INFORMATION TECHNOLOGY LAW INFORMATION TECHNOLOGY Information Technology means the use of hardware, software, services, and supporting infrastructure to manage and deliver information using voice, data, and video. Included in Information Technology All computers with a human interface All computer peripherals which will not operate unless connected to a computer or network All voice, video and data networks and the equipment, staff and purchased services necessary to operate them All salary and benefits for staff whose job descriptions specifically includes technology functions, i.e. network services, applications development, systems administration All technology services provided by vendors or contractors Operating costs associated with providing information technology All costs associated with developing, purchasing, licensing or maintaining software Excluded from Information Technology "Closed/stand-alone" computer systems that monitor or automate mechanical or chemical processes, such as the fire alarm system in the capitol building. Audio-visual equipment which can be operated as a standalone piece of equipment, such as televisions, tape recorders, VCRs, video cameras, and overhead projectors. Stand-alone video editing equipment is excluded. Copy machines and fax machines. Licenses or subscriptions to electronic information provided to users in lieu of books or magazines. Salaries of staff who use technology but are not directly involved in developing, implementing or supporting technology as documented on their job description questionnaire (JDQ). Data entry staff, staff who digitize drawings, staff who do desktop publishing are excluded. "Power users" who use advanced features of spreadsheets or word processing software are excluded. Data entry services Basic concepts of Informa on technology: Informa on technology is the u liza on of computers to manipulate, disseminate, retrieve, and store data and informa on. Informa on is a resource which has no value un l it is extracted, processed and u lized. Informa on technology deals with informa on system, data storage, access, retrieval, analysis and intelligent decision making. Cyberspace Cyberspace refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication. Cyberspace typically involves a large computer network made up of many worldwide computer subnetworks that employ TCP/IP protocol to aid in communication and data exchange activities. In the common IT lexicon, any system that has a significant user base or even a well-designed interface can be thought to be “cyberspace.” The term cyberspace was initially introduced by William Gibson in his 1984 book, Neuromancer. The term is used to describe any facility or feature that is linked to the Internet. People use the term to describe all sorts of virtual interfaces that create digital realities. Another prime example of cyberspace is the online gaming platforms advertised as massive online player ecosystems. These large communities, playing all together, create their own cyberspace worlds that exist only in the digital realm, and not in the physical world, sometimes nicknamed the “meat space.” The cyberspaces that we have created are pretty conformist and one-dimensional, relative to what could exist. In that sense, cyberspace is always evolving, and promises to be more diverse in the years to come. Need For Cyber Law Internet was ini ally developed as a research and informa on sharing tool and was in an unregulated manner. Now it became more transac onal with e-business, e-commerce, egovernance and e-procurement etc. All legal issues related to internet crime are dealt with through cyber laws INTERFACE OF TECHNOLOGY AND LAW Relationship between science, technology, and law Law and science have a complicated relationship. Science is the systematic approach that builds and organizes knowledge in the form of testable explanations and predictions about the universe. Law refers to the system of rules which have been laid down by the social institutions to regulate the actions of members and it may enforce such behaviour by the imposition of penalties. However, with the growth of scientific and technological advances, law, and science became interdependent on each other. Law seeks to curb the impacts of science and technology which revolve around aspects such as risks, benefits, and ethical implications. Science and law are co-dependent on each other despite being two different disciplines in modern society with the advances in science and technology. Effects of science and technology on law Science and technology have substantive as well as the procedural effect on the law. On the substantive side, new scientific evidence and methodology can change the course of legal claims and their outcomes, i.e., forensic science has opened new avenues in criminal law while creating a myriad of legal, ethical, and social issues. And on the procedural aspect of the law, it lays down how DNA samples should be collected and stored, how genetic information may be used, when are convicted criminals allowed to reopen their cases, etc. Effects of law on science and technology United States Congress enacted the Data Quality Act which imposes a series of substantive and procedural requirements on scientific methodology. These developments indicate a trend of growing legal intrusion on science and technology. Division of the field into three primary standards Different formulations exist for examining the law, science, and technology. There exist three primary standards of the division of the field. 1. The role of the law in managing the impacts of science and technology which includes controlling the risks, promoting the benefits, and addressing ethical implications. 2. The institutions of law and science examine how the law affects the practice of scientific research as well as the reciprocal relationship that determines how science and technology influence the law. 3. General inquiry into the problems and tensions which emerge from the intersection of law with science and technology. Ethical implications of technology The law attempts to resolve moral issues in a socially acceptable manner. In various cases, courts have considered their authority while giving a decision in ethical aspects of controversial technological developments. Even when courts exclude ethical considerations, they often remain the primary reason for litigation which is fought before the court in sociolegal grounds. Legal v. scientific standards A heated debate topic in the field of law, science, and technology states whether the law should apply scientific standards and methods of proof, or apply its standards to scientific evidence. An example is the concept of statistical significance, where the standard scientific convention is that a result will be considered statistically significant if the probability of the result being observed by chance alone is less than 5%. Legal experts argue that law should apply a more lenient standard in cases of civil litigation where the standard of proof is predominant of the evidence. However, it is essential for the court to understand scientific methodologies while deciding on cases that involve science and technology. In the case, Daubert v. Merrell Dow Pharmaceuticals, Inc., the United States Supreme Court held that courts must guarantee that scientific testimony must have grounding methods of science and procedures which have derived from scientific methods. Challenges faced by law in the field of science and technology According to Moore’s Law, which predicts that the number of transistors on microchips will double every two years. The law, on the contrary, is less dynamic in nature as it has to go through a technical statutory process in order to keep up with the scientific developments. Statutes can easily become outdated and case laws are also slow to adapt to the scientific and technological developments due to the binding effect of past precedents. Therefore, it results in the law being based on outdated scientific assumptions or fails to adapt to recent scientific and technological knowledge. It is essential for the law to adapt to advancing science and technology and incorporate adaptive legal regimes to keep up with science and technology. JURISDICTION IN CYBER SPACE AND JURISDICTION IN TRADITIONAL SENCE Issues of Internet jurisdiction stay a critical test for the use of law in the online atmosphere. This is to give an available prologue to jurisdiction as it applies to the Internet. Internet and Jurisdiction is the worldwide multi-stakeholder strategy network tending to the strain between the cross-line Internet and national jurisdictions. Customary methods of legitimate participation battle to determine the jurisdiction strains. Extreme application of the rule of territoriality and the effort of computerized power put the worldwide local area on a risky path whenever utilized on a worldwide scale. If nothing is done, this lawful weapons contesting could prompt serious difficulties for the worldwide computerized economy, basic liberties, online protection, and the specialized Internet foundation. The twenty-first century advanced real factor challenges and conventional methods of worldwide legitimate participation, uncovering an institutional hole in Internet jurisdiction that might be tackled by drawing lessons from the technical governance of the Internet. Safeguarding the global character Jurisdic on in Cyber Space The nature of cyberspace has challenged the tradi onal no on of jurisdic on of court world over. Jurisdic on is the power of State to regulate the conduct of its subjects by legisla ons, adjudica on and enforcement. The current module only deals with the adjudica ve jurisdic on of court prescribe by State to resolve issues and fix the liability of par es. Cyber Jurisdic on or Jurisdic on in Cyber Space- In simple terms, is the extension of principles of interna onal jurisdic on into the cyberspace. Cyberspace has no physical (na onal) boundaries. It is an ever-growing exponen al and dynamic space. With a ‘click of a mouse’ one may access any website from anywhere in the world. Since the websites come with ‘terms of service’ agreements, privacy policies and disclaimers – subject to their own domes c laws, transac ons with any of the websites would bind the user to such agreements. And in case of a dispute, one may have recourse to the ‘private interna onal law. In case the “cyberspace offences” are either commi ed against the integrity, availability and confiden ality of computer systems and telecommunica on networks or they consist of the use of services of such networks to commit tradi onal offences, then one may find oneself in the legal quagmire. The ques on is not only about mul ple jurisdic ons but also of problems of procedural law connected with informa on technology. The requirement is to have broad based conven on dealing with criminal substan ve law ma ers, criminal procedural ques ons as well as with interna onal criminal law procedures and agreements. Concept Of Jurisdic on The concept of jurisdic on of a court emanates from the Sovereignty theory and Territorial Theory of State. The authority of a court to hear a case and resolve a dispute involving person, property and subject ma er is referred as the jurisdic on of that court. It is the legisla ve func on of the Government to enact laws and judicial and/or administra ve func on to enforce those laws. Thus, the principles of jurisdic on followed by a State must not exceed the limits which interna onal law places upon its jurisdic on. These principles of jurisdic on are enshrined in the cons tu on of a State and part of its jurisdic onal sovereignty. All sovereign independent States possess jurisdic on over all persons and things within its territorial limits and all causes, civil and criminal, arising within these limits. TYPES OF JURISDICTIONS There are different types of jurisdic ons Enforcement Jurisdic on The power of a state to inves gate, arrest, prosecute, punish, or otherwise enforce the law against persons present within its territory or aboard vessels or aircra bearing its na onality. Adjudica ve Jurisdic on. The jurisdic on (or authority) of the adjudicator is essen ally their power to make decisions in rela on to the par es' rights. An 'adjudicator's jurisdic on' is also o en used to refer to the scope of what they are en tled to decide, i.e. the dispute contained in the No ce of Adjudica on. Legisla ve Jurisdic on is the right of a State to prescribe the norma ve standards for the regula on of its subjects. However, the State has to take into considera on the limita on of interna onal law in the exercise of jurisdic on in cases that involve non territory en es. The prescrip ve jurisdic on of state is not unlimited as the State would not like to prescribe a conduct for the enforcement of which there is no basis in the prac cal aspect. In fact, unlimited power of prescrip on measures will seriously undermine the sovereign authority of the other State. As per the interna onal customary norms the State is obliged not to interfere in any form or for any reason whatsoever in the internal and external affairs of other State. Therefore, generally State adopts the principle of territoriality or effects doctrine and the legisla ve power of the State. Personal Jurisdic on: The authority of a court to hear and decide a dispute involving the par cular par es before it. Types of Personal Jurisdic on Personal Jurisdic on may be further classified into following 2 types: General Jurisdic on - The “general” jurisdic on subjects a person to the power of the applicable court with respect to any cause of ac on that might be brought. It has historically relied on very close contacts of the person with the state, such as residency or domicile within the state, physical presence in the state at the me of service of process, or some other substan al “con nuous and systema c” contact with the forum state Specific Jurisdic on - The “specific” jurisdic on, refers to the power of the applicable court with respect to a par cular cause of ac on based upon some set of “minimum contacts” with the forum state that relate to that cause of ac on. Subject Ma er Jurisdic on: The authority of a court to hear and decide a par cular dispute before it. Original Jurisdic on: The authority of a court to hear and decide a case in the first instance over the authority of other courts. For example, trial courts are courts of original jurisdic on in many cases. Appellate Jurisdic on: The authority of a court to review a prior decision in the same case by another “lower” court The jurisdic on is to be based on different principles and theories and tests: Jurisdic on is the basic rule of fair play which is essen ally two-dimensional in both civil and criminal ma ers. While in civil ma ers it comprises of; subject- ma er jurisdic on and personal jurisdic on, in criminal ma ers it is personal and territorial, related to the place of commission of crime. As regarding civil jurisdic on, variable rules are found when contractual, consumer, copyright, intellectual property and trademark disputes are concerned. Wherever overlapping jurisdic ons were manifested in li ga ons, they were resolved by resor ng to theories like choice of law rule and minimum contacts theory Subjec ve territoriality Under the subjec ve aspect of territorial jurisdic on a sovereign is recognized as having the power to adopt criminal laws that apply to crimes that are physically commi ed within his territorial borders. As other states make inadequate adjudica on hence the state extend the subjec ve territorial principle and expand their Net to bring the culprit within their domes c laws. The said principle extends jurisdic on to ac vi es which commence within a State’s geographical territory but completed or consummated in other territories. So, for example, the United Kingdom can adopt a statute that makes it a crime for anyone to commit an act of murder within its borders. Objec ve territoriality – Under the objec ve aspect of territorial jurisdic on a sovereign is recognized as having the power to adopt a criminal law that applies to crimes that take effect within its borders even if the perpetrator performs the act outside of its borders. In other words, under this principal jurisdic on of the State is extended to those acts that are commenced in another state’s territory but either (a) Consummated or completed in its own land or (b) Such ac vi es produce harmful effects in the territory of the party extending jurisdic on. The consumma on of ac vity factor is complemented to the subjec ve territorial principle. Principle of Na onality: It applies where the alleged offender is a na onal of the State, the laws of which have been violated by his acts. In India, according to IPC, an Indian na onal is liable to prosecu on in India for an offence commi ed in a foreign country which is punishable under Indian law. (Sec 3) Punishment of offences commi ed beyond, but which by law may be tried within, India. —Any person liable, by any [Indian law] to be tried for an offence commi ed beyond [India] shall be dealt with according to the provisions of this Code for any act commi ed beyond [India] in the same manner as if such act had been commi ed within [India] Principle of passive personality- The passive personality principle gives jurisdic on to a State over the ac vi es of foreigners which harms the na onals of that foreign state. This test is detested by customary interna onal law too and in the Lotus case the Turkey Statute jus fied the jurisdic on Principle of Universality. Universal Jurisdic on: Another form of assuming jurisdic on is known as universal jurisdic on or the universal interest jurisdic on. As the name points out, this jurisdic on is assumed by any State to prosecute an offender for acts which are known universally by interna onal law to be a heinous crime, i.e., hijacking, child pornography, cyber terrorism etc. A cyber-criminal can be prosecuted by any country based on universal universal interest jurisdic on. Protec ve Principle- As the term suggests this principle comes to play where security of any state endangered by the act of any foreign na onal. According to the principle a state has jurisdic on in respect of “certain conduct outside its territory by persons that directed against the security of the state or against a limited class of other state interests. Tests to determine jurisdic ons: 1.Minimum Contacts theory 2.Effects test or Calder Effect Test 3.Personal Jurisdic on Theory 4.Sliding scale theory or"Zippo"Test 5.Choice of law theory 6.Country-of -origin or Country of des na on theory 7.Forum Selec on Theory 8.Internet Jurisdic on “Lex loci delic “rule 1.Minimum Contacts theory Minimum contact rule establishes that so long as a corpora on had a degree of contact within the state bringing suit, they are subject to the laws of the state and can be sued by and within the forum state in court. Examples of minimum contacts include conduc ng business within the state, incorpora ng in the state, and visi ng the state. The theory was laid down in a landmark case i.e., Interna onal Shoe Co. v. Washington, 326 U.S. 310 (1945). There was a landmark decision of the Supreme Court of the United States in which the Court held that a party, par cularly a corpora on, may be subject to the jurisdic on of a state court if it has "minimum contacts" with that state. The ruling has important consequences for corpora ons involved in interstate commerce. It was held: Suit cannot be brought against an individual unless they have minimum contacts with the forum state. Following Interna onal Shoe, courts have generally applied a three- part test in evalua ng minimum contacts sufficient for jurisdic on: (1) The non-resident defendant must do some act or consummate some transac on with the forum or perform some act by which he purposefully avails himself of the privilege of conduc ng ac vi es in the forum, thereby invoking the benefits and protec ons. (2) the claim must be one which arises out of or results from the defendant's forum-related ac vi es; and (3) exercise of jurisdic on must be reasonable 2. Effects test or Calder Effect Test The theory was laid down in a landmark case i.e., Calder v. Jones, 465 U.S. 783 (1984), It was a case in which the United States Supreme Court held that a court within a state could assert personal jurisdic on over the author and editor of a na onal magazine which published an allegedly libellous ar cle about a resident of that state, and where the magazine had wide circula on in that state. Held that a state's courts could assert personal jurisdic on over the author or editor of a libellous ar cle, where the author or editor knew that the ar cle would be widely circulated in the state where the subject of the ar cle would be injured by the libellous asser on. Held that California courts had jurisdic on over the defendant Fact of the case: The plain ff, actress Shirley Jones sued the defendants, the Na onal Enquirer, its distributor, the writer of the ar cle, and Calder, the editor-in-chief of the magazine, over an October 9, 1979 ar cle in which the Enquirer alleged that Jones was an alcoholic. Jones lived in California, and although the Enquirer ar cle had been wri en and edited in Florida, Jones filed her lawsuit in a California state court. Jones asserted that the court had jurisdic on based on the large circula on Enquirer enjoyed in California. Held that California courts had jurisdic on over the defendant. Following condi ons needs to be sa sfied(a) an inten onal ac on, (b) that was expressly aimed at the forum state, (c) with knowledge that the brunt of the injury would be felt in the forum state. If a court finds that a defendant's ac ons meet the standard of purposeful direc on, then personal jurisdic on may be asserted based on Internet ac vi es which do not meet the requisite level of interac vity or minimum contacts needed for other tests of personal jurisdic on in Internet cases. 3.Personal Jurisdic on Theory All the person living within a defined area fall under the jurisdic on of court concerned. But the dispute takes place when the party or par es live out of its jurisdic onal territory or even out of the said poli cal en ty or country. This jurisdic on receives a definite setback in the internet arena as in it, almost in every country there are a number of cases, civil or criminal in which one party or the accused is a resident of another country. However, this tradi onal theory was slightly twisted by the court in Zippo manufacturing Co. V. Zippo Dot Com Inc. Which propounded the “sliding scale” theory which said that the nature of the defendant ac vity is the decisive factor in determining jurisdic on. Website which is passive, does not entail personal jurisdic on. 4. Sliding scale theory or "Zippo" Test has been generally accepted as the standard in Federal Courts in deciding personal jurisdic on in Internet cases. Such cases are now primarily decided based on a determina on of the website's "interac vity". Courts have held that the greater the commercial nature and level of interac vity associated with the website, the more likely it is that the website operator has "purposefully availed itself" of the forum state's jurisdic on 5. Choice of law theory There is a choice of laws op on in case of conflict of law situa on. There are in the physical world a number of approaches which govern the transna onal disputes; for example, the “choice of law methodologies to mi gate the “spill over effects”, the rule of interna onal law, etc. 6. Country-of -origin or Country of des na on theory There are divergent opinions regarding the rules country- of- des na on applicable to online commercial ac vity as the business house is required to answer in a law court a few 100 miles away for noncompliance with the law of that country. Then it will become not only imprac cal for the entrepreneur to run business in this way but it will also have to be on an extra charge to face a li ga on outside and away from their own jurisdic on. 7. Forum Selec on Theory In fact, the par es may themselves agree beforehand that for resolu on of their disputes, they would either approach any of the available courts of natural jurisdic on or to have the disputes resolved by a foreign court of their choice as a neutral forum according to the law applicable to that court. In Modi Entertainment Network v. W.S.G. Cricket Pvt. Ltd., it was held that it is a wellse led principle that by agreement the par es cannot confer jurisdic on where none exists, on a court to which CPC applies, but this principle does not apply when the par es agree to submit to the exclusive or non-exclusive jurisdic on of a foreign court 8.Internet Jurisdic on “Lex loci delic “rule( law of the place where the delict [tort] was commi ed" in the conflict of laws.) “Cyber Crimes have extraterritorial aspect.” In the pre-Internet period, personal jurisdic on was understood in terms of territoriality. The Physical Presence Theory (service within jurisdic on) is one of the core theories on which a court may claim to exercise jurisdic on over a defendant. Cyber space is a broad term which includes computers, networks, so ware, data storage devices, the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc. When one is online, one is almost everywhere. Tradi onal interpreta ons spelled limita ons be it subject ma er related or territorial, in the internet Age it means earth wide. As a single act on the net is the work play of several par cipants, as there are website owners, the online intermediaries, the host, the author or creator of a piece of wri ng or painter, etc, the corporate, the end user and so on. Hence a single infrac on or wrong may involve all or some of these and again as the nature of Net goes, it is quite possible that all of these come from various countries and hence, from various jurisdic on, In such a case , even if one applies tradi onal principles of jurisdic on some of these may fall in different jurisdic on by virtue of subject ma er jurisdic on and some may fall under yet another jurisdic on due to personal jurisdic on and yet some of the par cipants may remain uncovered by these principles. This leads to the birth of a law of cyberspace based on private contrac ng on a global basis and enforced by a combina on of the SYSOP’s (system operators) ul mate right to banish unruly users and the users ul mate right to migrate to other online service providers (such as ISPs). Tradi onal theories of jurisdic on are inapplicable to the Internet due to the following reasons: 1.material posted on the internet has worldwide audience; 2.It is easy to move website from one territory to another; 3. A website can be hosted on one area, but directed at users in another geographic loca on; 4.Parts of a website may be hosted in one area, while other parts of the websites are hosted in another loca on; and 5.It is not always possible to determine where a website or user is located. Areas of conflict : Tradi onally no ons of jurisdic on and the Internet The advent of internet culture gave the concept of a virtual world called as Cyber space which is basically a virtual environment created by interconnected computers and computer networks on internet without any boundary of distance and physical limita ons and overturned the century-old established theories of jurisdic on which were deeply rooted in the territorial and physical concept. While the Internet absolutely negates tangibility and terrestrial forms; applicability of laws of the physical world are bound to face unprecedented legal hardship The main areas of conflict are discussed in the subsequent sec ons Inter- sovereign conflict - Extension of laws of one State to another has been an unimageable concept unless it is backed by some treaty between the two states. For the Internet environment, this is the first requirement as the borderless cyberspace has no established norms. Hypothe cal situa on- X, a physician registered in the UK, diagnoses and prescribes medicine through a website to pa ents in India. A dispute thus arising between X and any pa ent in India, an Indian court can claim subject ma er jurisdic on over the ma er and issue, either summon or warrant to X to achieve his presence in the court saying that X is trea ng pa ents in India without being formally registered here. This situa on will obviously give rise to a conflict between UK and India and according to the tradi onal no on of sovereignty, both the countries are righ ully exercising their jurisdic on and authority over the ma er. This conflict has actually occurred in several cases like Yahoo! Inc. V. Ligue Contre Racisme et L’An semi sme, United States v. Thomas, etc Over inclusiveness- The tradi onal view rests on the concept that every sovereign state has unques onable authority within its geographical limits but when a website is created, the server is physically located within the boundaries of the state concerned. While as State, as according to the tradi onal no ons, has legi mate control over its subjects and over the physical infrastructure of the Internet (server, etc.), the par cular web page being visible in any part of the globe, all the 300 states of the planet may have; applying the same tradional no ons equal authority and interest. Under inclusiveness- In this dimension of tradi onal theories States are forbidden to cross the limit in in case of dispute arises between the par es from two different jurisdic on. It shuns the Idea of crossing these boundaries and advocates the limits of a state’s authority within its territorial boundaries. Thus, the under-inclusiveness of tradi onal concepts is revealed because the States that want to regulate internet ac vi es cannot effec vely enforce their laws against “purveyors of harmful material through the Internet” who are located outside their territorial borders. Indian Context of Jurisdic on. In Indian context the Code of Civil Procedure and Criminal Procedure Code incorporates the jurisdic on of the Court in the case na onal and interna onal aspects of issues. In case of India the general jurisdic on rules are contained in Code of Civil Procedure, 1908.The Code has specific jurisdic on provisions rela ng to moveable, immoveable property in sec on 16 to 18. In case of moveable property, the jurisdic onal rule is mostly defendant centric and in case of immoveable property it is the lex situs rule prevails i.e., the law of the forum where the property situated. Sec on 20 of the Code covers the interna onal jurisdic on and has interpreted in the internet related cases Jurisdic on under the IT Act, 2000 The substan ve source of cyber law in India is the Informa on Technology Act, 2000 (IT Act) which came into force on 17 October 2000. The objec ve of the Act is to provide legal recogni on to e- commerce and to facilitate storage of electronic records with the Government. • The State legisla ve enactments primarily reflect its prescrip ve jurisdic on. For example, the IT Act, 2000 provides for prescrip ve jurisdic on as it States: “The provisions of this Act shall apply also to any offence or contraven on commi ed outside India by any person irrespec ve of his na onality.”. • Further this Act shall apply to an offence or contraven on commi ed outside India by any person if the act or conduct cons tu ng the offence or contraven on involves a computer, computer system or computer network located in India. • It is the legisla ve func on of the Government to enact laws and judicial and/or administra ve func on to enforce those laws. Thus, the principles of jurisdic on followed by a State must not exceed the limits which interna onal law places upon its jurisdic on. The IT Act under the Sec 1(2) & Sec 75 of the Act incorporates the effect test of jurisdic on. The IT Act also penalizes various cybercrimes and provides strict punishments. In pursuant to this there are certain provision under this act which renders the idea of jurisdic on of court for the trial of cases pertaining cyber-crimes in India as well as outside India. Provisions of IT Act are as follows: Sec 1 specifies the extent of the applica on of this act. It states that: (2) It shall extend to the whole of India, save as otherwise provided in this Act, it applies also to any offence or contraven on thereunder commi ed outside India by any person. Sec 46 of the Act renders power to adjudicate in case of contraven on of any provision of this act and for the purpose adjudging it provides for the appointment of adjudica ng officer who is vested with the powers of civil courts which are conferred on the Cyber Appellate Tribunal Sec 48 of the act provides for the Establishment of Cyber Appellate Tribunal (1) The Central Government shall, by no fica on, establish one or more appellate tribunals to be known as the Cyber Regula ons Appellate Tribunal. Sec. 61 Civil Court not to have Jurisdic on. No Civil Court shall have jurisdic on to entertain any suit or proceeding in respect of any ma er which an adjudica ng officer or the Cyber Appellate Tribunal is empowered to determine under this Act. No court shall grant injunc on in respect of any ac on taken or to be taken in pursuance of any power conferred by or under this Act. Sec 62 Deals with appeal to High Court. Any person aggrieved by any decision or order of Cyber Appellate Tribunal may file an appeal to the High Court within 60 days from the date of communica on of such decision or order. The High Court may allow it to be filed within a further period of 60 days, if it is sa sfied that sufficient cause prevented him from filing the appeal within the prescribed period. Sec 75 deals with the provisions of the act to apply for offences or contraven on commi ed outside India. It states that: any offence or contraven on commi ed outside India by any person irrespec ve of his na onality. For the purpose of sub sec on (1), this act shall apply to an offence or contraven on commi ed outside India by any person if the act or conduct cons tu ng the offence or contraven on involves a computer, computer system or computer network located in India. The IT Act 2000 seems exhaus ve when it comes to adjudicate the ma er where the par es are Indian ci zen and the offence or any contraven on has been commi ed in India as the Indian Courts follow the principle of lex foris that means the law of the country but it s ll creates confusion in order to exercise its extra territorial jurisdic on where the offence has been commi ed outside India or by any non-ci zen. For instance, if an American ci zen damaged the reputa on of one of the Indian Poli cian by publishing lewd comments through the social media and the aggrieved person approached to Indian court for the jus ce. It is obvious that IT act, 2000 provides for extra territorial jurisdic on but the issue arises here that how far would it be effec ve to bring the American ci zen to India to be prosecuted for cyber defama on as the IT Act is not applicable to the American ci zen. Jurisdic on is a major issue which is not sa sfactorily addressed in the ITA or ITAA. Jurisdic on has been men oned in Sec ons 46, 48, 57 and 61 in the context of adjudica on process and the appellate procedure connected with and again in Sec on 80 and as part of the police officers’ powers to enter, search a public place for a cyber-crime etc. In the context of electronic record, Sec on 13 (3) and (4) discuss the place of dispatch and receipt of electronic record which may be taken as jurisprudence issues. In the case of India TV Independent News Service Pvt. Limited v. India Broadcast Live LLC & Ors.15the court applied the effect test of USA Court. The case is related to the launching of leading TV channels “INDIATV” in March 2004. As per the plain ff the mark was adopted since 01.12.2002 and they applied for registra on of the same mark on 22.01.2004. The mark was published in 2006 without any objec on within the s pulated period. During the search on internet plain ff discovered the website. Plain ff filed a suit against defendant for permanently restraining the defendant form the use of the mark. The Defendant ques oned the jurisdic on of the court as they claimed that they were American en es and don’t reside or work for gain in India. Realising the incompetency of the tradi onal jurisdic onal rules due to outside Indian territorial jurisdic on the court referred to jurisdic on rule of the USA court. Further, in the case of Banyan Tree Holding (P) Limited v. A. Murali Krishna Reddy - the Plain ff Company involved in hospitality industry had registered office at Singapore and defendants were from Hyderabad. It adopted the mark “Banyan Tree” and Banyan tree as device and maintain website,since1996.The Banyan tree was not a registered mark as per the law of the land as the applica on was pending for registra on. Defendant ini ated the project by the name “Banyan Tree Retreat” and adver sed on website. Plain ff filed case with Delhi High Court alleging dishonesty on part of the defendant. The court raised some important ques ons and replied it applying the jurisdic on rules of the USA court. The case of Super Casse es Industries ltd. v. Myspace Inc. & another, is related to copyright issues, cyber law and interna onal jurisdic on. The plain ff filed the suit for restraining infringement of copyright, damages etc. through website of Myspace having base at US. Defendant Myspace raised the jurisdic onal objec on on the ground that: (1) The defendant is residing and carrying on business outside the jurisdic on of this court i.e., USA, (2) The cause of ac on has not occurred within the territorial jurisdic on of Indian court. The Court in the case discussed jurisdic on rules of Copyright Act and the Code in detail. The Court emphasising on Sec on 62 of the Copyright Act held that the specific jurisdic onal provision is plain ff centric and due to non obstante clause it will operate in addi ons to what has been provided in the Code. This is to be treated as an addi onal ground above the normal grounds laid down in Sec on 20 of the Code of Civil Procedure. The opera on of the rule under Sec on 20 CPC is not absolute and is subjected to the municipal law. If municipal law provides otherwise or overrides the Private Interna onal Law principles, then the municipal law will prevail. In the given case the Code of Civil Procedure rules are overridden by the Copyright Act 1957 rules on jurisdic on. Delibera ng on the jurisdic on ground of ‘torts’, the Court held that the commission of the tort is in India. The website of the defendants was engaged in providing the online business worldwide including India. The tort or civil wrong is caused in India as the act of downloading of copyrighted songs has occurred in India without the permission of the plain ff. In case where the work is uploaded by the user on the foreign server, the ini a on of the tort or part of the same has occurred in India as the infringing work without the authority of the plain ff is communicated to the defendant with a limited licence to further modify and communicate further. The said commission of the acts or the part of the overt acts cons tutes the part of cause of ac on within the meaning of Sec on 20 (c) of the Code of Civil Procedure and therefore the court have jurisdic on even on the basis of the cause of ac on clause of CPC. Apart of IT Act 2000, there are other relevant legisla on under Indian laws that gives the authority to India Courts to adjudicate the ma ers related to cyber-crimes such as: Contract Tradi onally in case of contract the par es enjoy the autonomy of having op on to make choice of court agreement rela ng to the future contractual disputes. The same autonomy is applicable in the case of online contracts also. It is established principle that where more than one court have jurisdic on in a certain ma er, the agreement between the par es to confer jurisdic on only on one, to the exclusion of the other is valid and cannot be considered contrary to law. The same rule is applied to cases involving foreign elements. The Court in the case of Hakam Singh v. Gammo (India) Ltd. laid down two important condi ons for the applica on of autonomy to decide the jurisdic on of the court. 