Short Notes
Short Notes
Cyber Security Policy, 2013: For the first time in history, in the year
2013 India introduced its national level cyber security policy. This policy lays
down the broad framework for upholding and protecting the cyber space
security. The main aim of this policy is to create a broad umbrella of cyber
security framework in the country so that the Indian cyber space is secure
and free from any kind of attacks both by terrorists and other anti-social
elements. However, there is a need to amend this policy to encompass
newer methods of ensuring the safety of the ever evolving cyber space.
Conclusion: The legal systems around the globe are, with every passing
year, trying to implement new measures to combat cyber terrorism.
However, with more innovative ways of working in the cyber space, more
loopholes are formed which will have to be filled in by the countries by
amending the procedures and the laws in force to tackle cyber terrorism.
Moreover, a unified international framework should be in place to combat
this global issue. Further, the public should be made aware of the threats
and the ways and means of dissemination and how to deal in case of
terrorist attacks.
(2) CYBER PORNOGRAPHY
Legal Framework
There are various legislations to regulate Cyber pornography in India, like
the Information Technology Act, 2000, Indian Penal Code, Indecent
Representation of Women’s act and Young Person’s (Harmful Publication)
Act.
Information Technology Act, 2000: Cyber pornography is banned in
many countries but legalized in some Cyber Pornography is neither banned
nor legalised under the IT Act, 2000. The IT Act prohibits the production and
distribution of cyber pornography but does not prohibit the viewing or
downloading of pornographic content if it is not child pornography.
Section 67 of the Information Technology Act, 2000 makes the following
acts punishable with imprisonment up to 3 years and a fine up to 5 lakhs:
1. Publication– It includes uploading of pornographic content on a website,
WhatsApp group or any other digital portal where third parties can have
access to such pornographic content.
2. Transmission– It means to send obscene material to any person
electronically.
3. Causing to be published or transmitted– It is a comprehensive
terminology which would end up making the intermediary portal liable,
using which the offender has published or transmitted such obscene
content. The Intermediary Guidelines under the Information Technology Act
put an onus on the Intermediary/Service Provider to exercise due diligence
to ensure that their portal is not being misused.
Section 67A of the Information Technology Act makes publication,
transmission and causing to be transmitted and published any material
containing sexually explicit act or conduct punishable with imprisonment up
to 5 years and a fine up to ₹10 lakhs.
Exceptions: The section 67A of the IT Act does not prohibit books,
pamphlets, magazines or pictures which are created for educational
purposes or which is kept for religious purposes. Thus, the section does not
prohibit the preserving of sculptures that are of historical importance.
Child Pornography
Section 67B of the IT Act, 2000 makes it publishing, transmitting, viewing or
downloading child pornography illegal. The fact that the internet has made
child pornography more accessible to the distributors, as well as the
collectors, cannot be denied.
According to Section 67B, any person who has not attained the age of 18
years is a child. It further states that child pornography can be committed in
the following five ways:
• By publishing or transmitting or causing to publish or transmit any material
electronically that depicts the children engaged in a sexually explicit act or
conduct.
• By depicting children in an obscene or sexually explicit manner.
• By inducing children to online relationship with one or more children for
and on a sexually explicit act, or in a manner that may offend a reasonable
adult on the computer resource.
• By facilitating child abuse online.
• By recording own abuse or that of others pertaining to sexually explicit act
with others.
Exceptions: The section does not prohibit the books, pamphlets, magazines
or pictures which are created for educational force or which is kept for
religious purposes. Thus, sexology (the scientific study of human sexuality or
sexual behaviour) is not prohibited under this section. Similarly, if a
photograph of a child is used to tell about the anatomy of a child then it
won’t constitute an offence under this section.
Indian Penal Code, 1860: Section 292 of IPC prohibits the sale of obscene
material. Section 292(1) explains the meaning of “obscenity” and Section
292(2) explains the punishment for sale, distribution, etc. of obscene
materials.
Section 292(1) states that any material will be deemed obscene if it is
lascivious or prurient or any part of
the material has the tendency to corrupt or deprave the people.
Section 293 of Indian Penal Code, 1860, specifies the punishment for a
person who sells, lets to hire or distributes any obscene object to any person
who is below the age of 20 years. It states that on the first conviction a
person shall be awarded imprisonment which may extend to 3 years along
with the fine which
may extend to ₹5,000 and on subsequent conviction, with imprisonment
which may extend to 7 years along with the fine which may extend to
₹5,000.
