Cyber Laws
Cyber Laws
ON
April, 2023
1
Certificate
Asst. Professor
Jaipur
This is to certify that Ayushi Bugalia, student of semester X, has carried out Project titled
“Offences under IT Act” under my supervision. It is an investigation report of a minor
research project. The student has completed research work in stipulated time and according to
the norms prescribed for the purpose.
2
Acknowledgement
I have written this project titled “Offences under IT Act” under the supervision of Ms. Tanya
Agarwal Asst. Prof. of Rajasthan School of Law for Women, Jaipur. Her valuable
suggestions herein have not only helped me immensely in making this work but also
developing an analytical approach to this work.
I found no words to express my sense of gratitude for Principal Vartika Arora for constant
encouragement at every step.
I am extremely grateful to librarian and library staff of the college for the support and
cooperation extended by them from time to time.
Ayushi Bugalia
3
Table of Content
Certificate (2)
Acknowledgement (3)
Chapter-1 (7-9)
Introduction
Chapter-2 (10-20)
Offences under IT Act
Chapter-3 (21)
Conclusion
Bibliography (22)
4
Table of Cases
5
Objective of the Project:
The objective of this project is The Act was passed to deal with e-commerce and all the
intricacies involved with digital signatures and fulfill the following objectives. The Act seeks
to protect all transactions done through electronic means. E-commerce has reduced
paperwork used for communication purposes. It also gives legal protection to communication
and the exchange of information through electronic means. It protects the digital signatures
that are used for any sort of legal authentication. It regulates the activities of intermediaries
by keeping a check on their powers. It defines various offences related to data privacy of
citizens and hence protects their data. It also regulates and protects the sensitive data stored
by social media and other electronic intermediaries. It provides recognition to books of
accounts kept in electronic form regulated by the Reserve Bank of India Act, 1934.
Research Questions:
What are the offences under IT Act?
What is the background of the Act?
What is the applicability of the Act?
What are the objectives of the Act?
What are the various offences covered under IT Act 2000?
Research Methodology:
6
Chapter-1
Introduction
The introduction of the internet has brought the tremendous changes in our lives. People of
all fields are increasingly using the computers to create, transmit and store information in the
electronic form instead of the traditional papers, documents. Information stored in electronic
forms has many advantages, it is cheaper, easier to store, easier to retrieve and for speedier to
connection. Though it has many advantages, it has been misused by many people in order to
gain themselves or for sake or otherwise to harm others. The high and speedier connectivity
to the world from any place has developed many crimes and these increased offences led to
the need of law for protection. Some countries have been rather been vigilant and formed
some laws governing the net. In order to keep in pace with the changing generation, the
Indian Parliament passed the law --- Information Technology Act 2000. The IT Act 2000 has
been conceptualized on the United Nations Commissions on International Trade Law
(UNCITRAL) Model Law.
1
https://www.legalservicesindia.com/article/439/Offences-&-Penalties-under-the-IT-Act,-2000.html
7
Objectives of Information Technology Act, 2000
The Act was passed to deal with e-commerce and all the intricacies involved with digital
signatures and fulfill the following objectives:
The Act seeks to protect all transactions done through electronic means.
It protects the digital signatures that are used for any sort of legal authentication.
It defines various offences related to data privacy of citizens and hence protects
their data.
It also regulates and protects the sensitive data stored by social media and other
electronic intermediaries.
2
https://www.legalservicesindia.com/article/439/Offences-&-Penalties-under-the-IT-Act,-2000.html
8
5. Directions of Controller to a subscriber to extend facilities to decrypt information
6. Protected system
12. Confiscation
3
https://blog.ipleaders.in/information-technology-act-2000/
9
Chapter-2
Object:
The object of the section is to protect the “intellectual property” invested in the computer. It
is an attempt to protect the computer source documents (codes) beyond what is available
under the Copyright Law.
This section extends towards the Copyright Act and helps the companies to protect their
source code of their programmes.
