Cyber Laws Notes 1 To 5
Cyber Laws Notes 1 To 5
com
Acuity Educare
CYBER LAWS
SEM : VI
SEM VI : UNIT 1- 5
UNIT – 1
Page 1 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Chapter 1
Power of Arrest Without Warrant Under the IT Act, 2000
A Critique: Power of Arrest Without Warrant from a public place Under Section
80 IT (Information Technology) Act, 2000 is a tragedy and a comedy.
Our law makers need to go back to the basics of criminal laws.
Cyber Crime is the most deadliest crime harassing the planet in this
millennium.
A cyber-criminal can destroy:
o Websites & Portals by hacking and planting viruses
o Carrying out online frauds by transferring funds from one account to
another
o Gain access to highly confidential and sensitive information
o Cause harassment through email threats or obscene materials.
o Play tax frauds
o Indulge in cyber pornography involving children
o Commit innumerable other crimes on the internet.
o Cybercrimes such as hacking, planting viruses can and online
financial frauds can shake economies.
o February 6th, 7th and 8th 2000 were the darkest night of the
internet and e- commerce.
o Big websites like Yahoo, Buy.com, eBay, amazon.com and E-trade
Page 2 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
With the threat of increasing cyber criminality our legislature has inserted
Section 80 in the IT Act, 2000
Section 80 of IT Act is in the following terms :
“Power of police and other officers to enter search, etc.”
1. Notwithstanding anything contained in the Code of Criminal
Procedure, 1973(2 of 1974), any police offer, not below the rank of Deputy
Superintendent of Police or any other officer of the State Government or State
Government authorized by the central government in this behalf may enter any
public place and search and arrest without warrant in any person found therein
who is reasonably suspected of having committed or of committing or of bring
about to commit any offence under this act.
Explanation:
This section can be exercised only in Public place may refer to hotels, cyber
cafes, workspaces, shop or any place used by the public etc.
The person arrested by the officer without any unnecessary delay should take
or send the person arrested before the magistrate.
Also the power to enter and search and arrest without a warrant can be
exercised only on the grounds that the person is suspected to have
committed, or is committing about to committed the offense.
Page 3 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Page 4 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Process of Investigation
• Officer in charge of a police station may investigate the offence without the
concern of a magistrate falling under his jurisdiction.
• The officer-in-charge can proceed to the place of offense if he find any reason
to do so. Also he can send any subordinate of his for the same provided that :
• If the need is of serious nature
• If the officer-in charge feels that there is no sufficient grounds for investigating
the case he should not be sent.
• The investigating officer has to power to investigate attendance of persons
who appear to be involved.
• After completing the investigation, the police fires a challah/Charge sheet/
Police Report against the accused followed by prosecution evidence, defense
evidence, final arguments and judgments.
• In non-cognizable case, the complaint is filed in the court of Magistrate.
• On filing of the complaint, the magistrate uses his judicial mind for examining
the witnesses and is reduced to writing.
• This is known as preliminary evidence.
Page 5 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
• Any officer other DSP or lower ranking than the DSP should be able to arrest
the accused with the help of some technical expert from the field.
• Some of the crimes are not included in the IT Act 2000, has to be included
along with the help of some technical professionals and necessary amendment
should be made.
• Section 80 of IT Act, 2000 is also a replica of the colonial attitude of the State
towards the citizens of our country.
• Seeks to penalize citizens on any “about to commit” any offence under this act.
• Lawmakers might have borrowed this words from provisions such as section
216A inserted in the year 1984 into the Indian Penal code, 1860.
• Section 216A penalizes any citizen for about to commit crimes along with
seven years imprisonment.
• The word about in Black dictionary means:
o Substantially, approximately.
Page 6 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
• The words “having committed” refers to the act that the offence has been
committed
• The words “of committing” refers to the fact that the person is actually in the
act of committing the offence.
• The words “about to commit” refers to the fact that the offence had not yet
happened but is about to happen.
• So instead of making these three categories we can replace the section 80 as
“reasonably suspected of being concern
Page 7 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Chapter 2
Cyber Crimes and Criminal Justice: Penalties,
Adjunctions and Appeals Under the IT Act, 2000
• IT Act 2000 neither defines “Cyber Crimes” nor uses this expression
anywhere.
• It only provides the definition of, punishments for certain offences.
• In general there are two definitions of the word “cybercrime”.
• As per the offences covered in the IT ACT, 2000 the definition of cybercrimes
would be restricted to anything tampering with source code, hacking and cyber
pornography.
• Cyber fraud, defamation, harassment, email abuse and IPR theft, etc. would
not be included.
• So, cybercrime can be defined as an act of commission or omission,
committed on or through or with the help of or connected with, the internet,
directly or indirectly, which is prohibited by any law and for which punishment,
monetary and/or corporal is provided.
• Cybercrimes can be classified as:
o Old Crimes, committed on or through new medium of the internet.
For example : cheating, fraud, misappropriation, defamation,
pornography, threats etc. committed on the internet would fall under
this category. These crimes are old but their place of committing is
new and that is internet and hence these are called the crimes “on”
the internet.
o New Crimes with the internet itself, such as hacking, planting viruses
and IPR thefts.
These can be called as crimes “of” the internet.
o New crimes are used for the commission of old crimes. For
example, when hacking is committed to carry out cyber frauds.
• Computer Crimes are also classified on the basis of usage of
computers :
o Computer crimes proper, such as hacking where a computer and a
network are require.
o Computer assisted crimes such as pornography where the medium of
internet is used.
Page 8 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Hacking
• There are many definitions of hacking but only two definitions are used widely.
• The first definition refers to the hobby/profession of working with computers.
• This old definition is still used by computer enthusiasts who called cyber
criminals as crackers.
• Second and more commonly used definition of hacking refers to the breaking
into computer systems.
• Hackers have also classified as Code Hackers, Phreakers, Cyber-punks and
crackers.
• Code Hackers are those who have knowledge and intricacies of computer
systems and their operations.
• Phreakers have deep knowledge of the internet and telecommunication
systems.
• Cyber-punks specialized in cryptography
• Crackers are breakers into computer security systems.
Out of all cybercrimes, criminal hacking is the biggest threat to the Internet and
e- commerce.
weak.
• Ramphant hacking question technology and it needs to be checked every now
and then.
• Also in order to prevent a website form hacking is a costlier affair.
• Also the constant hacking can prevent people from entering into IT industry and
e- commerce industry.
• India has also become vulnerable to various hacking instances.