1. first, the Court selected by the common consent should have inherent jurisdic on , 2. second, more than one court should have the jurisdic on so that the choice of forum agreement can be exercised. However in case where the par es have not selected or applied their autonomy regarding the jurisdic on of the court then jurisdic on can be fixed on the basis “cause of ac on”. The” cause of ac on” arises in the following places: 1. The place of forma on of contract i.e., where the contract has been entered; 2. The place of performance i.e., where the contract is performed or is required to be performed as per the terms of contract; 3.The place where, the considera on is made Jurisdic on Based on Code of Civil Procedure, 1908 The concept of jurisdic on can be understood in a be er way with reference to sec on 15 to 20 of code of civil procedure (1908), which talks about the place of suing or the subject ma er jurisdic on and sec on 20 of this code specifically speaks about any other category of suit which is not covered in sec on 15 to 19 of the code. Sec on 20 serves important ingredients for the purpose of ins tu on of other suit in a court within the local limits of whose jurisdic on' the defendant or each of the defendants resides, or carries on business, or personally works for gain at the me of the commencement of suit. Any of the defendants, where there are more than one defendant resides, or carries on business, or personally works for gain at the me of the commencement of suit provided that in such cases either the leave of the court is given, or the defendants who do not reside, or carry on business, or personally works for gain, as aforesaid, acquiesce in such ins tu on or, the cause of ac on wholly or par ally arises. However, this sec on doesn't seem to be fit in virtual world. The issue with the cyber space jurisdic on is the presence of mul ple par es across various part of the globe who only have virtual connec ons among them therefore we cannot have a clear idea about the par es and the place of suing so that the jurisdic on of the court could be determined to try such cases. In all civil ma ers, the Code of Civil Procedure (CPC), 1908, basically formulates the Indian approach to jurisdic on. Under CPC, one or more courts may have jurisdic on to deal with a subject ma er having regard to the loca on of immovable property, place of residence or work of a defendant or place where cause of ac on has arisen. Where only one court has a jurisdic on, it is said to have exclusive jurisdic on; where more courts than one has jurisdic on over a subject ma er, they are called courts of available or natural jurisdic on. The jurisdic on of the courts to try all suits of civil nature is very expansive as is evident from the provisions of CPC. Basis of Jurisdic on 1.Pecuniary 2.Subject-ma er 3.Territory and 4.Cause of ac on In Casio India Co. Ltd. v. Ashita Tele Systems Pvt. Ltd., the plain ff was aggrieved by the registra on of the domain name www.casioindia.com by the defendant with its registered office in Mumbai. It filed a suit for trademark infringement in the Delhi High Court under the relevant provisions of the trademarks Act, 1999 along with an interim injunc on applica on under Order 39 Rule 1 &2 CPC, 1908. On the issue of territorial jurisdic on, the defendant contended that it carried on business in Mumbai only and no cause of ac on arose in Delhi. The plain ff, however, averred that the website could be accessed from Delhi also. A er referring to Gutnick, Jus ce Sarin observed that “once access to the impugned domain name website could be has from anywhere else, the jurisdic on in such ma ers cannot be confined to the territorial limits of the residence of the defendants.” Hence, it was held that ‘the fact that the website of the 2qwdefendant can be access from Delhi is sufficient to invoke the territorial jurisdic on of this court.’ In Satya v. Teja Singh, the Supreme Court held that “every case which comes before an Indian court must be decided in accordance with Indian law. It is another ma er that the Indian conflict of laws may require that the law of a foreign country ought to be applied in a given situa on for deciding a case, which contains a foreign element. Such recogni on is accorded not as an act of courtesy, but on considera ons of jus ce. It is implicit in that process that a foreign law must not offend our public policy.” Jurisdic on based on the Criminal Procedure Code, 1973 The Criminal Procedure Code and Informa on Technology Act 2000 resolve the jurisdic onal issue in case of Cyber Crimes in India. Sec on 1(2) of the IT Act refers to the concept of extraterritorial applica on of the Act by sta ng that it is extended to whole of India and applies to any offence or contraven on commi ed outside India by any person. na onality of the offender is not an issue for the applica on of IT Act. Sec on 75 further clarifies that the jurisdic on extends to any offence or contraven on commi ed outside India by any person irrespec ve of his na onality provided the act or conduct cons tute offence or contraven on involving a computer, computer system or computer network located in India. Therefore, the effect principle of jurisdic on has been accepted for the jurisdic on of court. Further, the Criminal Procedure Code under Sec on 177 to 189 deals with the jurisdic on of Court. Sec on 177 lays down that the offence will be tried down by the Court within whose local jurisdic on the offence was commi ed. If the offence is a con nuing one or commi ed in parts in different territory, as per Sec on 178 the Court having the jurisdic on over any of such local area can entertain the trail. Sec on 179 lays down the principle that the jurisdic on of Court where offence is commi ed or consequence is ensued. Following it Sec on 182 requires that any offence of chea ng by means of telecommunica on be tried into any court whose local jurisdic on such message were sent or received. In case of the offender commits the crime beyond local jurisdic on but resides within the local jurisdic on, then within the jurisdic on of local court where he resides may inquire into the offence as if it is commi ed in the local area. Sec on 188 incorporate the na onality principle of jurisdic on as it provides that if a ci zen of India outside the country commits the offence, the same is subject to the jurisdic on of court in India. However the court can apply the jurisdic on in the above case only if the offender is brought within the territory of the State. ii • The Cr.P.C. lays down that the ordinary place of trial and inquiry is the court in whose jurisdic on the crime has been commi ed. However, the subsequent provisions of the Cr.P.C. dilute the strict necessity of territorial jurisdic on. • The place of commission of an offence is uncertain, the offence is con nuing or it has been commi ed partly in one and partly in another or it is several acts in several places, a court having jurisdic on in any place may try the case. • An offence can be tried where the consequence ensues. These provisions are very relevant with regard to computer offences, in which the place of commission is very difficult to locate. • In case of offence by le ers or telecom messages, jurisdic on lay with the court where the message was sent or received. Thus, this provision shall be resorted to in case of offences involving an e-mail. • Further the Cr.P,C. provides that no sentence or order of a criminal court can be set aside for wrong Sec on 179 deals with the consequences of crime in Indian territory. Sec on 188 of CrPC 1973 provides that even if a ci zen of India outside the country commits the offence, the same is subject to the jurisdic on of courts in India. Jurisdic on under IPC, 1860 Sec. 3. Punishment of offences commi ed beyond, but which by law may be tried within, India. —Any person liable, by any [Indian law] to be tried for an offence commi ed beyond [India] shall be dealt with according to the provisions of this Code for any act commi ed beyond [India] in the same manner as if such act had been commi ed within [India]. Sec.4Extension of Code to extra-territorial offences. The provisions of this Code apply also to any offence commi ed by: (1) any ci zen of India in any place without and beyond India; (2) any person on any ship or aircra registered in India wherever it may be. 3) any person in any place without and beyond India commi ng offence targe ng a computer resource located in India. Discussion reflects that the jurisdic on issues are comprehensively dealt by the Informa on Technology Act and Criminal Procedure Code. The jurisdic on of the court in case of cybercrime commi ed by out state offender having impact within the territory of local court is not useful ll the me offender is not within the jurisdic on of any local court. In such cases the extradi on is the op on to bring the offender within the territory of India. Though presently there is no Universal Conven on on Extradi on and therefore, in the absence of it, extradi on is facilitated between States by bilateral agreement. Relevant cases laws: SIL Import v. Exim Aides Silk Importers In this case the court successfully highlighted the need of interpreta on of the statute by judiciary in the light of technological advancement that has occurred so far Un l there is specific legisla on in regard to the jurisdic on of the Indian Courts with respect to Internet disputes, or unless India is a signatory to an Interna onal Treaty under which the jurisdic on of the na onal courts and circumstances under which they can be exercised are spelt out, the Indian courts will have to give a wide interpreta on to the exis ng statutes, for exercising Internet disputes. Impresario Entertainment & Hospitality Pvt. Ltd. vs S&D Hospitality Facts – in this case the plain ff's company offers restaurant services which has its registered office in Mumbai and is carrying its business in New Delhi and a restaurant under the name and style of 'SOCIAL' which it has trademark and has various branches as well. The plain ff came to know about the defendant's restaurant in Hyderabad under the name 'SOCIAL MONKEY. Also, it has a popular beverage by the name A GAME OF SLING and the defendant has named a beverage as Hyderabad Sling which is iden cal or decep vely similar to the plain ff's beverage. Both these outlets had entered into contract with websites like Zomato and Dine Out and so the informa on of both, along with menu and contact info was made available on the websites of Zomato and Dine Out. Therefore, issue before the Delhi High Court was whether it had the jurisdic on to adjudicate upon the ma er? The Hon'ble Court also observed that for the purposes of a passing off or an infringement ac on (where the plain ff is not located within the jurisdic on of the court), the injury on the plain ff’s business, goodwill or reputa on within the forum state as a result of the Defendant's website being accessed in the forum state would must be shown. Therefore, the court held that mere interac vity of the website in the forum State did not a ract its jurisdic on. Earlier similar view was given in the case of Banyan Tree Holding (P) Limited v. A. Murali Reddy and Anr wherein the court held that a passive website, with no inten on to specifically target audiences outside the State where the host of the website is located, cannot vest the forum court with jurisdic on. Some other Case Laws in regards to problems associated with Jurisdiction The issue of jurisdiction has been the most discussed and has been a point of convergence of the entire globe. Without a particular lawful system for the internet, much dependence is set on legal declarations of different nations that have built up the idea of ‘Internet Jurisdiction’. International Shoe Co. V. Washington The Washington state ordered an expense on organizations working together there that worked as a required commitment to its Unemployment Compensation Fund, which was expressed to have been applied to the Plaintiff. The US Courtroom held that the court can practice its jurisdiction over non-occupant respondents if certain ‘base contacts’ with party states exist to such an extent that the upkeep of the suit doesn’t affront conventional ideas of reasonable play and generous equity.’ This hypothesis was additionally restricted to ‘purposeful ailment of the litigant to the discussion state. The forum court may practice its jurisdiction over a non-inhabitant Respondent/Litigants not actually present where a supposed injury emerges out of or identifies with activities by the Defendant himself that are ‘deliberately coordinated’ towards inhabitants of the party-state. It was held that ‘deliberate availment’ would not result from ‘irregular’ or ‘serendipitous’ contacts by the defendant in the forum state. Nonetheless, a legitimate analysis of nature and quality of business exercises of a site regarding deciding the jurisdiction was considered in Zippo Manufacturing Co. v. Zippo Dot Com, Inc which presented ‘sliding scale examinations depending on passive, dynamic, and intelligent sites. Court saw that simple detached sites don’t frame individual jurisdiction; however, those sites that empower parties of discussion state to go into contracts examining business with the gathering state may give individual jurisdiction. Further, jurisdiction on the impact of online connection in the forum state was advanced by the Supreme Court in Calder v. Jones. The impact test is applied in cases with inadequate intelligence or least contacts however where activity is focused at a specific party. In the Internet setting, the impact test can be utilized to analyse the specific idea of a Defendant’s Internet exercises to decide if its out-of-state activities were aimed at parties or substances inside the forum state. Further in Calder v. Jones, it was held that “deliberate heading requires a purposeful activity that was explicitly focused on the party-state, with information that the brunt of the injury would be felt in the forum state. In the event that a court tracks down a Defendant’s activities fulfilling the guideline of deliberate heading, individual jurisdiction might be declared dependent on Internet activities that don’t meet the essential degree of intelligence or least contacts required for different trials of individual jurisdiction in Internet cases.” The principal case to contemplate over the Internet jurisdiction was Casio India Co. V Ashita Tele Systems Pvt. Ltd , where the court passed a directive against Defendant from utilizing the site www.casioindia.com in light of the way that the site of Defendant is available in Delhi, which is adequate to summon the regional jurisdiction of this Court. The High Court of Delhi held that the simple capacity to get to the site gave the court regional ward to settle on the current matter. In 2007, the Delhi High Court emphasized the US courts property that, where the site is an intuitive one, having the objective crowd in somewhere else, the court of those spots has the locale of debate emerging from that site exercises, independent of the spot of respondents. Indian Position on this issue was made very clear by the Delhi High Court on account of Banyan Tree Holding (P) Limited v. A. Murali Krishna Reddy and Anr. The most fascinating reality of the case was that both the parties to the case were not arranged inside the regional jurisdiction of the court yet the sites of both the parties were available in Delhi. The court’s view transformed from the Casio case and saw that the simple availability of a site in Delhi isn’t adequate to incite ward by the Delhi Court. It repeated US case laws and held that ‘The offended party needs to show Defendant’s ‘deliberate ailment coordinated towards the discussion state, demonstrating that the utilization of site was with the expectation of business exchange with the site client which prompts a harm or injury to the offended party.’ The High Court of Delhi got the position free from deciding Internet jurisdiction in World Wrestling Entertainment, Inc. versus M/s. Reshma Collection & Ors , where it was initially held that the simple availability of the site in a party state which ‘requests’ its business, through which Defendant’s goods and administrations are sold, is sufficient to raise reason for activity and in deciding the individual jurisdiction in Delhi. The equivalent was emphasized in Choice Hotels International Inc. v. M. Sanjay Kumar and Ors by the single appointed authority seat in the High Court of Delhi. The issue of Internet jurisdiction has been testing a result of the association in various areas. Be that as it may, Indian Courts have certainly invented the Internet jurisdiction with a wide viewpoint by alluding to different case laws internationally. Through investigation of plenty of case laws, we can see that Indian Courts have very much combined the key laws of the jurisdiction, for example, Section 19 and 20 of CPC, in deciding the Internet jurisdiction. It can likewise be noticed that the simple presence of a site is adequate to summon jurisdiction despite the fact that the site has been utilized distinctly to request organizations at a specific spot, in this way, generally perceiving the impact test as spread out by the US Court in Calder case. In any case, the act of observing just priority on case laws, without having particular rules or laws will make these hypotheses of deciding jurisdiction powerless. Interna onal Posi on Of Internet Jurisdic on Cases in Cyber Jurisdic on The internet today is making a complete mockery of the law…. not just the tradi onal laws but even the so-called modern laws. The very basis of any jus ce delivery system, the jurisdic on, which gives powers to a par cular court to accommodate a par cular case, is itself being threatened over the internet; leave alone the other tradi onal laws. Stand of the USA. The USA recognises two different forms of personal jurisdic on known as “General Jurisdic on” an “Specific Jurisdic on”. The Courts under the General jurisdic on adjudicate any claim against defendant related to claims linked with the forum State. Tradi onally speaking, the US Cons tu on requires minimum contacts between a poten al defendant and the forum State. The two cons tu onal tests regarding asser ng jurisdic on over a foreign defendant were laid down in Interna onal Shoe Co. V. Washington. In tort ma ers, the lex loci delic , the rule that the place in which injury occurred is place of suing; was followed, but now the ever-expanding boundaries of the Internet have, both in civil and criminal ma ers, exposed the defendant to universal jurisdic on. In the minimum contacts rule if the ac on is against a person in personam, then the minimum contact must apply to the defendant and if the ac on is against a thing in rem, then the minimum contacts must apply to that thing. In rem, jurisdic on might apply to the asser on of claims for jurisdic on based on e-mail storage box or stored file that is located on a computer server in the forum jurisdic on. The minimum contacts jurisdic on has been based on domicile and consent. However, domicile is not affected by the internet and the transac ons that pass through the internet. In internet transac ons the minimum contact test is met by establishing the Internet related ac ons which are but certain electronic transmission to decide whether there are sufficient minimum contacts before a par cular court to assert jurisdic on. Thus, in the US, the courts have taken electronic transmission into or other electronic connec ons with the forum jurisdic on as the basis of jurisdic on but some courts have found that using an electronic network does not subject the user to jurisdic on everywhere. The crucial issue of applicability of personal jurisdic on to Internet ac vi es is where the judiciary opined that mere availability of a website is not enough to establish minimum contact so as to exercise jurisdic on over it. Other contacts in the forum State must also be established before jus fied jurisdic on is exercised, held in Hoarst Corp. V. Goldberger 1997 US Dist. LEXIS 2065(SDNY) The sliding- scale approach is comprehensively and formally stated in Zippo Manufacturing Co. Zippo.Com Inc 952 F supp 1119(WD Pa 1997) Apart from sliding scale theory, determina on of jurisdic on also takes place with the aid of effects test also known as Calder Effect Test, propounded by the US Supreme Court in Calder v Jones, in which it was held that jurisdic on can be premised on the inten onal conduct of the defendant outside the forum state that is calculated to cause injury to the plain ff within the forum State. This test was applied for online ac vity was enough to establish jurisdic on as the defendant knew that his act will cause injury to the plain ff in the forum State where the plain ff corpora on had its principal place of business and thus, fulfilled the requirement of “purposeful availment”. The test was more elaborately applied in Yahoo! Inc. v. La Ligue Contre Le Racisme, in which the court held that jurisdic on could be exercised in California over French civil rights groups under French hate laws. Out of two approaches, the sliding-scale theory is mainly helpful in resolving the disputes which are mainly in the area of commercial ac vi es, copyright or trademark infringements, or in intellectual property cases. The effects test is mainly useful in criminal ma ers. here at least three jurisdic ons are involved and who shall try him? The dilemma was described very appropriately by La Forest, J., in Liebman v. The Queen, in following words: “one is to assume that the jurisdic on lies in the country where the crime is planned or ini ated. Other possibili es include the impact of the offence is felt, where it is ini ated, where it is completed or again where the gravamen or the essen al element of the offence took place. It is also possible to maintain that any country where any substan al or any part of the chain of events cons tu ng an offence takes place may take jurisdic on. In Burger King Corp. v., it was held that the exercise or personal jurisdic on over an out of state defendant must comport with cons tu onal due process. In Doe v. Unocal Corp., it was held that when an exercise of personal jurisdic on is challenged, the burden is on the plain ff to demonstrate why the exercise of jurisdic on is proper. In Ballard v. Savage, it was held that the plain ff can sa sfy this burden of proof by showing the following things: the defendant purposefully availed itself of the privilege of conduc ng ac vi es in the forum state by invoking the benefits and protec ons of the forum state’s laws; Jurisdic on on the Basis of Online Contract Online contracts come with ‘terms of service’ agreements and disclaimers. These agreements impose restric ons on the users regarding the choice of law and forum selec on. In Bremen v. Zapata Off-Shore Co., the judicial view arrived was that “such clauses (forum selec on) are prima facie valid and should be enforced unless enforcement is shown by the resis ng party to be ‘unreasonable’ under the circumstances.” This rule applies, under the federal law, both if the clause was a result of nego a on between two business en es, and if it is contained in a form of contract that a business presents to an individual on a take-itor-leave-it basis Forum Selec on Clauses: Click-trap Contracts It makes a good legal sense for the online service providers to limit their exposure to one jurisdic on only. Defending lawsuits at mul ple loca ons could be both expensive and frustra ng. Thus, the online service provider has no other choice but to subject themselves to only one set of forum and applicable laws only. The user has no other choice, but to accept the service provider’s ‘terms of service’ condi ons by clicking an on-screen bu on that says “I Agree”, “I Accept” or “Yes”. In Steven J Caspi et al v. The Microso Network, L.L.C., et al., the user could not use Microso Network unless she clicked the “I agree” bu on next to a scrollable window containing the terms of use. Each plain ff clicked the “I agree” bu on to use Microso Network, indica ng their assent to be bound by the terms of the subscriber agreement and thus forming a valid licence agreement. The Superior Court of New Jersey held that the forum selec on clause contained in Microso Network subscriber agreements was enforceable and valid. Jurisdic on Based on Loca on of a Web Server Asser ng personal jurisdic on based on the defendant’s use of IT infrastructure of a service provider, located in the forum state, to host its website may also compel the forum state to exercise its jurisdic on over such defendant. In Jewish Defence Organiza on, Inc. v. Superior Court, the plain ff brought an ac on for defama on in a California court. Defendant’s only relevant contacts with California consisted of contrac ng with Internet service providers, “located in California,” to host a website which they maintained form their residence in New York. The court concluded that the defendant’s conduct of contrac ng, via computer, with Internet service providers, which may be California corpora ons or which may maintain offices or databases in California, is insufficient to cons tute ‘purposeful availment. But in 3DO Co. v. Poptop So ware Inc., the court found it relevant that “defendants use a San Francisco-based company as a server to operate a website that distributes allegedly infringing copies of so ware.” The European approach to personal jurisdic on in cross- border dispute is rather different from the American approach. The rules determining which country’s courts have jurisdic on over a defendant are set out in a regula on issued by the Council of the European Union, known as the ‘Brussels Regula on’. This new regula on is an update of a 1968 treaty among European countries, known as the Brussels Conven on on Jurisdic on and the Enforcement of Judgments in Civil and Commercial ma ers. Brussels Regula on The Brussels Regula on, which became effec ve on March 1, 2002, (The Regula on on Jurisdic on and the Recogni on and Enforcement of Judgments in Civil and Commercial ma ers and online commercial disputes) replaces Brussels Conven on of 1968. It is applicable to all European Council countries except Denmark, which will con nue to follow the rules of the Brussels Conven on and the EFTA countries (Iceland, Liechtenstein, Norway, Switzerland and Poland), where rules of the 1988 Lugano Conven on will be applicable. Applicability of Brussels Regula on in Online Environment Brussels Regula on sets the rule of jurisdic on: “subject to the provisions of this Regula on, persons domiciled in a Contrac ng State shall, whatever their na onality, be sued in the courts of that State”. Further, a person domiciled in a Contrac ng State may, in another Contrac ng State, be sued ‘in ma ers rela ng to contract, in the courts for the place of performance of the obliga on in ques on’. Further, the domicile of a company or other associa on (including a partnership) is where it has its statutory seat (i.e., its registered office), its central administra on or its principal place of business. From the point of promo ons and sale, the Regula on says that the consumer may sue at home if the trader pursues commercial ac vi es in the Member State of the consumer’s domicile or, by any means, directs such ac vi es to that Member State India and interna onal conven on over cyber jurisdic on: Conven on on Cyber-crime, 2001 also known as the Budapest Conven on, is the first interna onal treaty which discusses about the Internet and cybercrime by considering na onal laws, increasing coopera on among na ons and improving inves ga ve techniques The Conven on on Cyber-crime was opened at Budapest on 23rd November, 2001 for signatures. It was signed by the Council of Europe in Strasbourg, France, Canada, Japan, Philippines, South Africa and the United States. However, countries like India and Brazil have declined to adopt the Conven on on the grounds that they didn't par cipate in its dra ing but due to increasing incident of cyber-crimes India has been reconsidering its stand on the conven on since 2018. It was the first ever-interna onal treaty on criminal offences commi ed against or with the help of computer networks such as the Internet. The Conven on deals in par cular with offences related to infringement of copyright, computerrelated fraud, child pornography and offences connected with security. It also covers a series of procedural powers such as searches of and intercep on of material on computer networks. Its main aim is to pursue “a common criminal policy aimed at the protec on of society against cyber-crime, inter alia by adop ng appropriate legisla on and fostering interna onal coopera on.” Ar cle 22 The Conven on on Cyber Crime, 2001 allows the country to have jurisdic on if the cyber crime is commi ed: In its territory; On board a ship flying the flag of the country; On board an aircra registered under the laws of the country By one of the countries na onals, if the offence is punishable under criminal law where it was commi ed or if the offence is commi ed outside the territorial jurisdic on of any State India is s ll not a signatory to the Cyber Crime Conven on and the bilateral extradi on trea es, which it has signed with around 50 countries so far, do not men on ‘cyber-crime’ as extraditable offences. But it may not deter the Indian government from gran ng extradi on, as it was held in Rambabu Saxena v. State, that “if the treaty does not enlist a par cular offence for which extradi on was sought, but authorizes the Indian government to grant extradi on for some addi onal offences by inser ng a general clause to this effect, extradi on may s ll be granted.” United Na ons Conven on against Transna onal Organized Crime (UNTOC): UNTOC is also known as the Palermo Conven on This treaty was adopted by resolu on of the UN General Assembly in November 2000. India being a signatory to this joined in 2002. UNTOC is also known as the Palermo Conven on, under this the state par es are obliged to enact domes c criminal offences that target organised criminal groups and to adopt new frameworks for extradi on, mutual legal assistance, and law enforcement coopera on. Although the treaty does not explicitly address cyber-crime, its provisions are highly relevant. In pursuant to this treaty Indian Parliament enacted the Informa on Technology Act 2000. Rome Conven on To resolve cross-border consumer contractual disputes, the EU Member States became signatories to the Rome Conven on, 1980. It decides which country law would applies in contractual disputes. The Conven on gave freedom of choice to the contrac ng par es, as it states that “a contract shall be governed by the law chosen by the par es. The choice must be express or demonstrated with reasonably certainty.” It further states that “the mandatory rules of the consumer’s country of habitual residence will always apply whatever choice of law is made.” Cyber law encompasses laws rela ng to: Cyber crimes Electronic and digital signatures Intellectual property Data protec on and privacy Cyber space includes computers, networks, so ware, data storage devices(such as hard disks, USB disks etc), the internet, websites, emails and even electronic devices such as cell phones, ATM machines etc. Cyber Crime Any crime with the help of computer and telecommunica on technology. Any crime where either the computer is used as an object or subject. Categories of Cyber Crime 1. Cybercrimes against persons 2. Cybercrimes against property 3. Cybercrimes against government 1. Against a Person Cyber stalking Impersona on Loss of Privacy Transmission of Obscene Material Harassment with the use of computer 2. Against Property Unauthorized Computer Trespassing Computer vandalism Transmission of harmful programmes Siphoning of funds from financial ins tu ons Stealing secret informa on & data Copyright 3. Against Government Hacking of Government websites Cyber Extor on Cyber Terrorism Computer Viruses Some Other Crimes Logic Bombs Spamming Virus, worms, Trojan Horse E-Mail Bombing E-Mail abuse etc. Cyber-crimes against individuals The following are some of the main cyber-crimes commi ed targe ng individuals. Cyberbullying The term cyberbullying is not defined under any Indian law. in general cyberbullying refers to bullying someone by threatening, harassing or embarrassing the vic m using technology digital device. Generally, cyberbullying includes the following ac vi es on the internet: Humilia ng/embarrassing content posted online about the vic m of online bullying, hacking social media accounts Pos ng vulgar messages on social media Threatening the vic m to commit any violent ac vity Child pornography or threatening someone with child pornography In India, a whopping amount of almost 85% of children experiences cyberbullying. There are no specific provisions that deal with cyberbullying. Sec on 67 of the IT Act is the closest legal provision rela ng to cyberbullying. It penalises anyone who transmits obscene materials in electronic form. The punishment for such transmission is imprisonment for a term which may extend to 5 years and a fine which may extend to ten lakh rupees. Also, Sec on 66E of the IT Act provides the punishment for viola ng any person’s privacy through the internet. Under this sec on, any person who inten onally violates anyone’s privacy by transmi ng, capturing or publishing private pictures of others shall be punished with imprisonment up to three years imprisonment or a fine of up to 3 lakhs. Further, Sec on 507 of IPC provides that any person who threatens anyone through anonymous communica on shall be punished with imprisonment for up to 2 years. One of the prime cases in which cyberbullying was discussed was Shreya Singhal v. Union of India (2015). In this case, the Hon’ble Supreme Court struck down Sec on 66A of the IT Act. The said Sec on dealt with the transmission of objec onable messages via a computer resource. The court held that the said Sec on was a viola on of Ar cle 19(1)(a) of the Indian Cons tu on, which deals with ci zens’ right to freedom of speech and expression. The court further held that other legal provisions like Sec ons 66B and 67C of the IT Act and several Sec ons of the IPC were sufficient enough to deal with cyberbullying. Cyberstalking Browsing anyone’s internet history or online ac vity, and sending obscene content online with the help of any social media, so ware, applica on, etc. to know about that par cular person is called cyberstalking. Cyberstalks take advantage of the inconspicuousness provided by the internet.; once the stalker deletes the account, his/ her iden ty completely vanishes. In India, in the year 2020, the state of U ar Pradesh witnessed the highest number of cyberstalking incidents against women and children, with around 11 thousand registered cases. Sec on 67 of the IT Act punishes cyber stalkers who send, cause to send, or publish obscene posts or content on electronic media with imprisonment of up to 3 years and a fine. Sec on 354D of IPC deals with stalking. But it is relevant to cyberstalking as well. Under the Sec on, any cyber stalker is punishable with imprisonment up to 3 years and a fine. Cyber defama on Cyber defama on means injuring the other person’s reputa on via the internet through social media, Emails etc. There are two types of Cyber defama on: libel and slander. Libel: It refers to any defamatory statement which is in wri en form. For instance, wri ng defamatory comments on posts, forwarding defamatory messages on social media groups, etc. are a part of cyber defama on in the form of libel. Slander: It refers to any defamatory statement published in oral form. For instance, uploading videos defaming someone on YouTube is a part of cyber defama on in the form of slander. Punishment for Cyber defama on is provided under Sec on 67 of the IT Act; whoever publishes or transmits a defamatory statement about a person shall be punished with 2 years’ imprisonment and a fine up to ₹25000. Phishing Phishing refers to the fraudulent prac ce of sending emails under the pretext of reputable companies to induce individuals to reveal personal informa on, such as passwords, credit card numbers, etc., online. Phishing refers to the impersona on of a legi mate person and fraudulently stealing someone’s data. Through phishing a acks, cybercriminals not only exploit innocent individuals but also spoil the reputa on of well-known companies. Sec on 66C of the IT Act penalises any offender commi ng phishing-related ac vi es. It provides that anyone who fraudulently uses an electronic signature, password or any other unique iden fica on feature of any other person is punishable with imprisonment of up to 3 years and a fine of up to rupees one lakh. Cyber fraud cyber fraud refers to any act of fraud commi ed with the use of a computer. Any person who dishonestly uses the internet to illegal deceive people and gets personal data, communica on, etc. with a mo ve to make money is called a cyber fraud. Examples of cyber fraud include sending emails containing fake invoices, sending fake emails from email addresses similar to the official ones, etc. There is no specifica on for cyber fraud. But Sec on 420 of IPC which deals with chea ng applies to cyber fraud also. Punishment for cyber fraud under Sec on 420 of IPC is imprisonment of up to 7 years with a fine. Cyber the the unauthorized access of personal or other informa on of people by using the internet. The main mo ve of the cyber criminals who commit cyber the is to gather confiden al data like passwords, images, phone numbers, etc. and use it as leverage to demand a lumpsum amount of money. The unauthorized transmission of copyrighted materials, trademarks, etc. over the internet is also a part of cyber the . Cyber the s are commi ed through various means, like hacking, email/ SMS spoofing, etc. Yahoo!, Inc. v. Akash Arora (1999), which was one of the ini al cases related to cyber the in India. In this case, the defendant was accused of using the trademark or domain name ‘yahooindia.com,’. The Court ordered a permanent injunc on under Order 39 Rules 1 & 2 CPC in this case. Under the IT Act, data the is defined under Sec on 43(b) as downloading, copying, or extrac ng any data, computer database or informa on from such computer, system, or network without the permission of its owner. Punishment for cyber the (specifically, iden ty the ) is provided under Sec on 66C of the IT Act. The punishment for the same is imprisonment of up to 3 years and/or up to Rs 2 lakh fine. Spyware Spyware is a type of malware or malicious so ware, when it is installed, it starts accessing and compu ng the other person’s device without the end user’s knowledge. The primary goal of this so ware is to steal credit card numbers, passwords, One-Time Passwords (OTPs), etc. Punishment for spyware is provided under Sec on 43 of the IT Act. It states that if any person damages the computer, system, etc. of any other person without his/ her permission, he/ she shall be liable to pay damages by way of compensa on to the person so affected. Cyber-crimes against organiza ons cyber-a acking large companies or organisa ons can help them get their hands on extremely confiden al data of both private and public ins tu ons or en es. Cyber-a acks on organiza ons are generally launched on a large scale to get a lump sum amount of ransom. Since such a acks dras cally damage the companies’ daily opera ons, most companies try to resolve them as fast as possible. The following are the kinds of cyber-crimes launched targe ng organiza ons. A acks by virus A computer virus is a kind of malware which connects itself to