Professional Documents
Culture Documents
DEPARTMENT OF B.COM PA
CYBER LAW
COURSE MATERIAL
Prepared by: Ms. R. Akshaya Sudarshana
UNIT – 1
CYBER LAW: INTRODUCTION
SYLLABUS
"Cyber" is a prefix used to describe a person, thing, or idea as part of the computer and
information age. Taken from kybernetes, Greek word for "steersman" or "governor," it was
first used in cybernetics, a word coined by Norbert Wiener and his colleagues. The virtual
world of internet is known as cyberspace and the laws governing this area are known as
Cyber laws and all the netizens of this space come under the ambit of these laws as it
carries a kind of universal jurisdiction. Cyber law can also be described as that branch of
law that deals with legal issues related to use of inter-networked information technology. In
short, cyber law is the law governing computers and the internet.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 1
III B.COM PA CYBER LAW
The growth of Electronic Commerce has propelled the need for vibrant and effective
regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to
the success of Electronic Commerce. All these regulatory mechanisms and legal
infrastructures come within the domain of Cyber law.
Cyber law is important because it touches almost all aspects of transactions and
activities on and involving the internet, World Wide Web and cyberspace. Every action and
reaction in cyberspace has some legal and cyber legal perspectives.
• Cyber crimes
• Electronic and digital signatures
• Intellectual property
• Data protection and privacy
The information Technology Act is an outcome of the resolution dated 30th January
1997 of the General Assembly of the United Nations, which adopted the Model Law on
Electronic Commerce on International Trade Law. This resolution recommended by all the
states.
The Department of Electronics (DoE) in July 1998 drafted the bill. However, it could
only be introduced in the House on December 16, 1999 (after a gap of almost one and a
half years) when the new IT Ministry was formed. It underwent substantial alteration, with
the Commerce Ministry making suggestions related to e-commerce and matters pertaining
to World Trade Organization (WTO) obligations. The Ministry of Law and Company Affairs
then vetted this joint draft.
After its introduction in the House, the bill was referred to the 42-member Parliamentary
Standing Committee following demands from the Members. The Standing Committee
made several suggestions to be incorporated into the bill. However, only those suggestions
that were approved by the Ministry of Information Technology were incorporated. One of
the suggestions that was highly debated upon was that a cyber café owner must maintain a
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 2
III B.COM PA CYBER LAW
register to record the names and addresses of all people visiting his café and also a list of
the websites that they surfed. This suggestion was made as an attempt to curb cybercrime
and to facilitate speedy locating of a cyber criminal. However, at the same time it was
ridiculed, as it would invade upon a net surfer’s privacy and would not be economically
viable. Finally, this suggestion was dropped by the IT Ministry in its final draft.
The Union Cabinet approved the bill on May 13, 2000 and on May 17, 2000, both the
houses of the Indian Parliament passed the Information Technology Bill. The Bill received
the assent of the President on 9th June 2000 and came to be known as the Information
Technology Act, 2000. The Act came into force on 17th October 2000.
With the passage of time, as technology developed further and new methods of
committing crime using Internet & computers surfaced, the need was felt to amend the IT
Act, 2000 to insert new kinds of cyber offences and plug in other loopholes that posed
hurdles in the effective enforcement of the IT Act, 2000.
This led to the passage of the Information Technology (Amendment) Act, 2008 which
was made effective from 27 October 2009. The IT (Amendment) Act, 2008 has brought
marked changes in the IT Act, 2000 on several counts.
In India, cyber laws are contained in the Information Technology Act, 2000 ("IT Act")
which came into force on October 17, 2000. The main purpose of the Act is to provide legal
recognition to electronic commerce and to facilitate filing of electronic records with the
Government.
The following Act, Rules and Regulations are covered under cyber laws:
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 3
III B.COM PA CYBER LAW
In today’s techno-savvy environment, the world is becoming more and more digitally
sophisticated and so are the crimes. Internet was initially developed as a research and
information sharing tool and was in an unregulated manner. As the time passed by it
became more transactional with e-business, e-commerce, e-governanceand e-procurement
etc. All legal issues related to internet crime are dealt with through cyber laws. As the
number of internet users is on the rise, the need for cyber laws andtheir application has also
gathered great momentum.
In today's highly digitalized world, almost everyone is affected by cyber law.
For example:
Technology is never a disputed issue but for whom and at what cost has been the issue in
the ambit of governance. The cyber revolution holds the promise of quickly reaching the
masses as opposed to the earlier technologies, which had a trickledown effect. Such a
promise and potential can only be realized with an appropriate legal regime based on a
given socio-economic matrix.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 4
III B.COM PA CYBER LAW
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 5
III B.COM PA CYBER LAW
which are subject to the Indian Penal Code are addressed by the Information Technology Act,
2000. With advanced technology and changing times, almost all the processes are now going
on IT platform. This is giving rise to increase of cyber-crimesin India as well as abroad.
1. Using a computer to target other computer - for eg. Virus attacks, hacking,
etc.
2. Using a computer to commit crimes - for eg. Credit card frauds, cyber
terrorism,etc.
All these activities leading to crimes have given rise to a relatively new field in law for
protecting the interests of an individual which is called cyber law. Cyber law is important
because it touches almost all aspects of transactions and activities on and concerning the
Internet, the World Wide Web and Cyberspace.
Cyber law is concerned with every individual these days. This is primarily because we
all use internet in some or the other form daily. Internet is used when we create any account
online, while performing e-commerce transactions, net banking, sending or receiving emails,
surfing the net to take out some important information, etc.
