Cyber Laws
Cyber Laws
i
Published by
Mittal Publication
This book has been published with all reasonable efforts taken to make the material
error-free after the consent of the respective authors. No part of this book shall be
used, reproduced in any manner whatsoever without written consent from the
editors, except in the case of brief quotations embodied in critical articles and
reviews. The author of this book is solely responsible and liable for its content.
Price : Rs.600.00/-
ii
PREFACE
It gives us immense pleasure and satisfaction to present the first edition of ‘New Technology
Laws With Special Reference to Cyber Laws’. Cyber Law & Technology are terms used to
describe the legal issues pertaining to the use of technologies in the field of ‘Banking’,
‘Digital world’, ‘Commerce’, ‘Intellectual Property Rights’, ‘Medical’ and ‘Pharmacy’.
This text book aims to be useful to both undergraduate and postgraduate students from a wide
variety of disciplines, including criminology, psychology and information technology.
Because of the diversity of backgrounds of potential readers, this book presumes no prior
knowledge of either the psychological or technological aspects of cybercrime – key concepts
in both areas are defined as they arise in the chapters that follow. The chapters consider
research that has been conducted in each area, but also apply psychological theories and
models to each type of cybercrime. The chapters also consider many aspects of each
cybercrime – they do not simply consider the offender, but also effects on the victims, suitable
punishments, potential preventative measures and comparisons to similar offline offences.
Most chapters stand alone, so it is possible for the reader to dip in to any point in the book.
We hope that you enjoy reading this book as much as we enjoy researching this evolving and
cutting-edge topic.
iii
Overview of the book
Subject matters of this book has been organized in ten chapters. First chapter deals with the
concept of Cyber Law in India. It covers the salient features of the Information Technology
Act, 2000 with the special reference to ‘Cyber Appellate Tribunal’. Chapter two covers the
various kinds of cyber crimes with the penalties under the laws. This chapter considers crimes
that can occur without computers but that have become more prevalent or easier because of
technology – such as copyright infringement, fraud, identity theft, terrorism, bullying,
stalking, child pornography and sexual predation of children. Chapter three basically deals
with the new concept of digital personal data protection in India. Chapter four consist with the
E-Commerce and online contract system. Chapter five highlight the E-Banking system in
India and Chapter six online security offerings.
Chapter seven introduce the reader to the key concepts involved – specifically IP Rights and
related issues. Chapter eight and nine covers the use of technology in the field of the
broadcasting and medical science. Chapter ten covers the E- pharmacy concept in India.
This text has been designed as per the syllabus of the various Universities throughout India.
We are fully confident that the book would prove useful to the students of Under graduation,
Post graduation and beneficial for the research scholars as well as professionals.
Certainly no book can be completed without active cooperation and appreciation of colleagues
and friends. We would like to place on record our sincere thanks to all friends. We express our
gratitude to our family members for their constant support and understanding without which
this project would never have been completed.
This book would not have taken its present shape without the continuous support and
encouragement from the editorial and production team of Mittal Publications.. We hope the
readers will enjoy reading the book as much as we enjoyed writing it. Though all possible care
has been taken to avoid errors, we would be thankful if errors and misprints are pointed out by
learned teachers and students.
iv
CONTENTS
v
2. CYBER OFFENCES & PENALTIES 32
• Introduction
• Structure of the Information Technology Act, 2000
• Cyber Offences and Penalties under the Information
Technology Act, 2000 as amended in 2008
• Tampering with computer source documents
• Punishment for sending offensive messages through
communication service, etc.
• Punishment for dishonestly receiving stolen computer
resource or communication device
• Punishment for identity theft
• Punishment for cheating by personation by using
computer resource
• Punishment for violation of privacy
• Punishment for Cyber Terrorism
• Punishment for publishing or transmitting obscene
material in electronic form
• Punishment for publishing or transmitting of material
containing sexually explicit act etc. in electronic form
• Punishment for publishing or transmitting of material
depicting children in sexually explicit act etc. in
electronic form
• Transmission of electronic message and
communication
• Commentary on the powers to intercept, monitor and
block websites
• Penalty for misrepresentation
• Penalty for breach of confidentiality and privacy
• Punishment for disclosure of information in breach of
lawful contract
• Penalty for publishing Electronic Signature Certificate
false in certain particulars
• Publication for fraudulent purpose
• Act to apply for offence or contravention committed
outside India
• Cyber Offences and Penalties and Punishments
• Legislations in other nations
vi
3. DIGITAL PERSONAL DATA PROTECTION IN INDIA 50
• Need for data protection laws
• When can the government interfere with data
• Scope of the Act
• Objectives of the Act
• Salient features of the Act
• Major amendments in legislation
• Development of data protection legislations in India
• Digital Personal Data Protection Bill (DPDP Bill,
2022)
• Key Features of The DPDP Act, 2023
• New Regulatory Structure for Regulating Data Privacy
5. E-BANKING
• Introduction 98
• Different types of online financial transactions
• Issues in Internet Banking
vii
• Threats to Mobile Banking
• Best Practices for Users to remain safe
• The legal structure of e-banking in India
• Security Standards Of RBI
8. BROADCASTING
• Introduction 145
• Radio Services
• Foreign Investment
A- REGULATION AND CONTROL OF BROADCASTING
B-LAW RELATING TO CABLE TV NETWORK
viii
9. GENETIC AND MEDICAL TECHNOLOGIES
167
A- REGULATION OF GENETIC TECHNOLOGY
B- RULES AND REGULATIONS OF MEDICAL
TECHNOLOGY
10. E-PHARMACY & TECHNOLOGIES 181
ix
x
CHAPTER 1
1
Information Technology Act, 2000, Preamble
2 | New Technology Laws With Special Reference To Cyber Laws
recognizing electronic records ie the data what is stored in a computer or an external storage
attached thereto. The United Nations Commission on International Trade Law (UNCITRAL)
adopted the Model Law on e-commerce in 1996. The General Assembly of United Nations
passed a resolution in January 1997 inter alia, recommending all States in the UN to give
favourable considerations to the said Model Law, which provides for recognition to electronic
records and according it the same treatment like a paper communication and record. The
Information Technology Act 20002, which was passed and revised in 2008 to cover many
types of offenses under Indian cyber law, has been in effect since the establishment of cyber
laws in India. This Act is based on the Resolution A/RES/51/162 adopted by the General
Assembly of the United Nations on 30th January, 1997 regarding the Model Law on Electronic
Commerce earlier adopted by the United Nations Commission on International Trade Law
(UNCITRAL) in its twenty ninth session3.
UNCITRAL’s Model Law on Electronic Commerce but it also unfolds various aspects of
information technology to promote efficient delivery of Government services by means of
reliable electronic records.
The question is weather UNCITRAL’s Model Law on Electronic Commerce cold be used as
an external aid to interpret various provisions of the Act? One has to be careful in using
external aid , like the Model Law to interpret the legislative intent behind the Act.
It was held by the Supreme Court in Konkan Rialway Corporation Ltd. v. Rani Construction
(P) Ltd. 4,
“That the UNCITRAL Model Law (on International Arbitration ) was only taken into account
in the drafting of the Arbitration and Conciliation Act, 1996 is patent from the statement of
objects and reasons of the Act. The Act and the Model Law are not identically drafted”…..
“the Model Law and judgments and literature thereon are, therefore, not a guide to the
interpretation of the Act…”
It is important to understand that while enacting the Information Technology Act, 2000, the
legislative intent has been two fold, over that the enactment of such a nature should not ignore
the national or municipal perspective of information technology and two that the enactment to
have an international perspective as advocated by the said Model Law.
Advantages of Cyber Laws
Following are the major advantages of cyber law
• Utilizing the legal framework, the Act provides, businesses can now conduct e-
commerce.
2
Information Technology Act, 2000
3
The UN General Assembly by its resolution 2205 (XXI)of 17 December, 1966 created United Nations
Commission on International Trade Law (UNCITRAL) with a mandate to further the progressive
harmonization and unification of the law of International trade and in that prospect to bear in mind
the interests of all people, in particular these of developing countries in the extensive development of
international trade by adopting Model Laws of different genre.
4
(2002) 2 SCC 388
3 | New Technology Laws With Special Reference To Cyber Laws
• In the Act, digital signatures have been given legitimacy and authorization.
• It has made it possible for corporate organizations to issue digital signature certificates
and operate as certifying authorities.
• It paves the way for e-government by enabling the government to publish alerts
online.
• It allows businesses or organizations to electronically submit any forms, applications,
or other documents to any offices, authorities, bodies, or agencies that are owned or
managed by the appropriate government using any e-forms that may be specified by
that government.
• The IT Act also addresses the crucial security concerns that are essential to the
success of electronic transaction.
Historical Background
On October 17, 2000, the Information Technology Act of 2000 went into effect. This Act is
applicable to all of India, and its provisions also apply to any violation or offense committed
by any individual, regardless of nationality, even outside the Republic of India's territorial
authority. Such an offense or contravention shall include a computer, computer system, or
computer network located in India that is subject to the provisions of this Act. The
extraterritorial applicability of the provisions of the IT Act 2000 is provided by Section 1(2)
read in conjunction with Section 75 5 . Moreover, the Act further amends the Indian Penal
Code, 1860, The Indian Evidence Act, 1872, the Banker’s Books Evidence Act, 1891 and the
Reserve Bank of India Act, 1934.
The Information Technology Act of 2000 in India has made an effort to include legal ideas
found in other information technology-related laws that have already been passed in other
nations as well as different information technology law-related guidelines. The Act recognizes
electronic signatures and grants electronic contracts legal validity. Defamation (sending
offensive communications), hacking, data theft, virus spreading, identity theft, pornography,
child pornography, and cyber terrorism are now all considered crimes under this modern
legislation.
Cyber laws cover the following statutes, rules, and guidelines.
• Information Technology Act,2000
• Information Technology (Certifying Authorities) Rules,2000
• Information Technology (Security Procedure) Rules, 2004
• Information Technology (Certifying Authority) Regulations, 2001
• The Indian Evidence Act, 1872
• The Bankers Books Evidence Act, 1891
5
Information Technology Act, 2000, Section 2 r/w Section 75
4 | New Technology Laws With Special Reference To Cyber Laws
The government has moved to expedite the process of updating the IT Act as a result of
emerging technology, an explosion in digital business models, and a significant rise in
cybercrime.
By providing the necessary inputs, the computer or data itself serves as the victim, the object
of the crime, or a tool in committing another crime in a cybercrime. All of these criminal
activities fall under the broad concept of "cybercrime."
Cyber law includes regulations on
• Online crimes
• Digital and electronic signatures
• Intangible assets
• Preserving the privacy of data
Areas of Cyber Laws
There are seven areas where cyber law used most −
• Fraud − Cyber laws are essential to consumers' protection against online fraud.
Legislation is created to stop online financial crimes, including credit card theft,
identity theft, and others. Identity thieves may be charged as accomplices or as state
criminals. They might also run into a victim-driven civil lawsuit. Cyber attorneys
work to both defend and prosecute clients accused of online fraud.
• Copyright − Copyright violations have become easier because of the internet.
Copyright infringement was all too common in the early days of online
communication. To file a lawsuit to impose copyright protections, businesses and
individuals both need lawyers. Cyber law defends people's and businesses' rights to
make money off of their creative works in the domain of copyright violation.
• Defamation − Many employees use the internet to express themselves. Using the
internet to spread untrue information might cross the line into defamation. Laws
against defamation are civil laws that protect people from false public statements that
might hurt someone's reputation or a business. Defamation legislation refers to when
individuals use the internet to make claims that are illegal under civil laws.
• Harassment and Stalking − Criminal laws that prohibit stalking and harassment can
occasionally be broken by online words. There is a violation of both civil and criminal
statutes when someone repeatedly posts threatening comments about another
individual online. When stalking occurs online or through other electronic
communication, cyber lawyers both prosecute and defend the victim.
• Freedom of Speech − An essential component of internet law is freedom of speech.
Freedom of speech rules also let people express their opinions, despite the fact that
cybercrime laws prohibit specific acts online. The boundaries of free expression,
particularly those imposed by laws against obscenity, must be discussed with clients
6
Information Technology Act, 2000
6 | New Technology Laws With Special Reference To Cyber Laws
to go into the perceived lacunae in the I.T. Act and comparing it with similar legislations in
other nations and to suggest recommendations. Such recommendations were analysed and
subsequently taken up as a comprehensive Amendment Act and after considerable
administrative procedures, the consolidated amendment called the Information Technology
Amendment Act 2008 was placed in the Parliament and passed without much debate, towards
the end of 2008 (by which time the Mumbai terrorist attack of 26 November 2008 had taken
place). This Amendment Act got the President assent on 5 Feb 2009 and was made effective
from 27 October 2009.
Features of Information Technology Act, 2000
Following are the features of the Act:
• The Act is based on the Model Law on e-commerce adopted by UNCITRAL.
• It has extra-territorial jurisdiction.
• It defines various terminologies used in the Act like cyber cafes, computer
systems, digital signatures, electronic records, data, asymmetric cryptosystems,
etc under Section 2(1). 7
• It protects all the transactions and contracts made through electronic means and
says that all such contracts are valid. (Section 10A)8
• It also gives recognition to digital signatures and provides methods of
authentication.
• It contains provisions related to the appointment of the Controller and its powers.
• It recognises foreign certifying authorities (Section 19)9.
• It also provides various penalties in case a computer system is damaged by
anyone other than the owner of the system10.
• The Act also provides provisions for an Appellate Tribunal to be established
under the Act. All the appeals from the decisions of the Controller or other
Adjudicating officers lie to the Appellate tribunal.
• Further, an appeal from the tribunal lies with the High Court.
• The Act describes various offences related to data and defines their punishment.
• It provides circumstances where the intermediaries are not held liable even if the
privacy of data is breached.
• A cyber regulation advisory committee is set up under the Act to advise the
Central Government on all matters related to e-commerce or digital signatures.
7
Information Technology Act, 2000, Section 2
8
Information Technology Act, 2000, Section 10-A
9
Information Technology Act, 2000, Section 19
10
Information Technology Act, 2000
7 | New Technology Laws With Special Reference To Cyber Laws
How the Act is structured: The Act totally has 13 chapters and 90 sections (the last four
sections namely sections 91 to 94 in the ITA 200011 dealt with the amendments to the four
Acts namely the Indian Penal Code 1860, The Indian Evidence Act 1872, The Bankers’ Books
Evidence Act 1891 and the Reserve Bank of India Act 1934). The Act begins with preliminary
and definitions and from thereon the chapters that follow deal with authentication of electronic
records, digital signatures, electronic signatures etc
Elaborate procedures for certifying authorities (for digital certificates as per IT Act -2000 and
since replaced by electronic signatures in the ITAA -2008) have been spelt out. The civil
offence of data theft and the process of adjudication and appellate procedures have been
described. Then the Act goes on to define and describe some of the well-known cyber crimes
and lays down the punishments therefore. Then the concept of due diligence, role of
intermediaries and some miscellaneous provisions have been described.
Rules and procedures mentioned in the Act have also been laid down in a phased manner, with
the latest one on the definition of private and sensitive personal data and the role of
intermediaries, due diligence etc., being defined as recently as April 2011.
Overview of Information Technology Act, 2000
The Act deals with e-commerce and all the transactions done through it. It gives provisions for
the validity and recognition of electronic records along with a license that is necessary to issue
any digital or electronic signatures. The article further gives an overview of the Act.
As the Act has laid down the statutory principles as ‘Information Technology’ it is hence
being referred as the Information Technology Act.
The aforesaid sub-section (2) provides that the Act extends to the whole of India (including
Jammu & Kashmir). In order to extend the provisions of Act to the State of Jammu &
Kashmir, Article 253 of the Constitution of India12.
Also, in the true spirit of ‘one wired’ world the Act applies to any offence or contravention
committed there under outside India by any person. In other words the Act’s extent is to cover:
“any offence or contravention committed outside India by any person”13.
This is nothing but an international perspective that the Act is looking into. The sub-section
(2) highlights extra territorial’s jurisdictional power of the nation over the wrong doer,
irrespective of his nationality, domicile status, etc14.
11
Information Technology Act, 2000, Sections 91-99
12
Article 253 of the Constitution of India deals with the law to give effect to international agreements.
It states that Parliament has the power to make laws for the whole or any part of the country for
carrying into effect the agreements with one or more countries.
13
Information Technology Act, 2000, Section 75 (1)
14
Information Technology Act, 2000, Section 75 (2) , For the purposes of sub-section (1), this Act shall
apply to an offence or contravention committed outside India by any person if the act or conduct
constituting the offence or contravention involves a computer, computer system or computer network
located in India
8 | New Technology Laws With Special Reference To Cyber Laws
Applicability: The Act extends to the whole of India and except as otherwise provided, it
applies to also any offence or contravention there under committed outside India by any
person. There are some specific exclusions to the Act (ie where it is not applicable) as detailed
in the First Schedule, stated below:
a) negotiable instrument (Other than a cheque) as defined in section 13 of the Negotiable
Instruments Act, 1881;
b) a power-of-attorney as defined in section 1A of the Powers-of-Attorney Act, 1882;
c) a trust as defined in section 3 of the Indian Trusts Act, 1882
d) a will as defined in clause (h) of section 2 of the Indian Succession Act, 1925 including
any other testamentary disposition
e) any contract for the sale or conveyance of immovable property or any interest in such
property;
f) any such class of documents or transactions as may be notified by the Central Government
Definitions:
The Information Technology Act, 2000 15 defines many important words used in common
computer parlance like ‘access’, ‘computer resource’, ‘computer system’, ‘communication
device’, ‘data’, ‘information’, ’security procedure’ etc.
“Access”16 has been defined with reference to a ‘computer’ [S. 2(1) (i)] ‘computer system’ [S.
2(1) (l)], ‘computer network’[S. 2(1) (j)], ‘Communication devices’ [S. 2(1) (ha)] as defined
under the Act.
The term covers both physical and virtual access to a computer, computer system or computer
networks. Unauthorized access means unauthorized access with the logical, arithmetical or
memory function resources of a computer network or communication device.
“Addressee”17 is to be read and understood in relation with the originator [ S. 2(1) (b) and
intermediary [ S. 2(1) (w) as defined under the Act. An addressee is a recipient of the
electronic record planned by the originator.
“Adjudicating officer” 18 is one of the statutory authority under this Act. Power of the
adjudicating officer is to adjudge any person who has committed a contravention under the
Chapter IX of this Act.
15
Information Technology Act, 2000
16
Information Technology Act, 2000, Section 2 (1) (a), ‘ Access’ with its grammatical variations and
cognate expressions means gaining entry into, instructing or communicating with the logical,
arithmetical, or memory function resources of a computer, computer system or computer network;’
17
Information Technology Act, 2000, Section 2 (1) (b), ‘―addressee‖ means a person who is intended
by the originator to receive the electronic record but does not include any intermediary;’
18
Information Technology Act, 2000, Section 2 (1) (c), ‘adjudicating officer‖ means an adjudicating
officer appointed under sub-section (1) of section 46’
9 | New Technology Laws With Special Reference To Cyber Laws
“Affixing electronic signature” with its grammatical variations and cognate expressions means
adoption of any methodology or procedure by a person for the purpose of authenticating an
electronic record by means of digital signature19.
A person or subscriber may authenticate an electronic record by affixing his electronic
signature.
“Appellate Tribunal‖ means the Appellate Tribunal referred to in sub-section (1) of section
4820”
“Appropriate Government” means as respects any matter,– (i) enumerated in List II of the
Seventh Schedule to the Constitution; (ii) relating to any State law enacted under List III of
the Seventh Schedule to the Constitution, the State Government and in any other case, the
Central Government21.
Term appropriate Government has been referred to in the following Sections. -
Section 6(1) & Section 6(2) Use electronic records & electronic
signatures in Government and its agencies
Section 6 A Delivery of services by service providers
Section 69 Power to issue directions to intercept, monitor
or decrypt any information through any
computer resource
Section 70 Protected System
Section 79 Exemption from liability of Intermediary in
certain cases
That is, any State under the Union of India has the power to frame rules to carry out the
provisions regarding ‘use of electronic records and electronic (digital) signatures in
Government and its agencies’ 22 and declaring any computer resources which directly or
indirectly affects the facility of Critical Information Infrastructure, to be a protected system. 23
“Asymmetric crypto system”24, ‘means a system of a secure key pair consisting of a private
key for creating a digital signature and a public key to verify the digital signature 25’.
19
Information Technology Act, 2000, Section 2 (1) (d)
20
Information Technology Act, 2000, Section 2 (1) (da). Ins. by Act 7 of 2017, S. 169
21
Information Technology Act, 2000, Section 2 (1) (e).
22
Information Technology Act, 2000, Section 6
23
Information Technology Act, 2000, Section 70
24
Schedule V of the Information Technology (Certifying Authorities) Rules, 2000, defines encryption
as- “The process of transforming plaintext data into an unintelligible form (cipher text) such that the
original data either cannot be recovered (one-way encryption) or cannot be recovered without using an
inverse decryption process (two-way encryption).”
25
Information Technology Act, 2000, Section 2 (f)
10 | New Technology Laws With Special Reference To Cyber Laws
The Act provides a dual key approach, where one key is used to encrypt (private key) 26 and
other one to decrypt (public key) 27 to create and verify electronic signature respectively. The
aforesaid definition highlights a secured system of creating and verifying electronic signature.
“Certifying Authority” means a person who has been granted a licence to issue a electronic
signature Certificate under section 24 by the Controller of Certifying Authority to issue
Electronic Signature28 Certificate to the subscribers29.
Presently there are eight licensed CAs in India. They are: Customs and Central Excise,
National Informatics Center (NIC), Institute of Development & Research in Banking
Technology (IDRBT), Tata Consultancy Services Ltd., Mahanagar Telephone Nigam Ltd.
(MTNL), Safescrypt Ltd. & (n) Code Solutions and E-Mudra.
“Certification practice statement” means a statement issued by a Certifying Authority to
specify the practices that the Certifying Authority employs in issuing electronic signature 30
Certificates31. Certification practice statement represents a kind of contractual obligation that a
Certifying Authority has to fulfill vis-à-vis Controller and the subscriber. A Certification
practice statement controls the Certifying Authority’s public certificate issueance, acceptance,
use, suspension, activation and revocation of a Electronic Signature Certificate Significantly
over a period of time CA’s may amend their respective CPS.
“Communication device”, means cell phones, personal digital assistance or combination of
both or any other device used to communicate, send or transmit any text, video, audio or
image32.
The definition of the word ‘computer’ itself assumes significance here.
‘Computer’ means any electronic magnetic, optical or other high-speed data processing device
or system which performs logical, arithmetic, and memory functions by manipulations of
electronic, magnetic or optical impulses, and includes all input, output, processing, storage,
computer software, or communication facilities which are connected or related to the
computer in a computer system or computer network;
So is the word ‘computer system’ which means a device or a collection of devices with input,
output and storage capabilities. Interestingly, the word ‘computer’ and ‘computer system’
have been so widely defined to mean any electronic device with data processing capability,
performing computer functions like logical, arithmetic and memory functions with input,
storage and output capabilities. A careful reading of the words will make one understand that a
high-end programmable gadgets like even a washing machine or switches and routers used in
a network can all be brought under the definition
26
Information Technology Act, 2000, Section 2(1) (zc)
27
Information Technology Act, 2000, Section 2 (1)(zd)
28
As subs. by Act 10 of 2009
29
Information Technology Act, 2000, Section 2 (1)(g)
30
As subs. by Act 10 of 2009
31
Information Technology Act, 2000, Section 2 (1)(h)
32
Information Technology Act, 2000, Section 2(1)(ha)
11 | New Technology Laws With Special Reference To Cyber Laws
Similarly the word ‘communication devices’ inserted in the ITAA-200833 has been given an
inclusive definition, taking into its coverage cell phones, personal digital assistance or such
other devices used to transmit any text, video etc like what was later being marketed as i-Pad
or other similar devices on Wi-fi and cellular models. Definitions for some words like ‘cyber
café’ were also later incorporated in the ITAA 2008 when ‘Indian Computer response
Emergency Team’ was included.
Digital Signature: ‘Electronic signature’ was defined in the ITAA -2008 whereas the earlier
ITA -2000 covered in detail about digital signature, defining it and elaborating the procedure
to obtain the digital signature certificate and giving it legal validity. Digital signature was
defined in the ITA -2000 as “authentication of electronic record” as per procedure laid down
in Section 3 and Section 3 discussed the use of asymmetric crypto system and the use of
Public Key Infrastructure and hash function etc. This was later criticized to be technology
dependent ie., relying on the specific technology of asymmetric crypto system and the hash
function generating a pair of public and private key authentication etc.
Electronic records and signatures
The Act defines electronic records under Section 2(1)(t)34, which includes any data, image,
record, or file sent through an electronic mode. According to Section 2(1)(ta), any signature
used to authenticate any electronic record that is in the form of a digital signature is called an
electronic signature. However, such authentication will be affected by asymmetric
cryptosystems and hash functions as given under Section 3 of the Act.
Section 3A further gives the conditions of a reliable electronic signature. These are:
• If the signatures are linked to the signatory or authenticator, they are considered
reliable.
• If the signatures are under the control of the signatory at the time of signing.
• Any alteration to such a signature must be detectable after fixation or alteration.
• The alteration done to any information which is authenticated by the signature
must be detectable.
• It must also fulfill any other conditions as specified by the Central Government.
The government can anytime make rules for electronic signatures according to Section 10 of
the Act. The attribution of an electronic record is given under Section 11 of the Act. An
electronic record is attributed if it is sent by the originator or any other person on his behalf.
The person receiving the electronic record must acknowledge the receipt of receiving the
record in any manner if the originator has not specified any particular manner. (Section 12).
According to Section 13, an electronic record is said to be dispatched if it enters another
computer source that is outside the control of the originator. The time of receipt is determined
in the following ways:
• When the addressee has given any computer resource,
33
Information Technology (Amendment) Act, 2008
34
Information Technology Act, 2000, Section 2
12 | New Technology Laws With Special Reference To Cyber Laws
o Receipt occurs on the entry of an electronic record into the
designated computer resource.
o In case the record is sent to any other computer system, the receipt
occurs when it is retrieved by the addressee.
• When the addressee has not specified any computer resource, the receipt occurs
when the record enters any computer source of the addressee.
e-Governance: Chapter III discusses Electronic governance issues and procedures and the
legal recognition to electronic records is dealt with in detail in Section 4 followed by
description of procedures on electronic records, storage and maintenance and according
recognition to the validity of contracts formed through electronic means.
Certifying authorities
Appointment of Controller35
Section 17 talks about the appointment of the controller, deputy controllers, assistant
controllers, and other employees of certifying authorities. The deputy controllers and assistant
controllers are under the control of the controller and perform the functions as specified by
him. The term, qualifications, experience and conditions of service of the Controller of
certifying authorities will be determined by the Central Government. It will also decide the
place of the head office of the Controller.
Functions of the Controller36
According to Section 18, the following are the functions of the Controller of certifying
authority:
• He supervises all the activities of certifying authorities.
• Public keys are certified by him.
• He lays down the rules and standards to be followed by certifying authorities.
• He specifies the qualifications and experience required to become an employee of
a certifying authority.
• He specifies the procedure to be followed in maintaining the accounts of
authority.
• He determines the terms and conditions of the appointment of auditors.
• He supervises the conduct of businesses and dealings of the authorities.
• He facilitates the establishment of an electronic system jointly or solely.
• He maintains all the particulars of the certifying authorities and specifies the
duties of the officers.
• He has to resolve any kind of conflict between the authorities and subscribers.
35
Information Technology Act, 2000, Section 17
36
Information Technology Act, 2000, Section 18
13 | New Technology Laws With Special Reference To Cyber Laws
• All information and official documents issued by the authorities must bear the
seal of the office of the Controller.
License for electronic signatures 37
It is necessary to obtain a license certificate in order to issue an electronic signature. Section
21 of the Act provides that any such license can be obtained by making an application to the
controller who, after considering all the documents, decides either to accept or reject the
application. The license issued is valid for the term as prescribed by the central government
and is transferable and heritable. It is regulated by terms and conditions provided by the
government.
According to Section 22 of the Act, an application must fulfill the following requirements:
• A certificate of practice statement.
• Identity proof of the applicant.
• Fees of Rupees 25,000 must be paid.
• Any other document as specified by the central government.
The license can be renewed by making an application before 45 days from the expiry of the
license along with payment of fees, i.e., Rupees 25000. (Section 23)
Any license can be suspended on the grounds specified in Section 24 of the Act. However, no
certifying authority can suspend the license without giving the applicant a reasonable
opportunity to be heard. The grounds of suspension are:
• The applicant makes a false application for renewal with false and fabricated
information.
• Failure to comply with the terms and conditions of the license.
• A person fails to comply with the provisions of the Act.
• He did not follow the procedure given in Section 30 of the Act.
The notice of suspension of any such license must be published by the Controller in his
maintained records and data.
Powers of certifying authorities38
Following are the powers and functions of certifying authorities:
• Every such authority must use hardware that is free from any kind of intrusion.
(Section 3039)
• It must adhere to security procedures to ensure the privacy of electronic
signatures.
37
Information Technology Act, 2000, Section 21
38
Information Technology Act, 2000, Section 30
39
Information Technology Act, 2000, Section 30
14 | New Technology Laws With Special Reference To Cyber Laws
• It must publish information related to its practice, electronic certificates and the
status of these certificates.
• It must be reliable in its work.