another computer program and can replicate and expand when any person a empts to run it on their computer system. For example, the opening of unknown a achments received from malicious emails may lead to the automa c installa on of the virus on the system in which it is opened. These viruses are extremely dangerous, as they can steal or destroy computer data, crash computer systems, etc. The a ackers’ program such malicious viruses to get hold of organisa ons’ official or confiden al data. The illegally retrieved data is then used as leverage to extort ransom from the organisa ons. There are no specific provisions as to virus a acks in India. Nevertheless, Sec on 383 of IPC, which deals with extor on, is applicable to virus a acks. The Sec on states that whoever inten onally puts any person in fear of any injury to him or anyone else, and dishonestly induces the person so put in fear to deliver to any property or valuable security, or anything signed or sealed which may be converted into a valuable security, commits ‘Extor on’. The punishment for extor on under Sec on 384 of IPC is imprisonment for up to 3 years, or fine, or both. Salami a ack It is one of the tac cs to steal money, which means the hacker steals the money in small amounts. The damage done is so minor that it is unno ced. Generally, there are two types of Salami a acks- Salami slicing and Penny shaving. In Salami slicing, the a acker uses an online database to obtain customer informa on, such as bank/credit card details. Over me, the a acker deducts insignificant amounts from each account. These sums naturally add up to large sums of money taken from the joint accounts invisibly. Any person convicted of a Salami a ack shall be punished under Sec on 66 IT Act with imprisonment up to 3years or a fine up to 5 lakhs or maybe both Web Jacking Web Jacking refers to the illegal redirec on of a user’s browser from a trusted domain’s page to a fake domain without the user’s consent. By using the method of Web Jacking, people visi ng any well-known or reliable website can be easily redirected to bogus websites, which in turn lead to the installa on of malware, leak of personal data, etc. Web jackers intend to illegally collect confiden al informa on of users by en cing them to click on any link which may seem genuine at the first glance. There are no specific provisions dealing with web jacking under any Indian law. However, it can be punished under Sec on 383 of IPC, which primarily deals with extor on. The punishment for web jacking under Sec on 383 of IPC is imprisonment of up to 3 years or with a fine, or both. Denial of Service A ack Denial of Service A ack or DoS, is a cyber-a ack on computer devices or systems, preven ng the legal users or accessors of the system from accessing them. The a ackers generally a ack systems in such a manner by trafficking the targeted system un l it ul mately crashes. DoS a acks cost millions of dollars to the corporate world, as it curbs them from using their own systems and carrying out their ac vi es. The a ack may be also used to incorporate ransomware into corporate systems. Cyber a ackers who launch DoS in India are punishable under Sec on 66F of the IT Act, which deals with cyber terrorism. As per the said Sec on, any person who disrupts the authorised access to a computer resource or gets access to a computer resource through unauthorised means or causes damage to a computer network is liable for imprisonment which may extend for life. Data diddling Data diddling is a cyber-crime which involves the unauthorized altera on of data entries on a computer. It may be done either before or during the entry of such data. It is generally commi ed by way of computer virus a acks. At mes, to conceal the altera on, the altered data is changed to its original data a er retrieving the required informa on. Usually, the strategic or sta s cal data of large companies. In India, data diddling is an offence under Sec on 65 of the IT Act. The said Sec on provides that knowingly or inten onally concealing, destroying, altering or causing another to conceal, destroy, or alter any computer source code used for a computer, computer programme, computer system or computer network is punishable with imprisonment of up to 3 years or with fine of up to two lakhs. Cyber-crimes against society at large various other cyber-a acks are launched against the community at large. Such cyber crimes may be aimed either against any par cular sec on of society or the en re country. The following are a few types of cyber-crimes against the community at large. Cyber pornography As per Merriam-Webster Dic onary, pornography is the depic on of ero c behaviour (as in pictures or wri ng) intended to cause sexual excitement. Accordingly, cyber pornography refers to using the internet to display, distribute, import, or publish pornography or obscene materials. Under the IT Act, provisions as to cyber pornography are given under Sec on 67 of the IT Act. It states that the following ac vi es are punishable with imprisonment of up to 3 years and a fine of up to 5 lakhs: Uploading pornographic content on any website, social media, etc. where third par es may access it. Transmi ng obscene photos to anyone through email, messaging, social media, etc. Cyber terrorism Cyber terrorism means using cyberspace to hurt the general public and damage the integrity and sovereignty of any country. The IT Act defines cyber terrorism under Sec on 66F as any acts done by a person with the intent to create a threat to the unity, integrity, sovereignty and security of the na on or create terror in minds of people or sec on of people by way of disrup ng the authorised access to a computer resource or ge ng access to a computer resource through unauthorised means or causing damage to a computer network. Cyber terrorism is generally carried out in the following ways: Hacking government-owned systems of the target country and ge ng confiden al informa on. Destruc ng and destroying government databases and backups by incorpora ng viruses or malware into the systems. Disrup ng government networks of the target na on. Distrac ng the government authori es and preven ng them from focusing on ma ers of priority. The punishment for cyber terrorism as provided under Sec on 66F of the IT Act is imprisonment of up to 3 years and/or up to Rs 2 lakh fine. Cyber Espionage According to Merriam-Webster Dic onary, espionage is “the prac ce of spying or using spies to obtain informa on about the plans and ac vi es especially of a foreign government or a compe ng company.” Similarly, cyber espionage refers to the unauthorized accessing of sensi ve data or intellectual property for economic, or poli cal reasons. It is also called ‘cyber spying’. In most cases of cyber espionage, spies in the form of hackers are deliberately recruited to launch cyber-a acks on the government systems of enemy na ons to stealthily collect confiden al informa on. The cross-border exposure of sensi ve data related to any country can con nue as long as it stays undetected. The informa on gathered through cyber espionage is then used by the gathering country to either combat or launch military or poli cal a acks on the enemy country. Generally, the following data are gathered through cyber espionage: Military data Academic research-related data Intellectual property Poli cally strategic data, etc. Though cyber espionage has serious consequences, unfortunately, there are no specific provisions related to it under any Indian law. However, cyber spies may be punished under Sec on 120A of IPC, which deals with criminal conspiracy. It provides that when two or more per-sons agree to do, or cause to be done, –an illegal act, or an act which is not illegal by illegal means, such an agree-ment is designated a criminal conspiracy. The punishment of criminal conspiracy is provided under Sec on 120B of IPC as a death sentence, imprisonment for life, and rigorous imprisonment for at least 2 years. Further, any Indian who abets cyber espionage against India can be also punished under Sec on 121 of IPC, which deals with waging, a emp ng, or abe ng waging war against the Government of India. The punishment prescribed for the same is the death sentence, imprisonment for life, and a fine. Hacking Hacking is basically gaining unauthorized access to your system profit, protest, informa on gathering, or to evaluate system weaknesses. The provisions for hacking are given in IT Act, 2000 under sec on 43-A and 66 and sec on 379 & 406 of Indian Penal Code. The punishment for hacking is 3 years or shall be imposed with fine up to 5 lakhs. Denial of Service It brings down the server (any server). It is known as the flooding machine with requests in an a empt to overload systems. It also uses bots for tasks. The provisions are given under sec on 43(f) of IT Act with imprisonment up to 3 years or with fine up to 5 lakh rupees. Virus Dissemina on It involves direct or search unauthorized access to system by introducing malicious programs known as viruses, worms etc. Virus needs host while worms are standalone. Provisions are provided under the IT Act, 2000 under sec ons 43-C, 66 and sec on 268 of the Indian Penal Code. Credit Card Fraud Card fraud begins either with the the of the physical card or with the comprise of data associated with the account. Provisions of such fraud are given under Sec on 66 C and 66 D of IT ACT, 2000 and sec on 468 & 471 of Indian Penal Code, 1860. INDIAN CONTEXT OF CYBER JURISDICTION AND ENFORCEMENT AGENCIES In the Indian context, cyber jurisdic on and enforcement agencies play a crucial role in dealing with cybercrimes and ensuring cybersecurity Cyber Jurisdic on: Cyber jurisdic on refers to the legal authority of a court or agency to handle cybercrime cases. In India, the Informa on Technology Act, 2000 (IT Act) is the primary legisla on that governs cyber jurisdic on and cybercrimes. Enforcement Agencies: India has several enforcement agencies responsible for addressing cybercrimes and maintaining cybersecurity. Some of the important ones include: a. Cyber Crime Inves ga on Cell (CCIC): Each state in India has a dedicated Cyber Crime Inves ga on Cell or Unit. These cells are usually part of the State Police or CID and are responsible for inves ga ng cybercrimes that occur within their respec ve state jurisdic ons. b. Cyber Crime Inves ga on Units of Central Agencies: Central agencies like the Central Bureau of Inves ga on (CBI), the Na onal Inves ga on Agency (NIA), and the Enforcement Directorate (ED) also have specialized cybercrime inves ga on units. These units handle complex and high-profile cybercrime cases that have na onal implica ons. c. Indian Computer Emergency Response Team (CERT-In): CERT-In is the na onal nodal agency responsible for cybersecurity in India. It operates under the Ministry of Electronics and Informa on Technology (Meit) and serves as the primary agency for handling cybersecurity incidents, providing emergency response, and coordina ng with various stakeholders. d. Na onal Cyber Crime Repor ng Portal: The Indian government has launched the Na onal Cyber Crime Repor ng Portal (www.cybercrime.gov.in), which allows ci zens to report cybercrimes online. The portal helps in streamlining the process of repor ng and inves ga ng cybercrimes. Interna onal Coopera on: India has signed various bilateral and mul lateral agreements with other countries for coopera on in comba ng cybercrimes. Addi onally, India is a member of interna onal organiza ons such as the INTERPOL and works closely with them to address cybercrimes of transna onal nature. Cyber Appellate Tribunal (CyAT): The Cyber Appellate Tribunal (CyAT) was established under the IT Act to hear appeals against orders issued by the Controller of Cer fying Authori es and adjudicate on ma ers related to cyber jurisdic on. However, it is important to note that the CyAT has been largely non-func onal in recent years, and the jurisdic on of cyber-related appeals has been transferred to high courts. Coordina on Mechanisms: To ensure effec ve coordina on and informa on sharing, various coordina on mechanisms exist in India. The Ministry of Home Affairs (MHA) and the Ministry of Electronics and Informa on Technology (Meit) work closely to address cybersecurity and coordinate efforts among different agencies. Addi onally, pla orms like the Indian Cyber Crime Coordina on Centre (I4C) facilitate coordina on among various enforcement agencies. INFORMATION TECHNOLOGY ACT 2000 Objec ves of IT Act 2000: a. To give legal recogni on to any transac on which is done by electronic way or use of internet b. To give legal recogni on to digital signature for accep ng any agreement via computer. c. To provide facility of filling documents online rela ng to different transac ons. d.IT. Act2000 enable any company can store their data in electronic storage. e. To stop computer crime and protect privacy of internet users. f. To give more power to IPO, RBI and Indian Evidence act for restric ng electronic crime. g. To give legal recogni on for keeping books of accounts 2. Scope of IT Act: a. The act shall apply to Processing of personal data or partly by automa c means b. other processing of personal data which form part of or are intended to form part of personal data filing system. This act shall not apply to the following: a. Informa on technology Act 2000 is not applicable on the a esta on for crea ng trust via electronic way. Physical a esta on is must. b. A contract of sale of any immovable property. c. A esta on for giving power of a orney of property is not possible via electronic record. Background of Information Technology Act, 2000 United Nations Commission on International Trade Law in 1996 adopted a model law on ecommerce and digital intricacies. It also made it compulsory for every country to have its own laws on e-commerce and cybercrimes. In order to protect the data of citizens and the government, the Act was passed in 2000, making India the 12th country in the world to pass legislation for cyber-crimes. It is also called the IT Act and provides the legal framework to protect data related to e-commerce and digital signatures. It was further amended in 2008 and 2018 to meet the needs of society. The Act also defines the powers of intermediaries and their limitations. Schedule of Information Technology Act, 2000 The Act is divided into 13 chapters, 90 sections and 2 schedules. The following are the chapters under the Act: Chapter1 deals with the applicability of the Act and definitions of various terminologies used in the Act. Chapter2 talks about digital and electronic signatures. Chapters3&4 Electronic governance and electronic records Chapter5 is related to the security of these records and Chap 6 deals with regulations of certifying authorities. Chapter7 the certificates needed to issue an electronic signature. Chapter8 the duties of subscribers and Chapter 9 describes various penalties. Chapter10 provides sections related to the Appellate Tribunal. Chapter11 various offences related to breach of data and their punishments. Chapter12 provides the circumstances where the intermediaries are not liable for any offence or breach of data privacy. Chapter13 The final chapter, is the miscellaneous chapter. The 2 schedules given in the Act are: Schedule 1 gives the documents and data where the Act is not applicable. Schedule 2 deals with electronic signatures or methods of authentication. Applicability of Information Technology Act, 2000 According to Section 1, the Act applies to the whole country, including the state of Jammu and Kashmir. The application of this Act also extends to extra-territorial jurisdiction, which means it applies to a person committing such an offence outside the country as well. If the source of the offence, i.e., a computer or any such device, lies in India, then the person will be punished according to the Act irrespective of his/her nationality. The Act, however, does not apply to documents given under Schedule 1. These are: Any negotiable instrument other than a cheque as given under Section 13 of the Negotiable Instruments Act, 1881. Any power of attorney according to Section 1A of the Powers of Attorney Act, 1882. Any sort of trust according to Section 3 of the Indian Trusts Act, 1882. Any will including testamentary disposition given under the Indian Succession Act, 1925. Any contract or sale deed of any immovable property. Features of Information Technology Act, 2000 Following are the features of the Act: The Act is based on the Model Law on e-commerce adopted by UNCITRAL. It has extra-territorial jurisdiction. It defines various terminologies used in the Act like cyber cafes, computer systems, digital signatures, electronic records, data, asymmetric cryptosystems, etc under Section 2(1). It protects all the transactions and contracts made through electronic means and says that all such contracts are valid. (Section 10A) It also gives recognition to digital signatures and provides methods of authentication. It contains provisions to the appointment of the Controller of Certifying Authorities and his powers for the purposes of IT Act It recognises foreign certifying authorities (Section 19). It also provides various penalties in case a computer system is damaged by anyone other than the owner of the system. The Act also provides provisions for an Appellate Tribunal to be established under the Act. All the appeals from the decisions of the Controller or other Adjudicating officers lie to the Appellate tribunal. Further, an appeal from the tribunal lies with the High Court. The Act describes various offences related to data and defines their punishment. It provides circumstances where the intermediaries are not held liable even if the privacy of data is breached. A cyber regulation advisory committee is set up under the Act to advise the Central Government on all matters related to e-commerce or digital signatures. Electronic records and signatures The Act defines electronic records under Section 2(1)(t), which includes any data, image, record, or file sent through an electronic mode. According to Section 2(1)(ta), any signature used to authenticate any electronic record that is in the form of a digital signature is called an electronic signature. However, such authentication will be affected by asymmetric cryptosystems and hash functions as given under Section 3 of the Act. Section 3A further gives the conditions of a reliable electronic signature. These are: If the signatures are linked to the signatory or authenticator, they are considered reliable. If the signatures are under the control of the signatory at the time of signing. Any alteration to such a signature must be detectable after fixation or alteration. The alteration done to any information which is authenticated by the signature must be detectable. It must also fulfil any other conditions as specified by the Central Government. The government can anytime make rules for electronic signatures according to Section 10 of the Act. The attribution of an electronic record is given under Section 11 of the Act. An electronic record is attributed if it is sent by the originator or any other person on his behalf. The person receiving the electronic record must acknowledge the receipt of receiving the record in any manner if the originator has not specified any particular manner. (Section 12). According to Section 13, an electronic record is said to be dispatched if it enters another computer source that is outside the control of the originator. The time of receipt is determined in the following ways: When the addressee has given any computer resource, Receipt occurs on the entry of an electronic record into the designated computer resource. In case the record is sent to any other computer system, the receipt occurs when it is retrieved by the addressee. When the addressee has not specified any computer resource, the receipt occurs when the record enters any computer source of the addressee. Certifying authorities Appointment of Controller of Certifying authorities Section 17 talks about the appointment of the controller, deputy controllers, assistant controllers, and other employees of certifying authorities. The deputy controllers and assistant controllers are under the control of the controller and perform the functions as specified by him. The term, qualifications, experience and conditions of service of the Controller of certifying authorities will be determined by the Central Government. It will also decide the place of the head office of the Controller. Functions of the Controller of Certifying authorities. Under Section 18, the functions of the Controller of certifying authority He supervises all the activities of certifying authorities. Public keys are certified by him. He lays down the rules and standards to be followed by certifying authorities. He specifies the qualifications and experience required to become an employee of a certifying authority. He specifies the procedure to be followed in maintaining the accounts of authority. He determines the terms and conditions of the appointment of auditors. He supervises the conduct of businesses and dealings of the authorities. He facilitates the establishment of an electronic system jointly or solely. He maintains all the particulars of the certifying authorities and specifies the duties of the officers. He has to resolve any kind of conflict between the authorities and subscribers. All information and official documents issued by the authorities must bear the seal of the office of the Controller. License for electronic signatures Under Section 21 It is necessary to obtain a license certificate in order to issue an electronic signature, any such license can be obtained by making an application to the controller who, after considering all the documents, decides either to accept or reject the application. The license issued is valid for the term as prescribed by the central government and is transferable and heritable. It is regulated by terms and conditions provided by the government. Under Section22, an application must fulfil the following requirements: A certificate of practice statement. Identity proof of the applicant. Fees of Rupees 25,000 must be paid. Any other document as specified by the central government. The license can be renewed by making an application before 45 days from the expiry of the license along with payment of fees, i.e., Rupees 25000. (Section 23) Any license can be suspended on the grounds specified in Section 24 of the Act. However, no certifying authority can suspend the license without giving the applicant a reasonable opportunity to be heard. The grounds of suspension are: The applicant makes a false application for renewal with false and fabricated information. Failure to comply with the terms and conditions of the license. A person fails to comply with the provisions of the Act. He did not follow the procedure given in Section 30 of the Act. The notice of suspension of any such license must be published by the Controller in his maintained records and data. Powers of certifying authorities Following are the powers and functions of certifying authorities: Every such authority must use hardware that is free from any kind of intrusion. (Section 30) It must adhere to security procedures to ensure the privacy of electronic signatures. It must publish information related to its practice, electronic certificates and the status of these certificates. It must be reliable in its work. The authority has the power to issue electronic certificates. (Section 35) The authority has to issue a digital signature certificate and certify that: o The subscriber owns a private key along with a public key as given in the certificate. o The key can make a digital signature and can be verified. o All the information given by subscribers is accurate and reliable. The authorities can suspend the certificate of digital signature for not more than 15 days. (Section 37) According to Section 38, a certificate can be revoked by the authorities on the following grounds: o If the subscriber himself makes such an application. o If he dies. o In case, the subscriber is a company then on the winding up of the company, the certificate is revoked. Circumstances where intermediaries are not held liable Section 2(1)(w) of the Act defines the term ‘intermediary’ as one who receives, transmits, or stores data or information of people on behalf of someone else and provides services like telecom, search engines and internet services, online payment, etc. Usually, when the data stored by such intermediaries is misused, they are held liable. But the Act provides certain instances where they cannot be held liable under Section 79. These are: In the case of third-party information or communication, intermediaries will not be held liable. If the only function of the intermediary was to provide access to a communication system and nothing else, then also they are not held liable for any offence. If the intermediary does not initiate such transmissions or select the receiver or modify any information in any transmission, it cannot be made liable. The intermediary does its work with care and due diligence. However, the section has the following exemptions where intermediaries cannot be exempted from the liability: It is involved in any unlawful act either by abetting, inducing or by threats or promises. It has not removed any such data or disabled access that is used for the commission of unlawful acts as notified by the Central Government. Penalties under Information Technology Act, 2000 The Act provides penalties and compensation in the following cases: Penalty for damaging a computer system If a person other than the owner uses the computer system and damages it, he shall have to pay all such damages by way of compensation (Section 43). Other reasons for penalties and compensation are: If he downloads or copies any information stored in the system. Introduces any virus to the computer system. Disrupts the system. Denies access to the owner or person authorised to use the computer. Tampers or manipulates the computer system. Destroys, deletes or makes any alteration to the information stored in the system. Steals the information stored therein. Compensation in the case of failure to protect data According to Section 43A, if any corporation or company has stored the data of its employees or other citizens or any sensitive data in its computer system but fails to protect it from hackers and other such activities, it shall be liable to pay compensation. Failure to furnish the required information If any person who is asked to furnish any information or a particular document or maintain books of accounts fails to do so, he shall be liable to pay the penalty. In the case of reports and documents, the penalty ranges from Rupees Rupees fifty thousand to one lakh .For books of accounts or records, the penalty is Rs. 5000. (Section 44) Residuary Penalty If any person contravenes any provision of this Act and no penalty or compensation is specified, he shall be liable to pay compensation or a penalty of Rs. 25000. Appellate tribunal According to Section 48 of the Act, the Telecom dispute settlement and appellate tribunal under Section 14 of the Telecom Regulatory Authority of India Act, 1997 shall act as the appellate tribunal under the Information Technology Act, 2000. This amendment was made after the commencement of the Finance Act of 2017. All the appeals from the orders of the controller or adjudicating officer will lie to the tribunal, but if the order is decided with the consent of the parties, then there will be no appeal. The tribunal will dispose of the appeal as soon as possible but in not more than 6 months from the date of such appeal. (Section 57) According to Section 62 of the Act, any person if not satisfied with the order or decision of the tribunal may appeal to the High Court within 60 days of such order. Powers According to Section 58 of the Act, the tribunal is not bound to follow any provisions of the Code of Civil Procedure, 1908 and must give decisions on the basis of natural justice. However, it has the same powers as given to a civil court under the Code. These are: Summon any person and procure his attendance. Examine any person on oath. Ask to discover or produce documents. Receive evidence on affidavits. Examination of witnesses. Review decisions. Dismissal of any application. Offences and their punishments under Information Technology Act, 2000 Amendments to Information Technology Act, 2000 With the advancement of time and technology, it was necessary to bring some changes to the Act to meet the needs of society, and so it was amended. S.no. Offences Section Punishment Tampering with the documents stored in a Section computer system 65 Imprisonment of 3 years or a fine of Rs. 2 lakhs or both. Offences related to computers or any act Section mentioned in Section 43. 66 Imprisonment of 3 years or a fine that extends to Rs. 5 lakhs or both. Receiving a stolen computer source or device Section dishonestly 66B Imprisonment for 3 years or a fine of Rs. 1 lakh or both. Identity theft Section 66C Imprisonment of 3 years or a fine of Rs. 1 lakh or both Cheating by personation Section 66D Either imprisonment for 3 years or a fine of Rs. 1 lakh or both. Violation of privacy Section 66E Either imprisonment up to 3 years or a fine of Rs. 2 lakhs or both Cyber terrorism Section 66F Life imprisonment Transmitting obscene material in electronic Section form. 67 Imprisonment of 5 years and a fine of Rs. 10 lakhs. Transmission of any material containing Section sexually explicit acts through an electronic 67A mode. Imprisonment of 7 years and a fine of Rs. 10 lakhs. Depicting children in sexually explicit form and Section transmitting such material through electronic 67B mode Imprisonment of 7 years and a fine of Rs. 10 lakhs. Failure to preserve and retain the information Section by intermediaries 67C Imprisonment for 3 years and a fine. Amendment of 2008 The amendment in 2008 brought changes to Section 66A of the Act. This was the most controversial section as it provided the punishment for sending any offensive messages through electronic mode. Any message or information that created hatred or hampered the integrity and security of the country was prohibited. However, it had not defined the word ‘offensive’ and what constitutes such messages, because of which many people were arrested on this ground. This section was further struck down by the Supreme Court in the case of Shreya Singhal v. Union of India (2015). Another amendment was made in Section 69A of the Act, which empowered the government to block internet sites for national security and integrity. The authorities or intermediaries could monitor or decrypt the personal information stored with them. The 2015 Amendment Bill The bill was initiated to make amendments to the Act for the protection of fundamental rights guaranteed by the Constitution of the country to its citizens. The bill made an attempt to make changes to Section 66A, which provides the punishment for sending offensive messages through electronic means. The section did not define what amounts to offensive messages and what acts would constitute the offence. It was further struck down by the Supreme Court in the case of Shreya Singhal declaring it as violative of Article 19. Information Technology Intermediaries Guidelines (Amendment) Rules, 2018 The government in 2018 issued some guidelines for the intermediaries in order to make them accountable and regulate their activities. Some of these are: Internet service providers, Domain registrars, Cloud service providers, Software vendors and resellers, Online market places, System integrators, IT consultants. The intermediaries were required to publish and amend their privacy policies so that citizens could be protected from unethical activities like pornography, objectionable messages and images, messages spreading hatred, etc. They must provide the information to the government as and when it is sought within 72 hours for national security. It is mandatory for every intermediary to appoint a ‘nodal person of contact’ for 24×7 service. They must have technologies that could help in reducing unlawful activities done online. The rules also break end-to-end encryption if needed to determine the origin of harmful messages. Information Technology (Intermediaries Guidelines and Digital Media Ethics Code) Rules 2021 The government of India in 2021 drafted certain rules to be followed by the intermediaries. The rules made it mandatory for intermediaries to work with due diligence and appoint a grievance officer. They were also required to form a Grievance Appellate Tribunal. All complaints from users must be acknowledged within 24 hours and resolved within 15 days. It also provides a “Code of Ethics” for the people publishing news and current affairs, which makes it controversial. Many believe that the rules curtail freedom of speech and expression and freedom of the press. The intermediaries were also required to share the information and details of a suspicious user with the government if there was any threat to the security and integrity of the country. As a result of this, writ petitions were filed in various high courts against the rules. Recently, the Bombay High Court stayed in the case of Agij Promotion of Nineteenonea Media Pvt. Ltd. vs. Union of India (2021) and Nikhil Mangesg Wagle vs. Union of India (2021) the two provisions of the rules related to the Code of Ethics for digital media and publishers. Landmark judgments on Information Technology Act, 2000 Shreya Singhal v. Union of India (2015) In this case, 2 girls were arrested for posting comments online on the issue of shutdown in Mumbai after the death of a political leader of Shiv Sena.They were charged under Section 66A for posting the offensive comments in electronic form. As a result, the constitutional validity of the Section was challenged in the Supreme Court stating that it infringes upon Article 19 of the Constitution. Whether Section 66A is constitutionally valid or not? The Court, in this case, observed that the language of the Section is ambiguous and vague, which violates the freedom of speech and expression of the citizens. It then struck down the entire Section on the ground that it was violative of Article 19 of the Constitution. It opined that the Section empowered police officers to arrest any person whom they think has posted or messaged anything offensive. Since the word ‘offensive’ was not defined anywhere in the Act, they interpreted it differently in each case. This amounted to an abuse of power by the police and a threat to peace and harmony. M/S Gujarat Petro synthesis Ltd and Rajendra Prasad Yadav v. Union of India (2014) In this case, the petitioners demanded the appointment of a chairperson to the Cyber Appellate Tribunal so that cases can be disposed of quickly and someone can keep a check on the workings of CyAT. The respondents submitted that a chairperson would be appointed soon.Issue is Appointment of the chairperson of CyAT. The Court ordered the appointment of the chairperson and must see this as a matter of urgency and take into account Section 53 of the Act. Christian Louboutin SAS v. Nakul Bajaj and Ors (2018) In this case, a suit was filed by a shoe company to seek an order of injunction against the defendants for using its trademarks and logo. Whether the protection of “safe harbour” under Section 79 of the Act be applied in this case? The Court in this case observed that the defendant was not an intermediary as their website was a platform for the supply of various products. It used third-party information and promoted vendors in order to attract consumers for them. The Court held that e-commerce platforms are different from the intermediaries and the rights granted to them in Section 79 of the Act. It ordered the intermediaries to work with due diligence and not infringe the rights of the trademark owner. They must take steps to recognise the authenticity and genuineness of the products while dealing with any merchant or dealer. The Court added that if the intermediaries act negligently regarding IPR and indulge in any sort of abetment or incitement of unlawful or illegal activity, they will be exempted from the protection of safe harbour under Section 79 of the Act. Any active participation in ecommerce would also lead to the same. It also referred to the intermediaries’ guidelines, which state that no intermediary must violate any intellectual property rights of anyone while displaying any content on its website. Loopholes in Information Technology Act, 2000 The Act provides various provisions related to digital signatures and electronic records, along with the liability of intermediaries, but fails in various other aspects. These are: No provision for breach of data The provisions of the Act only talk about gathering the information and data of the citizens and its dissemination. It does not provide any remedy for the breach and leak of data, nor does it mention the responsibility or accountability of anyone if it is breached by any entity or government organization. It only provides for a penalty if an individual or intermediary does not cooperate with the government in surveillance. No address to privacy issues The Act failed in addressing the privacy issues of an individual. Any intermediary could store any sensitive personal data of an individual and give it to the government for surveillance. This amounts to a violation of the privacy of an individual. This concern has been neglected by the makers. Simple punishments Though the Act in certain offences committed through electronic means, the punishments given therein are much simpler. To reduce such crimes, punishments must be rigorous. Lack of trained officers With the help of money and power, one can easily escape liability. At times, these cases go unreported because of a social stigma that police will not address such complaints. A report shows that police officers must be trained to handle cybercrimes and have expertise in technology so that they can quickly investigate a case and refer it for speedy disposal. No regulation over Cyber Crimes With the advancement of technology, cyber-crimes are increasing at a greater pace. The offences described in the Act are limited, while on the other hand, various types of cybercrimes are already prevailing, which if not addressed properly within time, may create a menace. These crimes do not affect any human body directly but can do so indirectly by misusing the sensitive data of any person. Thus, the need of the hour is to regulate such crimes. This is where the Act lacks. ELECTRONIC GOVERNANCE (e-Governance) Electronic governance or e-governance implies government functioning with the application of ICT (Information and Communications Technology). Hence e-Governance is basically a move towards SMART governance implying: simple, moral, accountable, responsive and transparent governance. SMART Governance Simple — implies simplification of rules and regulations of the government and avoiding complex processes with the application of ICTs and therefore, providing a user-friendly government. Moral —a new system in the administrative and political machinery with technology interventions to improve the efficiency of various government agencies. Accountable — develop effective information management systems to ensure the accountability of public service functionaries. Responsive — Speed up processes by streamlining them, hence making the system more responsive. Transparent — providing information in the public domain like websites or various portals hence making functions and processes of the government transparent. Interactions in e-Governance There are 4 kinds of interactions in e-governance, namely: 1. G2C (Govt to Citizens) — The primary aim is to make the government citizen-friendly. Interaction between the government and the citizens. This enables citizens to efficient delivery of a large range of public services. Expands the accessibility , availability and quality of govt services The primary aim is to make the government citizen-friendly. 