Professional Documents
Culture Documents
UNIT – 2
MODEL LAW OF COMMERCE
UNCITRAL has adopted the United Nations Conventions on Contracts
a.for the International Sale of Goods ,
b.the Legal Guide on Electronic Funds Transfers,
c.the UNCITRAL Model Law on International Credit Transfers,
d.the UNCITRAL Model Law on International Commercial Arbitration, and
others.
Adopted on Dec. 1996
It recommends that all States give favorable consideration to the Model law
when they enact or revise their laws in view of the need for uniformity of the
law applicable to alternatives to paper-cased methods of communication and
storage of information.
Following the UNCITRAL Model Law on E-Commerce, the Government of
India enacted the Information Technology Act in June ,2000. The Act
facilitates E-commerce and E-Governance in country.
With an objective of promoting efficient delivery of government services by
means of reliable electronic records, the Government of India enacted the
Information Technology Act in June 2000.
Components
a. Part – I Electronic Commerce in general 3 Chapters and 15 sections
b. Part – II Electronic Commerce in specific areas 2 sections
NEED OF MODEL LAW
In many countries the existing legislation governing communication and
storage of information were inadequate or outdated because they did not
contemplate the use of electronic commerce.
Many countries lacked in legislations for dealing with E-commerce as a whole
result in uncertainty as to the legal nature and validity of information presented
in a form other than a traditional paper document.
Inadequate legislation at the national level created obstacles to international
trade.
PURPOSE/ OBJECTIVES OF MODEL LAW
Purpose
a. To offer National legislators a set of internationally accepted rules as to
b. how a number of such legal obstacles may be removed, and
c. how a more secure legal environment may be created for what has become
known as electronic commerce.
Objectives
a. To facilitate rather than regulate electronic commerce
b. To adapt existing legal requirements
c. To provide basic legal validity and raise legal certainty
BASIC PRINCIPLES
Functional equivalence: Analyze purposes and functions of paper-based
requirements (“writing”, “record”, “signature”, “original”)
Media and technological neutrality: Equal treatment of different
techniques (EDI, e-mail, Internet, telegram, telex, fax).
Party autonomy(principle of non-discrimination ): Primacy of party
agreement on whether and how to use e-commerce techniques.
CORE PROVISIONS OF THE UNCITRAL MODEL LAW
Article 5 & 5 bis (Legal Recognition):
a. Information shall not be denied legal effect, validity or enforceability solely
because:
b. it is in the form of a data message or
c. It is incorporated by reference
Article 6 (Writing): Where the law requires information to be in writing, that
requirement is met by a data message if the information contained therein is
accessible so as to be usable for subsequent reference.
Article 7 (Signature):
a. Where the law requires a signature of a person, that requirement is met in
relation to a data message if:
b. a method is used to identify that person and to indicate that person's approval of
the information contained in the data message; and
c. that method is as reliable as was appropriate for the purpose for which the data
message was generated or communicated, in the light of all the circumstances,
including any relevant agreement.
Article 8 (Original)
a. Where the law requires information to be presented or retained in its original
form, that requirement is met by a data message if:
b. where it is required that information be presented, that information is capable
of being displayed to the person to whom it is to be presented.
Article 9 (Evidence): In any legal proceedings, nothing in the rules of
evidence shall apply so as to deny the admissibility of a data message in
evidence solely because it is a data message.
Article 10 (Retention):
a. Legal requirement for retention of data:
b. the information contained therein is accessible so as to be usable for
subsequent reference; and
c. the data message is retained in the format in which it was generated, sent or
received,
d. such information, if any, is retained , enables the identification of the origin,
destination ,date and time of a data message when it was sent or received.
(Article 11): Formation and validity of contracts:
a. an offer and the acceptance of an offer may be expressed by means of data
messages.
b. Where a data message is used in the formation of a contract, that contract shall
not be denied validity or enforceability on the sole ground that a data message
was used for that purpose.
(Article 12) Recognition by parties of data messages: As between the
originator and the addressee of a data message, a declaration of statement shall
be valid or enforceable.
(Article 13) Attribution of data messages:
a. A data message is that of the originator if it was sent by the originator itself.
b. As between the originator and the addressee, a data message is deemed to be
that of the originator if it was sent:
Article 15 (Time and place of dispatch and receipt): A data message is
deemed to be sent when it enters an information system outside the control of
the originator.
CASE LAWS
Khoury v. Tomlinson is a landmark case decided by the Texas Court of
Appeal. The facts of this case are such that an agreement was entered via e-
mail which was not signed but only the name of the originator appeared in the
"from" section. Referring to the principles in Article 7 of the Model Law, the
court found sufficient evidence that the name in the 'from' section establishes
the identity of the sender.
Chwee Kin Keong and others is a case dealt with by the Singapore High
Court. There was the issue of unilateral mistake in this case as the wrong price
was quoted on the seller's website for a product. The server of the seller
automatically sent a confirmation mail when the buyers placed an order. All the
elements of the contract were established but with a mistake which eliminated
consensus ad idem. Referring to the Singapore Electronic Transactions Act
based on Model Laws, the court found that human errors, system errors, and
transmission errors could vitiate a contract.
ONLINE CONTRACTING - I.T. Act, 2000 does not define e-contracts but
gives validity to them. E-contracts are those contracts which are entered into by
the parties to the contract through internet or computer network or by the use of
any electric means. In Hotmail Corporation v. Van Money Pie Inc (1998),the
court was asked to rule on the validity of the ‘clickwrap’ contract that the users
of the Hotmail service were required to execute. The court upheld the validity
of clickwrap contracts stating by clicking the ‘I agree’ button on the page where
the details of the contract are listed, the parties bind themselves to a contract
under the terms contained in that webpage
TYPES:
SHRINK-WRAP AGREEMENTS are usually the licensed agreement
applicable in case of software products buying. In case of shrink-wrap
agreements, with opening of the packaging of the software product, the terms
and conditions to access such software product are enforced upon the person
who buys it. Shrink-wrap agreements are simply those which are accepted by
user at the time of installation of software from a CD-ROM, for example,
Nokia pc-suite. Though, in India, there is no stable judicial decision or
precedent on the validity of shrink-wrap agreements. When a-user tears open
the shrink-wrap packaging or clicks a button indicating acceptance, they are
legally agreeing to the terms specified in the agreement. These terms often
cover issues such as licensing, warranty disclaimers, limitations of liability, and
other contractual obligations.
Shrink-wrap agreements have been the subject of legal scrutiny, and their
enforceability can depend on factors such as the clarity of the terms, the
conspicuousness of the notice, and whether the user had a reasonable opportunity to
review the terms before agreeing. Despite these considerations, shrink-wrap
agreements have become a common method for software developers and distributors
to establish contractual relationships with end-users.
CLICK- WRAP AGREEMENTS are web-based agreements which require
the assent or consent of the user by way of clicking “I Agree’ or “I Accept” or
“Ok” button on the dialog box. In click –wrap agreements, the user basically
have to agree to the terms and conditions for usage of the particular software.
Users who disagree to the terms and conditions will not be able to use or buy
the product upon cancellation or rejection. A person witnesses web-wrap
agreement almost regularly. In a clickwrap agreement, users are required to
manifest their assent to the terms and conditions by clicking a button or
checking a box, indicating that they have read, understood, and agree to abide
by the terms presented. This method of obtaining user consent is commonly
used in the digital realm and is designed to ensure that users are aware of the
terms governing their use of a particular service or software. Clickwrap
agreements are prevalent in various online transactions, from software
installations and updates to online purchases and access to web services. They
serve as a means for companies to establish a contractual relationship with
users while providing a record of user consent that can be legally enforceable.
It is important for users to carefully review clickwrap agreements to understand
the rights and obligations associated with the use of a particular digital service
or product.
BROWSE WRAP AGREEMENT An agreement made intended to be
binding on two or more parties by the use of website can be called a browse
wrap agreement. In case of browse wrap agreement, a regular user of a
particular website deemed to accept the terms of use and other policies of the
website for continuous use. Unlike clickwrap agreements that require users to
actively manifest their assent by clicking a button or checking a box, browse
wrap agreements do not involve any explicit action by the user to signify
agreement. Instead, users are deemed to accept the terms simply by continuing
to use the website or service. The hyperlink to the terms is often labelled as
"Terms of Service" or "Terms and Conditions" and is accessible for users to
review. While browse wrap agreements are convenient for website operators,
they can raise legal challenges concerning the adequacy of user notice and
consent. Courts may scrutinize the placement, visibility, and clarity of the
hyperlink to ensure that users are reasonably informed of the terms.
Enforceability of browse wrap agreements can depend on factors such as
conspicuousness and whether users had actual or constructive knowledge of the
terms. It is crucial for website operators to design their browse wrap
agreements carefully to enhance transparency and mitigate potential legal
issues related to user consent.
ELEMENT OF ONLINE CONTRACTING
OFFER – One of the most essential elements of online contract is the
requirement of an offer to be made. There must be a lawful proposal or offer
made by one party known as the proposer and it is the starting point of a
contract. A proposal must be distinguished from the invitation to offer or treat
and must be made with an intention to create legal relationship. An offer or
proposal is revocable and can be withdrawn at any time before it is accepted
because once it is accepted by the other party, it becomes a promise.