Section 13 of POCSO Act states that anyone who uses a child for
pornographic purposes by either representing the sexual organs of the child
or using a child in real or simulated sexual acts or representing a child
indecently or obscenely in programmes or advertisements on television or
on internet, commits the offence under this section and is liable in
accordance with Sections 14 and 15 of the POCSO Act.
Internet Piracy: Internet piracy is the act of downloading a file from the
internet, or by procuring an online software through a compact disc.
Methods of conducting internet piracy are websites offering free downloads
of software, auctions selling illegally obtained software or P2P servers which
transfer programs.
End-User Piracy: This form of piracy involves the user illegally reproducing
software which he isn’t authorized to do. An example would be a user using
one license to the software and installing it on multiple systems, or
upgrading an already pirated software.
Hard-Disk Loading: This occurs when a business sells new computers with
illegal copies of software loaded onto the hard disks to make the purchase of
the machines more attractive.
Piracy in movies: The act of illegally acquiring, copying, reproducing and
then distributing film media, without having any legal right or license to do
so, is considered movie piracy. The most common occurrence of this is the
distribution of these movies on websites. Traffic for these sites tends to
spike whenever a new blockbuster movie releases as a pirated version will
very likely be hosting these movies in a downloadable format on their
servers.
Online Piracy: Online piracy is still a new arena in the world of piracy as
compared to its offline older brother, and it has only grown more intricate
with advancements in technology. Any piece of digital content, be it movies,
music or games, are now accessible online through the BitTorrent client
service, which strings together several pieces of the data from a swarm of
users, then downloads and compiles them onto the user’s computer. It’s
simple, efficient, widely used, and difficult to crack down on.
Piracy in India
India is one of the few countries that has multiple dominant box office film
industries, in Bollywood, Hollywood, and Tollywood. As such, piracy is a
much more dominant force considering there is a lot more material to pirate
which the local audience would be interested in. Internet users often use
VPNs to visit torrent sites which host songs, games, movies and the like.
Local vendors at technological hubs often carry compact discs with pirated
movies and games, which are sold at cheap prices. Modding video game
hardware to play pirated discs is also a booming industry in India.
Charges for piracy: Since the crime of piracy is not limited to only the
movie industry, the punishment specified above isn’t the only one dealt to
pirates. It varies with the industry in which they are committing an act of
piracy. The most notable forms of punishment are covered in the provisions
of the Copyright Act, 1957 and Information Technology Act, 2000.
Prevention of piracy
Legal consequences are effective in deterring piracy, but prosecutions
against digital pirates are rare. Most intellectual property owners receive
cease-and-desist orders against sites hosting pirated content, which are
orders to remove download links. To prevent piracy, some effective ways
include price regulation. By offering digital goods and services at lower
prices, producers can reduce the number of users pirating their content.
While this won't completely stop piracy, it reduces the incentive for people
to use pirated content, preventing it to a large extent. Price regulation is a
loosely defined but effective way to prevent piracy.
• Barriers to Entry: This is a mode of prevention that rests more within the
jurisdiction of the government. Most governments instruct and encourage
ISPs to restrict entry into sites which host pirated content, mostly by
blocking the sites on their servers. Directly barring users from accessing
these sites helps reduce the pirate users by a large amount, as most don’t
have the technical know-how i.e. how to use VPNs which is required to
circumvent the sites being blocked.
• User Confrontation: A lot of TV and streaming services often use a
combination of both the above- listed methods, but with some real-time
interaction with the users. Pirate users often get real- time messages which
notify them that the producer is aware of them using pirated content. Game
developers often use this to troll pirate gamers in hilarious, game-breaking
ways.
• Cooperation between industries: The above-listed methods to prevent
piracy, while working great on their own, often fail and fizzle out when there
is one bad link in the chain. That one bad link can be a producer who is
lenient with his content being pirated or doesn’t know about the extent of
piracy. That is why, all of the above methods, if executed systematically and
efficiently by all relevant producers at once, can be one of the biggest
deterrents to pirates.
Recently, the makers of ‘Udta Punjab’ filed a FIR against illegal distribution
of the movie before it released,
on different Torrent websites. The police arrested a man and the Bombay
High Court punished him with imprisonment for 3 years along with Rs. 3 lakh
fine for infringement of Copyright under the Copyright Act,
1957.