• Hacking is also used as weapons of protesting against governments
• Four types of hacking which are famous today :
o Hacking for fun as a hobby.
o To damage the business of computers
o With the intention of committing a further offence such as a fraud and
misappropriation
o By internet security companies to test their clients systems and win
confidence.
• Whoever with the intent to cause or knowing that he or she is likely to cause
wrongful loss or damage to the public or any person destroys or deletes or
alters any information residing in a computer resource or diminishes its value
or utility or affects it injuriously by any means, commits hacking.
• Whoever commits hacking shall be punished with imprisonment up to 3 years
or with fine up to 2 lakh rupees or even both.
Teenage Web Vandals: The motivating factors and causes of teenage cyber
criminality which are different from other teenage crimes such as drug abuse and
violence are:
• Fame and publicity here is global due to world wide access to the internet.
• Excitement of making a difference in to the world, i.e. a sense of achievement
and greatness.
• Use of knowledge of the internet and programming.
• Lack of sensitivity to the adverse consequences of the act of defacing or
hacking.
• An obsession with the internet and computer programming which is not
channelized properly.
• Lack of fear of the law and its reinforcement. It is considered as risk-free
adventure.
Page 10 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
• Cheap and easy availability of the weapons for committing hacking and
defacing websites
• There has been nearly 29% increase in the cyber crime rate in the past year.
• “Fraud” has not been defined in the IT Act, 2000.
• As per IPC, 1860 a person is said to be doing things fraduently if he wishes to
defraud or otherwise.
• The word defraud constitutes two elements : deceit and injury to the person
deceived.
• As per Section 17 of Indian Contract Act, 1872 : Fraud means and includes
any of the following acts committed by a party to a contract, or with his
connivance, or by his agent with intent to deceive another party thereto or his
agent, or to induce him to enter into contract :
o The suggestion, as a fact, of that which is not true, by one who does
not believe it to be true.
o The active concealment of a fact by one having knowledge or belief of
the fact
o A promise made without any intention of performing it.
o 4. Any other act fitted to deceive.
o 5. Any such act of omission as the law specially declares to be
fraudulent.
Cheating:
• All acts which amount to cheating would be fraud but the vice-versa may not be
true.
• Cheating has been defined in IPC section 415 as follows:
• “Whoever by deceiving any person, fraudulently or dishonestly
induces the person so declared to deliver any property to any
person, or to consent that any person shall retain any property or
intentionally induces the person so deceived to do or omit to do
anything which he would not do or omit if he were not deceived,
and which act or omission causes or is likely to cause damage
or harm to that person in body, mind, reputation or property, is
said to cheat.”
• A representation is made by a person which is false and which he knows is
false at the time of making the representation.
Page 11 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
• The false representation is made with the dishonest intention of deceiving the
person to whom it is made.
• The person deceived is induced to deliver any property or to do or omit to do
something which he would otherwise have not done or omitted.
Personation:
• When a person cheats a person by pretending him to be some other person
than he or she really is or knowingly substitutes one person to another, amount
to a cheating known as Personation.
• Punishment for Personation intends to imprisonment with three years term or
with fine or both.
• National Aeronautics and Space Administration
• Whosoever introduces or causes to be introduced any computer
contaminant or computer virus into any computer system or
computer network or computer is liable to pay damages by way
of compensation not exceeding rupees one crore to the person
affected.
• The factors for determining the compensation are: The amount of gain or
unfair advantage, the amount of loss to the victim and the repetitive nature of
the default.
• Computer virus has been defined as any computer instruction, information,
data or program that destroys, damages, degrades or adversely affects the
performance of a computer resource or attaches itself to another computer
Page 12 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
• A person who publishes a book, submits that book to the judgment of the
public.
• A person who makes a speech in public, submits that speech to the judgment
of the public.
• An actor or singer who appears on a public stage, submits his acting or singing
to the judgment of the public.
• A says of a book published by Z—"Z's book is foolish; Z must be a weak man,
Z's book is indecent; Z must be a man of impure mind". A is within the
exception, if he says this in good faith, in as much as the opinion which he
expresses of Z is regarding Z's character only so far as it appears in Z's book,
and no further.
• But if A says—"I am not surprised that Z's book is foolish and indecent, for he is
a weak man", A is not within this exception, in as much as the opinion which he
expresses of Z's character is an opinion not founded on Z's book.
• Passing in good faith by a person having authority over another, any censure
on the conduct of that other in matters to which such lawful authority relates.
For example, a judge censuring in good faith the conduct of a witness, would
fall under this exception.
• Accusations made in good faith against any person to any of those who have
lawful authority over that person with respect to the subject matter of the
accusation.
Page 14 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Page 15 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
circulation, or
b. takes part in or receives profits from any business in the course of which
he knows or has reason to believe
c. that any such obscene objects are, for any of the purposes aforesaid,
made, produced, purchased, kept, imported, exported, conveyed, publicly
exhibited or in any manner put into circulation, or
d. advertises or makes known by any means whatsoever that any person is
engaged or is ready to engage in any act which is an offence under this
section, or that any such obscene object can be procured from or
through any person, or
• offers or attempts to do any act which is an offence under this section, shall
be punished on first conviction with imprisonment of either description for a
term which may extend to two years, and with fine which may extend to two
thousand rupees, and, in the event of a second or subsequent conviction, with
imprisonment of either description for a term which may extend to five years,
and also with fine which may extend to five thousand rupees.
• Exception—This section does not extend to—
• any book, pamphlet, paper, writing, drawing, repre- sentation or figure— the
publication of which is proved to be justified as being for the public good on the
ground that such book, pamphlet, paper, writing, drawing, painting,
representation or figure is in the interest of science, literature, art or learning or
other objects of general concern, or
• which is kept or used bona fide for religious purposes;
Page 16 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
either description for a term which may extend to ten years and also with
fine which may extend to two lakh rupees."
• If any person having any of the powers conferred under the IT law, secures
access to any electronic record, book, register, correspondence, information,
document or other material, without the consent of the person concerned and
discloses the same to any other person, he shall be liable for the offence of
breach of confidentiality and privacy.
• However, where any law permits the aforesaid acts, it shall not amount to the
said offence of breach of confidentiality.
• A person who publishes a Digital Signature Certificate with the knowledge
that the Certifying Authority listed in the certificate has not issued it or the
subscriber listed in the certificate has not accepted it or the certificate has
been revoked or suspended, shall be liable with imprisonment for a term
which may extend to 2 years, or with fine up to Rs 1lakh, or with both.
Page 17 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
• However, where such publication is for the purpose of verifying the digital
signature created prior to suspension or revocation, the aforesaid acts would
not amount to a punishable offence.