There are several advantages of Cyber Law to protect the individuals from getting
trapped in any cyber violations. The IT Act 2000 provides several guidelines inthis regard.
• Organizations shall now be able to carry out e-commerce using the legal infrastructure
provided by the Act.
• The Act throws open the doors for the entry of corporate companies in the business of
being Certifying Authorities for issuing Digital SignaturesCertificates.
• Under the IT Act, 2000, it shall now be possible for corporates to have a statutory
remedy in case if anyone breaks into their computer systems or network and cause loss.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 6
III B.COM PA CYBER LAW
• The Act now allows Government to issue notification on the web thus indicating e-
governance.
• The IT Act also addresses the important issues of security, which are so critical to the
success of electronic transactions.
It is to be noted that since cyber law cannot be restricted to a geographical area, therefore,
a single transaction may involve the laws of at least three authorities: (1) the laws of the
state/nation in which the user resides, (2) the laws of the state/nation that apply where the
server hosting the transaction is located, and 3) the laws of the state/nation which apply to
the person or business with whom the transaction takes place.
There is a tremendous scope of cyber law in India as the number of activities through
internet is on increase with the changing times, the requirement for cyber laws and their
application is gathering momentum and hence the career option as a cyber- lawyer seems
very lucrative option for students.
As for this branch of law is concerned, there are several job opportunities which are on
its way for students who aspire to be into cyber law. One can join as a cyber- consultant in an
IT firm, police departments or in banks, or as research assistants in a law firm, or a technology
firms, or as advisers to web developers, in the ministry of information & technology or in
corporate houses.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 7
III B.COM PA CYBER LAW
✓ All companies depend upon their computer networks and keep their valuable
data in electronic form.
✓ Government forms including income tax returns, company law forms etc are now
filled in electronic form.
✓ Consumers are increasingly using credit cards for shopping.
✓ Most people are using email, cell phones and SMS messages for communication.
✓ Even in “non-cyber crime” cases, important evidence is found in computers/ cell
phones e.g. in cases of divorce, murder, kidnapping, organized crime, terrorist
operations, counterfeit currency etc.
✓ Since it touches all the aspects of transactions and activities on and concerning the
Internet, the World Wide Web and Cyberspace therefore Cyber law is extremely
important.
Cyber Laws have an important role in representing and defining the norms ofthe
cyber society.
Cyber Laws help in giving the right to enter into legally enforceable digital
contracts.
Cyber Laws help in maintaining the Cyber properties.Cyber Laws help in to carry
on online business.
Cyber Laws help in providing legal reorganization for Electronic documents and
Digital signature.
Legal theory does not study the characteristics of law in a particular country (e.g. India
or Canada) but studies law in general i.e. those attributes common to all legal systems.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 8
III B.COM PA CYBER LAW
CASE LAW:
Case law is the law that is established through the decisions of the courts and other
officials. Case law assumes even greater significance when the wordings of a particular law
are ambiguous. The interpretation of the Courts helps clarify the real objectives and meaning
of such laws.
AREAS OF CYBER LAW
Cyber laws contain different types of purposes. Some laws create rules for how individuals
and companies may use computers and the internet while some laws protect people from
becoming the victims of crime through unscrupulous activities on the internet. The major
areas of cyber law include:
1. Fraud:
Consumers depend on cyber laws to protect them from online fraud. Laws are
made to prevent identity theft, credit card theft and other financial crimes that happen
online. A person who commits identity theft may face confederate or state criminal
charges. They might also encounter a civil action brought by a victim. Cyber
lawyers work to both defend and prosecute against allegations of fraud using the
internet.
2. Copyright:
The internet has made copyright violations easier. In early days of online
communication, copyright violations was too easy. Both companies and individuals need
lawyers to bring actions to impose copyright protections. Copyright violation is an area of
cyber law that protects the rights of individuals and companies to profit from their own
creative works.
3. Defamation:
Several personnel use the internet to speak their mind. When people use the
internet to say things that are not true, it can cross the line into defamation. Defamation
laws are civil laws that save individuals from fake public statements that can harm a
business or someone’s personal reputation. When people use the internet to make
statements that violate civil laws, that is called Defamation law.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 9
III B.COM PA CYBER LAW
Sometimes online statements can violate criminal laws that forbid harassment
and stalking. When a person makes threatening statements again and again about
someone else online, there is violation of both civil and criminal laws. Cyber lawyers
both prosecute and defend people when stalking occurs using the internet and other
forms of electronic communication.
5. Freedom of Speech:
Freedom of speech is an important area of cyber law. Even though cyber laws
forbid certain behaviours online, freedom of speech laws also allow people to speak their
minds. Cyber lawyers must advise their clients on the limits of free speech.
• From the perspective of e-commerce in India, the IT Act 2000 and its provisions
contain many positive aspects. Firstly, the implications of these provisions for the e-
businesses would be that email would now be a valid and legal form of
communication in our country that can be duly produced and approved in a court of
law.
• Companies shall now be able to carry out electronic commerce using the legal
infrastructure provided by the Act.
• Digital signatures have been given legal validity and sanction in the Act.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 10
III B.COM PA CYBER LAW
• The Act throws open the doors for the entry of corporate companies in the business of
being Certifying Authorities for issuing Digital Signatures Certificates
• The Act now allows Government to issue notification on the web thus heralding e-
governance
• The Act enables the companies to file any form, application or any other document
with any office, authority, body or agency owned or controlled by the appropriate
Government in electronic form by means of such electronic form as may be prescribed
by the appropriate Government.