10
Penalties: Section 65 is tried by any magistrate. This is cognizable and non- bailable offence.
Case Laws:
Facts: In this case it was declared that the FRIENDS application software as protected
system. The author of the application challenged the notification and the constitutional
validity of software under Section 70. The court upheld the validity of both. It included
tampering with source code. Computer source code the electronic form, it can be printed on
paper.4
Held: The court held that Tampering with Source code are punishable with three years jail
and or two lakh rupees fine of rupees two lakh rupees for altering, concealing and destroying
the source code.
Facts: In this case the Tata Indicom employees were arrested for manipulation of the
electronic 32- bit number (ESN) programmed into cell phones theft were exclusively
franchised to Reliance Infocom.
Held: Court held that Tampering with source code invokes Section 65 of the Information
Technology Act.
Facts: In this case several terrorist attacked on 13 December, 2001Parliament House. In this
the Digital evidence played an important role during their prosecution. The accused argued
that computers and evidence can easily be tampered and hence should not be relied.
4
https://blog.ipleaders.in/information-technology-act-2000/
11
In Parliament case several smart device storage disks and devices, a Laptop were recovered
from the truck intercepted at Srinagar pursuant to information given by two suspects. The
laptop included the evidence of fake identity cards, video files containing clips of the political
leaders with the background of Parliament in the background shot from T.V news channels.
In this case design of Ministry of Home Affairs car sticker, there was game “wolf pack” with
user name of ‘Ashiq’. There was the name in one of the fake identity cards used by the
terrorist. No back up was taken therefore it was challenged in the Court.
(1) Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or
damage to the public or any person destroys or deletes or alters any information residing in a
computer resource or diminishes its value or utility or affects it injuriously by any means,
commits hacking.
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with
fine which may extend up to two lakh rupees, or with both.
12
Cases Reported In India:
Official website of Maharastra government hacked. The official website of the government of
Maharashtra was hacked by Hackers Cool Al- Jazeera, and claimed them they were from
Saudi Arabia.5
Whoever publishes or transmits or causes to be published in the electronic form, any material
which is lascivious or appeals to the prurient interest or if its effect is such as to tend to
deprave and corrupt persons who are likely, having regard to all relevant circumstance, to
read see or hear the matter contained or embodied in it, shall be punished on first conviction
with imprisonment of either description for a term which may extend to five years and with
fine which may extend to one lakh rupees and in the event of a second or subsequent
conviction with imprisonment of either description for a term which may extend to ten years
and also with fine which may extend to two lakh rupees.
(2) On second conviction ---- imprisonment up to which may extend to ten years and Fine
which may extend up to two lakhs.
5
https://taxguru.in/corporate-law/offences-penalties-information-technology-act-2000.html
13
4. DASKHINA Kannada police have solved the first case of cyber crime in the district.
A press release by Dakshina Kannada Police said here on Saturday that a Father at a Christian
institution in the city had approached the Superintendent of Police with a complaint that he
was getting offensive and obscene e-mails. Police said that all the three admitted that they
had done this to tarnish the image of the Father. As the three tendered an unconditional
apology to the Father and gave a written undertaking that they would not repeat such act in
future, the complainant withdrew his complaint. Following this, the police dropped the
charges against the culprit. The release said that sending of offensive and obscene e-mails is
an offence under the Indian Information Technology Act 2000. If the charges are framed.
1.The Controller may, by order, direct a Certifying Authority or any employee of such
Authority to take such measures or cease carrying on such activities as specified in the order
if those are necessary to ensure compliance with the provisions of this Act, rules or any
regulations made there under.
(2) Any person who fails to comply with any order under sub-section (1) shall be guilty of an
offence and shall be liable on conviction to imprisonment for a term not exceeding three
years or to a fine not exceeding two lakh rupees or to both.
Explanation: Any person who fails to comply with any order under sub section (1) of the
above section, shall be guilty of an offence and shall be convicted for a term not less then
three years or to a fine exceeding two lakh rupees or to both. The under this section is non-
bailable & cognizable.