• Any person who knowingly creates, publishes or otherwise makes available a
Digital Signature Certificate for any fraudulent or unlawful purpose, is liable to
be punished with imprisonment extending up to 2 years, or with fine extending
up to Rs 2 lakhs, or with both.
• The law also provides for confiscation of any computer, computer system,
floppies, compact disks, tape drives or other accessories connected with any
contravention of the IT law.
• In cases where the person from whose possession, power and control
any such computer, computer system, floppies, compact
o disks, tape drives or any other accessories are found, is not
responsible for the contravention of the law, then instead of
confiscation, the court has the power to pass such order as it may
think fit against the offender.
• The Information Technology Act, like many other laws, also provides that
where the person committing a contravention of the IT law is a company, then
every person who at the time of the contravention was in charge of, and was
responsible to, the company for the conduct of the business of the company
as well as the company, shall be guilty of the contravention and shall be liable
to be proceeded against and punished accordingly.
• However, if any officer of the company, proves that the contravention took
place without his knowledge or that he exercised all due diligence to prevent
the same, he shall not be liable.
• But where it is proved that the contravention has taken place with the consent
or connivance of, or is attributable to any neglect on the part of, any Director,
Manager, Secretary, or other officer of the company, such Director, Manager,
Secretary or other officer shall be deemed to be guilty and shall be liable to be
proceeded against and punished accordingly.
• "Company" has been defined to mean any corporate entity/body and also
includes a firm or other association of individuals.
• Accordingly, a Director in relation to a firm means a partner.
• It has been specifically provided in the IT law that penalties or confiscation
under the same, shall not prevent the imposition of any other punishment to
which the person accused is liable under any other law for the time being in
force.
• For example, the act of planting a computer virus besides being a
contravention of section 43 (c) of the IT Act, would also amount to the
commission of the offence of mischief under section 425 of the Indian Penal
Page 18 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Code, which is punishable with imprisonment for a term which may extend to
two years, or with fine, or with both.
• Monetary Penalties, Adjudication and Appeals under IT Act,2000
• Any person in charge of a computer, computer system or computer network
does any or of the following acts, he/she has to pay damages by the way of
compensation not exceeding Rs. 1 crore to the victim :
• (a)accesses or secures access to such computer, computer system or
computer network;
o downloads, copies or extracts any data, computer data, base or
information from such computer, computer system or computer
network including information or data held or stored in any removable
storage medium;
o introduces or causes to be introduced any computer contaminant or
computer virus into any computer, computer system or computer
network;
• (d)damages or causes to be damaged any computer, computer system or
computer network, data, computer database or any other program residing in
such computer, computer system or computer network;
o disrupts or causes disruption of any computer, computer system or
computer network;
o denies or causes the denial of access to any person authorized to
access any computer, computer system or computer network by any
means;
• (g)provides any assistance to any person to facilitate access to a computer,
computer system or computer network in contravention of the provisions of this
Act, rules or regulations made thereunder.
• (h)charges the services availed of by a person to the account of another
person by tampering with or manipulating any computer, computer system, or
computer network."
The following monetary penalties have been provided in the IT law for
non-compliance of certain requirements:
• Not exceeding Rs 1.50 lakh for every failure to furnish any document, return or
report to the Controller or Certifying Authority which is required to be furnished
under the IT law.
• Not exceeding Rs 5,000 for every day during which the failure to file any return
or furnish any information, books or other documents within a stipulated time
frame, continues.
• Not exceeding Rs 10,000 per day during which the failure to maintain books of
accounts or records as required continues.
Page 19 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
• As per section 75 of IT Act, 2000 it is clarified that the Act shall apply to an
offence or contravention committed outside India by any person if the act or
Page 20 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Page 21 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Page 22 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Page 23 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
would provide for restrictions on the grant of bail to the accused, penalize
journalists for having information about terrorists and shift the burden upon the
accused to prove his innocence. All these are against the settled principles of
criminal jurisprudence
• The trends towards deterrence by leaning towards conviction strictness in the
grant of bail and legislative measures, would have serious implications on
cyber-crime cases especially for those accused of committing cyber-crimes.
• Since many of the cyber-crimes cases such as hacking, planting virus, cyber
fraud or defamation are committed over several geographical areas would only
add to the delay in the investigation and trial of cyber-crimes.
• Witnesses being scattered over different and faraway lands leading to time-
consuming investigation and trial, trend towards conviction, strictness in the
grant of bail and the hype generated by the media over cyber-crimes, would
seriously prejudice those accused of cyber-crimes. Such under-trials are likely
to be the new victims of cyber-crime.
Page 24 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
UNIT – 2
Page 25 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Chapter 1
Contracts in the Infotech World
A party posts the terms and conditions on its web-site for selling
goods or rendering services and the consumer who is going to
buy the displayed goods or avail of the services, is required to
signify his acceptance of the terms and conditions either by
clicking an "I accept", "I agree" or a similar icon; or by typing "I
accept" or "I agree" or other specified words in an onscreen box
and then clicking a "Send" or similar button.
Since the parties do not physically come face to face with each other on the
Internet, click-wrap agreements are intended as a substitute in the online
environment.
Also, it would be very inefficient, if not impossible, for the web-site manager to
negotiate with each consumer who visits the web-site.
Page 27 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
The user should be expressly notified of the terms and conditions contained in
the click-wrap agreement.
The click-wrap agreement should be stated in a manner such that it can be
viewed before the option of acceptance or rejection is exercised. The click
options of "I agree" or "I accept", etc. should be placed at the end of the terms
of agreement.
A user may by mistake click the "I accept"/"I agree“ icon and to avoid such
mistaken acceptance, a confirmatory acceptance mechanism should be
prescribed.
This implies a two-step process, i.e. first the consumer would click "I accept"
and then the program should provide another icon such as "I confirm" as a
confirmation of the acceptance.
To avoid doubts, it should be specifically stated that for contract formation, the
confirmation/second click would be considered.
A user should be allowed to exit the process easily at any point of time.
Any person, who has ever purchased a box of software, is familiar with a
license agreement governing the purchaser's use of the software.
Generally, on the box containing the software, it is stated that the use of the
software is subject to the enclosed license agreement, which must be accepted
by the purchaser before using the software and if the terms are not acceptable,
the product should be promptly returned for a refund.
Inside the box, the license agreement is generally enclosed as a document and
recorded in the media (floppy or CD) for display on screen. For instance, the
On the box of Microsoft Windows 2000 Server OEM, the following is stated:
"WARNING: By opening this package you agree that you have
read and understood the Microsoft Corporation Distribution
Agreement affixed to this package and agree to its terms and
conditions."
