LCI Learning

Share on Facebook

Share on Twitter

Share on LinkedIn

Share on Email

Share More


Regulating ‘Indian’ Cyberspace – The Battle for

‘Control’ in the New Media Version 2.0

Cyber hacking poses a serious threat to all internet based activities and transactions.

Inspite of recent amendments, the Information Technology Act does not deal with

cyber crimes effectively. What is urgently required is a detailed data protection law.

Traditional legal systems have had great difficulty in keeping

pace with the rapid growth of the Internet and its impact

throughout the world. Whilst laws have been enacted and a

few cases have been decided that affect the Internet, they

have left most of the difficult legal issues to the future. Inspite

of the recent proliferation of legislation world-wide, it is

unlikely that courts and legislators will be able to provide

sufficient guidance in a timely fashion to business (and

lawyers) to enable them to engage in commerce on, or

otherwise take advantage of, the Internet in a manner that

avoids or minimises unexpected consequences or liabilities.

Internet and electronic based trading systems are affecting

all aspects of commercial/business entities. The Internet

revolution allows IT-centric management to make timelier

and higher quality decisions.

The Internet has tested the limits of regulation, prompting

some to declare ‘independence’1 and yet others to declare

it beyond the limits of governance2 . Jack Goldsmith and

Tim Wu in their recent text focus on state responses to the

Internet’s challenge to national sovereignty.3 Goldsmith

and Wu explore three main arguments. First, the Internet

is a medium like any other, and national governments

continue to exercise control over the Internet by exercising

national law. Second, geography and government retain

their central importance in the Internet despite continued

globalisation. Third, an increasingly ‘bordered’ Internet is

an important development.

When the preliminary draft version of India’s internet and ecommerce

legislation was prepared it was entitled – “Electronic

Commerce Bill”; in line with its prime objectives and duly

referring to the Ministry of Commerce which produced it.

With the creation of the Ministry of Information Technology,

the draft Bill was re-christened with a rather ‘generic’ title.

The raison d’être of the Information Technology Act, 2000

(enacted on October 17, 2000, the “IT Act”) was - “functional

equivalence” that electronic records and transactions would

be accorded an equal weight in evidence law as ‘traditional

paper records’.

The General Assembly of the United Nations by resolution

dated the 30th January, 1997 had adopted the Model Law on

Electronic Commerce and recommended that all States should

give favourable consideration to it when they enact or revise

their laws.

The Information Technology Act, 2000 has been passed to

give effect to the UN resolution and to promote efficient

delivery of Government services by means of reliable electronic

records.

The amendments: A ‘reaction’

The amendments to the Information Technology Act to a

measurable extent are a “reaction” to recent developments such

as service provider liability issues and auction sites; sleazy

MMS clips and the like. In major part, desirable as most

reactions are, offences under the Act have been made

compoundable4 ; that is to say, the parties can compound the

case i.e. settle it between themselves. This is welcome as most

crimes target specific individuals and it is right for individuals

to sort out the situation.

e-mail :

rodney.ryder@kochhar.com

1. In February 1996, John Perry Barlow issued a manifesto called <A

Declaration of the Independence of Cyberspace> available at <http://

www.eff.org/pub/Publications/John_Perry_Barlow/barlow0296.

declaration>

2. Johnson, David R. /Post, David G., Law and Borders - The Rise of Law in

Cyberspace, 48 Stanford Law Review 1367 – 1402 [1996].

3. Who Controls the Internet? Illusions of a Borderless World, Oxford

University Press

4. Section 77A provides that the ‘offences under sections 66, 66A, 72 and

72A may be compounded by the aggrieved person.’

Articles

The offences which have been made compoundable

are:

􀂄 Section 66 : If a person dishonestly or fraudulently does

any act which damages the computer or the computer

system, he is liable to a fine of up to five lakhs or be

imprisoned for a term of up to three years. A host of

new sections have been added to section 66 as sections

66A to 66F prescribing punishment for offenses such as

obscene electronic message transmissions, identity theft,

cheating by impersonation using computer resource,

violation of privacy and cyber terrorism.

