Professional Documents
Culture Documents
Citations:
Please note: citations are provided as a general guideline. Users should consult their preferred
citation format's style manual for proper citation formatting.
-- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and
Conditions of the license agreement available at
https://heinonline.org/HOL/License
-- The search text of this PDF is generated from uncorrected OCR text.
-- To obtain permission to use this article beyond the scope of your license, please use:
Copyright Information
Cyber Torts:
A Dark Shade of Information
Technology in India
Dr. Yash Tiwari*
Abstract
Cyber torts are the most recent and may be the foremost complicated issue in
the cyber world. Cyber torts may be said to be those species, of which, genus is
the conventional torts, and where either the computer is a subject of the conduct
constituting tort. Any criminal movement that employs a computer either as an
instrument, target or as a means for encouraging wrongdoings comes within the
ambit of cyber tort. The word 'cyber' is the virtual universe of the internet, where
there are no restricted limits between the general populations who utilize it. It is
reality that the degree to which data technology has spread, its scope and impact,
makes social orders significantly more powerless against any conceivable use and
abuse of the technology. Cyber tort is a neologism (begat from the terms cyberspace
and tort) tort law as it identifies with the internet/internet. The term cyber torts' is
a misnomer. This term has not been defined in any statute passed or enacted by the
Indian Parliament. The idea of cyber isn't drastically unique in relation to the idea of
regular torts. Both incorporate the idea of an act or omission, which causes a breach
of principles of law and counteracts the authority of the state. In this paper, the
author has discussed in detail about the concept of cyber torts, its evolution, causes,
statutory provisions, liability and adjudication.
1. Introduction
A generalized definition of cyber tort may be unlawful acts wherein the computer is
either used as an instrument or target or both. The computer may be utilized as a tool,
such as, monetary violations, deal of illicit articles, obscenity, online betting, mental
property wrongdoing, e-mail spoofing, fraud, cyber maligning, cyber stalking etc.
However, the computer may also be a target for illegal acts, such as, unauthorized
accessing of computers and computer systems, burglary of data contained within
the electronic frame, e-mail bombarding, information tampering, salami assaults,
rationale bombs, trojan assaults, web time robberies, web jacking, burglary of
computer framework, physically harming the computer system etc.
Dr. Tiwari is an Assistant Professor, School of Law, Jagran Lakecity University, Madhya Pradesh, India.
172 NJA LAWJoumal2019
The web began to pick up significance from mid-1 990s onwards, with the nation
understanding the possibility of the web through its colossal development.
Computers with internet facilities have turned into the most predominant medium
of communication. The internet with all the benefits of anonymity, reliability and
convenience has become an appropriate breeding place for persons interested in
making use of the net for illegal gainful purposes, either monetary or otherwise'
The greatest test to the law is to keep pace with the technology. A portion of the
difficulties of making technology-based laws are that there is a risk of them being
soon obsolete. So beyond what many would consider possible technology must be
planned in a technology impartial way. There must be consistency between the laws.
Until 1994 there was no plaintiff who prevailed in an Internet tort case. In a
controversial decision, an anthropologist was denied tenure at the University of West
Australia in Rindos v. Hardwick . A rival anthropologist, Hardwick, posted a statement
supporting the university's decision and accusing Rindos of sexual deviance and of
research detrimental to the aboriginal people of Australia. Although an Australian
court assessed this first damages award in an Internet tort case, the vast majority
of subsequent cyber torts have been litigated in America. During the past decade,
American tort law is beginning to evolve to address online injuries such as Internet
defamation, e-mail stalking, spamming, and trespassing on web sites.
Legal Dimensions of Cyberspace, edited by SKVerma and Raman Mittal, Indian Law Institute, New Delhi, 2004, p. 228.
928 F.2d 504 (2d Cir. 1991)
3 1994
Cyber Torts:A Dark Shade ofInformation Technology in India 173
4.4 Negligence
Negligence is very closely connected with human conduct. It is therefore
very probable that while protecting the computer system there might be any
negligence, which in turn provides a loop hole to gain access and control and in
turn misuse the computer system.
copies of themselves and do this repeatedly till they eat up all the available space
on a computer's memory. E.g. love bug virus, which affected at least 5% of the
computers of the globe. The losses were accounted to be $ 10 million. The world's
most famous worm was the Internet worm let loose on the Internet by Robert
Morris sometime in 1988 which almost brought the development of Internet to a
complete halt.
5.8 Logicbombs
These are event dependent programs.This implies that these programs are created
to do something only when a certain event (known as a trigger event) occurs.
E.g. even some viruses may be termed logic bombs because they lie dormant all
through the year and become active only on a particular date (like the Chernobyl
virus).
