Professional Documents
Culture Documents
Unit-II: E-Commerce
a) Model Law of E-Commerce
b) Online Contracting
c) Jurisdiction Issue in E-Commerce
d) Digital Signature/Electronic Signature
e) E-payment, E-Banking
INDUSTRIAL REVOLUTION
Industrial Revolution is the process of change from an agrarian and handicraft economy
to one dominated by industry and machine manufacturing. These technological changes
introduced novel ways of working and living in fundamentally transformed society.
The term industrial revolution describes a historical period which started in 18th century
at the time of Great Britain where the pace of change appears to be speed up.
The process of technical innovation brought about a lot of new tools and machines. It
also involves more practical improvements in various fields affecting labour,
production and resource use.
The word "technology" is derived from the Greek word “techne” which means art or
craft.
The First Industrial Revolution began in the 18th century through the use of steam
power and mechanisation of production.
By the 1830s and 40s, the Industrial Revolution began in Britain and spread to the rest
of the world, including the United States.
That iron and textile industry became the mainstay of industrial revolution and the
process went in hyperdrive with the development of steam engine and ships.
Some of the innovations of the first industrial revolution: - Steam engine, Spinning,
Telegraph, Cement and Modern roads etc.
The Second industrial revolution began in the 19th century through the discovery of
electricity and mass production.
That is, large scale machines were brought into the picture. And there was rapid
advancement in the steel, electric and automobile industries.
The industrial revolution spread in all corners of the British Empire and took roots in
the United States in the 1860s, after the American Civil War (1861-65). This part of the
revolution is called the Second Industrial Revolution.
The Third Industrial Revolution began in the middle of 20th century through partial
automation using controls and computers.
Since the introduction of these technologies, we are now able to automate an entire
production process without human assistance.
It is seen that each revolution took about a hundred years to establish and then give way
to the next revolution.
Building on the foundation given by the third Industrial Revolution, the fourth Industrial
Revolution is moving from an electronic based industry to a process which is the
combination of human beings and electronics.
It includes cyber-physical systems, the Internet of things, big data analytics, cloud
computing, artificial intelligence, 3-D printing, and autonomous vehicles etc.
The best example would be artificial intelligence that has broken the distinction between
the Man, The Machine and Intelligence.
India was famous for handicrafts from the pre-British times. In Mughal periods the
variety of handicrafts became famous in the global market.
However, the Industrial Revolution came late to India and that was mainly because of
India’s complicated political and economic relations with Britain.
India dominated the cotton textile market in the 18th century. It took a severe hit
when the Industrial Revolution began in England.
The use of steam power in British mills reduced the cost of cotton by 85 %.
In order to protect its domestic industry, it began to restrict textile imports from
India. On the other hand, it started to export textiles to India.
British protectionist laws led to deindustrialization in India.
The new colonial law forced the farmers to grow cash crops like cotton instead
of food crops, leading to famine and poverty.
The term commonly refers to technologies that are currently developing or that are
expected to be available within next 5 to 10 years.
Emerging technologies are technologies that are perceived as capable of changing the
status. These technologies are generally new but include older technologies.
Emerging digital technologies have generated new opportunities which creates new
legal challenges, particularly related to copyrights trademarks patents commercials and
licensing.
Technologies can increase productivity to help countries compete with other countries
in selling goods and services.
In today’s world we are currently using some emerging technology from our recent past
and global position system. It plays an important role by providing information to keep
us safe by tackling a movement and by providing accurate time and distance
information.
Technology has transformed the way we live in small daily way that changed the lives
of the people to serve the country.
LEGAL ORDER AND TECHNOLOGICAL INNOVATION
Humans are prone to make errors like if a judge delivers inappropriate judgment, any
lawyers commit mistakes during the litigation process or any law students have
provided a false interpretation of case law during the research process, such errors are
non- bearable in a field of law.
Aforesaid errors are possible to avoid, only when we are capable of transforming the
legal profession in India to “Legal-Tech Profession” and able to replace human
intelligence with machine intelligence.
Laws can’t be constant with the changing culture and society. Therefore, technology
plays a very important role to keep us updated with changes in law. Android
Applications (Apps) and websites are not only for entertainment or commercial
purposes, but can also be fruitful for the legal profession. Artificial Technology aims to
make citizen’s tech savvy for the India Legal System.
Technology has been playing a vital role in the legal industry. It has increased the
efficiency of legal officers and productivity of clerical workers. With the advent of legal
tech, there is greater transparency between legal firms and clients. Clients know how
much fees they have to pay and can keep track of day-to-day progress of the lawyer on
their case. Also, there is no doubt that technology, if used correctly, is fast and efficient,
more than any human individual.
Law Firms endeavour to provide legal services to their clients digitally through video
conferencing or calls, which perhaps is more time-saving, reliable and cost effective for
everyone.
Electronic case management has also changed how documents are handled. Firms are
now storing large case files electronically and employing databases to track, edit,
search, distribute, and archive documents.
BETTER RESOURCE MANAGEMENT
Earlier, junior attorneys were recruited to perform odd jobs like storing, managing titles,
or informing lawyers about their daily schedule. This not only makes them disinterested
in the process, but also makes senior attorneys wonder how to use their potential in a
better way.
The legal title management and calendaring applications perform all the tasks
associated with titles along with giving them quick insights of what all tasks they have
to do on that particular day. This gives senior attorneys an opportunity to use the
resources (here, junior attorneys) in a better and effective way. Consequently, resulting
in better outcomes.
Technology is a key instrument for law students doing Research and data analysis in
legal education. Legal Research is considered as an important ingredient of law. From
a student starting career in law to Supreme Court judges, research is something they
can’t get away from. Legal Research includes data analysis and interpretation of various
judgements, Statues, acts etc.
Earlier research work was done only by reading books and various bare acts in a library.
Therefore, Technology comes to the rescue this by providing E-Libraries and various
legal research platforms like Manu Patra, SCC, Lawyers Club India, Indian Kanoon etc.
Various law Colleges grant free access of these apps and websites to students.
Technology has given education a new structure and wider scope. Education in colleges
is not confined to classrooms, libraries and paper tests; use of technology has placed
more emphasis on co-curricular activities like legal blogs, essay writing competitions,
call for papers, online internships and online quiz with respect to provide greater career
opportunities to law students.
TECHNOLOGY IN THE COURTROOM
E-filing means filing documents electronically with the court has now become very
common and Courts are posting court filings on web-based databases which allows
counsel to access court documents easily.
Built-in monitors and equipment facilitate the use of trial presentation software and
other technology in the courtroom.
E-DISCOVERY
This database technology allows legal professionals to image, code, analyse, review,
and manage the massive amounts of electronic evidence, a process called “electronic
database discovery” (EDD).
The regular and wide use of technology has also impacted the needs and demands of
the people. Technology can be used to perform different and routine tasks in an
individual’s life including traveling, communication, learning, business or comfort
ability.
However, people are getting more concern due to increase in use of technology even
after its wide benefits. The poor application of technology resulted in the creation of
more pollution to the environment, which is a serious threat to the lives and property of
the people of the society. It requires the proper and significant use of the technology.
Although technology improves the lifestyle of human being, it also a major concern for
the future generations.
Nowadays, people are excessively using technology which reduce their physical
activities that directly affect their health. Also, due to the excessive use of technology
there are so many cybercrimes happens every day in which someone steals the identity
or personal information of the victim, such as Unique ID number, PAN number, Debit
Card, etc., and uses it to conduct a crime or fraud without our permission.
Why people consider the use of technology harmful? Technology is not harmful to the
individual or to the society, it is the people itself who are creating misuse of the
technology and named it harmful for their own benefits.
Technology is used by humans to explore, connect, study, and do work. The manner in
which we use technology decides whether its effects are beneficial or detrimental for
society.
5. Easy to access information: We can easily access information via the internet
anytime and anywhere. Most of the information is present on the internet are free
of cost, so we can use them to enhance our knowledge, skills, etc.
1. Resource Depletion: Due to increase in demand of the latest and the new
technologies, more pressure on the earth and its natural resources have been
created. There are various numbers of computers and mobile phones that are
manufacturing on the regular basis.