􀂄 Section 66A: If any person sends by means of a computer

resource or a communication any content which is grossly

offensive or has a menacing character or which is not

true but is sent to create nuisance, annoyance, criminal

intimidation, hatred or ill will etc. shall be imprisoned

for an imprisonment term which may be up to three

years combined with a fine.

􀂄 Section 67 of the old Act is amended to reduce the term

of imprisonment for publishing or transmitting obscene

material in electronic form to three years from five years

for first conviction and increase the fine thereof from

Indian Rupees 100,000 (approximately USD 2000) to

Indian Rupees 500,000 (approximately USD 10,000).

A host of new sections have been inserted as Sections 67

A to 67C. While Sections 67 A and 67 B insert penal

provisions in respect of offences of publishing or

transmitting material containing sexually explicit act and

child pornography in electronic form, section 67C deals

with the obligation of an intermediary to preserve and

retain such information as may be specified for such

duration and in such manner and format as the Central

Government may prescribe.

􀂄 In view of the increasing threat of terrorism in the country,

the new amendments include an amended section 69 giving

power to the State to issue directions for interception or

monitoring of decryption of any information through any

computer resource. Further, sections 69 A and 69 B, two

new sections, grant power to the state to issue directions

for blocking for public access of any information through

any computer resource and to authorize to monitor and

collect traffic data or information through any computer

resource for cyber security.

􀂄 Section 72: If a person is found in possession of some

information like electronic record, book, register,

correspondence and he is found disclosing it to any third

party without the consent of the person concerned, then

he shall be punished with imprisonment for a term which

may be up to two years, or a fine which may extend to

One Lakh rupees, or with both.

􀂄 Section 72A: If any person while providing services under

the terms of the contract, has secured access to any

material containing personal information about another

person, with the intent to cause wrongful loss or wrongful

gain discloses the information, without the person’s

consent or in breach of a lawful contract, shall be

punished with imprisonment for a term which may extend

to three years or with fine which may extend to five

lakh rupees or with both.

THE ‘MEDIUM’ NOT THE ‘MACHINE’/‘DEVICE’

It is important to remember that the Internet is principally a

medium; which can be regulated by regulating its “layers”. A

law to be effective must apply to (or regulate) one or more

“layer” that is: (a) the physical (the wires, hardware, the

‘device’ itself); (b) the digital (the code or the “spectrum”) or

(c) content (whether prohibited socially censored comments

or proprietary material).

DATA PRIVACY AND INFORMATION SECURITY

In view of recent concerns about the operating provisions in

the IT Act related to “Data Protection and Privacy” in addition

to contractual agreements between the parties the existing

Sections (viz. 43, 65, 66 and 72A) have been revisited and

some amendments/more stringent provisions have been

provided for in the Act. Notably amongst these are:

􀂄 Section 43(A) is related to handling of sensitive

personal data or information with reasonable security

practices and procedures. This section has been inserted

to protect sensitive personal data or information

possessed, dealt or handled by a body corporate in a

computer resource which such body corporate owns,

controls or operates. If such body corporate is negligent

in implementing and maintaining reasonable security

practices and procedures and thereby causes wrongful

loss or wrongful gain to any person, it shall be liable

to pay damages by way of compensation to the person

so affected.

􀂄 Gradation of severity of computer related offences

under Section 66 has been amended, now if an offence

is committed dishonestly or fraudulently then

punishment is for a term which may extend to three

years or a fine which may extend to Rs 5 lakhs or with

both;

􀂄 The addition of Section 72 A for breach of confidentiality

with the intent to cause injury to a subscriber. This is

Regulating ‘Indian’ Cyberspace – The Battle for ‘Control’ in the New Media Version 2.0

Articles

recognised as providing sufficient protection under the

EC Directive.5

Contractual agreements are those agreements which are

signed between parties where one party provides services

on the basis of the contract signed. There is always a

provision in any contractual agreement of not to disclose

any information which is imperative for the running of the

business. According to Section 72 A if anyone is found

disclosing any information of a third person, without his

consent he shall be punished with imprisonment upto three

years or a fine of Rs 500,000.

The problem remains with ambiguous phrases. For instance,

the amended Section 43A makes it mandatory for companies

to include ‘reasonable security practices and procedures’ while

handling data. “Reasonables security practices and procedures”

has been clearly defined in “explanation” under section 43A.