ACCEPTANCE – When a proposal or offer is made is accepted by the person
to whom the offer is made, it becomes a promise. The acceptance of the
proposal must be unconditional and absolute and must be communicated to the
proposer or the offeror. In case of an online contract, offer and acceptance can
be made through e-mails or by filing requisite form provided in the website.
They may also need to take an online agreement by clicking on ‘I Agree’ or ‘I
Accept’ for availing the services offered.
INTENTION TO CREATE LEGAL RELATIONSHIP – If there is no
intention of creating legal relationship on the part of the parties to contract,
there is no contract between them. It is an essential element of valid contract
that parties to the contract must have intention to create legal relationships.
LAWFUL CONSIDERATION – Consideration is one of most important
elements of a contract. Consideration is something of some value in the eyes of
law. It may be of some benefit, right, interest or profit given to the party as
inducement of promise. For e.g., an online site that offers purchase of land in
moon.
CAPACITY OF PARTIES – Parties to a contract must be capable of entering
into a contract. He must attain the age of majority and must be of sound mind.
He must not be disqualified from contracting by any law for the time being in
force. In our country an agreement where either party is a minor has no
significance. It is considered as void ab-initio. In the case of Mohori Bibee vs.
Dharmodas Ghose, it was held by the Privy Council that an agreement by a
minor is void.
FREE CONSENT – Consent which is defined under Section 13 of the Indian
Contract Act, 1872 is an essential requirement of a contract. It is basically the
meeting of minds of the parties. When both agree upon the same thing in the
same manner, they are said to consent. In case consent is caused by coercion, it
is voidable at the option of the party whose consent was so caused.
APPLICABILITY OF INFORMATION TECHNOLOGY ACT, 2000
10A. Validity of contracts formed through electronic means.- Where in a
contract formation, the communication of proposals, the acceptance of
proposals, the revocation of proposals and acceptances, as the case may be, are
expressed in electronic form or by means of an electronic record, such contract
shall not be deemed to be unenforceable solely on the ground that such
electronic form or means was used for that purpose.
Sec. 10 A resembles with the Article 8 of the UN Convention on the use of
Electronic Communications in International Contracts.
a. The Supreme Court in TRIMEX INTERNATIONAL FZE LTD. DUBAI V.
VEDANTA ALUMINUM LTD 2010 (1) SCALE 574 recognizing the
validity of e-transaction has held that e-mails exchanges between parties
regarding mutual obligations constitute a contract.
b. It was held in the case of BHAGWANDAS GOVERDHANDAS
KEDIA V. GIRDHARILAL PARSHOTTAMDAS, “that ordinarily, it is the
acceptance of offer and intimidation of that acceptance which results in a
contract. This intimation must be by some external manifestation which the law
regards as sufficient. Hence, even in the absence of any specific legislation
validating e-contracts cannot be challenged because they are as much valid as a
traditional contract is.”
EVIDENTIARY VALUE OF ELECTRONIC CONTRACTS
The evidentiary value of electronic contracts has been given recognition and
can be understood in the light of various sections of Indian Evidence Act.
Sec 65B of the Indian Evidence Act deals with the admissibility of electronic
records.
As per Sec 65B of the Indian Evidence Act any information contained in an
electronic record produced by the computer in printed, stored or copied form
shall deemed to be a document and it can be admissible as evidence in any
proceeding without further proof of the original subject to following conditions
are satisfied such as
the computer(Electronic device) from where it was produced was in regular use
by a person having lawful control over the system at the time of producing it,
during the ordinary course of activities the information was fed into the system
on a regular basis,
the output computer was in a proper operating condition and have not affected
the accuracy of the data entered.
REMEDIES FOR BREACH OF ONLINE CONTRACT
There is no specific rule in case of breach of online contract but the rules
regarding remedies for breach of contract can be followed as provided in The
Indian Contract Act. A valid contract gives rise to co- relative rights and
obligations and they are enforceable in the court of law when infringed on
breach of contract. The Contract Act mainly talks about two remedies for the
breach of contract such as Damages and Quantum Merit.
Sec 73 and Sec 74 of the Indian Contract Act, 1872 deals with the rules
regarding the remedy of damages on breach of contract. The person whose
rights are infringed by the breach of contract may bring an action for damages
or compensation in terms of monetary value for the loss suffered by the party.
the famous case Hadley vs. Baxendale, According to the rules laid down in this
case, there can be damages which naturally arose on the usual course of things
from such breach of contract and can be called ordinary damages and secondly,
damages for loss arose from special circumstances i.e. special damages. There
are also other kinds of damages mentioned in the Act such as nominal damage,
pre- contract expenditure, compensation for mental agony and liquidated
damages.
JURISDICTION ISSUE IN E-COMMERCE
E- commerce plays a vital role in nearly every sphere of life- with simply just a
click of the mouse we can pay our electricity/telephone bills, do online
shopping, transfer money to persons in different parts of the globe, conduct
business deals etc. An online transaction may be explained as a way of
conducting business by utilizing computer and telecommunication technology
to exchange data or conduct business. However, this boom in internet
transactions has brought a host of issues regarding jurisdiction of such
transactions to the forefront.
The Indian position theoretically matches with the US rule of minimum
contracts. For civil matters, the Code of Civil Procedure, 1908 governs the
jurisdiction aspect.
Section 19 of the Act states that where a suit is instituted for compensation on
account of wrong done, if such a wrong was committed within the local limits
of the jurisdiction on one court and the defendant resides in or carries on
business, within the local limits of the jurisdiction of another court, the suit
may be instituted at the option of the plaintiff in either of the courts.
Section 20 of the CPC further provides that the suit shall be instituted within
the local limits of whose jurisdiction the defendant resides or the cause of
action arises. For example, A is a tradesman in Calcutta. B carries on business
in Delhi. B buys goods of A online and requests A to deliver them to the East
Indian Railway Company. A delivers the goods accordingly in Calcutta. A may
sue B for the price of the goods either in Calcutta, where the cause of action
has arisen, or in Delhi, where B carries on business.
Further, Section 13 of CPC provides that a foreign judgment is to be conclusive
as to any matter which has been directly adjudicated upon between the same
parties or between parties under whom they or any of them claim litigating
under the same title except under certain specified conditions. Talking about
the presumption as to foreign judgments the provisions of the Act states that the
Court shall presume upon the production of any document purporting to be a
certified copy of a foreign judgment that such judgment was pronounced by a
Court of competent jurisdiction, unless the contrary appears on the record; but
such presumption may be displaced by proving want of jurisdiction
Casio India Co. Ltd. Vs Ashita Tele Systems Pvt. Ltd. 2003 The Hon’ble
Delhi High Court has observed that once access to the Defendants website
could be had from anywhere else, jurisdiction could not be confined to the
territorial limits of the place where the Defendant resided and the fact that the
Defendants website could be accessed from Delhi was sufficient to invoke the
territorial jurisdiction of a court in Delhi.
(India TV) Independent News vs India Broadcast Live 2007. Here the Delhi
High Court differed with its earlier judgment in Casio India. The Court holds
that jurisdiction of the forum court does not get attracted merely on the basis of
interactivity of the website which is accessible in the forum state but yet held
that. if the Defendants website is interactive, permitting browsers not only to
access the contents thereof but also to subscribe to the services provided by the
owners/operators, then courts jurisdiction at the place where the website is
accessed from is permissible
DIGITAL SIGNATURE AND ELECTRONIC SIGNATURE
Electronic Signature is more of an assent on the given document without
asserting the validity of the contents of the same. It could also refer to the
image affixed in the document as simple as an Image to asset the given content
or to display that the given party has given their consent to the same. It can be
easily tampered or easily misconfigured as compared to the digital signature.
Electronic signatures cannot easily be verified with regards to the time and
place, Audit Logs are not easily applied to electronic signatures. Electronic
Signature provides an electronic representation of the individual’s identity that
provides the proof of consent and assents to the facts of the given signature. In
toto, it’s an approval from the signatory that he assents to the written format of
the same electronically. It is important to ensure that it is coming from the
authorised signatory and has made no modifications to the document. The
European Union Regulation 910/214 defines and regulates electronic signature
as “in electronic form which is attached to or logically associated with other
data in electronic form and used by the signatory to sign”.
Digital signatures are more safeguarded and cannot be easily tampered with.
In case there are any changes made to the document and are sent back to the
original signee, the digital signature shows as invalid signature. It discloses the
identity of the individuals and provides a definite identity which is very vague
as compared to Electronic Signature. A signature is a symbolic and essential
representation of one’s identity. Signature of a person holds a very significant
place in the field of law as well as while carrying out transactions. When a
person signs a particular document, it means that such a person has read the
whole document carefully, has verified the facts and is aware of the contents of
the document and therefore is giving his assent to the best of his knowledge.
Under the contract law also, signature holds a vital position as it is considered
as a sign of acceptance of an offer. The Conventional form of signatures has
evolved a lot due to technological advancement. With the increased usage of
online transactions and e-mails, the risk of the data being hacked has also
increased. Hence, the concept of online signatures has become relatively
important.
UNCITRAL MODEL LAW ON ELECTRONIC SIGNATURES 2001
“The increased use of electronic authentication techniques as substitutes for
handwritten signatures and other traditional authentication procedures has suggested
the need for a specific legal framework to reduce uncertainty as to the legal effect that
may result from the use of such modern techniques.
