Cyber Laws: Amity Business School
Cyber Laws: Amity Business School
CYBER LAWS
1
Amity Business School
• Cyber Space
• Fundamentals of Cyber Space
• Understanding Cyber Space
• Interface of Technology and Laws Defining Cyber Law
• Jurisdictional Issues in Cyber Space
• Jurisdiction in Cyber Space
• Concept of Jurisdiction
• Internet Jurisdiction
• Indian Context of Jurisdiction
• E-commerce- Legal issues
• Legal Issues in Cyber Contracts
• Cyber Contract and IT Act 2000
• I.P.R. & Cyber Space
Amity Business School
3
Amity Business School
4
Amity Business School
Cyber Crime is not defined in Information Technology Act 2000 nor in the I.T.
Amendment Act 2008 nor in any other legislation in India.
Offence or crime has been dealt with elaborately listing various acts and the
punishments for each, under the Indian Penal Code, 1860 and quite a few other
legislations too.
Any offence or crime in which a computer is used is a cyber crime’ is cyber crime.
Interestingly even a petty offence like stealing or pick-pocket can be brought within
the broader purview of cyber crime if the basic data or aid to such an offence is a
computer or an information stored in a computer used (or misused) by the fraudster.
The I.T. Act defines a computer, computer network, data, information and all other
necessary ingredients that form part of a cyber crime
5
Amity Business School
6
Amity Business School
7
Amity Business School
Mid 90’s saw an impetus in globalization and computerization, with more and
more nations computerizing their governance, and e-commerce seeing an
enormous growth. Until then, most of international trade and transactions were
done through documents being transmitted through post and by telex only.
Evidences and records, until then, were predominantly paper evidences and
paper records or other forms of hard-copies only. With much of international trade
being done through electronic communication and with email gaining momentum,
an urgent and imminent need was felt for recognizing electronic records ie the
data what is stored in a computer or an external storage attached thereto.
Further to amend the Indian Penal Code, the Indian Evidence Act, 1872,
the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India
Act, 1934 and for matters connected therewith or incidental thereto
9
Amity Business School
Objectives of I.T. legislation in India:
The Information Technology Act, 2000, was passed as the Act No.21 of 2000,
got President assent on 9 June and was made effective from 17 October
2000.
10
Amity Business School
The first legislation in the nation on technology, computers and ecommerce and
e-communication,
The Act was the subject of extensive debates, elaborate reviews and detailed
criticisms, with one arm of the industry criticizing some sections of the Act to be
draconian and other stating it is too diluted and lenient.
There were some conspicuous omissions too resulting in the investigators relying
more and more on the time-tested (one and half century-old) Indian Penal Code
even in technology based cases with the I.T. Act also being referred in the
process and the reliance more on IPC rather on the ITA.
11
Amity Business School
The need for an amendment – a detailed one – was felt for the I.T. Act almost from
the year 2003 & 04 itself.
Major industry bodies were consulted and advisory groups were formed to go into
the perceived lacunae in the I.T. Act and comparing it with similar legislations in
other nations and to suggest recommendations.
12
Amity Business School
This Amendment Act got the President assent on 5 Feb 2009 and was made
effective from 27 October 2009.
13
Amity Business School
The Act totally has 13 chapters and 90 sections (the last four sections namely
sections 91 to 94 in the ITA 2000 dealt with the amendments to the four Acts
namely the Indian Penal Code 1860,
The Indian Evidence Act 1872, The Bankers’ Books Evidence Act 1891 and
the Reserve Bank of India Act 1934).
The Act begins with preliminary and definitions and from thereon the chapters
that follow deal with authentication of electronic records, digital signatures,
electronic signatures etc.
Definitions:
The ITA-2000 defines many important words used in common computer parlance like
‘access’, ‘computer resource’, ‘computer system’, ‘communication device’, ‘data’,
‘information’, ’security procedure’ etc. The definition of the word ‘computer’ itself
assumes significance here.
‘Computer system’ which means a device or a collection of devices with input, output
and storage capabilities. Interestingly, the word ‘computer’ and ‘computer system’
have been so widely defined to mean any electronic device with data processing
capability, performing computer functions like logical, arithmetic and memory functions
with input, storage and output capabilities. A careful reading of the words will make
one understand that a high-end programmable gadgets like even a washing machine
or switches and routers used in a network can all be brought under 15
the definition
Amity Business School
Similarly the word ‘Communication devices’ inserted in the ITAA-2008 has been
given an inclusive definition.
Taking into its coverage cell phones, personal digital assistance or such other
devices used to transmit any text, video etc like what was later being marketed
as iPad or other similar devices on Wi-fi and cellular models.
Definitions for some words like ‘cyber café’ were also later incorporated in the
ITAA 2008 when ‘Indian Computer response Emergency Team’ was included.
16
Amity Business School
Section 3 discussed the use of asymmetric crypto system and the use of Public
Key Infrastructure and hash function etc.
This was later criticized to be technology dependent ie., relying on the specific
technology of asymmetric crypto system and the hash function generating a
pair of public and private key authentication etc.
17
Amity Business School
Section 3 which was originally “Digital Signature” was later renamed as “Digital
Signature and Electronic Signature” in ITAA - 2008 thus introducing technological
neutrality by adoption of electronic signatures as a legally valid mode of executing
signatures.
This includes digital signatures as one of the modes of signatures and is far broader
in ambit covering biometrics and other new forms of creating electronic signatures
not confining the recognition to digital signature process alone.
While M/s. TCS, M/s. Safescript and M/s. MTNL are some of the digital signature
certifying authorities in in India, IDRBT (Institute for Development of Research in
Banking Technology – the research wing of RBI) is the Certifying Authorities (CA) for
the Indian Banking and financial sector licensed by the Controller of Certifying
Authorities, Government of India.
18
Amity Business School
19
Amity Business School
This section is the first major and significant legislative step in India to
combat the issue of data theft. The IT industry has for long been
clamouring for a legislation in India to address the crime of data theft,
just like physical theft or larceny of goods and commodities.
This Section addresses the civil offence of theft of data. If any person
without permission of the owner or any other person who is in charge
of a computer, accesses or downloads, copies or extracts any data or
introduces any computer contaminant like virus or damages or disrupts
any computer or denies access to a computer to an authorised user or
tampers etc…he shall be liable to pay damages to the person so
affected.
Earlier in the ITA -2000 the maximum damages under this head was
Rs.1 crore, which (the ceiling) was since removed in the ITAA 2008.
20
Amity Business School
The essence of this Section is civil liability. Criminality in the offence of data
theft is being separately dealt with later under Sections 65 and 66.
Writing a virus program or spreading a virus mail, a bot, a Trojan or any other
malware in a computer network or causing a Denial of Service Attack in a
server will all come under this Section and attract civil liability by way of
compensation. Under this Section, words like Computer Virus, Computer
Contaminant, Computer database and Source Code are all described and
defined.
https://www.mondaq.com/india/it-and-internet/572042/the-bazeecom-saga-
unravelled-supreme-court-clarifies-intermediary-liabilities-for-hosting-obscene-
content 21
Amity Business School
Section 43-
A dealing with compensation for failure to protect data was introduced in the ITAA
-2008.
22
Amity Business School
Reasonable Security Practices
• Site certification
• Security initiatives Awareness Training
• Conformance to Standards,
25
Amity Business School
28
Amity Business School
29
Amity Business School
30
Amity Business School
31
Amity Business School
https://www.imperva.com/learn/wp-
content/uploads/sites/13/2019/01/iso-
27001-compliance-steps.png.webp
32
Amity Business School
33
Amity Business School
34