2. G2B (Government to Business): o It enables the business community to interact with the govt by using egovernance tools. The objective is to cut red-tapism which will save time and reduce operational costs. This will also create a more transparent business environment when dealing with the government. o The G2B initiatives help in services such as licensing, procurement, permits and revenue collection. 3. G2G (Government to Government) o Enables seamless interaction between various government entities. o various departments and agencies within government or between two govts like the union and state govts or between state govts. 4. G2E (Government to Employees) o ICT tools help in interaction between the govt and its employees fast and efficient and thus increases the satisfaction levels of employees. o Advantages of e-Governance Improves delivery and efficiency of government services Improved government interactions with business and industry Citizen empowerment through access to information More efficient government management Less corruption in the administration Increased transparency in administration Greater convenience to citizens and businesses Cost reductions and revenue growth Increased legitimacy of government Flattens organisational structure (less hierarchic) Reduces paperwork and red-tapism in the administrative process which results in better planning and coordination between different levels of government Improved relations between the public authorities and civil society Re-structuring of administrative processes e-Governance Initiatives Steps taken to promote e-governance in India are as follows: A National Task Force on IT and Software Development was set-up in 1998. The Ministry of Information Technology was created at the Centre in 1999. A 12-point agenda was listed for e-Governance for implementation in all the central ministries and departments. The IT Act (2000) was enacted. This Act was amended in 2008. The first National Conference of States’ IT Ministers was organised in the year 2000, for arriving at a Common Action Plan to promote IT in India. Government set-up NISG (National Institute for Smart Government). The state governments launched e-Governance projects like e-Seva (Andhra Pradesh), Bhoomi (Karnataka), and so on. The National e-Governance Plan (NeGP) was launched. It consists of 31 Mission Mode Projects (MMPs) and 8 support components. The National Policy on Information Technology (NPIT) was adopted in 2012. The National e-Governance Plan (NeGP) The National e-Governance Plan (NeGP), provides a holistic view of e-Governance initiatives across the country. Around this idea, a massive countrywide infrastructure reaching down to the remotest of villages is evolving, and large-scale digitization of records is taking place to enable easy, reliable access to the internet. The Government has proposed to implement “e-Kranti: National e-Governance Plan (NeGP) 2.0” under the Digital India programme. e-Kranti – Electronic Delivery of Services e-Kranti is an essential pillar of the Digital India initiative. Considering the critical need for e-Governance, mobile governance and good governance in the country, the approach and key components of e-Kranti have been approved by the government. The e-Kranti framework addresses the electronic delivery of services through a portfolio of mission mode projects that cut across several government departments. Objectives of e-Kranti The main aims of the initiative are to: Redefine NeGP with transformational and outcome-oriented e-Governance initiatives Enhance the portfolio of citizen-centric services Ensure optimum usage of core Information & Communication Technology (ICT) Promote rapid replication and integration of e-Governance applications Leverage emerging technologies Make use of more agile implementation models ELECTRONIC EVIDENCE As per Sec on 79A of the IT Act, electronic form of evidence‘ means any informa on of proba ve value that is either stored or transmi ed in electronic form and includes computer evidence, digital audio, digital video, cell phones, digital fax machines. Courts can thus permit the use of digital evidence such as e-mails, digital photographs, word processing documents, instant message histories, spread sheets, internet browser histories, data bases, contents of computer memory, computer backup, secured electronic records and secured electronic signatures, Global Posi oning System tracks, Logs from a hotel’s electronic door, Digital video or audio etc., during the course of trials of a civil or criminal case. IT Act defines the term ‗electronic record ‘as ―data, record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer-generated micro fiche. Sec on 6 of the IT Act provides that electronic records and electronic signatures can be used in Government and its agency. Hence, they are admissible in a court of law. So, whenever a dispute regarding online contracts or e-crimes is to be adjudicated by a court, produc on of admissible evidence becomes necessary to decide the merits of the case. Sec on 3 of the Evidence Act defines ―document as follows: Document" means any ma er expressed or described upon any substance by means of le ers, figures or marks, or by more than one of those means, intended to be used, or which may be used, for the purpose of recording that ma er. Evidence in Sec on 3 is defined as follows: "Evidence" means and includes— (1) all statements which the Court permits or requires to be made before it by witnesses, in rela on to ma ers of fact under inquiry; such statements are called oral evidence; (2) all documents including electronic records produced for the inspec on of the Court; such documents are called documentary evidence. Sec on 22-A of the Evidence Act, which deals with the relevance of oral admissions as to contents of electronic records, reads as follows: When oral admission as to contents of electronic records are relevant. Oral admissions as to the contents of electronic records are not relevant, unless the genuineness of the electronic record produced is in ques on is examined. Sec on 59 of evidence act- Proof of facts by oral evidence. All facts, except the contents of documents or electronic records, may be proved by oral evidence. Sec on 45A of the Evidence Act is with regard to the opinion of the Examiner of Electronic Evidence and it states thus: Opinion of Examiner of Electronic Evidence. When in a proceeding, the court has to form an opinion on any ma er rela ng to any informa on transmi ed or stored in any computer resource or any other electronic or digital form, the opinion of the Examiner of Electronic Evidence referred to in sec on 79A of the Informa on Technology Act, 2000 (21 of 2000), is a relevant fact. Explana on. -- For the purposes of this sec on, an Examiner of Electronic Evidence shall be an expert. Sec on 67A of the Evidence Act deals with proof as to digital signature. Sec on 67A reads thus: Proof as to digital signature. Except in the case of a secure electronic signature, if the digital signature of any subscriber is alleged to have been affixed to an electronic record the fact that such digital signature is the digital signature of the subscriber must be proved. It is necessary to prove it in the manner of proof of electronic record. As such, Sec on 65B will be applicable. Sec on 73A of the Evidence Act deals with the Proof as to verifica on of digital signature. It reads thus: Proof as to verifica on of digital signature. – In order to ascertain whether a digital signature is that of the person by whom it purports to have been affixed, the Court may direct -(a) that person or the Controller of the Cer fying Authority to produce the Digital Signature Cer ficate. (b) any other person to apply the public key listed in the Digital Signature Cer ficate and verify the digital signature purported to have been affixed by that person. For this purpose, the controller of cer fying authority means the controller appointed under S.17(1) of the IT Act. Sec on 4 of the IT Act speaks about the legal recogni on of the electronic records. Legal recogni on of electronic records. Where any law provides that informa on or any other ma er shall be in wri ng or in the typewri en or printed form, then notwithstanding anything contained in such law, such requirement shall be deemed to have been sa sfied if such informa on or ma er is-(a) rendered or made available in an electronic form; and (b) accessible so as to be usable for a subsequent reference. The ra onale behind the second requirement is that electronic data is intangible and by its very nature transient. Thus, it is expedient to require it to be available for future reference. Sec on 136 of the Evidence Act empowers a Judge to decide as to the admissibility of the evidence. In order that the proof may be confined to relevant facts and may not travel beyond the limits of the issue at trial, the Judge is empowered to ask in what manner the evidence tendered is relevant. The judge must then decide its admissibility. In State of Bihar v Sri Radha Krishna (1983) 2 SCR 808, the apex court observed that admissibility of a document is one thing and its proba ve value is quite another and these two aspects cannot be combined. The normal rule of leading documentary evidence is the produc on and proof of the original document itself. The said rule is embodied in Sec on 61, which says that contents of documents may be proved either by primary or by secondary evidence. Sec on 62 says that the primary evidence means the document itself produced for inspec on of the Court. Sec on 63 contains the various types of secondary evidence. Sec 65 enumerates the circumstances in which secondary evidence can be adduced. Clause (d) of Sec 65 says that secondary evidence of the contents of a document can be led when the original is of such a nature as not to be easily movable. Computerized opera ng systems and support systems in industry cannot be moved to the court. The informa on is stored in these computers on magne c tapes (hard disc). Electronic record produced therefrom has to be taken in the form of a print out. Sub-Sec on (1) of S.65B makes admissible without further proof, in evidence, the print out of an electronic record contained on a magne c media, subject to the sa sfac on of the condi ons men oned in Sub-sec (2). The sub-sec on makes admissible an electronic record when cer fied that the contents of a computer printout are generated by a computer sa sfying the condi ons of Sub-sec (1), the cer ficate being signed by the person described therein. Thus, Sub-sec (4) provides for an alterna ve method to prove electronic record. Best Evidence Rule in Proof of Contents of a Document. The contents of the output must be authen c and there should be reason to believe that they are authen c. A true copy can thus be captured in print or on a digital media, duly cer fied by the observer. Video/Audio Tape Recordings: Indian courts had recognized the contents of tape recording as admissible evidence for some me before the introduc on of the IT Act, subject to certain condi ons being sa sfied. The Hon‘ble Supreme Court in Ziauddin Burhanuddin Bukhari v Brijmohan Ramdas Mehra and Others [AIR 1975 SC 1788 (1)] observed that tape-recorded speeches are a 'document', as defined by Sec on 3 of the Evidence Act, which stands on no different foo ng than photographs, and they are admissible in evidence on sa sfying certain condi ons. The subject ma er recorded had to be shown to be relevant according to rules of relevancy found in the Evidence Act. In Jagjit Singh Vs. State of Haryana [(2006) 11 SCC 1)], the speaker of the Legisla ve Assembly of the State of Haryana disqualified a member for defec on. While hearing the ma er, the Supreme Court considered the digital evidence in the form of interview transcripts from the Zee News television channel, the Aaj Tak television channel and the Haryana News of Punjab Today television channel. The court determined that the electronic evidence placed on record was admissible and upheld the reliance placed by the Speaker on the recorded interview while reaching the conclusion that the voices recorded on the CD were those of the persons taking ac on. The Supreme Court found no infirmity in the Speaker's reliance on the digital evidence and the conclusions reached by him. The comments in this case indicate a trend that the Judges in India are beginning to recognize and appreciate the importance of digital evidence in legal proceedings. Hard Disk: As to whether a hard disk of a computer can be considered as documentary evidence, the High Court of Delhi in Dharam Bir Vs. CBI [148 (2008) DLT 289] observed that:"While there can be no doubt that a hard disc is an electronic device used for storing informa on, once a blank hard disc is wri en upon it is subject to a change and to that extent it becomes an electronic record. Even if the hard disc is restored to its original posi on of a blank hard disc by erasing what was recorded on it, it would s ll retain informa on which indicates that some text or file in any form was recorded on it at one me and subsequently removed. By use of so ware programs, it is possible to find out the precise me when such changes occurred in the hard disc. To that extent even a blank hard disc which has once been used in any manner, for any purpose will contain some informa on and will, therefore, be an electronic record. So, once the hard disc is subject to any change, then even if it is restored to the original posi on, by reversing that change, the informa on can be retrieved by using the so ware designed for that purpose. Data copied from Hard Disk to CD: Hard Disc is a storage devise. If wri en, then it becomes electronic record under the Evidence Act. Under sec on 65B, it has to be proved that the computer during the relevant period was in the lawful control of the person proving the email vide Babu Ram Aggarwal & Anr. Vs. Krishan Kumar Bhatnagar & Ors. [2013, IIAD (Delhi) 441]. Call Records: In Rakesh Kumar and Ors. Vs. State (Criminal Appeal No. 19/2007 decided on 27.08.2009), the High Court of Delhi while apprecia ng the reliance placed by the prosecu on upon the call records, observed that computer generated electronic records is evidence, admissible at a trial if proved in the manner specified by Sec on 65B of the Evidence Act. Digital Camera Photograph: As per sec on 2(t) of Informa on Technology Act, 2000, a photograph taken from a digital camera is an electronic record and it can be proved as per sec on 65B of the Indian Evidence Act. ATM: Teller Machines (ATM) was held to be not computer by itself nor is it a computer terminal (2005 AIR Knt. HCR 9). In Mohd Arif @ Ashfaq Vs. State NCT of Delhi [(2011) 13 SCC 621], the determina on of movement of a person on the basis of mobile phone was discussed. MODE OF PROOF OF ELECTRONIC RECORDS Electronic records being more suscep ble to tampering, altera on, transposi on, excision, etc. without such safeguards, the whole trial based on proof of electronic records can lead to travesty of jus ce. It requires: Integrity of the data: That is the data as sent or recorded was intact and not tampered with. Integrity of the hardware/so ware: The hardware and so ware used to read, downloading, interpre ng, seeing or storing was func oning according to set standards and there was no devia on or its corrup on. Security of the system: The system used to access such electronic record was secured, and during the par cular course of period it was not accessed by any unauthorized person, so as to rule out the possibility of its tampering or malfunc oning. Proof of SMS & MMS: If someone challenges the accuracy of an electronic evidence or erecord on the grounds of misuse of system or opera ng failure or interpola on, then the person challenging it must prove the same beyond reasonable doubt. Proof of e-mail: E-mail is a computer output of electronic record and therefore, it has to be proved in the manner prescribed in Sec on 65B of the Indian Evidence Act, which requires a cer ficate to be given by a person occupying responsible posi on in management of the computer. Proof of Obscene SMS sent through Mobile Phone: As per sec 2(t) of the IT Act, 'Mobile' is a computer and SMS in the mobile is an electronic record. So, it is to be proved as per sec 65B of the Indian Evidence Act which requires a cer ficate issued by a person, occupying responsible posi on in management of the computer of the relevant ac vi es. Proof of Contents of the CD: The person intending to prove C.D. is required to prove whether the disputed C.D. was prepared by a combina on of a computer opera ng therein or different computer opera ng in succession over that period or of different combina on of computers. It is not necessary to examine the computer expert for the proof of C.D. in addi on to the compliance of provisions of sec on 65B. CASE LAW U/S. 65B OF THE EVIDENCE ACT In Vikram Singh and Anr. v. State of Punjab and Anr. [(2017) 8 SCC 518], a three-Judge Bench of the apex Court followed the law in Anvar P.V. (supra), clearly sta ng that where primary evidence in electronic form has been produced, no cer ficate under Sec on 65B would be necessary. But, in a subsequent judgment rendered in Shafiq Mohammad vs The State Of Himachal Pradesh [(2018) 2 SCC 801] a two Judge Bench of the Hon‘ble Supreme Court held that requirement of cer ficate under Sec on 65B (4) is not always mandatory. As there is dichotomy of decisions in between Anwar PV ‘s case and Shafiq Mohammad ‘s case, in the year 2019, a two-Judge Bench of the apex court referred the ma er to a another three-judge bench for clarifica on on the point. The ma er was then decided recently by a Three-Judge Bench of the Hon‘ble apex court in ARJUN PANDITRAO KHOTKAR Vs. KAILASH KUSHANRAO GORANTYAL AND ORS. [2020 SCC Online SC 571] by Judgment, upheld the law laid in Anwar PV ‘s case. The clarifica on referred to above is that the required cer ficate under Sec on 65B (4) is unnecessary if the original document itself is produced. This can be done by the owner of a laptop computer, computer tablet or even a mobile phone, by stepping into the witness box and proving that the concerned device, on which the original informa on is first stored, is owned and/or operated by him. In cases where the “computer” happens to be a part of a “computer system” or “computer network” and it becomes impossible to physically bring such system or network to the Court, then the only means of providing informa on contained in such electronic record can be in accordance with Sec on 65B(1), together with the requisite cer ficate under Sec on 65B(4). The legal interpreta on by the court of the following Sec ons 22A, 45A, 59, 65A & 65B of the Evidence Act has confirmed that the stored data in CD/DVD/Pen Drive is not admissible without a cer ficate u/s 65 B(4) of Evidence Act and further clarified that in the absence of such a cer ficate, the oral evidence to prove the existence of such electronic evidence and the expert view under sec on 45A Evidence Act cannot be availed to prove authen city thereof. In State of Karnataka v. M.R. Hiremath [(2019) 7 SCC 515], the Court emphasized that non-produc on of a cer ficate under Sec on 65-B on an earlier occasion is a curable defect. It further held that ―the High Court erred in coming to the conclusion that the failure to produce a cer ficate under Sec on 65-B(4) of the Evidence Act at the stage when the charge-sheet was filed was fatal to the prosecu on. The need for produc on of such a cer ficate would arise when the electronic record is sought to be produced in evidence at the trial It is at that stage that the necessity of the produc on of the cer ficate would arise.” OTHER CASE LAWS Sec on 66A of the IT Act: In Shreya Singhal Vs. Union of India [(2015) 0 AIR (SC) 1553], the Hon'ble the Apex Court declared Sec on 66A of the IT Act as uncons tu onal. It has also been held that the wider range of circula on over the internet cannot restrict the content of the right under Ar cle 19 (1) (a) nor can it jus fy its denial. VIDEO-CONFERENCING: In The State of Maharashtra v. Dr. Praful B. Desai [AIR 2003 SC 2053], the ques on involved was whether a witness can be examined by means of a video conference. The Supreme Court observed that video conferencing is an advancement of science and technology which permits seeing, hearing and talking with someone who is not physically present with the same facility and ease as if they were physically present. The legal requirement for the presence of the witness does not mean actual physical presence. The court allowed the examina on of a witness through video conferencing and concluded that there is no reason why the examina on of a witness by video conferencing should not be an essen al part of electronic evidence. In Amitabh Bagchi Vs. Ena Bagchi (AIR 2005 Cal 11), the court held that the physical presence of person in Court may not be required for purpose of adducing evidence and the same can be done through medium like video conferencing. In Twen eth Century Fox, Film Corpora on Vs. NRI Film Produc on Associates (P) Ltd. (AIR 2003 KANT 148), certain condi ons have been laid down for video recording of evidence. They are as follows: 1) The person who examines the witness on the screen shall file an affidavit/undertaking before examining the witness with a copy to the other side with regard to iden fica on. 2) The witness has to be examined during working hours of Indian Courts. Oath is to be administered through the media. 3) The witness should not plead any inconvenience on account of me different between India and USA. 4) Before examina on of the witness, a set of plaint, wri en statement and other documents must be sent to the witness so that the witness has acquaintance with the documents and an acknowledgment is to be filed before the Court in this regard. 5) Learned Judge is to record such remarks as is material regarding the demeanour of the witness while on the screen. 6) Learned Judge must note the objec ons if raised during recording of witness and to decide the same at the me of arguments. 7) A er recording the evidence, the same is to be sent to the witness and his signature is to be obtained in the presence of a Notary Public and therea er part of the record of the suit proceedings. 8) The visual is to be recorded and the record would be at both ends. The witness also is to be alone at the me of visual conference and notary is to cer ficate to this effect. 9) The learned Judge may also impose such other condi ons as are necessary in a given set of facts. 10) The expenses and the arrangements are to be borne by the applicant who wants this facility. In Suvarna Musale vs Rahul Musale [2015 (2) Mh.L.J. 801], it was held that recording of evidence with help of electronic method and techniques is acknowledged and recognized in judicial system. In that case, the Pe oner-wife was working in U.S. and has a minor daughter aged 6 yrs., traveling to India for being present physically was expensive and she may face difficulty in ge ng leave and hurdles in obtaining VISA. An applica on for recording evidence through video conferencing was therefore allowed. PRESUMPTIONS Sec on 92 of the IT Act 2000 made the amendments to the Indian Evidence Act, 1872 and inserted certain presump ons in regard to the electronic evidence. They are from Sec on 81-A, 85-A to 85-C, 88-A and 90-A. Presump on as to telegraphic messages: The Court may presume that a message, forwarded from a telegraph office to the person to whom such message purports to be addressed, corresponds with a message delivered for transmission at the office from which the message purports to be sent; but the Court shall not make any presump on as to the person by whom such message was delivered for transmission. Presump on as to electronic messages: It includes emails, SMS, MMS etc. of messages sent via social networking sites, like WhatsApp, Twi er etc. Under Sec on 88A of the IT Act, there is a presump on as to such messages, which enables the Court to presume that an electronic message forwarded by the originator through an electronic mail server to the addressee to whom the message purports to be addressed corresponds with the message as fed into his computer for transmission; but the Court shall not make any presump on as to the person by whom such message was sent. OPINION OF EXAMINER OF ELECTRONIC EVIDENCE When the court has to form an opinion as to the electronic signature of any person, the opinion of the cer fying Authority which has issued the Electronic Signature Cer ficate is relevant U/S 47A of the Evidence Act. Further, in a proceeding where the court has to form an opinion on any ma er rela ng to any informa on transmi ed or stored in any computer resource or any other electronic or digital form, the opinion of the Examiner of Electronic Evidence referred to in Sec 79A of the IT Act is a relevant fact. But when there is a conflict of opinion between the experts, then the court is competent to form its own opinion with regard to signature on a document (Vide Kishan Chand Vs. SitaRamAIR2005P&H 156). CERTIFYING AUTHORITIES As per Sec 18 of IT Act, 2000 provides the required legal sanc ty to the digital signatures based on asymmetric cryptosystems. The digital signatures are now accepted at par with handwri en signatures and the electronic documents that have been digitally signed are treated at par with paper documents. The IT Act provides for the Controller of Cer fying Authori es (CCA) to license and regulate the working of Cer fying Authori es. The Cer fying Authori es (CAs) issue digital signature cer ficates for electronic authen ca on of users. The Controller of Cer fying Authori es (CCA) has been appointed by the Central Government under sec 17 of the Act for purposes of the IT Act. The Office of the CCA came into existence on November 1, 2000. It aims at promo ng the growth of E-Commerce and E- Governance through the wide use of digital signatures. The Controller of Certifying Authorities (CCA) has established the Root Certifying Authority (RCAI) of India under sec18(b) of the IT Act to digitally sign the public keys of Certifying Authorities (CA) in the country. The RCAI is operated as per the standards laid down under the Act. The CCA certifies the public keys of CAs using its own private key, which enables users in the cyberspace to verify that a given certificate is issued by a licensed CA. For this purpose, it operates, the Root Certifying Authority of India (RCAI). The CCA also maintains the Repository of Digital Certificates, which contains all the certificates issued to the CAs in the country. REGULATION OF CERTIFYING AUTHORITIES IT Act, 2000 has established a Cer fying Authority to regulate the electronic transac ons. The various aspects of the regula on of cer fying authori es. The following sec ons IT Act, 2000 pertain to the regula on of cer fying authori es: Sec 17 – Appointment of the Controller and other officers The Central Government may appoint a Controller of Cer fying Authori es a er no fying the Official Gaze e. They may also appoint Deputy Controllers and Assistant Controllers as it deems fit. The Controller discharges his responsibili es subject to the general control and also direc ons of the Central Government The Deputy Controllers and Assistant Controllers shall perform the func ons assigned to them by the Controller under the general superintendence and also control of the Controller. The qualifica ons, experience and terms and condi ons of service of Controller, Deputy Controllers, and Assistant Controllers shall be such as may be prescribed by the Central Government. The Head Office and Branch Office of the office of the Controller shall be at such places as the Central Government may specify, and these may be established at such places as the Central Government may think fit. There shall be a seal of the Office of the Controller. Func ons of Controller (Sec on 18) A Controller performs some or all of the following func ons: Supervise the ac vi es of the Cer fying Authori es and also cer fy their public keys Lay down the standards that the Cer fying Authori es follow Specify the following: qualifica ons and experience requirements of the employees of all Cer fying Authori es condi ons that the Cer fying Authori es must follow for conduc ng business the content of the printed, wri en, visual materials and adver sements in respect of the digital signature and the public key The form and content of a digital signature cer ficate and the key the form and manner in which the Cer fying Authori es maintain account terms and condi ons for the appointment of auditors and their remunera on Facilitate the Cer fying Authority to establish an electronic system, either solely or jointly with other Cer fying Authori es and its regula on Specify the manner in which the Cer fying Authori es deal with the subscribers Resolve any conflict of interests between the Cer fying Authori es and the subscribers Lay down the du es of the Cer fying Authori es Maintain a database containing the disclosure record of every Cer fying Authority with all the details as per regula ons. Further, this database is accessible to the public. Recogni on of Foreign Cer fying Authority (Sec on 19) • A Controller has the right to recognize any foreign cer fying authority as a cer fying authority for the purpose of the IT Act, 2000. While this is subject to the condi ons and restric ons which the regula ons specify, the Controller can recognize it with the previous approval of the Central Government and no fy in the Official Gaze e. • If a controller recognizes a Cer fying Authority under sub-sec on (i), then its digital signature cer ficate is also valid for the purpose of the Act. • If the controller feels that any cer fying authority has contravened any condi ons or restric ons of recogni on under sub-sec on (i), then he can revoke the recogni on. However, he needs to record the reason in wri ng and no fy in the Official Gaze e. .Controller to act as a repository (Sec on 20) • The Controller will act as a repository of all digital signature cer ficates under this Act. • The Controller will – • Make use of secure hardware, so ware, and also procedures. • Observe the standards that the Central Government prescribes to ensure the secrecy and also the security of the digital signatures. • The Controller will maintain a computerized database of all public keys. Further, he must ensure that the public keys and the database are available to any member of the public. License to issue Digital Signature Cer ficates (Sec on 21) (1) Subject to the provisions of sub-sec on (2), any person can apply to the Controller for a license to issue digital signature cer ficates. (2) A Controller can issue a license under sub-sec on (1) only if the applicant fulfills all the requirements. The Central Government specifies requirements with respect to qualifica on, exper se, manpower, financial resources, and also infrastructure facili es for the issuance of digital signature cer ficates. (3) A license granted under this sec on is – (a) Valid for the period that the Central Government specifies (b) Not transferable or inheritable (c) Subject to the terms and condi ons that the regula ons specify 6. Power to inves gate contraven ons (Sec on 28) The Controller or any other Officer that he authorizes will inves gate any contraven on of the provisions, rules or regula ons of the Act. The Controller or any other Officer that he authorizes will also exercise the powers conferred on Income-tax authori es under Chapter XIII of the Income Tax Act, 1961. Also, the exercise of powers will be limited according to the Act. Du es Of Subscribers (Sec on 40 to 42) With respect to the Electronic Signature Cer ficate the subscriber has to perform such du es as may be prescribed by the Act. Further every subscriber has to exercise reasonable care to retain control of the private key corresponding to the public key listed in his Digital Signature Cer ficate. He has to take all steps to prevent its disclosure. In the event of the private key being compromised the subscriber has to communicate the same immediately to the Cer fying Authority as specified by the Regula ons. The subscriber shall be liable ll he has informed the Cer fying Authority that the private key has been compromised. Sec on: 40. Genera ng key pair. Where any Digital Signature Cer ficate, the public key of which corresponds to the private key of that subscriber which is to be listed in the Digital Signature Cer ficate has been accepted by a subscriber, then, the subscriber shall generate the key pair by applying the security procedure. Sec on: 41. Acceptance of Digital Signature Cer ficate. (1) A subscriber shall be deemed to have accepted a Digital Signature Cer ficate if he publishes or authorizes the publica on of a Digital Signature Cer ficate— (a) to one or more persons; (b) in a repository, or otherwise demonstrates his approval of the Digital Signature Cer ficate in any manner. (2) By accep ng a Digital Signature Cer ficate, the subscriber cer fies to all who reasonably rely on the informa on contained in the Digital Signature Cer ficate that— (a) the subscriber holds the private key corresponding to the public key listed in the Digital Signature Cer ficate and is en tled to hold the same; (b) all representa ons made by the subscriber to the Cer fying Authority and all material relevant to the informa on contained in the Digital Signature Cer ficate are true; (c) all informa on in the Digital Signature Cer ficate that is within the knowledge of the subscriber is true. Sec on: 42. Control of private key. (1) Every subscriber shall exercise reasonable care to retain control of the private key corresponding to the public key listed in his Digital Signature Cer ficate and take all steps to prevent its disclosure to a person not authorized to affix the digital signature of the subscriber. (2) If the private key corresponding to the public key listed in the Digital Signature Cer ficate has been compromised, then, the subscriber shall communicate the same without any delay to the Cer fying Authority in such manner as may be specified by the regula ons. Explana on. — For the removal of doubts, it is hereby declared that the subscriber shall be liable ll he has informed the Cer fying Authority that the private key has been compromised. PENALTY FOR DAMAGE TO COMPUTER, COMPUTER SYSTEM, ETC. Sec 43 If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network – • accesses or secures access to such computer, computer system or computer network or computer resource]; • downloads, copies or extracts any data, computer data base or informa on from such computer, computer system or computer network including informa on or data held or stored in any removable storage medium; • introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; • damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network; • disrupts or causes disrup on of any computer, computer system or computer network; • denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means; • provides any assistance to any person to facilitate access to a computer, computer system or computer network in contraven on of the provisions of this Act, rules or regula ons made thereunder; • charges the services availed of by a person to the account of another person by tampering with or manipula ng any computer, computer system, or computer network; • (i) destroys, deletes or alters any informa on residing in a computer resource or diminishes its value or u lity or affects it injuriously by any means; steal, conceal, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an inten on to cause damage;] he shall be liable to pay damages by way of compensa on to the person so affected.] Explana on. –For the purposes of this sec on, – • computer contaminant means any set of computer instruc ons that are designed– • to modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or • by any means to usurp the normal opera on of the computer, computer system, or computer network; • computer data-base means a representa on of informa on, knowledge, facts, concepts or instruc ons in text, image, audio, video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network; • computer virus means any computer instruc on, informa on, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or a aches itself to another computer resource and operates when a programme, data or instruc on is executed or some other event takes place in that computer resource; • damage means to destroy, alter, delete, add, modify or rearrange any computer resource by any means. computer source code means the lis ng of programme, computer commands, design and layout and programme analysis of computer resource in any form. COMPENSATION FOR FAILURE TO PROTECT DATA. –43A Where a body corporate, possessing, dealing or handling any sensi ve personal data or informa on in a computer resource which it owns, controls or operates, is negligent in implemen ng and maintaining reasonable security prac ces and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensa on to the person so affected. Explana on. –For the purposes of this sec on, – • body corporate means any company and includes a firm, sole proprietorship or other associa on of individuals engaged in commercial or professional ac vi es; • reasonable security prac ces and procedures means security prac ces and procedures designed to protect such informa on from unauthorized access, damage, use, modifica on, disclosure or impairment, as may be specified in an agreement between the par es or as may be specified in any law for the me being in force and in the absence of such agreement or any law, such reasonable security prac ces and procedures, as may be prescribed by the Central Government in consulta on with such professional bodies or associa ons as it may deem fit; • sensi ve personal data or informa on means such personal informa on as may be prescribed by the Central Government in consulta on with such professional bodies or associa ons as it may deem fit. PENALTY FOR FAILURE TO FURNISH INFORMATION RETURN, ETC. SEC 44 If any person who is required under this Act or any rules or regula ons made thereunder to• furnish any document, return or report to the Controller or he Cer fying Authority fails to furnish the same, he shall be liable to a penalty not exceeding one lakh and fi y thousand rupees for each such failure. • file any return or furnish any informa on, books or other documents within the me specified therefor in the regula ons fails to file return or furnish the same within the me specified therefor in the regula ons, he shall be liable to a penalty not exceeding five thousand rupees for every day during which such failure con nues. • maintain books of account or records, fails to maintain the same, he shall be liable to a penalty not exceeding ten thousand rupees for every day during which the failure con nues. RESIDUARY PENALTY. –SEC 45 Whoever contravenes any rules or regula ons made under this Act, for the contraven on of which no penalty has been separately provided, shall be liable to pay a compensa on not exceeding twenty-five thousand rupees to the person affected by such contraven on or a penalty not exceeding twenty-five thousand rupees. POWER TO ADJUDICATE. –SEC46 (1) For the purpose of adjudging under this Chapter whether any person has commi ed a contraven on of any of the provisions of this Act or of any rule, regula on, 1[direc on or order made thereunder which renders him liable to pay penalty or compensa on,] the Central Government shall, subject to the provisions of sub-sec on (3), appoint any officer not below the rank of a Director to the Government of India or an equivalent officer of a State Government to be an adjudica ng officer for holding an inquiry in the manner prescribed by the Central Government. 