• The authority has the power to issue electronic certificates. (Section 3540)
• The authority has to issue a digital signature certificate and certify that:
o The subscriber owns a private key along with a public key as given
in the certificate.
o The key can make a digital signature and can be verified.
o All the information given by subscribers is accurate and reliable.
• The authorities can suspend the certificate of digital signature for not more than
15 days. (Section 3741)
• According to Section 38, a certificate can be revoked by the authorities on the
following grounds:
o If the subscriber himself makes such an application.
o If he dies.
o In case, the subscriber is a company then on the winding up of the
company, the certificate is revoked.
Circumstances where intermediaries are not held liable42
Section 2(1)(w) of the Act defines the term ‘intermediary’ as one who receives, transmits, or
stores data or information of people on behalf of someone else and provides services like
telecom, search engines and internet services, online payment, etc. Usually, when the data
stored by such intermediaries is misused, they are held liable. But the Act provides certain
instances where they cannot be held liable under Section 7943. These are:
• In the case of third-party information or communication, intermediaries will not
be held liable.
• If the only function of the intermediary was to provide access to a communication
system and nothing else, then also they are not held liable for any offence.
• If the intermediary does not initiate such transmissions or select the receiver or
modify any information in any transmission, it cannot be made liable.
• The intermediary does its work with care and due diligence.
However, the section has the following exemptions where intermediaries cannot be exempted
from the liability:
40
Information Technology Act, 2000, Section 35
41
Information Technology Act, 2000, Section 37
42
Information Technology Act, 2000, Section 79
43
Information Technology Act, 2000, Section 79
15 | New Technology Laws With Special Reference To Cyber Laws
• It is involved in any unlawful act either by abetting, inducing or by threats or
promises.
• It has not removed any such data or disabled access that is used for the
commission of unlawful acts as notified by the Central Government.
Offences and their punishments under Information Technology Act, 2000
S.
Offences Section Punishment
No.
Imprisonment of 3 years or a
Offences related to computers or any Section
2. fine that extends to Rs. 5
act mentioned in Section 43. 66
lakhs or both.
Either imprisonment up to 3
Section
6. Violation of privacy years or a fine of Rs. 2 lakhs
66E
or both
Section
7. Cyber terrorism Life imprisonment
66F
11. Failure to preserve and retain the Section Imprisonment for 3 years and
44
Information Technology Act, 2000, Section 43
45
Information Technology Act, 2000, Section 44
17 | New Technology Laws With Special Reference To Cyber Laws
All the appeals from the orders of the controller or adjudicating officer will lie to the tribunal,
but if the order is decided with the consent of the parties, then there will be no appeal. The
tribunal will dispose of the appeal as soon as possible but in not more than 6 months from the
date of such appeal. (Section 57)
According to Section 62 of the Act, any person if not satisfied with the order or decision of the
tribunal may appeal to the High Court within 60 days of such order.
Powers 46
According to Section 58 of the Act, the tribunal is not bound to follow any provisions of
the Code of Civil Procedure, 1908 and must give decisions on the basis of natural justice.
However, it has the same powers as given to a civil court under the Code. These are:
• Summon any person and procure his attendance.
• Examine any person on oath.
• Ask to discover or produce documents.
• Receive evidence on affidavits.
• Examination of witnesses.
• Review decisions.
• Dismissal of any application.
Amendments to Information Technology Act, 2000
With the advancement of time and technology, it was necessary to bring some changes to the
Act to meet the needs of society, and so it was amended.
Amendment of 2008
The amendment in 2008 brought changes to Section 66A of the Act. This was the most
controversial section as it provided the punishment for sending any offensive messages
through electronic mode. Any message or information that created hatred or hampered the
integrity and security of the country was prohibited. However, it had not defined the word
‘offensive’ and what constitutes such messages, because of which many people were arrested
on this ground. This section was further struck down by the Supreme Court in the case
of Shreya Singhal v. Union of India (2015).
Another amendment was made in Section 69A of the Act, which empowered the government
to block internet sites for national security and integrity. The authorities or intermediaries
could monitor or decrypt the personal information stored with them.
The 2015 Amendment Bill
The bill was initiated to make amendments to the Act for the protection of fundamental rights
guaranteed by the Constitution of the country to its citizens. The bill made an attempt to make
changes to Section 66A, which provides the punishment for sending offensive messages
46
Information Technology Act, 2000, Section 58
18 | New Technology Laws With Special Reference To Cyber Laws
through electronic means. The section did not define what amounts to offensive messages and
what acts would constitute the offence. It was further struck down by the Supreme Court in the
case of Shreya Singhal declaring it as violative of Article 19.
Information Technology Intermediaries Guidelines (Amendment) Rules, 2018
The government in 2018 issued some guidelines for the intermediaries in order to make them
accountable and regulate their activities. Some of these are:
• The intermediaries were required to publish and amend their privacy policies so
that citizens could be protected from unethical activities like pornography,
objectionable messages and images, messages spreading hatred, etc.
• They must provide the information to the government as and when it is sought
within 72 hours for national security.
• It is mandatory for every intermediary to appoint a ‘nodal person of contact’ for
24×7 service.
• They must have technologies that could help in reducing unlawful activities done
online.
• The rules also break end-to-end encryption if needed to determine the origin of
harmful messages.
47
Information Technology Act, 2000
23 | New Technology Laws With Special Reference To Cyber Laws
place other than New Delhi, the Chairperson may direct to hold the sittings at any such
appropriate place.
It is for the chairperson to exercise this ‘rule of sittings’ in a most appropriate and judicious
manner. The tribunal shall notify to the parties the date and the place of the hearing of the
application.
It is for the Central Government to specify by order the matters and places in relation to which
the cyber appellate tribunal may exercise jurisdiction.
It was held by the Supreme Court in Union of India vs. Paras Laminates (p) limited “there are
no doubt that the tribunal functions as a court within the limits of its jurisdiction. It has all the
powers conferred expressly by the statue. Furthermore, being a judicial body, it has all the
powers conferred expressly by the statue. Furthermore, being a judicial body, it has all the
powers expressly and impliedly granted.
Composition (Section 49)
This Section explains that the Presiding Officer of the Cyber Appellate Tribunal, who will be
nominated by the Central Government, will be the sole member of the Cyber Appellate
Tribunal. The appellant tribunal has been transformed into a multi-member body. The
Tribunal will henceforth be composed of a Chairperson and as many additional members as
the Central Government may designate by publication in the Official Gazette. The Central
Government, in collaboration with the Chief Justice of India, selects the Chairperson and
Members of the Tribunal. The Tribunal’s Presiding Officer is now known as the Chairperson.
Qualifications for appointment (Section 50)
Section 50 – A person cannot be appointed as the Presiding Officer of a Cyber Appellate
Tribunal unless he or she has the following qualifications:
(a) Is, or has been, or is qualified to be, a Judge of a High Court; or
(b) Is or was a member of the Indian Legal Service, and now holds or has held a Grade I
position in that service for at least three years.
The Term of Office (Section 51)
Section – The Presiding Officer of a Cyber Appellate Tribunal serves for five years from the
date of appointment or until he reaches the age of 65, whichever comes first.
Termination or Resignation
The central government has the authority to end the service of a member or chairperson of the
CAT, and this authority is discretionary. This means the government is not obligated to
provide specific reasons for ending the appointment. However, it is expected that if the
government decides to terminate the appointment, it should do so fairly and reasonably.
There are certain reasons for removal from the position of a member or chairperson of the
cyber appellate tribunal (CAT), as explained in Section 48(5) of the Information Technology
Act, 2000. These reasons include:
48
Information Technology Act, 2000, Section 54
26 | New Technology Laws With Special Reference To Cyber Laws
The Central Government has the authority to dismiss the Presiding Officer of the Cyber
Appellate Tribunal if there is evidence of misbehaviour or inability. However, only after a
Supreme Court Judge has conducted an investigation and the Presiding Officer has been
informed of the accusations against him and has had a sufficient opportunity to defend
himself. The method for investigating misbehaviour or incompetence of the Presiding Officer
might be regulated by the Central Government.
The Central Government may, by rules, regulate the procedure for the investigation of
misbehaviour or incapacity of the aforesaid Presiding Officer.
Finality of Orders (Section 55)
Section 55 of the Information Technology Act of 2000 prohibits judicial review of two
matters: an order of the Central Government designating any individual as the Chairperson of
the CAT, and any procedure before a CAT based solely on a flaw in the CAT’s constitution.
This provision assures the smooth and uninterrupted operation of the Tribunal by making the
decision creating the CAT definitive and prohibiting judicial review of any Tribunal
proceedings based on a flaw in the Tribunal’s constitution49.
Saff of the Cyber Appellant Tribunal (Section 56)
Section 56– All the staff, employees and other officers are provided by the central
government, as it will think fit. All the officers and employees will work under the
superintendence of the chairperson. The central government will prescribe the salaries,
allowances and all other conditions of services of the employees and officers50.
Appeal to Cyber Appellant Tribunal (Section 57)
Section 57– If a person is dissatisfied with the Controller’s or Adjudicating Officer’s
decision, he or she may file a complaint with the Cyber Appellate Tribunal, which has
jurisdiction over the case. An order rendered by an adjudicating official with the permission of
the parties, however, is not subject to appeal to the Cyber Appellate Tribunal. The individual
must file, along with the specified fees, within 25 days after receiving the order from the
Controller or Adjudicating Officer. If the Tribunal is satisfied with the grounds for the delay in
submitting the appeal, it may hear it even after the 25-day period has passed.
The Cyber Appellant Tribunal shall transmit a copy of every order to all parties to the appeal
as well as the appropriate Controller or adjudicating official. The tribunal will also make every
effort to resolve the appeal within six months of receiving it51.
In Chappan v/s Moidin Kutti, It was claimed that the presence of a superior and interior court
relationship, as well as the capacity of the former to review two judgments of the latter, are
two requirements for appellant jurisdiction.
49
Information Technology Act, 2000, Section 55
50
Information Technology Act, 2000, Section 56
51
Information Technology Act, 2000, Section 58
27 | New Technology Laws With Special Reference To Cyber Laws
Power and procedure of the Cyber Appellant Tribunal (Section 58)
The Cyber Appellate Tribunal’s method and powers are laid forth in Section 58 of the
Information Technology Act, 2000
Sub-clause (1) Section 58 states that the Cyber Appellate Tribunal is not bound by the Code of
Civil Procedure, 1908, but rather by the principles of natural justice and that the Cyber
Appellate Tribunal, subject to the other provisions of this Act and any rules, has the authority
to regulate its own procedure, including the location of its hearings.
Clause (2) Section 58 stipulates that, for the purposes of executing its responsibilities under
this Act, the Cyber Appellate Tribunal shall have the same powers as a civil court under the
Code of Civil Procedure, 1908, while trying an action, in respect of the following matters:
(a) Summoning and enforcing the attendance of any person and examining him on oath;
(b) Requiring the discovery and production of documents or other electronic records;
(c) Receiving evidence on affidavits;
(d) Issuing commissions for the examination of witnesses or documents;
(e) Reviewing its decisions;
(f) Dismissing an application for default or deciding it ex parte;
(g) Any other matter which may be prescribed.
Clause (3) Section 58 states that any proceeding before the Cyber Appellate Tribunal is
deemed to be a judicial proceeding for the purposes of Sections 193 and 228 of the Indian
Penal Code, and the Cyber Appellate Tribunal is deemed to be a civil court for the purposes of
Section 195 and Chapter XXVI of the Code of Criminal Procedure, 1973.
In Union of India v. T. R. Verma, It is claimed that it is established law that courts must
observe the law of natural justice, which states that a party must be given the chance to present
any relevant evidence on which he relies. Evidence should be taken in the presence of the
parties, and cross-questioning should be allowed.
• Powers of the Cyber Appellate Tribunal
The Cyber Appellate Tribunal is equipped with a range of powers to ensure its effective
functioning:
• Summoning and Examination: It can summon individuals, enforce their attendance, and
examine them under oath, ensuring a thorough fact-finding process.
• Discovery and Production: The Tribunal can require the discovery and production of
documents or other electronic records, facilitating the collection of crucial evidence.
• Evidence on Affidavits: The Tribunal can receive evidence in the form of affidavits,
expediting the evidentiary process.
• Commissions Issuance: It has the authority to issue commissions for the examination of
witnesses or documents, ensuring the comprehensive gathering of information.
52
Information Technology Act, 2000, Section 61
53
Information Technology Act, 2000, Section 62
29 | New Technology Laws With Special Reference To Cyber Laws
(3) Where any contravention has been compounded under sub-section (1), no proceeding or
further proceeding, as the case may be, shall be taken against the person guilty of such
contravention in respect of the contravention so compounded.
Recovery of Penalty (Section 64)
If a penalty issued under this Act is not paid, it is collected as land revenue arrears.
Furthermore, until the penalty is paid, the license or digital signature certificate is suspended54.
The purpose of enacting the I.T. Act was straightforward. The government wanted to offer and
support electronic, digital transactions while also safeguarding against all types of cybercrime.
Because of the quantity of traffic on the internet and the amount of money individuals transact
through online means, it was critical to strengthen the cyber world. Although the cyber world
is vastly different from the actual world, it has the capability to participate in crimes that occur
in the real world. The Cyber Appellant Tribunal was created to combat cybercrime and punish
individuals involved. The effectiveness of the Cyber Appellant Tribunal may be improved by
increasing public and government knowledge, as well as attempts to deploy enough staff. It is
critical to improving technical capability in order to deal with any circumstance that may arise.
Integrity, secrecy, and authenticity of communication routes and procedures are required.
The Cyber Appellate Tribunal has, for the purposes of discharging its functions under the IT
Act, the same powers as are vested in a civil court under the Code of Civil Procedure, 1908.
However, is not bound by the procedure laid down by the Code of Civil Procedure, 1908 but
is guided by the principles of natural justice and, subject to the other provisions of this Act and
of any rules. The Cyber Appellate Tribunal has powers to regulate its own procedure including
the place at which it has its sittings.
Every proceeding before the Cyber Appellate Tribunal shall be deemed to be a judicial
proceeding within the meaning of sections 193 and 228, and for the purposes of section 196 of
the Indian Penal Code and the Cyber Appellate Tribunal shall be deemed to be a civil court for
the purposes of section 195 and Chapter XXVI of the Code of Criminal Procedure,1973.
Certain sorts of offenses necessitate the use of tribunals that can make decisions more quickly.
The judgment is likely to be made quickly if it follows the natural justice system rather than
the C.P.C. In M/s. Gujarat Petrosynthese Ltd. and Mr. Rajendra Prasad Yadav v. Union of
India it sought for a direction to the Respondent to designate a Chairperson to the Cyber
Appellate Tribunal (CAT) in order to guarantee that the tribunal’s hearings were convened on
a regular basis. In court, it was said that the department would take all necessary steps to fill
the position of chairman within the time limit of six months, and that attempts would be made
to appoint the chairperson even before the time limit expired, in the public interest. On these
grounds, the petition was dismissed. Despite the above judgment, no appointment to the cyber
appellate tribunal has been made as of yet, and it has been inactive since 2011..
To ensure the efficacy of the Cyber Appellate Tribunal, a multifaceted approach is
indispensable. First and foremost, there is a compelling need to foster awareness among the
54
Information Technology Act, 2000, Section 64
30 | New Technology Laws With Special Reference To Cyber Laws
general public and relevant authorities. Informed and vigilant citizens are better equipped to
identify and report cybercrimes, and law enforcement agencies must remain abreast of
evolving threats and legal remedies.
The technological landscape is marked by its dynamism, demanding an unwavering
commitment to staying ahead of the curve. To address the myriad challenges presented by
ever-evolving technology and cyber threats, the Tribunal must continually enhance its
technological capabilities.
The battle against cybercrimes calls for a holistic strategy. While the Cyber Appellate
Tribunal forms a pivotal component of this strategy, it is most effective when accompanied by
heightened public awareness, adequate resources, technological proficiency, and a
commitment to upholding the principles of justice. As the cyber world continues to evolve, so
too must our approach to combating the crimes that pervade it.
Introduction
With the advent of technology the world today has shrunk into a micro chip and so has
everyone’s life. Computer, internet and e-communication have substituted paper based
communication by digital and electronic communication. The United Nations Commission on
International Trade Law (UNCITRAL) realizing the impetus being given to computerization
adopted the Model Law on e-commerce in 1996. The General Assembly of United Nations
passed a resolution in January 1997 inter alia, recommending all States in the UN to give
favorable considerations to the said Model Law, which provides for recognition to electronic
records and according it the same treatment like a paper communication and record. India was
also a signatory to this Model Law and therefore became mandatory for it to revise its
National Law as per the said Model Law. Therefore, in order to keep at pace with the
requirements of the International Trading and also to allure industries into adopting this
convenient way to transactions and storing data, the Information and Technology Act, 2000
was passed by both the Rajya Sabha and the Lok Sabha in May 2000 and the Act was
amended in 2008 which came into force from 27th October, 2009. The preamble quotes:
“An Act to provide legal recognition for transactions carried out by means of electronic data
interchange and other means of electronic communication, commonly referred to as
“electronic commerce”, which involve the use of alternatives to paper-based methods of
communication and storage of information, to facilitate electronic filing of documents with the
Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act,
1872, the Banker's Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and
for matters connected therewith or incidental thereto.” (Information Technology Act, 2000)
Structure of the Information Technology Act, 2000
The Act 55 in total has 13 chapters and 90 sections The Act begins with preliminary and
definitions (Chapter 2) and from there on the chapters that follow deal with authentication of
electronic records, digital signatures, electronic signatures etc. Elaborate procedures for
certifying authorities (for digital certificates as per Information Technology Act -2000 and
since replaced by electronic signatures in the Information Technology Act Amendment -
2008) have been spelt out. The civil offence of data theft and the process of adjudication and 5
appellate procedures have been described. Then the Act goes on to define and describe some
of the well-known cyber crimes and lays down the punishments therefore. Then the concept of
55
Information Technology Act, 2000
56
Information Technology Act, 2000, Section 65
33 | New Technology Laws With Special Reference To Cyber Laws
Fabrication of an electronic record or committing forgery by way of interpolations in CD
produced as evidence in a court attract punishment under this Section. Computer source code
under this Section refers to the listing of programmes, computer commands, design and layout
etc in any form57.
Section 66: Computer related offences are dealt with under this Section. Data theft stated in
Section 43 is referred to in this Section. Whereas it was a plain and simple civil offence with
the remedy of compensation and damages only, in that Section, here it is the same act but with
a criminal intention thus making it a criminal offence. The act of data theft or the offence
stated in Section 43 if done dishonestly or fraudulently becomes a punishable offence under
this Section and attracts imprisonment upto three years or a fine of five lakh rupees or both.
Earlier hacking was defined in Sec 66 and it was an offence.
Now after the amendment, data theft of Sec 43 is being referred to in Sec 66 by making this
section more purposeful and the word ‘hacking’ is not used. The word ‘hacking’ was earlier
called a crime in this Section and at the same time, courses on ‘ethical hacking’ were also
taught academically. This led to an anomalous situation of people asking how an illegal
activity be taught academically with a word ‘ethical’ prefixed to it. Then can there be training
programmes, for instance, on “Ethical burglary”, “Ethical Assault” etc say for courses on
physical defence? This tricky situation was put an end to, by the ITAA when it re-phrased the
Section 66 by mapping it with the civil liability of Section 43 and removing the word
‘Hacking’. However the act of hacking is still certainly an offence as per this Section, though
some experts interpret ‘hacking’ as generally for good purposes (obviously to facilitate
naming of the courses as ethical hacking) and ‘cracking’ for illegal purposes. It would be
relevant to note that the technology involved in both is the same and the act is the same,
whereas in ‘hacking’ the owner’s consent is obtained or assumed and the latter act ‘cracking’
is perceived to be an offence58.
Section 66 is now a widened one with a list of offences as follows:
Section 66A: Punishment for sending offensive messages through communication
service, etc. (Now, not in existence as per Shreya Singhal vs. Union of India Case and it is
struck down by the Supreme Court. 59
Section 66B: Punishment for dishonestly receiving stolen computer resource or
communication device
Any person who, dishonestly received or retains any stolen computer resource or
communication device knowing or having reason to believe the same to be stolen computer
resource or communication device, shall be punished60.
57
Bhim Sen Garg vs State of Rajasthan and others, 2006, Cri LJ, 3463, Raj 2411
58
Information Technology Act, 2000, Section 66
59
Notably, experts like Halder (2013) feel that this section should be replaced with a new law or it
should be amended appropriately).
60
Information Technology Act, 2000, Section 66 B
34 | New Technology Laws With Special Reference To Cyber Laws
Section 66C: Punishment for identity theft
Any person who, fraudulently or dishonestly makes use of the electronic signature, password,
or any other unique identification feature of any other person, shall be punished61.
61
Information Technology Act, 2000, Section 66 C
62
Information Technology Act, 2000, Section 66D
63
Information Technology Act, 2000, Section E
64
Information Technology Act, 2000, Section 66 F
35 | New Technology Laws With Special Reference To Cyber Laws
It may be observed that all acts under S.66 are cognizable and non-bailable offences. Intention
or the knowledge to cause wrongful loss to others ie the existence of criminal intention and the
evil mind ie concept of mens rea, destruction, deletion, alteration or diminishing in value or
utility of data are all the major ingredients to bring any act under this Section. To summarise,
what was civil liability with entitlement for compensations and damages in Section 43, has
been referred to here, if committed with criminal intent, making it a criminal liability
attracting imprisonment and fine or both.
Section 67: Punishment for publishing or transmitting obscene material in electronic
form
Any person who, publishes or transmits or causes to be published or transmitted in the
electronic form, any material which is lascivious or appeals to the prurient interest or if its
effect is such as to tend to deprave and corrupt persons who are likely, having regard to all
relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be
punished;
The earlier Section in ITA was later widened as per ITAA 2008 in which child pornography
and retention of records by intermediaries were all included.
This Section is of historical importance since the landmark judgement in what is considered to
be the first ever conviction under I.T. Act 2000 in India, was obtained in this Section in the
famous case “State of Tamil Nadu vs Suhas Katti” on 5 November 2004. The strength of the
Section and the reliability of electronic evidences were proved by the prosecution and
conviction was brought about in this case, involving sending obscene message in the name of
a married women amounting to cyber stalking, email spoofing and the criminal activity stated
in this Section.
Section 67A: Punishment for publishing or transmitting of material containing sexually
explicit act etc. in electronic form
Any person who, publishes or transmits or causes to be published or transmitted in the
electronic form any material which contains sexually explicit act or conduct, shall be
punished;
Child Pornography has been exclusively dealt with under Section 67B. Depicting children
engaged in sexually explicit act, creating text or digital images or advertising or promoting
such material depicting children in obscene or indecent manner etc or facilitating abusing
children online or inducing children to online relationship with one or more children etc come
under this Section. ‘Children’ means persons who have not completed 18 years of age, for the
purpose of this Section. Punishment for the first conviction is imprisonment for a maximum of
five years and fine of ten lakh rupees and in the event of subsequent conviction with
imprisonment of seven years and fine of ten lakh rupees.
Bonafide heritage material being printed or distributed for the purpose of education or
literature etc are specifically excluded from the coverage of this Section, to ensure that
printing and distribution of ancient epics or heritage material or pure academic books on
education and medicine are not unduly affected.
65
Information Technology Act, 2000, Section 69
37 | New Technology Laws With Special Reference To Cyber Laws
Section 69A inserted in the ITAA, vests with the Central Government or any of its officers
with the powers to issue directions for blocking for public access of any information through
any computer resource, under the same circumstances as mentioned above. Section 69B
discusses the power to authorise to monitor and collect traffic data or information through any
computer resource.
Commentary on the powers to intercept, monitor and block websites:
In short, under the conditions laid down in the Section, power to intercept, monitor or decrypt
does exist. It would be interesting to trace the history of telephone tapping in India and the
legislative provisions (or the lack of it?) in our nation and compare it with the powers
mentioned here. Until the passage of this Section in the ITAA, phone tapping was governed by
Clause 5(2) of the Indian Telegraph Act of 1885, which said that “On the occurrence of any
public emergency, or in the interest of the public safety, the Government may, if satisfied that
it is necessary or expedient so to do in the interests of the sovereignty and integrity of India,
the security of the State, friendly relations with foreign States or public order or for preventing
incitement to the commission of an offence, for reasons to be recorded in writing, by order,
direct that any message or class of messages to or from any person or class of persons, or
relating to any particular subject, brought for transmission by or transmitted or received by
any telegraph, shall not be transmitted, or shall be intercepted or detained, or shall be
disclosed to the Government making the order or an officer thereof mentioned in the order”.
Other sections of the act mention that the government should formulate “precautions to be
taken for preventing the improper interception or disclosure of messages”. There have been
many attempts, rather many requests, to formulate rules to govern the operation of Clause
5(2). But ever since 1885, no government has formulated any such precautions, maybe for
obvious reasons to retain the spying powers for almost a century.
A writ petition was filed in the Supreme Court in 1991 by the People’s Union for Civil
Liberties, challenging the constitutional validity of this Clause 5(2). The petition argued that it
infringed the constitutional right to freedom of speech and expression and to life and personal
liberty. In December 1996, the Supreme Court delivered its judgment, pointing out that
“unless a public emergency has occurred or the interest of public safety demands, the
authorities have no jurisdiction to exercise the powers” given them under 5(2). They went on
to define them thus: a public emergency was the “prevailing of a sudden condition or state of
affairs affecting the people at large calling for immediate action”, and public safety “means
the state or condition of freedom from danger or risk for the people at large”. Without those
two, however “necessary or expedient”, it could not do so. Procedures for keeping such
records and the layer of authorities etc were also stipulated.
Now, this Section 69 of ITAA is far more intrusive and more powerful than the above-cited
provision of Indian Telegraph Act 1885. Under this ITAA Section, the nominated Government
official will be able to listen in to all phone calls, read the SMSs and emails, and monitor the
websites that one visited, subject to adherence to the prescribed procedures and without a
warrant from a magistrate’s order. In view of the foregoing, this Section was critizised to be
draconian vesting the government with much more powers than required.
66
Information Technology Act, 2000, Section 71
67
Information Technology Act, 2000, Section
68
Information Technology Act, 2000, Section 72 A
69
Information Technology Act, 2000, Section 73
70
Information Technology Act, 2000, Section 74
40 | New Technology Laws With Special Reference To Cyber Laws
Section 75: Act to apply for offence or contravention committed outside India
The provisions of this Act shall apply also to any offence or contravention committed outside
India by any person irrespective of his nationality. However, for such liability the act or
conduct constituting the offence or contravention should involve a computer, computer system
or computer network located in India71.
Due Diligence: Liability of intermediaries and the concept of Due Diligence has been
discussed in Section 79. As per this, intermediary shall not be liable for any third party
information hosted by him, if his function is limited to providing access to a communication
system over which information made available by third parties is transmitted or temporarily
stored or hosted or if he does not initiate the transmission, select the receiver of the
transmission and select or modify the information contained in the transmission and if he
observes due diligence and follows the guidelines prescribed by the Central Government.
To put it in simple terms, evidences (information) taken from computers or electronic storage
devices and produced as print-outs or in electronic media are valid if they are taken from
system handled properly with no scope for manipulation of data and ensuring integrity of data
produced directly with or without human intervention etc and accompanied by a certificate
signed by a responsible person declaring as to the correctness of the records taken from a
system a computer with all the precautions as laid down in the Section
However, this Section is often being misunderstood by one part of the industry to mean that
computer print-outs can be taken as evidences and are valid as proper records, even if they are
not signed. We find many computer generated letters emanating from big corporates with
proper space below for signature under the words “Your faithfully” or “truly” and the
signature space left blank, with a Post Script remark at the bottom “This is a computer
generated letter and hence does not require signature”. The Act does not anywhere say that
‘computer print-outs need not be signed and can be taken as record’.
The Bankers’ Books Evidence(BBE) Act 1891 Amendment to this Act has been included as
the third schedule in ITA. Prior to the passing of ITA, any evidence from a bank to be
produced in a court, necessitated production of the original ledger or other register for
verification at some stage with the copy retained in the court records as exhibits. With the
passing of the ITA the definitions part of the BBE Act stood amended as: "’bankers. books’
include ledgers, day-books, cash-books, account-books and all other books used in the
ordinary business of a bank whether kept in the written form or as printouts of data stored in a
floppy, disc, tape or any other form of electro-magnetic data storage device”. When the books
consist of printouts of data stored in a floppy, disc, tape etc, a printout of such entry ...certified
in accordance with the provisions ....to the effect that it is a printout of such entry or a copy of
such printout by the principal accountant or branch manager; and (b) a certificate by a person
in-charge of computer system containing a brief description of the computer system and the
particulars of the safeguards adopted by the system to ensure that data is entered or any other
operation performed only by authorised persons; the safeguards adopted to prevent and detect
unauthorised change of data ...to retrieve data that is lost due to systemic failure or..
71
Information Technology Act, 2000, Section 78
41 | New Technology Laws With Special Reference To Cyber Laws
In short, just like in the Indian Evidence Act, the provisions in Bankers Books Evidence Act
make the printout from a computer system or a floppy or disc or a tape as a valid document
and evidence, provided, such print-out is accompanied by a certificate stating that it is a true
extract from the official records of the bank and that such entries or records are from a
computerised system with proper integrity of data, wherein data cannot be manipulated or
accessed in an unauthorised manner or is not lost or tamperable due to system failure or such
other reasons.
