Cyber Law - Trends and Developments in India PDF
Cyber Law - Trends and Developments in India PDF
Cyber Law - Trends and Developments in India PDF
There have been certain important changes that have been made
in the existing information technology legislation in our country.
These changes are particularly important since they impact all
companies using computers, computer systems, computer networks,
communication devices as well as data and information in the
electronic form.1
∗
Advocate, Supreme Court of India; President, cyberlaws.net; President, Cyber Law
Asia; Head, Pavan Duggal Associates.
The author Pavan Duggal is Asia’s and India’s leading expert and authority on
Cyberlaw and Mobile Law. He can be contacted at his email addresses
pavan@pavanduggal.net and pavanduggal@yahoo.com. More about the Author is
available at www.pavanduggal.net and http://www.linkedin.com/in/pavanduggal.
1 Pavan Duggal, Section 66(A) of the Information Technology (IT) Act, IBNLIVE (Dec. 3,
2012), http://ibnlive.in.com/chat/pavan-duggal/section-66-a-of-the-information-
technology-it-act/1328.html (last visited July 5, 2014).
2 PAVAN DUGGAL, MOBILE LAW 310 (2nd ed., Universal 2013).
3 Id. at 153.
4 Padmaja Joshi, Reading 'The Satanic Verses' Not a Punishable Offence, Say Legal
Experts, INDIA TODAY (Jan. 24, 2012), http://indiatoday.intoday.in/story/salman-
rushdie-the-satanic-verses-jaipur-authors-legal-experts/1/170439.html
(last visited July 5, 2014).
Cyber Law: Trends and Developments in India 2
From 17th October, 2000, when the IT Act, 2000 came into
implementation till date, the said legislation has seen some very
interesting cases and challenges, being brought within its ambit. As
time passed by, the inadequacies of the said legislation came to the
forefront. There were various practical difficulties in the
implementation of the said legislation.5 The inadequacy6 of the IT Act,
2000 to address some of the emerging phenomena, challenges and
cybercrimes, led to voices clamoring for change in the Indian cyber
law.
5 Samanwaya Rautray, IIPM Case Clear Abuse of Judicial Process, Say Legal Experts,
THE ECONOMIC TIMES (21 Feb. 21, 2013), http://articles.economictimes.
indiatimes.com/2013-02-21/news/37221838_1_injunction-iipm-urls (last visited
July 5, 2014.
6 Pavan Duggal, Indian Cyberlaw in 2008, CYBERLAW TRENDS OF 2010 (Dec. 31
2008) http://cyberlawindia2008.blogspot.in/2008/12/indian-cyberlaw-in-2008.
html (last visited July 5, 2014).
7 Pavan Duggal, Glaring Loopholes in Cyberlaw Amendments (2008) Oct.-Dec.
INFOTECH, http://inclusion.in/index.php?option=com_content&view=article&id=
193:glaring-loopholes-in-cyberlaw-amendments&catid=114:infotech (last visited
July 5, 2014).
Cyber Law: Trends and Developments in India 3
addressed.8 The said law is not a comprehensive law on data
protection or on digital secrets. Having a couple of sections on data
protection does not serve the requirements of corporate India.9
India has neither learnt from the wisdom of the United States nor
the European Union, in terms of their respective experiences, in the
area of data protection. The provisions will not aid the victim entities,
whose data and information is often misused by their employees or
agents with impunity.10
The IT Act Amendments are also deficient in the sense that they do
not create rebuttable presumptions of confidentiality of trade-secrets
and information, in the context of corporate India. A large number of
Indian companies and individuals are saving their confidential data,
information and trade-secrets in the electronic form on their
computers.11 Given the apparent increase in technology adoption, it
is increasingly being found that that despite all precautions been
taken, the employees are still going ahead and taking away
confidential data from companies. The inability of the law to create
enabling presumptions of confidentiality regarding corporate and
individual data and information in the electronic form, is likely to
complicate matters further for Indian companies and netizens.