• The IT Act also addresses the important issues of security, which are so critical to the
success of electronic transactions. The Act has given a legal definition to the concept
of secure digital signatures that would be required to have been passed through a
system of a security procedure, as stipulatedby the Government at a later date.
• Under the IT Act, 2000, it shall now be possible for corporates to have a statutory
remedy in case if anyone breaks into their computer systems or network and cause
loss.
❖ The law does not clearly identify the jurisdiction for implementation.
❖ The issues regarding matters such as domain name registration and domain
name disputes have not been included under the purview of the law
❖ The law cannot provide an exhaustive set of cyber crimes
❖ The most important aspects of e-commerce are privacy and content
regulations, but the Indian cyber laws do not deal with those areas.
❖ The introduction of cyber laws needs an associated change in other related
laws such as the Consumers Protection Act and the Income Tax Act. But no
steps have been taken regarding this.
1.2 CYBERSPACE
The technological development has given rise to a cyber world constituting cyber
space. Cyber space is witnessing considerable advancement with the rapid increase in the
information technology. It is always hard to determine or predict something in the future in an
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 11
III B.COM PA CYBER LAW
The term cyberspace was introduced by William Gibson in his book “Neuromancer” in
1984. Although Gibson criticized the term by calling it redolent and meaningless, it is still used
worldwide to describe facilities or features that are linked to the internet. Gibson initially
explained the cyberspace as “a consensual hallucination experienced daily by billions of
legitimate operators in every nation.”
Program developers such as Chip Morningstar stated that the cyberspace gained its
popularity as a medium for social interaction as opposed to its technical execution and
implementation. Thus, unlike most computer jargon, the term ‘cyberspace’ doesn’t have a
standard or objective definition. Instead, it is simply used to describe the virtual world of
computer systems that extends across a globalnetwork of computers.
In 1984, Wiliam Gibson published his science fiction book – Necromancer, which
describes an online world of computers and elements of the society who use these
computers. The word cyberspace first appeared in this book. In the book, a hacker of
databases stole data for a fee. The author portrayed cyberspace as a three-dimensional virtual
landscape. Also, a network of computers creates this space. According to him, cyberspace
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 12
III B.COM PA CYBER LAW
looked like a physical space but was actually a computer generated construction. Also, it
represented abstract data.
The book caught the imagination of many writers and in 1986, major English language
dictionaries introduced the word ‘cyberspace’. According to the New Oxford Dictionary of
English, ‘Cyber Space’ is the notional environment in which people communicate over
computer networks. Since cyberspace is a virtual space, it has no boundaries, mass, or
gravity. It simply represents the interconnected space between computers, systems, and other
networks.
It exists in the form of bits and bytes – zeroes and ones (0’s and 1’s). In fact, the entire
cyberspace is a dynamic environment of 0’s and 1’s which changes every second. These are
simply electronic impulses. Also, it is an imaginary location where the words of two parties
meet in conversation.
Cyber law is likely to experience various emerging trends with the increased usage of
digital technology. The various emerging trends include
E. SPAM LAWS
• Today, there are lots of activities in the mobile ecosystem. The increasing competition
has introduced new models of mobile phones, personal digital assistors (pda), tablets
and other communication devices in the global market.
• The intensive use of mobile devices has widened the mobile ecosystem and the
content generated is likely to pose new challenges for cyber legal jurisprudence across
the world.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 13
III B.COM PA CYBER LAW
• There are no dedicated laws dealing with the use of these new communication devices
and mobile platforms in a number of jurisdictions across the world as the usage of
mobile devices for input and output activities is increasing day by day.
• With the increasing mobile crimes, there is an increasing necessity to meet the legal
challenges emerging with the use of mobile devices and ensure mobile protection and
privacy.
• The other emerging cyber law trend is the need for enacting appropriate legal
frameworks for preserving, promoting and enhancing cyber security.
• The cyber security incidents and the attacks on networks are increasing rampantly
leading to breaches of cyber security which is likely to have serious impact on the
nation. However, the challenge before a lawmaker is not only to develop appropriate
legal regimes enabling protection and preservation of cyber security, but also to instill
a culture of cyber security amongst the net users.
• The renewed focus and emphasis is to set forth effective mandatory provisions
which would help the protection, preservation and promotion of cyber security in
use of computers, allied resources and communication devices
• With the growth in internet technology, the word is moving towards cloud
computing.
• The cloud computing brings new challenges to the law makers. The distinct
challenges may include data security, data privacy, jurisdiction and other legal
issues. There pressure on the cyber legislators and stakeholders would be to
provide appropriate legal framework that could benefit the industry and enable
effective remedies in the event of cloud computing incidents.
• The social media is beginning to have social and legal impact in the recent times
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 14
III B.COM PA CYBER LAW
raising significant legal issues and challenges. A latest study indicates the social
networking sites responsible for various problems. Since the law enforcement
agencies, intelligence agencies target the social media sites; they are the preferred
repository of all data.
• The inappropriate use of social media is giving rise to crimes like cyber harassments,
cyber stalking, identity theft etc. The privacy in social media is going to be undermined
to a great extent despite the efforts by relevant stake holders.
• The challenge to the cyber legislators would be to effectively regulate the misuse of
social media and provide remedies to the victims of social media crimes.
• Social Media Litigations are also likely to increase concerning the association or nexus
with the output of social media.
• The litigations regarding defamation, matrimonial actions are popularly increasing and
with the data, information resident on social media networking there is an emerging
trend of various other litigations in the coming years.