DIGITAL SIGNATURE AND ELECTRONIC SIGNATURE AS
DEFINED UNDER THE LAW
Electronic Signature - Sec 2 (ta) of Information Technology Act 2000
“Authentication of any electronic record by a subscriber by means of the electronic
technique specified in the second schedule and includes digital signature.” The
definition of electronic signature includes digital signature and other electronic
techniques which may be specified in the second schedule of the Act; thus an
electronic signature means authentication of an electronic record by a subscriber by
means of electronic techniques.
TYPES OF ELECTRONIC SIGNATURE
Unsecured Signature - Since Electronic Signature is more of an unsecured
type of signature, there are affixations that are marked in the end for reference.
they can be easily tampered and not provide much of the focus on the
authenticity of the Identity. Following are the types of Electronic Signature:
Email Signature– Just merely typing one’s name or symbol in the end of an
email or sending a message on letterhead, they can easily be forged by anyone
else.
Web Based Signature– In many organizations, the Company dons many hats
with regards to activities conducted in the Organizations, this may make the
organization fall for Web-based clickwrap contracts in which the acceptance is
made merely by clicking a single button.
Secured Signature - This includes the signatures which are digitally secured
and also which have more legal weightage.
Digital Signature - According to section 2(1)(p) of the Information Technology Act,
2000 digital signature means the authentication of any electronic record by a person
who has subscribed for the digital signature in accordance to the procedure mentioned
under section 3 of the same act. Section 5 of the Information Technology Act, 2000
gives legal recognition to digital signatures.
USAGE OF DIGITAL SIGNATURE
Personal Use- It is at the liberty of the individual to use the signature
personally without creating the hassle to personally be at the given place.
Business– Professions such as Architecture, Construction and
Engineering Companies require to sign the tenders, market
procurements or even biddings, Digital signature can prove to be a great
way to provide the assent.
Return filing for GST– GST filing and E-filing causes the individuals
to compulsory opt for Digital Signatures.
Filing for Income Tax– Some corporations require the business to file
the tax all over India, thus saving the light of the day.
FEATURES OF DIGITAL SIGNATURE
The authenticity of the sender - The person who receives the electronic
message or document is able to realise who is the sender of the message. The
digital signature makes it possible to verify the name of the person signing the
message digitally.
The integrity of the message - The receiver of the electronic message is able
to determine whether he/she has received the original document or whether the
document has been altered before the receipt or not.
Non- Repudiation - The sender of the message cannot refute the contents of
the electronic message and cannot deny that he/she had never sent the
message.
BENEFITS OF DIGITAL SIGNATURE
Authenticity.
Non-deviability.
Message cannot be altered in between the transmission.
AUTHENTICATION USING DIGITAL SIGNATURE - The authentication
of the electronic record is done by creating a digital signature which is a
mathematical function of the message content. Such signatures are created and
verified by Cryptography, which is a branch of applied mathematics.
Asymmetric Encryption - Can only be decrypted using a publicly available
key known as the ‘Public Key’ provided by the sender. The procedure has been
under Section 2(1)(f) of the Information Technology Act, 2000. Under this
system, there is a pair of keys, a private key known only to the sender and a
public key known only to the receivers. It is also known as the ‘principle of
irreversibility’
Symmetric Encryption -There is only a single key known to both the sender
and the receiver. Under this system, the secret key or the private key is known
to the sender and the legitimate user. This secret key is used for both encryption
and decryption of the message. The only drawback of this symmetric
encryption is that as the number of pairs of users increases, it becomes difficult
to keep track of the secret keys used.
PROBLEMS WITH DIGITAL SIGNATURE
It functions online. Therefore, it has to be either purchased or downloaded
It lacks trust and authenticity
DIGITAL SIGNATURE CERTIFICATE (DSC)
A method to prove the authenticity of an electronic document.
It can be presented electronically to prove the identity, to access information or
sign certain documents digitally.
The Central Government has appointed a Controller of Certifying Authorities
who grants a license to the Certifying Authorities to issue digital signature
certificates to the subscriber.
The DSC is valid up to a maximum period of three years.
WHO NEEDS A DSC?
Vendor and Bidder, Chartered accountant, Banks, Director of a company, Company
secretary, Other authorized signatories.
ELEMENTS OF DIGITAL CERTIFICATE - Owner’s public key, Owner’s
name, The expiration date of public key, Name of the issuer, Serial number of
the certificate, digital signature of the user.
TYPES OF CERTIFICATES
Only Sign– It could only be used for signing a document. It is widely used in
signing PDF Files for the purpose of filing Tax Returns for usage as an
attachment for Ministry Of Corporate Affairs or other government websites
Encrypt– It is used to encrypt a particular document. It is popularly used in
tender portals to help a company encrypt a document before uploading it.
Sign along with Encryption– It is used for both signing and encrypting a
particular document.
DSC UNDER THE INFORMATION TECHNOLOGY ACT, 2000
Section 35: Any person who wishes to get a Digital Signature Certificate may
file an application to the certifying authority for issuance of the Electronic
Certificate along with the submission of the required amount of fees not
exceeding Rs. 25,000, including a statement of certification practice or stating
such particulars as prescribed.
Section 36: Representations upon issuance of the DSC.
Section 37: Suspension in public interest, not more than 15 days, unless given
the opportunity to present the case.
Section 38: Revocation on death or request of a subscriber, dissolution of a
company or a firm.
E-PAYMENTS & E-BANKING - Electronic payment, often referred to as e-
Payment, is a financial transaction made electronically, without the use of
physical cash or checks. It has revolutionized the way individuals, businesses,
and governments conduct financial transactions. This document will provide an
overview of the concept of e-Payment, its various forms, benefits, challenges,
and the technologies behind it. Types of electronic payment systems
TYPES
E-Money - The definition of electronic money as per the reports of the Reserve
Bank of India in their 2002 report broadly defines this term as “ an electronic
store of monetary value on a technical device used for making payments to
undertakings other than the issuer without necessarily involving bank accounts
in the transaction, but acting as a prepaid bearer instrument”. The electronic
money is divided into two parts which are prepaid store value card and digital
wallets which includes Unified Payment Interfaces (UPI) as well.
Prepaid Stored Value Card/ Electronic Purse - An electronic purse is
defined as the store of value on a card, which can be used in a manner similar
to cash to pay for travel or other small-scale transactions. The electronic
“purse” is secure information stored in a dedicated area or file in the smart-card
as per the reports of the world bank. Different types of electronic purses are
tokens, transport money, micro-purchases etc.
Unified Payment Interfaces (UPI) - Unified Payment Interfaces are defined
as A UPI ID and PIN are sufficient to send and receive money. Real-time bank-
to-bank payments can be made using a mobile number or virtual payment
address (UPI ID). these UPI based payment systems have been developed by
the National Payments Corporation of India (NPCI), they have been introduced
from the year 2015 but gained popularity shortly after the demonetisation.
Credit Card - The credit cards that are seen now were introduced in the year
1950 and the main purpose for it was for entertainment and business travel
reasons, where the individual owners of the credit cards were charged at the
end of the month.
Bank transfers - This type of transfers can be done with the help of the
internet virtually, and this allows the person to transfer or withdraw a sufficient
amount that is needed just by a single click.
ADVANTAGES OF ELECTRONIC PAYMENTS
Speed and efficiency– electronic payments are convenient as they provide a
hassle-free means of payment, as the individuals making any sort of payment
does it at their own time and convenience, whereas the traditional forms of
payments require the individual who wants to make the payment to be
physically present while making the payment and is more time taking and has a
lot of restrictions of time etc.
Increase in the number of sales– with the increase of the sales through online
mode, sales have increased and the people who resort to electronic modes of
payments have increased as well. It has come to a point where individuals do
not carry a lot of hard cash in their wallets and most individuals prefer to keep
the digital or electronic type of money and pay with the same when needed.
Transaction costs are reduced– transaction costs are eliminated or reduced
while making payments through the electronic method, where the traditional
method costs additional charges such as if an individual is going to shop there
will be additional expenses such as the expense incurred to travel till the shop
for purchase.
DISADVANTAGES OF ELECTRONIC PAYMENTS
Concerns relating to security– Although a majority of the electronic payment
systems have encryption in place, there is still a risk of phishing where private
information is hacked from unsuspecting users to hack information such as
financial and personal information. There is high security that is available for
these electronic payment systems, making many people scared to use this form
of payment.
Disputes in Transactions– If a dispute takes place in the electronic payment, it
can be refunded but without sufficient information that can prove the same it
will be very difficult to do so.
Increase in the cost of business– Business has a lot more additional costs with
the progression of popularising the electronic form of payment a lot of the
businesses which have their own form of electronic payment have to incur
additional costs so as to ensure that the sensitive information of the individual
while making the payments are secured and protected.
REGULATORY BODIES GOVERNING ELECTRONIC PAYMENTS IN
INDIA
Reserve Bank of India - The Reserve Bank of India (RBI) is the primary
regulator for electronic payments in India. In the beginning, the regulations
governing this ambit was very general till recently where it turned into full-
fledged regulation due to increased use of the electronic payment system.
Digital transactions- Ombudsman Scheme - On January 31, 2019, under the
approval of the RBI, the banking ombudsman was appointed to take care of
matters relating to unauthorised money transfers, frauds etc. which were
accorded during any digital transaction. It was an easier approach for customers
to approach in the time of need.
E-BANKING - E-banking has been defined in law lexicon as banking
activities accessed by using a computer, employing modems and telephones. In
e-banking, ‘e’ stands for electronic and the banking has been defined as ‘an
acceptance of money from the public, for purpose of lending or investment of
money, which is withdrawable by cheque, draft or otherwise and banking by
using electronic devices is e-banking.
