08-Cyberlaw Assignment Final

Embed Size (px)

Citation preview

  • 8/6/2019 08-Cyberlaw Assignment Final

    1/5

    Based on United Nations resolution A/RES/51/162, dated 30thJanuary, 1997, the MinistryofCommerce, drafted the first version of the E-Commerce laws in India which was titledDraft Ecommerce Act 1998. In 1999, the Government of India created a separateministry for IT .The Ministryof Information Technology, as it was called at that time, came up with a draft of

    InformationTechnology Bill, 1999 which was presented in the Parliament on 9th December, 1999.The Bill waspassed on May 17, 2000 by the Parliament, got the assent of the President on 9 thJune2000 and notified as a law with effect from 17 th October, 2000. This is the Act refer to as

    the Information Technology Act, 2000. The inadequacy of the IT Act, 2000 to address

    some of the challenges and cybercrimes, led to voices for change in the Indian cyber law.The Government of India appointed an Expert Committee to review the Act andrecommend modifications .The Committee submitted its report on August 2005. .TheMinistry of Communications and Technology presented amendments to the Information

    Technology Amendment Bill, This was passed on December 22nd in Lok Sabha and verynext day in Rajya Sabha .The Bill received the assent of the President of India on 5th

    February, 2009 and is nowtermed as Information Technology (Amendment) Act 2008.

    FRAMEWORK OF THE INDIAN IT ACT

    In most countries separate laws have been enacted in areas of E-Commerce,Computer Abuse,Information Security, E-Governance, Cyber Judiciary etc.In India, the Information Technology Act, 2000 (ITA) has been structured as acomprehensivelegislation which incorporates the requirements of Enablement of E-Commerce, E-

    Governance andDigital Contracts.Accordingly, the first few chapters of the Act address the issue of legal recognition ofelectronicdocuments and a system of digital or electronic signatures, contractual requirementssuch asdetermining attribution, date and time of contract formation, E Governance issues, etc.

    There arealso detailed provisions regarding the roles and responsibilities of Certifying Authoritieswhoadminister the digital signature systems.

    The penalties have been defined under two chapters, one for determining civil liabilities

    forcontraventions (Chapter IX) and the other for criminal offences (Chapter XI).The Act also explains in detail the roles and responsibilities of organizations meant forgrievanceredressal in the form of adjudicators and the Cyber Appellate Tribunal.Miscellaneous issues such as the powers of the Police, liabilities of intermediaries,powers of the stateGovernment, etc have been defined towards the end of the Act .

    The Act contained a total of 94 sections which has now been expanded to 121 sections

  • 8/6/2019 08-Cyberlaw Assignment Final

    2/5

    after the passage of the Amendments Bill in 2008.

    OVERVIEW OF CHANGES - IT (AMENDMENT) ACT, 2008

    SCOPE OF THE ACT

    The Act extends to the whole of India and as per Section 75 of the

    Act, it also applies to any offence or contravention committed outside India or by aperson who isnot a citizen of India if a computer resource located in India . Thus, the Act applies to allentities in India, including branches of foreign companies operating in India.As per the provisions for determination of time and place of dispatch and receipt of

    electronicrecords,(1)an electronic record is dispatched at the place where the originator has hisplace of business and is deemed to be received at the place where the addressee hashis place ofbusiness.(2) If the originator has more than one place of business, the principal place of businessshallbe the place of business and(3)where the originator does not have a place of business, it will be the usual place ofresidence.

    AN OVERVIEW OF THE INDIAN INFORMATION TECHNOLOGY ACT, 2008

    Cyber security has also been defined as protection from unauthorized access, use,disclosure, disruption, modification or destruction.As per Section 84A, the Central Government may, for secure use of the electronicmedium and forpromotion of e-governance and e-commerce, prescribe the modes or methods forencryption.

    DATA PROTECTION & DUE DILIGENCESection 43 which lays down penalty and compensation for damage to computer andcomputerSystem specifically includes computer source code. Under the Act, source code meanslisting ofprograms, computer commands, design and layout and program analysis of computerresources inany form.

    The earlier limit on liability of Rupees One Crore for damages has now been removed.There is therefore an unlimited liability under this section for any person contraveningthe provisions.

    Additionally, two Sections 43A and 72 A have been introduced to address data

    protection concerns.According to Section 43A, if a body corporate is negligent in implementing andmaintainingreasonable security practices and procedures in possessing, dealing or handling anysensitivepersonal data or information and thereby causes wrongful loss or wrongful gain to anyperson, suchbody corporate shall be liable to pay damages by way of compensation to the person soaffected.

  • 8/6/2019 08-Cyberlaw Assignment Final

    3/5

    PUNISHMENT FOR DISCLOSURE OF INFORMATION IN BREACH OF CONTRACT

    Section 72A has been inserted which specifically provides for punishment for disclosureofinformation in breach of a lawful contract. The punishment stipulated is imprisonment

    for a termwhich may extend to three years or fine which may extend to Rupees five lakhs or both.