To curb the problem of online piracy in India, the Indian courts have adopted
a new form of order named
'John Doe Order'. In a john doe order, the identity of accused person is
unknown at the time of filing the petition and only a small description is
given to identify the accused. The Indian film-makers are using john
doe orders to deal with online piracy of new movies on 100s of torrent
websites before they even release.
Torrent or free movie download providing websites that are apprehended to
provide illegal access to unreleased movies are blocked in advance.
The biggest crack to online piracy in India happened in 2012 when the
Kerala Anti-Piracy Cell traced IP addresses of more than 1000 people who
were involved in illegal upload and download of the movie ‘Bachelor Party’
online. The action was taken when a complaint was filed by a movie channel
which purchased the distribution rights of the movie.
The "carriers of the internet" i.e. companies that provide internet access and
are accordingly called internet service providers (ISPs); whose revenues are
all set to soar as more and more Indians continue to be captivated by the
charms of the internet and the myriad possibilities it offers. But to sustain
the charm, internet access needs to be quick, smooth, open and transparent
which, no doubt, is the responsibility of the ISPs and yet cannot be left
totally to their control. Most of them are, after all, private entities actuated
only by business considerations and may adopt opaque and invidious
practices as and when it suits them or simply may not be able to cater to the
needs/interests of the consumers. This necessitates that the legal and
regulatory regime in which they are functioning is enabling and dynamic
without being unnecessarily overbearing. Unfortunately, this does not seem
to be the case in India at present.
Why Onerous?
The phrase "any place" has been interpreted to include web space
(Super Cassettes Industries Ltd. v. Myspace Inc. & Another) by the
judiciary making ISPs both proper and necessary parties in any copyright
infringement across internet. In fact, in one of the orders Madras High Court
(RK Productions v. BSNL) went on to suggest that without ISPs there
would be no piracy across internet. Well, true but there would be no internet
access as well. Hon'ble Court further expressed that since under IT Act, ISPs
have the power to block any website; it is for them to ensure that any illegal
or immoral content is not made available implying, a little erroneously, that
it is the power of the ISPs that makes them liable for copyright infringement.
To provide relief to the ISPs the 2012 amendments to the Copyright Act
introduced certain safe harbor provisions but to no avail. In a recent order
by Delhi High Court in Star India Pvt. Ltd v. Haneeth Ujwal, it was held
that ISPs have an obligation to ensure that no violation of third-party
intellectual property rights takes place through its networks. The Court
invoked the License Agreement between the Department of
Telecommunications and the ISP to saddle the ISP with the responsibility of
ensuring that any infringing work is not carried on its network. Interestingly
there was no mention of the recently introduced safe harbour provisions.
Indian judiciary seems to be shifting the burden of identifying
infringement on ISPs which essentially is the obligation of the copyright
owner ignoring the fact that ISPs lack both the institutional and logistical
capacity to assimilate information of infringement across millions of URLs
that can be accessed through their networks. In fact in Kamlesh Vaswani
v. Union of India, a PIL filed before Supreme Court of India in 2013,
seeking blanket ban on online pornography, ISPAI (Internet Service Provider
Association of India) made an unequivocal statement before the Apex Court
that without adequate legal support from the government or judiciary, ISPs
cannot ban websites. Though the issue did not involve copyright
infringement, however, the argument of the ISPs that "they cannot be made
liable for what people do on their networks just like telecom companies are
not liable for peoples' conversation" seems well founded and applicable
even in instances where they are not only held responsible for copyright
infringement but also obligated to identify it.
Why Inadequate?
What if ISPs actually start following the regulatory mandate and start
blocking websites according to their sweet will. Of course, website owners
can approach judiciary, argue freedom of speech and litigation can go on
happily ever after. But what if website is a small start-up, wary of being
involved in an expensive litigation? Who would then set right the excesses of
online censorship where ISPs have an unfettered discretion in deciding who
they provide access to?
Though in all the orders discussed above, judiciary has mandated ISPs to
ensure no online piracy takes place, there are simply no guidelines to
suggest which websites should be banned, should only infringing URLs
(Uniform Resource Locators) be blocked or complete websites, what about
one –off instances of infringement and do they also warrant complete ban
and in case of ban - who examines its legality and what rights are available
to website owners?