It is recommended that organisations follow the standards

prescribed by the Computer Emergency Response Team

(CERT). CERT’s primary role is to raise security awareness

among the cyber community and to provide technical assistance

and advice them to help them recover from computer security

incidents.

CERT provides technical advice to System Administrators and

users to respond to computer security incidents. It also identifies

trends in intruder activity, works with other similar institutions

and organisations to resolve major security issues, and

disseminates information to the cyber community. CERT also

enlightens its constituents about the security awareness and

best practices for various systems and networks by publishing

advice, guidelines and other technical documents. The

European Network and Information Security Agency (ENISA)

performs similar functions to the CERT. The basic regulation

which established ENISA is the Regulation (EC) No 460/

2004.6

NODAL AGENCY

The new amended Act of 2008, enforced on 27.10.2009

provides for a central agency in respect of Critical Information

Infrastructure7 . Further Indian computer emergency response

team has been nominated for coordinating all actions relating

to information security practices, procedures, guidelines,

incident prevention, response and reporting.8

CYBER CRIME, EVIDENCE AND PUNISHMENT

The Act provides for essentially economic offences or crimes

in the medium that are linked to economic loss or detriment.

The Government would do well to take a proverbial leaf from

the OECD Guidelines for the Security of Information Systems

and Networks9 and the Council of Europe’s Convention on

Cybercrime.10 Social offences like pornography when included

are superfluous due to the existing provisions in the Indian

Penal Code covering pornography. Though pornography has

not been defined under the code, section 292 clearly states

that “a book, pamphlet, paper, writing, drawing, painting

representation, figure or any other object, shall be deemed to

be obscene if it is lascivious or appeals to the prurient interest

or if its effect,” Neither has the language or expression changed

from 1860, the year when the Indian Penal Code came into

force. The inclusion of a provision banning child pornography

could well be a case of ‘over legislation’ considering the

existing blanket ban on pornography per se; both in the

Information Technology Act, 2000 (section 67) as well as the

Indian Penal Code, 1860 (section 292).

Section 84(A) has been inserted for providing modes and

methods for encryption for secure use of the electronic

medium. This is a welcome guidance. Section 69, related to

power to issue directions for interception or monitoring or

decryption of any information through any computer resource,

has been amended to take care of the concerns of the Ministry

of Home Affairs which include the safety, sovereignty,

integrity of India, defence of India, to maintain friendly

relations with other nations and preventing incitement to the

commission of any cognizable offence relating to these.

5. Directive 2002/58/EC of the European Parliament and of the Council of

12 July 2002 concerning the processing of personal data and the protection

of privacy in the electronic communications sector (Directive on privacy and

electronic communications) available at <http://eurlex.europa.eu/

LexUriServ/LexUriServ.do?uri=CELEX:32002L0058:EN:HTML>

6 See REGULATION (EC) No 460/2004 OF THE EUROPEAN PARLIAMENT

AND OF THE COUNCIL of 10 March 2004 establishing the European

Network and Information Security Agency available at <http://

eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2004:077:

0001:0011:EN:PDF>

7 “Information infrastructures form an essential part of critical

infrastructures. In order effectively to protect critical infrastructures, therefore,

countries must protect critical information infrastructures from damage and

secure them against attack. Effective critical infrastructure protection includes

identifying threats to and reducing the vulnerability of such infrastructures

to damage or attack, minimizing damage and recovery time in the event that

damage or attack occurs, and identifying the cause of damage or the source

of attack for analysis by experts and/or investigation by law enforcement.”

G8 Principles for Protecting Critical Information Infrastructures (Adopted

by the G8 Justice & Interior Ministers, May 2003) available at <http://

www.usdoj.gov/criminal/cybercrime/g82004/G8_CIIP_Principles.pdf>

8. Section 70 A of the Act

9. See OECD Guidelines for the Security of Information Systems and Networks

available at <http://www.oecd.org/dataoecd/16/22/15582260.pdf>

10. Convention on Cybercrime available at <http://conventions.coe.int/

Treaty/en/Treaties/Html/185.htm>

Regulating ‘Indian’ Cyberspace – The Battle for ‘Control’ in the New Media Version 2.0

Articles

New section 79 A11 (Examiners of Electronic Evidence) has

been added to notify the examiners of electronic evidence by

the Central Government. This will help the Judiciary/

Adjudicating officers in handling technical issues.