FEATURES
Using internet facility.
removes the traditional geographical barriers
banking transactions at all time and on the days including holidays and
Sundays.
It is based on science and technology i.e. use of electronic devices which saves
time and energy of banker and customer.
ONLINE BANKING SERVICES PROVIDED BY BANKS
Core Banking- Core Banking is a general term used to describe services
provided by a group of networked bank branches.
ATM (Automated Teller Machine) – ATM is a Computerized machine that
permits bank customers to gain access to their Accounts with Magnetically
encoded plastic card & a Code number. It enables the customer to perform
several banking operations without the help of Teller such as to Withdraw Cash,
Make Deposits, Pay Bills, Obtain Bank Statements & Effective Cash Transfer.
Plastic Cards (Debit & Credit Cards) – Plastic Cards have gained greater
acceptance & Momentum as a Medium Financial Transaction. Credit Card
provides Cash Free & anywhere and anytime Shopping to the Customers but
with fixed limit prescribed by Banks. Debit Card, unlike Postpaid Credit Card,
is a Pre-paid Card with some Stored value.
Mobile Banking – Mobile Banking is an extension of application such as
Phone Banking & Online Banking. It can be defined as a channel where by
Customers interact with a Bank through a Mobile Device, e.g. Cell Phone.
Real Time Gross Settlement System (RTGS) – The acronym “RTGS” stands
for Real Time Gross Settlement. The RTGS system facilitates transfer of funds
from accounts in one bank to another on a “real time” and on “gross
settlement” basis. The RTGS system is the fastest possible interbank money
transfer facility available through secure banking channels in India.
National Electronic Funds Transfer (NEFT) - The acronym “NEFT” stands
for National Electronic Funds Transfer. Funds are transferred to the credit
account with the other participating Bank using RBI's NEFT service.
ONLINE BANKING THREATS
Password Stealing and Identity Theft – These types of attacks rely on the
ability of the attacker to fool users into giving up their personal information
and credentials. Identity theft refers to all types of crime in which someone
illicitly obtains and uses another person's personal data through deception or
fraud, typically for monetary gain.
Phishing – These attacks use social engineering to trap people into giving up
their personal information. Users are sent bogus emails that lure users to
Internet sites that mimic legitimate sites. Many users, unaware that criminal
intent is behind such e-mail.
Spyware - Software that enables a user to obtain covert information about
another's computer activities by transmitting data covertly from their hard drive.
Computer virus – It is a malware program that, when executed, replicates by
inserting copies of itself into other computer programs, data files, or the boot
sector of the hard drive; when this replication succeeds, the affected areas are
then said to be "infected".
Trojan - in this way may require interaction with a malicious controller (not
necessarily distributing the Trojan horse) to fulfill their purpose. It is possible
for those involved with Trojans to scan computers on a network to locate any
with a Trojan horse installed, which the hacker can then control.
CHALLENGES IN E-BANKING
Confidentiality, integrity and authentication
Customer awareness and satisfaction
Development of skill of bank personnel &
Handling Technology
UNIT - 3
CYBER JURISDICTION
The internet can be seen as a multi jurisdictional because of the ease which a
user can access of website anywhere in the world. It can be even viewed as a
jurisdictional issue in the sense that from the user‘s perspective that the state
and national borders are essentially transparent. For courts determining
jurisdiction situation is more problematic.
The whole trouble with internet jurisdiction is the presence of multiple parties
in various parts of the world who have only a virtual nexus with each other.
Then, if one party wants to sue the other, where can he sue?
However, in the context of the internet or cyberspace (Cyberspace is the
electronic medium of computer networks, in which online communication
takes place), both these are difficult to establish with any certainty.
Because cyberspace has no geographical boundaries, it establishes immediate
long-distance communications with anyone who can have access to any
website. Usually an internet user has no way of knowing exactly where the
information on a site is being accessed from. Here, i.e., in cyberspace,
jurisdiction issues are of primary importance. As Internet does not tend to make
geographical and jurisdictional boundaries clear, Internet users remain in
physical jurisdictions and are subject to laws independent of their presence on
the Internet.
In each case, a determination should be made as to where an online presence
will subject the user to jurisdiction in a distant state or a foreign company. As
such, a single transaction may involve the laws of at least three jurisdictions:
a. The laws of the state/nation in which the user resides,
b. The laws of the state/nation that apply where the server hosting the transaction
is located, and
c. The laws of the state/nation which apply to the person or business with whom
the transaction takes place.
So a user in one of the Indian States conducting a transaction with another user
in Britain through a server in Canada could theoretically be subject to the laws
of all three countries as they relate to the transaction at hand. The laws of a
nation may have extra-territorial impact extending the jurisdiction beyond the
sovereign and territorial limits of that nation. This is particularly problematic,
as the medium of the Internet does not explicitly territorial limitations.
An example would be where the contents of a web site are legal in one country
and illegal in another. In the absence of a uniform jurisdictional code, legal
practitioners are generally left with a conflict of law issue.
JURISDICTION IN CASE OF CYBER CRIME
In order for a national court to adjudicate criminal and regulatory sanctions
internationally, there must be some connection, or nexus, between the
regulating nation (the forum) and the crime or criminal. Four nexuses have
been invoked by courts to justify their exercise of jurisdiction.
a. The territoriality nexus holds that the place where an offense is committed-in
whole or in part determines jurisdiction.
b. The nationality nexus looks to the nationality or national character of the
person committing the offense to establish jurisdiction.
c. The protective nexus provides for jurisdiction when a national or international
interest of the forum is injured by the offender.
d. The universality nexus holds that a court has jurisdiction over certain offenses
that are recognized by the community of nations as being of universal concern,
including piracy, the slave trade, attacks on or the hijacking of aircraft,
genocide, war crimes, and crimes against humanity. It is not enough that these
nexuses exist; the connection between the forum and the person or activity also
must be “reasonable.”
EXTRA TERRITORIAL JURISDICTION
The main problem arises when a citizen of some other country causes harm to
citizens of a native country, let’s take for an example in India, though
Information Technology Act, 2000 does have extra territorial jurisdiction but
it’s very difficult to enforce it and exercise it.
If a crime is committed in Delhi by a citizen of US by hacking the systems of
an Indian Company, that maximum the court can do is pass an order in favour
of the plaintiff but the problem arises that how to punish the US citizen, the
only thing which the hacker has to do is avoid coming to India, moreover as it’s
an international matter collection of evidence will also be a trouble for all.
Prosecuting and trying a person also raises difficult problem in the field of
jurisdiction. These problems relate to determination of place where the offence
was committed (locus delicti- The place where a crime was committed) and
where several jurisdictions are equally competent.
Under the Information Technology Act, 2000, India claims “long arm
jurisdiction over foreign parties committing criminal acts outside of India
which have an effect on a computer information system located within India. A
court may order law enforcement authorities to seize computer equipment that
is suspected of having been used in the commission of a computer crime. It is
possible for more than one punishment to be administered for commission of
the same unlawful acts if more than one criminal law has been violated. Section
75 of the Information Technology Act, 2000 deals with extraterritorial
application of the law, the section states that the provisions of the Act will
apply to
a. Any person irrespective of nationality
b. An offence or contravention committed outside India
c. The said offence or contravention must have been committed against a
computer, computer system or computer network located in India
CYBER CRIME UNDER INFORMATION TECHNOLOGY ACT:
NATIONAL PERSPECTIVE
Cybercrimes are criminal offenses committed via the Internet or otherwise aided by
various forms of computer technology, such as the use of online social networks to
bully others or sending sexually explicit digital photos with a smart phone. But while
cybercrime is a relatively new phenomenon, many of the same offenses that can be
committed with a computer or smart phone, including theft or child pornography, were
committed in person prior to the computer age. This sub-section includes articles on
cyber bullying, sexting, and a whole host of other crimes commonly committed online
or with the help of computer networking technology.
Hacking: - Hacking means unauthorized access to a computer system. As
defined in Section 66 of the Information Technology Act, 2000, whoever with
the intent to cause or knowing that he is likely to cause wrongful loss or
damage to the public or any person destroys or deletes or alters any information
residing in a computer resource or diminishes its value or utility or affects it
injuriously by means commits hacking.
Virus, Trojans and Worms: - A Computer virus is a program designed to
affect the health of the computer. They destroy or hampers the computer
systems. Trojan is defined as a ―maliciously, security breaking program that is
disguised as something benign such as a directory lister, archive, game, or a
program to find and destroy viruses.
Cyber Pornography: - Cyber pornography is pornography‘s which is
distributed via the internet, primarily websites, peer-to peer file sharing or
Usenet newsgroups. This is a crime that is clearly illegal, both on and off the
internet
Cyber Stalking: - Cyber Stalking is defined as the repeated acts of harassment
or threatening behaviour of the cybercriminal towards the victims by using
internet services.
Cyber Terrorism: - Cyber terrorism may be defined to be ― the premeditated
use of disruptive activities, or the threat thereof, in cyber space, with the
intention to further social, ideological, religious, political or similar objectives,
or to intimate any person in furtherance of such objectives
Cyber Crimes related to Finance: - Crimes over internet for earning financial
or monetary gain thorough illegal means. It may occur in many forms, but the
most recognized technique is online fraud and spoofing. This would include
cheating, credit card frauds, money laundering, etc.