    INTERMEDIARY LIABILITY & RESPONSIBILITIES

    The definition of an Intermediary used in the Act any person who on behalf of anotherperson receives, stores or transmits a record,includes telecom service providers,network service providers, internet service providers, web hosting service providers,search engines, online payment sites, online-auction sites, online market places andcyber cafes.

    Under modified Section 79 of the Act, an intermediary shall not be liable for any thirdpartyinformation, data or communication link hosted by it-if the function of the intermediary is limited to providing access to a communicationsystemover which information made available by third parties is transmitted or temporarilystored or-the intermediary does not initiate the transmission, select the receiver of thetransmission andselect or modify the information contained in the transmission

    The intermediary is liable if it fails to expeditiously remove or disable access to materialwhich is

    notified as being used to commit an unlawful act without vitiating the evidence in anymanner. As per Section 67C, intermediaries are required to preserve and retain certainrecords for a period tobe notified

    CYBERCRIMES

    Section 66A applies to sending offensive messages and covers any electronic mail forthe purpose of causing annoyance or inconvenience or to deceive or mislead. ThisSection will cover offences like Cyber Stalking and Phishing.This section to also coverSpamming.

    Use of or dealing with stolen computers or mobiles, is an offence under Section 66B

    Section 66C covers identity theft and covers fraudulent or dishonest usage of electronicsignature,passwords or unique identification features of any other person.

    Section 66E covers punishment for violation of privacy

  • 8/6/2019 08-Cyberlaw Assignment Final

    4/5

    Under Section 67, which continues to cover publishing and transmission of obsceneinformation inelectronic form, the fine has been increased to Rupees five lakhs for first instance andRupees tenlakhs for subsequent instances along with imprisonment of three years for first instanceand five yearsfor subsequent instance

    67A & 67B have been introduced to cover pornography with punishment ofimprisonment which may extend to five years in the first instance and seven years inthe secondinstance with fine which may extend to Rupees ten lakhs. This would be applicable forcases whereSexually Explicit content and Child Pornography is involved

    As per the provisions of Section 80, any police officer not under the rank of an Inspectoror any otherofficer authorized by the central government may enter any public place and searchand arrestwithout warrant any person who is reasonably suspected of having committed orcommitting or aboutto commit any offence under this Act.

    CYBER TERRORISM

    Section 66F and is termed Cyber Terrorism. Accordingly, whoever denies or access acomputer resource without adequate authorization or introduces or causes to introduceany computer contaminant with intent to threaten the unity, integrity, security orsovereignty of India or friendly relations with foreign states and causes death or injuryto person or damage or destruction to property shall be punishable with imprisonmentwhich may extend upto life.

    MONITORING PROVISIONSAs per Section 69, the central or state government may direct any agency to interceptor monitor ordecrypt information if its necessary to do so in the interest of the sovereignty orintegrity or thedefense of the nation or its friendly relations. Sections 69, 69A and 69Balso specify that procedures and safeguards will be prescribed in respect of how thesepowers areexpected to be exercised.

    CRITICAL INFORMATION INFRASTRUCTURE

    As per Section 70, appropriate government may declare any computer resource(destruction ofwhich shall have a debilitating impact on national security, economy, public health orsafety), to be aprotected system.

    The Government will also specify the persons who are authorized to access protectedsystems. Any person who secures access or attempts to secure access to a protected system incontravention of the provisions of this section shall be punished with imprisonment of

  • 8/6/2019 08-Cyberlaw Assignment Final

    5/5

    either description for a term which may extend to ten years and shall also be liable tofine.

    Cyberlaw is a term that summarize the legal issues related to use ofcommunicative,

    transactional, and distributiveaspects of networkedinformation devicesandtechnologies

    http://en.wikipedia.org/wiki/Communicationhttp://en.wikipedia.org/wiki/Communicationhttp://en.wikipedia.org/wiki/Transactionhttp://en.wikipedia.org/wiki/Transactionhttp://en.wikipedia.org/wiki/Distributionhttp://en.wikipedia.org/wiki/Distributionhttp://en.wikipedia.org/wiki/Information_devicehttp://en.wikipedia.org/wiki/Information_devicehttp://en.wikipedia.org/wiki/Information_devicehttp://en.wikipedia.org/wiki/Information_technologyhttp://en.wikipedia.org/wiki/Information_technologyhttp://en.wikipedia.org/wiki/Communicationhttp://en.wikipedia.org/wiki/Transactionhttp://en.wikipedia.org/wiki/Distributionhttp://en.wikipedia.org/wiki/Information_devicehttp://en.wikipedia.org/wiki/Information_technology