The term has now become a shorthand for the license agreement displayed
when a software is first installed onto a computer system.
While the term "shrink-wrap contract" is new, the packaging and practice of
placing contracts inside boxes is not.
It has been a long-standing practice to enclose warranty cards and contract
terms inside boxes containing products other than software. These terms are
generally available for review only after the product has been bought, and
opened usually in a location distant from the point of sale.
Page 29 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Time:
1. Determination of the period of limitation for initiating litigation
2. Timely compliance of legal obligations and procedures
3. Evidentiary consequences.
Page 32 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
The Indian Contract Act, 1872 grants freedom to the transacting parties to
stipulate the terms and conditions they enter into.
The parties must ensure that the conditions are not void as per the Indian
Contract Act, 1872.
Agreements that are declared void under this act are as follows : Sections of
Indian Contract Act, 1872 which are considered as void
Page 33 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Page 34 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Chapter 2
Jurisdiction in the Cyber World
Challenges faced by the IT and the legal communities at the global level are:
The risk of web-sites facing litigation in foreign lands thereby causing them
extreme hardships
Inconsistent and harsh decisions of courts on the applicability of the law of
jurisdiction to the cyber world.
Every consumer on the map can be reached
Where the cause of action, wholly or in part, arises. (Section 20 Code of Civil
Procedure, 1908)
CAUSE OF ACTION:
Cause of action' means the fact or facts which give a person the right to seek
judicial relief.
It is a situation or state of facts which would entitle a party to sustain action and
give him the right to avail a judicial remedy.
Cause of action means the whole bundle of material which are necessary for
the plaintiff to prove in order to entitle him to succeed in the suit.
Everything which if not proved would give the defendant a right to immediate
Page 36 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Cause of action depends upon the place or places from where parties
communicate, interact, operate and transact with one another, sub-sections
(3), (4) and (5) of section 13 of the IT Act 2000 assume relevance in
determining the place of cause
of action.
i.e. where a fair hearing is not granted or the proceedings are biased, or
where the foreign judgement sustains a claim which is in breach of any Indian
law. (Section 13 of Code of Civil Procedure, 1908)
But making of an offer from a particular place does not form cause of action in
a suite for damages for breach of contract
If the contract is to be performed at the place where it is made, the suit of the
contract is to be filed there and nowhere else.
In suits for agency actions the cause of action arises at the place where the
contract of agency was made or the place where actions are to be rendered
and payment is to be made by the agent.
Page 38 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
This is, however, subject to two exceptions, i.e, a contract to refer the dispute
for arbitration and to abide by its award, and a contract which limits the
jurisdiction by agreement to one or more courts.
It has been held by the Supreme Court that an exclusion clause in a contract is
valid and lawful show as long it does not oust the jurisdiction of all the courts
which would otherwise have jurisdiction to decide the suit under the law.
In such cases, a nullity remains a nullity which can be declared so at any stage
of the litigation including appellate proceedings.
Page 39 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
UNIT – 3
Page 40 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Domain Name: -
Every computer on the Internet is assigned a unique address called Internet
Protocol Address (IP Address).
Cyber-Squatting:
• Cyber Squatting is registering, selling or using a domain name with the
intent of profiting from the goodwill of someone else's well known trademark.
• Cyber Squatting is defined as a malpractice where individuals use a domain
name reflecting the name of a prior existing company, intending to attain profit
from the goodwill of a Trademark already belonging to someone else.
• A cyber squatter identifies popular trade names, brand names trademarks or
even names of celebrities, and registers one or more of them in his name
with the malicious intent of extorting money from those who are
legitimately interested or associated with such domain names other motives
for cybersquatting include appropriation of goodwill, attraction of web traffic,
selling the domain names for a profit in the market, etc. Another cause of
frequent domain name dispute is the first-come-first serve principle adopted
for registration of domain names.
• At the time when a domain name is registered, no inquiry is made as to
whether it is in conflict with others' rights under the Intellectual Property law
• There are numerous ways of cyber-squatting. It can be done by obtaining a
Second Level Domain (SL.D) name registration of a well-known company or a
brand within a Top Level Domain (TLD).
• Example: A cyber squatter has registered radiff.com' (misspelling/slight
variation of rediff.com). Registration of slight variations/misspelling of others'
Page 41 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
marks or company names have become frequent. The Internet Corporation for
Assigned Names and Numbers (ICANN) administers the policy for domain
name system. Realizing the problem of cyber-squatting, on October 24, 1999,
ICANN approved its Uniform Domain Name Dispute Resolution Policy
(UDRP) and the accompanying Rules of Procedure, for the purposes of
resolving domain name disputes.
• Administrative Panel: The dispute resolution service providers have their
respective panels for dispute resolution, called Administrative Panel or
Arbitration Panel. An Administrative Panel is composed of one or three
independent and impartial persons appointed by the dispute resolution service
provider that is selected to administer the dispute in accordance with the
UDRP Policy and Rules of ICANN.
agreement between the registrant and the registrar a time of registration of the
domain name.
• By virtue of the domain name registration agreement, the registrant submits to
the jurisdiction of the domain name dispute resolution service providers
approved by ICANN to resolve domain name disputes under the UDRP and
the Rules of Procedure
• The ICANN Administrative Procedure is only available to resolve disputes
between a third party alleging an abusive registration of a domain name and
the domain name registrant.
The following grounds together constitute the cause invoking the UDRP :
The domain name of the registrant/respondents is identical or confusingly
similar to a trademark or service mark in complainant has rights and the
registrant / respondent has no rights or legitimate interests in respect of the
domain name and The domain name has been registered and is being used in
bad faith by the registrant / respondent.
The respondent-registrant has registered the domain name primarily for the
purpose of disrupting the business of a competitor By using the domain name,
the respondent-registrant intentionally attempted to attract, for commercial
gain, internet users to his web site or other online location, by creating a
likelihood of confusion with the complainant's mark as to the source,
sponsorship, affiliation, or endorsement of the respondent.
Page 43 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
META-TAGGING:
A process whereby a website owner places certain words on his web-site, so
that the site figures on search engine when a search of that particular word is
made.
A company's name or well-known trademark may be improperly used as a
meta-tag to divert an Internet user to another web-site.
Meta tags are codes contained within websites that provide a description of the
website.These tags are embedded in the source code of the website. They are
put so that search engines (e.g. google.com, yahoo.com, etc.) can accurately
identify what the websites relates to.
The description tag contains a description of the web page.
The keywords tag contains relevant associated keywords.
The philosophy behind the Internet is freedom of, and or, information.