2[(1A) The adjudica ng officer appointed under sub-sec on (1) shall exercise jurisdic on to adjudicate ma ers in which the claim for injury or damage does not exceed rupees five crore: Provided that the jurisdic on in respect of the claim for injury or damage exceeding rupees five crores shall vest with the competent court.] • The adjudica ng officer shall, a er giving the person referred to in sub-sec on (1) a reasonable opportunity for making representa on in the ma er and if, on such inquiry, he is sa sfied that the person has commi ed the contraven on, he may impose such penalty or award such compensa on as he thinks fit in accordance with the provisions of that sec on. • No person shall be appointed as an adjudica ng officer unless he possesses such experience in the field of Informa on Technology and legal or judicial experience as may be prescribed by the Central Government. • Where more than one adjudica ng officer are appointed, the Central Government shall specify by order the ma ers and places with respect to which such officers shall exercise their jurisdic on. • Every adjudica ng officer shall have the powers of a civil court which are conferred on the―Appellate Tribunal under sub-sec on (2) of sec on 58, and– • all proceedings before it shall be deemed to be judicial proceedings within the meaning of sec ons 193 and 228 of the Indian Penal Code (45 of 1860); • shall be deemed to be a civil court for the purposes of sec ons 345 and 346 of the Code of Criminal Procedure, 1973 (2 of 1974); 1[(c) shall be deemed to be a civil court for purposes of Order XXI of the Civil Procedure Code, 1908 (5 of 1908).]47. FACTORS TO BE TAKEN INTO ACCOUNT BY THE ADJUDICATING OFFICER. – While adjudging the quantum of compensa on under this Chapter, the adjudica ng officer shall have due regard to the following factors, namely: – • the amount of gain of unfair advantage, wherever quan fiable, made as a result of the default; • the amount of loss caused to any person as a result of the default; • the repe ve nature of the default. OFFENCES UNDER THE ACT The increased rate of technology in computers has led to the enactment of Informa on Technology Act 2000. The conver ng of the paperwork into electronic records, the storage of the electronic data, has tremendously changed the scenario of the country. Offenses: Cyber offenses are the unlawful acts which are carried in a very sophis cated manner in which either the computer is the tool or target or both. Cybercrime usually includes: (a) Unauthorized access of the computers (b) Data diddling (c) Virus/worms a ack (d) The of computer system (e) Hacking (f) Denial of a acks (g) Logic bombs (h) Trojan a acks (i) Internet me the (j) Web jacking (k) Email bombing (l) Salami a acks (m) Physically damaging computer system. The offenses included in the IT Act 2000 are as follows: 1. Tampering with the computer source documents. 2. Hacking with computer system. 3. Publishing of informa on which is obscene in electronic form. 4. Power of Controller to give direc ons 5. Direc ons of Controller to a subscriber to extend facili es to decrypt informa on 6. Protected system 7. Penalty for misrepresenta on 8. Penalty for breach of confiden ality and privacy 9. Penalty for publishing Digital Signature Cer ficate false in certain par culars 10. Publica on for fraudulent purpose 11. Act to apply for offense or contraven on commi ed outside India 12. Confisca on 13. Penal es or confisca on not to interfere with other punishments. 14. Power to inves gate offenses. Offenses UNDER THE IT ACT, 2000 1.Tampering with computer source documents: Sec on 65 of this Act provides that Whoever knowingly or inten onally conceals, destroys or alters or inten onally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer Programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the being me in force, shall be punishable with imprisonment up to three year, or with fine which may extend up to two lakh rupees, or with both. Explana on: For the purpose of this sec on “computer source code” means the lis ng of programmes, computer commands, design and layout and programme analysis of computer resource in any form. Object: The object of the sec on is to protect the “intellectual property” invested in the computer. It is an a empt to protect the computer source documents (codes) beyond what is available under the Copyright Law. This sec on extends towards the Copyright Act and helps the companies to protect the source code of their programmes. Sec on 65 is tried by any magistrate. This is cognizable and non- bailable offense. Imprisonment up to 3 years and or fine up to Two lakh rupees. CASE LAWS Friso v. State of Kerela: Facts: In this case, it was declared that the FRIENDS applica on so ware as a protected system. The author of the applica on challenged the no fica on and the cons tu onal validity of so ware under Sec on 70. The court upheld the validity of both. It included tampering with source code. Computer source code the electronic form, it can be printed on paper. Held: The court held that Tampering with Source code is punishable with three years jail and or two lakh rupees fine of rupees two lakh rupees for altering, concealing and destroying the source code. Syed Saifuddin case: Facts: In this case, the Tata Indicom employees were arrested for manipula on of the electronic 32- bit number (ESN) programmed into cell phones the were exclusively franchised to Reliance Infocom. Held: Court held that Tampering with source code invokes Sec on 65 of the Informa on Technology Act. Parliament A ack Case: Facts: In this case, several terrorists a acked Parliament House on 13 December 2001. In this Case, the Digital evidence played an important role during their prosecu on. The accused argued that computers and evidence can easily be tampered and hence, should not be relied. In Parliament case, several smart device storage disks and devices, a laptop was recovered from the truck intercepted at Srinagar pursuant to informa on given by two suspects. The laptop included the evidence of fake iden ty cards, video files containing clips of the poli cal leaders with the background of Parliament in the background shot from T.V news channels. In this case design of Ministry of Home Affairs car s cker, there was game “wolf pack” with user name of ‘Ashiq’, there was the name in one of the fake iden ty cards used by the terrorist. No back up was taken. Therefore, it was challenged in the Court. Held: Challenges to the accuracy of computer evidence should be established by the challenger. Mere theore cal and generic doubts cannot be cast on the evidence. 2. Hacking with the computer system: Sec on 66 provides that- (1) Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any informa on residing in a computer resource or diminishes its value or u lity or affects it injuriously by any means, commits hacking. (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. Explana on: The sec on talks about the hacking ac vity. Punishment: Imprisoned up to three years and fine which may extend up to two lakh rupees or with both. CASE LAWS R v. Gold & Schifrin: In this case, it is observed that the accused gained access to the Bri sh telecom Prestel Gold computers networks file amount to dishonest trick and not a criminal offense. R v. Whitely: In this case, the accused gained unauthorized access to the Joint Academic Network (JANET) and deleted, added files and changed the passwords to deny access to the authorized users. The perspec ve of the sec on does not merely protect the informa on but to protect the integrity and security of computer resources from a acks by unauthorized person seeking to enter such resource, whatever may be the inten on or mo ve. Cases Reported In India: Official website of Maharashtra government hacked. The official website of the government of Maharashtra was hacked by Hackers Cool Al- Jazeera, and claimed them they were from Saudi Arabia. Publishing of obscene informa on in electronic form: Sec on 67 of this Act provides that Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstance, to read see or hear the ma er contained or embodied in it, shall be punished on first convic on with imprisonment of either descrip on for a term which may extend to five years and with fine which may extend to one lakh rupees and in the event of a second or subsequent convic on with imprisonment of either descrip on for a term which may extend to ten years and also with fine which may extend to two lakh rupees. CASE LAWS: The State of Tamil Nadu v. Suhas Ka . Facts: This case is about pos ng obscene, defamatory and annoying message about a divorcee woman in the Yahoo message group. E-mails were forwarded to the vic m for informa on by the accused through a false e-mail account opened by him in the name of the vic m. These pos ngs resulted in annoying phone calls to the lady. Based on the complaint police nabbed the accused. He was a known family friend of the vic m and was interested in marrying her. She married to another person, but that marriage ended in divorce and the accused started contac ng her once again. And her reluctance to marry him he started harassing her through the internet. Held: The accused is found guilty of offenses under sec on 469, 509 IPC and 67 of the IT Act 2000 and the accused is convicted and is sentenced for the offense to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offense u/s 509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offense u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently. “The accused paid fine amount and he was lodged at Central Prison, Chennai. This is considered the first case convicted under sec on 67 of Informa on Technology Act 2000 in India. In a recent case, a groom’s family received numerous emails containing defamatory informa on about the prospec ve bride. Fortunately, they did not believe the emails and chose to take the ma er to the police. The sender of the emails turned out to be the girl’s step-father, who did not want the girl to get married, as he would have lost control over her property, of which he was the legal guardian. Avanish Bajaj (CEO of bazzee.com – now a part of the eBay group of companies) case. Facts: There were three accused first is the Delhi schoolboy and IIT Kharagpur Ravi Raj and the service provider Avanish Bajaj. The law on the subject is very clear. The sec ons slapped on the three accused were Sec on 292 (sale, distribu on, public exhibi on, etc., of an obscene object) and Sec on 294 (obscene acts, songs, etc., in a public place) of the Indian Penal Code (IPC), and Sec on 67 (publishing informa on which is obscene in electronic form) of the Informa on Technology Act 2000. In addi on, the schoolboy faces a charge under Sec on 201 of the IPC (destruc on of evidence), for there is apprehension that he had destroyed the mobile phone that he used in the episode. These offenses invite a s ff penalty, namely, imprisonment ranging from two to five years, in the case of a first- me convic on, and/or fines. Held: In this case, the Service provider Avanish Bajaj was later acqui ed and the Delhi schoolboy was granted bail by Juvenile Jus ce Board and was taken into police charge and detained into Observa on Home for two days. Power of Controller to give direc ons: Sec on 68 of this Act provides that (1) The Controller may, by order, direct a Cer fying Authority or any employee of such Authority to take such measures or cease carrying on such ac vi es as specified in the order if those are necessary to ensure compliance with the provisions of this Act, rules or any regula ons made thereunder. (2) Any person who fails to comply with any order under sub-sec on (1) shall be guilty of an offense and shall be liable on convic on to imprisonment for a term not exceeding three years or to a fine not exceeding two lakh rupees or to both. Explana on: Any person who fails to comply with any order under subsec on (1) of the above sec on, shall be guilty of an offense and shall be convicted for a term not less than three years to a fine exceeding two lakh rupees or to both. Punishment: Imprisonment up to a term not exceeding three years or fine not exceeding two lakh rupees. Direc ons of Controller to a subscriber to extend facili es to decrypt informa on: Sec on 69 provides that- (1) If the Controller is sa sfied that it is necessary or expedient to do in the interest of the sovereignty or integrity of India, the security of the State, friendly rela ons with foreign States or public order or for preven ng incitement to the commission of any cognizable offense; for reasons to be recorded in wri ng, by order, direct any agency of the Government to intercept any informa on transmi ed through any computer resource. (2) The subscriber or any person in charge of the computer resource shall, when called upon by any agency which has been directed under sub-sec on (1), extend all facili es and technical assistance to decrypt the informa on. (3) The subscriber or any person who fails to assist the agency referred to in subsec on shall be punished with imprisonment for a term which may extend to seven years. Punishment: Imprisonment for a term which may extend to seven years. The offense is cognizable and non- bailable. Protected System: Sec on 70 of this Act provides that – (1) The appropriate Government may, by no fica on in the Official Gaze e, declare that any computer, computer system or computer network to be a protected system. (2) The appropriate Government may, by order in wri ng, authorize the persons who are authorized to access protected systems no fied under sub-sec on (1). (3) Any person who secures access or a empts to secure access to a protected system in contraven on of the provision of this sec on shall be punished with imprisonment of either descrip on for a term which may extend to ten years and shall also be liable to fine. Explana on: This sec on grants the power to the appropriate government to declare any computer, computer system or computer network, to be a protected system. Only authorized person has the right to access to protected system. Punishment: The imprisonment which may extend to ten years and fine. Penalty for misrepresenta on: Sec on 71 provides that- (1) Whoever makes any misrepresenta on to, or suppresses any material fact from, the Controller or the Cer fying Authority for obtaining any license or Digital Signature Cer ficate, as the case may be, shall be punished with imprisonment for a term which may extend to two years, or which fine which may extend to one lakh rupees, or with both. Punishment: Imprisonment which may extend to two years or fine may extend to one lakh rupees or with both. Penalty for breach of confiden ality and privacy: Sec on 72 provides that- Save as otherwise provide in this Act or any other law for the me being in force, any person who, in pursuance of any of the powers conferred under this Act, rules or regula on made thereunder, has secured assess to any electronic record, book, register, correspondence, informa on, document or other material without the consent of the person concerned discloses such material to any other person shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both. Explana on: This sec on relates to any person who in pursuance of any of the powers conferred by the Act or it allied rules and regula ons have secured access to any: Electronic record, books, register, correspondence, informa on, document, or other material. If such a person discloses such informa on, he will be punished. It would not apply to disclosure of personal informa on of a person by a website, by his email service provider. Punishment: Term which may extend to two years or fine up to one lakh rupees or with both. Penalty for publishing Digital Signature Cer ficate false in certain par culars: Sec on 73 provides that – (1) No person shall publish a Digital Signature Cer ficate or otherwise make it available to any other person with the knowledge that(a) The Cer fying Authority listed in the cer ficate has not issued it; or (b) The subscriber listed in the cer ficate has not accepted it; or (c) The cer ficate has been revoked or suspended unless such publica on is for the purpose of verifying a digital signature created prior to such suspension or revoca on. (2) Any person who contravenes the provisions of sub-sec on (1) shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both. Explana on: The Cer fying Authority listed in the cer ficate has not issued it or, the subscriber listed in the cer ficate has not accepted it or the cer ficate has been revoked or suspended. The Cer fying authority may also suspend the Digital Signature Cer ficate if it is of the opinion that the digital signature cer ficate should be suspended in public interest. A digital signature may not be revoked unless the subscriber has begiven opportunity of being heard in the ma er. On revoca on, the Cer fying Authority need to communicate the same with the subscriber. Such publica on is not an offense it is the purpose of verifying a digital signature created prior to such suspension or revoca on. Punishment: Imprisonment of a term of which may extend to two Years or fine may extend to 1 lakh rupees or with both. CASE LAWS: Benne Coleman & Co. v. Union of India In this case, the publica on has been stated that ‘publica on means dissemina on and circula on’. In the context of the digital medium, the term publica on includes and transmission of informa on or data in electronic form. Publica on for fraudulent purpose: Sec on 74 provides that- Whoever knowingly creates, publishes or otherwise makes available a Digital Signature Cer ficate for any fraudulent or unlawful purpose shall be punished with imprisonment for a term which may extend to two years, or with fine which extends to one lakh rupees, or with both. Explana on: This sec on prescribes punishment for the following acts: Knowingly crea ng a digital signature cer ficate for any 1. fraudulent purpose or, 2. unlawful purpose. Knowingly publishing a digital signature cer ficate for any 1. fraudulent purpose or 2. unlawful purpose Knowingly making available a digital signature cer ficate for any 1. fraudulent purpose or 2. unlawful purpose. Punishment: Imprisonment for a term up to two years or fine up to one lakh or both. Act to apply for offense or contraven on commi ed outside India: Sec on 75 provides that- (1) Subject to the provisions of sub-sec on (2), the provisions of this Act shall apply also to any offense or contraven on commi ed outside India by any person irrespec ve of his na onality. For the purposes of sub-sec on (1), this Act shall apply to an offense or Contraven on commi ed outside India by any person if the act or conduct cons tu ng the offense or contraven on involves a computer, computer system or computer network located in India. Explana on: This sec on has a broader perspec ve including cyber-crime, commi ed by cyber criminals, of any na onality, any territoriality. CASE LAW: R v. Governor of Brixton prison and another Facts: In this case the Ci bank faced the wrath of a hacker on its cash management system, resul ng in illegal transfer of funds from customers account into the accounts of the hacker, later iden fied as Vladimir Levin and his accomplices. A er Levin was arrested, he was extradited to the United States. One of the most important issues was the jurisdic onal issue, the ‘place of origin’ of cyber-crime. Held: The Court held that the real- me nature of the communica on link between Levin and Ci bank computer meant that Levin’s keystrokes were actually occurring on the Ci bank computer. It is thus important that in order to resolve the disputes related to jurisdic on, the issue of territoriality and na onality must be placed by much broader criteria embracing principles of reasonableness and fairness to accommodate overlapping or conflic ng interests of states, in spirit of universal jurisdic on. Confisca on: Sec on 76 provides that- Any computer, computer system, floppies, compact disks, tape drives or any other accessories related thereto, in respect of which any provisions of this Act, rules, orders or regula ons made thereunder has been or is being contravened, shall be liable to confisca on: Provided that where it is established to the sa sfac on of the court adjudica ng the confisca on that the person in whose possession power or control of any such computer, computer system, floppies, compact disks, tape drives or any other accessories rela ng thereto is found is not responsible for the contraven on of the provisions of this Act, rules orders or regula ons made thereunder, the court may, instead of making an order for confisca on of such computer, computer system, floppies, compact disks, tape drives or any other accessories related thereto, make such other order authorized by this Act against the person contravening of the provisions of this Act, rules, orders or regula ons made thereunder as it may think fit. Explana on: The aforesaid sec on highlights that all devices whether computer, computer system, floppies, compact disks, tape drives or any other storage, communica on, input or output device which helped in the contraven on of any provision of this Act, rules, orders, or regula ons made under there under liable to be confiscated. Penal es or confisca on not to interfere with other punishments: Sec on 77 provides that – No penalty imposed or confisca on made under this Act shall prevent the imposi on of any other punishment to which the person affected thereby is liable under any other law for the me being in force. Explana on: The aforesaid sec on lays down a mandatory condi on, which states the Penal es or confisca on not to interfere with other punishments to which the person affected thereby is liable under any other law for the me being in force. Power to inves gate offenses: Sec on 78 provides that – Notwithstanding anything contained in the Code of Criminal Procedure, 1973, a police officer not below the rank of Deputy Superintendent of Police shall inves gate any offense under this Act. MAKING OF RULES AND REGULATION Power of Controller to make regula ons. – (1) The Controller may, a er consulta on with the Cyber Regula ons Advisory Commi ee and with the previous approval of the Central Government, by no fica on in the Official Gaze e, make regula ons consistent with this Act and the rules made thereunder to carry out the purposes of this Act. (2) In par cular, and without prejudice to the generality of the foregoing power, such regula ons may provide for all or any of the following ma ers, namely: (a) the par culars rela ng to maintenance of data-base containing the disclosure record of every Cer fying Authority under clause (m) of sec on 18; (b) the condi ons and restric ons subject to which the Controller may recognize any foreign Cer fying Authority under sub-sec on (1) of sec on 19; (c) the terms and condi ons subject to which a license may be granted under clause © of subsec on (3) of sec on 21; (d) other standards to be observed by a Cer fying Authority under clause (d) of sec on 30; (e) the manner in which the Cer fying shall disclose the ma ers specified in sub-sec on (1) of sec on 34; (f) the par culars of statement which shall accompany an applica on under sub-sec on (3) of sec on 35. (g) the manner by which the subscriber communicates the compromise of private key to the Cer fying Authority under sub-sec on (2) of sec on 42. Every regula ons made under this Act shall be laid, as soon as may be a er it is made, before each House of Parliament, while it is in session, for a total period of thirty days which may be comprised in one session or in two or more successive sessions, and if, before the expiry of the session immediately following the session or the successive sessions aforesaid, both Houses agree in making any modifica on in the regula on or both Houses agree that the regula on should not be made, the regula on shall therea er have effect only in such modified form or be of no effect, as the case may be; so, however, that any such modifica on or annulment shall be without prejudice to the validity of anything previously done under that regula on. Power of State Government to make rules. – (1) The State Government may, by no fica on in the Official Gaze e, make rules to carry out the provisions of this Act. (2) In par cular, and without prejudice to the generality of the foregoing power, such rules may provide for all or any of the following ma ers, namely: – (a) the electronic form in which filing, issue, grant, receipt or payment shall be affected under sub-sec on (1) of sec on 6; (b) for ma ers specified in sub-sec on (2) of sec on 6;(3) Every rule made by the State Government under this sec on shall be laid, as soon as may be a er it is made, before each House of the State Legislature where it consists of two Houses, or where such Legislature consists of one House, before that House CYBER APPELLETE TRIBUNAL The Information Technology Act, 2000 also provides for the establishment of the Cyber Appellate Tribunal. In this article, we will look at the establishment, composition, jurisdiction, powers, and procedures if a Cyber Appellate Tribunal. Establishment of Cyber Appellate Tribunal (Section 48) The Central Government notifies and establishes Cyber Regulations Appellate Tribunal. The Central Govt notify all the matters and places fall under the jurisdiction of the Tribunal. The composition of Cyber Appellant Tribunal (Section 49) The Central Govt appoints only one person in a Tribunal – the Presiding Officer of the Cyber Appellate Tribunal. The qualifications for appointment as Presiding Officer of the Cyber Appellate Tribunal (Section 50) A person is considered qualified for the appointment as the Presiding Officer of a Tribunal if – He has the qualification of the Judge of a High Court He is or was the member of the Indian Legal Service and holds or has held a post in Grade I of that service for at least three years. The Term of Office (Section 51) The Term of Office of the Presiding Officer of a Cyber Appellate Tribunal is 5 years from the date of entering the office or until he attains the age of 65 years, whichever is earlier. Filling up of vacancies (Section 53) If for any reason other than temporary absence, there is a vacancy in the Tribunal, then the Central Government hires another person in accordance with the Act to fill the vacancy. Further, the proceedings continue before the Tribunal from the stage at which the vacancy is filled. Resignation and removal (Section 54) The Presiding Officer can resign from his office after submitting a notice in writing to the Central Govt, provided: he holds office until the expiry of three months from the date the Central Government receives such notice (unless the Government permits him to relinquish his office sooner), OR he holds office till the appointment of a successor, OR until the expiry of his office; whichever is earlier. In case of proven misbehaviour or incapacity, the Central Government can pass an order to remove the Presiding Officer of the Cyber Appellate Tribunal. However, this is only after the Judge of the Supreme Court conducts an inquiry where the Presiding Officer is aware of the charges against him and has a reasonable opportunity to defend himself. The Central Government can regulate the procedure for the investigation of misbehaviour or incapacity of the Presiding Officer. Orders constituting Appellate Tribunal to be final and not to invalidate its proceedings (Section 55) According to this section, no order of the Central Government appointing any person as the Presiding Officer of the Tribunal can be questioned in any manner. Further, no one can question any proceeding before a Cyber Appellate Tribunal in any manner merely on the grounds of any defect in the Constitution of the Tribunal. Appeal to Cyber Appellate Tribunal (Section 57) Subject to the provisions of sub-section (2), a person not satisfied with the Controller or Adjudicating Officer’s order can appeal to the Cyber Appellate Tribunal having jurisdiction in the matter. No appeal shall lie to the Cyber Appellate Tribunal from an order made by an adjudicating with the consent of the parties. 1. The person filing the appeal must do so within 25 days from the date of receipt of the order from the Controller or Adjudicating Officer. Further, he must accompany the appeal with the prescribed fees. However, if the Tribunal is satisfied with the reasons behind the delay of filing the appeal, then it may entertain it even after the expiry of 25 days. 2. On receiving an appeal under sub-section (1), the Tribunal gives an opportunity to all the parties to the appeal to state their points, before passing the order. 3. The Cyber Appellate Tribunal sends a copy of every order made to all the parties to the appeal and the concerned Controller or adjudicating officer. 4. The Tribunal tries to expeditiously deal with the appeals received under subsection (1). It also tries to dispose of the appeal finally within six months of receiving it. Procedure and powers of the Cyber Appellate Tribunal (Section 58) 1. The Code of Civil Procedure, 1908 does not bind the Cyber Appellate Tribunal. However, the principles of natural justice guide it and it is subject to other provisions of the Act. The Tribunal has powers to regulate its own procedure. 2. In order to discharge its functions efficiently, the Tribunal has the same powers as vested in a Civil Court under the Code of Civil Procedure, 1908, while trying a suit in the following matters: a. Summoning and enforcing the attendance of any person and examining him under oath b. Ensuring the availability of the required documents or electronic records c. Receiving evidence on affidavits d. Issuing commissions for examining witnesses or documents e. Reviewing its decisions f. Dismissing an application for default or deciding it ex-parte, etc. 3. Every proceeding before the Cyber Appellate Tribunal is like a judicial proceeding within the meaning of sections 193 and 228 and for the purposes of section 196 of the Indian Penal Code. Further, the Tribunal is like a Civil Court for the purposes of section 195 and Chapter XXVI of the Code of Criminal Procedure, 1973. Right to Legal Representation (Section 59) The appellant can either appear in person or authorize one or more legal practitioners to present his case before the tribunal. Limitation (Section 60) The provisions of the Limitation Act, 1963, apply to the appeals made to the Tribunal. Civil Court not to have jurisdiction (Section 61) If the IT Act, 2000 empowers the adjudicating officer or the Cyber Appellate Tribunal for certain matters, then no Civil Court can entertain any suit or proceedings for the same. Further, no court can grant an injunction on any action that a person takes in pursuance of any power that the Act confers upon him. Appeal to High Court (Section 62) If person is not satisfied with the decision or order of the Tribunal. he can file an appeal with the High Court within 60 days of decision from the Tribunal. Compounding of contraventions (Section 63) 1. The Controller authorizes may compound any contravention before or after the institution of adjudication proceedings subject to the conditions specifies. No second compounding before 3years. after 3 yrs. second compounding is possible. Once compounded no proceeding possible.Penalty recovered as per revenue recovery-sec 64 CYBER CRIME INVESTIGATION CHILD PORNOGRAPHY / CHILD SEXUALLY ABUSIVE MATERIAL (CSAM) CYBER BULLYING CYBER CRIME CSAM refers to content having an image of sexual in nature, of a child, abused or sexually exploited. Section 67 (B) of the Information Technology Act states that publishing/transmitting any material, in electronic form, portraying children in sexually explicit acts, is a punishable cyber-crime. A bullying or a form of harassment perpetrated through electronic media or communication devices such as laptop, computer, mobile phone etc. CYBER STALKING • It is the use of electronic media by a person to track a person or tries to communicate/ contact another person to impose personal interaction continually despite the reluctance and disinterest by such person; • To monitor the email, internet or any other form of electronic communication of the other person and thereby committing an offence of stalking. ONLINE JOB FRAUD Wherein a person who is in need of a job is duped for money or defrauded by giving him/her fake promises to employment with higher wages through electronic communication. ONLINE SEXTORTION When someone threatens to circulate or publish any sensitive/ private material/ images/ content using electronic medium if the other person rejects or denies providing images, favours of sexual nature or money. VISHING Fraudsters try to obtain personal information like bank account password, customer ID, ATM PIN, OTP, credit card CVV etc. over a phone call. PHISHING It is a type of fraud that involves stealing of personal information of a person such as a bank’s customer ID, Credit Card/ Debit Card number, CVV number, etc. through electronic channels that seem to be from a genuine source. RANSOMWARE • A computer malware that encrypts the storage media and files on electronic devices like mobile phones, laptops, desktops, etc., by taking control over the data/ information as a hostage. • The aggrieved are demanded ransom to get his information/ data decrypted or else they are threatened to even sell the data/ information on the dark web. WORMS, VIRUS & TROJANS CYBER-SQUATTING • Virus is a program to enter one’s computer and damage and/or alter the files and/or data and replicate it. • Worms are malevolent programs that make multiple copies of themselves on the local drive and network shares, etc. • Trojan is a dangerous program. Unlike viruses, trojan horses do not replicate, but are destructive. Trojan opens a backdoor entry to one’s computer which allows malevolent users to access the system, allowing confidential and personal sensitive information to be stolen. It is an act of trafficking in, registering, or using a domain name to make undue profit from the reputation of a trademark which belongs to somebody else. CRYTO-JACKING An unauthorized way to mint cryptocurrencies through the use of computer resources. ESPIONAGE An act where the information & data is collected from the user without his/her knowledge & permission. Investigation of cyber-crimes Power of investigation The power to investigation comes under Sec78 of the IT Act, which says that “notwithstanding anything contained in the Code of Criminal Procedure, 1973, a police officer not below the rank of Inspector shall investigate any offence under this Act”. the Criminal Procedure Code, 1978 and the Indian Penal Code, 1860, were also amended to introduce cyber-crime under their ambit. Process of search & arrest Any police officer, not below the rank of the Inspector or any other officer of the Central Government or State Government authorized by the Central Government in this regard, may enter any public place, search and arrest without warrant any person, who is reasonably suspected of having committed or of committing or about to commit an offence under the IT Act. any person who is arrested by an officer other than a police officer then such officer shall, without any unreasonable delay, take or send the person arrested before a magistrate having jurisdiction in the case or before the officer-in-charge of a police station. The Government of India had launched the online cyber-crime reporting portal, www.cybercrime.gov.in to lodge complaints. The Central Government has launched a scheme of Indian Cyber Crime Coordination Centre (I4C)] to handle the cybercrime The said scheme has following seven components: National Cybercrime Threat Analytics Unit (TAU), National Cybercrime Forensic Laboratory (NCFL) National Cybercrime Training Centre (NCTC) Cybercrime Ecosystem Management Platform for Joint Cybercrime Investigation Team National Cybercrime Reporting Portal National Cyber Research and Innovation Centre (NCR&IC) The government is also planning to set up Regional Cyber Crime Coordination Centres at respective States/UTs. One can report a cyber-crime by: Filing a written complaint in nearest, any Cyber Cell Lodging an F.I.R (First Information Report) Filing a complaint at https://www.cybercrime.gov.in/Accept.aspx After filing of a complaint / F.I.R., the process of investigation, is hereby given below in diagram In case the response has not been appropriate then the complainant can write to State / UT Nodal Officer and Grievance Officer, the details of which can be accessed here: Recently, for Delhi only, a new feature “Citizen Financial Cyber Fraud Reporting and Management System” has been activated for prevention of money loss in case of Cyber Financial Fraud; for immediate reporting the complainant can Call 155260 (9 AM – 6 PM only) and further details can be accessed from ‘Citizen Manual’ under “Resources Section” at www.cybercrime.gov.in. Prosecution for cyber-crimes Some common cyber-crimes incidents which attract prosecution as per the applicable provisions of the IT Act, are provided herein below: It is created for provoking a religious group to act or pass obnoxious/ objectionable Online hate remarks against a public figure or the country etc. community Applicable provisions: Section 66A of IT Act + 153A & 153B of the Indian Penal Code (IPC) If a person’s email account is hacked and offensive / indecent emails are sent to people Email account who are in person’s address book. hacking Applicable provisions: Sections 43, 66, 66A, 66C, 67, 67A and 67B of IT Act. Web defacement The Website’s homepage is swapped with a defamatory or pornographic content/ page. Applicable provisions: Sections 43 and 66 of IT Act and Sections 66F, 67 and 70 of IT Act also apply in some cases. Cyber terrorism The terrorists are using virtual & physical storage for hiding data & records of their illegal business. Applicable provisions: terrorism laws apply + Section 66F & 69 of IT Act. Phishing and It involves acquiring sensitive information fraudulently by masquerading as a reliable & email scams legitimate entity. Applicable provisions: Section 66, 66A and 66D of IT Act + Section 420 of IPC Objec ves of IT Act 2000: a. To give legal recogni on to any transac on which is done by electronic way, internet b. To give legal recogni on to digital signature for accep ng any agreement via computer. c. To provide facility of filling documents online d. According to I.T. Act 2000, any company can store their data in electronic storage. e. To stop computer crime and protect privacy of internet users. f. To give more power to IPO, RBI and Indian Evidence act for restric ng electronic crime. g. To give legal recogni on for keeping books of accounts in electronic form. This act shall not apply to the following: a. IT Act 2000 is not applicable on the a esta on for crea ng trust via electronic way. Physical a esta on is must. b. A contract of sale of any immovable property. c. A esta on for giving power of a orney of property is not possible via electronic record. Impact of IT Act: contain many posi ve aspects. a. provisions for the e-businesses are that email is now a valid and legal form of communica on in our country that can be duly produced and approved in a court of law. b. Companies are now able to carry out electronic commerce using the legal infrastructure provided by the Act. c. Digital signatures have been given legal validity and sanc on in the Act. d. The Act opens the doors for the entry of corporate companies in the business of being Cer fying Authori es for issuing Digital Signature Cer ficates. e. The Act now allows Government to issue no fica on on the web thus heralding egovernance. f. The Act enables the companies to file any form, applica on or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in electronic form by means of such electronic form as may be prescribed by the appropriate Government. g. The IT Act also addresses the important issues of security, which are cri cal to the success of electronic transac ons. The Act has given a legal defini on to the concept of secure digital signatures security procedure, as s pulated by the Government Under the IT Act, 2000, it is possible for corporate to have a statutory remedy in case if anyone breaks into their computer systems or network and causes damages or copies data. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore. IMPACT OF THE IT ACT ON OTHER LAWS Parallel Provisions in the IPC and IT Act the Information Technology Act, 2000 ("IT Act") and the Indian Penal Code, 1860 ("IPC") penalise a number of cyber-crimes and there are many provisions in the IPC and the IT Act that overlap with each other. Many of the cybercrimes penalised by the IPC and the IT Act have the same ingredients and even nomenclature. Here are a few examples: Hacking and Data Theft: Sec 43 & 66 of the IT Act penalise a number of activities ranging from hacking into a computer network, data theft, introducing and spreading viruses through computer networks, damaging computers or computer networks or computer programmes, disrupting any computer or computer system or computer network, denying an authorised person access to a computer or computer network, damaging or destroying information residing in a computer etc. The maximum punishment for the above offences is imprisonment of up to 3 (three) years or a fine or Rs. 5,00,000 (Rupees five lac) or both. Sec 378 of the IPC relating to "theft" of movable property will apply to the theft of any data, online or otherwise, since sec22 of the IPC states that the words "movable property" are intended to include corporeal property of every description, except land and things attached to the earth or permanently fastened to anything which is attached to the earth. The maximum punishment for theft under section 378 of the IPC is imprisonment of up to 3 (three) years or a fine or both. It may be argued that the word "corporeal" which means 'physical' or 'material' would exclude digital properties from the ambit of the aforesaid sec 378 of the IPC. The counter argument would be that the drafters intended to cover properties of every description, except land and things attached to the earth or permanently fastened to anything which is attached to the earth. Sec 424 of the IPC states that "whoever dishonestly or fraudulently conceals or removes any property of himself or any other person, or dishonestly or fraudulently assists in the concealment or removal thereof, or dishonestly releases any demand or claim to which he is entitled, shall be punished with imprisonment of either description1 for a term which may extend to 2 (two) years, or with fine, or with both." This aforementioned section will also apply to data theft. The maximum punishment under section 424 is imprisonment of up to 2 (two) years or a fine or both. Sec 425 of the IPC deals with mischief and states that "whoever with intent to cause, or knowing that he is likely to cause, wrongful loss or damage to the public or to any person, causes the destruction of any property, or any such change in any property or in the situation thereof as destroys or diminishes its value or utility, or affects it injuriously, commits mischief". Needless to say, damaging computer systems and even denying access to a computer system will fall within the aforesaid section 425 of the IPC. The maximum punishment for mischief as per section 426 of the IPC is imprisonment of up to 3 (three) months or a fine or both. Receipt of stolen property: Sec 66B of the IT Act prescribes punishment for dishonestly receiving any stolen computer resource or communication device. This section requires that the person receiving the stolen property ought to have done so dishonestly or should have reason to believe that it was stolen property. The punishment for this offence under Sec66B of the IT Act is imprisonment of up to 3 (three) years or a fine of up to Rs. 1,00,000 or both. Sec 411 of the IPC too prescribes punishment for dishonestly receiving stolen property and is worded in a manner that is almost identical to section 66B of the IT Act. The punishment under section 411 of the IPC is imprisonment of either description for a term of up to 3 years, or with fine, or with both. Please note that the only difference in the prescribed punishments is that under the IPC, there is no maximum cap on the fine. Identity theft and cheating by personation: Sec 66C of the IT Act prescribes punishment for identity theft and provides that anyone who fraudulently or dishonestly makes use of the electronic signature, password or any other unique identification feature of any other person shall be punished with imprisonment of either description for a term which may extend to 3 years and shall also be liable to fine which may extend to Rs. One lac. Sec 66D of the IT Act prescribes punishment for 'cheating by personation by using computer resource' and provides that any person who by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to 3 years and shall also be liable to fine which may extend to Rs. 1,00,000 Sec 419 of the IPC also prescribes punishment for 'cheating by personation' for a term which may extend to 3 years or with a fine or with both. The provisions of sec 463, 465 & 468 of the IPC dealing with forgery and "forgery for the purpose of cheating", may also be applicable in a case of identity theft. Sec 468 of the IPC prescribes punishment for forgery for the purpose of cheating and provides a punishment of imprisonment may extend to 7 years and also a fine. The only difference between the punishments prescribed under sections 66C and 66D of the IT Act and section 419 of the IPC is that there is no maximum cap on the fine prescribed under the IPC. However, the punishment under section 468 is much higher in that the imprisonment mat extend to 7 years. Further, whilst the IT Act contemplates both the imposition of a fine and imprisonment, the IPC uses the word 'or' indicating that the offence could be punished with imprisonment or by imposing a fine. Most importantly, the fundamental distinction between the IPC and the IT Act in relation to the offence of identity theft is that the latter requires the offence to be committed with the help of a computer resource. Obscenity: Sec 67, 67A & 67B of the IT Act prescribe punishment for publishing or transmitting, in electronic form: (i) obscene material; (ii) material containing sexually explicit act, etc.; and (iii) material depicting children in sexually explicit act, etc. respectively. The punishment prescribed for an offence under section 67 of the IT Act is, on the first conviction, imprisonment may extend to 3 years with fine which may extend to Rs. 5,00,000 and in the event of a second or subsequent conviction, may extend to 5 years, to be accompanied by a fine which may extend to Rs. 10,00,000. The punishment prescribed for offences under sections 67A & 67B of the IT Act is on first conviction, imprisonment may extend to 5 years, with fine which may extend to Rs. 10,00,000 and in the event of second or subsequent conviction, imprisonment may extend to 7 years with fine which may extend to Rs. 10,00,000 The provisions of sections 292 and 294 of the IPC would also be applicable for offences of the nature described under sections 67, 67A and 67B of the IT Act. Section 292 of the IPC provides that any person who, inter alia, sells, distributes, publicly exhibits or in any manner puts into circulation or has in his possession any obscene material or any other obscene object whatsoever shall be punishable on a first conviction with imprisonment may extend to 2 years, with fine extend to Rs. 2,000 and, in the event of a second or subsequent conviction, with imprisonment may extend to 5 years, with fine may extend to Rs. 5,000 Section 294 of the IPC provides that any person who, to the annoyance of others, does any obscene act in any public place, shall be punished with imprisonment may extend to 3 months, or with fine, or with both. Cyber-crimes not provided for in the IPC The following cyber-crimes penalised by the IT Act do not have an equivalent in the IPC. Section 43(h) of the IT Act: Section 43(h) read with section 66 of the IT Act penalises an individual who charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network. A person who tampers with the computer system of an electricity supplier and causes his neighbour to pay for his electricity consumption would fall under the aforesaid section 43(h) of the IT Act for which there is no equivalent provision in the IPC. Section 65 of the IT Act: Section 65 of the IT Act prescribes punishment for tampering with computer source documents and provides that any person who knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy, or alter any computer source code (i.e. a listing of programmes, computer commands, design and layout and programme analysis of computer resource in any form) used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment for up to 3 years or with a fine which may extend to Rs. 3,00,000 or with both. To a certain extent, section 409 of the IPC overlaps with section 65 of the IT Act. Section 409 of the IPC provides that any person who is in any manner entrusted with property, or with any dominion over property in his capacity as a public servant or in the way of his business as a banker, merchant, factor, broker, attorney or agent, commits criminal breach of trust in respect of that property, shall be punished with imprisonment for life or with imprisonment of either description for a term which may extend to 10 years, and shall also be liable to a fine. However, section 65 of the IT Act does not require that the person who tampers with or damages or destroys computer source documents should have been entrusted with such source code. Under section 409 of the IPC, criminal breach of trust should have been committed by someone to whom the property was entrusted. Violation of privacy: Sec 66E of the IT Act prescribes punishment for violation of privacy and provides that any person who intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to 3 years or with fine not exceeding Rs. 2,00,000 or with both. There is no provision in the IPC that mirrors Section 66E of the IT Act, though sections 292 and 509 of the IPC do cover this offence partially. Section 292 of the IPC has been discussed above. Section 509 of the IPC provides that if any person intending to insult the modesty of any woman, utters any word, makes any sound or gesture, or exhibits any object, intending that such word or sound shall be heard, or that such gesture or object shall be seen, by such woman, or intrudes upon the privacy of such woman, such person shall be punished with simple imprisonment for a term which may extend to 1 (one) year, or with fine, or with both. Unlike section 66E of the IT Act which applies to victims of both genders, section 509 of the IPC applies only if the victim is a woman. Section 67C of the IT Act: Section 67C of the IT Act requires an 'intermediary' to preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe. The section further provides that any intermediary who intentionally or knowingly contravenes this requirement shall be punished with imprisonment for a term may extend to 3 years and with fine. An 'intermediary' with respect to any particular electronic record, has been defined in the IT Act to mean any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web-hosting service providers, search engines, online payment sites, online-auction sites, online-market places and cyber cafes. There is no corresponding provision in the IPC. Cyber terrorism: Sec 66F of the IT Act prescribes punishment for cyber terrorism. Whoever, with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people, denies or causes the denial of access to any person authorized to access a computer resource, or attempts to penetrate or access a computer resource without authorisation or exceeding authorised access, or introduces or causes the introduction of any computer contaminant, and by means of such conduct causes or is likely to cause death or injuries to persons or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or adversely affect critical information infrastructure, is guilty of 'cyber terrorism'. Whoever knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorised access, and by means of such conduct obtains access to information, data or computer database that is restricted for reasons for the security of the State or foreign relations, or any restricted information, data or computer database, with reasons to believe that such information, data or computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise, is also guilty of 'cyber terrorism’. Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life. There is no provision in the IPC that mirrors section 66F of the IT Act, though section 121 of the IPC (waging, or attempting to wage war, or abetting waging of war, against the Government of India) does cover this offence partially. Compoundable, Cognizable and Bailable offences. Section 77A of the IT Act provides that, subject to certain exceptions, all offences under the IT Act for which the punishment is imprisonment for a term of 3 years or less, are compoundable. The provisions of sections 265B and 265C of Cr.P.C 1973 ("CrPC") shall apply with respect to such compounding. Section 77B of the IT Act provides that notwithstanding anything contained in the CrPC, all offences punishable with imprisonment of 3 years and above under the IT Act shall be cognizable and all offences punishable with imprisonment of 3 years or less shall be bailable. Most of the cyber-crimes covered under the IT Act are punishable with imprisonment of 3 years or less. The cyber-crimes which are punishable with imprisonment of more than 3 years are: a. publishing or transmitting obscene material in electronic form under section 67 of the IT Act; b. publishing or transmitting of material containing sexually explicit act, etc., in electronic form under section 67A of the IT Act; c. publishing or transmitting of material depicting children in sexually explicit act, etc., in electronic form under section 67B of the IT Act; and d. cyber terrorism under section 66F of the IT Act. All of the cyber-crimes under the IPC are bailable other than offences under section 420 (cheating and dishonestly inducing delivery of property), section 468 (forgery for the purpose of cheating), section 411 (dishonestly receiving stolen property), section 378 (theft) and section 409 (criminal breach of trust by public servant, or by banker, merchant or agent), which are non-bailable. Non-Compoundable Offences under sections 463 and 465 (forgery), sections 425 and 426 (mischief), section 468 (forgery for the purpose of cheating), section 469 (forgery for the purpose of harming reputation) and section 292 (sale, etc., of obscene books, etc.) of the IPC are noncompoundable offences Compoundable offences under sections 378 and 379 (theft), 420 (cheating and dishonestly inducing delivery of property), sections 425 and 426 (mischief when the only loss or damage caused is loss or damage to a private person), section 509 (word, gesture or act intended to insult the modesty of a woman), section 411 (Dishonestly receiving stolen property) and section 419 (Punishment for cheating by personation) of the IPC are compoundable offences. Of these, offences under sections 420 and 509 can be compounded only with the permission of the court. Non -cognizable cyber-crimes under the IPC sections 425 and 426 (mischief) and sections 463 and 465 (forgery) which are non-cognizable. Conflict between the IPC and the IT Act: Case Law In the case of Sharat Babu Digumarti v. Government of NCT of Delhi3, the conflict between provisions of the IPC and the IT Act came to the fore. In this case, on November 27, 2004, an obscene video had been listed for sale on baazee.com ("Bazee"). The listing was intentionally made under the category 'Books and Magazines' and sub-category 'eBooks' in order to avoid its detection by the filters installed by Baazee. A few copies were sold before the listing was deactivated. Later Delhi police's crime branch charge-sheeted Avinash Bajaj, Bazee's managing director and Sharat Digumarti, Bazee's manager. The company Bazee was not arraigned as an accused and this helped Avinash Bajaj get off the hook since it was held that, vicarious liability could not be fastened on Avinash Bajaj under either section 292 of the IPC or section 67 of the IT Act when Avinash's employer Bazee itself was not an accused. Later changes under section 67 of the IT Act and section 294 of IPC against Sharat Digumarti were also dropped, but the charges under section 292 of the IPC were retained. The Supreme Court then considered if, after the charges under section 67 of the IT Act was dropped, a charge under section 292 of the IPC could be sustained. The Supreme Court quashed the proceedings against Sarat Digumarti and ruled that if an offence involves an electronic record, the IT Act alone would apply since such was the legislative intent. It is a settled principle of interpretation that special laws would prevail over general laws and latter laws would prevail over prior legislation. Further, section 81 of the IT Act states that the provisions of the IT Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force. In Gagan Harsh Sharma v. The State of Maharashtra certain individuals were accused of theft of data and software from their employer and charged under sections 408 and 420 of the IPC and also under sections 43, 65 and 66 of the IT Act. All of these sections, other than section 408 of the IPC, have been discussed above. Section 408 of the IPC deals with criminal breach of trust by clerk or servant and states that "whoever, being a clerk or servant or employed as a clerk or servant, and being in any manner entrusted in such capacity with property, or with any dominion over property, commits criminal breach of trust in respect of that property, shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine". Offences under sections 408 and 420 of the IPC are non-bailable and cannot be compounded other than with the permission of the court. Offences under sections 43, 65 and 66 of the IT Act are bailable and compoundable. Therefore, the petitioners pleaded that the charges against them under the IPC be dropped and the charges against them under the IT Act be investigated and pursued. It was further argued that if the Supreme Court's ruling in Sharat Babu Digumarti were to be followed, the petitioners could only be charged under the IT Act and not under the IPC, for offences arising out of the same actions. The Bombay High Court upheld the contentions of the petitioners and ruled that the charges against them under the IPC be dropped. A Suitable Home for Cyber Offences We currently have a situation where a number of offences are penalised by both the IPC and the IT Act, even though the ingredients of both offences are the same. There are subtle differences in punishments under these statutes, especially in aspects like whether the offence is bailable or compoundable or cognizable. An offence such as obscenity may take place through different types of media, both online or offline. However, it could result in unfairness if 2 different statutes apply to the same offence on the basis of the media used. Theft is theft, irrespective of whether the stolen property is digital or physical. Obscenity transmitted by internet should be treated at par with obscenity which is transmitted offline. IPC's treatment of stalking The legislature's treatment of the offence of "stalking", accomplished through the insertion of new section 354D in the IPC through the Criminal Law (Amendment) Act, 20135, is a case in point. Section 354D penalises the offence of "stalking" whether it has a cyber component or not. If a man follows a woman and contacts, or attempts to contact, such woman to foster personal interaction repeatedly despite a clear indication of disinterest by such woman, it amounts to stalking. If a man monitors the use by a woman of the internet, email or any other form of electronic communication, it will also result in the offence of stalking. There are a few exemptions to this offence of stalking, and all the defences apply irrespective of whether the stalking is cyber stalking or not. The punishment prescribed for stalking by Section 354D of the IPC does not discriminate on the basis of the presence or absence of the "cyber" component. Amendments to the IPC to cover cyber-crimes The Indian legislature has made amendments to the IPC, to cover cyber-crimes. as follows: a. a new sec 29A was created to define "electronic record" by linking it with the definition given in the IT Act b. a new sub-sec (3) was inserted in sec 4 of the IPC (relating to the extension of the IPC to extra territorial offences) that states that the provisions of the IPC shall be applicable to any person in any place "without and beyond India", committing an offence targeting a computer resource located in India. c. in sec118 & 119 of the IPC (that deal with the concealment of a design to commit an offence punishable with death or imprisonment for life and a public servant concealing a design to commit an offence which it is his duty to prevent, respectively), the words "voluntarily conceals by any act or omission or by the use of encryption or any other information hiding tool, the existence of a design" were inserted before the words "to commit such offence or makes any representation which he knows to be false respecting such design d. sec 464 of the IPC (which penalises the making of a false document), the phrase "digital signature" was replaced with the phrase "electronic signature" in all places. The section was also amended to include the making of false electronic records and affixing electronic signatures under its ambit and the phrase "affixing electronic signature" was given the same meaning as it has under the IT Act. e. "Electronic record" was included within the ambit of sections 164, 172, 173, 175, 192, 204, 463, 466, 468, 469, 470, 471, 474 and 476 of the IPC that earlier only provided for documents, books, paper, writing or records, as the case may be; f. in sec 466 of the IPC (which deals with forgery of court records or of public registers), the term "register" was defined to include any list, data or record of any entries maintained in an "electronic form", as defined in section 2(1) (r) of the IT Act and g. a new sec 354D was inserted in the IPC that introduces the offence of cyber stalking, which has been discussed above. E-COMMERCE E-Commerce or Electronic Commerce means buying and selling of goods, products, or services over the internet. E-commerce is also known as electronic commerce or internet commerce. These services provided online over the internet network. Transaction of money, funds, and data are also considered as E-commerce. The standard definition of E-commerce is a commercial transaction which is happened over the internet. Ex Online stores like Amazon, Flipkart, Myntra, eBay, Quikr,. Types of E-Commerce Models Electronic commerce can be classified into four main categories. The basis for this simple classification is the parties that are involved in the transactions. 1. Business to Business This is Business to Business transactions. Here the companies are doing business with each other. The final consumer is not involved. So, the online transactions only involve the manufacturers, wholesalers, retailers etc. 2. Business to Consumer Business to Consumer. Here the company will sell their goods and/or services directly to the consumer. The consumer can browse their websites and look at products, pictures, read reviews. Then they place their order and the company ships the goods directly to them. Popular examples are Amazon, Flipkart. 3. Consumer to Consumer Consumer to consumer, where the consumers are in direct contact with each other. No company is involved. It helps people sell their personal goods and assets directly to an interested party. Usually, goods traded are cars, bikes, electronics etc. OLX, Quikr etc follow this model. 4. Consumer to Business This is the reverse of B2C, it is a consumer to business. So the consumer provides a good or some service to the company. Say for example an IT freelance who demos and sells his software to a company. This would be a C2B transaction. Advantages of E-Commerce E-commerce provides the sellers with a global reach. Now sellers and buyers can meet in the virtual world, without the hindrance of location. It eliminates many fixed costs of maintaining brick and mortar shops. This allows the companies to enjoy a much higher margin of profit. It provides quick delivery of goods with very little effort on part of the customer. Customer complaints are also addressed quickly. It also saves time, energy and effort for both the consumers and the company. One other great advantage is the convenience it offers. A customer can shop 24×7. The website is functional at all times, it does not have working hours like a shop. Electronic commerce also allows the customer and the business to be in touch directly, without any intermediaries. Disadvantages of E-Commerce The start-up costs of the e-commerce portal are very high. The setup of the hardware and the software, the training cost of employees, the constant maintenance and upkeep are all quite expensive. Although it may seem like a sure thing, the e-commerce industry has a high risk of failure. Many companies riding the dot-com wave of the 2000s have failed miserably. The high risk of failure remains even today. At times, e-commerce can feel impersonal. So it lacks the warmth of an interpersonal relationship which is important for many brands and products. This lack of a personal touch can be a disadvantage for many types of services and products like interior designing or the jewellery business. Security is another area of concern. Only recently, we have witnessed many security breaches where the information of the customers was stolen. Credit card theft, identity theft etc. remain big concerns with the customers. Then there are also fulfilment problems. Even after the order is placed there can be problems with shipping, delivery, mix-ups etc. This leaves the customers unhappy and dissatisfied. UNCITRAL MODEL UNCITRAL (United Nations Commission on International Trade Law) has prepared a suite of legislative texts to enable and facilitate the use of electronic means to engage in commercial activities, which have been adopted in over 100 States. The most widely enacted text is the UNCITRAL Model Law on Electronic Commerce (1996), which establishes rules for the equal treatment of electronic and paper-based information, as well as the legal recognition of electronic transactions and processes, based on the fundamental principles of non-discrimination against the use of electronic means, functional equivalence and technology neutrality. The UNCITRAL Model Law on Electronic Signatures (2001) provides additional rules on the use of electronic signatures. The United Nations Convention on the Use of Electronic Communications in International Contracts (New York, 2005) builds on pre-existing UNCITRAL texts to offer the first treaty that provides legal certainty for electronic contracting in international trade. Most recently, the UNCITRAL Model Law on Electronic Transferable Records (2017) applies the same principles to enable and facilitate the use in electronic form of transferable documents and instruments, such as bills of lading, bills of exchange, cheques, promissory notes and warehouse receipts. In 2019, UNCITRAL approved the publication of Notes on the Main Issues of Cloud Computing Contracts, while continuing work towards a new instrument on the use and cross border recognition of electronic identity management services (IdM services) and authentication services (trust services). UNCITRAL continues its efforts to legally enable emerging technologies such as artificial intelligence, data transactions, digital platforms and digital assets, including in connection with other areas of work such as dispute resolution, security interests, insolvency and the international transport of goods, as well as, more generally, digital trade. LEGAL ASPECTS AND COMPLIENCES FOR E-COMMERCE IN INDIA A shi has been observed from producer-oriented markets to customer-oriented ones. Thus evolves the E-commerce industry which has successfully catered to consumers’ needs and has eased and supplied the consumers with what they require i.e., innumerable op ons, easy return, delivery at the doorstep and such other services as per their comfort. The law considers all businesses, whether online and/ or offline as equal. The main challenges to overcome in the E-commerce industry are unfamiliarity with digital systems and a diverse array of languages, to begin with. These factors demand the introduc on of an appropriate omnichannel strategy. By combining this with a robust offline-to-online model, knowledge about the E-commerce website’s legal requirements assisted sales and product cura on, the E-commerce market can expect a smooth integra on into the wider E-commerce ecosystem. The main reasons for India’s underperformance are market inefficiencies and underdevelopment and the lack of knowledge of the people about the benefits of Ecommerce business in India. Legal Requirements of E-commerce business in India The legal obliga ons to start an E-commerce business in India are as follows: 1. Company or LLP Registra on Every business is required to get registered with the Ministry of Corporate Affairs under the applicable laws. Such a business shall either be incorporated under the (Indian) Companies Act, 2013 or a foreign company or an office, branch or an agency outside India and necessarily be owned or controlled by an Indian resident,the bank account is opened in the name of the company/ LLP which in return shall make the process of GST registra on E-commerce website, as a Company it is the most suitable op on as it is the only type of en ty that have the access to angel funding or equity funding, which acts as a precondi on to run a successful E-commerce business. 2. GST Registra on GST registra on is mandatory under the Central Goods & Service Tax (CGST) Act. 3. Bank Account bank account is cumpolsary. 4. Payment Gateway A payment gateway is mandatory for a proprietary E-commerce website to process the payments. one payment gateway is sufficient to accept various forms of online payments. once the payment is received by the customer by the website, such payment is sent to that respec ve business’s bank account through the payment gateway. 5. Legal Documents If any business operates through online marketplaces, then the marketplace provides the seller with a legal document or sellers’ agreement and the seller must abide by the sellers’ agreement. It is important for any business to go through the sellers’ agreement(s) in detail before the execu on as it is the legal binding agreement between the seller and the marketplace. Other requirements There are a few addi onal requirements such as cyber law due diligence, compliance under the Compe on Laws of India and the laws related to data protec on and appointment of a Nodal Officer Compliances for E-commerce business in India 1. Foreign Direct Investment Foreign Direct Investment means the investment made by the foreign en es in the companies situated in India. The same can be done either by opening a subsidiary or associate in a foreign country, acquiring a controlling interest in an exis ng foreign company, or by means of a merger or joint venture with a foreign company. In India, the Ministry of Commerce and Industry, The Department of Industrial Policy and Promo on, Government of India form policy pronouncements on FDI. There are two ways to invest in India through FDI: ‘Approval route’ in which the prior permission of the central government is required before doing any foreign investment in India under a par cular sector. ‘Automated route’ in which no prior permission is required and foreign en es can directly invest in Indian businesses under a par cular sector. The FDI policy allows Foreign Direct Investment to the extent of 100% in the marketplace model of E-commerce by the way of the Automa c Route. 2. IT Act, 2000 The IT Act, 2000 is the primary regulator for E-commerce sellers conduct business in the same manner as the physical sellers with the only dis nc on of non-availability of the physical body in order to sell things. Through E-commerce, the vendors are required to generate bills, file returns, pay taxes, prepare ledgers and maintain records. They must perform all the same on the online pla orm. The IT Act, 2000 is based on United Na ons Commission on Interna onal Trade Law (UNCITRAL) and acts as a developing E-commerce enabling legisla on in India. The salient features of the Act for e commerce are. E-contracts Transac on Security Digital signature 3. Payment and Se lements Systems Act, 2007 As per the Payment and Se lements Systems Act, the E-commerce business shall succeed as a payment system if it follows the Rules specified by RBI for online transac ons and payments. It is compulsory for an intermediary that is receiving payments through digital modes to have an ac ve Nodal Account for se ling the payments of the sellers on its E-commerce pla orm. 4. Consumer Protec on Act, 2019 The E-commerce is monitored by the Consumer Protec on Act the Ministry of Consumer Affairs, Food and Public Distribu on on May 17, 2021, has no fied the Consumer Protec on (E-Commerce) Rules, 2021. DIGITAL SIGNATURES A digital signature is a cryptographic technique used to validate the authen city and integrity of digital documents or messages. It provides a way to verify that a document or message has not been tampered with and that it originated from the claimed sender. Here's how digital signatures work: Genera ng a Key Pair: To create a digital signature, the sender first generates a key pair consis ng of a private key and a corresponding public key. The private key is kept secret and known only to the sender, while the public key is shared with others. Signing the Document: The sender uses their private key to perform a mathema cal opera on on the document or message they want to sign. This opera on creates a unique digital signature that is specific to both the document and the sender's private key. Verifica on: To verify the digital signature, the recipient uses the sender's public key. They apply the same mathema cal opera on to the received document using the public key. If the generated signature matches the received signature, it means the document has not been altered during transmission and was indeed signed by the claimed sender. Authen ca on and Integrity: Digital signatures provide authen ca on and integrity. The recipient can be confident that the document originated from the sender and has not been modified since it was signed. If any changes are made to the document a er it has been signed, the digital signature verifica on will fail. Trust and Cer fica on Authori es: In some cases, digital signatures are issued and verified by trusted third-party organiza ons known as Cer fica on Authori es (CAs). These CAs vouch for the authen city of the key pairs by digitally signing the public keys of individuals or organiza ons. This creates a chain of trust, where the CA's digital signature on the public key ensures its validity. Applica ons of digital signatures Signing and verifying contracts, agreements, and legal documents. Securing electronic transac ons and financial transac ons. Authen ca ng emails and ensuring their integrity. Protec ng so ware and code integrity through code signing. digital signatures are legally recognized in many countries, including India, under the Informa on Technology Act, 2000, and can be used as evidence in courts. E-COMMERCE- TECHNICAL AND LEGAL ISSUES Here are some key technical and legal issues related to e-commerce: Technical Issues: Website Development and Design: Crea ng a user-friendly and secure e-commerce website is crucial. It involves designing an intui ve interface, ensuring seamless naviga on, and providing secure payment gateways. Data Security: E-commerce pla orms handle sensi ve customer informa on, such as personal data and payment details. Protec ng this data from unauthorized access, hacking, and data breaches is essen al. Implemen ng robust security measures like encryp on, secure sockets layer (SSL) cer ficates, and regular vulnerability assessments is crucial. Payment Processing: E-commerce pla orms must integrate secure payment gateways that offer mul ple payment op ons. Ensuring proper encryp on, fraud detec on mechanisms, and compliance with Payment Card Industry Data Security Standard (PCI DSS) are vital. Scalability and Performance: As the number of users and transac ons increases, e-commerce pla orms must scale up to handle the load efficiently. Ensuring high performance, availability, and responsiveness of the website is important to provide a seamless user experience. Mobile Op miza on: With the growing use of mobile devices for online shopping, op mizing e-commerce websites for mobile pla orms is crucial. Responsive design, mobile-friendly interfaces, and smooth mobile checkout processes are essen al for capturing mobile customers. Legal Issues: Consumer Protec on: E-commerce pla orms must comply with consumer protec on laws, including clear product descrip ons, accurate pricing, fair return policies, and transparent terms and condi ons. Adequate customer support and dispute resolu on mechanisms are necessary to address consumer concerns. Intellectual Property Rights (IPR) Protec ng intellectual property is cri cal in e-commerce. Businesses must ensure that their website content, product images, trademarks, and copyrighted materials are not infringed upon by others. e-commerce pla orms should have policies in place to address copyright and trademark infringement claims by third par es. Privacy and Data Protec on: E-commerce pla orms collect and process customer data, requiring compliance with data protec on laws and regula ons. implement data protec on policies, and securely handle customer data to protect privacy rights. Cybersecurity and Fraud Preven on: E-commerce pla orms are vulnerable to cyber threats and fraud a empts. Implemen ng robust cybersecurity measures, educa ng customers about online risks, and establishing fraud detec on and preven on mechanisms are essen al. Jurisdic on and Governing Laws: Determining the applicable jurisdic on and governing laws for e-commerce transac ons can be challenging, especially in cross-border transac ons. Businesses must navigate interna onal laws, taxa on regula ons, and dispute resolu on mechanisms to ensure compliance. Contractual Agreements: E-commerce transac ons involve the forma on of online contracts. Ensuring the enforceability of these contracts, including the use of clear terms and condi ons and obtaining user consent, is vital. E-COMMERCE TRENDS AND PROSPECTS Mobile Commerce (m-commerce):. E-commerce pla orms are op mizing their websites and developing dedicated mobile apps to provide seamless shopping experiences. Omnichannel Retailing: E-commerce is no longer limited to online-only experiences. Omnichannel retailing integrates online and offline channels to provide a seamless shopping experience across various touchpoints. This includes op ons like in-store pickups, click-andcollect, and the integra on of online and offline inventory management. Personaliza on and Ar ficial Intelligence (AI): E-commerce pla orms are leveraging AI and machine learning to offer personalized shopping experiences. AI algorithms analyse customer data to recommend products, personalize marke ng messages, and provide targeted