8 Pavan Duggal, Legal Issues Relating to Outsourcing in India, (2008) 36 (2) IJLI 369.
9 Id.
10 Pavan Duggal, We're Not Keeping Pace, THE TIMES OF INDIA (Jan. 29, 2009),
http://timesofindia.indiatimes.com/home/opinion/edit-page/TOP-ARTICLE-Were-
Not-Keeping-Pace/articleshow/4043106.cms (last visited July 5, 2014).
11 DUGGAL, supra note 6.
12 PAVAN DUGGAL, TEXTBOOK ON CYBER LAW 60 (1st ed., Universal 2014).
Cyber Law: Trends and Developments in India 4
Parliament. India has missed yet another opportunity to deal with the
contentious issue of spam.13
Any major failure of the IT Act Amendments is that they have not
specifically detailed with the issues pertaining to electronic
discovery.15 Today, increasingly people and entities as also corporates
are relying upon electronic evidence and electronic media as a means
of communicating with each other and doing business.16 However,
the Indian IT Act Amendments are completely silent on the issues of
electronic discovery. This once again shows the short sightedness of
the Indian IT Amendments to address the complicated emerging
issues pertaining to electronic discovery.
may not be directly applicable to another industry. Non-maintaining
such reasonable security practices, would expose the said corporates
to civil liability to pay damages by way of compensation to the person
so affected, to the tune of Rs.5 crore. The amendments to the
Information Technology Act, 2000 are likely to impact all industries,
which use computers, computer systems and computer networks and
data and information in the electronic form. These reasonable
security practices and their mandatory adoption, while in overall
better interests, are likely to unveil a package of unpleasant surprises
for many.
appeal to any logic. The cutting of certain elements of the offence of
hacking under the existing Section 6621 and putting the same under
Section 43 make no legal or pragmatic sense. This is all the more so
as no person would normally diminish the value and utility of any
information residing in a computer resource or affect the same
injuriously by any means, with the permission of the owner or any
such person who is in charge of the computer, computer system or
computer network.
At that time when the entire world is going hammer and tongs
against cyber crimes and cyber criminals, here comes a contrary
trend from the Indian legislature.22 Cyber criminals of the world
targeting India or operating in India need not despair. The legislation
has now stipulated that cyber crimes punishable with imprisonment
of 3 years shall be bailable offences. Since the majority of cyber crime
offences defined under the amended IT Act is punishable with 3
years23, the net effect of all amendments is that a majority of these
cyber crimes shall be bailable. In common language, this means that
the moment a cyber criminal will be arrested by the police, barring a
few offences, in almost all other cyber crimes, he shall be released on
bail as a matter of right, by the police, there and then.24
22 DUGGAL, supra note 17.
23 DUGGAL, supra note 12, at 111-139.
24 DUGGAL, supra note 17.
25 Rishi Raj, Satyam Records Not Yet Seized, THE FINANCIAL EXPRESS (Jan. 9,
2009), http://www.financialexpress.com/story-print/408405 (last visited July 5,
2014).
Cyber Law: Trends and Developments in India 7
Another major change that the amendments to the IT Act, 2000
have done is that cyber crimes in India shall now be investigated not
by a Deputy Superintendent of Police, as under the existing law, but
shall now be done by a low level police inspector. So, henceforth, the
local police inspector is going to be the next point of contact, the
moment a person or any company is a victim of any cyber crime. The
efficacy of such an approach is hardly likely to withstand the test of
time, given the current non-exposure and lack of training of Inspector
level police officers to cyber crimes, their detection, investigation and
prosecution.
that “encryption up to 40-bit key length in the RSA algorithms or its
equivalent in other algorithms can be used without having to obtain
permission. If encryption equipments higher than this limit are to be
deployed, it needs permission of the Telecom Authority and deposit
the decryption key, split into two parts, with the Telecom
Authority.”