The nature of the Internet permits free access to information. Netizens can
access, store, copy and transmit any information on the Internet and thus as a
natural consequence the internet should be free from the regime of
intellectual property.
The opposing school of thought argues that the Internet is just another
medium of communication, interaction and business; hence the regime of
intellectual property should apply as it does in the physical world Therefore,
the law of intellectual property has applied, and shall always apply to the
Internet.
The law of copyright in India is contained in the Copyright Act, 1957 and
applies to the physical and the cyber world.
Section 43(b) which is as follows, has been introduced into the IT Act 2000 so
as to take care of certain important aspects of intellectual property protection in
the electronic world.
"If any person without permission of the owner or any other person who is in
charge of a computer, computer system or computer network downloads,
copies or extracts any data, computer data base or information from such
computer, computer system or computer network including information or data
held or stored in any removable storage medium.
Page 45 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Page 46 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
public
iii) Issue copies of work to the public not
being copies in circulation
iv) To include the work in any
cinematograph film
v) To make adaptation of the work
Page 47 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Section 17 First owner of copyright : Subject to the provisions of this Act, the
author of a work shall be the first owner of the copyright therein : provided that
a) in the case of a literary, dramatic or artistic work made by the author
in the course of his employment by the proprietor of newspaper,
magazine or similar periodical under a contract of service or
apprenticeship, for the purpose of publication in a magazine or similar
periodical, the said proprietor shall in the absence of any agreement
to the contrary, be the first owner of the copyright in the work in so far
as the copyright relates to the publication of the work in any
newspaper, magazine or similar periodical, or to the reproduction of
the work for the purpose of its being so published, but in all other
respects the author shall be the first owner of the copyright in the
work.
b) Subject to the provisions of clause (a), in the case of a photograph
taken, or a painting or portrait drawn, or an engraving or a
cinematograph film made, for valuable consideration at the instance of
any person, such person shall, in the absence of any agreement to
the contrary, be the first owner of the copyright therein.
c) in the case of a work made in the course of the authors employment
under a contract of service or apprenticeship, to which clause (a) or
clause (b) does not apply, the employer shall, in the absence of any
agreement to the contrary, be the first owner of the copyright therein.
Page 48 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Section 18(2) in the Copyright Act, 1957: Where the assignee of a copyright
becomes entitled to any right comprised in the copyright, the assignee as
respects the rights so assigned, and the assignor as respects the rights not
assigned, shall be treated for the purposes of this Act as the owner of copyright
and the provisions of this Act shall have effect accordingly.
Section 19 in the Copyright Act, 1957 (1): No assignment of the copyright in any
work shall be valid unless it is in writing signed by the assignor or by his duly
authorized agent No assignment of the copyright in any work shall be valid
unless it is in writing signed by the assignor or by his duly authorized agent.
• The assignment of copyright in any work shall identify such work, and shall
specify the rights assigned and the duration and territorial extent of such
assignment
• The assignment of copyright in any work shall also specify the amount of
royalty payable, if any, to the author or his legal heirs during the currency of
the assignment.
• The assignment of copyright in any work shall identify such work, and shall
specify the rights assigned and the duration and territorial extent of such
assignment
• The assignment of copyright in any work shall also specify the amount of
royalty payable, if any, to the author or his legal heirs during the currency of
the assignment.
Page 49 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Page 50 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
ii. permits for profit any place to be used for the communication of
the work to the public where such communication constitutes are
infringement of the copyright in the work, unless he was no aware
and had no reasonable ground for believing that such
communication to the public would be an infringement of
copyright; or
vi. shall apply to the import of copy of any work, for the private
and domestic use of importer.
Section 63 in the Copyright Act, 1957 : Any person who knowingly infringes or
abets the infringement of the copyright in a work, or any other right conferred by
this Act, shall be punishable with imprisonment for a term which shall not be less
than six months but which may extend to three years and with fine which shall not
be less than fifty thousand rupees but which may extend to two lakh rupees
which may extend to three years and with fine of not less than 1 lakh rupees but
which may extend to 2 lakh
Section 64 in the Copyright Act, 1957:Any police officer, not below the rank of a
sub-inspector, may, if he is satisfied that an offence under section 63 in respect
of the infringement of copyright in any work has been, is being, or is likely to be,
committed seize without warrant, all copies of the work, and all plates used for
the purpose of making infringing copies of the work, wherever found, and all
copies and plates so seized shall, as soon as practicable, be produced before a
Magistrate.
Any person having an interest in any copies of a work seized under sub-section (1)
may, within fifteen days of such seizure, make an application to the magistrate
for such copies being restored to him and the Magistrate, after hearing the
applicant and the complainant and making such further inquiry as may be
necessary, shall make such order on the application as he may deem fit
Section 67 in the Copyright Act, 1957: Penalty for making false entries in
register, etc., for producing or tendering false entries.-Any person who,-
A. makes or causes to be made a false entry in the Register of Copyright
kept under this Act, or
Page 53 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Where it is proved that the offence was committed with the consent or connivance
of, or is attributable to any negligence of any director, manager, secretary or
other officer of the company, then notwithstanding the aforesaid, i.e. even if he
is not in charge of and responsible to the company for the conduct of its
business, such person(s) shall be deemed to be guilty of that offence.
Offences under the copyright law are to be tried by courts of the Metropolitan or
Judicial Magistrates, as the case may be
Page 54 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Cyber world too enjoys the protection of copyright law Web content which may
be in the form of text, graphics, audio or video files and the underlying
software program are all entitled to protection in accordance with section 43
(b) of the IT Act, 2000.
It is true that whenever an author posts any material on the Internet, it is done
with the intention that such material is read and thus the users have the right to
access/view/read the same. But this right cannot be extended to reproduction,
copying, or transmitting the material to others, unless specifically consented
or agreed to by the copyright owner.
The IT Act also provides the adjudication and appellate mechanism with
respect to the aforesaid violations.
The moment any of the works in which copyright may subsist [i.e. original
literary, dramatic, musical and artistic works; cinematograph films and sound
recording) is first created, i.e. embodied in any medium.
There is a general misunderstanding that displaying a copyright notice of
ownership is necessary.
No such notice is required by the law in India. However, it may be a good idea
to incorporate a copyright notice for creating a psychological impression and
as a reminder to the people concerned with the work, thereby deterring
infringementBy a disclaimer on a website, the creator of the same makes no
claim as to the copyright in the works posted on the web-site.