5. SPAM LAWS
There is considerable growth of spam in emails and mobiles. Many countries have
already become hot spots for generating spam. As the number of internet and mobile
users increase the spammers make use of innovative methods to target the digital users. It
is therefore necessary to have effective legislative provisions to deal with the menace of
spam.
The Internet is a global system of interconnected computer networks that use the
standardized Internet Protocol Suite (TCP/IP). It is a network of networks that consists of
millions of private and public, academic, business, and government networks of local to global
scope that are linked by copper wires, fiber-optic cables, wireless connections, and other
technologies. The Internet carries a vast array of information resources and services, most
notably the inter-linked hypertext documents of the World Wide Web (WWW) and the
infrastructure to support electronic mail, in addition to popular services such as online chat,
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 15
III B.COM PA CYBER LAW
file transfer and file sharing, online gaming, and Voice over Internet Protocol (VoIP) person-to-
person communication via voice and video. The origins of the Internet dates back to the
1960s when the United States funded research projects of its military agencies to build robust,
fault-tolerant and distributed computer networks. This research and a period of civilian funding
of a new U.S. backbone by the National Science Foundation spawned worldwide participation
in the development of new networking technologies and led to the commercialization of an
international network in the mid 1990s, and resulted in the following popularization of
countless applications in virtually every aspect of modern human life.
The terms Internet and World Wide Web are often used in everyday speech without
much distinction. However, the Internet and the World Wide Web are not one and the same.
The Internet is a global data communications system. It is a hardware and software
infrastructure that provides connectivity between computers. In contrast, the Web is one of the
services communicated via the Internet. It is a collection of interconnected documents and
other resources, linked by hyperlinks and Uniform Resource Locator [URLs].
The World Wide Web was invented in 1989 by the English physicist Tim Berners-Lee,
now the Director of the World Wide Web Consortium, and later assisted by Robert Cailliau, a
Belgian computer scientist, while both were working at CERN in Geneva, Switzerland. In
1990, they proposed building a "web of nodes" storing "hypertext pages" viewed by
"browsers" on a network and released that web in December. Overall Internet usage has seen
tremendous growth.
1.4 E-COMMERCE
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 16
III B.COM PA CYBER LAW
conventional goods and services, to "meta" services to facilitate other types of electronic
commerce. On the institutional level, big corporations and financial institutions use the internet
to exchange financial data to facilitate domestic and international business. Data integrity and
security are very hot and pressing issues forelectronic commerce.
The industry consensus is that growth is at an inflection point with key drivers
being:
Some of the aspects of Indian e-commerce that are unique to India (and potentially to other
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 17
III B.COM PA CYBER LAW
Companies have been using computer networks to conduct business since as far
back as the 1960s, but that version of e-Commerce would be almost unrecognizable to
us nowadays.
Companies used it to share business documents with one other, relying solely on
Electronic Data Interchange (EDI), a digital information transfer technology that could
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 18
III B.COM PA CYBER LAW
replace mail and fax for sharing documents. This technology made it possible to transfer
information from computer to computer seamlessly without the need for human
involvement.
It wasn’t until 1979 that the American National Standards Institute (ANSI) finally
stepped in and introduced a standard for sharing business documents. It was called
ASC X12 and gave companies a reliable standard for sharing documents over electronic
networks.1979 also witnessed another first for the Internet Age: the origin of e-
Commerce.
In 1979, English inventor Michael Aldrich introduced and pioneered what would
eventually become known as e-Commerce by connecting television and telephone lines.
The story goes that Aldrich thought of the idea while on a walk with his wife,
bemoaning the inconvenience of making regular trips to the market. Wouldn’t it be so
much easier if you could just order what you needed through the TV? Shortly, thereafter,
he invented a system that advertised goods and services on television, giving viewers
the ability to call in to a processing center to place orders. Aldrich called his system
"teleshopping."
Throughout the 80s and into the early 90s, the Internet continued to evolve as
new technologies like SSL made it something more and more people were comfortable
using.
In 1982, French innovators launched the Minitel, a service that was a precursor to
the World Wide Web. This service was free for telephone subscribers and used a
Videotex terminal and telephone lines to connect millions of people. The Minitel
expanded, and by 1999, more than 9 million terminals connected about 25 million
people.
However, the World Wide web soon caught up. Debuting to the public in 1991, its
rapid rise quickly eclipsed the Minitel. In 2012, France Telecom officially discontinued
the Minitel service.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 19
III B.COM PA CYBER LAW
FEATURES OF E-COMMERCE
➢ Global Reach
E-commerce businesses are conducted online on a worldwide level. It covers large
areas serving large number of customers at a time. Its operations vary from one country
to another. There is no restriction on expanding the business to large areas. It is not
confined to a particular area like in case of a physical market. These businesses due to
their operations in large areas earn high profits.
➢ 24×7 Service
This is one the important feature of the e-commerce business. E-commerce
businesses carry out their business 24 hrs. & on all days of the week. Customers can
avail their services all the time at their home comfort. In the physical market, there is a
timing for opening & closing. Customers need to visit accordingly as per schedule. There
is nothing such in e-commerce business. Peoples can anytime & from anywhere can do
shopping from these as per their choices.
➢ Easy Navigation
It means that the product required can be easily searched in less time over the E-
commerce business. Customers are not required to waste their time searching for a
specific product. Product is simply searching in the search bar of the website of
business. If it is not available over a particular website, customer can easily search it
over several other websites. It can be booked & will be delivered to customer address in
less time.