offers. Chatbots and virtual assistants are also being used to enhance customer support. Voice Commerce: Voice assistants like Amazon's Alexa, Google Assistant, and Apple's Siri are increasingly being used for voice-based shopping. Users can search for products, place orders, and make payments using voice commands. Voice commerce is expected to grow as voice recogni on technology improves and becomes more widely adopted. Social Commerce: Social media pla orms are becoming significant channels for e-commerce. Social commerce allows users to discover and purchase products directly through social media pla orms, elimina ng the need to visit external websites. Social media pla orms are integra ng shopping features, including product tagging and in-app checkout op ons. Sustainability and Ethical Shopping: Consumers are increasingly conscious about sustainability and ethical prac ces. They seek out e-commerce pla orms that offer ecofriendly products, fair trade op ons, and promote social responsibility. E-commerce businesses are adop ng sustainable prac ces, implemen ng eco-friendly packaging, and providing transparency in their supply chains. Cross-border E-commerce: The growth of cross-border e-commerce allows businesses to reach customers beyond their domes c markets. Improved logis cs and payment gateways, coupled with rising consumer demand for interna onal products, have fueled the growth of cross-border e-commerce. This trend presents significant opportuni es for businesses to expand globally. Augmented Reality (AR) and Virtual Reality (VR): AR and VR technologies are being u lized to enhance the online shopping experience. Customers can visualize products virtually, try on clothing or accessories, and experience immersive virtual shopping environments. AR and VR technologies have the poten al to bridge the gap between physical and online shopping. Same-day and Last-mile Delivery: E-commerce companies are focusing on improving the speed and efficiency of delivery. Same-day delivery and last-mile delivery solu ons are being implemented to meet customer expecta ons for quick order fulfillment. Delivery op ons like drones and autonomous vehicles are also being explored. E-taxa on, e-banking, online publishing, and online credit card payments are all key aspects of the digital economy and have transformed the way we conduct financial transac ons and engage in various online ac vi es. Here's an overview of each of these areas: E-taxa on: E-taxa on refers to the electronic filing and payment of taxes payments, and refunds electronically. E-taxa on offers convenience, efficiency, and reduces paperwork. E-banking: E-banking, also known as online banking or internet banking, allows customers to perform various banking transac ons and services through electronic channels, such as websites or mobile apps Online Publishing: Online publishing refers to the distribu on and dissemina on of wri en content, such as ar cles, news, books, and magazines, through digital pla orms. enabling authors, journalists, bloggers, and publishers to reach a wider audience. allows for real- me updates, interac ve content, mul media integra on, and personalized reading experiences. It has also given rise to self-publishing pla orms, e-books, and digital subscrip ons. Online Credit Card Payment: Online credit card payment enables consumers to make purchases and payments electronically using credit or debit cards on e-commerce websites, mobile apps, or other online pla orms. Online credit card payment systems u lize encryp on and secure payment gateways to ensure the confiden ality of card informa on and protect against fraud. Online credit card payments have become an integral part of e-commerce, enabling seamless transac ons and facilita ng global business. ELECTRONIC EMPLOYMENT CONTRACTS Electronic employment contracts, also known as e-contracts or digital contracts, are legally binding agreements between employers and employees that are created, signed, and stored electronically... some key points regarding electronic employment contracts: Legality and Validity electronic contracts are legally recognized and considered valid, provided certain criteria are met. These criteria typically include consent, inten on to create legal rela ons, and mee ng the requirements of applicable electronic signature laws or regula ons. Electronic Signatures: Electronic employment contracts require the use of electronic signatures, electronic signatures can be in the form digital cer ficates, or other secure authen ca on methods. Data Protec on and Privacy: When using electronic employment contracts, it is crucial to consider data protec on and privacy laws. Employers must ensure that personal data collected during the contract crea on and signing process is handled in compliance with applicable data protec on regula ons. This includes obtaining appropriate consent, implemen ng security measures to protect data, and clearly communica ng data handling prac ces to employees. Accessibility and Reten on: Electronic employment contracts offer advantages in terms of accessibility and reten on. They can be accessed and signed remotely, elimina ng the need for physical presence. Digital storage enables easy retrieval, tracking, and management of contracts. Consent and Acceptance: Electronic employment contracts require explicit consent and acceptance from both par es. Employees should have the opportunity to review the terms and condi ons of the contract Employers should maintain clear records of the en re process, including the offer, acceptance, and any subsequent changes or amendments made to the contract. Employee Rights and Protec ons: It is essen al to ensure that electronic employment contracts do not undermine the rights and protec ons afforded to employees under labour laws or employment regula ons. Contract terms must comply with statutory requirements, and employees should have a clear understanding of their rights, obliga ons, and any limita ons imposed by the electronic format of the contract. Electronic Contractor Agreements: Electronic contractor agreements are legally binding contracts between a company or individual (the client) and an independent contractor. Sales, Re-Seller, and Distributor Agreements: Sales, re-seller, and distributor agreements are contracts that establish the rela onship between a company (the supplier or manufacturer) and another party (the re-seller or distributor) for the sale and distribu on of products or services. These agreements outline the rights and obliga ons of both par es, including pricing, product specifica ons, territory restric ons, marke ng responsibili es, intellectual property rights, termina on clauses, and dispute resolu on mechanisms. Electronic versions of these agreements can be used to facilitate and streamline the sales and distribu on process. Non-Disclosure Agreements (NDAs): Non-disclosure agreements, also known as confiden ality agreements, are legal contracts that protect sensi ve and confiden al informa on shared between par es. NDAs prevent the unauthorized disclosure or use of confiden al informa on and typically include provisions related to the defini on of confiden al informa on, the obliga ons of the par es to maintain confiden ality, the dura on of the agreement, and any excep ons or limita ons to the obliga ons. NDAs can be created and signed electronically, ensuring the protec on of confiden al informa on in digital communica ons and transac ons. Shrink Wrap Contracts: Shrink wrap contracts are license agreements that are included inside the packaging of so ware or other digital products. These contracts become binding when the user opens the package or breaks the seal, indica ng acceptance of the terms. Shrink wrap contracts o en cover so ware licensing, end-user rights, limita ons of liability, warran es, and dispute resolu on mechanisms. While shrink wrap contracts were more commonly used in the past, click-wrap agreements (where users must click "I Agree" or a similar bu on) and browse-wrap agreements (where terms are posted on a website) have become more prevalent in the digital age. Source Code Escrow Agreements: Source code escrow agreements are contracts that provide a mechanism for protec ng the con nuity and availability of so ware source code in the event of certain circumstances, such as the bankruptcy or discon nua on of a so ware vendor. In source code escrow agreements, the vendor deposits the source code with a trusted third-party escrow agent. If specified trigger events occur, such as the vendor's inability to provide ongoing support or maintenance, the source code is released to the licensee. This ensures that the licensee can con nue to use and maintain the so ware independently. Source code escrow agreements can be executed electronically, and the escrowed materials can be securely stored in a digital format. Cyber Law and IPRs- Copyright in Informa on Technology The debate between copyrights and patents in the context of so ware revolves around the protec on of so ware-related inven ons and determining the appropriate form of intellectual property (IP) rights for so ware Copyrights for So ware: Copyright law grants automa c protec on to original works of authorship, including so ware code. In many countries, so ware code is considered a literary work, and its author is automa cally granted copyright protec on upon crea on. Copyright protects the expression of ideas in so ware, covering the code's specific structure, organiza on, and sequence of instruc ons. The copyright holder has exclusive rights to reproduce, distribute, modify, and publicly display the so ware. Authorship and Assignment: Under copyright law, the individual or individuals who created the so ware code are considered its authors., in the case of so ware developed by employees as part of their job du es, the employer may be considered the author and copyright owner by default. Authorship and ownership can be specified through agreements or contracts, where authors may assign their rights to another party, such as an employer or a client. Patents for So ware: Patent protec on for so ware involves obtaining a patent from a patent office, which grants the inventor the exclusive right to use, sell, and prevent others from using the patented inven on. In obtaining a patent generally requires demonstra ng that the so ware inven on is novel, non-obvious, and has a specific technical effect or solves a technical problem. Authorship and Assignment: Patents are typically granted to individuals or en es that are recognized as inventors. The inventor is considered the author of the patented so ware inven on. In some cases, companies may require employees or contractors to assign their rights to the so ware inven on through contractual agreements. However, the ownership and assignment of patent rights can vary depending on the specific agreements and employment rela onships involved. The Copyrights vs. Patents Debate: The debate between copyrights and patents in the so ware industry is complex and mul faceted. Some arguments in favour of copyright protec on for so ware include: Copyright provides automa c protec on without the need for a formal applica on process. Copyright protects the expression of ideas, which is more applicable to so ware code. Copyright is generally more accessible and affordable for individual so ware developers and small businesses.On the other hand, proponents of patent protec on for so ware argue: Patents provide a higher level of exclusivity and legal certainty, as they require a rigorous examina on process. Ul mately, the choice between copyrights and patents depends on various factors, including the nature of the so ware inven on, the goals of the inventor or company, the jurisdic on's legal framework, and the resources available for obtaining and enforcing IP rights. It is advisable to consult with legal professionals specializing in IP law to determine the most suitable form of protec on for so ware inven ons and address authorship and assignment issues effec vely. Copyright in Internet-Mul media & Copyright issues-So ware Piracy Copyright in the Internet Age: Copyright law applies to the digital environment, including the internet. The internet has presented new challenges and opportuni es for copyright protec on. Here are some key considera ons regarding copyright in the internet age: Digital Content: The internet allows for the widespread dissemina on and reproduc on of digital content, such as text, images, videos, music, and so ware. Copyright law grants exclusive rights to the creators of such content, including the right to reproduce, distribute, display, and perform their works. Online pla orms and content creators need to be mindful of copyright laws and obtain proper licenses or permissions to use copyrighted material. Online Publishing and Sharing: With the rise of social media, blogs, and user-generated content pla orms, individuals can easily publish and share their crea ve works online. Copyright protec on automa cally applies to original content, giving creators the exclusive right to control its use and distribu on. Digital Rights Management (DRM): DRM technologies are used to protect copyrighted digital content from unauthorized copying or distribu on. DRM systems employ encryp on and access controls to prevent infringement and enforce licensing terms. While DRM can help protect copyright holders' rights, it has also been a subject of debate due to issues such as user restric ons, interoperability, and poten al limita ons on fair use. Mul media and Copyright Issues: Mul media refers to the combina on of different media elements, such as text, images, audio, and video, into a single interac ve presenta on. Copyright issues in mul media can arise when using copyrighted material without proper authoriza on or licensing. Some considera ons include: Fair Use: is a legalprinciple that allows limited use of copyrighted material without permission, for purposes such as cri cism, commentary, news repor ng, teaching, or research. Licensing and Permissions: When crea ng mul media content, it is essen al to obtain proper licenses or permissions for any copyrighted material used. This includes obtaining licenses for music, images, video clips, and other copyrighted elements. So ware Piracy: So ware piracy refers to the unauthorized copying, distribu on, or use of so ware without proper licensing or permission from the copyright holder. so ware piracy include: Copyright Infringement: Unauthorized copying, distribu on, or use of so ware violates the copyright holder's exclusive rights. This includes downloading or sharing so ware from unauthorized sources, using cracked or counterfeit so ware, or bypassing licensing restric ons. Consequences: So ware piracy has significant financial implica ons for so ware developers and publishers, as it leads to lost revenue. Copyright infringement can result in legal ac on, including fines and penal es. An -Piracy Measures: So ware companies employ various an -piracy measures, such as product ac va on, license keys, digital rights management (DRM), and online verifica on systems, to protect their so ware from piracy. Addi onally, so ware companies may pursue legal ac on against individuals or organiza ons involved in so ware piracy. Educa on and Awareness: Promo ng educa on and awareness about the importance of respec ng so ware copyrights is crucial in comba ng so ware piracy. This includes educa ng users about the legal and ethical implica ons of so ware piracy, encouraging the use of legi mate so ware, and providing affordable licensing op ons for different user groups. Patents - European Posi on on Computer related Patents Understanding Patents: A patent is an exclusive intellectual property right granted to an inventor or assignee by a government authority. It provides the inventor with the right to exclude others from making, using, selling, or impor ng their inven on for a limited period of me, typically 20 years from the filing date. To be eligible for a patent, an inven on must meet certain criteria: Novelty: The inven on must be new and not publicly disclosed before the filing date of the patent applica on. Inven ve Step: The inven on must involve an inven ve or non-obvious step, meaning it should not be obvious to someone skilled in the relevant field. Industrial Applicability: The inven on must have a prac cal applica on and be capable of being made or used in some industry. Patentable Subject Ma er: The inven on should fall within the subject ma er that is eligible for patent protec on under the applicable laws. European Posi on on Computer-Related Patents: The European Patent Conven on (EPC) governs patent law in Europe and establishes the framework for patentability across member states. Regarding computer-related inven ons, including so ware-related inven ons, the European Patent Office (EPO) applies specific guidelines. Technical Character: The EPO requires computer-implemented inven ons to have a technical character to be eligible for patent protec on. Technical Problem-Solving: The inven on should solve a technical problem or provide a technical solu on to a technical problem. Exclusions: The EPO excludes certain subject ma ers from patentability, such as mathema cal methods, computer programs "as such," and business methods that do not have a technical character or effect. Technical Contribu on: For so ware-related inven ons, the EPO focuses on the technical aspects and contribu ons of the inven on. Legal posi on of U.S. on Computer related Patents The legal posi on of the United States on computer-related patents is guided by the provisions of the United States Patent and Trademark Office (USPTO) and court decisions. Here are key aspects of the U.S. legal posi on on computer-related patents: Statutory Basis: Computer-related patents in the U.S. are primarily governed by Sec on 101 of the U.S. Patent Act, which states that "any new and useful process, machine, manufacture, or composi on of ma er" may be eligible for patent protec on. Patent Eligibility: The U.S. follows a two-step framework to determine patent eligibility for computer-related inven ons. The first step involves assessing whether the claimed inven on falls within one of the statutory categories (process, machine, manufacture, or composi on of ma er). The second step examines whether the inven on is directed to a patent-eligible subject ma er or if it is an abstract idea, natural phenomenon, or law of nature. Alice/Mayo Test: The U.S. Supreme Court established the Alice/Mayo test, derived from two landmark cases (Alice Corp. v. CLS Bank and Mayo Collabora ve Services v. Prometheus Laboratories), to evaluate the patent eligibility of computer-related inven ons. The test involves determining whether the claims are directed to an abstract idea and, if so, whether the claims include an inven ve concept that transforms the abstract idea into a patent-eligible applica on. Technical Aspects and Inven ve Concepts: To meet the patent eligibility requirements, computer-related inven ons in the U.S. typically need to demonstrate that they involve specific technical improvements or solu ons to a technical problem. Merely implemen ng generic or conven onal computer func onali es without a technical contribu on may be considered abstract and ineligible for patent protec on. Patentability Requirements: Computer-related inven ons in the U.S. are subject to the standard patentability requirements, such as novelty, non-obviousness, and enablement. Indian Posi on on Computer related Patents –Trademarks Indian Posi on on Computer-Related Patents: In India, the patentability of computer-related inven ons, including so ware-related inven ons, is as per the Indian Patents Act, 1970, and the guidelines issued by the Indian Patent Office. key aspects of the Indian posi on on computer-related patents: Patent Eligibility: According to Sec on 3(k) of the Indian Patents Act, "a mathema cal or business method or a computer program per se or algorithms" are not considered patentable inven ons. This provision implies that computer programs and algorithms, as such, are not eligible for patent protec on in India. Technical Effect or Novel Hardware: To be considered patentable, computer-related inven ons in India need to demonstrate a technical effect or involve novel hardware in addi on to the so ware. Purely abstract or so ware-based inven ons are generally not considered patentable. Technical Contribu on: The Indian Patent Office focuses on the technical contribu on or innova on provided by the computer-related inven on. The inven on must go beyond the mere implementa on of a computer program and should involve a solu on to a technical problem or a technical improvement. Technical Effect on Physical En es: To enhance the chances of patentability, computerrelated inven ons in India should demonstrate a technical effect on physical en es or a technical effect beyond the computer program itself. may include improvements in hardware, network infrastructure, data processing, or other technical aspects. Patentability Requirements: Computer-related inven ons in India must sa sfy the standard patentability requirements, including novelty, non-obviousness, and industrial applicability. Indian Posi on on Trademarks: Trademark protec on in India is governed by the Trademarks Act, 1999, and administered by the Controller General of Patents, Designs, and Trademarks. key aspects of the Indian posi on on trademarks: Registrable Trademarks: In India, trademarks that are dis nc ve and capable of dis nguishing the goods or services of one en ty from those of others are registrable. Descrip ve marks, generic terms, or marks lacking dis nc veness may face challenges during the registra on process. Absolute Grounds for Refusal: The Indian Trademarks Act specifies certain absolute grounds for refusing trademark registra on. These include marks that lack dis nc veness, consist exclusively of marks or indica ons that have become customary in the current language or established prac ces, or are likely to deceive or cause confusion. Rela ve Grounds for Refusal: Trademark applica ons may also face refusal based on rela ve grounds, such as prior conflic ng trademarks, well-known marks, or marks with a reputa on in India. Trademark Registra on Process: The trademark registra on process in India involves filing an applica on with the Trademarks Registry, examina on by the Registry, publica on for opposi on, and if no opposi on is raised, issuance of the trademark registra on cer ficate. Enforcement and Protec on: Trademark owners in India can enforce their rights through civil and criminal remedies. Infringement ac ons, passing off ac ons, and criminal complaints can be filed against unauthorized use or imita on of registered trademarks. Trademarks in Internet - Domain name registra on,Disputes & WIPO Trademarks in the Internet Trademarks play a crucial role in the online environment, par cularly in rela on to domain names. Here are key considera ons regarding trademarks in the internet age: Domain Names: Domain names are the addresses used to locate websites on the internet (e.g., www.example.com). Trademarks can be incorporated into domain names to help consumers iden fy and associate specific websites with par cular brands. Trademark Protec on: Trademark owners can register their trademarks with the appropriate trademark offices to obtain exclusive rights to use their marks in connec on with specific goods or services. These registered trademarks provide stronger protec on and can be enforced against unauthorized use, including in domain names. Domain Name Registra on: Domain names are registered through domain name registrars accredited by organiza ons such as the Internet Corpora on for Assigned Names and Numbers (ICANN). Registering a domain name does not automa cally confer trademark rights, but it may create a poten al conflict if the domain name is iden cal or similar to an exis ng trademark. Domain Name Disputes: Domain name disputes can arise when someone registers or uses a domain name that infringes on another party's trademark rights. Common disputes include cybersqua ng (registering a domain name in bad faith to profit from someone else's trademark) and typo squa ng (registering domain names with slight misspellings of popular brands). Uniform Domain Name Dispute Resolu on Policy (UDRP): The UDRP is a policy established by ICANN to resolve domain name disputes. It provides a streamlined process for trademark owners to challenge domain name registra ons that infringe their rights. The UDRP allows for the transfer or cancella on of domain names found to be registered and used in bad faith. World Intellectual Property Organiza on (WIPO): WIPO is an interna onal organiza on that administers the UDRP and provides services for resolving domain name disputes. Trademark owners can file complaints with WIPO's Arbitra on and Media on Centre to ini ate proceedings under the UDRP. UDRP Criteria: To succeed in a UDRP complaint, the trademark owner must demonstrate three elements: (a) the domain name is iden cal or confusingly similar to their trademark; (b) the registrant has no legi mate rights or interests in the domain name; and (c) the domain name was registered and is being used in bad faith. Remedies: Successful UDRP complainants can obtain the transfer or cancella on of the infringing domain name. However, UDRP proceedings do not address issues of monetary damages, which would require separate legal ac on in a court of law. Databases in IT-Protec on of databases -Posi on in USA,EU and India Databases in Informa on Technology: Databases play a crucial role in informa on technology by organizing, storing, and managing large volumes of data. They are u lized in various sectors, including business, research, and government. Protec on of databases involves safeguarding the valuable informa on they contain and ensuring their integrity and security. Posi on in the United States (U.S.): In the United States, databases are primarily protected through a combina on of contractual agreements, trade secrets, and copyright law. Here are key aspects of the U.S. posi on on the protec on of databases: Copyright Protec on: In the U.S., databases may qualify for copyright protec on as compila ons. Copyright protec on extends to the original selec on, arrangement, and coordina on of the data within the database. However, individual data or facts within the database are not copyrightable. Copyright Database Protec on Act (CDPA): The CDPA provides addi onal protec on to certain databases that exhibit a sufficient level of crea vity in their selec on, arrangement, and organiza on. To qualify for this protec on, the database must be a significant investment of resources and not merely a compila on of exis ng data. Contractual Agreements: Database owners can protect their databases through contractual agreements, such as non-disclosure agreements (NDAs) and end-user license agreements (EULAs). These agreements can impose restric ons on access, use, and disclosure of the database. Posi on in the European Union (EU): In the European Union, the protec on of databases is primarily governed by the Database Direc ve (Direc ve 96/9/EC) and the Database Regula on (Regula on 2019/882). Here are key aspects of the EU posi on on the protec on of databases: Sui Generis Database Right: The EU provides a unique form of protec on called the "sui generis" database right. It grants the database creator or the one who made a substan al investment in the obtaining, verifica on, or presenta on of the contents of a database the exclusive right to prevent extrac on or reu liza on of the whole or a substan al part of the database. Originality Requirement: To qualify for the sui generis database right, the database must represent a substan al investment and exhibit qualita vely or quan ta vely significant efforts. Originality, in the sense of crea vity, is not required for this right. Posi on in India: In India, the protec on of databases is primarily governed by the Copyright Act, 1957. Here are key aspects of the Indian posi on on the protec on of databases: Copyright Protec on: In India, databases may be protected by copyright as compila ons. The selec on, coordina on, and arrangement of the data within the database may qualify for copyright protec on, but individual data or facts within the database are not protected. Contractual Agreements: Similar to the U.S. and EU, contractual agreements, such as NDAs and EULAs, can be used to protect databases in India. These agreements can impose restric ons on access, use, and disclosure of the database. CYBER CRIMES Cybercrime refers to criminal ac vi es that are carried out using computers, networks, or the internet. These crimes involve the use of technology as a tool or target for illegal ac vi es. Here are some different kinds of cybercrimes: Hacking: Unauthorized access to computer systems or networks to gain informa on, manipulate data, or disrupt services. Phishing: Sending decep ve emails or messages that appear legi mate to trick individuals into revealing sensi ve informa on, such as passwords or credit card details. Malware A acks: Distribu ng malicious so ware, such as viruses, worms, or ransomware, to compromise computer systems or steal data. Iden ty The : Stealing personal informa on, such as social security numbers or bank account details, to commit fraud or impersonate someone else. Denial-of-Service (DoS) A acks: Overloading a target's computer system or network to make it unavailable to legi mate users. Distributed Denial-of-Service (DDoS) A acks: Coordina ng mul ple systems to launch a DoS a ack on a target, making it even more challenging to restore normal opera ons. Cyber Espionage: Illegally accessing and stealing sensi ve informa on, trade secrets, or intellectual property for economic, poli cal, or military gain. Online Fraud: Engaging in various fraudulent ac vi es, such as online scams, fake auc ons, or investment fraud, to deceive vic ms and obtain financial benefits. Cyberbullying: Harassing, in mida ng, or threatening individuals through digital pla orms, o en involving social media or online messaging. Online Child Exploita on: Producing, distribu ng, or accessing child pornography, grooming minors for sexual exploita on, or engaging in other forms of online child abuse. Data Breaches: Unauthorized access to and the of sensi ve data from organiza ons, exposing personal informa on or trade secrets. Cyberstalking: Persistent harassment, monitoring, or stalking of individuals online, o en involving malicious intent or a threat to physical safety. Cyber Extor on: Threatening individuals, organiza ons, or businesses with harm, data breaches, or public exposure unless a ransom or payment is made. Intellectual Property (IP) The : Unauthorized copying, distribu on, or use of copyrighted material, so ware piracy, or counterfei ng branded products. Online Scams: Various fraudulent schemes conducted online, including romance scams, lo ery scams, or phishing scams. These are just a few examples of the different types of cybercrimes that exist. As technology advances, cybercriminals con nuously find new ways to exploit vulnerabili es, so it's important for individuals, organiza ons, and law enforcement agencies to stay informed and take preven ve measures to mi gate cyber risks. Cyber-crimes under IPC, Cr.P.C and Indian Evidence Law Under the Indian legal system, cybercrimes are addressed through various statutes, including the Indian Penal Code (IPC), the Code of Criminal Procedure (Cr.P.C), and the Indian Evidence Act. Here's an overview of how these laws relate to cybercrimes: Indian Penal Code (IPC): The IPC is the primary criminal law statute in India and provides provisions for dealing with various offenses, including cybercrimes. Some relevant sec ons of the IPC related to cybercrimes are: Sec on 43: Deals with unauthorized access, damage, or disrup on of computer systems, networks, or data. Sec on 65: Addresses tampering with computer source documents. Sec on 66: Covers computer-related offenses such as hacking, data the , and computer fraud. Sec on 66B-66E: Addresses offenses related to iden ty the and online impersona on. Sec on 67A-67C: Pertains to the publica on, transmission, or distribu on of obscene or sexually explicit material online. Sec on 72: Covers breach of confiden ality and misuse of personal informa on. Sec on 420: Covers offenses related to online fraud and chea ng. Code of Criminal Procedure (Cr.P.C): The Cr.P.C is the procedural law that governs the inves ga on, arrest, and trial of criminal offenses in India. It applies to cybercrimes as well. Some key provisions include: Sec on 154: Deals with the registra on of a First Informa on Report (FIR) upon receiving a complaint about a cybercrime. Sec on 41: Allows the police to arrest individuals suspected of commi ng cybercrimes, subject to certain condi ons. Sec on 91: Empowers the police to issue summons and produce relevant documents or electronic evidence during the inves ga on. Indian Evidence Act: The Indian Evidence Act governs the admissibility and presenta on of evidence in Indian courts, including electronic evidence in cybercrime cases. Key provisions include: Sec on 65B: Specifies the condi ons and procedures for the admissibility of electronic evidence, including computer-generated documents and digital records. Sec on 45A: Allows the court to presume the integrity and authen city of electronic records if certain condi ons are met. Sec on 59: Permits the court to compare a disputed electronic record with a genuine one for the purpose of determining its authen city. Sec on 114: Allows the court to draw inferences based on the facts and circumstances of the case, including the behavior and conduct of the accused in cybercrime cases. It's important to note that the interpreta on and applica on of these laws may vary based on specific cases and judicial precedents. Addi onally, there are other specialized statutes and rules, such as the Informa on Technology Act, 2000 and the Rules framed thereunder, that specifically address cybercrimes and provide addi onal legal provisions and procedures for their inves ga on and prosecu on in India. Cyber crimes under the Informa on Technology Act, 2000 The Informa on Technology Act, 2000 (IT Act) is a dedicated legisla on in India that addresses various aspects of cybercrimes and provides legal provisions for their preven on, inves ga on, and prosecu on. It covers a wide range of offenses related to computer systems, electronic records, and digital transac ons. Here are some key cybercrimes under the IT Act: Unauthorized Access and Hacking (Sec on 66): This provision deals with unauthorized access to computer systems, networks, or resources, as well as hacking ac vi es that compromise the confiden ality, integrity, or availability of data or computer systems. Data The and Misuse (Sec on 43A): This sec on pertains to the unauthorized access, downloading, copying, or stealing of electronic data, including personal or sensi ve informa on, and the consequent misuse or disclosure of such data. Iden ty The (Sec on 66C): It addresses the offense of iden ty the , which involves fraudulently or dishonestly using someone else's electronic iden ty for unlawful ac vi es or gaining unauthorized benefits. Online Fraud (Sec on 66D): This sec on covers various forms of online fraud, including chea ng, impersona on, and deceiving individuals through electronic communica on or online pla orms. Publishing or Transmi ng Obscene Material (Sec on 67): This provision deals with the publica on, transmission, or dissemina on of obscene or sexually explicit material through electronic means, including websites, social media, or messaging pla orms. Cyber Stalking (Sec on 66A): It addresses the offense of cyber stalking, which involves using electronic communica on to repeatedly and harassingly follow or contact a person, causing distress or fear. Cyber Terrorism (Sec on 66F): This sec on covers offenses related to cyber terrorism, including unauthorized access, disrup on, or destruc on of cri cal informa on infrastructure, with the inten on to threaten the unity, integrity, security, or sovereignty of India. Breach of Confiden ality and Privacy (Sec on 72): This provision addresses the unauthorized disclosure, misuse, or breach of confiden ality of personal or sensi ve informa on obtained while providing services under a lawful contract. Tampering with Computer Source Code (Sec on 65): It deals with the offense of tampering, altering, or destroying computer source code, which is the backbone of so ware programs. Punishment for Publishing False Digital Signatures (Sec on 72B): This sec on covers the publica on or fraudulent use of false digital signatures, which are used for electronic authen ca on or verifica on purposes. The IT Act also includes provisions for the establishment of the Cyber Appellate Tribunal and the appointment of Adjudica ng Officers to handle specific cases related to cybercrimes. It is important to consult the full text of the Informa on Technology Act, 2000, along with its subsequent amendments, for a comprehensive understanding of the legal provisions related to cybercrimes in India. Cyber-crimes under Interna onal Law Cybercrime is a global issue that o en requires interna onal coopera on for effec ve inves ga on and prosecu on. While there is no single comprehensive interna onal law specifically dedicated to cybercrimes, several interna onal agreements and ini a ves address cybercrime and provide a framework for interna onal coopera on. Here are some key aspects of cybercrime under interna onal law: Budapest Conven on on Cybercrime: The Budapest Conven on, also known as the Council of Europe Conven on on Cybercrime, is an interna onal treaty that aims to harmonize na onal laws, improve coopera on, and establish common legal and procedural frameworks for addressing cybercrime. It covers various cyber offenses, including illegal access, data interference, computer-related fraud, and child pornography. United Na ons Conven on against Transna onal Organized Crime: This conven on, also known as the Palermo Conven on, includes provisions related to the preven on, inves ga on, and prosecu on of organized crime, which can encompass cybercrimes carried out by criminal organiza ons. Interpol: The Interna onal Criminal Police Organiza on (Interpol) plays a crucial role in facilita ng interna onal coopera on in comba ng cybercrimes. Interpol's Cybercrime Programme provides a pla orm for sharing informa on, coordina ng inves ga ons, and suppor ng member countries in addressing cyber threats. Mutual Legal Assistance Trea es (MLATs): MLATs are agreements between countries that enable them to request and provide assistance in gathering evidence, loca ng suspects, and conduc ng inves ga ons in cross-border cases. MLATs are o en used to facilitate interna onal coopera on in cybercrime inves ga ons. Interna onal Telecommunica on Union (ITU): The ITU is a specialized agency of the United Na ons that promotes interna onal coopera on in telecommunica ons and informa on and communica on technologies. The ITU works on developing cybersecurity frameworks, promo ng best prac ces, and facilita ng coopera on among member countries. Regional Ini a ves: Various regional organiza ons and ini a ves, such as the European Union's cybercrime ini a ves, the African Union Conven on on Cyber Security and Personal Data Protec on, and the Asia-Pacific Economic Coopera on (APEC) Cybersecurity Framework, address cybercrime at the regional level and promote coopera on among member states. It's important to note that the enforcement of interna onal cybercrime laws and coopera on mechanisms may vary among countries. Each country may have its own domes c laws and procedures for dealing with cybercrimes and may priori ze different aspects of cybercrime preven on, inves ga on, and prosecu on. Collabora