CYBER CRIME UNDER INFORMATION TECHNOLOGY ACT:
NATIONAL PERSPECTIVE
Statuary Provisions (Information Technology Act, 2000)
The first step in the field of cyber law was the Model Law which was drafted
under the United Nations Commissions on International Trade law, 1986. Then,
the United Nations general assembly on 30th January, 1999 passed a resolution
to regulate e-commerce through uniform set of laws applicable to its member‘s
countries.
Being a signatory to the resolution, Parliament of India has a passed the
Information Technology Act, 2000 on 17th may, 2000.
The preamble of the Act states that the objectives of the act is to legalise e-
commerce and further amend the Indian penal Code, 1860, the India Evidence
Act,182, the Banker‘s Book Evidence Act, 1891and the Reserve Bank of India
Act, 1934 to make compatible with this Act.
The Act consists of 13 Chapters and governs laws relating to Electronic
Contract, Electronic Record, Digital Signature and the use of the electronic
records and signature in Government records. It also regulates the activities of
the Network Service Providers, Internet Service Providers (ISPs).
Punishments And Offences
The main aim of the act is to legalize the digital language so that people can
easily and without fear use the electronic devices for their own purposes like
doing business or for entertainment. It prescribes certain offences and penalties
to keep a check on the cyber crime, the main of them are:
a. Section 65: Tampering with Computer Source Documents
b. Section 66: Hacking with Computer System
c. Section 67: Publishing of obscene information which is obscene in electronic
form.
d. Section 72: Penalty breach of confidentially and privacy.
In addition to above, Section 77 of the Act states that “No penalty imposed or
confiscation made under this Act shall prevent the imposition of any other
punishment to which the person affected thereby is liable under any other law
for the time being in force.” which means the civil crimes can also be made as
Criminal Act, as:
Computer Network Breaking and Hacking: - S. 66(2) of I.T. Act and S. 441 of IPC
Child Pornography: - S. 67 of I.T. Act and S. 294 of IPC
Email- bombing: - S. 43(e) of I.T. Act and S. 425-441 read with S447 of IPC
Password Sniffing: - S. 43(a), (g) of I.T. Act and S. 419 of IPC
Credit Card Fraud: - S. 43(h) I.T. Act and S. 443 (a) and (g) read with 426, 427 and
447 of IPC.
CYBER CRIME UNDER INFORMATION TECHNOLOGY ACT:
INTERNATIONAL PERSPECTIVE
USA
The Computer Fraud and Abuse Act, deals with the issue of unauthorized
access in the U S legal system. The legislation was first enacted in 1984,
revised in 1994, and last amended made in late 1996.
Thus, USA has passed several enactments, which cover various aspect of cyber
crime. The States of USA also pass various federal laws for the protection of
cyber crime. These Federal Acts, however either are to introduced or amend
existing provisions in U.S. Federal Code.
The major provisions of U.S. codes governing criminal activities can broadly
discussed in the following heads:
a. Federal Criminal Code Concerning computer crimes
b. Search and seizure of Computers
c. Guidelines concerning sentences
d. Federal Statutes Governing Intellectual property Rights:
1. Copyright Offences
2. Copyright Management offences
3. Trademark offences.
4. Offences concerning the integrity of IP System
5. Offences concerning the Misuse of Dissemination system
6. Cyber Stalking
U.S.A. has successfully enacted provisions relating to offences, there
investigation and sentencing. The country is leading in the field of checking
cybercrime along through effective police forces, particularly F.B.I., and people
cooperation. The numbers of cyber criminals are also greater in the country
because of predominance of internet and cyber technology in day-to-day life.
The Counterfeit Access Device and Computer Fraud and Abuse Act of
1984 prohibits various attacks on federal computer systems and on those
used by banks and in interstate and foreign commerce.
The Electronic Communications Privacy Act of 1986 (ECPA) prohibits
unauthorized electronic eavesdropping.
The Federal Information Security Management Act of 2002 (FISMA).
UK
The Computer Misuse Act 1990, 'an Act to make provision for securing
computer material against unauthorized access or modification; and for
connected purposes', set out three computer misuse offences.
a. Unauthorized access to computer material
b. Unauthorized access with intent to commit or facilitate commission of further
offences.
c. Unauthorized modification of computer material.
d. The maximum prison sentences specified by the act for each offence were six
months and five years respectively.
The Police and Justice Act 2006 : The British Police and Justice (2006)bill
was granted Royal Assent with some interesting changes being introduced to
the Computer Misuse Act (1990) under Part 5 (Miscellaneous) which could
have serious implications for those on the murkier side of computing. The
Computer Misuse Act obviously needed updating, as most of the threats in
existence today were not possible 16 years ago. Maximum sentencing for
unauthorized access to computer was also used.
INTERNATIONAL CONVENTIONS ON CYBER CRIME
BUDAPEST CONVENTION
Budapest Convention on cybercrime provides for the criminalisation of
conduct, ranging from illegal access, data and systems interference to
computer-related fraud and child pornography; procedural law tools to make
the investigation of cybercrime and the securing of e-evidence in relation to
any crime more effective and international police and judicial cooperation
on cybercrime and e-evidence.
The Budapest Convention is supplemented by a Protocol on Xenophobia and
Racism committed through computer systems. In 2014, the Council of Europe
established a dedicated Programme Office on Cybercrime (C-PROC) in
Bucharest, Romania.
This triangle of common standards (Budapest Convention), follow-up and
assessments (Cybercrime Convention Committee) and capacity building (C-
PROC) represents a dynamic framework under the convention.
Members: 67 states — together with 10 international organisations (such as
the Commonwealth Secretariat, INTERPOL, International Telecommunication
Union and the UN Office on Drugs and Crime) participate as members or
observers in the Cybercrime Convention Committee.
Significance: Securing e-evidence for criminal justice purposes is particularly
challenging in the context of cloud computing where data is distributed over
different services, providers, locations and often.
jurisdictions, and where mutual legal assistance is often not feasible.
India and the Budapest Convention: While membership in the Budapest
Convention more than doubled since then, India is yet to join this treaty. As
India did not participate in the negotiation of the Convention and thus should
not sign it. India can become a member but we cannot participate in making or
changing the law.
The Budapest Convention allows for trans-border access to data and thus
infringes on national sovereignty.
It is a criminal justice treaty and thus does not cover state actors or that some of
the states from which most attacks affecting India emanate have not signed the
Convention.
It was drawn up by the Council of Europe in Strasbourg, France, with the
active participation of the Council of Europe’s observer states Canada, Japan,
South Africa and the United States. It is open for ratification even to states that
are not members of the Council of Europe. As of September 2019, 64 states
have ratified the convention.
It was drawn up by the Council of Europe in Strasbourg, France, with the
active participation of the Council of Europe’s observer states Canada, Japan,
Philippines, South Africa and the US. It was opened for signature in Budapest,
on 23 November 2001 and it entered into force on 1 July 2004.
RUSSIA-LED RESOLUTION
The Russian proposal entitled “Countering the use of information and
communications technologies for criminal purposes” was recently put forth in
the United Nations General Assembly (UNGA).
The proposal, which India voted in favour of, creates a committee to convene
in August 2020 in New York to establish a new treaty through which nation-
states can coordinate and share data to prevent cybercrime.
India maintained its status as a non-member of the Europe-led Budapest
Convention, even as it voted in favour of a Russian-led UN resolution to set up
a separate convention
This recent UN proposal follows previous Russian initiatives, including the
“Draft United Nations Convention on Cooperation in Combating Cybercrime”
in 2017 to develop a UN convention on cybercrime.
India’s Stand: India maintained its status as a non-member of the Europe-led
Budapest Convention. Although, India voted in favour of a Russian-led UN
resolution to set up a separate convention.
The United Nations has approved a Russian-led bid
that aims to create a new convention
A new UN treaty on cybercrime could render the Budapest Convention
obsolete, further alarming rights groups.
The Budapest Convention was drafted by the Council of Europe, but other
countries have joined, including the United States and Japan.
Russia has opposed the Budapest Convention, arguing that giving investigators
access to computer data across borders violates national sovereignty.
MOBILE PHONES CRIMES
Telecommunications in India have evolved up to a great extent starting from its
introduction in 1882 to the introduction of mobile technology in 1995 and then
to the emerging trend of Smartphone’s post 2005 period. Similarly, with the
advancement of technology, crimes over technological grounds have also
evolved.
Mobile technology over the years has evolved upto a large extent be it on
grounds of flexibility or portability. Security measures too have improved, but
not at the desired expected rate to absolutely curb crime rates. The fact that tops
the list is that people fail to believe that they can be victims to such crimes.
Crime committed using modern technological tools are generally known as
cyber crimes. The broadest way to deliver the true meaning of cyber crime is
“any crime wherein computer is either used as a tool or a weapon.” On general
lines, computers are considered to be of laptop or desktop in form.
KINDS OF MOBILE CRIMES
Mobile Hacking: Hacking in simple terms means an illegal intrusion into a
computer system and/or network. There is an equivalent term to hacking i.e.
cracking. Every act committed towards breaking into a mobile, communication
devices, computer and/or network is hacking. Hackers write or use ready-made
computer programs to attack the target computer, mobile and/or
communication devices.