And what if these ISPs, encouraged by such unbridled power, also start
discriminating between various kinds of content, providing preferential
access to some online content providers over another as per their interests
and not consumers' choices? Considering that India does not have a law that
makes net neutrality mandatory for ISPs it indeed is a possibility. For
instance, Bharti Airtel, leading ISP in India, had in 2013 tied up with Google
to provide free data service up to 1GB for accessing Google search engine,
Gmail and other Google + services.
Considering that ISPs incur a lot of expenditure on providing an efficient
bandwidth infrastructure to websites desirous of faster access, they may
want to recover it by charging higher rates from them. But can such
discrimination between content be justified? Wouldn't it mar the openness
internet is known for. And even if allowed to an extent, it certainly needs to
be regulated. But net neutrality is yet to be addressed by Indian regulatory
framework pointing clearly to a regulatory gap.In the meanwhile, it remains
to be seen when India will do away with the ironical contrast of having an
onerous yet inadequate legislation.
(5) E-COMMERCE
Types of E-Commerce
E-commerce can be categorised into six categories:
Existing Legislation
In India, the Information Technology Act 2000 governs the basic applicability
of e-commerce. It is based upon UNCITRAL Model but is not a
comprehensive legislation to deal with e-commerce related activities in
India. Further, e-commerce laws and regulations in India are also
supplemented by different laws of India as applicable to the field of e-
commerce. For instance, e-commerce relating to pharmaceuticals,
healthcare, traveling, etc. are governed by different laws though the
information technology act, 2000 prescribes some common requirements for
all these fields. The competition commission of India (CCI) regulates anti
competition and anti-trade practices in ecommerce fields in India. Some
stakeholders have decided to approach courts and CCI against ecommerce
websites to file complaint about unfair trade practices and predatory pricing
by such ecommerce websites.
The e-commerce policy in India has been delayed for three years, causing
agitation among investors, vendors, and retailers. The draft E-Commerce
Policy, 2018 is a positive development in the sector, based on suggestions
from industrial players and various bodies. The government is interested in
consulting with other players to create a policy that meets market needs
and adapts to India's vibrant economy. However, the draft policy has its own
set of benefits and banes. It states that deep discounting has negatively
affected offline sales and unregulated discounts must be ended. It also
restricts direct or indirect influence on the price or sale of products and
services of online retailers to group companies investing in them, potentially
leading to a complete restriction on e-tailers from giving deep discounts.
Business decisions should not be micromanaged in this way.
Consumer Protection
India's e-commerce market has reached USD 20 billion, significantly
impacting various industries, including travel, telecommunication, and online
trading. The government has promoted e-commerce, focusing on e-
consumer activities and service delivery. However, legal control still needs
to catch up with supply. The Consumer Protection Act 1986 governs
consumer-provider relations, excluding free services and triggering liability
for deficiency in services, defects in goods, or unfair trade practices. The act
ensures consumer confidence in law and liability arises when there is a
defect in goods or unfair trade practices. The act also covers the distribution
of goods, although no specific act regulates online transactions. The
Consumer Protection Act is designed to maintain consumer confidence in
law and excludes free services.
. Some of the various protections under the consumer protection act on e-
commerce can be listed below
• Removal of defects.
• Replacement of goods.
• Return of price in case of discrepancy.
• Discontinue any form of restrictive trade practice.
(6) HACKING
1. Computer Hacking
Computer hacking involves cracking user password and gaining access to
information stored in hard disk. Usually, a computer hacker boots the
system in safe mode to run a program that controls user password. Once the
password is reset, after the restart, the hacker gets access to the computer.
2. Email Hacking
Email hacking is about obtaining login password. To do this, the hacker may
use keylogging software. Keylogger software is a spy program that records
keystrokes without the knowledge of computer user. Once installed,
keylogger cannot be detected by user as it works in stealth mode as well.
Other way used by email hacker is phishing. The hacker creates fake email
login pages (copy of genuine website) in which victim enters her/his email
ID and password which is accessible to the email hacker.
3. Ethical Hacking
Ethical hacking is done by an individual or an organization to examine the
ways to strengthen the cyber security wall of a company or a network. An
ethical hacker acts as a supervisor who tries to infiltrate in computer
network with the knowledge of administer and suggest areas that needs
technical repairing work to minimize the vulnerability factor. The ethical
hacker acts in a manner keeping potential attacks in mind, that way ethical
hackers
keeps cyber security measures a step ahead of cyber criminals. Ethical
hacker needs to stick by certain principles that involve seeking permission
from administrator, protect the right to privacy of people involved and never
use information for exploiting at later stage and assist software developer in
building more secured system.