➢ Ubiquity
It means that the services of the business are accessible anytime & from anywhere.
These businesses are not confined to a particular area like a traditional business.
Customers can as per their choice & comfort can do transaction & activity here. The
website can be easily accessed from customer cell phones, tablets or tablet anytime. It is
completely user-friendly & it brings ubiquity to it.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 20
III B.COM PA CYBER LAW
these products is quite easy. Products in terms of their price, quality & various other
features can be compared over different websites. Customers can easily find the best
product as per their choice after better comparison. This feature of e-commerce satisfies
the customers & help in increasing sales.
➢ Interactivity
It refers to the communication between the business & the customer. Customer can
easily interact with the business. They can raise their queries & problems through the
business website. Customers also provide suggestions & feedback about business
products & services. This feature helps in developing better relationships between
business & customers.
Electronic commerce can be classified into four main categories. The basis for this
simple classification is the parties that are involved in the transactions. So the four basic
electronic commerce models are as follows,
1. Business to Business
2. Business to Consumer
Here the company will sell their goods and/or services directly to the consumer.
The consumer can browse their websites and look at products, pictures, read reviews.
Then they place their order and the company ships the goods directly to them. Popular
examples are Amazon, Flipkart, Jabong etc.
3. Consumer to Consumer
Consumer to consumer, where the consumers are in direct contact with each
other. No company is involved. It helps people sell their personal goods and assets
directly to an interested party. Usually, goods traded are cars, bikes, electronics etc. OLX,
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 21
III B.COM PA CYBER LAW
4. Consumer to Business
Examples of E-Commerce
• Amazon
• Flipkart
• eBay
• Fiverr
• Upwork
• Olx
• Quikr
ADVANTAGES OF E-COMMERCE
• E-commerce provides the sellers with a global reach. They remove the barrier of
place (geography). Now sellers and buyers can meet in the virtual world, without the
hindrance of location.
• Electronic commerce will substantially lower the transaction cost. It eliminates many
fixed costs of maintaining brick and mortar shops. This allows the companiesto enjoy a
much higher margin of profit.
• It provides quick delivery of goods with very little effort on part of the customer.
Customer complaints are also addressed quickly. It also saves time, energy and
effort for both the consumers and the company.
• One other great advantage is the convenience it offers. A customer can shop 24×7.The
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 22
III B.COM PA CYBER LAW
website is functional at all times, it does not have working hours like a shop.
• Electronic commerce also allows the customer and the business to be in touch
directly, without any intermediaries. This allows for quick communication and
transactions. It also gives a valuable personal touch.
DISADVANTAGES OF E-COMMERCE
• The start-up costs of the e-commerce portal are very high. The setup of the
hardware and the software, the training cost of employees, the constant
maintenance and upkeep are all quite expensive.
• Although it may seem like a sure thing, the e-commerce industry has a high risk of
failure. Many companies riding the dot-com wave of the 2000s have failedmiserably.
The high risk of failure remains even today.
• Security is another area of concern. Only recently, we have witnessed many security
breaches where the information of the customers was stolen. Credit card theft,
identity theft etc. remain big concerns with the customers.
• Then there are also fulfilment problems. Even after the order is placed there can be
problems with shipping, delivery, mix-ups etc. This leaves the customers unhappy
and dissatisfied.
E-Commerce is defined as the buying and selling of products or services over electronic
systems such as the Internet and to a lesser extent, other computer networks. It is
generally regarded as the sales and commercial function of eBusiness. There has been a
massive increase in the level of trade conducted electronically since the widespread
penetration of the Internet. A wide variety of commerce is conducted via eCommerce,
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 23
III B.COM PA CYBER LAW
including electronic funds transfer, supply chain management, Internet marketing, online
transaction processing, electronic data interchange (EDI), inventory management
systems, and automated data collection systems. US online retail sales reached $175
billion in 2007 and are projected to grow to $335 billion by 2012. This massive increase
in the uptake of eCommerce has led to a new generation of associated security threats,
but any eCommerce system must meet four integral requirements:
Privacy
Privacy has become a major concern for consumers with the rise of identity theft and
impersonation, and any concern for consumers must be treated as a major concern for
eCommerce providers. According to Consumer Reports Money Adviser, S Attorney
General has announced multiple indictments relating to a massive international security
breach involving nine major retailers and more than 40 million credit- and debit-card
numbers. US attorneys think that this may be the largest hacking and identity-theft case
ever prosecuted by the justice department. Both EU and US legislation at both the federal
and state levels mandates certain organizations to inform customers about information
uses and disclosures. Such disclosures are typically accomplished through privacy
policies, both online and offline.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 24
III B.COM PA CYBER LAW
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 25
III B.COM PA CYBER LAW
WHAT IS A CONTRACT?
Definition: The term contract is defined as an agreement between two or more parties
which has a binding nature, in essence, the agreement with legal enforceability is said to
be a contract. It creates and defines the duties and obligations of the parties involved.
Process of Contract
First and foremost, an offer is made by one party to another, which when
accepted by the party to whom it is made, leads to the agreement. If that agreement is
enforceable in the court of law, it is known as a contract.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 26
III B.COM PA CYBER LAW
same sense. The consent of the parties is said to be free when it is not influenced by
coercion, undue influence, fraud, misrepresentation and mistake.
3. Competency: Competency refers to the capacity of the parties to enter into the contract,
i.e. he/she has reached the age of maturity, he/she must be of sound mind, and he/she
is not disqualified from contracting, as per the law like the alien enemy, foreign
sovereigns, etc.