All in all, given the glaring loopholes as detailed above, the IT Act
Amendments have already had the effect of adversely impacting
corporate India and all users of computers, computer systems and
computer networks, as also data and information in the electronic
form.
∗
Senior Police Inspector, Market Yard Police Station, Pune City.
Cyber Law: Trends and Developments in India 12
9.Domain
stalking
10.Scanning
and probing
11.Insider
threats
Cyber Law: Trends and Developments in India 13
ED
Cyber Law: Trends and Developments in India 14
Introduction
Don’t be too surprised! This day is not far away. We are left with
no choice; we have to keep up with technology or become obsolete or
useless.
Today you walk inside any shop, mall, multiplex, petrol station
and you don’t need paper money to do the transactions, but only
plastic which is your credit card or debit card or any other smart
card. Just a swipe of the card and the shopping is done; the money is
debited or minused from your bank which could be situated
anywhere in the world almost immediately and you get a SMS alert
almost the next instant. The money gets deposited in account of the
shop owner, again electronically. So where is all the money that we
are using while doing the shopping? It’s all there on some computer
somewhere in the world which you are assuming is well protected
and all your money is safe.
Just imagine how big the risk is if such transactions are not
carried out carefully or not monitored carefully. Someone may have
created your profile on Orkut and must be communicating with your
friends all over the city, country or the world, and people are talking
to the person as if ‘he’ is ‘you’. That’s scary, right? Someone may also
create an email id by your name and start sending dirty
messages/pictures to your friends.
Does this mean you should stop using the internet or computers?
Now that is no longer possible; so it is better that we learn how to use
it safely and protect ourselves. It is also important to know that while
∗
B.Sc.,LL.B.Practising Cyber Lawyer, Pune;TCS Chevening Scholar.
Cyber Law: Trends and Developments in India 15
using the computer and internet, you should follow certain rules,
regulations, laws and guidelines because if you do not do that, it may
be an offence punishable under law. The way we follow traffic rules
while driving on the road, it is the same while using the internet.
Let us first begin with discussing what are those few wrong beliefs
or myths about using the computer and internet.
Reality: No!
Myth No.4: Internet of offers you anonymity. No one knows who
you are on internet.
…Which means you can do whatever you want on the internet. Send
dirty jokes, dirty SMS etc. to people; threaten or defame people on
blog sites or twitter or elsewhere; talk to people on chat under false
identity because no one will know who you actually are.
Remember, every time you touch the keyboard, you are creating a
footprint which cannot be wiped away. Whenever you send an email
from your computer, it will carry the physical address of the
computer which means the place from which the email was sent or
the chat conversation was done can be very easily found out. It could
be your home, school, college, office or a cyber cafe. After that finding
a person who has sent it is not so difficult.
Reality: No!
And that is why Rotary Club along with Pune Police has organized
this awareness drive.
6 Rule 6 Maintain decency and decorum on public
websites.
Virus, Worms, Torjans etc., are those germs which infect a computer
and can cause damage to the computer and data making it useless.
Valuable data can be lost forever. Virus etc., can enter into your
computer through the internet or even through floppy disks, USB
drives etc. In order to protect your computer from the virus attack,
one needs to install a program on the computer which will prevent
the entry of the virus. Such programs are called anti-virus programs.
This is easier said than done. How many times you must have already
heard this? Let us ask a simple question to ourselves. How many
Cyber Law: Trends and Developments in India 18
keys do you have to your house? 1-2-3? Mom, dad and yourself? Do
you freely make duplicates and keep them lying everywhere-like on
the door itself, on the door mat, in the plant pot outside the main
door? No! Isn’t it? We are more careful because the house contains lot
of valuables.
Have you seen anyone win a lottery without buying a lottery ticket?
Then why believe all the emails and SMS that that tell you that you
have won a lottery worth million pounds in UK.