With the increasing demand, manufactures like Samsung or Apple are getting
benefits but the sustainability of these demands requires the exploitation of our
natural resources including aluminium. If these ages continue, there will be time
when our future generation has to go through with several problems.
4. Increase in pollution: Not only humans but technology also affecting our
environment. Due to vehicles and machinery, the rate of pollution is increasing
continuously which causes global warming, etc.
6. Increase in cybercrimes: Due to the excessive use of the internet, the rate of
cybercrimes is also increased. Some people (attackers) harm innocent people
(victims) or children for money or fun.
IMPACT OF TECHNOLOGY ON POLITICS
One of the ways in which technology influences politics is the financial side.
Raising funds to use for campaigning is an important factor for political
candidates. This is a major hurdle experienced by political candidates. By
broadcasting through technological marketing, candidates get suitable donors to
support different parts of their campaigns.
More recently, social media has emerged to become one of the main areas of
influence for politics, where millions of users are able to learn about politicians'
policies and statements, interact with political leaders, organize, and voice their
own opinions on political matters.
The Internet enables politicians to use podcasting. The act of podcasting can
make anyone a journalist. Through podcasting, politicians are able to portray a
journalistic stature, thereby ensuring that the information is credible. It is,
however, difficult for politicians to guarantee the integrity of the information
posted. The Internet can be accessed by anyone and podcasts can be posted by
anyone. All in all, gaining political publicity through podcasts is common but
expensive method to use.
Another way to look at the matter is the Internet which is the tool for free
advertising. Political videos easily generate online rating gains, and such
political Internet advertisement will reach the target audience if launched
properly. Individuals perform the needed publicity as each person shares the
video, and so on.
It is clear that gaining political publicity through the use of technology has
become easier, especially since technological devices are so accessible and
widespread.
However, with the use of the Internet, any political figure can become
recognizable within just a few minutes. In only a few hours, public opinion on a
particular political figure is already formed within one of the social groups of
voters. Not just the good, but also a bad reputation can be formed in a blink of
an eye using modern technology. It often happens that the bad “gossip” spreads
much faster.
It refers to the mental attitude of post-modern man that influences the lifestyle
of the people at varying degree.
Every technological invention has got both positive and negative impacts on the
society. Like Einstein while giving the nuclear power theory as has never
expected that his discovery shall ever be used for such a devastating destruction
at Hiroshima and Nagasaki.
For example, technology provides easier and efficient means of storage and
retrieval of information but at the same time suffers from piracy of copyrighted
materials, software, data, music, video etc. at large scales.
Internet provides instant access to all sorts of useful information at fingertip but
at the same time suffers from plagiarism, illegal uploading, downloading,
copying, stealing and misuse of intellectual property.
Technology has created high-end job opportunities for the techies in one hand
and on the other hand has created severe unemployment among non-tech groups.
Internet has made the whole world a small intellectual village but at the same
time is polluted with horrid contents like pornography, spam, worms, and
viruses.
Therefore, it is high time now for careful inspection of the legal and ethical
aspects of technology as there are not enough guidelines available in this field as
compared to those available in conventional branches of science and technology.
More importantly, now technology is not limited to the scientists and software
engineers alone, rather it has become a widespread phenomenon, affecting
people at various stages in their role, as customers, service provider, participants,
middlemen etc.
With the increasing identity theft rates in India, the Information Technology Act
of 2000 is being tightened. According to IT amendment Bill 2006, identity theft
is made an offence punishable with up to five years of imprisonment and a fine.
Another most common type of cyber scam of today is phishing in which the
criminals send bogus emails convincing the user into giving up personal
information at fake websites that resemble those of legitimate financial
institutions and other commercial outfits.
UNIT-II: E-COMMERCE
MODEL LAW OF E-COMMERCE
Electronic commerce (e-commerce) refers to companies and individuals that buy
and sell goods and services over the Internet.
The model law is not a comprehensive. It does not intend to govern every aspect
of electronic contracting. It adopts a limited framework approach and enables and
facilitates e-commerce.
The MLEC was the first legislative text to adopt 3 fundamental principles that are
widely regarded as the founding elements of modern electronic commerce law.
MODEL LAW
MLEC also establishes rules for formation and validity of e-contracts, for data
message attribution, for receipt acknowledgement and for determining receipt of
data messages, etc.
Article 2 of the Law provides six definitions, the most important one is of “Data
message”. It is defined as information generated, sent, received, or stored by
electronic means. This broad definition includes a view of the record and even
revocation and amendment.
The sphere of application that Article 1 talks about, is for the information in the
form of data messages, in the context of commercial activities.
Article 3: The Model Laws give the interpretational tools which call for a standard
of international origin and uniformity in application of general principles of law.
Article 8 (Notion of originality): It provides that data messages can fulfill the
legal requirement of presentation and retention of information in its original form
subject to the assurance of integrity and presentability of data messages.
Presentability meaning the ability to display the information where required.
Article 12: Acknowledgement in the form of receipt of data messages has also
been granted legal validity.
Article 13: The data message is attributed to the originator if it is sent by him or
by a person authorised by him.
Article 14: It provides that the receipt of the data message and its
acknowledgement can also be agreed upon by the parties beforehand.
Article 15: The transaction proceeds when the information goes out of control of
the sender. The place of dispatch is the place of business, and the time is when
the acceptance enters the system of the addressee.
Articles 16 & 17 talks about carriage of goods and transport documents: They
enforce the ability to achieve carriage of goods by the means of data messages
and fulfillment of the requirement of transport documents through the same as
well.
CONCLUSION
The Model Law of E-Commerce was adopted to facilitate the international trade
through electronic modes of communication. It aimed at encouraging national
legislators to adopt a set of internationally acceptable rules regulating e-
commerce.
Different states enacted laws based on the principles of this Model Law. Thus,
the courts have interpreted the provisions of their domestic laws according to the
Model Law.
Thus, the Model Laws became the basis for several legislative texts enacted by
various governments across the globe and it gave a uniformity to the laws
concerning the information communicated by the electronic mode of
communication.
ONLINE CONTRACTING
Online contracts refer to contracts that are created and signed over the Internet.
These are also referred to as electronic contracts or e-contracts.
These contracts provide a fast and a convenient way for individuals and
organizations to enter into legally binding agreements with other parties. They
are now being used for a wide range of purposes, from consumer and business
agreements to government filings.
ELECTRONIC CONTRACT
In case of an online contract, the seller who intends to sell their products, present
their products, prices and terms for buying such products to the prospective
buyers. In turn, the buyers who are interested in buying the products either
consider or click on the ‘I Agree’ or ‘Click to Agree’ option for indicating the
acceptance of the terms presented by the seller or they can sign electronically.
Electronic signatures can be done in different ways like typing the name of the
signer’s in the specific signature space, copying and pasting the scanned version
of the signature.
Once the terms are accepted and the payment is made, the transaction can be
completed. The communication is basically made between two computers
through servers.
Online Contract is modelled for the sale, purchase and supply of products and
services to both consumers and business associates.
Normally, these kinds of contracts are made for speedy entering into a contract.
These types of contracts perform the best role where the parties of the contract
live in the different places of the world and it is very tough to meet in reality due
to far distance. They can make contracts easily and fulfil their requirement online.
If either of the party wants to recall the terms of the contract which they forget,
they can easily read it again in just a few clicks.
The e-contract takes its legal authority from section 10A of the IT act. It says that
“E-contracts, which follows the essentials of a valid contract and made
electronically, shall be enforceable by law”.
In the case of the State of Delhi vs Mohd. Afzal and others, the court held that the
electronic pieces of evidence are admissible as evidence in the court.
E-CONTRACT EXAMPLES
NATURE OF E-CONTRACT
ESSENTIALS OF E-CONTRACT
The essentials of E- Contracts are almost the same as the essentials of a valid
contract which are as follows:
7. Free consent: The consent taken by all the parties to make the contract
must be free consent. Consent has to be free and genuine and not induced
by misrepresentation, undue influence i.e., a case where one person is in a
position to dominate the will of another.