5.9 Trojan attacks
This term has its origin in the word 'Trojan horse' In software field this means an
unauthorized programme, which passively gains control over another's system
by representing itself as an authorized programme. The most common form of
installing a Trojan is through e-mail. E.g. a Trojan was installed in the computer
of a lady film director in the U.S. while chatting. The cyber-criminal through the
web cam installed in the computer obtained her nude photographs. He further
harassed this lady.
2000
176 NJA LAWJoumal2019
Civil sanctions are planned to secure to the influenced party damages and render
the repudiation unfruitful. Criminal sanction is the prosecution which results in fine
and / or imprisonment. Criminal sanctions operate on the assumption that society
suffers from the act or omission of the defaulter and that a deterrent sentence
6
must be imposed to discourage the repetition of the offence.
Proceedings for damages are different from the criminal complaints filed against
the contravener. The imposition of damages is neither a prosecution nor a
punishment for any offence. It can proceed all the while with filing a criminal
complaint. Invocation of one does not exclude resort to the other. It is well known
that legislation can impose both a criminal as well as civil sanction in respect of the
same act or omission.
7. Statutory Provisions
The Indian parliament considered it necessary to give effect to the resolution by
which the General Assembly adopted Model Law on Electronic Commerce adopted
by the United Nations Commission on Trade Law. As a consequence of which The
Information Technology Act 2000 was passed and enforced on 17th May 2000.
The preamble of this Act states its objective to legalize e-commerce and further
amend the Indian Penal Code 1860, The Indian Evidence Act 1872, The Banker's
Book Evidence Actl 891 and The Reserve Bank of India Act 1934.The basic purpose
to incorporate the changes in these Acts is to make them compatible with the Act
of 2000. So that they may regulate and control the affairs of the cyber world in an
effective manner.
The important sections are Ss. 43,65,66,67. Section 43 in particular deals with
the unauthorized access, unauthorized downloading, virus attacks or any
contaminant, causes damage, disruption, denial of access, interference with the
service availed by a person.This section provides for a fine up to Rs. 1 Crore by way
of remedy. Section 65 deals with 'tampering with computer source documents'
Section 79:(1) Notwithstanding anything contained in any other law for the
time being in force but subject to the provisions of sub-sections (2) and (3),
an intermediary shall not be liable for any third party information, data, or
communication link made available by him.
9. Analysis
The Information Technology Act 2000 was undoubtedly a welcome step at a time
when there was no legislation on this specialized field. The Act has, however,
during its application proved to be inadequate to a certain extent. The various
loopholes in the Act are-
1. The rush in which the legislation was passed, without sufficient public
debate, did not really serve the desired purpose. Experts are of the
opinion that one of the reasons for the inadequacy of the legislation has
been the rush in which it was passed by the parliament and it is also a
fact that sufficient time was not given for public debate.
2. "Cyber-laws, in their very preamble and aim, state that they are targeted
at aiding e-commerce, and are not meant to regulate cyber torts"7 : Mr.
Pavan Duggal holds the opinion that the main intention of the legislators
has been to provide for a law to regulate the e-commerce and with that
aim the I.T. Act 2000 was passed, which also is one of the reasons for its
inadequacy to deal with cases of cyber-crime.
At this juncture, it would not be completely wrong to contend that the above
statement by Mr. Duggal is not fundamentally correct. The reason being that the
preamble does state that the Act aims at legalizing e-commerce. However it does
not stop here. It further amends the I.P.C., Evidence Act, Banker's Book Evidence
and RBI Act also. The Act also aims to deal with all matters connected therewith or
incidental thereto. It is a cardinal rule of interpretation that"text should be read as
See at https:HuLnctad.org/meetings/en/SessionalDocuments/ciiem5d2-en.pdf
Cyber Torts:A Dark Shade ofInformation Technology in India 179
a whole to gather the meaning". It seems that the above statement has been made
in total disregard of this rule of interpretation. The preamble, if read as a whole,
makes it very clear that the Act equally aims at legalizing e-commerce and to curb
any offences arising there from.
See at Pawan Duggal, Text Book on Cyber Laws, Second Edition, Universal Law Publishing.
Id.
180 NJA LAWJoumal2019
10. Conclusion
It is not possible to eliminate cyber-crime or cyber torts from the cyber space
completely. But it is possible to prevent them and lower the rate of commission
of cyber torts. History is the witness that no legislation has succeeded in totally
eliminating crime from the globe.
The only possible step is to make people aware of their rights and duties (to report
crime as a collective duty towards the society) and further making the application
and enforcement of the law more stringent. Undoubtedly, the Act is a historical
step in the cyber world.