Mobile Cyber Defamation: This kind of crime has become widely prevalent
across the world today. Criminals send derogatory, humiliative and obscene
SMS or email by using their mobiles, cell phones and communication devices,
so as to defame others and lower their reputation in the eyes of those who hold
them in high esteem.
Mobile Pornography: The Internet is being highly used by its abusers to reach
and abuse children sexually, worldwide. The internet is very fast becoming a
household commodity. As more homes have access to internet, more children
would be using the mobiles, communications devices, internet and more are the
chances of falling victim to the aggression of pedophiles. Mobile Pornography
using mobile phone could be brought specifically within the ambit of section
67B of the amended Indian Information Technology Act 2000. The said act is a
crime, punishable with imprisonment of either description for a term which
may extend to 5 years and with fine which may extend to 10 lakh rupees.
Identity Theft: Mobile phone is used for the identity theft and criminals
commit the crimes such as subscription fraud etc. using various communication
devices.
Cloning or re-chapping of mobile: A clone is an analogue mobile phone
which has been programmed to impersonate one owned by a legitimate
subscriber by using its ESN and telephone number. New types of cloned
phones are coming to the UK from the USA and Hong Kong: ‘tumbling’
phones automatically seek an identity from a pre-programmed list, and the
most recent ‘magic’phones act as their own scanners copying identities from
nearby phones in use.
Denial of service Attack: This is an act by the criminal, who floods the
bandwidth of the victim’s network or fills his e-mail box with spam mail
depriving him of the services he is entitled to access or provide.
Mobiles Virus Dissemination: A mobile virus is an electronic virus that targets
mobile phones or other communication devices. In typical mobile virus
dissemination malicious software attaches itself to other software.
Mobile Software Piracy: Theft of mobile software through the illegal copying
of genuine programs or the counterfeiting and distribution of products intended
to pass for the original.
Mobile Credit Card Fraud: The unauthorized and illegal use of a credit card
through mobile to purchase products and /or services.
Mobile Phishing: This refers to the act of targeting mobile phone users by
phishing emails that appear to come from mobile service providers. This
further includes the act of sending an e-mail to a user falsely claiming to be an
established legitimate enterprise in an attempt to scam the user into
surrendering private information that will be used for identity theft.
UNIT – 4
GENETICS TECHNOLOGIES
Environment Effect: Environment Protection Act What Are GMOs? A GMOs
(genetically modified organism) is the result of a laboratory process where
genes from the DNA of one species are extracted and artificially forced into the
genes of an unrelated plant or animal. The foreign genes may come from
bacteria, viruses, insects, animals or even humans. Because this involves the
transfer of genes, GMOs are also known as transgenic organisms.
Genetic Engineering - means the technique by which heritable materials
which do not usually occur or will not occur naturally in the organism or cell
concerned generated outside the organism of the cell is inserted into said cell or
organism. It also means the formation of new combinations of genetic material
by incorporation of a cell into a host cell, where they occur naturally as well as
an modification of an organism or in a cell by delegation and removal of parts
of the heritable material. Genetic engineering, also known as genetic
modification or genetic manipulation, is a set of techniques used to alter the
genetic makeup of organisms, including the transfer of genes between species.
This field of biotechnology allows scientists to manipulate the DNA
(deoxyribonucleic acid) of living organisms, ranging from bacteria to plants
and animals, including humans. The primary goal of genetic engineering is to
introduce specific traits or characteristics into an organism, either to enhance
existing features or to impart entirely new ones. The process of genetic
engineering typically involves the following steps:
a. Identification of Target Genes: Scientists identify and isolate the specific
genes responsible for the desired traits or functions.
b. Isolation of DNA: The target genes are then isolated from the DNA of the
organism that possesses those traits.
c. Insertion of Genes: The isolated genes are inserted into the DNA of the target
organism. This can be achieved using various methods, such as gene guns,
electroporation, or viral vectors.
d. Expression of Genes: Once the new genes are inserted, they need to be
expressed, meaning that the organism's cellular machinery uses the information
in the genes to produce the desired proteins or traits.
e. Selection and Screening: Researchers screen the modified organisms to
identify those that successfully express the desired traits. This step is crucial in
ensuring that the genetic modification was successful.
Genetic engineering has a wide range of applications across different fields:
a. Agriculture: Genetically modified crops are developed to exhibit traits such as
resistance to pests, diseases, or herbicides, as well as improved nutritional
content.
b. Medicine: Genetic engineering is used in the production of pharmaceuticals,
the development of gene therapies, and the creation of genetically modified
organisms for medical research.
c. Biotechnology: This field employs genetic engineering to produce biofuels,
enzymes, and other industrial products.
d. Environmental Applications: Genetic engineering is explored for
environmental purposes, such as creating plants that can remediate soil or water
pollution.
e. Medical Research: Genetically modified organisms, particularly mice, are
commonly used in medical research to study the functions of specific genes and
to model human diseases.
However, genetic engineering raises ethical and safety concerns, particularly when
applied to humans. The potential for unintended consequences, ecological impact, and
ethical considerations related to altering the human germline are subjects of ongoing
debate. Regulatory frameworks and guidelines are in place in many countries to
oversee the responsible use of genetic engineering technologies.
BENEFITS OF GENETIC ENGINEERING
a. The production of genetically modified crops is a boon to agriculture.
b. The crops that are drought-resistant, disease-resistant can be grown with it.
c. As described earlier, genetic disorders can be treated.
d. The diseases such as malaria, dengue can be eliminated by sterilising the
mosquitoes using genetic engineering.
e. Therapeutic cloning
CHALLENGES OF GENETIC ENGINEERING
a. The production of genetically-engineered entities may result in an adverse
manner and produce undesired results which are unforeseen.
b. With the introduction of a genetically-engineered entity into one ecosystem for
a desirable result, may lead to distortion of the existing biodiversity.
c. Genetically-engineered crops can also produce adverse health effects.
d. The concept of genetic-engineering is debated for its bioethics where
community against it argue over the right of distorting or moulding the nature
as per our needs.
REGULATIONS IN INDIA
a. Genetic Engineering Appraisal Committee (GEAC) is the biotech regulator in
India. It is created under the Ministry of Environment and Forests. Read more
about GEAC in the linked article.
b. There are five bodies that are authorized to handle rules noted
under Environment Protection Act 1986 “Rules for Manufacture, Use, Import,
Export and Storage of Hazardous Microorganisms/Genetically Engineered
Organisms or Cells 1989”. These are:
Institutional Biosafety Committees (IBSC)
Review Committee of Genetic Manipulation (RCGM)
Genetic Engineering Approval Committee (GEAC)
State Biotechnology Coordination Committee (SBCC) and
District Level Committee (DLC)
ENVIRONMENT PROTECTION ACT (1986) AND ENVIRONMENT
(PROTECTION) RULES (1986)
The Act relates to the protection and improvement of environment and the
prevention of hazards to human beings, other living creatures, plants and
property. The Act mainly covers the rules to regulate environmental pollution
and the prevention, control, and abatement of environmental pollution. The
Environment (Protection) Rules cover management and handling of hazardous
wastes, manufacture, storage and import of hazardous chemicals and rules for
the manufacture, use, import, export and storage of hazardous micro-organisms,
genetically engineered organisms or cells.
Rules for the Manufacture, Use/Import/Export and Storage of Hazardous
Microorganisms/Genetically Engineered Organisms or Cells. (notified under
the EP Act, 1986) (1989)
These Rules include the rules for pharmaceuticals, transit and contained use of
genetically engineered organisms micro-organisms and cells and
substances/products and food stuffs of which such cells, organisms or tissues
form a part, LMOs for intentional introduction into the environment, handling,
transport, packaging and identification. These rules are applicable to the
manufacture, import and storage of micro-organisms and gene technology
products. The rules are specifically applicable to: (a) Sale, storage and handling
(b) Exportation and importation of genetically engineered cells or organisms (c)
Production, manufacturing, processing, storage, import, drawing off, packaging
and repackaging of genetically engineered products that make use of
genetically engineered microorganisms in any way.
PROTECTION OF PLANT VARIETIES AND FARMERS’ RIGHTS ACT
The Protection of Plant Varieties and Farmers’ Rights Act 2001 was enacted in
India to protect the new plant varieties. Rules for the same were notified in
2003. The Act has now come into force. The Protection of Plant Varieties and
Farmers’ Rights Authority has been set up and is responsible to administer the
Act. The office of the Registrar has started receiving applications for
registration of twelve notified crops viz. rice, lentil, maize, green gram, kidney
bean, black gram, chickpea, pearl millet, pigeon pea, sorghum, field pea, bread
wheat. Under the TRIPS agreement it is obligatory on part of a Member to
provide protection to new plant variety either through patent or an effective sui
generis system or a combination of these two systems. India was therefore
under an obligation to introduce a system for protecting new plant variety.
India opted for sui generis system and enacted The Protection of Plant Varieties
and Farmers’ Rights Act 2001.