In case of online contract there is a narrow scope of physical
communication between the website and the customer availing their
service, they just give consent by clicking the option that ensures free and
genuine consent.
1. Shrink-wrap agreements
The term “shrink-wrap” refers to the plastic wrapping which covers
the software boxes. This wrapping can be understood as the legally
enforceable terms and conditions. As soon as the user removes that
wrapping, he is entering into a contract.
In simple words, a shrink-wrap agreement is a licensing agreement
containing some terms and conditions packaged with the product.
The customer automatically gives his consent when he uses the
product.
It is a sort of unsigned undertaking given by the customer while
submitting to the terms and conditions.
Following are the terms and conditions which can be made through
the Shrink-wrap agreements-
License
Fees and payments
Warranties
Limitations of liability
Sometimes additional terms can be observed only after loading the
product on the computer and then if the buyer does not agree to those
additional terms, then he has an option of returning the software
product. As soon as the purchaser tears the packaging or the cover
for accessing the software product, shrink-wrap agreement gives
protection by indemnifying the manufacturer of the product for any
copyright or intellectual property rights violation. Though, in India,
there is no stable judicial decision or precedent on the validity of
shrink-wrap agreements.
2. Click- wrap agreements
These are web-based agreements which require the consent of the
user by way of clicking “I Agree’ or “I Accept” or “Ok” button on
the dialog box.
In click –wrap agreements, the user basically have to agree to the
terms and conditions for usage of the particular software. Users who
disagree to the terms and conditions will not be able to use or buy
the product upon cancellation or rejection.
A person witnesses web-wrap agreement almost regularly. The
terms and conditions for usage are exposed to the users prior to
acceptance. For agreement of an online shopping site etc.
VALIDITY OF E-CONTRACTS
In the eyes of the law, the E-contract is also considered as any other
physical contract. This is also governed by the Indian contract act.
Therefore, the validity of an e-contract in India will depend if it is
satisfying all the essentials of a valid contract.
The Information Technology Act, 2000 has made certain provisions for the
validity and the formation of online contracts but no specific legislation
has been incorporated for the validity of online contracts in India. Even if
no specific provision is made for the validity of online contracts, it cannot
be challenged based on technical grounds.
Like in case of browse wrap contracts, we usually accept the terms and
conditions of the contract by clicking the button that indicates ‘I Agree’
and in case of shrink wrap contract or purchase of a software product,
assent is given by the consumer or the purchaser with tearing of the
wrapper and using it.
Many of us have the tendency of not reading the terms and conditions
carefully before agreeing to such. But these actions should be taken
consciously and carefully only after reading the terms of the contract
properly as it leads to a valid contract and the terms can be strictly enforced
against them.
And as per Indian Evidence Act any e- mail communication and other
communication made electronically is recognized as valid evidence in a
Court of law.
Several laws such as The Indian Contract Act, 1872, Information
Technology Act, 2000, Indian Copyright Act, 1957 and the Consumer
Protection Act, 1986 to some extents are working and acting on resolving
issues that arise relating to the formation and validation of online contracts.
The Information Technology Act, 2000 is the Act that governs the
transactions conducted over internet and explains the considerable mode
of acceptance of the offer and provides the rules for revocation of offer and
acceptance in a vague or indefinite manner. Hence, a separate law for
regulating contracts based on electronic devices is highly recommended.
There is no specific rule in case of breach of online contract but the rules
regarding remedies for breach of contract can be followed as provided in
The Indian Contract Act. The Contract Act mainly talks about two
remedies for the breach of contract such as Damages and Quantum Merit.
But few other remedies are also available as provided in the Specific Relief
Act such as specific performance of contract and injunction restraining the
other party from making a breach of contract
Section 85A, 85B, 88A, 90A and 85C of the Indian Evidence Act deal with
the presumptions as to electronic records.
Sec 85A has been inserted later to confirm the validity of electronic
contracts. It says that any electronic record in the form of electronic
agreement is concluded and gets recognition the moment a digital signature
is affixed to such record.
The presumption of electronic record is valid only in case of five years old
record and electronic messages that fall within the range of Section 85B,
Section 88A and Section 90A of Indian Evidence Act.
E-commerce plays a vital role in nearly every sphere of life - by simply just a
click of the mouse we can pay our electricity/telephone bills, do online shopping,
transfer money to persons in different parts of the globe, conduct business deals
etc. An online transaction may be explained as a way of conducting business by
utilizing computer and telecommunication technology to exchange data or
conduct business. However, this boom in internet transactions has brought a lot
of issues regarding jurisdiction of such transactions.
The primary question that needs to be addressed is "when a transaction
takes place online, where is the contract concluded?"
Justice S. Murali Dhar has stated that the traditional approach to jurisdiction
invites a court to ask whether it has the territorial, pecuniary, or subject matter
jurisdiction to entertain the case brought before it. With the internet, the question
of 'territorial' jurisdiction gets complicated largely on account of the fact that the
internet is borderless.
The rules formed under IT Act, 2000 define that the e-commerce websites
operating in India are intermediaries, and therefore need to do due diligence
pertaining to the cyber law.
The preamble to The Information Technology Act, 2000 outlines the need
to provide legal recognition to E-Commerce transactions and is also
applicable to offences committed outside India which involves a computer
system or network located in India. The act recognizes electronic mode of
communication as a tool for enforcement of valid contracts across the
country.
Illustration: If a person residing in UK commits a fraud through an e-commerce
website, then this person can be prosecuted in India under the Information
Technology Act, 2000.
Section 13 (3) which provides that: "Save as otherwise agreed between the
originator and the addressee, an electronic record is deemed to be dispatched at
the place where the originator has his place of business, and is deemed to be
received at the place where the addressee has his place of business.
The Indian Penal Code, 1860 states that any person liable by Indian law commits
an offence outside the territory of India, he shall be held liable in the manner as
if such act had been committed within the territory of India.
# SMC Pneumatics vs. Jogesh Kwatra, the Delhi High Court has assumed extra
territorial jurisdiction where a corporation was being defamed through emails.
Section 19: Where a suit is instituted for compensation on account of wrong done,
if such a wrong was committed within the local limits of the jurisdiction on one
court and the defendant resides in or carries on business, within the local limits
of the jurisdiction of another court, the suit may be instituted at the option of the
plaintiff in either of the courts.
Section 20: The Code of Civil Procedure provides for institution of proceedings
in a court within whose jurisdiction the defendant resides or the cause of action
arises.
ANALYSIS
There are basically two main theories of jurisdiction. In rem and in personam
jurisdiction.
In Rem Jurisdiction
Example: A trademark holder in India files an in-rem action against the Internet
domain names themselves, on the ground that domain names incorporating their
famous trademarks violates the Trade Marks Act, 1999 and are subject to
cancellation and transfer to the trademark owner. Such in rem complaint does
lack personal jurisdiction and would raise statutory concerns. The present E-
commerce law in India has deficits to deal with such situation.
In Personam Jurisdiction
In Personam means related to person. Sections 19 and 20 of the CPC provide for
the jurisdiction of courts where a civil suit could be filed and defended when a
person commits or is defending a tort. These sections provide jurisdiction when
tort arises out of contract.
#In World Wrestling Entertainment, Inc. v. M/s. Reshma Collection & Ors., the
Appellant was a company registered in the United States of America and the
Respondent was a company from Mumbai. The suit was decided by a single
bench of Delhi High Court and while overturning the order of a single judge, it
held that jurisdiction in e-commerce cases involving trademark and copyright
disputes would be determined by the buyer’s place of residence.
This clearly shows that the current laws in India relating to e-commerce lack
prescription in any form of enactments to establish a specific jurisdiction to deal
with the matters pertaining to the infringements on the intellectual property rights
during e-commerce activities. That is, when there is a transition of In Rem
jurisdiction to In Personam jurisdiction, as it happened in World Wrestling
Entertainment, Inc. v. M/s. Reshma Collection & Ors, the laws in India lack
specific enactment.
ELECTRONIC SIGNATURE
Sec 2(ta) of Information Technology Act 2000 defines electronic signature as:
“Authentication of any electronic record by a subscriber by means of the
electronic technique specified in the second schedule and includes digital
signature.”