• Theft of data
• Dishonor of agreements
• Not meeting commitments
• Leakage of confidential information
• Fraud
• Mismanagement
• Victimization
• Harassment
• Coercion
• Cheating
• Deception
• infidelity
To detect threats, you need an easy to use yet powerful tool to ferret
slivers of information from voluminous quantities of emails. The tool
needs to find patterns of activities and deliberate sequence of tasks
from the data. The reports from this tool should serve as legally
admissible evidence that helps win disputes in your favor. You need
the MailXaminer from SysTools.
∗
Co-Founder and Product Specialist-Digital Forensics SysTools Software.
Cyber Law: Trends and Developments in India 21
Who needs SysTools MailXaminer?
• Avoids involvement of external agencies into investigation to
ensure secrecy in investigation.
• Reduces dependence on trained manpower and their
expensive skills.
Cyber Law: Trends and Developments in India 23
Introduction
Cyber Law: Trends and Developments in India 24
1 http:www.mindspring.com\~techomom\harassed\ (last visited May 1, 2013).
2 British Telecommunications PLC v. Williams, (1997) IRLR 668.
Cyber Law: Trends and Developments in India 25
Cyber Law: Trends and Developments in India 26
Cyber Law: Trends and Developments in India 27
The IT Act, 2008 does not directly address stalking. But the
problem is dealt more as an ‘intrusion on to the privacy of
individual’ than as regular cyber offences which are discussed in
the IT Act, 2008. Hence the most used provision for regulating
cyberstalking in India is Section 72 of the IT Act, 2008 which runs
as follows:
Cyber Law: Trends and Developments in India 28
After ‘the December 2012 Delhi gang rape incidence’, the Indian
government has taken several initiatives to review the existing
criminal laws. A special committee under Justice Verma was
formed for this purpose and basing upon the report of the
committee, several new laws were introduced. In this course, anti-
stalking law was also introduced. The Criminal Law (Amendment)
Act, 2013 added Section 354D in the Indian Penal Code, 1860
to define and punish the act of stalking. This section is as follows:
9 The Criminal Law (Amendment) Act, No. 13 of 2013, INDIA CODE (2013).
Cyber Law: Trends and Developments in India 29
Enforcement Problems
Cyber Law: Trends and Developments in India 30
rooms, social network sites, or the stalker attempting to take over the
victim’s computer by monitoring what he is doing while online. The
Internet is not a “lawless place”14, and there are difficulties in
applying laws that are made for specific nation states and this would
be also true of applying national harassment and stalking laws to the
Internet.
Self-help Approaches
14 See J.R. Reidenberg, Governing Networks and Cyberspace Rule-Making, 45 EMORY
LAW JOURNAL 911 (1996).
Cyber Law: Trends and Developments in India 31
Problem:
The company suspected that its employees conspired with the son
(holding an add-on card) of one of the credit card holders. The BPO
employee deliberately keyed in the wrong password three consecutive
times (so that his password would get blocked) and obtained a
temporary password to access the computer system. He manually
reversed the transactions of the card so that it appeared that
payment for the transaction has taken place. That person also
changed the credit card holder's address so that the statement of
account would never be delivered to the primary card holder.
Solution:
• It is also punishable under Section 420 of the Indian Penal Code,
1860.
• Police can visit the premises of the BPO and conduct detailed
examination of various persons to understand the computer
system used.
• Police can analyze the attendance register which showed that who
was present at all the times when the fraudulent entries had been
entered in the system. They also analyze the system logs that
showed that the accuser's ID had been used to make the changes
in the system and corresponding CCTV Coverage .
• Police can trace IP address to service provider and ultimately to
the person who is involved in the crime.
Problem:
Due to this incident Ram has to bear lots of finacial losses. Ram
understood that he is being cheated. Now he wants to recover his
money.
Solution:
3. Lottery Scam
Problem:
One day Govind got an e-mail from U.K. NATIONAL LOTTERY. It was
mentioned in the lottery that Govind has won Rs.50 lakhs. So he
contacted those people and verified the details.