4. Consideration: It implies the price agreed to be paid for the promisor’s obligation by the
promisee. It must be adequate and lawful.
5. Lawful object: The object for which the contract is created must be lawful, or else it is
declared as void.
6. Not expressly declared as void: The law should not expressly declare the contract as
void, such as contract in restraint of marriage, trade or legal proceedings.
▪ There must be at least two parties to constitute a contract, i.e. one who proposesand
another accepts the same.
▪ The parties entering into the contract must intend to create a legal obligation forone
another.
▪ It must be in writing.
▪ There must be certainty of meaning. the terms of the parties must be clear to the
parties, i.e. the party should not interpret anything wrong, there must be a consensus
ad idem.
So, these are some paramount elements of a contract, without which it cannot be
enforced in the court of law.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 27
III B.COM PA CYBER LAW
3. Simple contracts or contracts not under seal or specialty which are either written
or verbal.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 28
III B.COM PA CYBER LAW
E-CONTRACTS
In recent times, the conventionally functioned models of business have become out-of-
date and in many cases are not execution enough income to the owners or shareholders of
the company. A usual example of such a situation in the business of newspaper in the United
State of America wherein many of the noticeable newspaper have shut down or have lifted
purely to the online medium. New and inventive models and type of business need to be
invented and worked. Existence of e-contract in the market is accomplishing the need for
innovativeness in the traditional business segments. Businesses, both existing and new are
trying to create an online individuality and an e-contract stand keeping in view the needs of the
modern times.
Contracts have become so common in day-to-day life that most of the time we do not
even recognize that we have entered into one. Right from buying a vegetable and hiring a
Cab or to buying an airline ticket online, uncountable thing in our daily exists is governed by
contracts.
The Indian Contract Act, 1872 rules the way in which contracts are made and completed
in India. It rules the way in which the requirements in a contract are implemented and codifies
the effect of a breach of contractual provisions.
Electronic contracts (contracts that are not paper based but relatively in (electronic
form) are born out of the need for speed, ease and efficiency. Imagine a contract that an
Indian manufacturer and an American exporter wish to enter into. One selection would be that
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 29
III B.COM PA CYBER LAW
one party first draws up two copies of the contract, signs themand couriers them to the further,
who in turn signs both copies and guides one copy back. The other option is that the two
parties meet someplace and sign the contract. In the electronic age, the whole contract can
be accomplished in seconds, with both parties simply fixing their digital signatures to an
electronic copy of the contract. There is no need for behind couriers and additional travelling
costs in such a situation.
There was primarily a fear between the legislatures to identify this modern technology,
but now many countries have legislated laws to recognize electronic contracts. The
conventional law involving to contracts is not satisfactory to address all the issues that arise in
electronic contracts. The Information Technology Act describes some of the irregular issues
that arise in the formation and verification of electronic contracts.
Contracts have become so common in daily life that most of the time we do not even
recognize that we have entered into one. Right from hiring a taxi to buying airline tickets online,
countless things in our daily lives are ruled by contracts.
The Indian Contract Act, 1872 governs the manner in which contracts are made and
performed in India. It governs the way in which the requirements in a contract are implemented
and codifies the effect of a breach of vowed provisions. Within the outline of the Act, parties
are free to contract on any terms they choose. Indian Contract Act comprehends of limiting
factors subject to which contract may be entered into, executed and breach enforced. It only
provides an outline of rulesand regulations which govern creation and performance of contract.
The rights and duties of parties and terms of agreement are definite by the contracting parties
themselves. The court of law acts to enforce agreement, in case of default.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 30
III B.COM PA CYBER LAW
Electronic contracts (contracts that are not paper based but rather in electronic
practise) are born out of the need for speed, suitability and efficiency. Imagine a contract
that an Indian exporter and an American importer wish to enter into. One option would
be that one party first pulls up two copies of the contract, signs them and couriers them to
the other, who in turn signs both copies and couriers one copy back. The other option is
that the two parties meet someplace and sign the contract.
In the electronic age, the whole contract can be completed in seconds, with both
parties simply attaching their digital signatures to an electronic copy of the contract. There is
no need for delayed couriers and additional travelling costs in such a situation. There was
initially a hesitation amongst the legislatures to recognize this modern technology, but now
man y countries have passed laws to recognize electronic contracts.
In many contacts (whether online or conventional) the offer is not made directly
one-on-one. The consumer ‘browses’ the available goods and services showed on the
seller’s website and then chooses what he would like to purchase. The offer is not made
by website showing the items for sale at a particular price. This is essentially an invitation
to offer and hence is revocable at any time up to the time of acceptance. Theoffer is made
by the customer on introduction the products in the virtual ‘basket’ or ‘shopping cart’ for
payment.
As stated earlier, the acceptance is usually assumed by the business after the
offer has been made by the consumer in relation with the invitation to offer. An offer is
revocable at any time until the acceptance is made.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 31
III B.COM PA CYBER LAW
II. Web Site Forms: The seller can offer goods or services (e.g. air tickets, software etc.)
through his website. The customer places an order by completing and communicating
the order form provided on the website. The goods may be actually delivered later (e.g.
in case of clothes, music CDs etc.) or be directly delivered electronically (e.g. e-tickets,
software, mp3 etc.).
III. Online Agreements: Users may need to take an online agreement in order to be able
to avail of the services e.g. clicking on “I accept” while connecting software or clicking on
“I agree” while signing up for an email account.