However, in many countries such plants can be protected through Breeders’
Rights, patents and UPOV Convention. Objectives of Protection of Plant
Varieties and Farmers’ Rights Act in India The objectives of the Protection of
Plant Varieties and Farmers’ Rights Act are:
a. to stimulate investments for research and development both in the public and
the private sectors for the developments of new plant varieties by ensuring
appropriate returns on such investments;
b. to facilitate the growth of the seed industry in the country through domestic and
foreign investment which will ensure the availability of high quality seeds and
planting material to Indian farmers; and
c. to recognize the role of farmers as cultivators and conservers and the
contribution of traditional, rural and tribal communities to the country’s agro
biodiversity by rewarding them for their contribution through benefit sharing
and protecting the traditional right of the farmers. More importantly this act
provides safeguards to farmers by giving farmers’ rights while providing for an
effective system of protection of plant breeders’ rights. The Act seeks to
safeguard researchers’ rights as well. It also contains provisions for
safeguarding the larger public interest. The farmer’s rights include his
traditional rights to save, use, share or sell his farm produce of a variety
protected under this Act provided the sale is not for the purpose of reproduction
under a commercial marketing arrangement.
FARMER RIGHTS
Has the same privilege with respect to a breeder of a variety
A farmers’ variety shall be entitled for registration if a declaration has been
made that the initial variety has been lawfully obtained
Can save, use, sow, resow, exchange, share or sell his farm produce including
seed of a protected variety
The farmer as such cannot sell branded seeds of a protected variety
A farmer can claim damages if the seed of the protected variety does not give
the yield as stated by the breeder.
THE BIOLOGICAL DIVERSITY ACT, 2002
Biological diversity is a national asset of a country; hence the conservation of
biodiversity assumes greater significance. The first attempt to bring the biodiversity
into the legal framework was made by way of the biodiversity bill 2000 which was
passed by the Lok Sabha on 2nd December 2002 and by Rajya Sabha on December
2002. Biological Diversity means the variability among living organisms from all
sources, including interalia, terrestrial, marine and other aquatic ecosystems and the
ecological complexes of which they are part and this includes diversity within species,
between species and of ecosystems. Biodiversity is defined as the variety and
variability among living organisms and the ecological complexes in which they occur
is measured at three levels viz., genes, species and ecosystem.
OBJECTIVES
To conserve the Biological Diversity.
Sustainable use of the components of biodiversity.
Fair and equitable sharing of benefits arising out of the use of the B.D.
A national biodiversity authority has been established by the Biodiversity Act,
2002 to regulate act implementing rules 2004 has been operationalised since
coming in to force.
CONVENTION ON BIOLOGICAL DIVERSITY: The Convention on
Biological Diversity (CBD) was negotiated and signed by nations at the
UNCED Earth Summit at Rio de Janeiro in Brazil in June 1992. The
Convention came into force on December 29, 1993. India became a Party to the
Convention in 1994. At present, there are 175 Parties to this Convention.
OBJECTIVES OF THE CONVENTION:
a. Conservation of biological diversity;
b. Sustainable use of the components of biodiversity;
c. Fair and equitable sharing of benefits arising out of the utilisation of genetic
resources.
FEATURES
Prohibition on transfer of Indian genetic material outside the country without
specific approval of the Indian Government.
Prohibition of anyone claiming an (IPR) such as a patent over biodiversity or
related knowledge without permission of Indian Government.
Regulation of collection and use of biodiversity by Indian national while
exempting local communities from such restrictions.
Measures from sharing of benefits from use of biodiversity including transfer
of technology, monitory returns, joint research and development, joint IPR
ownership etc.
Measuring to conserve sustainable use of biological resources including habitat
and species protection (EIP) of projects, integration of biodiversity into the
plans and policies of various Departments and Sectors.
Provisions for local communities to have a say in the use of their resources and
knowledge and to charge fees for this.
Protection of indigenous or tradition laws such as registration of
such knowledge.
Regulation of the use of the GMOs.
EXEMPTIONS PROVIDED IN THE ACT
Exemption to local people and community of the area for free access to use
biological resources within India.
Exemption to growers and cultivators of biodiversity and to Vaids and Hakims
to use biological resources.
Exemption through notification of normally traded commodities from the
purview of the Act.
Exemption for collaborative research through government sponsored or
government approved institutions subject to overall policy guidelines and
approval of the Central Government.
Regulation of Access to Biological Diversity
SEC. 8 NATIONAL BIODIVERSITY AUTHORITY (NBA)
Establishment of NBA - The head office of the National Biodiversity
Authority shall be at Chennai and the National Biodiversity Authority may,
with the previous approval of the Central Government, establish offices at other
places in India.
NBA consists of the following members:
a. Chairperson: an eminent person having adequate knowledge and experience
in the conservation and sustainable use of biological diversity.
b. 3 ex officio members: 01 representing the Ministry dealing with Tribal Affairs
and 02 representing the Ministry dealing with Environment and Forests of
whom one shall be the Additional Director General of Forests or the Director
General of Forests;
7 ex officio members dealing with –
a. Agricultural Research and Education;
b. Biotechnology;
c. Ocean Development;
d. Agriculture and Cooperation;
e. Indian Systems of Medicine and Homoeopathy;
f. Science and Technology;
g. Scientific and Industrial Research;
05 non-official members :having special knowledge in, matters relating to
a. conservation of biological diversity,
b. sustainable use of biological resources and equitable sharing of benefits arising
out of the use of biological resources,
c. representatives of industry, conservers, creators and know ledge-holders of
biological resources
SEC. 18 : FUNCTIONS AND POWERS OF NBA
Living Non-near Donors: In such a case, the donor is not related to the recipient
in any way and is willing to donate out of affection and attachment towards
him/her. Permission is required in such a case which is granted by the
Authorization committee by appearing in an interview.
SWAP Donors: This is suitable for cases where the near-relative donor is
incompatible with the recipient. Such a provision involves swapping of the
donor when the donor of the first pair is a match with the second recipient and
donor of the second pair is a match with the first recipient. However, is it only
permissible in the case of near-relative being the donors.
PUNISHMENT UNDER THE ACT
Sec. 18 of this Act, any person who is responsible for the removal of a human
organ/tissue with the authority of doing so can be punished with imprisonment
which can extend to 10 years and with fine which can extend to Rs. 20 lakhs. In
case that person is a medical professional, his name will be reported by the AA
to the State Medical Council to take appropriate action including removing his
name from the register of the council for 3 years for the first offense and if
he/she commits an offense subsequently, then remove it permanently.
Sec. 19, if any person involves himself/herself in the commercial dealing of
human organs then such person can be punished with imprisonment for a term
not less than 5 years but can extend to 10 years and will also be liable for a fine
which will not be less than Rs. 20 lakhs but can extend to Rs. 1 crore.
Sec. 20. If any person violates any other provision of this act, he/she can be
punished with imprisonment for a term which can extend to 5 years or with fine
which may extend to Rs. 20 lakhs.
EXPERIMENT ON HUMAN BEINGS
A clinical trial is defined as "any research study that prospectively assigns
human participants or groups of humans to one or more health-related
interventions to evaluate the effects on health outcomes."
In any field affecting man, research is necessary as it provides data to improve
situations for human beings and this laudable objective demands
encouragement and motivation at all levels of participation. In the healthcare
field, research has added complexities as it calls for experimentation on humans
which may expose them to risk. Society permits such experimental research but
demands that members of society who participate in such experiments are
protected from undue harm. However low the degree of risk, society agrees that
it cannot be dismissed or ignored. In any country, developed or developing,
where research involving humans is conducted, the ethical issue of prime
importance is how to achieve fullest protection of clinical trial participants.
Good Clinical Practice norms which contribute to these objectives have
evolved and guidelines for clinical trial professionals have been issued by
countries including India. Regulators in all countries where clinical trials are
conducted recognize the importance of these guidelines and their
implementation. That such clinical studies should be transparent is now
considered important. Clinical trials form an integral part of the drug discovery
process worldwide. Clinical trials are the set of practices required to certify a
new drug molecule as safe and efficacious for the market.
Even though we have number of legislations the important one for clinical trials
is The Indian Council of Medical Research (ICMR) - 1947(amended in the
year2002) , which was set up in order to foster a research culture in India,
improve and develop infrastructure and foster community support.
The Drugs and Cosmetics Act, The Medical Council of India (MCI) Act states
that all clinical trials in India should follow the ICMR guidelines of 2000. The
ICMR has a mechanism of review for its own institutions, and so do other
government agencies. Every doctor is governed by the MCI Act. Any doctor
doing wrong in a trial or in practice can be prosecuted and the hospital can be
closed. The MCI Act is very strong; the MCI has the power to take punitive
measures.
The Drugs Controller General of India (DCGI) is responsible for regulatory
approvals of clinical trials in India. The DCGI's office depends on external
experts and other government agencies for advice.
SEX DETERMINATION
Test Sex determination refers to prenatal or testing the gender of the fetus
before birth. With the centuries- old preference being given to male children in
the traditionally patriarchal Indian society, the birth of a girl child isn’t much of
a cause for celebration in most parts of India. Studies have shown that female
infanticide has been an ongoing practice in most parts of the country, especially
the north.
To check this situation of women being pressurized by the family to abort
female fetuses, the Indian Parliament in 1994 passed the ‘Prenatal Diagnostic
Techniques (Regulation and Prevention of Misuse) Act.
This Act bans the determination of the gender of the fetus before birth and was
enacted in an effort to narrow down the growing gender gap in numerous states
within the country. The Act was further upgraded in 2003 and called the PC-
PNDT Act [Pre-conception and Prenatal Diagnostic Techniques (Prohibition of
Sex Selection)]. This also bans sex determination, advertisements related to
preconception and prenatal determination of sex as well as the use of sex
selection technologies on the unborn child.
objectives of Pre-Conception & Pre-Natal Diagnostic Techniques Act, 1994
a. prohibit sex selection (before or after conception)
b. regulate pre-natal diagnostic techniques for detecting genetic or metabolic
disorders or chromosomal abnormalities or certain congenital mal-formations
or sex linked disorders
c. prevent misuse of such techniques for the purpose of sex determination of
female foeticide
DESIGNER BABY
A designer baby is a baby whose genetic makeup has been selected or altered,
often to include a particular gene or to remove genes associated with a disease.