Solution:
Problem:
Neehar was posing as a genuine railway ticket agent and had been
purchasing tickets online by using stolen credit cards of non-
residents. Neehar created fraudulent electronic records/profiles,
which he used to carry out the transactions.
Cyber Law: Trends and Developments in India 34
The tickets so purchased were sold for cash to other passengers.
Such events occurred for a period of about 4 months.
The online ticket booking service provider took notice of this and now
wants to find the fraudster.
Solution:
Problem:
Solution:
internet service provider and ultimately to the cyber cafes through
which illegal transfers were made.
• Police can freeze the fraud accounts.
Problem:
The said call option was compulsorily exercised by the exchange thus
resulting in a loss of INR 0.05 million to Pritesh and wrongful gain to
the fraudster.
Solution:
Police will investigate IPs, firewall logs of company, server logs, e-mail
IDs, computer systems of company.
Cyber Law: Trends and Developments in India 36
1. Mobile Theft
• Contact your telecoms service providers: they can block your
SIM card and thereby prevent any fraudulent use.
• You will be asked for your mobile number, proof of ID and IMEI
code which is given in purchase receipt of your mobile
handset.
• File a police report as soon as possible, including a description
of your handset, and the serial and/or IMEI code.
• Police can track the location of mobile phone by tracking its
IMEI number.
Legal Remedies:
Security Tips:
*
Dr.Sapna Sukrut Deo, Assistant Professor, New Law College, Bharati Vidyapeeth
Deemed University, Pune.
Cyber Law: Trends and Developments in India 37
• At first police will contact with the service provider from whose
number the calls and multiple sms are coming and will acquire
the identification of the users and will file cases against them.
• If the identification of the users cannot be made by the service
providers then the service provider can stop the services of
those numbers under Telephone Regulatory Act of India, 1997.
• There is no need to change the number.
Security Tips:
• You can opt for the call barring facilities from your phone and
blacklist the numbers in your phone. Look out for in-built or
downloadable option to limit incoming calls.
• You can avail your service provider to activate DND services on
your phone if phones are from telecallers or marketing
companies.
3. Indentify Theft
• Criminals gets your identity from social networking websites,
job sites, matrimonial sites, special offers discounts coupons
by registrations, stolen wallets, online shopping , many more.
If you suspect that someone has used your identity
immediately lodge a complaint by going to the nearest police
station.
• Police can investigate the complaint under Section 66(C)) for
Identity theft and if your identity theft is used for sending
offensive messages then under Section 66(A) of the Information
Technology (Amendment) Act, 2008 (ITAA, 2008).
Legal Remedies:
Security Tips:
Cyber Law: Trends and Developments in India 38
Security Tips:
Cyber Law: Trends and Developments in India 39
5. Phishing Scam
• The phishing fraud is an online fraud in which the fraudster
disguise themselves and use false and fraudulent websites of
bank and other financial institutions, if you think you are a
victim of phishing Lodge a complaint by going to the nearest
police station.
• Police can set up a trap in a local bank for investigating fake
accounts.
• If fraudulent money is transferred online then police can trace
IP address to service provider and ultimately to the person
who is involved in illegal money transfer.
Legal Remedies:
Security Tips:
Cyber Law: Trends and Developments in India 40
Security Tips:
7. Hate Speech
• Any individual, who through the medium of social media
writes content as form of a “comment” which incites
communal hatred and/or violence, will be held accountable
under Section 153A of the Indian Penal Code, 1860.
• The punishment stipulated under this section is 3 years’
imprisonment with a fine.
• Social media should remove such content from its servers
once it is brought to its notice. If it fails to remove the
content within the 36 hours stipulated by the Information
Technology Act Guidelines, it will lose the protection offered
under Section 79.
• In such a situation that social media company may be held
responsible as a contributing party and its executives may
be charged under Section 153A of the Indian Penal Code,
1860.