14
(2) The subscriber or any person in charge of the computer resource shall, when called upon
by any agency which has been directed under sub-section (1), extend all facilities and
technical assistance to decrypt the information.
(3) The subscriber or any person who fails to assist the agency referred to in subsection
(2) shall be punished with an imprisonment for a term which may extend to seven years.
1.The appropriate Government may, by notification in the Official Gazette, declare that any
computer, computer system or computer network to be a protected system.
(2) The appropriate Government may, by order in writing, authorize the persons who are
authorized to access protected systems notified under sub-section (1).
(3) Any person who secures access or attempts to secure access to a protected system in
contravention of the provision of this section shall be punished with imprisonment of either
description for a term which may extend to ten years and shall also be liable to fine.
Penalties: Punishment: the imprisonment which may extend to ten years and fine.
1.Whoever makes any misrepresentation to, or suppresses any material fact from, the
Controller or the Certifying Authority for obtaining any license or Digital Signature
Certificate, as the case may be, shall be punished with imprisonment for a term which may
extend to two years, or which fine which may extend to one lakh rupees, or with both.
6
https://www.indiacode.nic.in/bitstream/123456789/13116/1/it_act_2000_updated.pdf
15
Section 72. Penalty for breach of confidentiality and privacy
Save as otherwise provide in this Act or any other law for the time being in force, any person
who, in pursuance of any of the powers conferred under this Act, rules or regulation made
there under, has secured assess to any electronic record, book, register, correspondence,
information, document or other material without the consent of the person concerned
discloses such material to any other person shall be punished with imprisonment for a term
which may extend to two years, or with fine which may extend to one lakh rupees, or with
both.
Explanation: This section relates to any to nay person who in pursuance of any of the powers
conferred by the Act or it allied rules and regulations has secured access to any: Electronic
record, books, register, correspondence, information, document, or other material.
If such person discloses such information, he will be punished with punished. It would not
apply to disclosure of personal information of a person by a website, by his email service
provider.
Section 73. Penalty for publishing Digital Signature Certificate false in certain
particulars
1.No person shall publish a Digital Signature Certificate or otherwise make it available to any
other person with the knowledge that-
(a) The Certifying Authority listed in the certificate has not issued it; or
(b) The subscriber listed in the certificate has not accepted it; or
(c) The certificate has been revoked or suspended, unless such publication is for the purpose
of verifying a digital signature created prior to such suspension or revocation.
(2) Any person who contravenes the provisions of sub-section (1) shall be punished with
imprisonment for a term which may extend to two years, or with fine which may extend to
one lakh rupees, or with both.
16
Penalties: Punishment imprisonment of a term of which may extend to two years.
i. fraudulent purpose or
fraudulent purpose or
ii. unlawful purpose.
Section 75. Act to apply for offence or contravention committed outside India
(1)Subject to the provisions of sub-section (2), the provisions of this Act shall apply also to
any offence or contravention committed outside India by any person irrespective of his
nationality.
(2) For the purposes of sub-section (1), this Act shall apply to an offence or Contravention
committed outside India by any person if the act or conduct constituting the offence or
contravention involves a computer, computer system or computer network located in India.
7
https://www.indiacode.nic.in/bitstream/123456789/13116/1/it_act_2000_updated.pdf
17
Section 76. Confiscation
Any computer, computer system, floppies, compact disks, tape drives or any other
accessories related thereto, in respect of which any provisions of this Act, rules, orders or
regulations made there under has been or is being contravened, shall be liable to confiscation.
Provided that where it is established to the satisfaction of the court adjudicating the
confiscation that the person in whose possession, power or control of any such computer,
computer system, floppies, compact disks, tape drives or any other accessories relating
thereto is found is not responsible for the contravention of the provisions of this Act, rules
orders or regulations made there under, the court may, instead of making an order for
confiscation of such computer, computer system, floppies, compact disks, tape drives or any
other accessories related thereto, make such other order authorized by this Act against the
person contravening of the provisions of this Act, rules, orders or regulations made there
under as it may think fit.