Section 79 has been revised to bring-out explicitly the extent

of liability of intermediary in certain cases. The EU Directive

on E-Commerce 2000/31/EC issued on June 8, 2000 has been

used as a guiding document.12

OTHER AMENDMENTS

􀂄 The term “digital signature” has been replaced with

“electronic signature”.

􀂄 “Communication Device” has been defined as cell

phones, personal digital assistance or combination of both

or any other device used to communicate, send or

transmit any text, video, audio or image.

􀂄 “Cyber café” has been defined as any facility from

where the access to the internet is offered by any person

in the ordinary course of business to the members of

the public.

􀂄 A new definition has been inserted for “intermediary”.

“Intermediary” with respect to any particular electronic

records, means any person who on behalf of another

person receives, stores or transmits that record or

provides any service with respect to that record and

includes telecom service providers, network service

providers, internet service providers, web-hosting

service providers, search engines, online payment sites,

online-auction sites, online market places and cyber

cafes, but does not include a body corporate referred

to in Section 43A.

􀂄 New section 10A has been inserted to the effect that

contracts concluded electronically shall not be deemed

to be unenforceable solely on the ground that electronic

form or means was used.

􀂄 The damages of Rs. One Crore (approximately USD

200,000) earlier prescribed under section 43 of the Act

for damage to computer, computer system etc. has been

deleted and the relevant parts of the section have been

substituted by the words, “he shall be liable to pay

damages by way of compensation to the person so

affected”.

􀂄 A proviso has been added to Section 81 which states

that the provisions of the Act shall have overriding

effect. The proviso states that nothing contained in the

Act shall restrict any person from exercising any right

conferred under the Copyright Act, 1957 or the Patents

Act, 1970.

DRAWBACKS OF THE NEW PROVISIONS

The amendments ignore existing international classifications

of cyber crimes. The Council of Europe’s Convention on

Cybercrime13 identifies the following as offences which should

be incorporated into substantive criminal law; some of the

provisions are particularly relevant, which are:

I. Computer-related offences

Computer-related fraud (Art. 8)

II. Content-related offences

Racial hatred, obscenity, amongst other classifications

III. Offences related to infringements of copyright and related

rights

Offences related to infringements of copyright and related

rights (Art.10)

TOWARDS A PRIVACY REGIME

While the amended version of the Act strengthens provisions

on confidentiality and data privacy; the inclusion of a solitary

provision on data privacy is quite in contrast to Europe where

data protection provisions are enshrined in Directives at the

EU level and in national legislation. In fact, data protection is

sine qua non for aspirant members to the European Union,

and also for companies who receive data from the EU. “Data

subjects” must have rights enshrined in explicit rules with a

detailed enforcement mechanism rather than relying on a lone

section to do the task elsewhere performed by an entire Act!

A detailed data protection law is needed; not merely for the

ITES industry but for the citizens of India. The right to know

balanced with the right to privacy is the hallmark of a

democracy. 􀂉

11. Section 79A – ‘The Central Government may, for the purposes of providing

expert opinion on electronic form evidence before any court or other authority

specify, by notification in the Official Gazette, any Department, body or

agency of the Central Government or a State Government as an Examiner of

Electronic Evidence.’

12. See Section 4 Article 12 of EU Directive on E-Commerce 2000/31/EC

issued on June 8th 2000 available at <http://eurlex.europa.eu/smartapi/

cgi/sga_doc?smartapi!celexapi!prod!CELEXnumdoc&lg=en&numdoc

=32000L0031&model=guichett>

13. See Convention on Cybercrime available at <http://conventions.coe.int/

Treaty/en/Treaties/Html/185.htm>

Regulating ‘Indian’ Cyberspace – The Battle for ‘Control’ in the New Media Version 2.0


"Loved reading this piece by Member (Account Deleted)?
Join LAWyersClubIndia's network for daily News Updates, Judgment Summaries, Articles, Forum Threads, Online Law Courses, and MUCH MORE!!"






Tags :


Category Corporate Law, Other Articles by - Member (Account Deleted) 



Comments





update
Post a Suggestion for LCI Team
Post a Legal Query