Here again, let us reiterate that the law does not state that any computerised print-out even if
not signed, constitutes a valid record. But still even many banks of repute (both public sector
and private sector) often send out printed letters to customers with the space for signature at
the bottom left blank after the line “Yours faithfully” etc and with a remark as Post Script
reading: “This is a computer generated letter and hence does not require signature”. Such
interpretation is grossly misleading and sends a message to public that computer generated
reports or letters need not be signed, which is never mentioned anywhere in nor is the import
of the ITA or the BBE.
The next Act that was amended by the ITA is the Reserve Bank of India Act, 1934. Section 58
of the Act sub-section (2), after clause (p), a clause relating to the regulation of funds transfer
through electronic means between banks (ie transactions like RTGS and NEFT and other
funds transfers) was inserted, to facilitate such electronic funds transfer and ensure legal
admissibility of documents and records therein
The table 1 briefly enumerates the cyber offences as laid under the IT Act, 2000 (Amendment
2008) with the punishments and penalties
Cyber Offences and Penalties and Punishments
S.NO. SECTION OFFENCE PUNISHMENT
1. 65 Tampering with computer Imprisonment upto 3 years or fine
source documents upto Rs 2 lakh or both
2. 66 Computer related offences Imprisonment upto 3 years or fine
upto Rs 5 lakh or both
3. 66 B Dishonestly receiving the Imprisonment upto 3 years or fine
stolen computer resource and upto Rs. 1 lakh
communication device
4. 65 C Theft of identity Imprisonment upto 3 years
5. 66 D Cheating by personation by Imprisonment upto 3 years and
using computer resource or fine upto Rs. 1 lakh
communication device
6. 66 E Violation of Privacy Imprisonment upto 3 years or fine
upto Rs. 2 lakh or both
7. 66 F Cyber Terrorism Life Imprisonment
The Information Technology (Reasonable security practices and procedures and sensitive
personal data or information) Rules have since been notified by the Government of India, Dept
of I.T. on 11 April 2011. Any body corporate or a person on its behalf shall be considered to
have complied with reasonable security practices and procedures, if they have implemented
such security practices and standards and have a comprehensive documented information
security programme and information security policies containing managerial, technical,
operational and physical security control measures commensurate with the information assets
being protected with the nature of business. In the event of an information security breach, the
body corporate or a person on its behalf shall be required to demonstrate, as and when called
upon to do so by the agency mandated under the law, that they have implemented security
control measures as per their documented information security programme and information
security policies. The international Standard IS/ISO/IEC 27001 on "Information Technology –
Security Techniques - Information Security Management System - Requirements" is one such
standard referred to in sub-rule (1).
In view of the foregoing, it has now become a major compliance issue on the part of not only
IT companies but also those in the Banking and Financial Sector especially those banks with
huge computerised operations dealing with public data and depending heavily on technology.
In times of a litigation or any security breach resulting in a claim of compensation of financial
loss amount or damages, it would be the huge responsibility on the part of those body
corporate to prove that that said “Reasonable Security Practices and Procedures” were actually
in place and all the steps mentioned in the Rules passed in April 2011 stated above, have been
taken.
In the near future, this is one of the sections that is going to create much noise and be the
subject of much debates in the event of litigations, like in re-defining the role of an employee,
the responsibility of an employer or the top management in data protection and issues like the
actual and vicarious responsibility, the actual and contributory negligence of all stake holders
involved etc.
44 | New Technology Laws With Special Reference To Cyber Laws
The issue has wider ramifications especially in the case of a cloud computing scenario (the
practice of using a network of remote servers hosted on the Internet to store, manage, and
process data, rather than a local server, with the services managed by the provider sold on
demand, for the amount of time used) where more and more organisations handle the data of
others and the information is stored elsewhere and not in the owners’ system. Possibly, more
debates will emanate on the question of information owners vis a vis the information container
and the information custodians and the Service Level Agreements of all parties involved will
assume a greater significance.
Adjudication:
Having dealt with civil offences, the Act then goes on to describe civil remedy to such
offences in the form of adjudication without having to resort to the procedure of filing a
complaint with the police or other investigating agencies. Adjudication powers and procedures
have been elaborately laid down in Sections 46 and thereafter. The Central Government may
appoint any officer not below the rank of a director to the Government of India or a state
Government as the adjudicator. The I.T. Secretary in any state is normally the nominated
Adjudicator for all civil offences arising out of data thefts and resultant losses in the particular
state. If at all one section can be criticized to be absolutely lacking in popularity in the IT Act,
it is this provision. In the first ten years of existence of the ITA, there have been only a very
few applications made in the nation, that too in the major metros almost all of which are under
different stages of judicial process and adjudications have been obtained in possibly less than
five cases. The first adjudication obtained under this provision was in Chennai, Tamil Nadu, in
a case involving ICICI Bank in which the bank was told to compensate the applicant with the
amount wrongfully debited in Internet Banking, along with cost and damages. in April 2010.
This section should be given much popularity and awareness should be spread among the
public especially the victims of cyber crimes and data theft that such a procedure does exist
without recourse to going to the police and filing a case. It is time the state spends some time
and thought in enhancing awareness on the provision of adjudication for civil offences in
cyber litigations like data theft etc so that the purpose for which such useful provisions have
been made, are effectively utilized by the litigant public.
There is an appellate procedure under this process and the composition of Cyber Appellate
Tribunal at the national level, has also been described in the Act. Every adjudicating officer
has the powers of a civil court and the Cyber Appellate Tribunal has the powers vested in a
civil court under the Code of Civil Procedure.
Observations on ITA and ITAA:
Having discussed in detail all the provisions of ITA and ITAA, let us now look at some of the
broader areas of omissions and commissions in the Act and the general criticism the Acts have
faced over the years.
Awareness: There is no serious provision for creating awareness and putting such initiatives
in place in the Act. The government or the investigating agencies like the Police department
(whose job has been made comparatively easier and focused, thanks to the passing of the IT
Act), have taken any serious step to create public awareness about the provisions in these
72
Information Technology Act, 2000
51 | New Technology Laws With Special Reference To Cyber Laws
Internet service, and web hosting providers. However, such requests for limiting access would
have to be supported by written justifications.
Section 69B
The central government, for improving data security and for identifying, analysing, and
preventing invasion or computer contamination in the nation, may, by notification in the
Official Gazette, authenticate any institution of the government to supervise and gather traffic
data or information generated, transmitted, or received over any computer resource. Section
69B grants the authority to track and acquire traffic data or information.
Information Technology Act, 2000
On October 17, 2000, the Information Technology Act of 2000 was passed. It is the main
Indian legislation governing e-commerce and cybercrime issues. The legislation was passed to
uplift e-governance, provide legal backing for online transactions, and fight cybercrime. The
primary goal of the law is to facilitate legal and reliable digital, computerised, and online
operations and lessen or eliminate cybercrimes.
The international organisation United Nations Commission On International Trade Law
(UNCITRAL) adopted the UNCITRAL Model Law on Electronic commerce (E-commerce)
,1996 to bring legal consistency across several nations and it prompted the Government of
India to enact legislation for India based on the guidelines provided in UNCITRAL, which
was later revised and approved by the Ministry of Electronics and Information Technology
and came to be known as the Information Technology Act of 2000. India became the twelfth
nation to modify its cyber laws.
Scope of the Act
The Information Technology Act, 2000 is applicable all over India and also has extraterritorial
jurisdiction, which applies to cybercrimes conducted outside India. If an Indian system or
network is included, regardless of the offender’s country, it would be dealt with under the
Act.
Objectives of the Act
• To give legal status to all operations conducted electronically, whether through
data interchange, other electronic communication, or e-commerce, as compared to
the previous paper-based manner of communication.
• To validate digital signatures as legal proof of any information or documents
requiring legal verification.
• To enable the electronic submission of papers with government departments and
agencies.
• To make electronic data storage easier in India.
• To approve and make it easier for banks and other financial organisations to
transfer money electronically.
73
Information Technology Act, 2000
53 | New Technology Laws With Special Reference To Cyber Laws
as the creation of an electronic signature does not need any particular
technological procedure. It would clearly refer to only online transactions even if
they were.
• A new definition has also been inserted for “intermediary.”
• The inclusion of “cell phones, personal digital assistants,” and other similar
devices in the definition of “communication devices” defines its clear-cut
applicability.
• Another crucial addition that will impact the new Data Protection regulations
provided under the Information Technology Act, 2008 is the broad definition
of “cyber security” which now includes safeguarding data and equipment from
unauthorised access, usage, publication, etc.
Major amendments in legislation
Section 66A
Sending offensive information over a communication device through an online device is
prohibited by Section 66A of the Information Technology (Amendment) Act, 2008. This
includes dangerous and inappropriate messages as well as messages that are misleading or
inaccurate but are transmitted with the intent to “cause irritation, discomfort, fear, hindrance,
humiliation, harm, criminal intimidation, hostility, hatred, or ill will” even while the sender is
aware of their falsity.
Section 67 and 67A
The vast volume of “obscene” content shared online has long gathered attention in India. So it
should be no surprise that obscenity is forbidden offline and online in the nation. Section
67 and 67A of the IT Act, which forbids obscene and sexually explicit information, have
proven to be crucial measures to control it.
Section 69A
The Central Government may restrict content under Section 69A of the IT (Amendment) Act,
2008, if it deems that any such content threatens the sovereignty, security, integrity, or
defence of the state, public order, friendly relations with foreign states, or attempts to incite
the commission of a crime related to any of those as mentioned earlier. An independent set of
rules called “Information Technology Rules (Blocking of Access of Information by Public
Rules), 2009” has been notified for the enforcement of Section 69A, and it is called
the Blocking Rules.
Section 77A and 77B
According to Section 77A of the ITA, 2008, all offences under this Act—aside from those that
carry a life sentence or a sentence of more than three years in prison, involve enhanced
punishment, negatively impact the socioeconomic standing of the nation, or involve offences
against women or minors under the age of 18—can now be combined into a single offence.
74
Personal Data Protection Bill, 2018
75
Personal Data Protection Bill, 2019
56 | New Technology Laws With Special Reference To Cyber Laws
the withdrawn bill. As it develops the framework for the cross-border transfer, accountability
of entities processing data, and potential remedies for unauthorised and harmful processing, it
had also recommended to explicitly stating the flow and usage of personal data as well as
defending the rights of individuals for whom the personal data are processed76.
Digital Personal Data Protection Bill (DPDP Bill, 2022)
Every digital processing of private information is now subject to the Digital Personal Data
Protection Bill (DPDP Bill, 2022). This would cover both personally identifiable information
gathered online and offline that has been converted to digital form for handling. This bill will
affect the legal safeguards offered to customers of Indian start-ups doing business abroad,
affecting their competitiveness. This viewpoint is further supported by the bill, which exempts
the majority of its safeguards from applying to data fiduciaries in India who process personal
data belonging to citizens of India.77
Comparison of the Digital Personal Data Protection bill with previous bills
Territorial Implementation of the Bill
The territorial implementation of the law, is that the Bill also addresses handling personal data
gathered by data controllers on Indian soil and used to provide products and services there.
The previous laws were limited to India and had no provisions for any offence committed
outside the territory of India.
Fine
Digital Personal Data Protection Bill 2022, which was released, to up to Rs 500 crore. The
previous laws were limited to a maximum fine amount of Rs 250 crore. The government
increased the fine amount for breaking the rules outlined in the new DPDP bill to make sure
that the offenders comply strictly with the laws.
Rights
Right to be forgotten
Prior to this, the Union Government’s adjudicating officer had to authorise a request to be
forgotten before the right could be used. The right to be forgotten for processing, which was
previously restricted to disclosure, has been expanded according to the recommendations
made in the Data Protection Bill, 2021.
Right to access data
According to the Srikrishna Report, a data fiduciary could enforce the substantive duties of a
data fiduciary by exercising rights to confirmation and access. The PDP Bill incorporated the
2018 bill’s requirements while also granting the data principal the right to access all of the
data fiduciaries with whom their personal data had been shared in one location. In accordance
with the Data Protection Bill, 2021, the data subject has the option to choose a legal heir or
76
Data Protection Bill, 2021
77
Digital Personal Data Protection Bill, 2023
57 | New Technology Laws With Special Reference To Cyber Laws
legal representative as their nominee, who will be able to exercise their rights to confirmation
and access as well as their right to be forgotten in the case of their passing.
Consent
Most data protection laws designate specific types of personal data as “sensitive personal data
” due to the higher risk of harm that may be caused by its unauthorised processing like
biometric information, health information, genetic information, etc. So, clear consent will be
required before processing, and data protection impact assessments are required, giving this
personal data a higher level of safety as per the DPDP bill 2022. In PDP Bill, 2019, consent
was made a significant part of the Act, and it even mentioned the provision for withdrawal.
And before that in 2018 the JPC suggested a change in the consent as it had to be explicitly
taken.
Regulation of Non-Personal Data
The DPDP Bill 2022 lays down the provision of laying down rules every year for the
processing of non-personal data, whereas the PDP Bill, 2019 permits the central government
to ask any data fiduciary to give the record for non-personal data. And the prior, PDP Bill,
2018 made no mention of this provision at all.
Bureau of Indian Standards on data privacy
A separate organisation that regulates data, the Bureau of Indian Standards (“BIS”), has
released new standards for data privacy assurance, namely the IS 17428. BIS was established
as a national standards authority. It is designed to give enterprises a privacy assurance
foundation to set up, carry out, keep up with, and constantly enhance their data privacy
management system. It is an accreditation that companies may use to reassure their clients and
staff about their privacy policies. It can also be strategically employed to set a company apart
from its rivals in the market to control standardisation, conformity evaluation, and quality
control of both goods and services in India.78
This part talks about the requirements of any organisation. For an organisation to properly
define its role and obligations, the IS Requirements give fundamental definitions of “data
controller,” “data processor,” “personal information,” “sensitive personal information,
processing, consent,” etc., so that institutions can comply with them accordingly.
78
The Bureau of Indian Standards has published two Indian Standards, which are IS 17428- Data
Privacy Assurance [Part 1] Engineering and Management Requirements and IS 17428- Data Privacy
Assurance [Part 2] Engineering and Management Guidelines.
79
Anirudh Burman, “Will India’s Proposed Data Protection Law Protect Privacy and Promote
Growth?,” Carnegie India, March 9, 2020, https://carnegieindia.org/2020/03/09/will-india-s-proposed-
data-protection-law-protect-privacy-and-promote-growth-pub-81217.
61 | New Technology Laws With Special Reference To Cyber Laws
personal data” on one hand and “the need to process such personal data for lawful purposes”
on the other.
To answer this question, the paper first details the key features of the law and compares it to
earlier versions, especially the previous official bill introduced by the government in
Parliament in 2019.80 The second part of the paper then examines the DPDP Act from two
perspectives. First, it highlights certain potentially problematic features of this law to
understand its consequences for consumers and businesses as well as the Indian state. Second,
it places the act in context of the developments and deliberations that have taken place over
the last five years or so. The third part speculates on the key factors that will influence the
development of data protection regulation in India in the next few years.
The 2023 act is the second version of the bill introduced in Parliament, and fourth overall. An
initial version was prepared by a committee of experts and circulated for public feedback in
2018.81 This was followed by the government’s version of the bill that was introduced in
Parliament in 2019—the Personal Data Protection Bill, 2019. This version was studied by a
parliamentary committee that published its report in December 2021. 82 The government,
however, withdrew this bill, and in November 2022, published a fresh draft for public
consultations—the draft Digital Personal Data Protection Bill, 2022.
These four drafts were preceded by a landmark 2017 judgment by India’s Supreme Court
in Justice K.S. Puttaswamy and Anr. v. Union of India and Ors. The judgment declared that
the right to privacy is part of the fundamental right to life in India and that the right to
informational privacy is part of this right. The judgment, however, did not describe the
specific contours of the right to informational privacy, and it also did not lay down specific
mechanisms through which this right was to be protected.
Following this, the first government version of the law, the Personal Data Protection Bill,
2019, was introduced in Parliament in December 2019. This version was expansive in scope
and proposed cross-sectoral, economy-wide data protection regulation to be overseen by an
all-powerful data protection regulator—the Data Protection Authority (DPA). The 2019 bill
provided for a preventive framework. It imposed a number of obligations on entities collecting
personal data—to provide notice and take consent from individuals, to store accurate data in a
secure manner, and to use it only for purposes listed in the notice. Businesses were also
required to delete data once the purpose was satisfied and to provide consumers rights to
access, erase, and port their data. Businesses were required to maintain security safeguards
and transparency requirements, implement “privacy by design” requirements, and create
grievance redress systems. Finally, this bill introduced an entity known as “consent
80
Ibid
81
“Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC (General Data Protection Regulation),” Official Journal of
the European Union, May 4, 2016, https://eur-lex.europa.eu/legal-
content/EN/TXT/PDF/?uri=CELEX:32016R0679.
82
Anirudh Burman, “The Withdrawal of the Proposed Data Protection Law Is a Pragmatic Move,”
Carnegie India, August 22, 2022, https://carnegieindia.org/2022/08/22/withdrawal-of-proposed-data-
protection-law-is-pragmatic-move-pub-87710.
62 | New Technology Laws With Special Reference To Cyber Laws
managers,” who were intermediaries for collecting and providing consent to businesses on
behalf of individuals.
The bill grouped personal data into different categories and required elevated levels of
protection for “sensitive” and “critical” personal data. Certain businesses were also to be
categorized as “significant data fiduciaries,” and additional obligations were proposed for
them—registration in India, data audits, and data impact assessments. In addition, the bill
imposed localization restrictions on the cross-border flows of certain categories of data. The
DPA was empowered to impose penalties on businesses for violating these requirements. The
bill also proposed to criminalize activities related to the deanonymization of individuals from
anonymized datasets.
The 2019 bill exempted certain entities and businesses from notice and consent requirements
under certain circumstances—for lawful state functions, medical and health services during
emergencies or epidemics, breakdown of public order, employment-related data processing,
the prevention and detection of unlawful activity, whistleblowing, and credit recovery, among
others.
The 2019 bill also had a provision to empower the government to regulate nonpersonal data. It
allowed the government to require private entities to hand over specific nonpersonal data that
the government asked for as per conditions it prescribed. In short, the 2019 bill proposed a
comprehensive, cross-sectoral framework based on preventive requirements for businesses
(defined as “data fiduciaries”) and rights for individuals or consumers (“data principals”).
This regulatory structure was based mostly on the 2018 draft bill proposed by the Srikrishna
Committee—the committee, chaired by Justice B.N. Srikrishna, a retired Supreme Court
judge, was set up by the Ministry of Electronics & Information Technology in July 2017 to
help frame data protection norms. The recommendations of this committee, in turn, were
based on major regulatory developments that were popular while the work of the committee
was proceeding. Primary among these was the European Union’s (EU’s) General Data
Protection Regulation (GDPR). While the general preventive framework of the 2019 bill was
welcome, its expansive scope was problematic. It created a number of significant compliance
requirements that would have affected both big and small firms in the economy. It also
proposed the creation of a DPA that had significant regulation-making and supervisory
powers. These regulations would have further detailed the already significant compliance
requirements in the bill. The novelty of the law and the lack of prior experience in
implementing a data protection law of this nature would have created serious risks of
overregulation or under-regulation.
The DPDP Act is based on the draft proposed by the government in November 2022, which
adopted a radically different approach to data protection regulation. 83 The next section details
the key provisions of the act.
83
The Digital Personal Data Protection Bill, 2022.
63 | New Technology Laws With Special Reference To Cyber Laws
KEY FEATURES OF THE DPDP ACT, 2023
Compared to the 2019 version of the bill, the DPDP Act, 2023 is more modest—it has reduced
obligations for businesses and protections for consumers. On the one hand, the regulatory
structure is simpler, but on the other, it vests the central government with unguided
discretionary powers in some cases.
Applicability to Nonresidents
The DPDP Act applies to Indian residents and businesses collecting the data of Indian
residents. Interestingly, it also applies to non-citizens living in India whose data processing “in
connection with any activity related to offering of goods or services” happens outside India.
This has implications for, say, a U.S. citizen residing in India being provided digital goods or
services within India by a provider based outside India.
Purposes of Data Collection and Processing
The 2023 act allows personal data to be processed for any lawful purpose. The entity
processing data can do so either by taking the concerned individual’s consent or for
“legitimate uses,” a term that has been explained in the law.
Consent must be “free, specific, informed, unconditional and unambiguous with a clear
affirmative action” and for a specific purpose. The data collected has to be limited to that
necessary for the specified purpose. A clear notice containing these details has to be provided
to consumers, including the rights of the concerned individual and the grievance redress
mechanism. Individuals have the right to withdraw consent if consent is the ground on which
data is being processed.
Legitimate uses are defined as: (a) a situation where an individual has voluntarily provided
personal data for a specified purpose; (b) the provisioning of any subsidy, benefit, service,
license, certificate, or permit by any agency or department of the Indian state, if the individual
has previously consented to receiving any other such service from the state (this is a potential
issue since it enables different government agencies providing these services to access
personal data stored with other agencies of the government); (c) sovereignty or security; (d)
fulfilling a legal obligation to disclose information to the state; (e) compliance with
judgments, decrees, or orders; (f) medical emergency or threat to life or epidemics or threat to
public health; and (g) disaster or breakdown of public order.
Rights of Users/Consumers of Data-Related Products and Services
The DPDP Act also creates rights and obligations for individuals. These include the right to
get a summary of all the collected data and to know the identities of all other data fiduciaries
and data processors with whom the personal data has been shared, along with a description of
the data shared. Individuals also have the right to correction, completion, updating, and
erasure of their data. Besides, they have a right to obtain redress for their grievances and a
right to nominate persons who will receive their data.
84
The Digital Personal Data Protection Act, 2023, Section 5
85
The Digital Personal Data Protection Act, 2023, Section 8(6)
86
The Digital Personal Data Protection Act, 2023, Section 9
71 | New Technology Laws With Special Reference To Cyber Laws
• the manner in which parental consent will be sought for processing
children’s data and related exemptions;87
• the manner in which consumers will exercise their rights against data
fiduciaries;88
• the manner of appointment of DPB members, the terms and conditions of
their service, and the procedures for the functioning of the board;89
• data impact assessments and other measures to be taken by significant data
fiduciaries;38 and
• the procedure to be followed by the appellate tribunal, the TDSAT, in
hearing appeals from the DPB.39
These are not insignificant powers. However, as already discussed, these powers of rule-
making pale in comparison to the ones that were proposed to be given to the DPA under the
previously proposed versions of the law. The intensity of regulation will, therefore, be much
lower under the DPDP Act than it would have been under the 2019 bill. In creating this
framework, the Indian Parliament has opted for a modest approach to creating elaborate rules
and regulations. This will consequentially allow greater scope for experimentation and
innovation in the Indian technology landscape relative to the 2019 bill and its predecessor.
While many of these powers pertain to procedural issues, the central government has
substantive rule-making powers as well. The fact that these rule-making powers are with the
central government is problematic.
The most consequential of these is the power to grant exemptions. The exercise of this power
will be contingent on two factors—the degree of technocratic competency within the relevant
departments of the central government and the degree to which the relevant officers can
function autonomously and technocratically. Historically, the Indian state’s response to
improve competence and autonomy in economic regulation has been to move these functions
to independent regulatory agencies. In this case, however, such powers have been retained
with the central government.
On the other hand, the lack of any prior regulatory expertise on data protection also lends itself
to an argument in favor of greater political inputs at an incipient stage of regulatory
development. Historically, the Indian government directly regulated many subjects before
transferring them to independent regulators and, in the process, developed a certain degree of
institutional capability within the relevant departments. This has been the case for various
subjects such as insurance, pension, telecom, electricity, and so on. While these departments
did not necessarily regulate well, the exercise of these powers did create some technical and
supervisory capacity within the relevant departments.
The critical consideration, therefore, is whether the drafters of the DPDP Act consider the
framework under the law as a first step in the development of an independent regulator.
87
The Digital Personal Data Protection Act, 2023, Section 11, 12, 13 & 28
88
The Digital Personal Data Protection Act, 2023, Section 22, 23, 28
89
The Digital Personal Data Protection Act, 2023, Section 10 (2)
72 | New Technology Laws With Special Reference To Cyber Laws
The second key source of regulatory development will be the decisions of the DPB in cases
where it initiates an inquiry against regulated entities. The reasoning of the DPB and the
penalties and directions it issues will be the first set of decisions on data privacy regulation
under a new law. These decisions will not just contribute to jurisprudence on the subject but
also provide guidance to businesses on how to implement and comply with the DPDP Act.
The procedures the board follows, the quality of its reasoning, and the clarity of its decisions
will shape both market behavior and future regulation in India.
In this regard, the composition of the board and the qualifications of its members conducting
inquiries will be critical. The law has definite weaknesses in this regard, as discussed earlier.
The proper implementation of the law will, therefore, depend on the government adopting best
practices in appointment and selection and creating a culture of noninterference, since the law
does not contain many standard provisions present in other Indian laws.
The third key source of regulatory development will be the directions that the DPB is
empowered to issue under the law. While the DPDP Act requires the board to observe certain
specified procedural rules while conducting inquiries and issuing penalties, it does not provide
any such guidance for issuing directions to regulated entities. This is problematic since
directions will also be binding and impose compliance costs. It is, therefore, appropriate that
the board should create certain checks and balances for issuing directions. At the very least,
the board should provide any regulated entity with a formal opportunity to furnish their
response to a draft direction before such a direction is formally issued to them. Absent this, the
board may develop a predilection toward regulation by direction.
The trajectory of these three strands of regulatory decision-making will significantly shape
India’s technology markets and data-related policy for the next few years. Since the law does
not contain adequate checks and balances, the onus will be on the central government to
ensure that best practices in administrative law and decisionmaking are incorporated via the
procedural rules that the DPDP Act empowers it to make.
The other main factor that will shape the development of data protection regulation will be the
larger imperatives of exercising sovereign control over data and data businesses in India. The
development of the DPDP Act was significantly influenced by the call to exercise control over
Indian data for the benefit of Indians. This was most visible during the debate on issues related
to data localization and nonpersonal data. While the provisions in the final law represent a
significant moderation from the provisions in the draft proposals, the larger concerns over
sovereignty and security will influence the development of this law.
One clear example of this is Section 37 of the law that enables the central government to block
access to any information that can be communicated by a data fiduciary. This is a new
insertion, and it is highly debatable whether this provision has any relevance to personal data
privacy.
Outside the DPDP Act, the evolving framework of laws regulating social media companies, IT
services, and businesses, among others, will also exercise indirect influence on how data
protection regulation develops. In 2021, the Indian government issued new guidelines for
social media intermediaries that required, among others, measures to trace originators of social
media content on over-the-top (OTT) messaging platforms. These requirements were
73 | New Technology Laws With Special Reference To Cyber Laws
challenged in courts and a final decision is awaited. The outcome will determine the nature
and scope of the powers enjoyed by investigative agencies under the exemptions granted by
the DPDP Act.
Another example is that of data localization. While the DPDP Act does not restrict data flows
across borders, many Indian sectoral regulators, like the Reserve Bank of India, do impose
localization requirements. The progressive adoption of localization by other regulators may
make the liberal provisions of the DPDP Act superfluous.
Some legal requirements aimed at regulating social media and big tech companies are
emanating organically due to India’s rapid digital transformation in the past decade and the
fact that the regulatory framework is outdated.40 India’s IT minister has stated that a
replacement to India’s Information Technology Act, 2000 is in the works. This newer version
of the IT Act, as well as other similar legislations, is also likely to influence the working of the
DPDP Act. In each of these developments, it will be important to ensure that the nature and
scope of sovereign control to be exercised is for a legitimate purpose and that it does not
overserve the needs of the Indian state to the detriment of privacy, commerce, and innovation.
While the DPDP Act is a culmination of more than five years of debate and deliberation, it
marks the start of statutory personal data protection regulation. The regulatory developments
and the institutional arrangements that take shape over the next few years will decide how well
(or not) personal data privacy is protected. The new law provides the necessary scaffolding,
but it is not sufficient for de facto data privacy to materialize.
It is debatable whether the earlier versions of the bill would have resulted in better privacy
protection in any meaningful way.41 However, the transformation of the contents of different
versions of the law is indicative of the changed approach of the government to privacy
protection. The fact that the current version of the law, as compared to the earlier ones,
imposes much lower costs on Indian businesses is positive.
Overall, the law itself is modest and pragmatic. This is welcome. However, in some cases, it is
exceedingly so, to the potential detriment of privacy interests. The fact that a significant
degree of discretionary power on substantive issues is vested with the central government
means that a lot will depend on how well the government is committed to protecting privacy.
E-COMMERCE
INTRODUCTION
DEFINITIONS
Electronic commerce is broadly defined as the use of computer networks to complete business
transactions. The networks involved include the internet, intranets, extranet and other private
networks.
It is therefore the use of computer applications communicating over networks to enable buyers
and seller to complete transaction.
The transactions may include buying, selling and exchanging information.
Today many industry experts consider e-commerce to be a subset of e-business.
E-business refers to business activities beyond buying and selling and includes activities such
as using the internet to enhance customer service, co-ordinate activities with business partners
and to facilitate communication and knowledge management within organizations.
E-business deals with evaluating electronic market place to better serve the collective needs of
entire industries.
E-Commerce or Electronics Commerce is a methodology of modern business, which
addresses the need of business organizations, vendors and customers to reduce cost and
improve the quality of goods and services while increasing the speed of delivery.