This process usually involves analysing a wide range of human embryos to
identify genes associated with particular diseases and characteristics, and
selecting embryos that have the desired genetic makeup; a process known as
preimplantation genetic diagnosis. Other potential methods by which a baby's
genetic information can be altered involve directly editing the genome before
birth.
Genetically altered embryos can be achieved by introducing the desired genetic
material into the embryo itself, or into the sperm and/or egg cells of the parents;
either by delivering the desired genes directly into the cell or using the gene-
editing technology. This process is known as germline engineering and
performing this on embryos that will be brought to term is not typically
permitted by law.
Editing embryos in this manner means that the genetic changes can be carried
down to future generations, and since the technology concerns editing the genes
of an unborn baby, it is considered controversial and is subject to ethical debate.
While some scientists condone the use of this technology to treat disease, some
have raised concerns that this could be translated into using the technology for
cosmetic means and enhancement of human traits, with implications for the
wider society. In many ways, designer babies—sometimes called genetically
modified babies—are the obvious result of decades of advancing IVF
technology. Once scientists discovered how to create babies in the lab, embryo
editing to produce a healthy GMO baby (also referred to as GM baby) was
perhaps a natural next step. Scientists saw the potential to not just optimize
genes for disease prevention, but also to choose aesthetics and personality traits.
There are various technologies involved in the creation of a GM baby. One
protocol is Preimplantation Genetic Diagnosis (PGD), where embryotic genetic
defects are identified preimplantation and only embryos devoid of certain
genetic disorders are implanted. Most recently in the news is CRISPR genetic
engineering, which was originally created in the 1980’s. An evolution of the
genetic technology is known as CRISPR- CAS9. CRISPR designer babies are
created by modifying DNA fragments to prevent and correct disease- causing
genetic errors. CAS9 is a special technology which can remove or add certain
types of genes from a DNA molecule, and most recently has been used after
fertilization for gene-edited embryos.
ABORTION
An abortion is a procedure to end a pregnancy. It uses medicine or surgery to
remove the embryo or foetus and placenta from the uterus. The procedure is
done by a licensed health care professional. Every woman has the recognized
human right to decide freely and responsibly without coercion and violence the
number, spacing and timing of their children and to have the information and
means to do so, and the right to attain the highest standard of sexual and
reproductive health (ICPD 1994). Access to legal and safe abortion is essential
for the realization of these rights.
One in four pregnancies ends in abortion. Abortions include various clinical
conditions such as spontaneous and induced abortion (both viable and non-
viable pregnancies), incomplete abortion and intrauterine fetal demise.
Abortions are safe if they are done with a method recommended by WHO that
is appropriate to the pregnancy duration and if the person providing or
supporting the abortion is trained. Such abortions can be done using tablets
(medical abortion) or a simple outpatient procedure. Unsafe abortion occurs
when a pregnancy is terminated either by persons lacking the necessary skills
or in an environment that does not conform to minimal medical standards or
both.
Unsafe abortion procedures may involve the insertion of an object or substance
(root, twig, or catheter or traditional concoction) into the uterus; dilatation and
curettage performed incorrectly by an unskilled provider; ingestion of harmful
substances; and application of external force.
In some settings, traditional practitioners vigorously pummel the woman's
lower abdomen to disrupt the pregnancy, which can cause the uterus to rupture,
killing the woman. Women, including adolescents, with unwanted pregnancies,
often resort to unsafe abortion when they cannot access safe abortion.
The Medical Termination of Pregnancy (MTP) Act, enacted in 1971 in India, is
a crucial legal framework that governs the termination of pregnancies in the
country. The primary objective of this legislation is to regulate and facilitate
safe and legal abortions to protect the health and well-being of women. The
MTP Act, with subsequent amendments, outlines the conditions under which a
pregnancy can be terminated and the procedures to be followed.
The major sections of the MTP Act include:
a. Conditions for Abortion (Section 3): This section specifies the circumstances
under which a pregnancy can be terminated, including risks to the physical or
mental health of the woman, the risk of a child being born with physical or
mental abnormalities, and cases resulting from contraceptive failure or
unintended pregnancies in rape victims.
b. Authorization of Abortion (Section 4): According to this section, a registered
medical practitioner is authorized to perform abortions. However, the procedure
must be carried out in a registered medical facility approved by the government.
c. Time Limits for Abortion (Section 3(2)(b) and Section 5): The MTP Act sets
a gestational limit for abortions, generally up to 20 weeks. However, exceptions
are allowed beyond 20 weeks if there is a risk to the life of the pregnant woman
or if the fetus shows substantial abnormalities.
d. Consent (Section 3(3)): The Act emphasizes the importance of obtaining the
woman's consent before performing an abortion. In the case of a minor, the
consent of a guardian is required.
e. Confidentiality (Section 5): The MTP Act ensures the confidentiality of the
woman undergoing an abortion. Medical practitioners are prohibited from
revealing her identity without her explicit consent.
f. Prohibition of Sex-Selective Abortions (Section 6): The Act prohibits the
disclosure of the sex of the fetus, and abortion for the sole purpose of sex
selection is strictly prohibited.
CLONING
Cloning, the process of generating a genetically identical copy of a cell or an
organism. Cloning happens often in nature—for example, when a cell replicates
itself asexually without any genetic alteration or recombination. Prokaryotic
organisms (organisms lacking a cell nucleus) such as bacteria create genetically
identical duplicates of themselves using binary fission or budding.
In eukaryotic organisms (organisms possessing a cell nucleus) such as humans,
all the cells that undergo mitosis, such as skin cells and cells lining the
gastrointestinal tract, are clones; the only exceptions are gametes (eggs and
sperm), which undergo meiosis and genetic recombination.
Reproductive cloning is defined as the deliberate production of genetically
identical individuals. Each newly produced individual is a clone of the original.
Monozygotic (identical) twins are natural clones. Clones contain identical sets
of genetic material in the nucleus—the compartment that contains the
chromosomes—of every cell in their bodies.
Thus, cells from two clones have the same DNA and the same genes in their
nuclei. All cells, including eggs, also contain some DNA in the energy-
generating “factories” called mitochondria.
These structures are in the cytoplasm, the region of a cell outside the nucleus.
Mitochondria contain their own DNA and reproduce independently. True clones
have identical DNA in both the nuclei and mitochondria, although the term
clones is also used to refer to individuals that have identical nuclear DNA but
different mitochondrial DNA.
ARTIFICIAL REPRODUCTIVE TECHNOLOGIES
Assisted reproductive technology (ART) is used to treat infertility. It includes
fertility treatments that handle both a woman's egg and a man's sperm. It works
by removing eggs from a woman's body. The eggs are then mixed with sperm
to make embryos. The embryos are then put back in the ART procedures
sometimes use donor eggs, donor sperm, or previously frozen embryos.
It can be prevented or minimized by limiting the number of embryos that are
put into the woman's body.
Types of ART:
a. Show Ovulation induction (OI)
b. Show Artificial insemination or IUI
c. Show In-vitro fertilisation (IVF)
d. Show Intracytoplasmic sperm injection (ICSI)
e. Show Preimplantation genetic testing (PGT)
f. Show Surrogacy
Surrogacy under ART Act
The (ART) Act in India, enacted in 2010, governs various aspects of assisted
reproductive technologies, including surrogacy. The ART Act outlines the legal
framework for surrogacy arrangements, with the primary goal of protecting the rights
of all parties involved. According to the Act, a surrogate mother is defined as a woman
who agrees to bear a child for another person or couple through the use of assisted
reproductive technology. The ART Act requires that the surrogacy process adheres to
certain ethical and medical standards. It mandates the establishment of an ART clinic
that must be registered with the appropriate authority. Key aspects of surrogacy under
the ART Act include:
Eligibility Criteria (Section 4): The Act specifies eligibility criteria for
intending couples seeking surrogacy, ensuring they meet certain medical and
legal requirements. It also outlines the conditions under which a woman can
become a surrogate mother.
Rights and Obligations (Section 5): The rights and obligations of the
surrogate mother and the intending couple are clearly defined in the ART Act.
The surrogate mother retains the right to medical care and the right to refuse
termination of pregnancy except in cases of life-threatening situations.
Compensation and Expenses (Section 6): The Act allows for reasonable
compensation to be paid to the surrogate mother, but commercialization or
profiteering from surrogacy is prohibited. The compensation is meant to cover
the medical expenses, insurance, and other related costs.
Insurance Coverage (Section 17): The ART Act mandates that the surrogate
mother is provided with comprehensive insurance coverage for any medical
complications arising during the pregnancy and childbirth.
Parentage and Legal Status (Section 13): The Act addresses the issue of
parentage, ensuring that the child born through surrogacy is legally recognized
as the biological child of the intending couple, with no rights accruing to the
surrogate mother.
Regulation and Registration (Chapter III): The ART Act establishes the
National and State Boards to regulate and supervise assisted reproductive
technology clinics. The Act also mandates the registration of all ART clinics,
ensuring compliance with ethical and legal standards.