4. Network Hacking
Networks and their connections are important for internet to run well. In
order to damage networking system, network hackers manipulate
connections through malicious program attacks. Network hacking is done
through malicious scripts or software specifically designed to manipulate
networking connections. The techniques of network hacking involves
creating worms, unleashing denial of service attacks or breaching a network
via unauthorized remote access. There are certain Root Kit programs as well
whose function is to detach control of operating system from legitimate
programs/software/operators/administrators. The hole created by
detachment is used by the hacker to infiltrate and perform malicious
activities with the target system.
5. Password Hacking
A password is important entity to secure sensitive information. Password is
there for online banking accounts, email accounts, computer system, ATMs,
computer applications, networks and more. In order to hack into user’s
system, the hacker cracks the password. To do this, the hacker either access
the password (by having the knowledge of computer user’s personal
information) or the hacker could use advanced computing resources to crack
passwords.
PREVENTIVE MEASURES
To protect the system from hacker’s attack it is essential to take some
preventive measures which are enumerated as under:
1. Updating system: The operating system of the computer or the
applications in the mobile regularly sends update notifications. These
updates shall be installed as and when they are available. An updated
operating system is more secured and ready to avert hacker attacks.
2. Passwords: Passwords shall not be shared with others. This involves not
sharing with friends, family or colleagues, system administrators at work.
The password set for a device (May it be a desktop computer, laptop, tablet,
mobile or notebook) shall be kept secured, preventing it from getting in to
wrong hands.
4. Safe sites: The hackers target system by duping computer users through
fake websites or luring users to install malicious codes hidden in any form of
utility or entertainment file.It is very important that users shall visit only safe
websites. The sites with padlock icon at the start of URL are safe sites and
shall be used to browse the internet or download software from it.
5. Interact with official websites only: There is a high probability that the
website visited by internet user may not be a genuine website. If not being
careful about it, the user may end up entering his/her personal details, User
ID-password or online bank details which will go in hands of a cyber criminal,
leading to huge losses to the victim. It is important to identify the fake
websites or websites with malicious codes embedded in them
Punishment :
Under the Information and Technology Act,
According to Section 66, the punishment is imprisonment up to 3 years, or a
fine which may extend up to 2 lakh rupees, or both. According to Section 43,
liability is to pay damages by way of compensation to the person affected by
the stealing of the data. Section 668 entails punishment for receiving stolen
computer resources or information. The punishment includes imprisonment
for one year or a fine of rupees one lakh or both. The maximum punishment
for theft under Section 378 of the IPC is imprisonment of up to 3 (three)
years or a fine or both.
(7) E-CONTRACT
Section 2(h), of the Indian Contract Act, 1872, tells us that the term
'contract' is an agreement that is enforceable under the law. Interestingly, in
the case of an E-Contract, the essence of Section 2(h) is still sustained by
only tweaking the mode in which the Contract comes into existence.
Section 10 of the Indian Contract Act, 1872 provides the crucial pre-
requisites for a Contract to be legally valid. It is mandatory that a Contract
satisfies the essentials specified in Section 10 of the Contracts Act, i.e.,
1. Offer
2. Acceptance to Offer
3. Consensus ad Idem
4. Lawful Consideration
Shrink Wrap agreements are the End User License Agreements (EULA) or
Terms and Conditions, which are packaged with the products. The technique
of enclosing the product in a plastic wrap is called Shrink Wrap which
declares that the customer purchasing it is bound by the EULA.
The user clicks "I Agree to be bound by the legal obligations, Some
prominent examples of Click Wrap agreements are Amazon, Flipkart, and
Make My Tnp.
Scroll Wrap Agreements : The Scroll Wrap Agreements require the user to
scroll down the License Agreements, implying that it has been read by the
user by scrolling down through the terms and conditions before they can
give their assent or rejection.
Stamping of e- contract
The Indian Stamp Act, 1899, imposes stamp duty on all documents with
rights or liabilities, excluding certain types like bills of exchange, letters of
credit, cheques, promissory notes, bills of lading, insurance policies, and
transfers of share. The term 'document' also includes electronic records as
defined in the Information Technology Act, 2000. In India, electronic
documents are stamped through print-on-stamping, franking, or E-Stamping,
which requires a stamp duty certificate.