Ministers of the EU (98/71 / EC), which is primarily aimed
at promoting creativity and innovation while reducing counterfeiting and
piracy in the domestic market.
The registration process is simple and inexpensive. Some projects are not
included in the community project (for example, components that do not exist in
the project are determined by the complex functions or characteristics of the
product. The project protection of this community is added to the national
protection system and does not replace it).