1. Unsecured Signature
Email Signature– Just typing one's name at the end of an email or sending
a message on letterhead. They can be easily forged.
Web Based Signature– Web-based clickwrap contracts create a lot of
difficulties in E-Commerce. The acceptance is made by clicking a single
button. Such a signature doesn't do anything about the identity of the
sender.
DIGITAL SIGNATURE
A digital signature is a kind of electronic signature that is used to verify the name
of the sender of a message or the signer of a document. It makes sure that the
document or message is genuine and the documents that are sent are untouched.
The person who receives the electronic message or document is able to realise
who is the sender of the message. The digital signature makes it possible to verify
the name of the person signing the message digitally.
The receiver of the electronic message will be able to know whether he/she has
received the original document or whether the document has been altered before
the receipt or not.
Non- Repudiation
The sender of the message cannot refute the contents of the electronic message
and cannot deny that he/she had never sent the message.
Message Digest
Encryption: The process of transforming the plain message into a cipher text.
Types of Encryptions
1. Symmetric Encryption
There is only a single key known to both the sender and the receiver. Under this
system, the secret key or the private key is known to the sender. This secret key
is used for both encryption and decryption of the message.
2. Asymmetric Encryption
The message is encrypted by the private key of the sender, on the contrary,
decryption can be done by anyone who is having the public key.
It is also known as the ‘principle of irreversibility’ i.e., the public key of the
sender is known to many users, but they do not have access to the private key of
the sender which bars them from forging the digital signature.
SYMMETRIC
ASYMMETRIC
ADVANTAGES OF DIGITAL SIGNATURE
It means that an electronic document signed will be legally valid, which stands in
court just like any other paper document.
The digital signature is created using algorithms within a digital certificate issued
to the signer after doing analysis by Certifying Authority. The signer is the true
authorizer of his authentication (signature).
New businesses and governments are welcoming the concept of digitally signing
the document to make or have paperless transactions. With the implementation
of e-signature, the entire process has become convenient, effective, has reduced
the cost, and documents are secured.
Any digital document that is digitally signed can be traced effortlessly and located
in a short time.
Time stamping will allow the digital signature to give a clear indication of when
the document was signed.
SPEED
With e-signatures, it has become easy for the parties to sign any documents with
a digital signature, as they don’t have to wait for the paper document to receive it
from the courier. Any contract can be signed by the concerned parties instantly
no matter where they are geographical.
EXPIRE
Just like any other electronic device or technology it’s based and dependent on
the technology. In times of rapid growth of sophisticated technology, many such
products have a short life.
SOFTWARE
The sender and the recipient have to purchase the verification software for the
working of digital signature.
COMPATIBILITY
The standards of digital signature are different and most of them are contradictory
to each other and create confusion while sharing digitally signed documents.
Digital signatures are becoming very popular in the whole world. Digital
signatures are created and issued by qualified individuals. For anyone to get a
valid digital certificate, they must get it from a certifying authority (CA).
6. Verification: The recipient uses the sender's public key for verification of
sender's digital signature. The recipient also computes the hash result by using
the same hash function as was used for creation of digital signature. The recipient
then decrypts the digital signature by using sender's public key. If this hash result
is the same as the hash result received from the sender, receiver can be sure that
no tempering has been made in the original message. Any tempering with the
contents of electronic records invalidates the digital signature immediately.
TYPES OF DSC
Class 1 Certificate:
Class 2 Certificate:
These certificates will be issued for both business personnel and private
individuals use. These certificates will confirm that the information in the
application provided by the subscriber does not conflict with the information in
well-recognized consumer databases.
Class 2 DSC can be used by them for Income Tax Returns (ITR), GST Returns
(GSTR), and other government e-forms.
Class 3 Certificate:
Class 3 DSC is issued by the certifying authorities to a person or entity who wants
to participate in the e-auction and online tenders.
Important Points to Note regarding DSC
S.
Electronic Signature Digital Signature
No
It has been defined under Section It has been defined under Section
1. 2(1) (ta) of the Information 2(1)(p) of the Information Technology
Technology Act, 2000. Act, 2000.
It is easily vulnerable to
9. It is more secure and highly reliable.
tampering.
E-PAYMENT
The various types of e-payment include credit and debit cards, mobile wallets,
UPI, internet and mobile banking, and many more. You simply require a bank
account and an internet-enabled device to pay for various products and services.
Electronic Payment is a financial exchange that takes place online between buyers
and sellers. An E- payment system is an online system that facilitates the
acceptance of electronic payment for online transactions and any kind of non-
cash payment that doesn't involve a paper cheque.
The electronic payment system has grown increasingly over the last decades due
to the widely spread of internet-based banking and shopping. As the world
advance more on technology development, a lot of electronic payment systems
and payment processing devices have been developed to increase, improve and
provide secure e payment transactions while decreasing the percentage of cheque
and cash transaction.
TYPES OF E-PAYMENT
It is used when you pay a bill through a regularly scheduled direct debit from
your account. This type of payment plan is commonly offered by car insurance
companies, phone companies and loan management companies.
Your bank must offer a service called online bill pay where you log on to the
bank's Web site, enter the vendor's information and authorize the bank to
electronically transfer money from your account to pay their bill. User can choose
whether to do this manually for each billing cycle or have their bills automatically
paid on the same day each month.
Advantages of e-Payment
Time-Saving
Cashless Economy
Security
Cash transactions bring their own set of risks, such as robbery, misplacement, or
other similar incidents. However, electronic payment systems come equipped
with security protocols that ensure the safety of your funds. Banks use highly
secure practices like two-factor authentication, PIN (Personal Identification
Numbers) and OTPs (One Time Passwords) to protect your funds from thefts or
fraudulent activities.
Certainty
The payments made using e-payment methods reflect in your bank statement or
digital wallets. You also receive instant e-mails and SMS alerts after every
transaction. You can check for the credit/debit of funds in your account based on
the chosen method of e-payment. In case funds are debited wrongly, the
transaction is reversed within 24-48 hours.
Reaching global audience
Better Deals
As people are getting more indulged in e-payments, almost every payment service
provider has started giving exciting offers helping people get good deals.
Disadvantages of e-Payment
Service Fees
Many a time while using e-payment services we are liable to pay service fees or
a convenience fee which adds to our expense. Payment gateways and 3 rd party
payment processors charge service fees.
Technical Problems
As it is an online service, it may go down due to technical issues and people who
get 100% reliable on this service for their payments may face an issue.
Security Concerns
If you are a registered user with a website who uses online payments often, there
are high chances that the online portal can have access to your personal
information or bank account details. By using e payment ID thefts, phishing
attacks, and database exploits are becoming more common.
Disputed transactions
If you find someone using your electronic money, you can file a complaint with
your bank or online payment processor. However, if you are unable to find the
personal details of the person or for that matter, any details about them, then you
cannot file a complaint or receive a refund. It gets tricky in such situations.
Some banks limit the number of transactions you can do in a day or the maximum
amount you can transfer in a day. Most online transactions also have a time limit
under which you need to complete the process (like receiving and accepting
OTPs). All these limitations can prove to be pretty inconvenient to some users.
Most online payments are done with the help of credit/debit cards, ATM cards,
or identity cards. So, if you lose any of these, automatically, your online payment
accounts that are linked to your cards will be at risk too. Of course, you can block
your cards after informing the bank, but the time between losing your card and
blocking it may prove to be risky as many transactions by fraudsters can take
place during that time period.
False identity
Unlike physical transactions, there are no ways to identify if the person making
the online payment is the one, he/she is claiming to be. Since there are no
verification methods like photographs or signatures, most online payments are
done behind a veil of anonymity. This can lead to a considerable amount of
forgery and identity theft.
E-BANKING
E banking means electronic banking (also known as internet banking, online
banking or virtual banking).
These services are provided by commercial banks to their account holders so that
they can easily perform banking transactions online from anywhere and at any
time. The customers are not required to go to the bank. E banking has speeded up
all bank transactions.