Page 55 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
• When a webpage is downloaded for the purposes of only viewing the same, it
does not amount to copyright infringement. Since the intent and purpose of
the user is to only view the webpage and since downloading only takes place
out of technical necessity, no question of infringement of copyright arises
• Downloading out of technical necessity for viewing / accessing a webpage is
technically distinguishable from storage on a hard-disk or on a floppy
• Whenever material is posted on to the Internet, it is done with the intention that
such material is read and viewed
• Hence, the legislature should clarify in the Copyright Act, 1957 that the
downloading which takes place out of technical necessity while viewing a web
page on the Internet, would not amount to copyright infringement
Hyper-Linking :
• Linking is one of the primary means through which Internet users can quickly
and conveniently navigate through the numerous web-sites on the Internet.
• Linking is a system which permits the user, who clicks on a specified location
on the linking site, to be automatically connected to the linked site. In simple
words, Hyperlink is a reference to a webpage or document on the Internet.
Linking can be categorized into surface-linking and deep-linking.
• Surface-linking automatically and directly takes the user from the linking site to
the first / home page of the linked site. Deep linking implies that the user is
linked directly into the interior pages of the linked site and not the home page
which is by passed.
Framing
URL and web page border from the originally accessed site appears within
this border.
Further users are not able to bookmark the target site, as the bookmark will
save the URL of the framer.
Infringement under the trademark law may thus be argued by the framed site.
In US, the copyright law has also been invoked against framing.
Framed companies may resort to claims under the law of torts and for unfair
trade practices under the MRTP Act, 1973.Framing can give rise to an action
for loss or dilution of advertising potential of a site. Since the target site is
framed, its advertising may get distorted or appear ineffectively small.
The purpose of copyright protection is "to assure authors the right in their
original expression, and to encourage others to build freely upon the ideas and
information conveyed by a work.
The copyright law protects original works of authorship fixed in any tangible
medium of expression", and grants to the copyright holder a set of exclusive
rights.
Page 57 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
The court analyzed the various elements needed for proving copyright
infringement. It does not matter that defendant may has been unaware of the
copyright infringement. Intent to infringe is not needed to find copyright
infringement.
The court held that a finding of direct copyright infringement requires some
element of direct action or participation in the infringing activities. The court
held that the Copyright Act is cast in terms of activities which are reserved to
copyright owners.
It follows that infringer must actually engage in one of those activities in order
directly violate the statute.
But the court noticed that the defendants' action of encouraging subscribers
to upload new pictures and of pre-screening the photographs were enough to
transform him from a passive provider exempt from liability to a participant in
the infringement.
• The court held that the liability for contributory copyright infringement arises
when, with the knowledge of the infringing activity, the party induces causes or
materially contributes to the infringing conduct of another The content
community saw the limitation on copyright infringement liability of ISPs.
ISPs should be made duty bound to help minimize online piracy and legal
obligation to monitor the users in order to check copyright infringement should
be imposed on them.
To settle the controversy over the liability of service providers such as ISPs,
OSPs and Search Engines, and for certain other matters, the Digital
Millennium Copyright Act (DMCA) was enacted in October 1998in the US.
The Act seeks to implement WIPO Treaties and limit the liability of
service providers for copyright infringement in certain instances. The part of
the Act which protects service providers is known as Online Copyright
Infringement Liability Limitation Act.
Page 59 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Napster And Its Cousins: A Revolution on the internet but a crises for
Copyright owners
The Napster program was originally a way for nineteen-year-old Shawn Fanning
and his friends throughout the country to trade music in the MP3 Format.
Fanning and his friends decided to try to increase the number of files available
and involve more people by creating a way for users to browse each other's
files and to talk to each other.
Napster went live in September 1999 and gained instant popularity. Napster's
number of registered users was doubling every 5-6 weeks. In February 2001,
Napster had roughly 80 million monthly users compared to Yahoo's 54 million
monthly users. At its peak Napster facilitated nearly 2 billion fle transfers per
month and had an estimated net-worth of between 60
-80 million dollars
When users would log onto their Napster account, MusicShare would read
the names of the MP3 files that the user had made public and would then
communicate with Napster's servers so a complete list of all public files from
all users could be compiled.
Once logged into Napster a user would simply enter the name of the file they
wanted to download and hit the search button to view a list of all the sources
that contained the desired file. The user would then click the download button
and the Napster server would communicate with the host's MusicShare
browser to facilitatea connection and begin the download. This method of file
sharing is referred to as peer-to-peer file sharing.
Napster sent shock waves in the music industry which responded by filing
lawsuits against Napster alleging copyright violation. It was argued by the
Music industry and its supporters that Napster is facilitating piracy and building
a business based on others copyrighted work without permission. It is alleged
on behalf of Recording Industry Association of America (RIAA) that most of
the music swapped using Napster's violates the copyright law. Several
Page 60 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Napster gave new artists a way to distribute and promote their music directly to
a huge community of fans worldwide.
On February 12, 2001, the United States Court of appeal held that Napster
was liable for least two of the copyright holder's exclusive rights .
Since Napster users can freely upload files onto the Napster server such that
any anonymous user can request for a file and procure a copy, it amounts to a
violation of the plaintiff's distribution rights. Copying on the user's computer
amounts to a violation of the right of reproduction. The court has held that the
Napster users are engaged in commercial use.
Also, Napster had led to reduction in CD sales It was held that Napster users
were directly infringing copyright and Napster was liable on the principle of
"contributory infringement.
• Loss of jobs
Higher costs to software industry and hence higher prices of software for
legitimate customers
• Loss of taxes
• Dampens the spirit to innovate and invest in the development of new software
Software Piracy is a lucrative business because :
• Software piracy can easily be concealed and hence there is difficulty for law
enforcement agencies to tackle it.
Page 62 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
UNIT – 4
Page 63 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Chapter 1
E-Commerce Taxation: Real Problems in the Virtual World:
• As per the Income Tax Act, 1961, an Indian resident is liable to be taxed on his
global income and a non-resident on his income which:
• is received or is deemed to be received in Indian; or
• Accrues or arise or is deemed to accrue or arise to him India.
o In cross – border commerce, the principle may lead to double taxation
of a person .For instance, if A, a resident of country X earns business
income in country Y be taxed twice ,i.e.in both the said countries.
• To avoid such double taxation of the same transaction in different countries
the system of Double Taxation Avoidance Agreements (DTAAs) has been
evolved, in which the principle of Permanent Establishment (also called as
PE) has been incorporated
o A permanent establishment is most often defined as place of
management, an office a, factory a workshop, a mine quarry or other
place of extraction of natural resources, or a building site or assembly
project which exists for more than a certain period (6 to12 months)
o There are two models of tax treaties which serve as a agent or
permanent representative.