E-commerce is based on the client-server architecture. A client can be an application, which
uses a Graphical User Interface (GUI) that sends request to a server for certain services. The
server is the provider of the services requested by the client. In E-commerce, a client refers to
a customer who requests for certain services and the server refers to the business application
through which the services are provided. The business application that provides services is
deployed on a Web' server. The E - Commerce Web server is a computer program that
provides services to "other computer programs and serves requested Hyper Text Mark-up
Language (HTML) pages or files. In client-server architecture, a machine can be both a client
as well as a server.
E-commerce refers to the paperless exchange of business information using the following
ways:
• Electronic Data Exchange (EDI)
The disadvantages of e-commerce can be broadly classified into two major categories:
• Technical disadvantages
• Non-technical disadvantages
Technical Disadvantages
• There can be lack of system security, reliability or standards owing to poor
implementation of e-commerce.
• The software development industry is still evolving and keeps changing rapidly.
• In many countries, network bandwidth might cause an issue.
• Special types of web servers or other software might be required by the vendor,
setting the e-commerce environment apart from network servers.
• Sometimes, it becomes difficult to integrate an e-commerce software or website with
existing applications or databases.
• There could be software/hardware compatibility issues, as some e-commerce
software may be incompatible with some operating system or any other component.
Non-Technical Disadvantages
• Initial cost: The cost of creating/building an e-commerce application in-house may be
very high. There could be delays in launching an e-Commerce application due to
mistakes, and lack of experience.
• User resistance: Users may not trust the site being an unknown faceless seller. Such
mistrust makes it difficult to convince traditional users to switch from physical
Security/ Privacy: It is difficult to ensure the security stores to online/virtual stores. or
privacy on online transactions.
• Lack of touch or feel of products during online shopping is a drawback.
• E-commerce applications are still evolving and changing rapidly.
• Internet access is still not cheaper and is inconvenient to use for many potential
customers, for example, those living in remote villages
Proxy Services :
A proxy service is an intermediary role played by software or a dedicated computer
system between an endpoint device and a client which is requesting the service. The proxy
service may exist on the same machine or on a separate server. The proxy service enables the
client to connect to a different server and provides easy access to services like Web pages,
connections or files. The main purpose of a proxy service is to filter requests to ensure that no
dangerous traffic creeps in by applying strict routing rules and to boost the performance of the
system. A proxy service works simply – when a proxy service receives a request, for example,
to open a Web page, it looks for the already cached pages. If it finds the requested page in the
already cached page, it returns it to the user. If the page is not yet cached, proxy service uses
its own IP address to fetch the page from the server for the client. Proxy services are mainly of
E-Banking:-
• Means any user with a personal computer and browser can get connected to his banks,
website to perform any of the banking functions. In internet banking system the bank has a
centralized data base i.e., web-enabled.
• Best example for E-Banking is ATM.
• An ATM is an electronic fund transfer terminal capable of handling cash deposits,
transfer, Balance enquiries, cash withdrawals, and pay bills.
SERVICES THROUGH E-BANKING:
• Bill Payment Service
• Fund Transfer
• Investing through Internet Banking
• Shopping
E-Learning:-
• E-Learning comprises all forms of electronically supported learning and teaching.
• E-Learning applications and processes include web-based learning, computer-based
learning.
• Content is delivered via. The internet, intranet/extranet, audio, or video tape, satellite TV.
• E-Learning is naturally suited to distance and flexible learning, but can also be used
conjunction with face-to-face teaching.
• E-Learning can also refer to the educational website such as those offering learning
scenarios worst and interactive exercises for children.
• A learning management system (LMS) is software used for delivering, tracking, and
managing training /education.
Mobile Commerce:-
• Mobile Commerce also known as M-Commerce, is the ability to conduct, commerce as a
mobile device, such as mobile phone.
• Banks and other financial institutions use mobile commerce to allow their customers to
access account information and make transactions, such as purchasing, withdrawals etc.,
• Using a mobile browser customers can shop online without having to be at their personal
computer.
SERVICES ARE:
1. Mobile ticketing
2. Mobile contract purchase and delivery mainly consumes of the sale of ring tones,
wallpapers and games of mobile phones.
3. Local base services
83 | New Technology Laws With Special Reference To Cyber Laws
• Local discount offers
• Local weather
4. Information services
• News
• Sports, Scores
Online Shopping:-
➢ Online shopping is the process whereby consumers directly buy goods or services from a
sell in real time, without intermediary services over the internet.
➢ An online shop, e-shop, e-store, internet shop web shop, web store, online store, or virtual
shop evokes the physical analogy of buying products or services in a shopping center.
➢ In order to shop online, one must be able to have access to a computer, a bank account
and debit card.
➢ Online shoppers commonly use credit card to make payments , however some systems
enable users to create accounts and pay by alternative means ,such as
• Cheque.
• Debit cards.
• Gift cards
➢ Online stores are usually available 24 hours a day
Entertainment:-
The conventional media that have been used for entertainment are
1. Books/magazines.
2. Radio.
3. Television/films.
4. Video games.
Online books /newspapers, online radio, online television, online firms, and online games are
common place in internet where we can entertain.
Online social networking websites are one of the biggest sources of E-entertainment for today’s
tech-savvy generation.
Legal aspects
There are several legal aspects like intellectual property issues, consumer protection issues,
content regulation, intermediary liability etc. and statutes that help in bringing principles of E-
commerce under discipline. For example, Foreign Exchange Management Act (FEMA)
regulates the foreign investment in E-commerce. Mukesh Bansal-led Myntra secured $50
million investment led by Premji Invest along with existing investors Accel Partners and Tiger
Global. In February 2014, Kunal Bahl led Snapdeal amassed $133 million funding led by
90
1995 AIR 1811, 1995 SCC (5) 482
85 | New Technology Laws With Special Reference To Cyber Laws
any law for the time being in force in India. As per Section 23 of the Indian Contract Act,
1872 the object of the contract and the consideration must be lawful. It must be certain,
definite and not vague and such as are capable of performance. A contract may be made by
words spoken or written. In India, usually where there is a statutory need that contract for
example Agreements relating to mortgage, sale, lease etc must be made in writing, attested by
witnesses, signed by the parties and to be registered by the parties in order to make that
agreement enforceable.
Definition of e-contracts
E-Contracts are the contracts that are formed between two parties through negotiations via
electronic means. They are the legal documents that are created and signed digitally in a
paperless approach that do not require any paper, ink, printer for creating copies of the
agreement, which are also known as online contracts or digital contracts. E-Contracts save
time and money by eliminating physical meetings to sign an agreement. It also provides an
opportunity for the seller to reach millions of consumers irrespective of time and also without
the involvement of any brokers or middlemen. For instance, the bipartite contract entered by
the customer and the sellers in Amazon.in, Flipkart.com, or Myntra.com for the sale of
products on the website.
In case of an online contract, the seller who intends to sell their products, present their
products, prices and terms for buying such products to the prospective buyers. In turn, the
buyers who are interested in buying the products either consider or click on the ‘I Agree’ or
‘Click to Agree’ option for indicating the acceptance of the terms presented by the seller or
they can sign electronically. Electronic signatures can be done in different ways like typing the
name of the signer’s in the specific signature space, copying and pasting the scanned version
of the signature or clicking an option meant for that purpose. Once the terms are accepted and
the payment is made, the transaction can be completed. The communication is basically made
between two computers through servers. The online contract is brought to the scenario to help
people in the way of formulating and implementing policies of commercial contracts within
business directed over internet. Online Contract is modelled for the sale, purchase and supply
of products and services to both consumers and business associates.
Online can be categorized into three types mainly i.e. browse or web wrap contracts, shrink
wrap contracts and clickwrap contracts. Other kinds of online contracts include employment
contract, contractor agreement, consultant agreement, Sale re-sale and distributor agreements,
non-disclosure agreements, software development and licensing agreements, source code
escrow agreements. Though these online contracts are witnessed in our everyday life, most of
us are not aware of the legal complexities connected to it; the use of online contract faces
many technical and legal challenges.
TYPES OF ONLINE CONTRACT
Online contracts can be of three types mainly i.e. shrink-wrap agreements, click or web-wrap
agreements and browse-wrap agreements. In our everyday life, we usually witness these types
of online contracts. Other types of online contracts include employment contract, contractor
agreement, consultant agreement, Sale re-sale and distributor agreements, non-disclosure
agreements, software development and licensing agreements, source code escrow agreements.
86 | New Technology Laws With Special Reference To Cyber Laws
• Shrink-wrap agreements are usually the licensed agreement applicable in case of
software products buying. In case of shrink-wrap agreements, with opening of the
packaging of the software product, the terms and conditions to access such
software product are enforced upon the person who buys it. Shrink-wrap
agreements are simply those which are accepted by user at the time of installation
of software from a CD-ROM, for example, Nokia pc-suite. Sometimes additional
terms can be observed only after loading the product on the computer and then if
the buyer does not agree to those additional terms, then he has an option of
returning the software product. As soon as the purchaser tears the packaging or
the cover for accessing the software product, shrink-wrap agreement gives
protection by indemnifying the manufacturer of the product for any copyright or
intellectual property rights violation. Though, in India, there is no stable judicial
decision or precedent on the validity of shrink-wrap agreements.
• Click- wrap agreements are web based agreements which require the assent or
consent of the user by way of clicking “I Agree’ or “I Accept” or “Ok” button on
the dialog box. In click –wrap agreements, the user basically have to agree to the
terms and conditions for usage of the particular software. Users who disagree to
the terms and conditions will not be able to use or buy the product upon
cancellation or rejection. A person witnesses web-wrap agreements almost
regularly. The terms and conditions for usage are exposed to the users prior to
acceptance. For agreement of an online shopping site etc.
• An agreement made intended to be binding on two or more parties by the use of
website can be called a browse wrap agreement. In case of browse wrap
agreement a regular user of a particular website deemed to accept the terms of use
and other policies of the website for continuous use.
Though these online contracts have become common in our daily, there are no precise judicial
precedents on the validity and enforceability of shrink-wrap and click-wrap agreements. Other
countries have dealt with these online agreements such as courts in the United States have held
that as far as the general principles of contract are not violated, both shrink-wrap agreements
and click- wrap agreements are enforceable.
Essentials of e-contracts
The essential elements of online contract is discussed below:
• Offer – Just like paper made or conventional contract, one of the most essential
elements of online contract is the requirement of an offer to be made. There must
be a lawful proposal or offer made by one party known as the proposer and it is
the starting point of a contract. By browsing and choosing the goods and services
available on the website of the seller, the consumer makes an offer to purchase
such in relation with the invitation to offer made by the seller. A proposal must be
distinguished from the invitation to offer or treat and must be made with an
intention to create legal relationship. An offer or proposal is revocable and can be
withdrawn at any time before it is accepted because once it is accepted by the
other party, it becomes a promise.
87 | New Technology Laws With Special Reference To Cyber Laws
• Acceptance – When a proposal or offer is made is accepted by the person to
whom the offer is made, it becomes a promise. The acceptance of the proposal
must be unconditional and absolute and must be communicated to the proposer or
the offeror. In case of an online contract, offer and acceptance can be made
through e-mails or by filing requisite form provided in the website. They may
also need to take an online agreement by clicking on ‘I Agree’ or ‘I Accept’ for
availing the services offered.
• Intention to create legal relationship – If there is no intention of creating legal
relationship on the part of the parties to contract, there is no contract between
them. It is an essential element of valid contract that parties to the contract must
have intention to create legal relationships. The intention of the parties is to be
considered by the Court in each case and must be ascertained from the terms of
the agreement and surrounding consequences. Agreement of social or domestic
nature do not create legal relationship, hence they are not contracts and are not
enforceable by law. In the case of arrangements regulating social relations, it
follows as a matter of course that parties do not intend legal consequences to
follow. For example, an invitation for marriage to a friend or family through e-
mails or fax or through any means of telecommunication is not a contract.
• There must be a lawful object – Parties to the agreement must contract for a
legal object. A contract is only enforceable by law only when it is made for a
lawful purpose. It must not defeat any provision of law and must not be
fraudulent in nature. Thus a contract on a website designed for the purpose of
selling illegal substances online is a void contract. If an agreement is made to
cause injury to any person or his property, such agreement is not lawful and
therefore to be considered as void. If any competent Court regards any agreement
as opposed to public policy, it is a void contract.
• There must be a legal or lawful consideration – Consideration is one of most
important element of a contract. The basic rule is that when a party to a contract
promises to perform his promise he must get something in return for the
performance of his promise. Consideration is something of some value in the eyes
of law. It may be of some benefit, right, interest or profit given to the party as
inducement of promise. An act constituting consideration must be moved at the
desire of the promisor and must be legal, real and not imaginary. Promises that
are physically impossible to perform cannot have real consideration. For eg. an
online site that offers purchase of land in moon.
• Capacity of parties – Parties to a contract must be capable of entering into a
contract. He must attain the age of majority and must be of sound mind. He must
not be disqualified from contracting by any law for the time being in force. In our
country an agreement where either party is a minor has no significance. It is
considered as void ab-initio. As per Section 12 of the Indian Contract Act, 1872,
any person who is in a position to judge and safeguard his own interest is of
sound mind and capable enough to enter into a contract. When a person is
91
(1903) 30 Cal. 539
89 | New Technology Laws With Special Reference To Cyber Laws
of online contracts in India. Even if no specific provision is made for the validity of online
contracts, it cannot be challenged based on technical grounds.
There are few processes available for forming an electronic contract such as e-mail by which
offers and acceptances can be exchanged. An online contract can be formed by completing the
website form provided for availing good or services offered by the seller in the website for
example air tickets. The person who intends to avail the good or services offered in the
website can place an order on the website by filling the concerned form and communicating
such. The goods offered can be delivered directly through electronic means for eg. e- tickets or
may be later for eg. clothes. Another process available for the formation of an online contract
is through online agreements by clicking on the button that says ‘ I Accept’ while connecting
to a software and by clicking on ‘I Agree’ button while signing up for an e-mail account.
Online contract is formed through new modes of communication such as e-mail, internet, fax
and telephone. The requirement of essential element such as offer and acceptance in online
contract formation is as much essential as it is for the formation of paper based traditional
contract. Contract formation over websites is quite different from the earlier ways of contract
formation. Online contract formation mainly raises issues in relation to the applicability of the
offer and acceptance rule. It is the website which acts as the retailer and responds as per the
consumer’s action. When a consumer is interested in downloading songs, videos or movies
from a retailer website in lieu of payment, the consumer will have to agree to the standard
terms of the retailer’s website by clicking the particular option button. Once the terms are
agreed by the consumer and the acceptance is expressed, it is the responsibility of the website
to deliver the service to the consumer. And lastly, on making the appropriate payment, the
contract is completed between the consumer and the retailer’s website for the particular
transaction.
Processes Formation of e-contracts
Processes available for forming e-contracts include:
1. E-mail
Where an offer and acceptance can be exchanged either by e-mail or it can be collected with
fax, paper documents, and telephonic discussions. The e-mail contracts are considered to be
valid and are enforceable when the terms and conditions of the contract are agreed upon by
both the parties on the acceptance of an issued offer, where there is an intention to create a
legally binding contract and a vital element of consideration as agreed by the parties. For
example, in the case of Trimex International FZE Limited, Dubai v. Vedanta Aluminium Ltd.,
the parties have completely agreed to the terms of the contract via email, where the supreme
court upheld the validity of this contract on its observations and stated, “once the contract is
concluded orally or in writing, the mere fact that a formal contract has to be prepared and
initiated by the parties would not affect either the acceptance of the contract entered into or
implementation thereof, even if the formal contract has never been initiated.”
2. Website forms
Where the sellers can offer goods or services through their websites and the goods or services
can be directly delivered; such as software, and e-tickets or delivered later such as clothes and
90 | New Technology Laws With Special Reference To Cyber Laws
accessories. These types of agreements are entered into when the customers order certain
goods or services by filling in and submitting an on-screen order form and the seller accepts
such orders. For example, orders made by customers on Amazon or Flipkart for purchase of
clothes and accessories, or booking of e-tickets on airindia.in or irctc.co.in.
3. Online agreements
Where the users may require to make an online agreement to be eligible to avail services.
There are three types of online agreements;
a. Click-wrap contracts: these contracts are enforced by clicking on ‘I Accept/ I Agree’ while
installing software or signing up for an email account.
In the case of Hotmail Corporation v. Van $ Money Pie Inc, et al92, the validity of the click-
wrap agreements was first considered, when the court held that “the defendant is bound by
terms of the license as he clicked on the box containing ‘I Agree’ thereby indicating his assent
to be bound.”
b. Browse-wrap contracts: these contracts are enforced wherein the terms and conditions are
provided through a hyperlink and are predetermined.
When we click the download button to install any app on the Playstore, knowingly or
unknowingly we give consent that we are bound by the terms and conditions of the
application.
In the case of Specht v. Netscape, the court held that “A consumer’s click on the download
button doesn’t communicate assent to contractual terms if the offer didn’t make clear to the
consumer that by clicking on the download button would signify assent to those terms.”
c. Shrink-wrap contracts: these contracts refer to licensee agreements that are wrapped with
the software where a customer or consumer cannot read the terms of the agreement until the
package is accepted and paid. An example of such an agreement is the End User License
Agreement (EULA).
In a US case, ProCD. Inc. v. Zeidenburg93, the court held that “the purchaser after reading the
terms of the license featured outside the wrap license opens the cover that is coupled with the
fact that he accepts the whole terms of the license that appears on the screen by a Keystroke,
constitutes the acceptance of the terms by conduct.” Therefore it is confirmed that the shrink-
wrap agreements are valid contracts and enforceable against the software purchaser.
VALIDITY OF ONLINE CONTRACT
The Information Technology Act, 2000 provides various procedural, administrative guidelines
and regulates the provisions relating to all kinds of electronic transactions. These include
computer data protection, authentication of documents by way of digital or electronic
signature. Though electronic contracts have been given recognition by the IT Act, 2000, but
majority feels it less secured to get into any kind of online contracts as there are no concrete
92
47 U.S.P.Q.2d (BNA) 1020, 1998 US Dist. LEXIS 10729, 1998 WL 388389 (N.D. Cal. Apr. 16,
1998).
93
86F .3d 1447 (7th Cir. 1996)
91 | New Technology Laws With Special Reference To Cyber Laws
judicial precedents for the validity and enforceability of online contracts in India. In case of
browse wrap contracts, we usually accept the terms and conditions of the contract by clicking
the button that indicates ‘ I Agree’ and in case of shrink wrap contract or purchase of a
software product, assent is given by the consumer or the purchaser with tearing of the wrapper
and using it. Many have the tendency of not reading the terms and conditions carefully before
agreeing to such. But these actions should be taken consciously and carefully only after
reading the terms of the contract properly as it leads to a valid contract and the terms can be
strictly enforced against them.
However courts in other countries such as US, have dealt with validity and enforceability of
contracts such as shrink wrap and click wrap contracts. It was held in the famous case
of ProCD. Inc. versus Zeidenburg94 “that the very fact that purchaser after reading the terms
of the license featured outside the wrap license opens the cover coupled with the fact that he
accepts the whole terms of the license that appears on the screen by a key stroke, constitutes
an acceptance of the terms by conduct.” Thus it is confirmed that shrink wrap agreements are
valid contracts and are enforceable against the purchaser of the software. But the
enforceability of the shrink wrap agreement is extended as far as the general principles of
contract are not violated. The validity of click wrap agreement was first considered when the
Court for northern district of California upheld in the famous case of Hotmail Corporation that
“the defendant is bound by the terms of the license as he clicked on the box containing “I
agree” thereby indicating his assent to be bound” [Hotmail Corporation v. Van $ Money Pie
Inc, et al95].
It was also held by the Appellate Division of Superior Court of New Jersey, that by clicking
the “I Agree” option given in the dialogue box the plaintiff has entered into a valid and
binding contract and can be made liable for the terms and conditions laid down in the contract.
Click wrap agreements are thus valid and enforceable in US as long as the offer and
acceptance rule is taken into consideration.
In the year 2015, an initiative known as ‘Digital India’ was launched by Narendra D. Modi,
the present Prime Minister of India. This campaign was launched to ensure that government
services available to the citizens of our country in any electronic way which will lead to the
improvement of online infrastructure and internet connectivity in our country. The initiative of
Digital India aims to connect rural areas with high speed internet networks and consists of
three components such as the creation of digital infrastructure, Delivery of services digitally
and digital literacy. Its main object is to make our country digitally empowered in the field of
technology.
With the wide spread expansion and globalization of technology, existence of online contract
has become regular in our life right from buying daily groceries from the market to
withdrawing money from an ATM. Electronic contracts by use of technology is much cost
effective and delay can be instantly removed in comparison to traditional paper based
contracts. There is less chance of committing errors as it is much automated. It provides an
94
Ibid
95
47 U.S.P.Q.2d (BNA) 1020, 1998 US Dist. LEXIS 10729, 1998 WL 388389 (N.D. Cal. Apr. 16,
1998)
92 | New Technology Laws With Special Reference To Cyber Laws
opportunity to the seller to reach millions of consumers irrespective of distance and most
importantly without the involvement of middlemen or any brokers.
The Indian Contract Act, 1872 provides a basic contractual rule that a contract is valid if it is
made by competent parties out of their free consent for a lawful object and consideration.
There is no specific way of communicating offer and acceptance; it can be done verbally, in
writing or even by conduct. Thus oral contracts are as valid as written contracts; the only
condition is they should posses all the essentials of a valid contract. It was held in the case
of Bhagwandas Goverdhandas Kedia v. Girdharilal Parshottamdas96, “that ordinarily, it is
the acceptance of offer and intimidation of that acceptance which results in a contract. This
intimation must be by some external manifestation which the law regards as sufficient. Hence,
even in the absence of any specific legislation validating e-contracts cannot be challenged
because they are as much valid as a traditional contract is.”
An online contract is simply a communication between two parties in regard to transfer of
goods/services. And as per Indian Evidence Act any e- mail communication and other
communication made electronically is recognized as valid evidence in a Court of law. By
considering the points, it can be concluded that the contract that follows the communication is
valid too and Indian law thus recognizes the validity of online contracts.
The citizens of India are encouraging the concept of Digital India, but there are no definite
legislations relating to the transactions done over computerized communication networks.
Several laws such as The Indian Contract Act, 1872, Information Technology Act, 2000,
Indian Copyright Act, 1957 and the Consumer Protection Act, 1986 to some extent are
working and acting on resolving issues that arise relating to the formation and validation of
online contracts. The Information Technology Act, 2000 is the Act that governs the
transactions conducted over internet and explains the considerable mode of acceptance of the
offer and provides the rules for revocation of offer and acceptance in a vague or indefinite
manner. Hence, a separate law for regulating contracts based on electronic devices is highly
recommended.
EVIDENTIARY VALUE OF ONLINE CONTRACT
In a country like India, where the literacy rate is not so high, the concept of ‘Digital India’ is a
far reach. People still feel insecure to do online based transactions mainly because the terms
and conditions of such contracts are not transparent. Another major issue is the nature of the
law governing the electronic contracts. Even if the IT Act, 2000 has legalized electronic
contracts, there are no definite provisions mentioned in the Act.
Documents are mainly registered for conservation of evidence, assurance of title and to protect
oneself from fraud. The evidentiary value of electronic contracts has been given recognition
and can be understood in the light of various sections of Indian Evidence Act. Sec 65B of the
Indian Evidence Act deals with the admissibility of electronic records. As per Sec 65B of the
Indian Evidence Act any information contained in an electronic record produced by the
computer in printed, stored or copied form shall deemed to be a document and it can be
admissible as an evidence in any proceeding without further proof of the original subject to
96
1966 AIR 543, 1966 SCR (1) 656
93 | New Technology Laws With Special Reference To Cyber Laws
following conditions are satisfied such as the computer from where it was produced was in
regular use by a person having lawful control over the system at the time of producing it,
during the ordinary course of activities the information was fed into the system on a regular
basis, the output computer was in a proper operating condition and have not affected the
accuracy of the data entered.
Section 85A, 85B, 88A, 90A and 85C of the Indian Evidence Act deal with the presumptions
as to electronic records. Sec 85A has been inserted later to confirm the validity of electronic
contracts. It says that any electronic record in the form of electronic agreement is concluded
and gets recognition the moment a digital signature is affixed to such record. The presumption
of electronic record is valid only in case of five years old record and electronic messages that
fall within the range of Section 85B, Section 88A and Section 90A of Indian Evidence Act.
REMEDIES FOR BREACH OF ONLINE CONTRACT
There is no specific rule in case of breach of online contract but the rules regarding remedies
for breach of contract can be followed as provided in The Indian Contract Act. A valid
contract gives rise to co- relative rights and obligations and they are enforceable in the court of
law when infringed on breach of contract. The Contract Act mainly talks about two remedies
for the breach of contract such as Damages and Quantum Merit. But few other remedies are
also available as provided in the Specific Relief Act such as specific performance of contract
and injunction restraining the other party from making a breach of contract.
Sec 73 and Sec 74 of the Indian Contract Act, 1872 deals with the rules regarding the remedy
of damages on breach of contract. The person whose rights are infringed by the breach of
contract may bring an action for damages or compensation in terms of monetary value for the
loss suffered by the party. There are two main aspects to be considered when any action of
damages i.e remoteness of damage and measure of damage. Sec 73 to 75 provides rules
regarding the assessment of damages based on the famous case Hadley vs. Baxendale 97 .
According to the rules laid down in this case, there can be damages which naturally arose on
the usual course of things from such breach of contract and can be called ordinary damages
and secondly, damages for loss arose from special circumstances i.e special damages. There
are also other kinds of damages mentioned in the Act such as nominal damage, pre- contract
expenditure, compensation for mental agony and liquidated damages. Nominal damages are
those substantial damages awarded by the Court in recognition of right of the aggrieved party
in cases where the party has not suffered any monetary loss on the breach of contract.
Whereas, pre- contract expenditure may be recovered as damages if such is within the
knowledge of the parties. Liquidated damages are those pre-determined damages decided by
the parties at the time of formation of the contract i.e amount of compensation payable in the
event of breach of such contract.
When a person has done some work under a contract and the other party repudiates the
contract or at the occurrence of an event that makes further performance of the contract
impossible, the party who has performed his work can claim remuneration for the work
97
[1854] EWHC J70, (1854) 156 ER 145
94 | New Technology Laws With Special Reference To Cyber Laws
already done. And under such circumstances the party can file suit upon quantum merit and
claim for the value of work he has done.
Online privacy issues related to e-contracts
Contracts have become a common part of our day-to-day lives that most of us don’t even
realize that we have entered into one such contract. When we use online platforms such as
Facebook, Instagram, Netflix, or other platforms, knowingly or unknowingly we enter into
online agreements by providing our personal information, signing up on these platforms by
creating an account, and clicking on ‘I agree’ to certain provided terms and conditions.
Privacy concerns with Facebook
For years, Facebook had faced numerous privacy concerns. There are instances that arose
from the company’s revenue model that involved selling information about users which led to
violation of privacy.
In 2018, Cambridge Analytica, a British political consulting firm was exposed by a sting
operation where it collected private data of around fifty million users of Facebook from friend
lists of Facebook users to create psychometric profiles to be used by personalized political
apps, campaigns, ads. It also used fake news to swing elections around the world. With regard
to this Facebook had received many warnings about its data security policies but Facebook
didn’t take any preventive steps to curb these.
Privacy concerns with Instagram
Instagram has provided three arbitrary terms and conditions which violate the user’s privacy,
these include;
• Instagram has sole copyright over the content and photographs that are posted on
its platform. It means the prima facie account is of the user but the copyright over
the account is of Instagram.
• Instagram has the right to disclose the personal information provided by the users
to third parties.
• Class action suit cannot be filed against Instagram, which means a suit cannot be
filed against Instagram collectively.
Privacy concerns with Netflix
Netflix contains two arbitrary and unreasonable policies that violate the information of the
users, which are;
• Netflix can change its terms and conditions anytime without letting its users
know, where it can even disclose the personal data of the users without informing
them.
• It can also disclose personal information to third parties without the consent of
the users.
E-BANKING
The word ‘Banking’ has been defined in the Banking Regulation Act, 194998 as ‘the accepting,
for the purpose of lending or investment, of deposits of money from the public, repayable on
demand or otherwise, and withdrawal by cheque, draft, order or otherwise’. Thus banking
means an industry that deals with cash, credit and other financial instruments. The bank
accepts deposits from its account holders and uses those deposits in lending loans for the
purpose of investment and earns interest in return. A connection of two or more computers is
called as a network and a connection of two or more such networks is called as internetwork
or Internet. It is the largest connection of such systems. Internet is often described as
‘Information Superhighway’ as it is a means to reach innumerable destinations. Thus the
word internet may be defined as a global system of interconnected computer networks that
uses the Internet protocol or Transmission Control Protocol (IP & TCP) to communicate
between the networks and devices. And thus accordingly, Internet Banking may be defined as
a form of banking wherein the funds are transferred through an internet based medium
between financial institutions, rather than an exchange of cash, checks, or other negotiable
instruments99.