Importance of e-banking
BANKS
CUSTOMERS
BUSINESSES
Banking websites
The following table lists some common retail and wholesale e-banking services
offered by banks and financial institutions:
Classification of E-Banking
Banks offer various types of services through electronic banking platforms. These
are of three types:
Level 1 – This is the basic level of service that banks offer through their
websites. Through this service, the bank offers information about its
products and services to customers. Further, some banks may receive and
reply to queries through e-mail too.
Level 2 – In this level, banks allow their customers to submit applications
for different services, check their account balance, etc. However, banks do
not permit their customers to do any fund-based transactions on their
accounts.
Level 3 – In the third level, banks allow their customers to operate their
accounts for funds transfer, bill payments, and purchase and redeem
securities, etc.
Advantages Disadvantages
You can keep an eye on your If the banks server is down then you
transactions and account balance all the cannot access your accounts.
time.
You can get to know about any If the bank server is down due to loss
fraudulent activity or threat to your of net connectivity or a slow
account before it can cause any severe connection than it might be hard to
damage. know if your transaction went through.
It is an excessive medium for the banks You might get overly marketed and
to endorse their products and services. become annoyed by notifications. That
said this can easily be turned off.
More online services including loans You might become annoyed by
and investment options. constant emails and updates.
UNIT – III: CYBER CRIME
JURISDICTION ISSUE IN CYBER CRIME
CYBER JURISDICTION
Jurisdiction gives power to the appropriate court to hear a case and declare a
judgment. In cybercrime cases, the victim and the accused are generally from
different countries, and hence deciding which jurisdiction will prevail is
conflicting. The internet has no boundaries; thus, no specific jurisdiction can be
titled over its use. A user is free to access whatever he wishes to and from
wherever he wishes to. Till the time a user’s online activity is legal and not
violative of any law, till then there is no issue. However, when such actions
become illegal and criminal, jurisdiction has a crucial role to play.
The whole trouble with internet jurisdiction is the presence of multiple parties in
various parts of the world who have only a virtual connection with each other.
Like, if one party wants to sue the other, where can he sue?
But, in the context of the internet or cyberspace, both of these are difficult to
establish with any certainty. Issues of this nature contribute to the utter confusion
and contradictions which ultimately affects judicial decisions in the area of
internet jurisdiction. Because cyberspace has no geographical boundaries, long
distance communication can be established instantly with anyone who can have
access any website.
Usually, an internet user has no way of knowing exactly where the information
on a site is being accessed from. Here, i.e., in cyberspace, jurisdiction issues are
of primary importance. As Internet does not tend to make geographical and
jurisdictional boundaries clear, Internet users remains within their physical
jurisdictions and are subject to laws independent of their presence on the Internet.
So, a user in one of the Indian States conducting a transaction with another user
in Britain through a server in Canada could theoretically be subject to the laws of
all three countries as they relate to the transaction at hand. The laws of a nation
may have extra-territorial impact extending the jurisdiction beyond the sovereign
and territorial limits of that nation. This is particularly problematic, as the
medium of the Internet does not explicitly provide territorial limitations.
An example would be where the contents of a website are legal in one country
and illegal in another. In the absence of a uniform jurisdictional code, legal
practitioners are generally left with a conflict of law issue.
Five nexuses have been invoked by courts to justify their exercise of jurisdiction:
1. Subjective Nexus: It lays down that if the act is committed in the territories
of the forum state, then its laws will be applicable to the parties.
2. Territoriality Nexus: It is invoked when an act is committed outside the
forum state’s territorial boundary, yet its impact is on the forum state.
3. Nationality nexus: It looks to the nationality or national character of the
person committing the offense to establish jurisdiction.
4. Protective nexus: It is upto the desire of a sovereign to punish the actions
committed in other places solely because it feels threatened by those
actions. It provides for jurisdiction when a national or international interest
of the forum is injured by the offender.
5. Universality nexus: The acts which are universally acclaimed as crimes
such as piracy, the slave trade, hijacking of aircraft, genocide, war crimes,
and crimes against humanity. A cyber-criminal can be convicted in any
country for committing such a heinous crime. It presumes that every state
has jurisdiction to prosecute the offender of a cyber-crime.
The main problem arises when a citizen of some other country causes harm to
citizens of a native country. Let’s take for an example in India, though
Information Technology Act, 2000 does have extra territorial jurisdiction but it's
very difficult to enforce it and exercise it.
Hacking is a crime of greater degree but it creates problem in case of crimes like
publishing obscene materials on websites. If a citizen of U.K posts obscene
material - Are the International Extradition laws are strict enough to enforce an
arrest? What if the Act is an offence in India but not in his native country?
Prosecuting and trying a person also raises difficult problem in the field of
jurisdiction. These problems are related to determination of place where the
offence was committed and where several jurisdictions are equally competent.
Under the Information Technology Act, 2000, India claims "long arm"
jurisdiction over foreign parties committing criminal acts outside of India which
have an effect on a computer information system located within India. A court
may order law enforcement authorities to seize computer equipment that is
suspected of having been used in the commission of a computer crime. It is
possible that more than one punishment will be administered for commission of
the same offence, if more than one criminal law has been violated.
The appellant was a Dubai based NRI who, along with 4 others, conspired &
cheated Chandigarh bank and got foreign letters of credit issued through the bank.
Held: There is an illegal act of dishonestly inducing the bank. Since the crime
was committed in Dubai & its consequences occurred in Chandigarh, foreign
nationals are subject to jurisdiction under Sections 179 & 182 of the CrPC.
CYBER CRIME UNDER IT ACT: NATIONAL PERSPECTIVE
CYBER-CRIME are those criminal offences which are committed via Internet
or any other forms of computer technology.
There are some instances when cyber-crimes are carried out with the intention of
generating profit for the cybercriminals, whereas other times a cyber-crime is
carried out directly to damage or disable the computer or device.
Internet is one of the means by which the offenders can gain such price sensitive
information of companies, firms, individuals, banks, intellectual property crimes
(such as stealing new product plans, its description, market programme plans, list
of customers etc.), selling illegal articles, pornography etc. This is done through
many methods such as phishing, spoofing, pharming, internet phishing, wire
transfer etc. and use it to their own advantage without the consent of the
individual.
Many banks, financial institutions, investment houses, brokering firms etc. are
being victimized and threatened by the cyber terrorists to pay extortion money to
keep their sensitive information intact to avoid huge damages.
In India, cyber-crimes are covered by the Information Technology Act, 2000 and
the Indian Penal Code, 1860. It is the Information Technology Act, 2000, which
deals with issues related to cyber-crimes and electronic commerce. However, in
the year 2008, the Act was amended and outlined the definition and punishment
of cyber-crime. Several amendments to the Indian Penal Code 1860 and the
Reserve Bank of India Act were also made.
TYPES OF CYBER-CRIMES
The first step in the field of cyber law was the Model Law which was
drafted under the UN Commissions on International Trade law, 1986.
Then, UNGA on 30th Jan, 1999 passed a resolution to regulate e-commerce
through uniform set of laws applicable to its member's countries.
Being a signatory to the resolution, Parliament of India has a passed the
Information Technology Act 2000 on 17th may, 2000.
The preamble of the Act states that the objectives of the act is to legalize
e-commerce and further amend the Indian penal Code, 1860, the India
Evidence Act, 1882, the Banker's Book Evidence Act, 1891 and the
Reserve Bank of India Act, 1934 to make compatible with this Act.
The Act consists of 13 Chapters and governs laws relating to Electronic
Contract, Electronic Record, Digital Signature and the use of the electronic
records and signature in Govt. records. It also regulates the activities of the
Network Service Providers (NSPs) & Internet Service Providers (ISPs).
The main aim of the Act is to legalize the digital language so that people can
easily and without fear use the electronic devices for their own purposes like
doing business or for entertainment. It prescribes certain offences and penalties
to keep a check on the cyber-crime, the main of them are:
Section 43: This section of the IT Act applies to individuals who indulge
in cyber-crimes such as damaging the computers of the victim, without
taking the due permission of the victim. In such a situation, if a computer
is damaged without the owner’s consent, the owner is fully entitled to a
refund for the complete damage.