Explanation: The aforesaid section highlights that all devices whether computer, computer
system, floppies, compact disks, tape drives or any other storage, communication, input or
output device which helped in the contravention of any provision of this Act, rules, orders, or
regulations made under there under liable to be confiscated.
No penalty imposed or confiscation made under this Act shall prevent the imposition of any
other punishment to which the person affected thereby is liable under any other law for the
time being in force.
8
https://www.lawctopus.com/academike/offences-act-2000/
18
Landmark judgments on Information Technology Act, 2000
In this case, 2 girls were arrested for posting comments online on the issue of shutdown in
Mumbai after the death of a political leader of Shiv Sena. They were charged under Section
66A for posting the offensive comments in electronic form. As a result, the constitutional
validity of the Section was challenged in the Supreme Court stating that it infringes
upon Article 19 of the Constitution.
Issue
Judgment
The Court, in this case, observed that the language of the Section is ambiguous and vague,
which violates the freedom of speech and expression of the citizens. It then struck down the
entire Section on the ground that it was violative of Article 19 of the Constitution. It opined
that the Section empowered police officers to arrest any person whom they think has posted
or messaged anything offensive. Since the word ‘offensive’ was not defined anywhere in the
Act, they interpreted it differently in each case. This amounted to an abuse of power by the
police and a threat to peace and harmony.
M/S Gujarat Petrosynthese Ltd and Rajendra Prasad Yadav v. Union of India
(2014)
Facts
19
Appointment of the chairperson of CAT.
Judgment
The Court ordered the appointment of the chairperson and must see this as a matter of
urgency and take into account Section 53 of the Act.
Facts
In this case, a suit was filed by a shoe company to seek an order of injunction against the
defendants for using its trademarks and logo.
Issue
Whether the protection of “safe harbour” under Section 79 of the Act be applied in this case?
Judgment
The Court in this case observed that the defendant was not an intermediary as their website
was a platform for the supply of various products. It used third-party information and
promoted vendors in order to attract consumers for them. The Court held that e-commerce
platforms are different from the intermediaries and the rights granted to them in Section 79 of
the Act. It ordered the intermediaries to work with due diligence and not infringe the rights of
the trademark owner. They must take steps to recognise the authenticity and genuineness of
the products while dealing with any merchant or dealer. The Court added that if the
intermediaries act negligently regarding IPR and indulge in any sort of abetment or
incitement of unlawful or illegal activity, they will be exempted from the protection of safe
harbour under Section 79 of the Act. Any active participation in e-commerce would also lead
to the same. It also referred to the intermediaries guidelines, which state that no intermediary
must violate any intellectual property rights of anyone while displaying any content on its
website.9
9
https://www.lawctopus.com/academike/offences-act-2000/
20
Chapter-3
Conclusion
Due to the increase in the digital technology various offences has also increased. Since new-
new technology come everyday, the offences has also increased therefore the IT Act 2000
need to be amended in order to include those offences which are now not included in the Act.
In India cyber crime is of not of high rate therefore we have time in order to tighten the cyber
laws and include the offences which are now not included in the IT Act 2000.
The Act is a step toward protecting the data and sensitive information stored with the
intermediaries online. It gives various provisions which benefit the citizens and protect their
data from being misused or lost. However, with the advancement of e-commerce and online
transactions, it is necessary to deal with problems like internet speed and security,
transactions that are struck, the safety of passwords, cookies, etc. Cyber crimes are increasing
at a great pace, and there is a need to have a mechanism to detect and control them.
21
Bibliography
Online Sources:
https://www.lawctopus.com/
https://www.indiacode.nic.in/f
https://taxguru.in/l
https://blog.ipleaders.in/
https://www.legalservicesindia.com/l
Books:
22