Albert Einstein once said, “Technological progress is like an axe in the hands of a
pathological criminal”, this quote of Albert Einstein is the main crux of this paper, put forth
in a simpler manner. The linking of the internet and banking has made the procedures,
techniques and processes of banking simpler, easier, faster and efficient. Since the internet
works on big chunks of data that are exploited by malicious elements, such as hackers,
spammers, drudgers and infection vector creators who target and compromise data of financial
institutions by using unlawful methods to put the safety, security and privacy of various
individuals who confide, rely and trust the Banking infrastructure of India at risk. To protect
the faith reposed by Indians in the Banking System, there are laws enacted by the Parliament
of India to protect the confidence placed in the e-banking system, meanwhile, the currently
existing legal structure is sufficient but due to the entry of artificial intelligence and daily
evolution of technology, the current legal structure might fall short by a yardstick until and
unless it undergoes an upgrade to protect Indian consumers. The objective of this paper is to
analyse the existing legal structure of e-banking and give some constructive recommendations
to upgrade, improve, enhance, and adapt to the forthcoming future of the banking processes in
India.
98
Section 5(c), The IT Act, 2000, No. 21, Act of Parliament, 2000 (India)
99
Gunjan Bhagtan & Jhanvi Pandya, Contemporary Legal Issues in Indian E Banking System, Volume
2, Issue 1, JBIL, 40, 38-48, 2019.
98 | New Technology Laws With Special Reference To Cyber Laws
Banking is defined as the business of accepting monetary deposits from the public with the
sole objective of loaning, or financing, repaying money on receiving requests, and withdrawal
of money via any financial instrument. The internet has been called the “highway of
information” because it possesses the capability to connect billions of people across the globe
at the touch of a button at the same time internet uses IP Addresses (Internet Protocol
Address) to identify, locate and detect servers across its network to communicate information
in bytes across the network laid down by the Service Provider.
Different types of online financial transactions are:
National Electronic Fund Transfer (NEFT)
National Electronic Funds Transfer (NEFT) is a nation-wide payment system facilitating one-
to-one funds transfer. Under this Scheme, individuals, firms and corporates can electronically
transfer funds from any bank branch to any individual, firm or corporate having an account
with any other bank branch in the country participating in the Scheme. Individuals, firms or
corporates maintaining accounts with a bank branch can transfer funds using NEFT. Even
such individuals who do not have a bank account (walk-in customers) can also deposit cash at
the NEFT-enabled branches with instructions to transfer funds using NEFT. However, such
cash remittances will be restricted to a maximum of Rs.50,000/- per transaction. NEFT, thus,
facilitates originators or remitters to initiate funds transfer transactions even without having a
bank account. Presently, NEFT operates in hourly batches - there are twelve settlements from
8 am to 7 pm on week days (Monday through Friday) and six settlements from 8 am to 1 pm
on Saturdays.
Real Time Gross Settlement (RTGS)
RTGS is defined as the continuous (real-time) settlement of funds transfers individually on an
order by order basis (without netting). 'Real Time' means the processing of instructions at the
time they are received rather than at some later time; 'Gross Settlement' means the settlement
of funds transfer instructions occurs individually (on an instruction by instruction basis).
Considering that the funds settlement takes place in the books of the Reserve Bank of India,
the payments are final and irrevocable. The RTGS system is primarily meant for large value
transactions. The minimum amount to be remitted through RTGS is 2 lakh. There is no upper
ceiling for RTGS transactions. The RTGS service for customer's transactions is available to
banks from 9.00 hours to 16.30 hours on week days and from 9.00 hours to 14:00 hours on
Saturdays for settlement at the RBI end. However, the timings that the banks follow may vary
depending on the customer timings of the bank branches.
Electronic Clearing System (ECS)
ECS is an alternative method for effecting payment transactions in respect of the utility-bill-
payments such as telephone bills, electricity bills, insurance premia, card payments and loan
repayments, etc., which would obviate the need for issuing and handling paper instruments
and thereby facilitate improved customer service by banks / companies / corporations /
government departments, etc., collecting / receiving the payments.
1. Internet banking has removed the traditional geographical barriers as nowadays the
customer can access the banking services from anywhere without actually visiting the bank.
But it is pertinent to note here that this feature of Internet banking has raised a jurisdictional
issue as to which jurisdiction or supervisory system such matter be subjected.
2. It has reduced the traditionally associated banking risks and problems like infrastructure
requirements, manpower requirements, etc., but at the same time, i-banking has increased
security related issues as well.
3. It is cost and time effective to both the banker and the customer and it facilitates
transactions all time including holidays as well.
ISSUES IN INTERNET BANKING
After looking at the distinguishing features of Internet Banking, we can say that i-banking has
increased the ease of doing business in India. Though there are few Regulatory and
Supervisory concerns that arise mainly out of the distinguishing features highlighted above.
These concerns can broadly be categorized into the following four categories:-
(i) Legal and regulatory issues,
(ii) Security and technology issues,
(iii) Supervisory and operational issues, and
(iv) Authentication issues.
Some of these issues are more susceptible than others, for eg, the privacy breach issue.
100 | New Technology Laws With Special Reference To Cyber Laws
Security and Privacy Issues:- The greatest roadblock in the adoption of internet banking is
Security, it is a prominent risk factor for the internet banking system, and this is one of the
major areas of concern for the regulators. Security issues may be classified as: Internal or
External, Human or Non-Human, Incidental or accidental. The security issue involves
adopting internationally accepted technology, encryptions/ decryptions, verification of digital
signatures, etc. Easy access to financial accounts makes internet banking an easy and simple
target for hackers. ‘Phishing’ is one of the most common methods of hacking and gaining
confidential information of customers.
Privacy is vital for mankind in today’s world. And a lack of securitized transactions may result
in loss of data, theft, tampering with customers or bank’s information, etc. which may result in
money laundering, and other frauds. There have been many instances wherein security breach
has resulted in leakage of important data and thus, we can say that security issues are the
major roadblock in a fully-fledged adoption of internet banking in India.
Legal Issues:- As we know that the internet is a public domain, where geographical territories
are eliminated, and therefore this raises issues relating to the jurisdiction of law, the difference
in the legal rules for electronic commerce, etc. Let’s discern this with a practical illustration:
‘A’ (accessing the internet from Indian) makes a transaction through his account in Bank ‘B’
(situated in the U.K), and transfers the amount to ‘C’ (a resident of U.S.). Now in this
illustration, a question of jurisdiction arises, as to in whose jurisdiction does the matter fall in,
whether to apply the laws of the country where the internet is accessed, or where the bank is
situated or at the place where the transaction has taken place? Allied to this question, where
the income has actually been earned, and who should levy the tax on such transaction? There
is still no definite answer to these questions, although this legal issue is being debated, and is
expected to head away to some positive result in the near future.
Supervisory and Operational Issues:- Operational risk is the risk of direct, or indirect, loss
resulting from inadequate or failed internal processes, people, and systems, or from external
events.7 They are the most common risk associated with internet banking and are also known
as Transactional Risks. Operational risks involve: inaccurate processing of the transactions,
non-enforceability of contracts, unauthorized access, intrusion in the bank’s system, etc. This
kind of risk generally arises due to the inefficient design of the banking software, other
technological inefficiencies, human negligence, fraudulent activity by employees etc8 .
Security and operational issues are two terms often used interchangeably, though there is a
thin line difference between these two.
Authentication Issues:- The Authentication issue typically involves security procedures like:
PIN No., Customer Relation No., Password, OTP, Account No., etc are involved to test the
authenticity of an instrument. Different nations have set out different parameters to judge the
authenticity of a transaction. In India, The Information Technology Act, 2000 100 provides that
any subscriber may authenticate his electronic record through a Digital Signature. The issue
with authentication is that the Act recognizes only one particular technology for authenticating
electronic documents (i.e asymmetric cryptosystem), so this raises the doubt whether the law
100
Section 3(2), The IT Act, 2000, No. 21, Act of Parliament, 2000 (India).
101 | New Technology Laws With Special Reference To Cyber Laws
recognizes other banking authentication technologies or not. Legislatures of other countries
have kept the authentication process technologically neutral.
Threats to Mobile Banking
1. Mobile Banking Malwares: There have been incidents that involved sophisticated virus
infecting bank¿s mobile apps users to steal password details and even thwart twofactor
authentication, by presenting victims with a fake version of the login screen when they access
their legitimatebanking application. A key vector by which the mobile banking malware get
into the mobile device is through malicious applications posing aslegitimate applications those
users download and then become infected.
For prevention against Malware attacks:
• Download and use antimalware protection for the mobile phone or tablet device.
• Keep the Banking App software up to date: Using the latest version of software allows
receiving important stability and security fixes timely.
• Use security software: Applications for detecting and removing threats, includig
firewalls, virus and malware detection and intrusion-
detection systems, mobile security solutions should be installed and activated.
• Reputed applications should only be download onto the smart phone from the market
after look at the developer's name, reviews
and star ratings and check the permissions that the application requests and ensuring t
hat the requests match the features provided by that application.
2. Phishing/Smishing/Vishing Attack : An attacker attempts phishing on to a mobile phone
through SMS (Short Message Service),text message, telephone call, fax, voicemail etc. with a
purpose to convince the recipients to share their sensitive or personal information. For
prevention against phishing attacks Emails or text messages asking the user to confirm or
provide personal information (Debit/Credit/ATM pin, CVV, expiry date, passwords, etc.)
should be ignored. SSL (Secure Sockets Layer) and TLS (Transport Layer Security) should be
adequately implemented in mobile banking apps thus helping to prevent phishing and man¬-
in-¬the--middle attacks.
3. Jailbroken or Rooted Devices : This is practiced to gain unrestricted or administrative
access to the device's entire file system, at the risk of exposing the device vulnerable to the
malicious apps download by breaking its inherent security model and limitations,
allowing mobile malware and rogue apps to infect the device and control critical functions
such as SMS. Thus the mobile banking app security is exposed to extreme risk on a jail broken
device.
4. Outdated OSs and Non secure Network Connections : Risk factors such as out¬dated
operating system versions, use of non secure Wi¬ Fi network in mobile devices allow
cybercriminals to exploit an existing online banking session to steal funds and credentials.
For prevention: Use Secure Network Connections: It's important to be connected only to the
trusted networks. Avoid the use of public WiFi networks. More secure and trusted WiFi
connections identified as "WPA or WPA2" requiring strong passwords should be used.
101
Reserve Banki of India, GUIDELINES ON INTERNET BANKING IN INDIA
(http://cashlessindia.gov.in/CERT-In%20Advisory%20Notes-
Mobile%20and%20Cloud%20Data%20Security.pdf)
102
Wondershare Sign X, Public Key & Private Key in Digital Signature.
104 | New Technology Laws With Special Reference To Cyber Laws
(vii) If any security breach is seen it must be immediately seen and should be reported
immediately and the follow up action must be kept in mind while farming future policies.
Banks must acquire all the tools that are required for monitoring the system and protect it from
intrusions and attacks. Such tools should be regularly used to ensure security and to avoid
security breach. In addition to the above, the Banks should also educate their security
personnel and also the end-users on a continuous basis.
(viii) Banks should have proper schedules for banking data backup and must ensure proper
infrastructure. The guidelines also recommended to have periodical testing of backed up data
so as to ensure recovery without any loss of data in limited time frame.
(ix) Banks should maintain proper record keeping facilities for legal purposes. Its messages
and transactions must necessarily be kept in both encrypted and decrypted form.
(x) Security infrastructure must be properly tested before resuming normal Internet banking
operations. The banking systems must be periodically update there system application to
removes bugs and to upgrade to a newer version which would give better service and security.
Information Technology Act, 2000 (“IT Act”)
E-banking is mainly regulated by the Banking Regulation Act, 1949 and the Reserve Bank of
India Act, 1934 but all sorts of cybercrimes and electronic payment related systems are
regulated by the IT Act and the important features of the IT Act which should be noted are:
1. The legislative intent behind the IT Act is to enable e-commerce and governance
wherein all electronic documents and digital signatures are recognized under IT
Act which should be retained and analysed properly by the bank because all
contracts and electronic transactions are lawful and enforceable under this Act.
2. No e-banking transaction can survive if it is not in conformity with the provisions
of the IT Act because the protection of privacy and crypto function-based
authentication of E-transactions can only take place under the umbrella of this
Act as theft of data via unethical means of hacking, creation and spreading of the
virus is punishable under this Act. In fairness, the Act also grants immunity to
prevent harassment to Internet Service Providers and intermediaries over the
illegal activities committed on their networks.
3. With the immunity granted, a duty is cast on the Bank (intermediary) to keep a
record and conserve the same as directed by the Central Government from time to
time, meanwhile the violation of security or privacy of E-transactions during
sign-in, password typing, and other confidential information is protected under
the aegis of this Act, wherein any violation thereof has been made punishable.
This act have a direct bearing on the working of the internet banking in India and thus
it can be said that Internet banking cannot be operated without being in conformity
with the IT Act 2000. Following are the points which highlight the importance of
Information Technology Act, 2000 in regards to internet banking:
(i) Scrutinization of Documents: Any banking transaction requires scrutinization
and retention of various documents and in internet banking these documents are
105 | New Technology Laws With Special Reference To Cyber Laws
retained and scrutinized in electronic form. The legal recognition to these electronic
documents is given by the IT Act only103.
(ii) Electronic Transaction: Every transaction entered electronically is recognized by
the provision of the IT Act. Section 10-A of the Act gives validity and enforceability
to a electronic transaction, and thus without the provisions of IT Act no internet
banking transaction can be challenged in the court of law104.
(iii) Authentication: Authentication of these electronic records for the purpose of
electronic banking should be in accordance with the provision of this act.
(iv) Digital Signature: If the documents are signed electronically of digitally it is
governed according to the provisions of this act only. Thus, this act would satisfy the
signing of a document for the purposes of Internet Banking.105
(v) Privacy: Privacy is very important in internet banking because if privacy and
security wouldn't had been there, Internet banking may not have survived.106
(vi) Data theft: Section 66 of the IT Act penalizes a number of acts relating to theft of
done on computer system, few ways in which data theft can be done are: hacking,
introducing and spreading viruses through computer networks, etc.
(vii) The object of the IT Act is to facilitate e-commerce and e-governance which are
important for the functioning of Internet banking in India.
By looking at the above points it can be said that the Information Technology Act,
2000 has laid down the basic legal framework conducive to the Internet banking in
India. And thus accordingly a comprehensive way needs to be adopted so as to bring
uniformity and harmony between the provisions of the IT act and the guidelines
issued by the Reserve Bank of India.
Few of the important provisions of the IT Act are as follows:-
a) Section 3(2): This section recognizes only one particular technology (crypto
function and hash function) as a means of authenticating electronic records. This
approach has been kept technology neutral in various nations.
b) Section 4: This provision gives legal recognition to all the contracts and
agreements made in electronic form.
c) Section 72: It provides for the penalty in case of privacy breach
d) Section 79: It provides immunity to the network service providers and excludes
them from liability in case of any illegal activity committed through their network.
103
Chapter III of The IT Act, 2000, No. 21, Act of Parliament, 2000 (India).
104
Validity of contracts formed through electronic means.
105
Electronic Document
106
Penalized under Section 72 of The IT Act, 2000, No. 21, Act of Parliament, 2000 (India)
106 | New Technology Laws With Special Reference To Cyber Laws
In January 2011, RBI constituted G Gopalakrishna Working Group to review the
security of Electronic Banking in India. The committee on April 2011 notified 107 few
changes which constitute the current regulatory guidelines
Indian Penal Code, 1860
Many of the Internet Banking related crimes are penalized by the Indian Penal Code. There
are various provisions of IPC which protects Internet Banking related frauds, theft, etc. Un -
surprisingly there are a number of provisions in the Indian Penal Code that overlaps the IT
Act, 2000. Few of those provisions are discussed below:
1. Data Theft: As defined under Section 378 of IPC, theft also includes theft of data online or
otherwise. There are a number of ways in which the data relating to internet banking can be
stolen like for example: hacking, spreading viruses, destroying computer systems, denying
access to a person authorized. And thus protection of data becomes crucial. And IPC bars such
activities protects the interest of internet banking users. Section 424 108 of IPC also bars data
theft in India by punishing the person who assists or conceals the data
2. Receipt of a stolen property: If any person receives the furtherance of any property stolen
from an internet banking transaction, he shall be held liable u/s 411 109of IPC and shall be
punished with imprisonment up-to 3 months or with fine or with both. This provision of IPC is
similar to Section 66-B of the IT Act, which provides Punishment for dishonestly receiving
stolen computer resource or communication device.
3. Cheating by Personation: Section 411 (Dishonestly receiving stolen property) of IPC
provides punishment for or any act committed through cheating by personation. Section 66-C
110
of IT Act also punishes the same. Any person who commits the offence of cheating by
means of computer is said to do Cheating by Personation.
4. Mischief: It is needless to say that any person who, with a wrongful intention, introduces
viruses into computer system, damages the computer system or denies the access to the person
authorized to use that system, shall be liable for mischief, which is punishable under Section
425 of IPC with imprisonment up-to 3 months or with fine or with both.
5. Forgery: In Internet Banking Transactions forgery can be done by giving false electronic
documents or other records111 .
There are a number of other criminal activities which the IPC doesn't punish, but are
punishable under the IT Act. Few of them are:
107
WORKING GROUP ON ELECTRONIC BANKING, Report
108
Section 424: Dishonest or fraudulent removal or concealment of property, Indian Penal Code, Act
No 45 of The Imperial Legislative Council, 1860.
109
Section 411 IPC: Dishonestly receiving stolen property, Indian Penal Code, Act No 45 of The
Imperial Legislative Council, 1860
110
Section 66-C IT Act: Identity theft and cheating by personation, The IT Act, 2000, No. 21, Act of
Parliament, 2000 (India).
111
Section 468 of IPC, Indian Penal Code, Act No 45 of The Imperial Legislative Council, 1860
107 | New Technology Laws With Special Reference To Cyber Laws
1. IPC doesn't punishes a person who charges the services availed by him to the account of
some other person by tampering or manipulating any computer system, or computer network.
Such an act is punished u/s 43(h) of the IT Act.
2. Tampering with computer source document. To a certain extent it is punished u/s 409 of
IPC but it is not extensively been described there. And thus section 65 of the IT Act deals with
it.
3. Violation of Security/Privacy while transacting online: Punishable u/s 66E of IT Act.
Privacy while logging, entering password, transacting, is very important in Internet Banking
4. Preservation of Intermediaries (Banks in our case): Section 67 requires an 'intermediary' to
preserve and retain all such information that the central government prescribes. This provision
was challenged before the court in the case of Shreya Singhal vs. UOI 112 , wherein the court
affirmed the validity of this section.
Other Legislations
1. INCOME TAX ACT 1961: Section 40A(3): The Benefit of this section is available to the
account holder only when the amount is transferred through internet banking or through a
cheque. This section is intended to prevent tax evasion and to bring all the transactions above
20000 under the preview of the bank.
2. NEGOTIABLE INSTRUMENT ACT, 1881: Section 6: The concept of Truncated
Cheque and e-cheque was added. These cheques are negotiable instruments in electronic
format which are a part of internet banking. All of these instruments are required to maintain
minimum safety requirements with the use of digital signatures (which may be linked with
biometric).
3. PREVENTION OF MONEY LAUNDERING ACT, 2002: Section 11: It imposes a duty
on every financial institution and intermediary to maintain a record of every transaction. This
applies to all the banks whether offering physical or internet services. This provision helps the
prevention of money laundering from taking place through the internet banking.
4. CONSUMER PROTECTION ACT, 1986: This act aims to protect the interests of the
consumers. It is also applicable to Banking Services as well. The issues such as privacy, the
secrecy of consumer’s accounts and the rights and liabilities of customers and banks, etc. in
respect of internet banking are protected through this act.
Legal remedies and some solutions to the problems in the existing legal structure
There are various issues in e-banking which the existing legal structure has failed to address,
hence the following are some of the remedies and solutions to the existing cyber problems
faced during e-banking:
1. Jurisdiction and enforceability- Since the internet is a borderless world and
cybercrimes threaten the sanctity of e-banking, herein cyber-attacks can take
place from any computer either located in India or abroad hence Section 75 of the
IT Act gives universal jurisdiction whenever any sort of cyberattack takes place
112
(2013) 12 S.C.C. 73
108 | New Technology Laws With Special Reference To Cyber Laws
on any computer located within the territory of India. Such crimes are
investigated and prosecuted by cyber cells which are located across various
districts in India. If a cyberattack is foreign state sponsored, then compensation
by means of attachment of property existing in India of that foreign state can be
claimed by the Republic of India.
2. Seeking Compensation, Penalty, and prosecution by Cyber Cells- Under
Section 43A and 72 of the IT Act any theft, breach of confidential data, cheating
or offences of the same nature are liable to be penalized and the victim shall be
compensated in case any fraud takes place during E-Banking transactions. It is
also pertinent to note that the Banker’s Book Evidence Act mandates that bank
records in digital format can also be appreciated by the Court as it can be treated
as documentary evidence under Sections 65A and 65B of the Indian Evidence
Act, 1872.
3. Approaching the Consumer Forum- Disputes regarding the privacy of
consumer accounts, rights, deficiency in E-banking services, liabilities of banks
towards its customers, and the rights of consumers can be enforced by the
Consumer Forum having the relevant pecuniary jurisdiction under the Consumer
Protection Act, 2019.
4. Approaching Special Court for Money Laundering cases- Under Section 11 of
the Prevention of Money Laundering Act, 2002, any money laundering taking
place through E-Banking can be prosecuted and prevented under the aegis of this
Act and Section 11 also casts a burden upon the Bank to maintain a record of
each and every transaction occurring through its electronic payment gateway.
IMPACT OF INTERNET BANKING
Internet Banking transaction are much cheaper than the physical banking transactions. The
Set-up of Internet banking is comparatively cheaper to the banks and thus, it is leading to the
introduction of a lot of new trends in the Banking world. Traditional Banking System may
find it difficult to raise additional cash or investment in the Stock Markets, but this in contrast
to the Internet Banking System seems to be a relatively easier task to interact investment.
Internet Banking has now become an integral part of global financial market, so as to meet the
needs of different financial markets/ institutions. And thus accordingly Internet Banking has a
bold impact in the global and local markets, and its popularity has been growing exponentially
as the internet users in the world increases.
Internet Banking Offers a Number of Advantages to the Customers and the Banking
Institutions. Few of which are mentioned below:
• From Banking Institution’s Point of View
1. Reduces the cost of delivering services
2. Gives a competitive advantage to the banks from their peers
3. Promotional Advertisements on their site may also generate some additional
revenue
4. Paperless transactions
OBLIGATION OF BANKS
Few obligations which every banking institution is bound to follow:
1. Duty to maintain Secrecy of customers account: This obligation was introduced
in the Tournier’s Case114 back in 1924, in which it was held that banker has a duty to
maintain the secrecy of customers account details, the nature and the details of the
accounts should not be disclosed to anybody, because it may effect the reputation,
credit worthiness of the customer. Now with the growing sphere of internet banking
and the increasing menaces of cyber crimes this duty has became more difficult
because of the presence of Hackers.
2. Duty to produce documents to the courts115: Whenever the court calls for any
document it is the duty of the banker to bring those documents before the court. This
is basically an exception to the above mentioned principal of secrecy. The banker
shall produce the documents whenever the court calls for it, it won’t amount to
privacy breach.
3. Obligation to verify the validity of digital signature: This must be done in
accordance to the procedure established under the IT Act, 2000. The law is very strict
in relation to forged document, and thus it is the duty on the paying bank to verify the
validity of the signatures
4. Obligation to provide services to the customers: Banking institutions offers a
variety of services to its customers (few of them discussed in the next section). It is
the obligation of the bank to extend these services to the Internet Banking Users as
well. The same had been expressed by the apex Court in the case of Vimal Chandra
Grover vs. Bank of India116
SERVICES ON INTERNET BANKING
1. Information System: The customers of Internet Banking may get the general
information like loan facilities, bank products and their features, account activity, etc.
113
Dr. Prof Renu & Mr. Kuldeep Singh, The Impact of E Banking on use of Banking Services and
customer satisfaction IJTSRD, Volume 3, Issue 4, Pg. 23
114
Tournier v. National Provincial & Union Bank of England, (1924), K.B., 461
115
Section 4, The Bankers Book Evidence Act, Act No, 18 of 1891
116
AIR 2000 SC 2181
110 | New Technology Laws With Special Reference To Cyber Laws
They can also download various forms or applications like the loan application
form.117
2. Transfer System: Every internet banking user can transfer funds to anyone from
their home itself. Of course if anyone wants to transact online he needs few details
relating to his account like his account number, password, CRN No., etc. The users
can also see their account balance, transactions, statements, etc. (These information
are available in read only mode format only). The customers authentication is mostly
done through passwords.118
3. Various other services are also offered, few of which are: Ticket Bookings,
mobile recharge, shopping, investments, payment of bills, etc.119
Banking System always has an important role to play in the economy of every nation.
The banking system as it stands today has become more intricate with different
services stemming from reliance on technological changes which has shaped the
complete banking system from a manual intensive industry to a highly automated and
technologically dependent industry. Now the internet banking enables the business
anywhere any at anytime. Internet Banking has now become a virtual blessing as it
eliminates few of the problems in the Banking sector and had been proved
advantageous to both, the banks and its customers.
CAPACITY BUILDING AND AWARENESS PROGRAMMES BY THE
GOVERNMENT
DIGISHALA – EDUCATIONAL TV CHANNEL FOR DIGITAL PAYMENTS
ON DD FREE DISH
Door Darshan (DD) Free Dish reaches to around 2 to 2.5 crore families, mostly in
rural areas and people from poor background. The DigiShala is an education and non-
commercial TV channel on DD Free Dish with aim to:
• Impart education related to the digital payment ecosystem, its tools, benefits and
processes
• Inform and educate citizens about Digital India - cashless, faceless and paperless
• Encourage citizens especially in rural and semi urban areas to use digital payments as
well as other products and services offered by Digital India
DigiShala Subscription Details
• Free to Air (FTA) Channel with receiving frequency: 11590 MHz
• Satellite/Location: GSAT 15 (DD Direct DTH), 93.5 degree East
• Broadcasted nationally on DD Free Dish DTH service
117
K.C SHEKAR., BANKING THEORY AND PRACTICE, 45, (20th Edition, 2007).
118
Ibid
119
JOGA ROA, COMPUTER CONTRACTS AND INFORMATION TECHNOLOGY LAW, 123,
(2ND Edition, 2005).
111 | New Technology Laws With Special Reference To Cyber Laws
• affordable service without any subscription fees
DigiShala TV Channel is also available on channel no 2032 on Dish TV (of Zee
Group)
DigiShala Programme Portolio
Range of educational programmes on Digital India in multiple regional languages
Sessions with focus on:
• Step by step demos of making digital payments using UPI, USSD, Aadhaar, e-
Wallets, cards etc
• Talk shows and panel discussions with experts
• Case studies on business transformation using digital payments
• Information about products and services under the Digital India programme
SCHEMES BY GOVERNMENT
Digital Finance for Rural India: Creating Awareness and Access through Common
Service Centres (CSCs)
Ministry of Electronics and IT (MeitY) has launched a new scheme entitled “Digital Finance
for Rural India: Creating Awareness and Access through Common Service Centres (CSCs)”
under Digital Saksharta Abhiyan (DISHA) with objectives to enable the CSCs to become
Digital Financial Hubs, by hosting awareness sessions on government policies and digital
finance options available for rural citizens as well as enabling various mechanism of digital
financial services such as IMPS, UPI, Bank PoS machines etc. with an outlay of ₹ 65.625
crore.
2 lakhs Common Service Centres (CSCs) to provide capacity building, awareness access for
digital payments methods to around1 crore rural citizensand 25 lakhs merchants across India.
Each CSC would reach out to 40 households in the catchment area, covering one person from
each household. Apart from rural citizens, each CSC would also target 10 Merchants per
Panchayat to facilitate them in getting POS machines or digital payment mechanism.
VITTIYA SAKSHARTA ABHIYAN (VISAKA)
Ministry of Human Resource Development (MHRD) views the institutions of higher
education in the country, faculty members and students to take the lead and act as engines of
this transformational shift.The purpose of the `Vittiya Saksharta Abhiyan’ is to actively
engage the youth/ students of Higher Education Institutions to encourage and motivate all
payers and payees to use a digitally enabled cashless economic system for transfer of funds.
The best way of leadership is to lead by example. All heads of higher educational institutions
should plan for a cashless campus, within a limited timeframe, for all transactions within the
campus. Various options of digital transactions are presented here. To begin with, the faculty,
staff and students, whom we refer to as engines of change, need to dispel the commonly held
belief that digital transactions are complex and necessarily require a smart phone and internet
connectivity. They need to further educate their family members and people in their
112 | New Technology Laws With Special Reference To Cyber Laws
immediate surroundings and motivate them for digital transactions. NCC/NSS volunteers of
an institute may take up a major market and interact with shop owners, including vendors, and
their associations with an objective of developing a cashless market focusing on each point of
sale120.