Section 65: Tampering with Computer Source Documents
If a person knowingly or intentionally conceals, destroys or alters or any
computer source code used for a computer system, when the computer
source code is required to be kept or maintained by law for the time being
in force.
Penalty - Imprisonment up to 3 years, or/and with fine up to Rs. 200,000
Section 66: Hacking with Computer System
Whoever with the intention to cause wrongful loss or damage to the public
or any person, destroys / deletes / alters any information residing in a
computer resource or diminishes its value or affects it injuriously by any
means, commits hacking.
Penalty - Imprisonment up to 3 years, or/and with fine up to Rs. 500,000
Case Law: Kumar vs. Whitley:
o In this case the accused gained unauthorized access to the Joint
Academic Network (JANET) and deleted, added files, changed the
passwords to deny access to the authorized users.
o Investigations had revealed that Kumar was logging on to the BSNL
broadband Internet connection as if he was the authorized genuine
user and 'made alteration in the computer database pertaining to
broadband Internet user accounts' of the subscribers.
o The CBI had registered a cyber-crime case against Kumar and
carried out investigations on the basis of a complaint by the Press
Information Bureau, Chennai, which detected the unauthorized use
of broadband Internet.
o The complaint also stated that the subscribers had incurred a huge
loss due to Kumar's wrongful act. He used to hack sites from
Bangalore, Chennai and other cities too. Verdict: He was held liable
u/s 420 IPC (cheating) & 66 IT Act (Computer related Offence).
Section 66B - Receiving stolen computer or communication device
A person receives or retains a computer resource or communication device
which is known to be stolen or the person has reason to believe is stolen.
Penalty - Imprisonment up to 3 years, or/and with fine up to Rs. 100,000.
Section 66C – Using password of another person
A person fraudulently uses the password, digital signature or other unique
identification of another person.
Penalty - Imprisonment up to 3 years, or/and with fine up to Rs. 100,000
Section 66E – Publishing private images of others
If a person captures, transmits or publishes images of a person's private
parts without his/her consent or knowledge.
Penalty - Imprisonment up to 3 years, or/and with fine up to Rs. 200,000
Section 67: Publishing of obscene information which is obscene in
electronic form
This involves electronically publishing obscenities. If convicted, the prison
term is up to five years and the fine is up to Rs. 10 lakhs.
Section 67B – Publishing child porn or predating children online
If a person captures, publishes or transmits images of a child in a sexually
explicit act or conduct. If a person induces a child into a sexual act.
Penalty- Imprisonment up to 5 years, or/and with fine up to Rs. 10 lakhs.
Section 72: Penalty breach of confidentially and privacy.
Section 77: Penalties or confiscation not to interfere with other
punishments.
No penalty imposed or confiscation made under this Act shall prevent the
imposition of any other punishment to which the person affected thereby
is liable under any other law for the time being in force.
Many countries have adopted cyber law in their legal regime to meet the
challenges against the internet criminal activities. Some countries have
substantially updated their cyber laws while others have partially updated them.
However, there are number of countries which have not initiated measures for
adoption of cyber laws to combat computer and cyber space crimes. As the cyber-
crimes do not have any geographical or territorial boundaries, they are capable of
breaching national borders which may cause serious threat to countries where
legal protections against this crime are not adequate.
Due to gaps and variations in domestic cyber laws of different nations, the
prosecution of international cyber criminals is uncertain.
It deals with the issue of unauthorized access to computer systems. The legislation
was first enacted in 1984, amended in 1994, 1996, and again in 2001 which
addresses new abuses arising from misuse of new technologies.
Under this Act, a person may not access a computer, even if he is authorized,
provided that the person is accessing / using that computer in obtaining or altering
information.
Paragraph 5(A) of this statute also prohibits the transmission of viruses with the
intention of causing damage to a protected computer.
The violation of this statute implies both criminal and civil penalties. The
damages are limited to economic losses and the action must be brought within 2
years of the violation or within 2 years of the discovery of damage. Accordingly,
this statute is often featured prominently in internet privacy class action.
Thus, USA has passed several enactments, which cover various aspect of cyber-
crime.
The States of USA also pass various federal laws for the protection of cyber-
crime. These Federal Acts, however either are to introduced or amend existing
provisions in U.S. Federal Code.
2. The Counterfeit Access Device & Computer Fraud & Abuse Act, 1984
The Act seeks to safeguard a person's right to privacy in the information stored
in computer or any other electronic storage device such as laptop, floppy disk,
diskettes etc. under his control. When the law enforcement authorities have
reason to believe that the information possessed by a person in electronic form
may provide evidence of a crime, they may inspect or search it, after obtaining a
search warrant from the competent judicial authority. Thus, search in cases
involving computers is constitutional provided it does not violate a person's
legitimate expectation of privacy.
The US Congress enacted the US. Computer Security Act, 1987 requiring Federal
agencies to improve the security and privacy of Federal computer systems. A
National Institute of Standards of Technology (NIST) was set up under the Act
for laying down security standards for Federal computer system.
UNITED KINGDOM
An Act to make provision for securing computer material. It sets out 3 computer
misuse offences.
The maximum imprisonment specified by the act for each offence were six
months and five years with fine.
AUSTRALIA
Australia has been relatively slower in adopting specific legislation for cyber-
crime and had divergent approaches throughout the various State territory and
Federal jurisdictions. The Federal and State Governments in Australia have
adopted legislations to tackle the problem of computer crime.
Under the Australian legal system, a new Act called as the Cyber Crime Act,
2001 was introduced for amending the law relating to computer offences. The
Act creates following 3 major computer offences
Unauthorized access
Unauthorized modification of data.
Unauthorized impairment of electronic communications.
JAPAN
The main purpose of this Act is to take measures for preventing unauthorized
computer access by prohibiting such acts. It also prevents computer-related
crimes that are committed through telecommunication lines.
This is an Act by which Japan Penal Code is amended and a separate Act is
evolved to combat cyber-crime problem. By this Act, most of the provisions were
changed to meet the new challenges posed by cyber-crimes.
RUSSIA
The Russian Federation has not enacted any separate cyber-crime law but the
provisions relating to cyber-crimes and punishment for them are contained in the
new Russian Federation Criminal Code (RFCC) enforced from January 1, 1997.
The Budapest Convention is the first international treaty that coordinates cyber-
crime investigations between nation States and criminalizes certain cyber-crime
conduct. It is also known as Council of Europe’s (COE) Cybercrime Convention.
It came into the picture in 2001 and entered into force on July 1, 2004.
It was drafted by the Council of Europe in Strasbourg, France, with the active
participation of 64 countries like Canada, Japan, Philippines, South Africa, US
and others.
Some of the significant cyber offences that the Budapest Convention defined
include illegal access, data interference, illegal interception, misuse of devices,
system interference, cyber fraud, cyber forgery, offences related to child
pornography, and offences concerning neighboring rights and copyright.
However, as per the latest updates, mainly all stakeholders agree that the current
form of cross-border data sharing for law enforcement through the Mutual Legal
Assistance Treaty (MLAT) is insufficient for the upcoming digital age.
However, there is an ongoing debate regarding whether to develop an entirely
new system for cybercrimes or revamp the Mutual Legal Assistance Treaty
(MLAT). Since its formation in 2001, the convention wanted India to be a part of
it; however, India decided not to participate.
While membership in the Budapest Convention more than doubled since then,
India is yet to join this treaty. The reasons are not entirely clear. Concerns are
voiced by different stakeholders which includes:
That India will not sign the Budapest treaty since it was drafted without its
participation.
The Budapest Convention allows for trans-border access to data and thus
infringes on national sovereignty.
That the MLA (Mutual Legal Assistance) regime is not effective.
That it is a criminal justice treaty and therefore does not cover state actors
and some of the states that launched most of the attacks on India have not
signed the Convention.
India should promote a treaty at the UN level: India wants a treaty to focus
on terrorism, or to address state-to-state relations and matters of
international security.
The Budapest Convention has been validly criticized for its lack of human
rights and legal safeguards.
This proposal, which India voted in favor of, creates a new committee that will
convene in New York in August 2020. As per this treaty, the nation-states can
coordinate and share data to the prevent cybercrime.