Any contract to be enforceable by law must have legal consideration, i.e., when
both parties give and receive something in return. Therefore, if an auction site eases a
contract between two parties where one Ecommerce – Legal Issues such as a person
provides a pornographic movie as consideration for purchasing an mp3 player, then such
a contract is void.
If there is no intention on the part of the parties to create lawful relationships, then
no contract is possible between them. Usually, agreements of a domestic or social
nature are not contracts and therefore are not enforceable, e.g., a website providing
general health related data and instructions.
Contracts by minors, lunatics etc. are void. All the parties to the contract must be
lawfully competent to enter into the contract.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 32
III B.COM PA CYBER LAW
between a website and the customer who buys through such a site, the click through
process ensures free and genuine consent.
A valid contract presumes a lawful object. Thus a contract for selling narcotic
drugs or pornography online is void.
Employment Contracts
Consultor Agreements
The normal requirements of Indian Contracts Act of 1872 will apply on any
consultant agreement. But particularly in Information Technology industry where the
infrastructure to function is low and connectivity is very high consultancy with experience
marketing and business development and technology development is a very dominant
mode of contract. Here proper care to be taken in Consultant agreements where issues
of Intellectual Property Rights, privacy will play an important role. If care is not taken it
may lead to cost of business and loss of clients.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 33
III B.COM PA CYBER LAW
Contractor Agreements
Hence software due its high value in terms of application is measured as goods for the
purpose of legal classification. Having recognised it as good the distribution, reseller
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 34
III B.COM PA CYBER LAW
agreement should take care of the aspect of Monopoly Restrictive Trade Practices (in
future the competition law) provincial authority and other tax instruments.
Non-Disclosure Agreements
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 35
III B.COM PA CYBER LAW
A Shrink Wrap contract is the former license agreement required upon the buyer
when he buys software. Before he or she tears the pack to use it, he or she is made
mindful by tearing the cover or the wrap that they are sure by the license agreement of
the manufacture. This is done as previous deliberated to protect the interests of the
manufacturer where the consumer cannot replicate the package, copy it or sell it or
donate it to others moving the sale of the software. The license, which is contracted and
enfolded in the product, which becomes enforceable and taken as consent before the
buyer tears the package. The usual sections that are part of the shrink-wrap license are
that of
d) prohibition of usage in more than one computer definite for that purpose
f) limitations of responsibility
The reason and business sense is that to guard the manufacturer of the package,
as it is easy to copy, operates and duplicate under other brand name. Critiques contend
that shrink-wrap license agreement is in contradiction of the basic principle of contract of
offer, consideration and acceptance as the licensee is unsettled. Several cases to this
effect have been dispensed in US courts.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 36
III B.COM PA CYBER LAW
the product upon agreed terms. In cyber contracts, such agreements and also the terms
and conditions to contract with the escrow agents becomes vital.
With the growing importance and value of e-contract in India and across the world, the
different stakeholders are continuously identifying and evaluating the nuances of legal outline
relating to it. The participation of different service providers in the transaction of e-contract,
which includes a payment gateway, the main website, the bank or card verification website,
the security authorisation website and the final service provider which can also comprise the
shipping agent has made the E-contract business more complex. Therefore, the need for
amendable it has augmented. In India, till date there are no definite legislations or guidelines
protecting the buyers and sellers of goods and services over the electronic medium.
However, several laws
acting in unification are trying to regulate the business transactions of E-contract. Theyare as
follows:
Earlier, there was no definite law to regulate the intermediaries such as verification
service providers and shipping service providers to safeguard that the product or service is
actually delivered. However, the government has recently acquainted the Information
Technology (Intermediaries Guidelines) Rules 2011. The actual scope of the security provided
under these regulations would only be known after judicial interpretation of the provisions.
However, now it has been explained that even foreign intermediaries delivered to provide
service can be sued in India.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 37
III B.COM PA CYBER LAW
The payment gateways which footing a very important position as the primary
processor of the payment for the merchants were brought into the legal framework after
proclamation of the Payment and settlement Systems Act, 2007 (PSS Act, 2007). The
PSS Act, 2007 as well as the Payment and Settlement System Regulations, 2008 made
under the Act came into effect from August 12, 2008. Further, the Reserve Bank of India,
issued additional guidelines initiating all such gateways and payments processors to
register under the said act.
The authority of the transactions of E-contract is established under the Information
Technology Act, 2000 (IT Act, 2000). It explains the reasonable mode of acceptance of the
offer. IT Act, 2000 also rules the revocation of offer and acceptance. However, definite
provisions that regulate E-contract transactions conducted over the internet, mobile phones,
etc. are vague. With numerous cross border transactions also being conducted over the
internet, specific law guarding the Indian customers and Indian businesses are essential and
Indian laws are gravely insufficient on this issue.
In the light of the above discussion, it is to be said that the present laws in respect of
the guidelines of E-contract and its related operations are not suitable serving the purpose.
Propagation of laws is creating a confusion in the smooth procedures of the E-contract
accomplishments. Further, the present laws are salient on features of e-contract such as
payment instrument and delivery instrument and present standard practises which have been
settled by the industry. The Reserve Bank of India, however, has tried to support the
electronic payment mechanism through various orders, but such orders can only act as a
stop-gap procedure. The most important order in this regard was the application of second
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 38
III B.COM PA CYBER LAW
factor verification in all Indian Payment Gateways. Commonly recognised as Verified by Visa
or MasterCard Secure Code, this had made card transactions on the internet moderately
more secure.