PROMOTING DIGITAL PAYMENTS WITHIN GOVERNMENT
Ministry of Electronics and Information Technology (MeitY), Government of India envisages
Paperless, Cashless and Faceless services across the country, especially in rural and remote
parts of India. MeitY further envisages common e-Governance infrastructure that will offer
end-to-end transactional experience for a citizen, businesses as well as internal government
functions, which includes accessing various services and making payments and receipts
through electronic modes. The Apex Committee on Digital India has recommended a targeted
and time bound approach to implement digital payments for citizens across all the e-Services
of Government Ministries and Departments. Against this backdrop, MeitY has notified
Guideline for Electronic Payments and Receipts (EPR), intended for Central Public Sector
Undertakings, State Governments, Govt. of India Autonomous Bodies, and Municipalities for
expeditiously implementing appropriate mechanism to enable electronic payments and
receipts. The objective of this guideline is to provide guidelines for Departments to:
• Assess various services involving payments and receipts by types of services and level
of electronic payment enablement
• Provide actionable instructions for universal adoption of electronic payment modes
for each type of service through various payment channels
• Provide guidelines on engagement with various payment service providers
The Guidelines for Electronic Payments and Receipts (EPR) will be implemented through
assessment of the department’s overall status of services offered and maintain a repository of
services offered by departments. This repository will be used for measuring and tracking of
adoption level electronic payments across departments in India. Furthermore, information of
departments requiring payments integration will be shared with Government and private sector
Payment Systems providers (PSPs) for enablement of Electronic modes and channels of
payments121.
NITI Aayog announces the launch of the schemes Lucky Grahak Yojana and the Digi-
धन Vyapar Yojana to give cash awards to consumers and merchants who utilize digital
payment instruments for personal consumption expenditures. The primary aim of these
schemes is to incentivize digital transactions so that electronic payments are adopted by
all sections of the society, especially the poor and the middle class.
120
http://cashlessindia.gov.in/NITIAayog_step-by-
step%20presentation%20on%20digital%20payments_English.pdf
121
http://cashlessindia.gov.in/promoting_digital_payments.html
113 | New Technology Laws With Special Reference To Cyber Laws
The scheme will become operational with the first draw on 25 th December, 2016 (as a
Christmas gift to the nation) leading up to a Mega Draw on Babasaheb Ambedkar
Jayanti on 14th April 2017. It will comprise of two major components, one for the Consumers
and the other for the Merchants:
• Lucky Grahak Yojana [Consumers]:
• Daily reward of Rs 1000 to be given to 15,000 lucky Consumers for a period
of 100 days;
• Weekly prizes worth Rs 1 lakh, Rs 10,000 and Rs. 5000 for Consumers who
use the alternate modes of digital Payments
This will include all forms of transactions viz. UPI, USSD, AEPS and RuPay
Cards but will for the time being exclude transactions through Private Credit
Cards and Digital Wallets.
122
http://cashlessindia.gov.in/lucky-grahak-yojana-and-digi-dhan-vyapar-yojana.html
114 | New Technology Laws With Special Reference To Cyber Laws
India (NPCI), a not-for-profit company for providing retail payment systems in the country
under guidance from Reserve Bank of India.
BHIM has been designed for quick and secure user on-boarding, sports a best-in-class and
intuitive user interface and makes digital transactions seamless. BHIM has been a huge boon
for merchants who can now accept payments directly into their bank accounts. All users,
including merchants, get a ready to use VPA (virtual payment address) and an exclusive,
ready-to-print QR code upon sign-up123.
E-banking services have revolutionized the way we manage our finances. With the
convenience of being able to access banking services from anywhere with an internet
connection, e-banking has become a popular choice for many individuals and businesses.
The benefits of e banking services are numerous, including the ability to access your account
24/7, lower fees, higher interest rates, and the ability to easily track your spending.
Additionally, many e-banking services now offer advanced features such as budgeting tools
and investment advice, allowing individuals to take control of their finances and make
informed financial decisions.
The evolution of technology has played a major role in the development of e-banking services,
with advancements such as mobile banking, social banking, and digital wallets. The use of
artificial intelligence and machine learning has also helped to improve the customer
experience, personalize banking services and detect fraudulent activities.
There are several types of e banking services available, each offering different features and
benefits. Some common types of e-banking services include online banking, mobile banking,
social banking, and digital wallets.
In summary, e-banking services offer numerous benefits, from convenience to advanced
features and technology. It is important for individuals and businesses to understand the
different types of e-banking services available to them and choose the one that best suits their
needs.
With the continued advancement of technology, we can expect e-banking services to continue
to evolve and revolutionize the way we manage our finances.
123
http://cashlessindia.gov.in/bhim.html
115 | New Technology Laws With Special Reference To Cyber Laws
CHAPTER 6
124
The Competition Act, 2002 (Act 12 of 2000)
125
S. Jain “Competition and Intellectual Property Rights: Interface and Interdependence in Indian
Context”, available at: http://dx.doi.org/10.2139/ssrn.3677720
126
L. Jajpura, B. Singh, et.al., “An Introduction to Intellectual Property Rights and their Importance in
Indian Context”, 22 Journal of Intellectual Property Rights 32 (2017)
127
Ibid
128
R.M.K. Alam and M.N. Newaz, “Intellectual Property Rights Commercialization: Impact on
Strategic Competition”, 8(3) Business and Management Review 22 (2016)
129 | New Technology Laws With Special Reference To Cyber Laws
and economic growth. There are several benefits of IPR when it comes to its nature. It is
tangible, which means it protects the ideas, creation, information, and many other similar
forms from getting used in an unauthorized manner and making it available to use
commercially, and getting remuneration out of such IP. In legal terminology, Intellectual
Property is an asset of the original creator which means it consists of property rights, which
can be used in any way by the creator, subjected to a specific condition.129 The creator has the
right to sue in case of unauthorized use under IPR. As the technology is growing at an
incredible pace, several alterations, and new terminologies are being added to broaden the
scope of IPR.
Two classification modes are used to determine the scope of IPR concerning copyright
property and industrial property. 130 Copyright property covers the original literary, dramatic,
musical, artistic works, cinematograph films, music and audio-visual works, whereas;
industrial property includes patents, trademarks, industrial designs, geographical indications,
etc. 131 IPR creates a balance between the interest of the public and the creator of work and
opens the door to opportunities is increasing, the market value of such work, making that idea
into an asset that can give remuneration in return, differentiation from one product to another
is done more easily through it. It is pertinent to note that different IPRs have different benefits
and qualities. The essence of IP in India is well established at all levels i.e Statutory,
Administrative and Judicial. India in its meeting with World Trade Organization had ratified
an agreement which is in relation to Trade Aspects of Intellectual Property Rights (TRIPS)
which was enforced on 1st January 1995. As per the agreement, there shall be minimum
standards for the protection and enforcement of intellectual property rights in member
countries which are required to promote the effective and adequate protection of intellectual
property rights with a view to reducing distortions and impediments to international trade. The
main pillars of Intellectual Property law are copyrights, patents and trademarks and these three
pillars are governed and described fully under the respective statutes which are Indian
Copyrights Act 1957, The Patents Act 1970 and The Trademarks Act 1999.
The types of IPR are mentioned below:
Copyright
These are the rights given to creators for their works in the artistic and literary fields. As stated
earlier, IPR can be owned by an organization and an individual as well, similarly, copyright
can also be held either individually or by an organization. 132 Copyrights by law are not
generally required to be registered, but the option for writing it is open for the creator.
Therefore, even if the work is not registered, it is protected by copyright law.
129
WIPO, What is Intellectual Property? (WIPO, 2020) 2
130
Supra note 3. 9 “Scope of Intellectual Property Rights: Everything You Need to Know”, available at:
https://www.upcounsel.com/scope-of-intellectual-property-rights
131
Y. Bhatia, “Intellectual Property Rights and The Digital World”, 1(3) International Journal of Legal
Science & Legal Innovation 1-6 (2019)
132
E. Verkey, Intellectual Property: Law and Practice 18 (Eastern Book Company, Lucknow, 2015)
130 | New Technology Laws With Special Reference To Cyber Laws
Trademark
It is a sign created on a product or service to make it distinguishable from the other options
available. It helps maintain good quality, standardization, and uniqueness. These rights are
granted for a certain period but are extendable as per the requirements by paying off the
renewal charges. These rights are valid only in the country where it is filed.
Patent
It is a right granted for a specific product or service invention for its uniqueness to do
something. To obtain a patent, one must demonstrate that the invention is one-of a-kind. A
patent gives the right to the creator, to choose how others can use such creation. The term for
which a patent is granted in India is 20 years, different countries have different tenures for
granting a patent
Trade Secrets
This consists of confidential information and can be sold or licensed. Unfair trade practices
would be considered if such information was disclosed in a way that was not by sound
business practices. Unless the trade secret is revealed in the public domain, it can last for the
entire period
Geographical Indications
These are the indicators that states from where the product originates. It includes the name of
the place. Generally, the period of such registration lasts up to 10 years, which is extendable as
per the conditions of the section.133
Industrial Designs
It consists of aspects of a product’s appearance which are not covered under patents. It is to be
noted that the creation has to be unique and no other composition similar has to be available in
the market.134 The nature of Industrial Design should be aesthetics, not utility. The tenure of
such a right last up to 10 years.
Importance of Intellectual Property in E-Commerce
Intellectual property law protects against disclosure of trade secrets which further signifies
protection against unfair competition. This makes the intellectual property an asset which is
more valuable than owning a tangible asset. This is most clearly visible in the field of
technology and the digital economy. If there was no intellectual property practices and statutes
governing the functioning of IP laws, there would have been no new creation of works and
hard work of someone could be stolen and it would have spread around the world without
paying any cost to its creator for his labor on the invention135.
133
E. Narasimhulu, A.A. Hindustan, et.al., “Need of Intellectual Property Rights in India and Other
Developing Countries: A Novel Approach for Global Recognition and Economic Development”, 5(2)
National Journal of Advanced Research 18 (2019).
134
WIPO, “Industrial Designs”
135
Ajeet Khurana, Intellectual Property in Ecommrce: Your Greatest Asset, THE BALANCE
(28.02.2017), www.balance.com/intellectual-property-in-ecommerce-your-greatest-asset-1141708
131 | New Technology Laws With Special Reference To Cyber Laws
1. Safeguarding your own intellectual property
One of the common mistake committed by the owner of the intellectual property owner is to
reveal the intellectual property prior to filing for protection of that property. Similarly, in
many countries making trade secrets public automatically dissolves any protection.
2. Violating someone else’s intellectual property
As E-commerce websites who are in the business of buying and selling of products often
infringes the intellectual property laws by portraying the description of products and showing
their images. There are several essentials which must be followed for not infringing the IP
laws are as follows:
• It must be your own creation
• Permission granted by the creator to use.
• It must be under the ambit of public domain
• It is covered under fair use.
Elements granted protection in Intellectual Property
There are several parts of websites which are vested with the protection of different kinds of
Intellectual Property.
• E-Commerce systems, search engines or other technical Internet tools is
granted protection under Patents or utility models.
• Software includes the text-based HTML code which are used in websites and it is
vested with a shield under Copyrights Act or patents law, depending upon
national law.
• Website design is protected under copyright.
• All the website content in the form of written material, photographs, graphics,
music and videos are protected under Copyrights.
• Databases can be protected by copyright or by sui generis database laws.
• Business Names, Logos, Product names, domain names and other
signs posted on the website are covered under Trademarks.
• Computer generated Graphic Symbols, displays, graphic user interfaces
(GUIs) & even webpages are protected under Industrial Design Law.
• Hidden Aspect of a website like (confidential graphics, source code, object code,
algorithms, algorithms, programs or other technical descriptions, data flow charts,
logic flow charts, user manuals, data structures and database contents) are
protected under Trade Law Secrets.136
What is the Commercialization of IPR?
WIPO, Intellectual Property and E-Commerce: How to Take Care of Your Business’Website,
136
www.wipo.int/export/sites/www/sme/en/documents/pdf/business_website.pdf
132 | New Technology Laws With Special Reference To Cyber Laws
Commercialization in simple words refers to introducing new products or services in the
market. Around the world, several rules and regulations are made to ensure that Intellectual
Property is commercialized and protected. The main motive of the commercialization of IPR
is to encourage people to bring new ideas and creations into the market and make it
marketable and profitable.137
Tools Involved in the Commercialization The owner can make money from their IP rights by
selling them, assigning them, or engaging in various licensing agreements. 138 IPR serves a
critical role as the legal vehicle through which information is transferred or contractual
relationships are formed. Internally, knowledge can also be used, in which case IP laws serve
to prevent clone competition. There are two main legal paths via which IP owners can
monetize their work: 139
i. Assignment of Intellectual Property
ii. Licensing of Intellectual Property
Assignment
An assignment is a type of direct sale of IP in which the owner transfers their property to
another company in exchange for an advanced payment. It is a legal instrument that transfers
IP ownership from one person to another. A formal assignment is frequently used to transfer
IP ownership. Moreover, an IPR can be transferred in its entirety or part and it is pertinent to
note that assigning IP owners should always be done in writing through a legal agreement.
Without a written instrument, many IPRs cannot be legitimately transferred.
Assignment agreements are crucial in IPR because they allow intellectual property owners to
transfer their intellectual property for Commercial benefits, guaranteeing that the intellectual
property may be used for profit. They make use of and utilize the developed IP by allowing
the purchaser or assignee to benefit from the assignment rights. These assignment agreements
give rise to legal and equitable rights in law and may generate difficulties if they are not
carefully worded as required by law.
In addition to abiding by the Rules, to avoid ambiguity, it is crucial to ensure that the
agreement clearly defines to whom ownership is vested. The assignment must be lawful, and it
must specify the length of time for which the individual will be the IP owner. In the event of a
future IP ownership dispute, this would serve as a safeguard. When IP rights are sold, the
ownership of the IP is legally transferred to the new owners.140 This is because IP legal rights
are granted on a country-by-country basis. If the seller (the “transferor”) is assigned, the IP
that benefits the seller (the “transferor”) is a sales agreement, and the commercialization
process is completed. An assignment’s lump sum payment must be regarded as a purchase
price.
In addition, the owner must consider the following criteria:
137
Ibid
138
KPPB Law, “Assignments and Licensing of Intellectual Property,
139
Ibid
140
S. Ambadipudi and S. Srikanth, “Transfer of Intellectual Property: A Primer”, available at:
https://www.mondaq.com/india/trademark/961790/transfer-of-intellectual-property--a-primer
133 | New Technology Laws With Special Reference To Cyber Laws
i. All expenses, including direct and indirect research and development expenditures,
materials, any outsourcing, and IP protection costs;
ii. A component of gain; and
iii. The technology’s or IP’s potential market worth.
Licensing
Licensing IPR instead of selling them through one or more licensing agreements is a common
technique of commercialization. This indicates that the owner has given authority to another
party to use IP under the agreed-upon terms. The license might be a suitable choice if the
owner lacks the resources or skills to develop and sell the product or service. In general, the
licensee (the IP owner) requires each licensee to pay the licensee a percentage of their
outstanding number of sales at regular periods. “Property rights” are the terms that describe
these payments141
Assignment agreements transfer ownership of IP from the assignor to the assignee, whereas
license agreements only allow the licensee to use the IP for a set length of time. For any
licensing agreement, several variables can be negotiated, including:
i. If the licensee agrees to the supplementary license,
ii. If the licensee’s rights are confined to that licensee or are not exclusive,
iii. What “territory” (as in any country/country) is relevant?
iv. What constraints (if any) exist in the fields of IP application (i.e., uses)?
v. What (if any) constraints exist on exploitation techniques (commercialization, production,
R&D)?
vi. What are the time restrictions (maturity criteria) that apply?
vii. What sums should be paid by the licensee (if any)?
viii. What is the royalty rate, and what are the terms and circumstances for other concessions?
The licensee achieves quick company development with minimal capital expenditure by
utilizing this, Tool. The licensee’s capacity to use IP, on the other hand, is dwindling
Competition Law and IPR
Competition law and IPR manage the market in two primary areas, consumer welfare and
technology transfer. Competition law is controlled by the Competition Act, 2002. The rapid
growth of the commercial environment has led to a great impact when it comes to the linkage
of IPR and Competition law and made common goals of both the laws. Although both the
laws are different, IPR grant exclusive rights to the owner of the work, and on the other hand,
competition law prohibits such practices which may decrease the competitive environment and
141
Obhan and Associates, “The Dos and Don’ts of Licensing Intellectual Property in India”, available
at: https://www.mondaq.com/india/trademark/800938/the-dos-and-don39ts-of-licensing-
intellectualproperty-in-india
134 | New Technology Laws With Special Reference To Cyber Laws
advocates for protecting the general interest of the consumer. 142 Section 3(5)(i) of the
Competition Act, 2002 deals with IPR in Competition Law. Competition law keeps consumer
welfare the utmost priority and focuses on limiting the monopoly in the market, IP Laws give
priority to the rights of creators and grant exclusive rights to them but these are not extended
to grant a status of monopoly to the creator. If the IPR holder engages in any anti-competitive
behavior or activity, it will be held liable under competition law.143
IPR assists consumers in choosing diverse choices among goods and services by making its
appearance distinct and different from the rest of the accessible products, while competition
law maintains healthy competition. Therefore, we can say that both laws ensure competition in
the situation of commercial environments. But the word “competition” in both laws is used in
a different context in IP laws, it is used for competition among innovators or creators and in
competition law, it is used to encourage competition and put an end to unfair trade practices.
Moreover, it can be concluded that IPR are mere rights that are provided and Competition
Law is a regulatory body. It is pertinent to note that competition law creates a balance between
the choice of the consumer and the production of such goods and services.
Confidentiality Issues and Its Maintenance
IPR is termed as a valuable asset. As previously stated, many types of IPR exist to give
suitable protection for such IP. It nowadays consists of confidential business data, trade secrets
and crucial business relationships.144 Due to the nature of such information, it needs to be
secured from the competitors as such information can be a valuable asset for them too, due to
these many reasons trade secrets are considered very important. In simpler terms, a trade
secret is something that is going on inside the organization that should not be shared with the
outside world, it can be licensed or sold.145
Disclosure and departure are considered as the two main sources by which confidential
information may get leaked. Disclosure means that through accidental or deliberate disclosure
by corporate officials, trade secrets can be leaked to competitors or third parties, either
knowingly or unknowingly.146
Departure refers to a situation when executives or key staff from the company exit, which may
lead to sensitive business information leaks. Once the employee exits, he has the right to use
skills and knowledge that he has acquired in the due course of time of employment for his
142
H. Stakheyeva, “Intellectual Property and Competition Law: Understanding the Interplay”, in A.
Bharadwaj, V. H. Devaiah, et.al., (eds), Multi-dimensional Approaches Towards New Technology 3
(Springer, 2018).
143
Sanjana, “Analyzing The Intersection of Competition Law and IPR”, available at:
https://www.mondaq.com/india/trademark/1117244/analyzing-the-intersection-of-competition-lawand-
ipr
144
C.N. Saha and S. Bhattacharya, “Intellectual Property Rights: An Overview and Implications in
Pharmaceutical Industry”, 2(2) Journal of Advanced Pharmaceutical Technology & Research 89 (2011).
145
M. Noroozi, L. Zahedi, et.al., “Challenges of Confidentiality in Clinical Settings: Compilation of an
Ethical Guideline”, 47(6) Iranian Journal of Public Health 875-883 (2018)
146
WIPO, “Trade Secrets”, available at:
https://www.wipo.int/export/sites/www/sme/en/documents/pdf/ip_panorama_4_learning_points.pdf
135 | New Technology Laws With Special Reference To Cyber Laws
living. But it is essential to note that he is not entitled to use such confidential information
unless authorized by the employer.
Employee Confidentiality
To safeguard from the threats of getting the confidential data leaked, the employer must
provide employment agreements and get it signed by the employees. This agreement can be
signed by the existing employees as well but they cannot be compelled or forced to sign such
agreement. Under this agreement, the clauses related to confidentiality must be appropriately
mentioned, in which the terms and conditions of disclosure or non-disclosure must be
provided keeping in mind the confidential information. 147 It is important to remember that
after signing such an agreement, the employee must not discuss any information with anyone
during or outside of work. The course of employment refers to situations when an employee
comes up with an inventive idea while working on the job, the employer might claim it if it
was already stated in the contract and the employee had agreed to it. An employer, on the
other hand, cannot claim ownership of such IP that is generated outside of the scope of
employment. The type of agreement that is to be provided, may depend upon the nature of the
disclosure of such confidential information. While there is no formal rule in India that governs
confidential information and trade secrets, it is vital to note that a person can be held
contractually liable for leaking sensitive information. Moreover, agreements of these kinds are
always advised to be in written format. The acknowledgments that are to be mentioned in a
well framed agreement are:
i. The information is confidential; the disclosure is provided in confidence to the recipient; the
recipient will not reveal the information to others or use it for their benefit without the prior
permission of the information’s owner; and
ii. Unauthorized disclosure of information may result in loss and damage to the information’s
owner, for which the recipient will be held accountable.
The clauses which can be added to make it a well draft are the Assignment clause, Disclosure
clause, and Power of Attorney Clause.
Restrictive Practices under IP Licensing
The word “restrictive practice” refers to illegal methods taken by companies to improve their
market position. These tactics can stifle or affect competition in a specific market regarding
IPRs. Antitrust and competition laws regulate such corporate activities and ban them when it
is proven that they distort or hinder competition in a particular market.148
Unfair competition is recognized by the Paris Convention for the Protection of Industrial
Property, which encompasses not only IP violation but also any other conduct that disrupts a
person’s commercial relationships. The Paris Convention has a wide specification that any act
of competition in industrial and commercial affairs that is opposed to honest practices
constitutes unfair competition. These articles declare that the cornerstone of fair competition is
147
“Employee Confidentiality & The Rules”, available at:
https://businessadvice.co.uk/legaladvice/employee-confidentiality-the-rules/
148
WIPO, Successful Technology Licensing: IP Asset Management Series (WIPO, 2015), 41.
136 | New Technology Laws With Special Reference To Cyber Laws
honest practices or good morals, and they define three types of conduct that are considered to
be normally illegal in international trade and must thus be forbidden. 149
Kinds of Restrictive Practices
As previously stated, competition authorities can always remedy restrictive trade practices
disguised as intellectual property licensing. Some of the most common restrictive techniques
employed in intellectual property license agreements are listed below.
Representation Arrangements and Exclusive Sales
Such tactics restrict the licensee company’s ability not just to organize its distribution system,
but also to engage in exclusive sales or representative contracts with any third party other than
the licensor or a licensor-designated party. To put it another way, the licensee firm is
hampered and reliant on the licensor’s distribution channels.
Grant-back Provisions
The grant-back clauses allow the licensor to receive technical information and improvements.
These rules allow the licensee corporation to provide any invention or improvement made in
the imported technology to the technology licensor at no cost. The grant-back clauses are
categorized as exclusive, nonexclusive, and unilateral.
Restrictions on Field of Use, Volume, or Territory
Restrictions on the field of use allow the licensor to limit the use of the technology or reserve
some applications for self-exploitation or third-party exploitation. Minimum production
standards or maximum output are two examples of volume limits practices. Higher royalties
may be paid beyond a particular production limit, or produced items in a defined container
with a certain weight which may be used to regulate production output. As a result, such
production constraints may prohibit the licensee business from manufacturing enough to
export.
Price Fixing
A Price-Fixing clause in an IP license refers to the practice of the licensor reserving the right
to set the sale or resale price of a product made using imported technology. The price-fixing
provisions may cover the price fixed by the licensor on items produced using transferred
technology. Horizontal pricing cartels involving numerous technology providers or recipients
may likewise be involved in price-fixing.
Export Restrictions
Export restrictions may include limitations or prohibitions on the export of items made with
the transferred technology. These requirements impose restrictions on the export of such items
to certain markets, as well as permission to export to specific markets and the necessity of
prior export approval. The limitations that have a direct impact include a total ban on goods
exports. The licensor may put limits on the licensee, such as prohibiting or allowing export to
149
Paris Convention for the Protection of Industrial Property, 1883, art. 10
137 | New Technology Laws With Special Reference To Cyber Laws
one or more designated countries or locations. Exporting just certain items may be prohibited
or permitted under certain limitations.
Tie-in Arrangements
The licensee must get raw materials, replacement parts, and intermediate goods for use with
licensed technology exclusively from the licensor or its nominees, according to tie-in terms in
intellectual property licensing. These provisions also require the licensee to use the licensor’s
staff. The primary motivation for the licensor's employment of tie-in clauses appears to be to
maintain an exclusive right to provide essential processed or semi-processed materials,
maintain quality control, and increase their profit margin.
Non-Competition Clauses
In intellectual property licensing, the non-competition provision restricts the licensee's ability
to engage in agreements to use or acquire competitive technologies or goods that are not
provided or designated by the technology supplier. These provisions have an impact on the
acquiring company’s capacity to compete directly or indirectly. Some non-competition
provisions, which may have an immediate impact, require the licensee business to refrain from
manufacturing or selling competitive goods or from acquiring competing technology. Non-
competition provisions, which may have an indirect impact, obligate the licensee not to
collaborate with competitor businesses or pay higher royalties if it sells or makes competitive
goods.
Restrictions on R&D
The licensee’s research and development policies and activities are usually restricted under
such constraints. The employment of such provisions impacts the licensee’s technical
development potential, either directly or indirectly. Such constraints also limit a licensee’s
ability to conduct its research and development programs. These prohibitions also apply to
provisions that compete directly with the licensor’s research and development efforts.
Restrictions after Expiry of Arrangements
Such tactics restrict the licensee company’s ability not just to organize its distribution system,
but also to engage in exclusive sales or representative contracts with any third party other than
the licensor or a licensor-designated party. To put it another way, the licensee firm is
hampered and reliant on the licensor's distribution channels.
Restrictions after the expiry of Industrial Property Rights
When a patent term expires under an intellectual property licensing agreement, the knowledge
and innovation protected by the patent become public domain, and any interested party can
utilize the patent without restriction. When a technology provider imposes any limitation after
the period of intellectual property rights has expired, the restriction is judged to be a restrictive
trade practice.
150
M. Nemana, “Intellectual Property Audit”, available at:
https://www.mondaq.com/india/trademark/593644/intellectual-property-audit
139 | New Technology Laws With Special Reference To Cyber Laws
is commonly dubbed “IP due diligence” 151 when done to analyze, as objectively as feasible,
the worth and risk of all or a part of a target company’s IP assets. Later in the session, “IP due
diligence” is covered.
Limited purpose targeted IP audits
A limited purpose audit has a significantly smaller scope than the other two categories and is
carried out on a tighter timeline. These audits are usually conducted on a case-by-case basis.
They are usually employed to support a legal stance or the value of a piece of IP.
Who Conducts an IP Audit?
The question of who should perform such an audit has no hard and fast rules. Nevertheless, for
an audit to be effective, it should be conducted by a team that comprises IP experts and
representatives from key technical areas of the organization as needed. The IP audit team
should have a basic understanding of the product lines, the relevant business environment, and
the company’s future aspirations so that the audit remains focused on IP assets with the
greatest economic value.152
External expertise may or may not be included in the audit team. If it does, then all external
members of the audit team and all internal audit team members should sign non-disclosure
agreements before beginning an IP audit.
Preparation of an IP Audit
Clarity towards the Purpose
Before an IP audit can begin, everyone involved must clearly understand why the audit is
being undertaken. The circumstances that lead to an audit and the form and scope of the audit
are all influenced by the reason for the audit. Furthermore, the amount of time and money
available for performing an audit will impact how the audit is handled and the final result.
Background Research
Once the purpose of the audit and the resources available to carry it out are apparent, one of
the most important steps in performing the audit is to learn about the organization, what it
does, and where it wants to go. It is a prerequisite for drafting an audit plan, which will serve
as the audit’s foundation.
Putting Together a Plan for IP Audits
After conducting the essential background research, the audit strategy must be prepared. This
will outline the audit plan’s aim, scope, duration, budget, and who will be accountable for
certain aspects of the audit. In general, it will cover the following areas:
151
A. Damodaran, “IP Asset Management, IP Audit and Due Diligence”, 18, available at:
https://www.wipo.int/edocs/mdocs/sme/en/wipo_smes_bwn_13/wipo_smes_bwn_13_14_damodaran.
pdf
152
S. Chaturvedi, “Importance of Intellectual Property Audits for Corporates”, The Economic Times
Nov. 13, 2021, available at: https://economictimes.indiatimes.com/news/how-to/importance-of-
intellectualproperty-audits-for-corporates/articleshow/87679108.cms?from=mdr
140 | New Technology Laws With Special Reference To Cyber Laws
i. The specific areas of the business to be covered, such as divisions, lines of business,
affiliated or non-affiliated agency operations;
ii. The audit scope, such as only registered assets or a broader scope;
iii. The audit timetable;
iv. The responsible individual for each part of the audit;
v. The layout of the final audit report to be produced.
Conducting an IP Audit
Begin with a thorough checklist
A typical IP audit begins with a thorough checklist that is customized for the kind and scale of
the company’s operation, applicable IP laws of the relevant countries, the audit’s desired
purpose(s), and the audit’s expected outcome(s). Using a checklist reduces the odds of missing
one or more important phases in the process. The relevant section of the thorough checklist
should be given to each member of the audit team. The audit team should gather, examine, and
arrange data to generate a thorough, companywide IP audit report that reflects the whole
development and decision-making process for each of the company’s products and operations.
Examining various contracts and agreements
Identifying and assessing the sufficiency of relevant clauses in all agreements that impact IP
protection is an important aspect of an IP audit.153 The following agreements may be included,
Licensing agreements; Assignment agreements; Employment and Independent Contractor
Agreements; Joint Venture & Collaboration agreements; R & D Grants; other agreements;
Technology transfer agreements; Design and Development agreements; Settlement
agreements; Franchise agreements; Royalty agreements; Marketing agreements;
Distribution/Distributorship agreements; and Sales representative agreements.
Auditing IP Assets
This level consists of four phases:
i. Identifying and documenting IP assets;
ii. Determining ownership and legal status of IP assets;
iii. Detecting IP rights violation; and
iv. Taking the appropriate procedures to create and preserve IP assets.