• There are two models of tax treaties which serve as a guide for DTAAs.
These are:
1. OECD Model Treaty
2. United Nations Model Treaty.
The Concept of PE under the OECD Model Treaty:
• PE is a fixed place of business in a country or a dependent agent in a country
who the authority to enter into contracts on behalf of the assesse and who
habitually exercises such authority.
A permanent establishment is most often defined as place of management, an
office a, factory a workshop, a mine quarry or other place of extraction of
natural resources, or a building site or assembly project which exists for more
than a certain period (6 to12 months)
Page 64 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
• There are two models of tax treaties which serve as a agent or permanent
representative.
Article 5 excludes the “use of facilities solely for the purpose of storage,
display or delivery of goods.” Therefore, the mere existence of a warehouse in
the source country would not constitute a PE there.
Page 65 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Web-site as a PE?
Paragraph 4 of the Commentary to Article 5 defines the term "place of
business" to cover any premises, facilities or installations u0sed for carrying on
the business of the enterprise, whether or not they are used exclusively for that
purpose.
Therefore, permanent establishment refers to a geographical place of
business. However, since a web-site by itself is a combination of software and
electronic data, it does not fit into the concept of permanent establishment. It
may be stated that a web-site by itself cannot constitute a permanent
establishment because it does not have any physical presence with reference
to a geographical place.
complexity in determining the tax jurisdiction. The OECD has been working
inter-alia on the issue of whether the web server can serve as a PE
Under the UN Model, agents who merely deliver goods for the non-resident
enterprise qualify as permanent establishment. The UN Mode Treaty holds an
agent to be a permanent establishment not only if he is dependent on the
company, but also if he is independent but all or most of his work is done for
the company. The OECD Model, in contrast, would not find a permanent
establishment by an agent, simply delivers goods, or when the agent is
independent.
Page 68 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Page 70 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Tax Agents of Non-Residents under The Income Tax Act, 1961 And
The Relevance To E-Commerce
Page 71 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
If a publisher acquires the right to download and use copyrighted material for his
publication, then the payments made by him would be characterized as royalty
o Online customer supports such as installation advice and troubleshooting
information have become common feature.
o This can be done by online technical documentation, a troubleshooting
database and even by e- mail with a human interface.
o It has been agreed by TAG (Technical Advisory Group) members that
payment is such a situation would be in the nature of FTS (Fees for Technical
Services).
o Payment for advertisement has been characterized as business profits. Web-
based advertising is gaining popularity these days and is likely to be a major
profitable activity in the cyber world in future also.
o TAG has also visualized professionals such as lawyers, doctors, etc providing
advice to client via e-mail, video conferencing, etc. It has been unanimously
agreed new name universally a great that Income in the hands of these
professionals would be in the nature of business profits.
o Income from search and retrieval facilities of general online information and
data has also been characterized as business profits. However, if the data
made available is tailored according to the needs of the user there is an
element of research and application of specialized skills, it should be treated
as FTS (Fees for Technical Services)
o If a website operator places a content provider for the right to display his
copyrighted material, the income accruing to the content provider is in the
nature of royalty. However, where the content providers are
o paid for creation of new content and the web operator becomes the owner of
such content and the web operator becomes the owner of such content, the
income accruing to the content provider should be classified as business
profits.
o TAG has also considered the issue as to the nature of income derived from
subscription-based interactive access to websites. The web-site operator
features digital content including information, music albums, video games,
etc. on the web-site, for which the registered user plays a fixed periodic fee
for access to the interactive site. Subscriptions are paid for availing of
services. Subscription payments should be treated as business income.
o Where the service provider offers space on its server for hosting the web-
sites, such a service provider does not obtain any right in the
copyright created by the developer on the content of the web-site. The
payment is made for renting space on the server and its time based in
nature. The transaction is done in the course of business of the service
provider in offering space on his server. TAG has recognized that such
payments should normally be considered as business income.
Page 72 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
o Although our Income Tax Act, 1961 contains the mechanism of taxing non-
residents, it would be of no good in the e-commerce environment
present PE concept in tax treaties. Our tax policy makers should not be
swayed by the views of OECD working groups and others. These views may
be considered but it would be fatal to follow them blindly. The tax policies
should be fair, just and practically workable.
Page 73 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Page 74 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Page 75 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Technology Software
Earlier the exemption from customs duty was restricted, as is apparent from
their entry in General Exemption No. 121(Notification No. 23/98 –Cus, dated
2.6.98) shown in the following table :
Page 76 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Table:
(General Exemption
No. 36A) plotter, scanner, monitor, keyboard and storage unit received by a
school.
Notification No.
amended by No
71/2000 – Cus dated
22.5.2000(General
Page 77 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Even under the Income Tax Act, 1961, certain tax reliefs have been granted
to the IT sector. For instance, under section 80HHE of the Tax Act, 1961,
deduction of the profits derived from the business has been granted to an
assessee being an Indian company or a person (other than a company)
resident in India. These are :
Export out of India of computer software or its transmission from India to a place
outside India by any means Providing technical services outside India in
connection with the development or production of computer software.
Subject to the stipulated conditions, section 10A of the Income Tax Act, 1961
grants to deduction from the total income of the assessee, of such profits and
gains as are derived by an undertaking from the
export of articles or things or computer software, for a period of ten consecutive
assessment years beginning with the assessment year relevant to the previous
year which the undertaking begins to
manufacture of produce such articles or things or computer software, as the
case may be.
Section 10B of the Income Tax Act, 1961 grants a deduction from the total
income of the assessee of such profits and gains as are derived by a 100%
export-oriented undertaking from the export of articles or things or computer
software for a period of ten consecutive assessment years beginning with
the assessment year relevant to the previous year in which the undertaking
begins to manufacture of produce articles or things or computer software, as
the case may be.
Tax holidays under sections 10A and 10B have recently been extended to IT
Enabled Services also, by the Government of India, which has been
Page 78 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Page 79 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Chapter 2
Digital Signatures, Certifying Authorities & E- Governance.
DIGITAL SIGNATURES:
The Information Technology Act 2000 (IT Act) prescribes digital signatures as
a means to authenticate the document, to identify the person to the contents of
the document binding to person putting digital signature
A digital signature is a mathematical scheme for demonstrating the authenticity
of a digital message or document
A valid digital signature gives a recipient reason to belive that the message
was created by known sender, and that is not altered in transit.
Digital Signatures are based on public key encryption. The Functioning of DS is
based on public key cryptography.