On the grounds of national sovereignty issues, China and Russia questioned the
Budapest Convention, resulting in forming the Russia-led Convention.
This draft convention goes far beyond what the Budapest Convention offers
regarding cross-border access to data.
Data protection laws in India are currently facing many problems and resentments
due to the absence of a proper legislative framework. The legal framework
includes:
However, these provisions neither protect any breach of information on the one
hand, nor they enforce a right-based framework on privacy.
Mobile technology over the years has evolved upto a large extent be it on grounds
of flexibility or portability. Security measures are improved, but not at the desired
expected rate to absolutely curb crime rates. The fact that tops the list is that
people fail to believe that they can be victims to such crimes.
The broadest way to deliver the true meaning of cyber-crime is “any crime
wherein computer is either used as a tool or a weapon.” Thus, smartphones and
tablets also fall within the definition of computer as they are capable of
performing all the functions of computer whether it be logical, memory functions
or of processing, storage or communication.
Crime committed using modern technological tools are generally known as
cyber-crimes. Cyber-crime is a criminal activity performed through computer and
internet.
Different types of mobiles are introduced in market with better and advanced
technology. But due to the misuse of same technology, cyber-crime is increasing
fast which is affecting our society to a large extent.
1. Blue Bugging
Bluebugging is attack on the mobile cell phone through Bluetooth. Every mobile
phone has embedded Bluetooth which allows the hacker to take over complete
access of user’s mobile phone. Bluebugging allows the hacker to read the info. in
your mobile and he can even listen the call, forward the call, send text message.
The victim is ignorant of the attack even if the Bluetooth device is turned off.
2. Blue Snarfing
The hacker can commit theft of all the data and information in your mobile phone
using his laptop.
This kind of crime has become widely prevalent across the world today.
Criminals send derogatory, humiliated and obscene SMS or email by using their
mobiles, cell phones and communication devices, so as to defame others and
lower their reputation in the eyes of those who hold them in high esteem.
4. Vishing
This is a tool for committing financial crime by using mobile. Mobile phones are
now used for online shopping and managing banking transactions. This has made
people an easy victim of Vishing. Motive of the hacker is to get easy money by
access of user bank account. Scammer calls the victim and by use of his voice
tries to extract the confidential information of the victim. It includes identity theft
like credit cards numbers and other secret information.
5. Malware
This is one of the biggest threats to mobile cell phones. It is a program (software)
designed to perform malicious activities in the device infected. Malware enters
the mobile cell phone of victim through SMS, file transfer, downloading
programs from internet etc. After entering into the device, it performs several
malicious activities like usage of talk time, etc.
6. Smishing
Smishing is type of phishing which uses short messaging services (SMS) or text
messages on the mobile phones. SMS service is the one of the most used services
on mobile phone and an easy tool for hacker to full fill their greed. Smishing is a
security attack in which the user is sent a very lucrative SMS that compels the
user to expose their personal information like internet banking passwords, credit
card detail etc. Recently these SMS also include false online dating subscriptions
and job offers.
7. Mobile Pornography
The Internet is being highly used by the abusers to reach and abuse children
sexually, worldwide. As more homes have access to internet, more children
would be using the mobiles, communications devices, internet and more are the
chances of falling victim to the aggression of pedophiles.
Mobile Pornography using mobile phone could be brought specifically within the
ambit of section 67B of IT Act 2000. The said act is a crime, punishable with
imprisonment of either description for a term which may extend to 5 years and
with fine which may extend to 10 lakh rupees.
8. Identity Theft
Mobile phone is used for the identity theft and criminals commit the crimes such
as subscription fraud etc. using various communication devices.
9. Mobile Phishing
This refers to the act of targeting mobile phone users by phishing emails that
appear to come from mobile service providers.
This further includes the act of sending an e-mail to a user falsely claiming to be
an established legitimate enterprise in an attempt to scam the user into
surrendering private information that will be used for identity theft.
One of the major problems with SMS based banking are SMS Spoofing which is
an attack where malicious user sends out SMS message which appears to be sent
by original sender. End-to-end encryption of the SMS message is not available.
SMS spoofing is when the identity of the sender is taken over by a hacker. SMS
messages are sent for free by the hacker whilst the victim is charged for sending
this fraudulent traffic.
This is an act by the criminal who fills his e-mail box with spam mails, depriving
him of the services he is entitled to access or provide.
Theft of mobile software through the illegal copying of genuine programs or the
counterfeiting and distribution of products intended to pass for the original.
Preventive Measures
No matter cyber threat is increasing, the remedy lies in our hand. Small steps in
this regard will help to protect cyber-crime which is as follows.
Awareness: People should be aware regarding cyber mobile threat through
TV, internet, magazine etc.
Strong Antivirus Software: Mobile devices should always be updated
with strong antivirus which prevent from viruses, malware, Trojan horses
and unwanted software.
Be Careful while using social site: Posting photograph to various social
networking site people should be careful as one can save those pictures and
can post those pictures for wrong deeds.
Strong Password: One should choose strong password using special
character, upper and lower case.
Hiding Personal Information: People usually received many mails and
messages to give their account number so that sender can send money of
cash prize to their account. Never respond to such type of messages and
mail. Avoid frequent use of online shopping and banking.
Supreme Court in this landmark judgment struck down section 66A of the
Information Technology Act, 2000 which provided provisions for the arrest of
those who posted allegedly offensive content on the internet.
The case revolves around the fundamental right of freedom of speech and
expression under Article 19(1)(a) of the Constitution of India, which challenged
the constitutional validity of section 66A and led to the struck down of section
66A of the Information Technology Act 2000.
Section 66A defines the punishment for sending “offensive” messages through a
computer or any other communication device like a mobile phone or tablet and a
conviction of it can fetch a maximum three years of jail and a fine.
The Court has now declared that Section 66A is not only vague and arbitrary, but
it also “disproportionately invades the right of free speech.”
UNIT IV: GENETIC AND MEDICAL TECHNOLOGIES
DNA PROFILING
Section 164A of the Criminal Procedure Code talks about the medical
examination of a rape victim by a registered medical practitioner with the consent
of the victim.
Prevention of Terrorism Act, 2002, states that an investigating officer has power
to requests to the court in writing for obtaining a sample of handwriting,
fingerprints, footprints, blood, saliva, semen, hair, etc. of an accused person, who
is involved in the commission of an offense under the act and it shall be lawful
for the court to direct such samples to be given by the accused person through a
medical practitioner.
State of Bombay v. Kathi Kalu Oghad and Anr.: it was held that compelling a
person to give any forensic evidence like fingerprints, hair, semen, doesn’t
contravene Article 20(3).
BRAIN MAPPING
Brain mapping also examines what goes wrong physically in the brain
during mental illnesses and other brain diseases.
Brain mapping aims to give us a thorough picture of our brain's structure.
Our brain reacts differently to various events. how it reacts to familiar
events is different from how it reacts to unknown events.
During the test, both familiar and unfamiliar auditory as well as visual
stimuli are given and since the brain reacts differently to the familiar one,
then that pattern will be observed, and accordingly, reports are made.
The Brain Mapping Test is also known as P-300 test.
The technique of brain mapping was first invented by American
neurologist Dr. Lawrence A. Farwell. An expert in brain wave science, he
called his technique ‘brain-wave fingerprinting’ or ‘brain mapping test.
In this test of Brain Mapping the suspect is first interviewed and
interrogated find out whether he is concealing any information.
The person to be interrogated is made to wear a headband with sensors to
measure electrical brain responses
There are three types of words in the list used for Brain Mapping Test.:
The conclusion is drawn by experts after the test has been conducted and the map
is derived. The test indicates the possession of the knowledge about the relevant
issue which is helpful in the investigation of the case.
Dr. Rajesh Talwar and Another v. Central Bureau [2012]: The victim Arushi, a
14-year-old school girl was dead in her home. The reports were filed in the police
station on the information given by the victim ‘s parents. The suspect in this case
of the murder of the victim was the maid in the house whose name was Hemraj.
After two days after the death of their daughter, the servant Hemaraj was found
dead on the terrace of the same building.