Procedure Post IP Audit
Applying the recommendations of an IP audit. Assess and examine if the company’s IP assets
are achieving its strategic objectives, and if not, what should be done to alter that, at this point,
one technique that might be useful is to divide the IP inventory results into three groups:
153
S. Ambadipudi and S. Srikanth, “Drafting Intellectual Property Rights Transfer Agreements - Part
II”, available at: https://www.mondaq.com/india/trademark/974154/drafting-intellectual-property-
rightstransfer-agreements--part-ii
141 | New Technology Laws With Special Reference To Cyber Laws
Group 1: Techniques, inventions, and ideas critical to your products and services, as well as
the markets one has chosen to serve.
Group 2: Intellectual assets that have tremendous promise but are not essential to one’s
business.
Group 3: ‘Assets’ that, on the whole, appear to be of little value to one’s organization or
anybody else.
Building IP Value
Dynamic IP asset managers have utilized IP audits to increase business value in a variety of
ways.43 The following are some of the most prevalent methods:
i. Increasing the value of IP assets.
ii. Increasing the value of existing intellectual property assets.
iii. Lowering the expense of third-party intellectual property disputes.
iv. Using IP assets to create value from product marketplaces.
v. Developing non-core revenue sources.
vi. Increasing income by licensing key business assets. vii. Increasing the value of corporate
deals
viii. Lowering the cost of inactive IP assets.
ix. Getting tax deductions for donating IP assets.
x. Lowering the cost of new product development (product clearance).
xi. Assessing an acquisition or investment target's intellectual property assets (due diligence).
xii. Evaluating the direction and strength of the company.
xiii. Identifying previously untapped business potential.
xiv. Finding new business opportunities
Due Diligence of IPR in a Corporate Transaction
IP due diligence is part of a bigger due diligence audit to assess a company’s viability. Before
purchasing or investing in a target company’s IP portfolio, the financial, commercial, and
legal benefits and risks are assessed. In simple words, IP due diligence provides in-depth
insight into the risk and value of intangible assets. Therefore, IP due diligence is important as
it maximizes the valuation of these kinds of assets, helps in maintaining and boosting the
balance sheet of the business or company, and also reduces the chance of risks involved by
revealing such issues.154 Generally, IP due diligence is conducted in many situations some of
which are as follows:
154
S. Katarki and A.V. Thakur, “Intellectual Property Due Diligence”, available at:
https://www.mondaq.com/india/trademark/448686/intellectual-property-due-diligence
142 | New Technology Laws With Special Reference To Cyber Laws
Mergers and Acquisition
In a planned acquisition or sale of IP, an IP audit provides a foundation for evaluating the risk
and value of applicable IP assets.
Financial transactions
Before engaging in a financial transaction involving IP, such as an initial public offering or
private placement of shares, substantial stock acquisition, or before acquiring a security
interest in IP, IP due diligence is critical, as all of these have an impact on IP ownership
Purchasing or selling a corporate division, or transferring Intellectual Property
IP due diligence ensures that the transfer or assignment fits the respective business objectives
of both parties when conducted separately by both.
Introduction of a new product or service in the market
It helps in addressing any potential infringement or freedom to operate issues associated with
the introduction of such a product or service.
IP Licensing
IP due diligence helps in making sure that no similar license exists, necessary rights are given
and the scope and extent of such license are maintained.
How IP due diligence is conducted?
To get the most effective results, more time is required in this procedure and the involvement
of professionals in this field. Each transaction is unique, the requirements of conducting IP
due diligence depend on case-to-case bases due to the uniqueness of transactions.49 There is a
need to set up a proper team of professionals to conduct this test, a checklist of essential terms
and clauses must be prepared beforehand with good research and knowledge. A proper
verification test has to be performed to safeguard any discrepancies that may arise. Some basic
requirements that are generally required to be involved are:
Identifying IP assets
The assets are intangible; it is essential to identify the kind of asset.
Check for IP ownership and existence
Several questions concerning ownership and existence must be asked to determine IP asset
transferability and available rights.
Awareness of the appropriate territory and terms
There is a need to check the validity or tenure of the rights available and identify the type of
territory limitations
Third-Party claims
Make sure there are not any third-party claims, as at times third parties may get many benefits
out of it unknowingly.
BROADCASTING
With rapidly changing technologies, and increasing business investments, the broadcast sector
has become the site of contention between various interests – broadcast companies, the
government, public interest groups, community radio and television channels, and an
increasingly diverse audience that has been broadly categorized as ‘the public.’ An important
aspect of this tussle is the legal regulation of both existing and emerging technologies. This
compilation attempts to examine the existing legal framework that applies to various broadcast
technologies that are currently in use in India155.
The statutory basis of government monopoly of the broadcast sector, which was widespread
until the emergence of satellite television in the 1990s, can be traced to the 123 year-old
Indian Telegraph Act of 1885. The Act states that the Central Government has the exclusive
privilege of establishing, maintaining, and working telegraphs within India.
The Act and its subsequent amendments define telegraph broadly to include most modern
communication devices irrespective of their underlying technology. 156 Judicial decisions have
also held that the term ‘telegraph’ includes the term telephone, television, radio, wireless,
mobile and video equipment. 157 The Act authorizes the Central Government to take temporary
possession of a telegraph in cases involving public emergencies or public safety.
Section 5(2) enables the government to lawfully intercept telegraph messages on certain
grounds. These include India’s sovereignty and integrity, state security, friendly relations with
foreign states, public order, and preventing the commission of an offence. 158 The Act
empowers the government to revoke a telegraph license for breach of any terms and
conditions or for a default in making license-fee payments.159
Though the Telegraph Act does not explicitly define ‘telecommunications service’ and
‘broadcasting service’, the Telecom Regulatory Authority of India Act, 1997, defines
communication service in s 2(1)(k) as:
“Service of any description (including electronic mail, voice mail, data services, audiotext
services, video-text services, radio paging, and cellular mobile telephones services) which is
made available to users by means of an transmission or reception of signals, writing, images,
155
Vikram Raghavan, Communications Law in India, New Delhi: Lexis Nexis Butterworths, 2007
156
“.any appliance, instrument, material, or apparatus used or capable of use for transmission or
reception of signs, signals, writing, images and sounds or intelligence of any nature by wire, visual, or
other electromagnetic emissions, radio waves or Hertzian waves, galvanic, or magnetic waves”
157
Section 3(1AA). However the physical possession of radio and wireless equipment is regulated by
the Indian Wireless Telegraphy Act, 1933
158
Section 5 (2)
159
Section 8
145 | New Technology Laws With Special Reference To Cyber Laws
and sounds or intelligence of any nature, by wire, radio, visual or any other electronic means
but shall not include broadcasting services.”
Though this section expressly excludes ‘broadcasting’ from this definition, the directive
authorizes the government to notify broadcasting services to be a telecommunication
service. 160 This notification gave TRAI the authority to regulate broadcasting and cable
services in India. The license required for broadcasting (the Wireless Operating License) is
given by the Wireless Planning and Coordination Committee (WPC) Wing of the Ministry of
Communication and Information and Technology, while the Ministry of Information and
Broadcasting (MIB) gives a Grant of Permission Agreement.
Most radio and television services are also regulated by the Indian Wireless Telegraphy Act
(No 17 of 1933), as they constitute ‘wireless communications’. Section 2(2) and Section 3
regulate wireless communication by requiring users of various types of wireless equipment to
obtain wireless licenses for possessing and using the equipment. These licenses are granted by
the WPC (Wireless Planning & Coordination Authority) Wing of the Department of
Telecommunications (DoT) Therefore, to offer most kinds of broadcasting services, a
broadcasting company must obtain two types of licenses: • A Grant of Permission (GOPA) to
offer broadcast services issued by the Ministry of Information and Broadcasting under the
Telegraph Act • A wireless operating license from the WPC (Wireless Planning &
Coordination Authority) Wing of the Ministry of Communication and Information
Technology under the Wireless Telegraphy Act
RADIO SERVICES:
Terrestrial radio services can be divided into two main categories: AM radio that uses medium
or short wave frequency bands, and FM that uses VHF frequencies in the 88 MHz to 108 MHz
band. AM radio is offered only by AIR while FM radio, which works on line-of-sight
principles and can be clearly received within a local area, is offered by both AIR and private
channels.
FM Radio
AIR began FM broadcasts in Madras on 23 July 1977. FM radio was opened to private players
in 1999. The Ministry of Information and Broadcasting invited bids for licenses to operate 140
FM stations in 40 cities. In March 2000, the government short-listed 29 applicants for licenses
to operate 101 FM radio stations. Upon further screening, the government issued letters of
intent to 93 stations. Ultimately, FM licenses were granted to 16 companies to operate 37
channels. The initial FM radio licenses were valid for ten years and licensees were required to
submit performance bank guarantees equivalent to a year’s license fee to ensure that they
carried out their license obligation.
Second Round of FM Licenses
Many of the FM stations that were licensed were financially unsuccessful and could not meet
the license fee requirements. They soon demanded a reduction in license fee and change in the
160
Ministry of Communications, ‘Broadcasting Services and Cable Services Notified as
Telecommunication Service’, S044 (E), Fno13-1/2004-Restg, 9 January 2004.
146 | New Technology Laws With Special Reference To Cyber Laws
prevailing licensing network. The MIB then constituted the Radio Broadcast Policy
Committee under the chairmanship of Amit Mitra, Secretary General, FICCI, on 24 July 2003
to make recommendations for Phase II of FM licensing, and to “study the desirability and
implications of making modifications in the licensing regime of Phase I licenses. The
committee called for revisions to the prevailing license fee structure for FM licenses, and
recommended the introduction of an annual revenue sharing arrangement that would require
FM licensees to pay 4 per cent of their gross revenue as license fees. It also proposed
restructuring existing licenses and restricting the licensees’ liability for their original license-
fee payments.161 The second round of allocation of licenses concluded in early 2006162.
TRAI took over regulatory responsibilities for broadcasting in January 2004. Its first set of
recommendations to the government, sent in August 2004, proposed a migration package that
would enable existing FM licensees to substitute their fixed fee terms with a more flexible
revenue sharing formula. It also suggested relaxing the strict restrictions on multiple
ownership that prevented FM licensees from owning more than one frequency in a city. It
proposed a cap of 25 per cent on the total number of frequencies held by a single license
across the country. It made detailed recommendations regarding foreign investment in FM
radio. It suggested removing restrictions on news and current affairs programmes.
In July 2005, the government accepted most of TRAI’s recommendations and framed a new
policy for FM licenses. The main features of this policy were:
• Two-round selection process for 336 channels in 90 cities
• Requirement that applicants be registered in India
• Prohibition of control by persons convicted of certain offences.
• Prohibition of application by subsidiary of applicant company
• Prohibition of application by companies with same management
• Prohibition of application by companies of the same group or otherwise
interconnected companies
• Prohibition of application by religious bodies or companies controlled by/associated
with them
• Prohibition of application by political bodies or companies controlled by/associated
with them
• Prohibition of application by advertising agencies or companies controlled
by/associated with them
• Prohibition of application by Trusts, Societies, Non-Profit Organizations or
companies controlled by/associated with them
161
The Amit Mitra Committee Report was sent to TRAI on 12 February 2004 for its recommendations.
Private FM players also submitted their recommendations to TRAI on 24 February 2004.
162
The full list of operational FM stations is available at http://mib.nic.in/fm/fmmainpg.htm
147 | New Technology Laws With Special Reference To Cyber Laws
• Permission granted for ten years
Under the policy
• Applicants are allowed to run one channel per city provided the total number of
channels allocated to the entity is within the overall ceiling of 15% of all allocated
channels in the country.
• Licensees cannot outsource, through any long-term production or procurement
arrangement, more than 50% of the total content, and not more than 25% of the total
content can be outsourced to a single content-provider.
• Licensees cannot hire or lease more than 50% of broadcast equipment on longterm
basis
• Licensees cannot enter into any borrowing or lending arrangement with other
permission holders or entities other than recognized financial institutions, which may
restrict its management or creative discretion to procure or broadcast content
Foreign Investment:
Total foreign investment is permitted to the extent of not more than 20% of the paid up equity
in the entity holding permission for a radio channel. Foreign investment includes Foreign
Direct Investment (FDI) as defined by RBI, and FDI by OCBs/NRIs/PIOs etc. Portfolio
Investments by Foreign Institutional Investors (FIIs) (within limits prescribed by RBI) and
borrowings, if these carry conversion options. The permission is subject to the following
conditions:
• One Indian individual or company owns more than 50% of the paid up equity
excluding the equity held by banks and other lending institutions.
• The majority shareholder exercises management control over the applicant entity.
• Has only Resident Indians as Directors on the Board.
• All key executive officers of the applicant entity are resident Indians.
No permission holder shall be permitted to change the ownership pattern of the company
through transfer of shares of the major shareholders to any new shareholders without the
written permission of the Ministry of Information & Broadcasting. The permission is granted
for a period of five years from the date of its operationalisation, subject to the condition that
the new shareholders conform to all the prescribed eligibility criteria.
3rd Phase of Private FM Radio Broadcasting
TRAI released its Recommendations on the 3rd Phase of Private FM Radio Broadcasting on
22 February 2008. Details of the recommendations are available in the accompanying
document on recent TRAI recommendations.163
163
Telecom Regulatory Authority of India (TRAI) Draft Recommendations on 3rd Phase of Private FM
Radio Broadcasting , February 22, 2008
148 | New Technology Laws With Special Reference To Cyber Laws
Satellite Radio
Satellite radio relies on satellite signals, instead of FM/AM frequencies, for radio
transmission. These services are in a nascent stage in India. Recognising the potential for
satellite radio services, TRAI issued comprehensive recommendations in June 2005.
TRAI Recommendations
TRAI has indicated that satellite radio services would be complementary to FM services,
rather than competitive. TRAI suggested that there be no separation between carriage and
content in satellite-radio licenses. There should be common rules of subscription and
broadcast-type services. All India Radio (AIR)’s programme and advertisement codes should
apply to satellite radio. There should be no ban on news and current affairs programmes.
Licenses should be permitted to establish terrestrial repeaters to rebroadcast their signals for
better reception. Given the high capital-intensity of the medium and limited number of global
players, 100% foreign investment should be permitted in satellite radio services. Licenses
should be issued for ten years. There should be no license fee, unless there is excessive
demand for available spectrum. If satellite radio licenses are permitted to use terrestrial
repeaters, a revenue share of 4 per cent can be imposed as a license fee. No specific
transmission standards should be prescribed. A satellite radio licensee should be free to decide
on the preferred transmission technology subject to the licensor’s approval. Satellite radio
licensees should offer to their subscribers the option of blocking unwanted channels.
Satellite Radio Policy
Meanwhile, satellite radio had already entered the country - like cable TV - on the basis of a
license issued by the Ministry of Telecommunications. WorldSpace began operations in 2000
and, because satellite radio services were then unregulated, it became by default the only
private radio broadcaster in the country to offer news and current affairs channels. In May
2008 TRAI opened up its draft Satellite Radio Policy164 for comments (with a deadline of less
than two weeks). It included a section relating to news channels which, if accepted and
implemented, could mean the end of news and current affairs on nongovernmental radio.
The relevant section of the draft Satellite Radio policy states:
5.1 Satellite radio service provider shall be able to carry only the following types of radio
channels on its service:
(i) Non-News and Current Affairs radio channels registered with Government of India as per
provisions contained in Part-II of these Guidelines.
(ii) The news broadcast of All India Radio (AIR) as mutually agreed between the service
provider/radio channel and AIR.
(iii) Channels of Prasar Bharati as provided in paras 5.13 and 5.14
This is despite the fact that TRAI's Recommendations on Phase III of FM Radio licensing –
issued in February 2008 – had already stated that "FM Radio broadcasters may be permitted to
broadcast news taking content from AIR, Doordarshan (DD), authorized TV news channels,
164
http://www.trai.gov.in/trai/upload/PressReleases/574/draft19may08.pdf
149 | New Technology Laws With Special Reference To Cyber Laws
United News of India (UNI), Press Trust of India (PTI) and any other authorized news agency
without any substantive change in the content. No other source of news is permitted at
present." While even this formulation was fairly restrictive, the new policy seeks to restrict
news and current affairs on private radio channels to programmes produced by the state
broadcaster, All India Radio. Critics believe that such a move could have major implications
for both private FM and community radio in the country.
PRASAR BHARATI (BROADCASTING CORPORATION OF INDIA) ACT, 1990
The introduction of the Prasar Bharati Bill in Parliament in May 1979 was the direct result of
the recommendations of the B. G. Verghese Committee set up in 1977 after the Internal
Emergency declared by the then Prime Minister Indira Gandhi (1975-77). The Bill was
allowed to lapse after the Janata Party government elected to form the government after the
Emergency collapsed and the Congress Party returned to power
The victory of the National Front government in 1989 saw the revival of the Prasar Bharati
Bill in a somewhat modified form; the Bill was passed by Parliament and received presidential
assent on September 12, 1990. The Prasar Bharati Act provided for the formation of an
autonomous Broadcasting Corporation that would manage Doordarshan and AIR, discharging
all powers previously held by the Information and Broadcasting Ministry. The Corporation
would inherit the capital assets of Doordarshan and AIR and would be managed by a 15-
member Prasar Bharati Board, including the Directors-General of the two organisations and
two representatives from amongst the employees. The Chair and other members of the Board
would be appointed on the recommendations of the selection committee headed by the Vice
President. A fifteenmember Broadcasting Council would address public complaints.
The primary duty of the Broadcasting Corporation was to ‘organize and conduct public
broadcasting services to inform, educate, and entertain the public’ and to ensure ‘a balanced
development’ of broadcasting of radio and television.165 The Corporation was to be guided by
a set of objectives while discharging its functions. These include:
• Upholding the unity and integrity of the country and the values enshrined in the
Constitution
• Safeguarding the citizen’s right to be informed freely, truthfully and objectively on all
matters of public interest, national or international, and presenting a fair and balanced
flow of information including contrasting views without advocating any opinion or
ideology of its own
• Paying special attention to the fields of education and spread of literacy, agriculture,
rural development, environment, health and family welfare and science and
technology.
• Providing adequate coverage to the diverse cultures and languages of the various
regions of the country by broadcasting appropriate programmes.
165
Section 12, The Prasar Bharati Act, 1990
150 | New Technology Laws With Special Reference To Cyber Laws
• Providing adequate coverage to sports and games so as to encourage healthy
competition and the spirit of sportsmanship.
• Providing appropriate programmes keeping in view the special needs of youth.
• Informing and stimulating the national consciousness with regard to the status and
problems of women and paying special attention to the upliftment of women.
• Promoting social justice and combating exploitation, inequality and such evils as
untouchability and advancing the welfare of the weaker sections of the society.
• Safeguarding the rights of the working classes and advancing their welfare
• Serving the rural and weaker sections of the people and those residing in border
regions, backward or remote areas.
• Providing suitable programmes keeping in view the special needs of the minorities
and tribal communities.
• Taking special steps to protect the interests of children, the blind, the aged, the
handicapped and other vulnerable sections of the people.
• Promoting national integration by broadcasting in a manner that facilitates
communication in the languages in India; and facilitating the distribution of regional
broadcasting services in every State in the languages of that State.
• Providing comprehensive broadcast coverage through the choice of appropriate
technology and the best utilisation of the broadcast frequencies available and ensuring
high quality reception.
• Promoting research and development activities in order to ensure that radio and
television broadcast technology are constantly updated.
• Expanding broadcasting facilities by establishing additional channels of transmission
at various levels.
• Ensuring that broadcasting is conducted as a public service to provide and produce
programmes.
• Establishing a system for the gathering of news for radio and television.
• Negotiating for the purchase of, or otherwise acquiring, programmes and rights or
privileges in respect of sports and other events, films, serials, occasions, meetings,
functions or incidents of public interest, for broadcasting and establishing procedures
for the allocation of such programmes, rights or privileges to the services.
• Establishing and maintaining a library or libraries of radio, television and other
materials. Conducting or commissioning, from time to time, programmes, audience
research, market or technical service, which may be released to such persons and in
such manner and subject to such terms and conditions as the Corporation may think
fit.
166
Praveen Swami, “Public Service Broadcasting?”, Frontline, Vol 14, No 23, November 15-28, 1997
167
Rajendra Yadav v Union of India AIR 2000 Del 229. Also See Supra note 2 at 81-82.
152 | New Technology Laws With Special Reference To Cyber Laws
objects and reasons that it was felt necessary to rationalise such matters “in order to inject
sectoral experience to rejuvenate Prasar Bharati and its Board.”168
Regulation of Cable Television
The sudden emergence of cable television and cable networks in the early 1990s caught the
Indian government unprepared. The DoT initially responded with new regulations targeting
the fledgling networks, requiring all users and dealers of satellite equipment to obtain special
operating licenses for their equipment. Users and dealers were specifically prohibited from
engaging in commercial distribution of programmes downloaded from satellites. To obtain
these licenses, users had to undertake that they would not use their equipment to establish
unauthorized networks.
The government’s action against cable television networks was unsuccessfully challenged by
cable operators before various high courts. Despite this, the growth of these networks
continued, especially in urban areas. The Government appointed a committee which
recommended that the censors should clear all programmes transmitted through cable
networks. It also suggested that cable networks should be prohibited from directly relaying
programmes received from satellites. The government, however, did not accept these
recommendations
Shiv Cable v State of Rajasthan169
The reality of cable networks was tested in Shiv Cable TV System v. State of Rajasthan. 28
The case arose from a district administration’s order directing the local police to halt cable TV
networks because the cable operators lacked the necessary licenses. The affected operators
challenged the district administration’s order in the Rajasthan High Court on the ground that
there was no law that required them to obtain licenses for their networks. They argued that the
district administration’s actions violated their fundamental right to carry on a trade and
business. The state government told the high court that the cable operators had to obtain
licenses under the Telegraph Act and the Wireless Telegraphy Act to legally operate their
networks.
The High Court agreed with the government’s arguments. It explained that cable networks
typically comprise two elements:
1) A dish antenna to receive programmes transmitted by satellites.
2) A cable network to physically distribute these programmes to subscribers.
168
Bill on Prasar Bharati Act Tabled in Lok Sabha”, The Hindu, March 11, 2008,
http://www.thehindubusinessline.com/2008/03/11/stories/2008031151891000.htm and “Content Code
for TV channels soon: Dasmunsi”, The Hindu 18 March 2008,
http://www.hindu.com/2008/03/18/stories/2008031859431300.htm , “Prasar Bharati Amendment Bill
Passed”, The Hindu 19 March 2008, http://www.hindu.com/2008/03/19/stories/2008031960131300.htm
Prasar Bharati has been functioning in name, without measuring up to the objectives underlying the act.
The PB Act has implemented only partially. For instance, neither the assets nor the staff of AIR/DD
have been transferred to the Corporation. The staff are still government servants under ‘deemed
deputation’ to Prasar Bharati.
169
AIR 193 Raj 197.
153 | New Technology Laws With Special Reference To Cyber Laws
The Court said that since a cable operator’s dish antenna was capable of receiving transient
images of fixed and moving objects from satellites, the dish antenna constituted.
a wireless telegraph apparatus under the Wireless Telegraphy Act. It held that unless covered
by an exemption, the dish antenna required a wireless license for its operation.
The Court held that lines and cables in a cable network were covered by the definition of a
‘telegraph line’ under the Telegraph Act, and the cable operators had to obtain statutory
licenses in order for their dish antennas to download programmes from satellites and to
transmit these downloaded programmes through their networks to customers.
Despite this, the High Court set aside the impugned orders of the district administration as
they were made without jurisdiction. It held that under the Telegraph Act and the Wireless
Telegraphy Act, only the Director General of Posts and Telegraphs, a Central Government
official, was competent to take the actions in question. The High Court noted that the
government had not framed any rules or guidelines to regulate cable networks. Noting that an
outright prohibition on cable networks was difficult because they had already grown deep
roots in several areas, the high court called on the government to establish a licensing system
to regulate cable networks.
This decision prompted the government to promulgate an ordinance in 1994 that provided a
legal basis to regulate cable networks. The ordinance was later ratified by Parliament and
passed as the Cable Networks Act, 1995. This legislation was amended in 2003 to require
cable subscribers to use conditional access systems to receive premium channels. The
government’s New Telecom Policy, 1999 sought to align the cable industry closer to the
market for telecom services. 170 It classified cable operators as access providers along with
fixed and cellular licensees. It allowed cable operators to provide last mile links, switched
services, and one-way entertainment services in their respective service areas. Cable operators
were allowed to directly interconnect with other service providers within their service area and
share infrastructure with them. The government decided not to allow cable operators to
provide two-way communications as it would amount to their offering fixed services. But the
policy gave cable operators the option to obtain a separate fixed license for this purpose.
The Cable Networks Act, 1995
The principal purpose of the Cable Networks Act was to introduce regulatory certainty to the
cable market that had emerged in the early 1990s. The statement of objects and reasons
declared that cable TV constituted a ‘cultural invasion’ as cable programmes were
predominantly Western and alien to Indian culture and way of life. It declared that the lack of
regulation had resulted in undesirable programmes and advertisements being shown to Indian
viewers without any censorship. Section 3 of the Act mandates that a cable television network
can be operated only by a registered cable operator. The registering authority is any authority
so notified by the Central Government.
170
Ministry of Communications, New Telecom Policy 1999, 26 March 1999.
154 | New Technology Laws With Special Reference To Cyber Laws
‘Cable television network’ is defined in Section 2 c) as: Any system consisting of a set of
closed transmission paths and associated signal generation, control and distribution equipment
designed to provide cable service for reception by multiple subscribers.
In order to register, an entity could be - an Indian citizen - an association of individuals whose
members are Indian citizens - a company in which not less than 51 per cent of paid up equity
share capital is held by Indian citizens.
If the registering authority refuses to register an applicant, it must record its reasons for doing
so and inform the applicant accordingly
Statutory Violations and Offences:
The Cable Networks Act empowers and authorizes a government officer to seize a cable
operator’s equipment if the officer has reason to believe that the cable operator is functioning
without proper registration. The seized equipment cannot be retained for a period exceeding
ten days from the date of seizure, unless a local District Judge, within whose jurisdiction the
seizure has been made, approves continued retention of the seized equipment.
A first time violation under the statute can result in an imprisonment term that extends up to
two years or a fine up to Rs. 1000 or both. Every subsequent offence is punishable with
imprisonment for a term up to five years and a fine that may extend to Rs. 5000. The Act says
that if a company commits an offence under the statute, the company and any person in
charge, or responsible for its business, shall be deemed guilty, proceeded against and punished
accordingly. If a company commits an offence with the consent, connivance, or attributable
negligence of a director, manager, secretary, or other officer, these officers are deemed guilty,
along with the company, and they can be prosecuted, and punished accordingly.
Cable Television Network Rules, 1994:
The Rules were enacted under the Cable Television Networks (Regulation) Ordinance, 1994.
The Programme Code of the Cable Television Network Rules lays down restrictions on the
content of both programmes and advertisements that can be shown on cable TV. These
restrictions are laid down in Section 6 of the Rules.
No programme can be shown that:
• ƒ Offends against good taste or decency ƒ
• Contains criticism of friendly countries ƒ
• Contains attack on religions or communities or visuals or words contemptuous of
religious groups or which promote communal attitudes (sic) ƒ
• Contains anything obscene, defamatory, deliberate, false and suggestive innuendos
and half truths ƒ
• Is likely to encourage or incite violence or contains anything against maintenance of
law and order or which promote anti-national attitudes ƒ
• Contains anything amounting to contempt of court ƒ
171
Political and religious groups are banned from owning FM channels, but apparently, they are
allowed to own TV channels. The eligibility criteria are listed in the Uplinking and Downlinking
Guidelines.
172
This amendment is aimed at removing the leeway given to cigarette and liquor companies in a 2006
amendment that allowed advertisements that shared a brand name or logo with any tobacco or liquor
product with several caveats. No reference, direct or indirect, could be made to the prohibited products
in any form, and the “story board” or visual could depict only the product being advertised”. Besides
allowing nuanced references, the “relaxed regime” mandated that advertisements could not use certain
colours, layout presentations or situations associated with the prohibited products. The Government had
relaxed its rules in view of the blatant violation of the ban on tobacco and liquor advertisements by
which companies that launched new products like soda and glasses to circumvent the Advertising Code
157 | New Technology Laws With Special Reference To Cyber Laws
Indecent Representation of Women Act
include specific provisions relating to the representation of women on television, in May 2008
the National Commission for Women initiated a process seeking to modify the Indecent
Representation of Women (Prohibition) Act, 1986 on the ground that its scope needed to be
widened to include the expanded electronic media and cyberspace.38 The amendments,
apparently proposed by the Ministry of Women & Child Development, Government of India,
were posted on the NCW website for comment and seminars were held in different cities to
discuss the proposals.173 The main recommendations comprise amendment of Section 1 of the
Act to make the definition of ‘derogatory representation of women’ wider and increase in the
punishment prescribed for violations.174
Use of Conditional Access Systems in Cable Networks:
In December 2002, Parliament enacted an amendment to the Cable Networks Act requiring
consumers to use ‘addressable systems’ to access premium and pay channels through cable
networks.175
Addressable systems are also called ‘conditional access systems’ (CAS) or ‘set-top boxes.’