Refers to a cryptographic system requiring two separate keys, one of which is
secret and one of which is secret and one of which is public. Although
different, the two parts of key pair are mathematically inked .
One key locks or encrypts the plain text, and the other unlocks or decrypts the
cipher text Neither key can perform both functions. One of these keys is
published or public, while the other is kept Private.
It can also assure the recipient of the authenticity of a document because a
private key can be used to encode a message that only public key can
decode.
Since public key encryption is slow and time consuming the hash function is
used to transform a message into a unique the hash function is used to
transform a message into a unique shorter fixed length value called the hash
result
*Hash serves the purpose of an index of the original text it is an algorithm
mapping or translation of
One sequence into another .The hash function is such the same hash result is
obtained every time that hash function is used on the same electronic record.
*In other words mapping is one and not many to one. One cannot reconstruct
the original message from the hash result. The encryption of a hash result pf
the message with the private key of the sender is called a digital signature.
Page 82 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
UNIT – 5
Page 85 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Chapter 1
The Indian Evidence Act of 1872 v. Information
Technology Act, 2000
The Indian Evidence Act of 1872 vs. Information Technology Act, 2000
As per Section 3 of Indian Evidence Act, 1872 Evidence means and includes:
ii) All documents produced for the inspection of the court such
documents are called documentary evidence.
Page 86 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Even section 39 and 131 of the Indian Evidence Act has been substituted
vide the IT Act, 2000. The basic modification in these provisions is also
the introduction of electronic records alongside documents. The
following are illustrations of documents:
Writing
A map or plan
A caricature is a document
Page 88 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Section 32
Cases in which statement of relevant fact by person who is dead or cannot be found,
etc., is relevant - Statements, written or verbal, of relevant facts made by a person
who is dead, or cannot be found, or who has become incapable of giving evidence,
or whose attendance cannot be procured, without an amount of delay or expense
which under the circumstances of the case appears to the Court unreasonable, are
themselves relevant facts in the following cases :
When the statement was made by such person in the ordinary courses of business,
and in particular when it consists of any entry or memorandum made by him in
books kept in the ordinary course of business, or in the discharge of professional
duty; or of an acknowledgement written or signed by him of receipt of money,
goods, securities of property of any kind, or of a document used in commerce written
or signed by him; or of the date of a letter or other document usually dated, written or
signed by him
proving the original electronic record, the following conditions stipulated in sub-
section (2) of section 65B ought to be satisfied
c) throughout the material part of the said period, the computer was
operating properly or, if not, then in respect of any period in which it
was not operating properly or was out of operation during that part of
the period, was not such as to affect the electronic record or the
accuracy of its contents; and
Page 90 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
All the computers used for that purpose during that period shall be treated
for the purposes of this section as constituting a single computer and
references in this section to a computer shall be construed accordingly.
Page 91 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
"Facts in issue" means and includes any fact from which, either by itself or in
connection with other facts, the existence, non-existence, nature or extent of
any right, liability or disability, asserted or denied in any suit or proceedings,
necessarily follows: (Section 3 of the Indian Evidence Act, 1872).
A fact is said to be relevant to another when they are so connected with each
other as provided in the Indian Evidence Act, 1872. Chapter Il of the Indian
Evidence Act, 1872 contains provisions pertaining to relevancy of facts.
Page 92 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
17 Admission defined
Page 93 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Two new sections have been introduced by the IT Act, 2000 into the aforesaid
family of provisions pertaining to relevancy in Chapter II of the Indian Evidence
Act, 1872.
"22A. When oral admissions as to contents of electronic records are relevant.-
Oral admissions as to the contents of electronic records are not relevant,
unless the genuineness of the electronic record produced is in question".
"Fact" under section 3 of the Indian Evidence Act means and includes :
-Anything, state of things, or relation of things capable of being perceived by
the senses.
- Any mental condition of which any person is conscious. In terms of the
definition of "fact", contents of a document can be classified as the contents of
a document, as a fact by itself, and The event, i.e. state of things, etc. in the
contents.
"60. Oral evidence must be direct- Oral evidence must, in all cases whatever,
be direct, that is to say
b) any other person to apply the public key listed in the Digital Signature
Certificate and verify the digital signature purported to have been
affixed by that person.
When the Court has to form an opinion as to the digital signature of any
person, the opinion of the Certifying Authority which had issued the Digital
Signature Certificate, is a relevant fact. (Sec. 47A of the Indian Evidence Act,
1872 and as stated in clause 7 of the Second Schedule of the IT Act, 2000).
b) Any other person to apply the public key listed in the Digital Signature
Certificate and verify the digital signature purported to have been
affixed by that person.(Sec. 73A of the Indian Evidence Act, 1872
introduced by the IT Act, 2000
Section 85 C of the Indian Evidence Act as introduced by the IT Act, 2000 says
that if the Digital Signature Certificate has been accepted by the subscriber, the
Court shall presume, unless the contrary is proved, that the information listed
in a Digital Signature Certificate is correct, except information specified as
subscriber information which has not been verified.
A special legal status has been granted in favor of secure digital signatures.
Where a security procedure agreed to between the parties has been applied
from which it can be verified that a digital signature at the time when it was
affixed, was unique to the subscriber affixing it capable of identifying such
subscriber
Page 97 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
The IT Act has amended The Banker's Books Evidence Act to confer equal status
on electronic records as compared to paper based documents. If a "certified
copy" of printouts of bankers' books has to be given, then such printouts must
be accompanied by three certificates Section 2A has been inserted in the
Bankers Books Evidence Act,1891
Page 98 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
g) the safeguards to prevent and detect any tampering with the system
h) any other factor which will vouch for the integrity and accuracy of the
system.
Page 99 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
Chapter 2
Protection of Cyber Consumers in India
"Service" has been widely defined to mean service of any description which is
made available to potential users and includes the provision of facilities in
connection with banking, financing. Insurance transport, processing, supply of
electrical or other energy, boarding or lodging or both, housing, construction,
entertainment, amusement the purveying of news or other information, but
does not include the rendering of any service free of charge or under a
Page 100 of 102
YouTube - Abhay More | Telegram - abhay_more
607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
TRAINING -> CERTIFICATION -> PLACEMENT BSC IT : SEM - VI : CYBER LAW U1 - U5
The officers implementing the Registration Act and Stamp Act do not render
any service under the Consumer Protection Act as they perform
statutory duties to raise and collect State revenue which is a part of a
sovereign power of the State
All retailers and service-providers based outside India, operating through the
Internet or otherwise, are liable under CPA for defective goods or deficient
services if they sell goods or provide services to consumers in India
The goods are sold or services are provided to the consumer in India.