Indian Railway Catering and Tourism Corporation Limited (IRCTC) is certainly the
major e-commerce site in India and in India’s answer to private capitalist ventures.IRCTC was
set up as a subsidiary of the Indian railways for the exclusive purpose of providing catering
services and ticketing services for the Indian Railways. However, of late, it has extended its
wing and now covers sectors such as flights and hotel bookings. The flagship was
established in 2002 and has transformed the online travel booking business in India. IRCTC
functions both in the business to business and business to consumer segment. According to
the data released by IRCTC, it has more than 4-4.5 lakh reservations per day. In 2010-11,
IRCTC sold tickets value more than Rs. 8000 Crore. It claims to switch more than 8 lakh
equivalent transactions thereby speaking volumes about the prominence and the size of their
business.
The site offers the only link for purchasing Indian railway tickets online and even agent
sites (B2B) have to link them to IRCTC to provide online booking services for customers.
IRCTC offers a large option for consumers for payment of buying tickets online. IRCTC
however, is one of the few enduring e-commerce sites which charged transactions charges
from customers, which is different bank to bank.
Through IRCTS several customer enter daily into a new dimension of contract i.e.
E-contract. E-contract now plays an important role both for the customer and the seller.
Customer has a lot of choice to choose a product and seller through e-contract reach to large
customers.
The main issues that have been identified from the case studies can be stated as follows:
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 39
III B.COM PA CYBER LAW
There is an outright lack of regulations regarding the mode of payments which needs to be
provided by any e-commerce website and the transactions charges which they can levy. It is
seen that numerous travels website levy additional charges on the payment made by the
customers. The websites state that it is an industry customary practise. This makes the
matter even more complex owing to issues of anti- competitive practises.
Further, there is no standard Reserve Bank of India rules available especially for the issues
of refund transactions in the case of credit card and debit card payments. The regular
guidelines available for point of sale (PoS) dealings may not apply to all e-contract
transactions due to the envelopment of multiple parties in these cases instead of two parties
in a normal PoS transaction.
New intimidations to consumer protection call for new protecting rules and measures. We
should distinguish the fact that better consumer protection in online environments shall have
an optimistic impact on the further development of electronic commerce and thereby on
merchants. Generally speaking, if electronic commerce is to increase, consumers must be
provided with at least the same guarantees they would be provided with in the older
marketplace.
The US and the EU have affirmed the importance of protecting a new type of consumers.
With the rise of electronic commerce, the role of consumers has changed affectedly. While
consumers were formerly a quiet body, today they have power in businesses. Sellers are
now in a comparatively submissive position. Their job is too merely to paste that product
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 40
III B.COM PA CYBER LAW
Where the precise field of argument firmness is concerned, both the US and the EU realize
the best way to safeguard consumers could be to provide them with suitable measures for
recompense. Consumer protection groups have created mediums where consumers can
both acquiesce e-mail based complaints when discontented with advertisements, goods or
services, and allege violators of self- regulatory codes of beliefs.
While consumer protection can take on diverse forms, dispute resolve mechanisms are its
final insurance. Principles for dispute management are finally more attractive to devices than
less formal intended arrangements since they can encourage more reliable conduct of
consumer benefits. In light of government practise, protection accessible by state power is
important. Some consumers even seek reserve in the court. In order to quarter the special
character of modern business without drifting too far from tradition, ADR mechanisms for
dispute firmness very cleverly entail state application support. Procedure for consumer
protection in electronic commerce dispute firmness must extend outside national limits.
Individual states privation the ability and initiative to adequately address issues related to
consumer protection in the background of electronic market. Many of the issues that arise
from cross border disputes are impaired by the fact that misleading marketing practice laws
vary from one jurisdiction to alternative. Possible standard electronic consumer policies
should be pertinent to cross-border dealings to which all or most countries can subscribe.
UNIT 1 – CYBER LAW SRI KRSHNA ADITHYA COLLEGE OF ARTS AND SCIENCE 41
III B.COM PA CYBER LAW
No broad creation of the new applicable law or principle of jurisdiction is pointed out, but
the rules do define features of suitable modifications. Equality, they suggest, is one of the
most important features in understanding consumer safety. The purpose of the fairness is to
offer consumers a level of protection not less than that afforded in other forms of commerce
and to provide consumers with eloquent contact to fair and timely dispute resolution and
redress without undue cost or burden. To complete fairness, one must provide a framework
for correcting unfairness.
E-contract in India has definitely came a long way from the days of bazee.com which
underway as the first large online retail website. At present, with the increase in number of
internet user, e-contract is organised to grow further. The growing trend ofinternet banking and
credit or debit cards along with the rise in the number of educatedand computer literate persons
will further support this growth. The need of the hour is law which covers all the aspects of e-
contract extending from payment mechanism and maintaining minimum standards in the
42
III B.COM PA CYBER LAW
delivery of services. Such a legislation will help to restraint the growth of websites which rise
within a few days and then stop functioning in the absence of suitable funds for sustenance.
As all business through e-contract sites is ended through the internet without any direct
physical interfaces, the main basis connections is the trust of the customers which should be
engaged at any cost. A law in this field will detect the criminals who have used the internet as
a source for making quick money. This will also act a defence for the genuine e-contract
websites and help in further growing of business. There is also a need for the creation of an
authority in the consumer court to look into the grievances arising out of e- contract
transactions. Such an authority should have experts in area such as payment security. This will
embolden speedy redressal of disputes and promote e-contract transactions. E-contract which
is a developing segment in the commercial arenas scheduled to grow and it is the
accountability of the prevailing players to ensure that growth is not hindered by their acts and
policies.
43