The amendment provided that cable subscribers receive a basic package of channels that had
to include a mixture of entertainment, information, and educational programmes. The
government may fix the total number of free-to-air channel to be included, and the maximum
amount that cable operators may charge subscribers in the basic service tier.176
Following a 2003 Amendment, the Central Government announced a series of measures to
implement the CAS framework, including a 2003 notification that required cable operators in
Chennai, Mumbai, Delhi and Kolkata to transmit pay channels only though addressable
systems.177 Operators were given six months to procure the necessary equipment to implement
this requirement. Through a separate notification, the government ordered cable operators to
offer a minimum of 30 free-to-air channels in a basic package to be priced at Rs. 72.178 The
Government also amended the Cable Network Rules to regulate rentals and security deposits
for set-top boxes.
While broadcasters and Multi-Service Operators (MSOs) welcomed the introduction of CAS
framework, consumers were outraged at the prospect of paying special rates for premium
of the Cable Television Network Rules. See “Government Bans Surrogate Advertisements,” The Hindu,
March 18 2008, http://www.hindu.com/2008/03/18/stories/2008031854721300.htm
173
Existing Provisions and Amended provisions of the Indecent Representation of Women (Prohibition)
Act, 1986: http://ncw.nic.in/Comments/Indecent_representation.pdf
174
‘Indecent Proposals’ for a critique of the NCW’s proposal to modify the 21-year-old law:
http://infochangeindia.org/200806257188/Women/Analysis/Indecent-proposals.html
175
Cable Networks (Amendment) Act (No 2 of 2003) published in the Official Gazette on 1 January
2003.
176
Telecom Regulatory Authority of India (TRAI) Draft Recommendations on Restructuring of Cable
TV Services, July 15, 2008,
177
Ministry of Information and Broadcasting, ‘Notification on Addressable Systems’, Gazette of India,
14 January 2003
178
Ministry of Information and Broadcasting, ‘Notification on Free-to-Air Channels’, Gazette of India,
7 May 2003
158 | New Technology Laws With Special Reference To Cyber Laws
channels. Local cable operators were also upset as they feared loss of revenue from cable
subscribers who would elect to receive only the basic package of free-to-air channels.
The government was thus forced to announce an indefinite delay in the introduction of CAS in
Delhi. Soon the matter was taken to the Delhi High Court [Jay Polychem v Union of India
(2004) IV AD 249 (Del)]. In December 2003, the Delhi High Court ordered the introduction
of the CAS framework in Delhi on a trial basis for three months.179
In January 2004, the Government referred the matter to TRAI. For this purpose the
government issued a notification under section 11(1) (d) of the Telecom Regulatory Authority
of India Act entrusting additional regulatory functions to the Authority. In a separate
notification, the government revised the definition of ‘telecommunication service’ in Section 2
(1) (k) of the TRAI Act to include broadcasting and cable services within this definition. This
meant that TRAI could now regulate broadcasting and cable service as telecommunication
services and the Telecom Disputes Settlement and Appellate Tribunal (TDSAT) could
adjudicate upon disputes relating to this service.
Following TRAI’s recommendations, the Central Government suspended the notification of
the CAS framework in February 2004. However, the matter did not end here. A single judge
of the Madras High Court stayed the government’s suspension notification in March 2004.
This was followed by the Delhi Court ordering the government to reintroduce the CAS
framework within four weeks. The Central Government then issued amendments to the Cable
Network Rules in the metro areas. 180
The amendments established a detailed regulatory scheme to reintroduce the CAS framework
in areas notified by the Central Government. Rule 11(5) of the Cable Network Rules prohibits
MSOs from offering cable services in the notified areas without the Central Government’s
permission. The Ministry of Information and Broadcasting may grant or refuse permission
after taking into account factors like the MSO’s operational area, the number of subscribers
and local operators in the area, commercial arrangements with broadcasters and cable
operators, financial strength, management capability, security clearance, the MSO’s ability to
supply and maintain adequate set top boxes.181
Every broadcaster is required to declare whether each of its channels is either pay or free to
air, and the maximum retail price of each of the ‘pay channels.’ If TRAI believes that the
declared price for a channel is too high, it may revise the price of the channel. It has the option
of fixing retail price ceiling for all pay channels.
Rule 9 of the Cable Network Rules empowers TRAI to take decisions regarding:
• ƒ Standard interconnection and distribution agreements to be used for pay and freeto-
air channels between broadcasters and MSOs, and MSOs and cable operators ƒ
179
Consumer Coordination Council v Union of India CWP No 8993-8994 of 2003 (Del, 26 December
2003).
180
Telecom Regulatory Authority of India (TRAI) Draft Recommendations on Restructuring of Cable
TV Services, July 15, 2008,
181
Ministry of Information and Broadcasting, Cable Television Networks (Second Amendment) Rules
2006.
159 | New Technology Laws With Special Reference To Cyber Laws
• Ceilings for security deposits and monthly rentals charged for set-top boxes ƒ
• Tariffs for the basic service tiers of cable services and minimum number of freeto-air
channels ƒ
• Quality of service standards182
TRAI released comprehensive recommendations on broadcasting and cable services in
October 2004. It recommended that there should be no regulation on advertisements in free-to-
air and pay channels. But it proposed a suitable amendment to the Cable Networks Act to
enable the government to regulate advertisements, if necessary. It called for strengthening the
functions of authorized officers under the Cable Networks Act and recommended that they be
made responsible for registering cable operators. Based on a detailed study of various cable
technologies, TRAI suggested that the government consider ‘traps’ as an alternative to set top
boxes for distribution of cable channel. Traps were cheaper than set-top boxes, and could be
used as a transitory arrangement.
TRAI proposed three alternative models for the future regulation of the cable industry. The
first model did not envisage a mandatory CAS framework. The second would use the system
of traps as a mandatory arrangement, and the third envisages a mandatory arrangement with
CAS.
TRAI Recommendations on Restructuring of Cable TV Services, July 2008
In July 2008 TRAI issued draft recommendations relating to the restructuring of Cable TV
services in order to “ensure effective licensing compliance, attract investment, facilitate new
value added services and encourage digitisation.”48 It provided a deadline of only a week for
comments on the draft.
The most significant recommendations propose the replacement of the present system of
registration for Local Cable TV operators (LCOs) with a licensing framework, and the
creation of a separate licensing provision for Multi-System Operators (MSOs), thus
recognising them as separate entities from local cable TV operators.
The recommendations also include changes in the licensing authorities, the geographical
boundaries of service areas permitted under such licenses, the duration of licenses, the
documents to be submitted along with applications for licenses, the entry fee and
administrative cess to be levied, the time frame for the grant of licenses, procedures for
renewal as well as termination/cancellation/suspension of licenses, mechanisms for the
182
7 Since the MIB grants uplinking permission, all the technical parameters are specified by the MIB
in its uplinking guidelines. But the oversight of the channel on technical parameters is undertaken by
TRAI, since this is the body that has jurisdiction over spectrum allocation decisions. Oversight of the
channels on content issues is undertaken by the MIB, though there is no law that empowers them to do
this – other than the content code, which is applicable to the cable operators and not to the channels. But
the provisions of the law are broad enough to allow a district magistrate to bully a local cable operator
into doing his bidding, for any real or perceived violation of the content code. So there is a multiplicity
of controlling bodies, with unclear jurisdictions. And a part of the problem is that they’re always
engaged in mutual jealousies and bureaucratic turf battles
160 | New Technology Laws With Special Reference To Cyber Laws
redressal of subscriber complaints, responsibility for violations of rules and regulations
relating to content, and technology (e.g., digitisation vs. analog transmission).
The154-page document includes a preface and introduction that provides an interesting useful
condensed history of the advent and growth of cable television in India, with the latest data
available on the subject.
Film Certification under the Cinematograph Act
The Cable Network Rules and the Uplinking and Downlinking Guidelines require cable
operators and broadcasters to comply with the Cinematograph Act in determining their
programme content. The Central Board for Film Certification (CBFC) certifies films based on
the Cinematograph Act framework. Films are certified as ‘U” (unrestricted exhibition), UA
(parental supervision), A (restricted supervision), depending on the content. The grounds for
denial of certification are laid down in Section 5 (B) (1): “the film or any part of it is against
the interests of the security of the State, friendly relations with foreign States, public order,
decency or morality, or involves defamation or contempt of court or is likely to incite the
commission of any offence.”
INFORMATION TECHNOLOGY ACT 2000
The Information Technology Act was enacted in 2000 to deal with a number of issues that
arose from the increasing use of the Internet in commercial transactions, and to bring this
emerging technology into the scope of the law. While the Act was not aimed at regulating the
broadcast sector, it will have an impact on the content of broadcast service providers that use
the Internet to broadcast material. Also, with an increasing number of broadcasters using
websites to telecast material (webcasting), the Information Technology Act has become
relevant to the broadcast sector.
The provision in the IT Act that would be most relevant to broadcasters is Section 67, which
deals with “publishing of information which is obscene in electronic form.” The section seeks
to punish “Whoever publishes or transmits or causes to be published in electronic form, any
material which is lascivious or appeals to the prurient interest or if its effect is such as to tend
to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to
read, see or hear the matter contained or embodied in it.” The punishment for a first time
offence is imprisonment of up to five years, and fine of up to one lakh rupees, and for a second
or subsequent conviction, with imprisonment of up to ten years and a fine of up to two lakh
rupees.
This restriction on content is similar to the restrictions laid down by the Indian Penal Code,
and the ‘Hicklin test’183 that has been adopted by Indian courts. It remains to be seen how this
provision will be applied in practice.
183
The 1868 English case R v. Hicklin or the Hicklin test which defined obscenity as matter which had
the tendency :“to deprave and corrupt those whose minds are open to such immoral influences and into
whose hands a publication of this sort might fall. … it is quite certain that it would suggest to the minds
of the young of either sex, or even to persons of more advanced years, thoughts of most impure and
libidinous character”
161 | New Technology Laws With Special Reference To Cyber Laws
It is significant that the proposed Broadcast Bill 2007 defines ‘broadcasting’ widely so that it
is possible to interpret it to include Internet technology. The Act defines “Multi System
Operator (MSO)” to mean “any person who manages and operates a multi-system cable
television network to provide a cable television service to multiple subscribers, which may or
may not include other value added services including telecommunications and Internet.”
Regulation of Competition
A serious implication of convergence is the possibility of an increase in media holdings, which
may have several adverse consequences on competition within media markets. Media
monopoly could significantly affect the kind of information flows that a free media makes
possible. In the US context serious anti-trust concerns have been expressed over the kinds of
mergers and acquisitions that have taken place in the media field.
Uplinking Guidelines (December 2005)
The Ministry of Information and Broadcasting initially permitted the uplinking of television
programmes in 1998, but only through the facilities of the then public sector Vidhesh Sanchar
Nigam Ltd. (VSNL). In March 1999, Indian broadcasters were authorized to use their own
uplinking facilities through the C band without having to rely exclusively on VSNL. A few
months later, a group of ministers recommended that the government further liberalise
uplinking rules to ensure that television channels were properly regulated. 184
In July 2000, the Ministry notified the “Guidelines for Uplinking from India”. This was
followed by “Guidelines for Uplinking of News and Current Affairs TV Channels from India”
in March 2003, (amended in August 2003), “Guidelines for use of Satellite News Gathering
(SNG)/Digital Satellite News Gathering (DSNG)” in May 2003 and addendum dated 1.4.2005
to the Uplinking Guidelines. On 20 October 2005 the Government further amended the March
2003 guidelines.
In order to gather all this into one set of guidelines, the Government notified the consolidated
Uplinking Guidelines, in supercession of all previous guidelines. That came into effect from 2
December 2005 and is applicable to all existing channels.
The Guidelines classify uplinking into three categories:
1) Companies that provide uplinking facilities, such as hubs and teleports. These can only
transmit television channels that have been authorized by the MIB
According to the Indian Supreme Court, there are 3 aspects to the obscenity test: - the material is
offensive to decency and modesty and has the effect of depraving and corrupting - having regard to
community mores, the text is without a preponderant social purpose or profit - the material is not
redeemed by artistic merit or literary defence. The Court has thus moved away from the primary focus
Hicklin on the effect of depraving and corrupting , and has added that obscenity also includes concerns
of decency and modesty. A piece of work, would thus be offensive if it involved treating sex in a way
that appealed to ‘the carnal sides of human nature’ or had such a tendency. The Court held that such
treatment of sex was offensive to modesty and decency, ‘as judged by national standards, and
considered likely to pander to lascivious, prurient, or sexually precocious minds.’
184
Ibid
162 | New Technology Laws With Special Reference To Cyber Laws
2) Television channels that use uplinking facilities (including that cover news and current
affairs)
3) News agencies channels that use uplinking facilities (including that cover news and current
affairs)
General Terms and Conditions:
The company should be registered in India. Once the applicant is found to be eligible, the
application is sent for security clearance to the Ministry of Home Affairs, and for further
clearance to the Department of Space.
Uplinking is allowed in the C band and the Ku Band. Uplinking in the C band is allowed for
both Indian and foreign satellites, but the government gives preferential treatment for
proposals involving use of Indian satellites. This band cannot be used for DTH services
without obtaining a separate license.
An entity engaged in uplinking must comply with the programme and advertising codes issued
under the Cable Television Regulation Act and Rules framed under the Act.
It must retain a record of uplinked materials for a 90-day period, and produce these to
government agencies on request. It must allow these agencies to inspect its facilities and
furnish necessary information to the Ministry of Information and Broadcasting from time to
time. The company has to provide, at its own cost, facilities to the Ministry or any other
government agency for monitoring of programmes. It has to comply with terms and conditions
of the Wireless Operational License issued by the WPC Wing, DoT.
The Ministry has the right to suspend the company’s permission for a specified period in
public interest or in the interest of national security. The Ministry’s permission is needed
before any changes are made to the CEO/ Board of Directors
Offences and Penalties:
If a channel/teleport/SNG/DSNG found to be disseminating objectionable or unauthorized
content, messages, or communication inconsistent with the public interest or national security
or failing to comply with the directions issued by the Ministry of Information and
Broadcasting, the permission granted can be revoked and the company disqualified to hold
any such permission for a period of five years.
Permission for setting up of up linking hubs/teleports
Foreign equity holding in an applicant company has to be less than 50 per cent. Applicant
companies are also required to pay processing fee of Rs. 10,000 and, after being held eligible,
the applicant company must pay a permission fee at the rate of Rs. five lakhs per teleport.
DTH GUIDELINES
Direct-to-Home (DTH) Broadcasting Service refers to the distribution of multi-channel TV
programmes in Ku Band by using a satellite system to provide TV signals direct to
subscribers' premises without passing through an intermediary such as cable operator. While
the Central Government had initially banned DTH services in India, it legalized them after a
185
Guidelines for Obtaining License for Providing Direct-To-Home (DTH) Broadcasting Service in
India,
186
Notification No. GSR 18 (E) dated 9 January, 2001 of the Department of Telecommunications.
164 | New Technology Laws With Special Reference To Cyber Laws
or any content, as and when directed to do so by the Ministry of Information and Broadcasting
or any other designated lawful authority.
The applicant has to provide the necessary facility for continuous monitoring of the DTH
broadcasting service at its own cost. The applicant must maintain the recordings of
programmes and advertisements carried on the platform for a period of 90 days from the date
of broadcast and produce the same to the Ministry of Information and Broadcasting, or its
authorised representative, as and when required.
The applicant cannot use any equipment which are identified as unlawful and/or render
network security vulnerable. All foreign personnel likely to be deployed by way of
appointment, contract, consultancy, etc., by the applicant for installation, maintenance and
operation of its services must obtain security clearance from the Government of India prior to
their deployment.
Bringing OTT platforms under government control
The OTT platform in India is regulated less as compared to its offline counterparts like films
and television. This gives the platforms creative freedom which allows the platforms to cater
to the needs of the masses with films brought to the platform from all across the globe. OTTs
do not have any special regulations or legislations in terms of foreign programmes and Indian
content. There is no discrimination and the same codes and rules are applicable throughout in
terms of content regulation of the programmes.
According to a national survey, the online content industry has an estimated value of INR
4000 crores with a viewership of more than 17 crores from OTT platforms alone and all of
these are regulated with little or no scrutiny. The Supreme Court issued a notice to the Centre
in October 2020 to the Centre by way of a PIL where the petitioners demanded the creation of
an autonomous regulatory system for online content. Over the years, the judicial approach has
been such that online content would not fall under the ambit of the Cinematography Act, 1952.
In parallel, several OTT platforms and operators like Hostar, Netflix are increasingly adopting
self-regulation codes.
Currently, the Electronic Media Monitoring Centre, which was set up in 2008, is entrusted
with the work of monitoring content on TV. It puts out reports on violations of the Programme
Code.
Foreign productions
The entry of foreign and private broadcasters was a result of liberalization in the 1990s. There
was a huge surge in the number of channels. Entrepreneurs set up small cable TV networks
and began broadcasting local video channels including music videos within neighbourhoods.
Satellite television and the launch of channels by CNN, Zee and STAR led to the birth of
national multi-system operators (MSOs) and local cable operators (LCOs)
Foreign investment in the TV industry is subject to sector caps and the regulatory guidelines
as may be prescribed from time to time. India has entered into film co-production treaties with
the United Kingdom, Italy, Brazil, Germany, France and New Zealand. The Ministry of
187
https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1467-8519.2007.00564.x
167 | New Technology Laws With Special Reference To Cyber Laws
modification or alteration technologies are relatively fast processes, they facilitate easy
replication and mass production of the crops and plants. No one can deny the risks caused by
these advanced technologies but, amidst this technological revolution, scientists have found
their way, to empower the plants with the desired traits as per the location188.
Categories of Genetic Technologies
Three main categories have been recognized regarding the concern of the application of
genetic technology. These are:
• Human Cloning
Human cloning refers to the formation or the creation of the human embryos or genetically
modified human children who are identical to their living and dead parents. There have been
even more categories of human cloning technologies189. These are:
1. Research cloning- It means that the embryos of humans are used for the purpose
of experiments. The clonal human embryo shall be used for this purpose. This
form of cloning is also known as Somatic Cell Nuclear Transfer (SCNT). In the
case of SCNT a nucleus, which is in the form of a Somatic cell (which could be a
muscle cell or a skin cell), gets transferred to a female egg from which the genetic
cloning material was removed. Towards the end of the process, the clonal embryo
gets produced.
2. Reproductive cloning- It means that a clonal embryo is created, but it is not used
for experimental purposes. The clonal embryo obtained in this case will be used
for implantation into a woman’s womb and brought to the terms as a human
child. Embryonic stem cell cloning research, involves research cloning. Thus, it
must be considered since it does not involve any sort of modification or trait
selection of genes.
• Gene Trait Selection
This form of trait selection refers to the selection of the eggs, sperm, or embryos that contain
the genes that have been associated with certain traits. In the said process, the desired sperm,
eggs, or even embryos that carry the interest are used to create the child of the humans.
However, in the current process, the genetic selection may be used for non-medical related or
medical-related purposes. For example: In the case where medically-related genetic selection
takes place, also known as Preimplantation Genetic Diagnosis (PGD) and a single set of
zygotes which were created through in-vitro fertilization are tested for the genes which cause
cystic fibrosis or any other disease and only those zygotes which are free from those diseases
or cysts are allowed to initiate a pregnancy.
• Human Genetic Modification
The genetic modification of human beings can take place potentially at the therapeutic level or
even at enhancement levels. At the therapeutic level, it can be seen that the illness or the
188
https://www.researchgate.net/publication/326501205_Regulation_of_emerging_gene_technologies
189
http://dbtindia.gov.in/sites/default/files/Draft_Regulatory_Framework_Genome_Editing
168 | New Technology Laws With Special Reference To Cyber Laws
deficiency in a person gets cured. At the level of enhancement, the condition of the health of a
person is known to get better than the average person. The genetic modification can either be
done at somatic or germline levels. The modifications made at the germline level can be
passed on to all the succeeding generations. Therefore, in the area of human genetic
modifications, there are four possibilities that tend to exist namely, the somatic therapy, the
somatic enhancement, the germline therapy, and the germline enhancement.
• Somatic Therapy- It is a way by which the good genes of a person are
transferred to the cells of the body to improve the rate of recovery if a person is
said to suffer from diseases such as immunodeficiency or any cysts that have
been formed inside his body. It is considered to be ethical and acceptable and has
been used to treat patients with leukaemia.
• Somatic Enhancement- It is a way by which a new gene is inserted into the
muscle of the person or the person’s lung tissues. The person is generally an
athlete who is indulged in various sports activities to increase their respiratory
capacity. Although these kinds of enhancement have not been carried out in
humans to date. This has been considered as unethical as it could render changes
into the human body and produce new forms of inequality.
• Germline Therapy- In this kind of therapy, it is practically possible to insert the
healthy genes into the embryo that has the genes which contain the diseases such
as cystic fibrosis. But, these techniques are still being developed and have not
been tried on human beings as of yet. This therapy has been widely appreciated as
it helps people recover from diseases without altering their functions.
• Germline Enhancement- In this kind of process, genetic modification, like the
somatic enhancement is attempted in the muscle cell or the cells of the lungs at an
early stage when the embryo has just been developing. This improves the
respiratory functions of the body in the child that results from the mutated
embryo. The process would be similar to that of the somatic enhancement.
However, it has been suggested that the children born out of this might have extra
cognitive behavioural traits that would make them distinct from the regular
human species causing them to have emerged as a new-subspecies of homo
sapiens that cannot breed with the general human beings. Thus, this treatment is
generally viewed as a very dangerous form of treatment as it would result in the
mutation and alteration of human beings, though making them potentially
stronger, but also a civil threat. Changing the nature and form of human beings
may have such consequences that can not be predicted at this stage.
Significance on Development
The research and studies on the Genes or the genome data have anticipated that the decoding
of the human genome and by gaining detailed knowledge about them, there’s a possibility for
new advances and avenues in biotechnology and the world of medicine. The UNESCO
International Bioethics Committee had its committee established, to draft the regulations
190
https://academic.oup.com/jlb/article/6/1/1/5489401
191
http://bch.cbd.int/protocol/
170 | New Technology Laws With Special Reference To Cyber Laws
breeding, improved crop, and plant protection, human and animal health care, bio-economy,
and agricultural sector. The new and advanced Genetic Technology promises humankind, its
security, and protection against the various infectious and non-infectious diseases.
Impact
The rapid growth and influential impact of Genetic Technologies, have made it of primary
importance. Therefore, the leading leaders of the world have to pay their recognition, to the
advanced development in this field. They further promote it, to face the standing challenges
with new technologies, in the modern world in the areas of interests like law, policies, history,
and ethics. This makes it an important oversight in both national and international degrees.
Although, some countries have already embraced the available, comprehensive policies of
their government on the much-debated Genetic Technologies. But, most of them still remain
undecided on this matter. The recent boom in technology has improved the accuracy of
genetic analysis, trait testing, and modification, but eventually led to the reduced cost of these
areas. The wide interests and diversity have minimized the privacy goals for these genetic
data. The ways in which these genetic data are admitted and held have made it difficult, to
develop a proper genetic privacy policy for an individual’s safety.
On one hand, the legality of these gene technology patents is at the debate, as to the isolation
of certain genes just amounts to ‘discovery’ and not ‘invention’, so it can’t be patentable. But,
other statements to this debate include the presence of a purified gene, which is ‘invention’
and not ‘discovery’. The Government of India has its compliance, with the rules and
provisions of the International treaties and agreements like Cartagena Protocol. It also
proposed the enactment of the National Biotechnology Regulatory Authority
through the Biotechnology Regulatory Authority of India (BRAI) Bill, 2013. However, in
the past few years, it has suffered great opposition from farmers and many NGO’s.
Legal Aspect
India did have a systematic and structured regulation regarding the framework of the genetic
technology for the biosafety of the individuals and the researchers and still has an ongoing
approach for it. There is also a structured framework for the biosafety of genetically modified
organisms (also known as GMO) who are not human beings. India was one of the first few
countries to introduce development in the field of biosafety regulatory systems for genetically
modified individuals back in 1989. The main rules for all the activities related to the biosafety
of the GMOs are mentioned in the Environment (Protection) Act, 1986. There have also been
other rules and regulations that have been applicable to such genetically mutated organisms.
In India, genetically modified organisms (GMO’s) come under the regulation of the Ministry
of Environment, Forest and Climate Change and is notified under the rules of the. The
patentability of genes is still a matter of debate in the country but, the Indian Patent Office that
grants the patents has understood the different standards for patents of a nucleotide sequences.
The Genome Technology have inferences to the International treaties and agreements, like
the Cartagena Protocol on Biosafety to the Convention of Biological Diversity. The Gene
Patents under Section 3(c) of the Patents Act, 1970 includes the patenting for the discovery of
192
AM, A. (2009). Journal of Medical Ethics and History of Medicine.
193
Ahuja, V. (n.d.). Regulation of emerging gene technologies in India.
173 | New Technology Laws With Special Reference To Cyber Laws
Application: – The requirement of Article 27(1) of TRIPS agreement, which states that the
inventions always need to involve an inventive step. Which essentially means an additional
fact or knowledge, to the previously known data. It is a pre-requisite if one needs legal
protection of the investment that consumed a lot of time and effort.
Conclusion: – The U.S. Supreme Court held that there is a distinction between the existence of
living organisms in nature and the isolated organisms in nature, probably because of human
intervention. This isolation makes the information and data of the gene unique and available in
a way, that is not natural in nature, thus it should be considered an improved product. It was
held that any live, micro-organism whether man-made is a subject matter and hence,
constitutes as a matter within the statute. [6]
Harjinder Kaur and Ors. v. State of Punjab (2012)
Facts: – The respondent had an illicit relationship with the petitioner. When the petitioner
denied the physical relations with him and his friends, the respondent blackmailed him. The
respondent also tried attempting rape on the petitioner. The petitioner complained to the Police
Commissioner, Ludhiana but no action was taken in the response. Then, a direction was
released that there was no proper investigation of the case was conducted. There were no
blood grouping tests done, the DNA test of the respondent, and the child was ordered. It was
alleged that one of the friends of the respondent was posted in the near police station as well.
Issue: – Relevance of DNA testing? Whether reporters are allowed to see the court hearing?
Difference between DNA sampling and DNA profile?
Rule: – Article 20(3), Article 21 (Right to Life) of the Indian Constitution. Section
53(A), Section 182 of the Criminal Procedure Code (CPC), 1973. Section 112 of the Indian
Evidence Act, 1872. Section 452, 354, 380, and 149 of the Indian Penal Code, 1860.
Application: – Article 21 of the Indian Constitution states the right to life for individuals, it
has always considered DNA tests as a violation. Facilitation of DNA testing guaranteed by the
CPC, to prove the case in favor of the accused or otherwise.
The respondent didn’t deny being the biological father of the child of the petitioner. He neither
denied having physical contact with the mother of the child, the petitioner. The results of DNA
testing were with an accuracy of 99.99%, confirming the paternity relation with the child.
Police relied on the DNA testing results for this case and hence, turned out successful. Within
30 days of order receipt, the child and the respondent were sent for this testing in a laboratory.
The Court held that adequate time was given, to the respondents to file the reply, of the
petition against him. The matching of the DNA profiles is an essential tool to link people with
their criminal acts of injustice.
Dimensions of Genetic Privacy
The concept of ‘privacy’ has evolved over a period of time. But, there’s a question as to who,
we could trust our genetic information and how they will hold and use it, still remains in
question as well. There is a continuous debate, on whether the international guidelines on
genetic technologies are justified or not. The international approaches, to the shared genetics
194
VEALE, JAMES R. “Characterization of Medical Devices.” Food, Drug, Cosmetic Law Journal,
vol. 35, no. 10, 1980, pp. 588–593. JSTOR, www.jstor.org/stable/26658823.
179 | New Technology Laws With Special Reference To Cyber Laws
1. Low (Class A)
2. Low Moderate (Class B)
3. Moderate-High (Class C)
4. High (Class D)
The first schedule of Medical Device Rule, 2017 mentions the four different types of classes.
However, in other countries, the manufacturers and importers have the freedom to make a
distinction of products on their own end just to register themselves. But in India, the situation
is another way around; herein, importers are supposed to go with the classifications made by
Drugs Controller General of India (DCGI).
There can be many examples to the above situation but to mention one, as follows: So, the
medical device category of Class A & B can be imported, on the free sale certificate
irrespective of the fact that either they have certified safety or performing data or just a
clinical investigation of origin country, from unregulated jurisdiction. In the case of Class C &
D, the import can only be done after justifying the safety and productiveness by clinical
investigation in India195.
The Indian legal system is being massive support to the Indian medical device market
repeatedly. We have already seen the laws and principles guarding the medical market and
how vast, exhaustive they are. Although the difficulties of doing medical business in India can
be outright by the percentage of growth, it is having. The main concern in 2020 can only be
certain policies of government and control of pricing. The NMD policy can gain the
confidence of the business persons in the market to fulfil a long term goal of ‘Make in India’.
However, the medical market of India is giving greater exposure to business persons, investors
and stakeholder, a lot than before, irrespective of the odds.
195
Lee-Makiyama, Hosuk, and Lisa Brandt. Addressing Regulatory Divergences in the Medical
Devices Sector. European Centre for International Political Economy,
2016, www.jstor.org/stable/resrep23963.
180 | New Technology Laws With Special Reference To Cyber Laws
CHAPTER 10
196
Importance of E-Pharmacies for a Digital India:Benefits and Future.
189 | New Technology Laws With Special Reference To Cyber Laws
consultation, E-diagnostic services, information
about medications and diseases, and health
insurance services