on and informa on sharing among countries are crucial to effec vely combat cybercrimes that transcend na onal borders Hacking, Child Pornography, Cyber Stalking, Denial of service A ack, Virus Dissemina on, So ware Piracy Under Indian law, various statutes address cybercrimes, including those men oned. Here's a brief overview of how these cybercrimes are addressed under Indian law: Hacking: Unauthorized access to computer systems or networks with the inten on of gaining informa on, causing damage, or disrup ng services is covered under Sec on 66 of the Informa on Technology Act, 2000 (IT Act). It provides for penal es for hacking ac vi es, including imprisonment and fines. Child Pornography: The produc on, distribu on, or possession of child pornography is prohibited under the Protec on of Children from Sexual Offences (POCSO) Act, 2012. Addi onally, the IT Act under Sec on 67B criminalizes the publishing or transmi ng of child pornography in electronic form and imposes severe penal es. Cyber Stalking: Cyber stalking, which involves persistently harassing or threatening individuals through digital means, is addressed under Sec on 354D of the Indian Penal Code (IPC) and Sec on 66E of the IT Act. These provisions provide for penal es and imprisonment for cyber stalking offenses. Denial-of-Service (DoS) A ack: The IT Act under Sec on 43 provides for penal es for unauthorized access, damage, or disrup on of computer systems, including DoS a acks. If the a ack causes damage to computer resources, it can a ract addi onal charges under Sec on 66 of the IT Act. Virus Dissemina on: The crea on and dissemina on of computer viruses, malware, or other malicious so ware are covered under the IT Act. Sec on 43 provides penal es for unauthorized access, while Sec on 66 deals with computer-related offenses, including spreading viruses. So ware Piracy: The Copyright Act, 1957, addresses so ware piracy in India. Unauthorized reproduc on, distribu on, or use of copyrighted so ware without the permission of the copyright owner is an offense under this Act. It provides for civil remedies, including injunc ons, damages, and even criminal prosecu on in some cases. It's important to consult the full text of these laws and any subsequent amendments to understand the specific provisions, penal es, and legal procedures involved in addressing cybercrimes under Indian law. Internet Relay Chat (IRC) Crime, Internet Relay Chat (IRC) is a real- me text-based communica on protocol that allows users to chat with each other in channels or private messages. While IRC itself is not inherently criminal, it can be misused for illegal ac vi es. Here are some examples of IRC-related crimes: Distribu on of Illegal Content: IRC can be used as a pla orm for sharing and distribu ng illegal content, such as child pornography, copyrighted material, or pirated so ware. Engaging in such ac vi es on IRC can lead to criminal charges under relevant laws governing these offenses. Harassment and Threats: IRC channels and private messages can be used for cyber harassment, online bullying, or making threats against individuals or groups. Such ac ons are considered criminal offenses and can lead to charges under applicable laws related to harassment, stalking, or threats. Botnets and Malware Distribu on: IRC has been exploited by cybercriminals to control and coordinate botnets, which are networks of compromised computers used for malicious purposes. Criminals may use IRC to distribute malware, launch DDoS a acks, or carry out other illegal ac vi es. Cyber Fraud and Scams: IRC can be used as a pla orm for carrying out online fraud and scams, such as phishing a acks, social engineering, or fraudulent schemes. Criminals may impersonate others, manipulate users, or deceive them into providing sensi ve informa on or making financial transac ons. Illegal Trading and Hacking Discussions: IRC channels dedicated to illegal ac vi es, such as hacking, trading stolen data, or sharing hacking tools, can facilitate criminal ac ons. Engaging in such ac vi es on IRC can lead to criminal charges related to hacking, unauthorized access, or the . Credit Card Fraud Credit card fraud refers to the unauthorized use of someone else's credit card or credit card informa on to make fraudulent transac ons or obtain financial gain. It is a form of iden ty the and a significant concern in the realm of financial crimes. Here are some common types of credit card fraud: Stolen Card: This occurs when a credit card is physically stolen from its owner. The thief can then use the card to make unauthorized purchases before the the is reported. Card Skimming: In this method, fraudsters use a device to capture credit card informa on during legi mate transac ons. This can happen at ATMs, gas sta ons, or other places where cards are swiped or inserted. Phishing: Phishing involves tricking individuals into providing their credit card informa on by impersona ng a legi mate organiza on or individual through fraudulent emails, websites, or phone calls. Online Fraud: Criminals use stolen credit card informa on to make unauthorized purchases online. This can involve using the card directly or using the informa on to create cloned cards. Iden ty The : When someone's personal informa on, including credit card details, is stolen, it can be used to open new credit card accounts or make unauthorized transac ons. Card Not Present Fraud: This type of fraud occurs when credit card informa on is used for transac ons where the physical card is not required, such as online or over-the-phone purchases. Fraudsters use stolen card details to make these unauthorized transac ons. Account Takeover: In an account takeover, fraudsters gain access to a person's credit card account through various means, such as hacking, and make unauthorized transac ons or changes to the account. Net Extor on, Phishing Net Extor on: Net extor on, also known as online extor on, is an act of coercing or threatening individuals,organiza ons,businesses to obtain money,property, or other valuables through the use of the internet or digital pla orms. It involves the following elements: Threats: The perpetrator sends threatening messages or engages in in mida on tac cs, such as threatening to release sensi ve or confiden al informa on, damaging the vic m's reputa on, or launching cybera acks against their systems. Demand for Payment: The perpetrator demands a ransom or payment from the vic m in exchange for preven ng or stopping the threatened harm. This payment is o en requested in cryptocurrencies to maintain anonymity. Means of Communica on: The communica on between the perpetrator and the vic m usually takes place through email, instant messaging, or other online channels to maintain anonymity. Phishing: Phishing is a form of cybercrime that involves tricking individuals into revealing their sensi ve informa on, such as usernames, passwords, credit card details, or personal iden fica on, by posing as a trustworthy en ty. Phishing a acks typically occur through the following methods: Decep ve Emails: The perpetrator sends emails that appear to be from a legi mate organiza on, such as a bank or an online service provider, asking the recipient to provide their personal informa on or click on malicious links. Fake Websites: The perpetrator creates fraudulent websites that closely resemble legi mate websites, aiming to trick users into entering their confiden al informa on. Phone Calls and SMS: Phishing a acks can also occur through phone calls or text messages, where the perpetrator impersonates a trusted en ty and tries to extract sensi ve informa on. The stolen informa on is then used for various illicit purposes, such as iden ty the , financial fraud, or unauthorized access to accounts Cyber Terrorism Cyberterrorism refers to the use of cyber-based tools and techniques by individuals, groups, or organiza ons to carry out acts of terrorism or promote terroris c ac vi es. It involves leveraging computer networks, digital systems, and the internet to launch a acks with the inten on of causing fear, disrup on, destruc on, or harm to individuals, governments, or cri cal infrastructures. Here are some key aspects of cyber terrorism: Targets: Cyber terrorists may target a wide range of en es, including government agencies, military organiza ons, financial ins tu ons, transporta on systems, u li es, healthcare facili es, and other cri cal infrastructure sectors. The objec ve is to create panic, disrupt essen al services, or cause significant economic and social damage. Methods: Cyber terrorists employ various techniques to carry out their a acks, including: Network A acks: They may launch distributed denial-of-service (DDoS) a acks, which flood target networks or websites with excessive traffic, rendering them inaccessible. Data Breaches: Cyber terrorists may aim to steal sensi ve informa on, such as classified data, intellectual property, or personally iden fiable informa on, to compromise na onal security or harm individuals. Malware and Hacking: They u lize malware, viruses, worms, or hacking techniques to gain unauthorized access to systems, manipulate data, or disrupt opera ons. Social Engineering: Cyber terrorists may employ social engineering tac cs, such as phishing emails, to trick individuals into revealing sensi ve informa on or clicking on malicious links. Consequences: Cyber terrorist a acks can have significant consequences, including financial losses, damage to cri cal infrastructure, compromise of na onal security, disrup on of essen al services, and loss of lives. Interna onal Coopera on: Given the global nature of cyber terrorism, interna onal coopera on and collabora on among na ons, law enforcement agencies, and cybersecurity organiza ons are crucial for preven ng, inves ga ng, and responding to cyber terrorist ac vi es. Organiza ons such as the United Na ons (UN) and Interpol play a vital role in facilita ng interna onal coopera on in comba ng cyber terrorism. Viola on of Privacy on Internet - Data Protec on and Privacy. Viola on of privacy on the internet refers to unauthorized access, use, or disclosure of personal informa on or online ac vi es without the individual's consent. It encompasses various ac ons that infringe upon an individual's right to privacy in the digital realm. Here are some aspects related to data protec on and privacy on the internet: Personal Data Collec on: Many online pla orms and services collect personal data from users, such as names, email addresses, phone numbers, browsing history, loca on informa on, and social media ac vi es. Viola on of privacy occurs when this data is collected without proper consent Data Breaches: Data breaches refer to incidents where unauthorized individuals gain access to personal data stored by organiza ons or service providers. These breaches can result in sensi ve informa on being exposed, poten ally leading to iden ty the , financial fraud, or other harmful consequences. Tracking and Profiling: Online tracking techniques, such as cookies, web beacons, and device fingerprin ng, are used to monitor individuals' online ac vi es. This informa on is o en used for profiling and targeted adver sing. Privacy viola ons occur when individuals are not adequately informed about the extent of tracking or when tracking is conducted without consent. Government Surveillance: State surveillance programs, both domes c and interna onal, can infringe upon individuals' privacy rights. Mass surveillance ac vi es, warrantless data collec on, or the monitoring of communica on channels without proper legal oversight can be seen as privacy viola ons. Online Harassment and Doxing: Online harassment involves the use of personal informa on obtained without consent to in midate, harass, or threaten individuals. Doxing refers to the public disclosure of private or sensi ve informa on with the intent to harm or harass someone. Both prac ces violate privacy rights and can have severe emo onal and psychological effects. Lack of Data Lack Protec on Laws: Inadequate or non-existent data protec on laws in certain jurisdic ons can contribute to privacy viola ons. Without robust legal frameworks and enforcement mechanisms, individuals may be more vulnerable to data misuse or abuse. To address privacy viola ons on the internet, many countries have implemented data protec on laws and regula ons. These laws aim to safeguard individuals' privacy rights, define how personal data should be collected and processed, and establish penal es for viola ons. Organiza ons are increasingly expected to be transparent about their data collec on prac ces, provide clear privacy policies, and obtain informed consent from users. Individuals can also take steps to protect their privacy online, such as using strong passwords, enabling two-factor authen ca on, being cau ous about sharing personal informa on, u lizing privacy-enhancing browser extensions or virtual private networks (VPNs), and regularly reviewing and adjus ng privacy se ngs on online pla orms. Indian Copyright Law on the Internet Broadly, the legal regime governing copyright protec on on the internet is the Copyright Act 1957, IT Act 2000. While Sec 14 of the copyright act elucidates on the various rights accrued upon a copyright owner, in case of literary works, ar s c works, computer programs or databases, cinematographic film, or even a music recording, Sec 51 of the Act deals with infringement of copyright. Within the scope of databases, original databases are also covered, which include various original digital works and websites. Further, the scope of the defini on of communica on to the public under sec on 2(ff) of the act, could be extended to communica on on the content of a website, even deep linking. Copyright Infringement Online As discussed above, the features of the digital pla orm have a bearing on copyright and its protec on, mainly due to the ease of access and replica on. While reproduc on in the older mes was restricted to physical copies, because of online reproduc on and easy download me, it is possible to make mul ple copies thus allowing for easy distribu on of the protected work without the permission of the copyright holder. This ease of transmission without having to compromise on the quality has made the occurrence a common one. The most common infringements have been pertaining to websites. Designing and developing the quality of a website can be a tedious and me-consuming task but replica ng it takes half the me, which puts them at risk of copyright infringement. Common mischievous prac ces on the internet are linking, in-lining, and framing. Linking is, simply put a connec on between two files on the internet, either different or from the same file but of different parts. Linking in its essence is not a wrongful prac ce; in fact, it is the sine qua non of the internet which essen ally makes it a worldwide “web”. However, deep linking, where a subordinate link is a ached to bypass the need to access the main page of the linked website impacts the revenue of the page. It is in a sense stealing the traffic of the linked website to defeat the intended way of naviga on of the website. Since it is just a URL, it is not copyrightable and neither does it amount to an infringement. But the content present in the link, the crea ve content is essen ally being copied by this prac ce. And what makes it even more problema c is when permission to deep link has not been taken. With in-line linking, graphic files are copied to form the composite page with different graphic files linking different websites. Both these prac ces, when put to the test of Sec on 14 and 51 could amount to infringement and are covered under the protec on. Who is held liable for Copyright Infringement? While authors can sue for infringement online within the provisions of the Copyright Act, the tricky part with enforcement on the internet is the problem of ascertaining liability. In an internet transac on, where data or copyrighted content is transferred without prior permission, there are three par es involved. Firstly, there is the originator, the individual who generates, stores, or transmits content online. End users are the person who receives such electronic message or content and is the person intended by the originator to receive the record. Finally, there are intermediaries, whose stores receive or transmit informa on on behalf of someone else or at the behest of another individual, and depending on their func on intermediaries can be classified into Auc on intermediaries, Payment intermediaries, and Internet Service Providers (ISP). ISP is an organiza on that offers individuals access to the internet and its services. To understand who incurs liability, it is essen al to know what ac on cons tutes such infringement. Under the Copyright Act, the exclusive rights of the owner include a reproduc on of the work, issuance of copies, and communica on to the public. Therefore, any viola on of these rights amounts to infringement, alongside the distribu on of copyrighted work causing prejudice to the copyright owner. Let us understand the liability of every party of the transac on individually. Liability of the Originator: This is dependent on the knowledge of the originator. If the originator was aware that the work was copyrighted, he becomes the main culprit since he had the knowledge and commi ed the infringement. Ignorance of the existence of copyright is a valid Défense in this instance. However, proving guilt or prior knowledge or iden fying the guilty par es can prove to be exceedingly difficult due to the number of internet users. Liability of the End-user: Depending on whether the end-user just reproduced the work, or further published it, his liability varies. For reproduc on, however, the end-user can avoid liability on the Défense of private use, which is an excep on to copyrighted work. Even with an end-user, knowledge is essen al for placing liability. If the end-user is under the belief that there was implied consent of the copyright owner due to its existence on a public pla orm, the user may not be held liable for infringement. Liability of the ISP: The liability of an intermediary is dependent on the role they play in the transmission. ISPs are generally classified as content providers, playing a significant role in the reproduc on, transfer, and communica on of the material thus making them very much liable. And because of the inherent difficul es of iden fying individual guilty users, copyright owners also find it easy to place the blame on ISPs, however, these ISPs are only passive carriers, and holding them responsible for the illegal ac vi es of their users is not a just or legal prac ce. Drawing a similar interpreta on of sec on 51, ISPs can be held liable only when they knew about the copyright or its breach. Further, under Sec on 63, any person abe ng the infringement is criminally liable, another factor that determines the liability of an ISP. In corrobora on with this, the IT act states that a network service provider (ISP) would not be held liable for third party ac ons if the offense has been commi ed without its knowledge. Therefore, prudently an ISP can escape liability in copyright infringement if it can prove a lack of knowledge and exercise of due diligence. Fair Use Défense Fair use is an affirma ve Défense that can be raised in response to claims by a copyright owner that a person is infringing a copyright. Fair use permits a party to use a copyrighted work without the copyright owner’s permission for purposes such as cri cism, comment, news repor ng, teaching, scholarship, or research. But copyright law does establish four factors that must be considered in deciding whether a use cons tutes a fair use. These factors are: Factor 1: The Purpose and Character of the Use The first factor mostly focuses on whether the use is commercial or non-commercial and whether the use is transforma ve. If a use is commercial, it is less likely to be fair use and if it is non-commercial, it is more likely to be fair use. Transforma ve uses are those that add something new, with a further purpose or different character, and do not subs tute for the original use of the work. If the use is transforma ve, it is more likely to be fair use and if it is not transforma ve it is less likely to be fair use. Factor 2: The Nature of the Copyrighted Work The second factor considers the nature of the underlying work, specifically whether it is more crea ve or more factual. Use of a more crea ve or imagina ve underlying work is less likely to support a claim of fair use, while use of a factual work would be more likely to support a fair use claim. This factor also looks at the publica on status of the copyrighted work. When the copyrighted work is unpublished the use is less likely to be a fair use. Factor 3: The Amount Used The third factor considers the amount of the copyrighted work that was used compared to the copyrighted work as a whole. Where the amount used is very small in rela on to the copyrighted work, this factor will favour a finding of fair use, but where the amount used is not insignificant, this factor will favour the copyright owner. This factor also considers the qualita ve amount of the copyrighted work used. If the por on used was the “heart” of the work, this factor will likely weigh against a finding of fair use even if that por on was otherwise a very small amount. Factor 4: The Effect of the Use on the Market The fourth factor not only considers whether the defendant’s ac vi es may harm the current market, but also considers whether the use may cause any harm to poten al markets that could be exploited by the copyright owner if the use were to become widespread. If the use harms the copyright owner’s current or poten al market then it will weigh against fair use. Along with the first factor, this factor is one of the most important in the fair use analysis. Copyright Challenges in the Cyberworld (Internet)The problems with rights in cyberspace are increasing along with technological advancements. Copyright infringement can have serious legal consequences, such as fines and jail me. I.P.R. infringement is becoming more widespread and diverse as Internet and network technologies progress. Among the major areas of I.P. rights are copyright, which the Internet and technology have significantly impacted. The Net is necessary for many aspects of life, including business opera ons. Therefore, giving up the Internet to handle legal problems is not a choice. Since their origin, copyright rules have changed in response to technological advances. For the different par es involved in its use of the produc on of authorship, by books, art into websites and films, these innova ons, like many others, hold both poten al and the ability to be destruc ve. Copyright laws help to promote crea vity and innova on by incen vising people to create original works. Therefore, they are emphasising the copyright concerns in cyberspace in this discussion. As more people produce content, efforts are being made to raise awareness of the difficul es in preserving the content. Copyright is an essen al aspect of the cyber world, as it gives creators the right to protect their digital crea ons from being copied or otherwise used without permission. What kinds of digital technology could have effects on copyright? Digital data storage and distribu on of works are the techniques that are affec ng copyright law to become more complex. The following are some of these technologies’ elements that are significant to copyright law: Easy dissemina on Global digital connec ons rise has enabled the quick and widespread distribu on of digital inven ons. Digital connec ons, such as pla orms for social media, can be used to spread informa on to a huge number of people (However, with broadcas ng, digital content can reach only some people at a me). Reproducibility When an item has been created digitally, it may be quickly, cheaply, and accurately replicated. The quality of each copy can then be reproduced indefinitely without decreasing. In this way, a single digital version of a book can serve millions of people. U lisa on of Storage Digital storage is huge, and it is only becoming more so as me goes on. More and more material can be stored in a given quan ty of space. Problems within cyberspace Since the crea on of the Internet and the growth of related informa on systems, copyright issues have become common. Infringement of copyright is widespread in cyberspace and impacts a wide variety of digital items, not just a select few blockbusters. Copyright holders have adopted technical measures like the Electronic Copyright Management System (ECMS) to stop works from being copied and distributed. Among the viola ons of copyright Plagiarism, caching and unlawful database or so ware usage.Uploading, accessing, connec ng, peer-to-peer file transfer, infringement of copyright on social networks, and other online ac vi es need to be protected. Op ons for remedy in the event of a digital infringement of copyright The copyright holder may file a lawsuit for monetary damages, restraining orders, profit from ins tu ons, and transfer of the infringing goods when their rights are violated. Copyright owners who believe their rights have been violated have several op ons for seeking recourse from Indian courts. A few of these procedures involve removing and destroying all noncompliant files, including master files. The Copyright Law of India 1957 gives op ons if anyone breaks the right of others: Criminal Remedies (Acc. to Sec ons 63 and 63B), Civil Remedies (Acc. To Sec ons 54–62), Administra ve Remedies are the three types of remedies available-The Act provides the following legal op ons to someone who has been wronged, given below Restric ons Damages Account Conversion Injunc on Destruc on of Infringing Copies As technology changes, copyright has undergone various changes. Copyrights are currently successfully used in cyberspace due to the expansion of the Internet. There are fresh possibili es with possible hazards when establishing copyright on the Internet. Threats o en exceed benefits. Cyberspace requires stricter regula ons to safeguard copyright. Cyberspace issues at the present Copyright viola ons have become common with the rise of the Internet and the growth of related informa on technologies. Copyright infringement affects many digital products and is not limited to a few hits; they are omnipresent in cyberspace. The hazards to Intellectual Property Rights (I.P.R.) on the Internet are numerous, and major infringement of copyright is just the edge of the iceberg. The development of and World Wide Web has led to the establishment of cyberspace, a wild and lawless environment that creates serious copyright problems. To prevent works from being duplicated and distributed, copyright owners have created technical safeguards such as the Electronic Copyright Management. ISP(Internet service provider) the internet services providers. In the simplest terms, to be an intermediary is to be like a conduit for the passage of any informa on/communica on. They act like aggregators between those who wanted to generate and spread informa on and those who wanted to consume informa on There was a need to regulate and control the informa on on the internet, and since it was difficult to keep track of individuals worldwide, it was done through the source that acted as a medium to aggregate this connec vity, the ISP’s, the internet service providers. The issue of online copyright infringement liability for the ISP’s thus became prevalent since the use of the internet started to expand rapidly. The impera ve ques on that arises here is to what extent are ISPs responsible for the third-party material put on the internet by users of their facili es? Because of the hurdles and constraints on keeping track and catching hold of individuals on a worldwide level, because of geo-cultural, geopoli cal and simply inability of copyright and intellectual property owners to seek infringement damages against those who misappropriate their intellectual or digital proper es, the internet service providers have become an accessible mule to address this problem, namely since they allow the internet or data pirates to exist, for which reason the content owners find it righteous to sue the ISP’s for their data infringement because the ISP’s naturally are in a posi on to control and secure the internet through plausible policing. In this paper, we explore the role of the ISP’s communica on on the internet, their various approaches for determining the liability of the ISP’s for eg. the horizontal approach, the nonhorizontal approach and explain the liability of ISPs for copyright infringement under the Copyright Act, 1957, and the Informa on Technology Act, 2000. ISP’s role in communica on on the internet ISP is the gateway or an aggregator that provides the network infrastructure, in common parlance, a bandwidth (road network) which gives people access to navigate through the world wide web and access data and informa on on one end, and on the other, they give hos ng and website building and other such services for the supply of data and content. Other than ISP’s various par es are involved in offering solu ons for crea ng, storing, hos ng, delivering and accessing informa on and content from the content creator to the content consumers such as blogging sites, cloud pla orms, hos ng servers, database servers, etc. at the end of the day all the informa on gets stored in a server and is accessed from that server through the internet. In common parlance, the server is an address where one seeks to access the informa on through the highway and road network which is provided by the ISP through the internet and bandwidth, to be able to navigate and access the informa on stored on these servers. The various intermediaries that host, store, process data and data services are all connected to the content providers on one end and the consumers on the other through the ISP’s which are the road network that enables the transport of informa on and people (albeit virtually) between one point to another. The website host deploys servers where FTP’s, file transfer protocols are deployed for storing, accessing and transpor ng files, website hos ng is done on these servers. These days cloud compu ng offers remote storage of data that can be accessed on mul ple points. Upon storage, on such servers and cloud servers, this data gets availed to anybody with an internet connec on and the address to the server loca on. An access provider on the other hand provides access to the internet. In the process, all this is happening through the network infrastructure of the internet service provider, ISP. This network infrastructure transports this data to the designated consumer. ISPs are aggregators who create access and network to transport informa on exchange. Liability of internet service provider The liability for copyright infringement rests on three theories; direct, vicarious and contributory infringement. Direct infringement occurs when a person violates any exclusive right of the copyright owner. Vicarious liability arises when a person fails to prevent infringement when he can and has a right to do so and is directly benefited by such infringement. In the United States, one of the Acts which provides liability for the ISPs is the Digital Millennium Copyright Act, 1998. (DMCA) This Act governs the liability of the internet sites and ISPs for the copyright infringement of its user. It provides a mechanism for copyright owners to force site owners and ISPs to remove infringing material. The following elements are part of the regime under the DMCA: 1) The online service provider [hereina er OSP] must have a designated agent to receive no ces and it must use a public por on of its Web site for receipt of no ces; 2) The OSP must no fy the U.S. Copyright Office of the agent’s iden ty and the Copyright Office will also maintain electronic and hard copy registries of Web site agents. Various approaches to determine the liability of internet service providers The scope of an ISP’s liability extends to the branch of law pertaining and rela ng to the content and subject ma er in ques on. It could be private or personal, criminal, tort, intellectual property like copyright, trademark, patent, etc., compe on law, consumer protec on, etc. and thus the liability of the ISP’s has been burning, constantly evolving and expanding. These have been done broadly through two approaches: 1. Horizontal approach Which covers not just copyright infringement but all other areas and branches of law, where the liability of ISP arises directly and it raises fixed liabili es irrespec ve of the content and extent of the illegality of the content. 2. non-horizontal approach The poten al of the liability is determined by the provisions and jurisdic ons of the law. In this approach, the statutes determine the extent of liability, in which a case of defama on would be covered under defama on laws, copyright infringement would be covered under intellectual property rights law, harm to person, death and rape threats would be covered under IPC, etc. Copyright is dealt with preserving the efforts and performance of the intellect. The concern of copyright is the protec on of literary and ar s c works. These consist of music, wri ngs, the efforts of the fine arts, music, such as sculptures and pain ngs, technology-based works such as computer programs and electronic databases. The liability for copyright infringement rests on three theories1. direct, infringement 2.vicarious infringement 3.contributory infringement. Direct infringement occurs when a person violates any exclusive right of the copyright owner. Vicarious liability arises when a person fails to prevent infringement when he can and has a right to do so and is directly benefited by such infringement. These two theories are based on the strict liability principle and a person will be liable without any regard to his mental state or inten on. Contributory liability arises when a person par cipates in the act of direct infringement and has knowledge of the infringing ac vity. The ques on arises as to which standard should be applied in order to fix the responsibility of service providers. Provisions under the Indian Copyright Act, 1957 The Indian Copyright Act is unable to protect the unauthorized distribu on and use of work over the internet. Infringement over the internet and piracy poses a threat to crea ve works worldwide and thus the growth of the internet, e-commerce and the digital economy. The law related to ISP liability is vague and ambiguous in India. The Indian Copyright Act 1957, though amended in 1994 and 1997, doesn’t cover or even men on copyright infringements and liability of ISPs regarding them. The crux of copyright infringement according to the Act is that whether a person is gaining economic gains out of the infringement and in case of ISPs liability, the ISPs are gaining any direct economic gains out of copyright infringement. Users however do pay ISPs for using internet services, but they usually get away with the excuse that they did not know their acts were in the violence of owner’s copyrights. Moreover, Sec on 63 of the copyright Act, 1957 provides for abetment regards to copyright infringements, but whether ISPs can be said to be abe ng would again be a case to be se led in the court of law since ISPs clearly would state no inten on as their basis to avoid legal liability. Provisions under IT Act, 2000 Chapter XII of the Act provides for issues regarding the liability of the service providers. The Act refers to ISPs as ‘network service providers’ and exempts them from their liability. Sec on 79 absolves the ISP’s liability if they can prove they had no knowledge about the infringement or due diligence was exercised for preven on of such acts. The Indian posi on in liability of service providers for copyright infringement must be made more explicit. The Act must include sec ons that address the financial aspect of the transac on, and the rela onship between an ISP and a third party, because this is vital to determining the iden ty of the violator. The American concept of contributory infringement can also be incorporated into the Indian Act so that if any person with knowledge of the infringing ac vity, induces, causes, or materially contributes to the infringing conduct of another, the person can be made liable. In order to be exempt from liability, the Indian Act requires the service provider to exercise due diligence to prevent the commission of copyright infringement. The Act does not provide the meaning of the term due diligence. If due diligence means policing each and every aspect of the internet, it can lead to loss of privacy and can ul mately have a disastrous effect. There is a need for a consensus on the meaning of the term due diligence because the primary func on of ISPs is to build the internet, not to play the role of a policeman. If the behaviour of an ISP is reasonable, then that ISP should not be held liable for each and every ac vity on the internet as has been held by the US courts. Various interna onal scenarios The WIPO Copyright Treaty, 1996 first caught interna onal a en on on copyrights. The trea es updated the Berne Conven on by incorpora ng the exis ng TRIPS provisions in its folds and granted addi onal rights to the authors in the context of the internet. A new right referred to as the right of communica on to the public was incorporated and the right of distribu on was specifically spelt out. It also provided for legal remedies against the circumven on of technological measures used by the authors to protect their work. Legal protec on was also granted to rights management informa on systems used by the authors while transmi ng works in a digital environment. It was further made clear that mere provision of physical facili es for enabling or making a communica on does not itself amount to communica on with the meaning of this provision. Since there was no agreement to treat both temporary and permanent reproduc on as a part of reproduc on rights in digital format, no specific provision was included in the WCT in this regard. It was the failure of the interna onal community due to the pressure from interest groups to reach a defini ve conclusion on the nature of the liability of service providers and users, that le the interna onal law unse led and it was le to the respec ve Na on States to introduce appropriate provisions in the domes c law to protect the interests of the owners. One of the first countries to legislate on the Treaty provisions was the US through its Digital Millennium Copyright Act (DMCA) that came into force in 1998. Before referring to the DMCA it is necessary to refer to some of the judicial pronouncements of US Courts on the issue. In Playboy Enterprises v. Frena, the court was called upon to determine the liability of the electronic Bulle n Board System (BBS) operator for the acts of users who had uploaded and downloaded the plain ff’s copyrighted photographs. The court found Frena liable for viola ng the plain ffs right to publicly distribute and display copies of its work. The defendant contended that he had in fact removed the photographs from the BBS when he received the complaint and had since monitored the BBS to prevent addi onal photographs of Playboy from being uploaded. Internet service providers being made liable to suit for copyright infringement on the internet Frequently in copyright infringements suits being filed for ac ons of infringement on the internet most certainly involve the ISPs. The reason being that ISPs are far more in a superior posi on to police, track and take ac on in cases of piracy or infringement, than an owner who will be rather completely unaware of the whereabouts of such infringements taking place, the ISPs would have the internet traffic data rela ng to such ac vi es that show downloads of the infringed product.