Arushi’s parents were arrested by the police. Narco-Analysis test, Polygraph test,
and Brain mapping test were conducted in this case against the will of the accused
persons i.e. the accused persons.
NARCO-ANALYSIS
Human beings have the tendency of speaking lies from the time immemorial. In
such a state an attempt is made to extract information in form of clues about the
crime as under the influence of drugs it becomes extremely difficult for the
subject to lie.
The term Narco-analysis is derived from the Greek word narke (meaning
"anesthesia" or "torpor").
The court may, however, grant limited admissibility after considering the
circumstances under which the test was obtained.
Narcoanalysis, brain mapping and lie detector tests against the will of the accused
would be violative of Article 20 (3) of the Constitution.
Art. 20(3) which embodies this privilege says, "No person accused of any offence
shall be compelled to be a witness against himself".
In case of State Bombay v. Kathikalu, it was held that it must be shown that the
accused was compelled to make statement likely to be incriminate of himself.
Compulsion means duress, which includes threatening, beating or imprisonment
of wife, parent or child of person. Thus, where the accused makes a confession
without any inducement, threat or promise art 20(3) does not apply. Thus, the
privilege against self- incrimination enables the maintenance of human privacy
and observance of civilized standards in the enforcement of criminal justice.
A Narcoanalysis test report has some validity but is not totally admissible in
court, which considers the circumstances under which it was obtained and
assessed its admissibility.
Criticism of Narco-analysis
Test Narco-analysis has been criticized on the ground that it is not 100% accurate.
It has been found that certain subjects made totally false statements. It is often
unsuccessful in eliciting truth as such it should not been used to compare the
statement already given to the police before use of drug.
It has been found that a person who has given false information even after
administration of drug.
It is very difficult to suggest a correct dose of drug for a particular person. The
dose of drug will differ according to will power, mental attitude and physique of
the subject.
Successful Narco-analysis test is not dependent on injection. For its success a
competent and skilled interviewer is required who is trained in putting recent and
successful questions.
PATENT PROTECTION
In India, one can protect an idea, invention, or creation by filing for a patent via
e-filing or manually submitting the application and related documents at any of
the Patent Offices.
In India, a patent will be granted to the applicant for a 20-year period, starting
from the date the applicant filed the patent application. In relation to certain
products, for example pharmaceutical products, an additional five years can be
added to the protection.
The protection offered by an individual would depend upon the patent claims,
i.e., the wording used in the patent application to define the invention. It is
therefore very important that the patent claims are worded with care. The exact
wording of the patent claims is something an IP counsel can assist with.
GENERIC DRUG
A generic drug is a medication that has exactly the same ingredient as the brand
name drug and provides the same therapeutic effect.
It is the same in dosing, safety, strength, quality, the way it works, the way
it is taken, and the way it should be used.
Generic drugs do not need to contain the same ingredients as the brand
name product.
The generic drug is bioequivalent to the branded product, meaning there is
either no significant difference between the two drugs in terms of the rate
and extent of absorption or if there is a difference, it is not medically
significant.
• However, a generic drug can only be marketed after the brand name drug's
patent has expired and are usually much less expensive than brand name drugs
once they reach the market.
• They have exactly the same dosage, intended use, effects, side effects, route of
administration, risks, safety and strength as the original drug. In other words, their
pharmacological effects are exactly the same as those of their brand-name
counterparts.
An example of a generic drug, one used for diabetes, is metformin. A brand name
for metformin is Glucophage
India is a leading country in the world's generic drugs market, with Sun
Pharmaceuticals being the largest pharmaceutical company in India.
ORGAN TRANSPLANTATION
Organ transplants include kidney, pancreas, liver, heart, lung, and intestine.
Vascularized composite allografts (VCAs), are now also possible, including face
and hand transplantation. Sometimes, "double" transplants are done, such as
kidney/pancreas or heart/lung.
Kidney transplants are the most common type of transplant surgery; the least
common single-organ transplants are the intestines.
Depending on the organ needed, organs are matched using several characteristics,
including blood type and size of the organ needed.
Also taken into account is how long someone has been on the waiting list, how
sick they are, and the distance between the donor and the potential recipient.
Heart transplant: A healthy heart from a donor who has suffered brain death
is used to replace a patient's damaged or diseased heart. Due to the
complexity of this procedure, strict medical criteria is imposed in assessing
whether a donor's heart is suitable for transplant, and whether a potential
recipient is suitable to receive the transplant.
Lung transplant: One lung or both lungs from a recently deceased donor
are used to replace a patient's diseased lung or lungs.
SEX DETERMINATION
Sex determination Test refers to prenatal / testing the gender of fetus before birth.
With the centuries- old preference being given to male children in the
traditionally patriarchal Indian society, the birth of a girl child isn’t much of a
cause for celebration in most parts of India.
Studies have shown that female infanticide (deliberate killing of newborn female
children) has been an ongoing practice in most parts of the country, especially the
north.
Women were often being pressurized by the family to abort female fetuses, the
Indian Parliament in 1994 passed the ‘Prenatal Diagnostic Techniques
(Regulation and Prevention of Misuse) Act.
This Act bans the determination of the gender of the fetus before birth and was
enacted in an effort to narrow down the growing gender gap in numerous states
within the country.
The Act was further upgraded in 2003 and called the PC-PNDT Act [Pre-
conception and Prenatal Diagnostic Techniques (Prohibition of Sex Selection)].
No laboratory or clinic will conduct any test including ultrasonography for the
purpose of determining the sex of the fetus.
No person, including the one who is conducting the procedure as per the law, will
communicate the sex of the foetus to the pregnant woman or her relatives by
words, signs or any other method.
DESIGNER BABY
The term designer baby refers to a baby who has been genetically modified
through germline gene editing.
Germline editing is the technique used for modifying the DNA of an
organism.
Particular traits set by parents or scientists are given to a human embryo or
egg or sperm to produce a child of the desired trait.
Science has made designing of human being possible where we can alter
or modify the egg, sperm, or embryo to get specific quality in terms of
appearance, eye colour, intelligence, obedience or even gender and a lot
more.
Through germline modification, a designer baby can be free from
hereditary diseases like leukaemia, haemophilia, HIV, and other such
disorders.
Basically, A designer baby is a baby whose genetic make-up has been
selected or altered.
In many ways, designer babies—sometimes called genetically modified
babies—are the obvious result of decades of advancing IVF technology.
Pros
Reduces the risk of genetic diseases as we can now cure incurable diseases.
It helps in reducing the probability of inherited medical conditions.
The child is more likely to succeed in life as the child may be born with
higher intellect or obedience.
New characteristics can be added to new generations which may lead to
the development of society at large.
Cons
ABORTION
Restricted laws
Poor availability of services
High cost
Stigma
objection by health-care providers and Unnecessary requirements, such as
mandatory waiting periods, mandatory counselling, third-party
authorization, and medically unnecessary tests that delay care.
If the woman is unmarried and over the age of 18, the doctor simply requires her
written consent.
If the unmarried lady is below the age of 18, a guardian’s written consent is
required before the abortion can be performed.
Unmarried Indian women have the legal right to medical abortion. Unmarried
women can seek lawful pregnancy termination in the following situations:
The SC has extended the right to safe and legal abortion up to 24 weeks to
unmarried and single women, saying it is the right of every woman to make
reproductive choices without interference from the state.
CLONING
Cloning describes the processes used to create an exact genetic replica of another
cell, tissue or organism.
The copied material, which has the same genetic makeup as the original, is
referred to as a clone.
Cloning happens when a cell replicates itself asexually without any genetic
alteration.
Cloning is the process of creating cloned organisms (copies) of cells and of DNA
fragments
Natural human clones are known as identical twins. The twins are produced when
an embryo splits, creating two or more embryos that have almost identical DNA.
Animal Cloning
Scientists remove a cell (like a skin cell) from the animal they want to copy.
They remove the nucleus of an egg cell from the surrogate mother
They put the DNA from the skin cell into the egg cell of the surrogate
mother.
A few months later, the clone is born (as a baby).
ARTIFICIAL REPRODUCTIVE TECHNOLOGIES
Types of ART: