Академический Документы
Профессиональный Документы
Культура Документы
0:
A SHIFTING PARADIGM
Intermediary Liability 2.0: A Shifting Paradigm
SFLC.in
K-9, 2nd Floor, Birbal Road
Jangpura Extension
New Delhi – 110014
India
Email: mail@sflc.in
Website: https://www.sflc.in
Twitter: @SFLCin
Table of Contents
List of cases...............................................................................................................................................iii
List of abbreviations..............................................................................................................................iv
Acknowledgments....................................................................................................................................v
1. Introduction..............................................................................................................................................01
2. What is Intermediary Liability?................................................................................................................05
2.1 Defining an Intermediary.....................................................................................................................05
2.2 User-Generated Content and Liability..................................................................................................06
3. The Intermediary Liability Regime in India..................................................................................................09
3.1 Enlarging the Scope of Safe-Harbour Protection..................................................................................09
3.2 ‘Due Diligence’ Guidelines for Attaining Safe-Harbour.........................................................................11
3.3 Narrowing the Scope of ‘Actual Knowledge’.........................................................................................12
3.4 Proposed Amendment to Intermediaries Guidelines............................................................................13
3.5 Intermediary Liability and IP Disputes in India....................................................................................16
3.5.1 The IP Effect - Distinguishing Actual Knowledge from Shreya Singhal.............................................17
3.6 Indian Courts on Intermediary Liability................................................................................................20
3.6.1 Avnish Bajaj v. State..........................................................................................................................20
3.6.2 Google v. Visakha Industries.............................................................................................................20
3.6.3 Shreya Singhal v. Union of India.......................................................................................................20
3.6.4 MySpace v. Super Cassettes Industries...................................................................................................21
3.6.5 Kent R O Ltd. v. Amit Kotak..............................................................................................................21
3.6.6 The Registrar (Judicial), Madurai bench of Madras..........................................................................21
High Court v. The Secretary to Government, Union Ministry
of Communications, Government of India, New Delhi and Ors.
3.6.7 Christian Louboutin v. Nakul Bajaj.....................................................................................................22
4. Expanding Content Obligations on Intermediaries..................................................................................25
4.1 Proactive Monitoring of Content..........................................................................................................25
4.1.1 Sabu Mathew George v. Union of India..................;..........................................................................25
i
4.1.2 Kamlesh Vaswani v. Union of India..................................................................................................26
4.1.3 In Re: Prajwala................................................................................................................................27
4.2 Right to be Forgotten..........................................................................................................................27
4.2.1 Laksh Vir Singh Yadav v. Union of India...........................................................................................28
4.2.2 [Unknown]X v. Union of India.........................................................................................................28
4.2.3 Sri Vasunathan v. The Registrar........................................................................................................29
4.2.4 Dharmaraj Bhanushankar Dave v. State of Gujarat..........................................................................29
4.3 Intermediary Perspectives...................................................................................................................29
5. The Manila Principles – A Comparative Analysis.........................................................................................36
6. Intermediary Liability in Other Jurisdictions..............................................................................................38
6.1 United States of America.....................................................................................................................39
6.1.1 Case Studies.....................................................................................................................................39
6.1.1.1 Dart v. Craigslist............................................................................................................................39
6.1.1.2 Viacom International, Inc v. YouTube, Inc.....................................................................................40
6.1.1.3 Matthew Herrick v. Grindr LLC.....................................................................................................40
6.2 European Union..................................................................................................................................41
6.2.1 E-Commerce Directive.....................................................................................................................41
6.2.2 Directive on Copyright in the Digital Single Market..........................................................................42
6.2.3 Terrorist Content Regulation............................................................................................................43
6.3 Case Studies........................................................................................................................................43
6.3.1 Delfi v. Estonia.................................................................................................................................43
6.3.2 MTE v. Hungary................................................................................................................................44
6.4 Right to be Forgotten in the EU..........................................................................................................45
6.5 EU cases on Right to be Forgotten......................................................................................................46
6.5.1 Google v. Spain................................................................................................................................46
6.5.2 Google v. Equustek...........................................................................................................................48
6.5.3 Commission nationale de l’informatique et des................................................................................48
libertés, v. Google
7. Fake News and Social Media: Who is Responsible?.......................................................................................50
7.1 Multi-stakeholder Perspectives on Combating Fake News.....................................................................54
8. Observations and Conclusion...................................................................................................................57
Annexures................................................................................................................................ .................59
ii
LIST OF CASES
4Christian Louboutin SAS v. Nakul Bajaj and Ors, (Civil Suit No. 344/2018)
4Sabu Mathew George v. Union of India, [W.P. (C) No. 341/2008]
4Kamlesh Vaswani v. Union of India, [W.P.(C) No. 177/2013]
4In Re: Prajwala, [SMW (Crl) No. 3/2015]
4Laksh Vir Singh Yadav v. Union of India, [W.P. (C) 1021/2016]
4[Unknown] Vs. Union of India, [W.P (C) No. 8477/2016]
4Sri Vasunathan v. The Registrar, [2017 SCC Kar 424]
4Dharmaraj Bhanushankar Dev v. State of Gujarat, [2015 SCC Guj 2019]
4Dart v. Craigslist, [665 F. Supp. 2D 961]
4Viacom International v. YouTube, [No. 07 Civ. 2103 2010 WL 2532404 (S.D.N.Y 2010)]
4Matthew Herrick v.Grindr, [LLC, 17-CV-932 (VEC)]
4Delfi v. Estonia [No. 64569/09]
4Magyar Tartalomszolgáltatók Egyesülete (“MTE”) and Index.hu Zrt (“Index”) v. Hungary,
[Application no. 22947/13]
iii
LIST OF ABBREVIATIONS
Anr. Another
v. Versus
CrPC Code of Criminal Procedure
Draft Rules
Draft Information Technology [Intermediaries
Guidelines (Amendment) Rules], 2018
EU European Union
Govt. Government
HC High Court
ICCPR International Covenant on Civil and Political Rights
ICT Information and Communication Technologies
IP Internet Protocol
IPC Indian Penal Code
IT Information Technology
LEA Law Enforcement Agency
NGO Non-Governmental Organization
OECD Organization for Economic and Cultural Development
OHCHR Office of the High Commissioner of Human Rights
Ors. Others
SC Supreme Court
SFLC.in Software Freedom Law Centre, India
MeitY Ministry of Electronics and Information Technology
UDHR Universal Declaration of Human Rights
UK United Kingdom
UN United Nations
UNESCO United Nations Educational Social and Cultural Organization
USA United States of America
COAI Cellular Operators Association of India
CCAOI Cyber Cafe Association of India
FICCI Federation of Indian Chambers of Commerce and Industry
ASSOCHAM Associated Chambers of Commerce and Industry
NASSCOM National Association of Software and Services Companies
AMCHAM American Chamber of Commerce in India
ISPAI Internet Service Providers Association of India
CII Confederation of Indian Industry
IAMAI Internet and Mobile Association of India
iv
ACKNOWLEDGEMENTS
We express sincere gratitude to our knowledge part-
ner Mishi Choudhary and Associates LLP without whose
support, this report would not have been made possible.
We also thank the intermediaries whose inputs provided
valuable direction for our research. In addition, we are
grateful to all who took time out of their busy schedules
to participate in our events on intermediary liability and
fake news.
v
CHAP TER I
INTRODUCTION
When Internet platforms were growing their and assistance to law enforcement agencies and
business in the United States, they were con- the rampant harassment and abuse of women
sidered bastions of free speech and were given and other vulnerable groups have highlighted
‘safe-harbour’ against third party content to pro- the failures of these tech companies in regulat-
mote innovation on the condition that they will ing their channels. Not only did companies fail
self regulate their platforms for illegal content.[1] to police their platforms, they developed busi-
Over time, these companies acquired millions of ness models that directly conflicted with any
users around the world and began centralizing such objective. Their business of advertisement
power by subsuming smaller businesses within sales came to be based on a continuous flow of
themselves.[2] For example, Facebook had ac- behaviour data acquired by monitoring users of
quired both WhatsApp and Instagram by 2014 to their platforms. The profitability of this business
consolidate its business into a social media and depends on maximizing the amount of time us-
private communications behemoth.[3] ers spend on a platform. So, the goal became al-
gorithmic recommendation of arresting content
As these platforms grew, it became increasingly that sticks eyeballs to the platform and causes
difficult for them to self-regulate the large vol- behaviour that can be used to profile readers
ume of content flowing through their pipelines. for advertisers. Thus the real objective of the
The misuse of data available on platforms, cou- system is almost directly in opposition to the
pled with the growing menace of disinformation perceived social good the platforms are sup-
and misinformation online, increasing calls for posed to further.
imposition of greater liability on intermediaries
for third party copyright infringement, access By monitoring users’ reading and behaviour,
(1) Section 230 of the Communications Decency Act, ELECTRONIC FRONTIER FOUNDATION, (Mar. 08, 2019, 10:04
AM), https://www.eff.org/issues/cda230
(2) Google has been steadily consolidating its Internet business by making strategic acquisitions - Matt Reynolds, If you
can’t build it, buy it: Google’s biggest acquisitions mapped, WIRED, (Mar. 08, 2019, 10:0 AM), https://www.wired.
co.uk/article/google-acquisitions-data-visualisation-infoporn-waze-youtube-android
(3) Joe Nocera, Why WhatsApp Is No Threat to Facebook’s Dominance, BLOOMBERG OPINION, (Mar. 06, 2019, 11:04
AM), https://www.bloomberg.com/opinion/articles/2018-05-04/whatsapp-and-instagram-are-no-threat-to-facebook-s-
dominance
01
the platform companies ceased to be the neu- gious cases. In India, per certain estimates, 33
tral conduit for “user-generated content” that people were killed in 69 incidents of mob vio-
justified their safe-harbour immunity in the first lence between January 2017 and July 2018,
place. Collecting and analyzing all their users’ their “lynchings” being linked to messages or
behaviour, and aggregating what they captured “fake news” being spread on WhatsApp, the
themselves with all the other personally-related Facebook-owned messaging platform.[4]
information they could buy, the platforms ceased
to perform the task of democratizing expression: In 2018, Facebook was used to spread anti-Ro-
that became a by-product of their real effort, hingya propaganda for inciting murders, rapes
which was –– in the phrase originally adopted and the largest forced human migration in recent
by the US national security agencies –– Total In- history.[5] Most of the 18 million Internet users in
formation Awareness. Myanmar consider Facebook to be the Internet.
It was reported that members of the Myanmar
The platforms that were granted safe harbour military were the prime operatives behind the
protections were expected to police their plat- systematic campaign, exploiting the wide reach
forms but have failed miserably to do so. Victims of Facebook.[6] The social media platform was
of online abuse, harassment have no leverage to accused of doing little to prevent the harmful
insist that platforms respond to their complaints. content from proliferating on its platform. Even
Companies have failed to establish mechanisms though, Facebook eventually deactivated the
to address complaints swiftly and continue to accounts of the military personnel, millions of
play the game of “Lexi Loci Server” claiming sham accounts went undetected.[7]
they only have a “sales offices” in India. On the
other hand, governments more often than not In the United States, the role of platforms like
have used this failure, ambiguity and secrecy Facebook and Twitter in the 2016 presidential
to enact overtly broad legislation that facilitate election has given way to society wide skepti-
censorship by proxy and stifle innovation. cism about tech companies and invited a kind of
backlash that was unimaginable a few years ago.
Countries around the world have called for [8] Senators Mark Warner (D-VA) and Amy Klo-
greater regulation of their activities. In 2017 buchar (D-MN) introduced the Honest Ads Act
Germany enacted a law for the takedown of il- following the use of Facebook advertisements by
legal content. As of the date of publication of Russian provocateurs, that would require plat-
this report in 2019, an anti-encryption law has forms to make “reasonable efforts” to bar foreign
emerged in Australia, the proposed EU copy- nationals from purchasing certain categories of
right directive requires proactive content filter- political advertisements during campaign.[9]
ing, and the draft EU terrorist content regulation
requires takedowns within an hour of content During the media blitzkrieg following the Cam-
being flagged. bridge Analytica scandal and before his US Con-
gressional hearing, Mr. Zuckerberg in an inter-
Internet platforms have systematically failed to view to CNN said, “I actually am not sure we
protect user rights in certain, particularly egre- shouldn’t be regulated. I think, in general, tech-
(4) IndiaSpend, Child-lifting rumours caused 69 mob attacks, 33 deaths in last 18 months, BUSINESS STANDARD,
(Mar. 06, 2019, 12:30 PM), https://www.business-standard.com/article/current-affairs/69-mob-attacks-on-child-lifting-
rumours-since-jan-17-only-one-before-that-118070900081_1.html
(5) Paul Mozur, A Genocide Incited on Facebook, With Posts From Myanmar’s Military, NEW YORK TIMES, (Nov. 06, 2018,
12:30 PM), https://www.nytimes.com/2018/10/15/technology/myanmar-facebook-genocide.html
(6) Id.
(7) Id.
(8) Russia ‘meddled in all big social media’ around US election, BRITISH BROADCASTING CORPORATION-BBC, (Jan. 09,
2019, 12:50 PM), https://www.bbc.com/news/technology-46590890
(9) Heather Timmons and Hanna Kozlowska, Facebook’s quiet battle to kill the first transparency law for online political
ads, QUARTZ, (Sep. 06, 2018, 1:30 PM), https://qz.com/1235363/mark-zuckerberg-and-facebooks-battle-to-kill-the-
honest-ads-act/
02
nology is an increasingly important trend in the traceability of the originator of the information,
world. I think the question is more what is the deploying automated tools for proactive moni-
right regulation rather than ‘yes or no’ should we toring of content and incorporation under the
be regulated?”[10] Companies Act. The reason for this, as provid-
ed by MeitY was “Misuse of Social Media and
Intermediary liability – the focus of this report – spreading Fake News”.
illustrates how lawmakers were forced by the In-
ternet to conceptualize and implement new ap- In India, the regulation of intermediaries are
proaches to an old legal construct i.e. vicarious spread out across various laws and sub-legisla-
liability. Intermediaries like blogging platforms, tions. Apart from the IT Act, India’s copyright
discussion boards and social media sites that of- law institutes a notice-and-takedown regime for
fer platforms for users to publish self-generated intermediaries. Sector specific regulation such as
content, search engines that index and provide data localisation requirements as per the rules of
access to user-generated content, online shop- the Reserve Bank of India for fintech players and
ping sites that allow users to trade in products/ license requirements for telecom and Internet
services and so on raised the question: who is to service providers also apply. In addition to this,
be held liable in the event that some products, the courts have interpreted law with substantial
services, or content hosted by these intermediar- variance, making the intermediary liability land-
ies were found to be unlawful? scape of India complicated enough to cause con-
fusion to tech companies.
The answer to this question has been different in
different jurisdictions. Due to the lapse in judgment of intermediary
While some jurisdictions like Thailand and China platforms in various situations as highlighted
hold intermediaries strictly liable for user-gener- above, sovereign states around the world are de-
ated content, others like the European Union and manding more accountability from them for user
the United States grant them conditional immu- generated content on their portals. Nation states
nity from liability, where compliance with cer- while imposing regulations on Internet compa-
tain conditions specified under relevant laws im- nies must be mindful that such rules should not
munizes intermediaries from the consequences be over-broad resulting in hampering basic dig-
of unlawful user-generated content. India’s own ital rights such as privacy and free speech in the
Information Technology Act, 2000 was amend- online word.
ed in 2008 to introduce such a safe-harbour re-
gime, and the Information Technology (Interme- SFLC.in had published a report in 2014 titled
diaries Guidelines Rules), 2011 specified certain “The Information Technology (Intermediaries
due-diligence criteria that intermediaries were Guidelines) Rules, 2011: An Analysis”. The re-
to observe in order to qualify for immunity. The port discussed the contemporary intermediary li-
initial version of this regime was plagued by sev- ability regime in India, highlighted its shortcom-
eral problems including ambiguity in prohibited ings and presented takeaways from stakeholder
content and forced adjudication by intermediar- consultations that were organized in four major
ies, but much of these problems were resolved cities, pointed out relevant existing research, and
by a historic judgment of the Supreme Court of proposed a set of principles that should guide an
India in 2015 in the matter of Shreya Singhal v. ideal intermediary liability regime. The present
Union of India. Subsequently, on December 24, report is intended as a follow-up to the earlier
2018, the Ministry of Electronics and Informa- report, necessitated in part by significant chang-
tion Technology issued Draft Rules proposing es introduced to India’s intermediary liability re-
to amend the 2011 Rules to include prescriptive gime through judicial pronouncements and the
obligations on the intermediary such as enabling proposed amendment to the 2011 Rules.
(10) Rob McLean and Danielle Wiener-Bronner, Mark Zuckerberg in his own words: The CNN interview, CNN MONEY,
(Sep. 06, 2018, 1;47 PM), https://money.cnn.com/2018/03/21/technology/mark-zuckerberg-cnn-interview-transcript/
index.html
03
This report will briefly go over the current state This report does not claim to offer simple solu-
of intermediary liability laws in the country, ex- tions for a complicated problem. It hopes to offer
amine some notable litigations that have served suggestions that contain a critical way of think-
to better define the contours of this legal frame- ing about the proposed legislative and regulato-
work, highlight ongoing litigations that may sig- ry reforms instead of adopting an ineffective mix
nificantly impact India’s intermediary liability of overtly broad yet ineffective regulations that
regime in the future, evaluate the present legal facilitate censorship by proxy without address-
framework for compliance with applicable inter- ing the notorious problem of “fake news” and
national standards, and provide glimpses into disinformation.
legal frameworks and case studies from other
jurisdictions including in areas such as right to Disinformation is a vast topic in itself, and this
be forgotten that are indirectly connected to in- report has looked at it mainly from the point of
termediary liability but bear significant implica- view of intermediary liability.
tions for it nonetheless.
04
CHAP TER II
(11) APC, Frequently asked questions on Internet Intermediary Liability, ASSOCIATION FOR PROGRESSIVE COMMUNI-
CATIONS, (Feb. 06, 2018, 2:50 PM) https://www.apc.org/en/pubs/apc%E2%80%99s-frequently-asked-questions-Inter-
net-intermed
(12) OECD, Definitions, 9, THE ECONOMIC AND SOCIAL ROLE OF INTERMEDIARIES 2010,https://www.oecd.org/
Internet/ieconomy/44949023.pdf
05
platforms. This definition was also cited by the [16]on behalf of another person or provides any
United Nations Educational, Scientific and Cul- service with respect to that record. [17] The Sec-
tural Organization (UNESCO) in a 2014 report tion then clarifies that the term includes telecom
on Internet freedoms.[13] service providers, network service providers,
Internet service providers, web hosting service
Some national jurisdictions on the other hand, providers, search engines, online payment sites,
have chosen to not attempt defining the term online auction sites, online marketplaces and cy-
“intermediary” as such in relevant laws. Instead, ber cafes. [18] This list is non-exhaustive and Sec-
broader alternate terms like “information society tion 2(1)(w) also covers entities such as social
services”[14] and “interactive computer services” media websites, blogging platforms, message
[15] are employed, and intermediary regulations boards, consumer review websites and so on. In
are incorporated into law without referencing other words, virtually any website that features
the term “intermediary”. user-generated content and a large number of
Internet service providers fall within the defini-
The above being said, this report examines inter- tion of an intermediary under Section 2(1)(w)
mediary liability primarily in the context of Indi- of the IT Act.
an law. As such, the best place to look to under-
stand the term “intermediary” for the purposes 2.2 User-generated content and liability
of this report is the IT Act – specifically Section “Intermediary liability”, to put it simply, refers
2(1)(w), which defines the term in some detail. to the extent of liability that an intermediary
stands to incur due to the non-permissibility
Section 2(1)(w) reads: under law of content they deal in. Seeing how
“Intermediary, with respect to any particular elec- intermediaries neither create nor modify con-
tronic records, means any person who on behalf tent, the predominant consensus has been that
of another person receives, stores or transmits it would be inequitable to hold them strictly ac-
that record or provides any service with respect to countable for unlawful user-generated content.
that record and includes telecom service providers, Users of intermediary services are the true con-
network service providers, Internet service provid- tent creators and as such, it has generally been
ers, web-hosting service providers, search engines, felt that they should be the ones made to answer
online payment sites, online-auction sites, on- for the illegality of content hosted or transmitted
line-market places and cyber cafes.” on intermediary platforms unless intermediaries
have meaningful degrees of editorial control.
According to Section 2(1)(w) of the IT Act However, some jurisdictions such as China and
therefore, an intermediary is any person who re- Thailand have opted to see things differently
ceives, stores or transmits an electronic record and maintained that it is the responsibility of
(13) R. MacKinnon, E. Hickok, A. Bar, H. Lim, Fostering Freedom Online – The Role of Internet Intermediaries, UNESCO Se-
ries on Internet Freedoms, 2014, (Sep. 26, 2017, 2:50 PM), http://unesdoc.unesco.org/images/0023/002311/231162e.
pdf
(14) Directive (EU) 2015/1535 of the European Parliament and of the Council, laying down a procedure for the provision
of information in the field of technical regulations and of rules on Information Society services, Available at: https://eur-
lex.europa.eu/legal-content/EN/TXT/?qid=1551937833098&uri=CELEX:32015L1535
(15) 47 USC S.230 (f)(2), The term “interactive computer service” means any information service, system, or access
software provider that provides or enables computer access by multiple users to a computer server, including specifically
a service or system that provides access to the Internet and such systems operated or services offered by libraries or ed-
ucational institutions.
(16) Information Technology Act 2000 Section 2(t), An “electronic record” is “data, record or data generated, image or
sound stored, received or sent in an electronic form or micro film or computer generated micro fiche”. Section 2(o) The term
“data” is defined as “a representation of information, knowledge, facts, concepts or instructions which are being prepared
or have been prepared in a formalized manner, and is intended to be processed, is being processed or has been processed in a
computer system or computer network, and may be in any form (including computer printouts, magnetic or optical storage
media, punched cards, punched tapes) or stored internally in the memory of the computer”.
(17) Information Technology Act 2000 Section 2(w)
(18) Id.
06
platform providers i.e. intermediaries to ensure ies. Intermediaries may further be encouraged
that the content they host or transmit remains to institute some form of technology-based or
within the confines of legal permissibility. self-regulatory content filters so as to prevent the
publication of unlawful content. The EU e-com-
Based on these divergent viewpoints, three merce Directive, US Digital Millennium Copyright
broad models of intermediary liability have Act and the Indian IT Act are legislations that em-
emerged globally, as pointed out by Article 19 in ploy this model of intermediary regulation.
their 2013 report titled “Internet Intermediaries:
Dilemma of Liability”.[19] These are: (3) The broad immunity model: Intermediaries are
given broad, at times conditional, immunity from lia-
(1) The strict liability model: Intermediaries bility arising out of user-generated content. Notably,
are held unconditionally liable for user-gener- intermediaries are also expressly excluded from any
ated content. Intermediaries are effectively re- obligation to monitor for unlawful content. This mod-
quired to monitor content in order to comply el treats intermediaries as messengers who merely
with the law; if they fail to do so, they face a transmit content on behalf of users, rather than pub-
variety of sanctions, including the withdrawal of lishers of content. Section 230 of the Communica-
their business license and/or criminal penalties. tions Decency Act is an example of this model.
Examples include Thailand and China.
Regardless of the model, almost all regulatory
(2) The safe-harbour model: Intermediaries regimes overseeing Internet intermediaries obli-
are given conditional immunity from liability gate intermediaries to remove unlawful content
arising out of user-generated content i.e. if they from their platforms upon being asked to do so
comply with certain requirements laid out under in accordance to applicable legal procedures.
law. This model can be further divided into: This, coupled with the fact that availability of
immunity from liability is contingent in some
(a) The vertical model: Liability is determined regulatory regimes on expeditious compliance
according to the type of content at issue. No with takedown requests, means that regulators
distinctions are made as to the type of service and intermediaries alike must be mindful of the
provided by intermediaries e.g. hosting vs. trans- impact of their actions on freedom of expression,
mitting. which is a fundamental human right recognized
under almost all major national and internation-
(b) The horizontal model: Liability is determined al jurisdictions. Regulators that impose ambigu-
according to the kind of function performed by ous content limitations or ask intermediaries to
the intermediary. Intermediaries acting only as remove content based on their own judgement
a transmitter of content may thus be exempted while running the risk of forfeiting safe-harbour
unconditionally from liability whereas those act- protection for non-removal of content, as well
ing as hosts may be held to more stringent stan- as intermediaries that over-comply with take-
dards. The latter may forfeit immunity if they do down requests will adversely impact freedom of
not expeditiously remove unlawful content on expression. Google’s transparency reports shows
being notified. that there has been a sharp increase in the num-
ber of content takedown requests received from
The safe-harbour model is also characterized by governments in recent times. While Google re-
the existence of “notice-and-takedown” process- ceived 1,031 such requests in the second-half
es, which are legally prescribed procedures that of 2009, this number climbed to 15,961 in the
clearly outline how content takedown requests second half of 2016, representing a fifteen-fold
must be received and processed by intermediar- increase.[20] The latest report reveals that 25,534
(19) Article 19, Internet Intermediaries: basic facts, 7 INTERNET INTERMEDIARIES: DILEMMA OF LIABILITY 2013,
https://www.article19.org/data/files/Intermediaries_ENGLISH.pdf
(20) Google,Government Requests to Remove Content, Google Transparency Report, GOOGLE (Feb. 26, 2019, 2:50 PM),
https://transparencyreport.google.com/government-removals/overview?hl=en
07
requests were received in the first half of 2018 by defamation with an increase from 3,440 to
itself.[21] According to this report, national securi- 4,257 requests in years 2016 to 2017.[23] Take-
ty is the most cited reason for takedown requests down requests on the basis of ‘Privacy and Se-
with 11,430 and 17,999 requests in the years curity’ have also increased from 2404 to 2497
2016 and 2017 respectively.[22] This is followed requests in the years 2016 to 2017.[24]
(21) Id.
(22) Id.
(23) Id.
(24) Id.
08
CHAPTER III
3.1 Enlarging the Scope of Safe-Harbour At the time the IT Act was enacted, the defini-
Protection tion of the term ‘intermediary’ was as follows:
On the issue of intermediary liability, the Su- (a) Intermediaries need to fulfill the conditions
preme Court read down Section 79 and held under Section 79 of the IT Act as discussed
that the ‘actual knowledge’ requirement for an above (conditional safe-harbour);
intermediary to take down content has to be
read to mean either an intimation in the form (b) Intermediaries are required to comply with
of a court order or on being notified by the gov- all requirements listed under the Intermediaries
ernment and such requests must be restricted Guidelines (due diligence rules); and
(55) Jon Russell, Hike unbundles its messaging app to reach India’s next wave of smartphone users, TECHCRUNCH (Dec
4, 2018, 10:08AM) https://techcrunch.com/2018/01/16/hike-unbundles-its-messaging-app/.
(56) Aria Thaker, Indian politicians are now flocking to an unlikely “no English” social network, QUARTZ (Nov.11, 2018,
3:00PM) https://qz.com/india/1414241/sorry-facebook-indias-bjp-and-congress-flock-to-sharechat/
(57) Such chilling effect has already been witnessed as a result of Section 66A
15
forms might takedown similar content relying the CrPC to issue orders for content takedowns.
on their community guidelines or terms and con- The courts in India have held intermediaries more ac-
ditions, which may lead to private censorship. countable for IP protected content flowing through their
channels, which has been discussed in the next section.
Then there is the reality of online platforms be-
ing utilised by bad actors to disseminate disinfor- 3.5 Intermediary Liability and IP Disputes in
mation, terrorist content, child pornography etc. India
pushing governments around the world to hold
intermediaries more accountable for third party The intermediary liability law in India is primarily
content on their platforms. In India, public lynch- governed by Section 79 of the IT Act as discussed
ings which have been attributed to rumour mon- above. As per that provision, online intermediar-
gering on intermediary platforms have resulted in ies enjoy a safe-harbour for third-party content on
the government wanting to bring in changes such their platforms, till they prescribe to certain due
as - automated content filtering and traceability, diligence rules set out under the Intermediaries
which will have negative effects on rights like free Guidelines. Provisions under the Copyright Act,
speech and privacy. Countries across the world are 1957 provide for some protection to certain in-
pressuring intermediaries to be more responsible termediaries as well[62]. Section 79 of the IT Act in
for the content flowing through their platforms. conjunction with the ruling of the Supreme Court
Though intermediary liability needs to be revisited of India in Shreya Singhal, which broadened the
in the current global context, any changes to law protection given to intermediaries and allowed
and regulation must ensure that it doesn’t abro- them to takedown content only on instructions by
gate basic human rights. courts or authorised government agencies, is the
authoritative law of the land on intermediary lia-
Content takedown requests are sometimes also bility. Though, it is important to point out that in
received by intermediaries in the form of orders terms of intellectual property rights (“IP rights”),
of law enforcement agencies under Section 91 of courts in India have placed a higher responsibility
the Code of Criminal Procedure,1973 (“CrPC”). on intermediaries to take down content content
[58] Section 91 empowers courts and authorised that infringes IP rights.
police officers to ‘summon’ produce ‘any docu-
ment or other thing’ which may be required for Liability under the IT Act
conducting investigation.[59] The IT Act, gives
enough powers to central and state govern- Beyond Section 79 of the IT Act, Section 81 is a
ments for intercepting, monitoring, decrypting non-obstante clause, providing for an overriding
and taking down content from their platforms. effect of the IT Act over all other laws in times of
[60] No part of Section 91 of the CrPC gives pow- conflict. But, this clause carves out an exception
ers to law enforcement agencies to have content for copyright and patent holders.[63]
taken-off online platforms, it only provides for
summoning of documents for aiding investiga- The Intermediaries Guidelines also require inter-
tion. Despite the specific applicability of the IT mediaries to notify their users for not uploading
Act in matters of online content,[61] law enforce- content that - “infringes any patent, trademark,
ment agencies fall back on general laws such as copyright or other proprietary rights”[64] and to not
(58) S.91 of CrPC - the Omnipotent provision? by SFLC.in, can be accessed here - https://sflc.in/s91-crpc-omnipo-
tent-provision
(59) Certain intermediaries stated that Section 91 of the CrPC is being used for taking down content.
(60) Section 69 and 69A of the IT Act, available in the annexure
(61) As discussed previously, Section 81 of the IT Act precludes the applicability of other laws in terms of conflicting provisions.
(62) Section 52(b) and (c) of the Copyright Act, 1957 in the annexure.
(63) Section 81 of the IT Act: Act to have overriding effect. – The provisions of this Act shall have effect notwithstanding
anything inconsistent therewith contained in any other law for the time being in force.
[Provided that nothing contained in this Act shall restrict any person from exercising any right conferred under the Copy-
right Act, 1957 (14 of 1957) or the Patents Act, 1970 (39 of 1970).]
(64) Rule 3(2)(d) and Rule 3(3) of the Intermediaries Guidelines in the annexure
16
host/ publish such content on their platforms. to Section 79, safe-harbour protection is available to
intermediaries in India if they, upon receiving ‘actu-
Limited and Conditional Protection under the al knowledge’, remove unlawful content from their
Copyright Act, 1957 (“the Copyright Act”) platforms. This ‘actual knowledge’ was interpreted to
mean intimation by appropriate government agency
Section 52(b) and (c) of the Copyright Act pro- or an order of a court by the Supreme Court in Shreya
vides protection to intermediaries for transient Singhal, but subsequently in matters concerning
or incidental storage of copyrighted works, if: the infringement of IP rights, courts have distin-
guished the ‘actual knowledge’ requirement as
(a) It is purely in the technical process of elec- enunciated in Shreya Singhal and replaced it
tronic transmission or communication of such with a ‘specific knowledge’ requirement i.e. if
content; intermediaries are given specific knowledge of
infringing works by IP owners, they are liable
(b) It is for the purpose of providing links or ac- to take it down to keep their safe-harbour pro-
cess/ integration to content, when not express- tection under the IT Act.
ly barred by the copyright owner and when the
intermediary does not have reasonable grounds In its landmark judgment in Myspace v. Super
for believing that such storage is of an infringing Cassettes Industries[66] the Delhi High Court while
copy (actual knowledge requirement). distinguishing copyright matters from those con-
tained under Article 19(2) of the Constitution of
Section 52(c) also provides for a notice and take- India[67] stated that -
down mechanism, wherein copyright owners “50. … In the case of copyright laws it is suffi-
could request intermediaries to remove protect- cient that MySpace receives specific knowledge
ed content from their platforms for a minimum of the infringing works in the format provided
period of 21 days (or for a longer period in case for in its website from the content owner with-
of a court order mandating such requirement). out the necessity of a court order.”
As per this provision, intermediaries on being
satisfied are required to remove content within Reiterating the actual knowledge requirement
36 hours of being intimated.[65] in cases of content protected by copyright, the
court stated that -
Thus, reading the IT Act and the Copyright Act “57. … If copyright owners, such as SCIL inform
in conjunction, in cases of content protected by MySpace specifically about infringing works and
copyright, intermediaries must prescribe to a despite such notice it does not takedown the con-
higher standard of care in ensuring that their tent, then alone is safe harbor denied. However,
platforms are not used to make infringing con- it is for SCIL to show that despite giving specific
tent available to the general public. It is also information the appellant did not comply with its
worthwhile to note that the Copyright Act does notice.”
not define what is ‘transient or incidental stor-
age’ and without such clarity, ambiguity remains Apart from distinguishing the actual knowl-
on which intermediaries are protected/ unpro- edge requirement in cases of copyright, the
tected under this clause. Myspace judgment is also important since it
clarified that unspecified material, including
3.5.1 The IP Effect - Distinguishing Actual takedowns of all future infringing content is
Knowledge from Shreya Singhal not what intermediaries are required to do un-
der law as this will lead to private censorship
As discussed at the starting of this section, according and will have a chilling effect on free speech.
(65) Section 52(c) of the Copyright Act and Rule 75 of the Copyright Rules, 2013 in the annexure
(66) Myspace v. Super Cassettes Industries Ltd., 236 (2017) DLT 478
(67) In Shreya Singhal, the Supreme Court restricted takedown requests to matters contained under Article 19(2) of the
Constitution of India
17
The court held that - More recently, the same court in Christian
Louboutin v. Nakul Bajaj,[69] a matter relating to
“62. … The remedy here is not to target interme- trademark infringement held an e-commerce
diaries but to ensure that infringing material is company not be an intermediary as per Section
removed in an orderly and reasonable manner. 79 of the IT Act [70] and held that for e-commerce
A further balancing act is required which is that portals to claim exemption under the safe-har-
of freedom of speech and privatized censorship. If bour provision, they need to ensure a passive
an intermediary is tasked with the responsibili- and not an active participation in the selling pro-
ty of identifying infringing content from non-in- cess. The court held that -
fringing one, it could have a chilling effect on free
speech; an unspecified or incomplete list may do “78. … When an e-commerce company claims ex-
that. … Such kind of unwarranted private censor- emption under Section 79 of the IT Act, it ought to
ship would go beyond the ethos of established free ensure that it does not have an active participation
speech regimes.” in the selling process. The presence of any elements
which shows active participation could deprive in-
In another matter before the Delhi High Court,[68] termediaries of the exemption.”
this time for the infringement of a design under
the Designs Act, 2000, the rights owner wanted With respect to IP rights, taking into consider-
the intermediary (eBay) not only to remove ex- ation the law and the above mentioned judicial
isting infringing products but to screen similar pronouncements, the following inferences can
listings in future and remove infringing products be made:
without the intimation of the owner. The court
rejecting such a claim held that intermediaries (a) Despite the ruling of the Supreme Court
cannot be expected to exercise such vigilance of India in Shreya Singhal, courts have distin-
over their platforms and are liable to only re- guished the ‘actual knowledge’ requirement
move infringing content which is specifically for matters of free speech[71] from claims of IP
asked for. The court held that - infringement. In cases of IP, courts have opera-
tionalised the notice and takedown mechanism,
“35. … Moreover the question, whether an IP wherein rights owners can request for infringing
right has been infringed or not is more often content to be taken off by intermediaries on inti-
than not a technical question with which the mating them of the infringement (the notice and
courts steeped in law also struggle and nothing takedown mechanism); and
in the IT Act and the IT Rules requires an in-
termediary, after having been once notified of (b) Such requests need to be specific and not
the IP Rights, not allow anyone else to host on broad, rights owners may not request intermedi-
its portal infringing goods/matter. The interme- aries to be vigilant about all future violations, as
diaries are not possessed of the prowess in this this will require constant monitoring/ screening,
respect. As aforesaid, it is a different matter, which is outside the role played by intermediar-
when attention of the intermediary is invited to ies (the specific knowledge requirement);
infringing product and complaint made with re-
spect thereto. Merely because intermediary has None of the cases discussed above, eventually
been obliged under the IT Rules to remove the lead to revocation of intermediary safe-harbour
infringing content on receipt of complaint can- to either place primary or contributory liabil-
not be read as vesting in the intermediary suo ity for infringement on the Internet platforms.
motu powers to detect and refuse hosting of in- In Christian Louboutin, though the Delhi High
fringing contents.” Court held that due to the active role played by
(72) Divij Joshi, SaReGaMa Pa-rdon Me, You Have the Wrong Address: On the Perils and Pitfalls of Notice and Takedown,
SPICY IP (Feb 13, 2019, 11:05PM) https://spicyip.com/2019/02/saregama-pa-rdon-me-you-have-the-wrong-address-
on-the-perils-and-pitfalls-of-notice-and-takedown.html
(73) Supra 68
(74) Draft National e-Commerce Policy, India’s Data for India’s Development, Department of Industrial Policy and Promo-
tion (Feb 25, 2019, 4:15PM) https://dipp.gov.in/whats-new/draft-national-e-commerce-policy-stakeholder-comments
19
the judges of deciding what is legitimate and Court of India. Another important aspect of this
what is not, which will have the unintend- case (the Delhi High Court judgment) was that
ed consequence of private censorship (this the court recognized the use of content filters for
is also held to be illegal by various courts); blocking pornographic content and stated that
thirdly, it is very difficult to ascertain the companies bear the risk of acquiring knowledge
authenticity and genuineness of content, if such content escapes the filters.[76]
whether protected by IP rights or not, as it
may depend on various factors which a ma- 3.6.2 Google v. Visakha Industries[77] (2009)
chine or even a human reviewer may find In 2009, Visakha Industries, a construction com-
it hard to determine. As iterated at various pany involved in the manufacturing of asbestos
points in this report, any suggestions/ rec- cement sheets, filed a criminal defamation case
ommendations for increasing the account- against Ban Asbestos Network India (BANI), its
ability of intermediaries must not abrogate coordinator and Google India. It alleged that the
free speech and privacy rights of netizens. coordinator of BANI had written blog posts on a
website owned by BANI, that contained scathing
3.6 Indian courts on intermediary liability criticism of the company and therefore harmed
Having gone over the applicable laws with its reputation in the market. Google India was
regard to intermediary liability in India, also arraigned as a party in the litigation because
this section of the report will examine some the blogpost was hosted on the blog publishing
of the notable cases around intermediary service of Google.
liability in India. Only cases from various
High Courts (at the state level) and the Su- Google India moved the High Court of Andhra
preme Court of India have been considered Pradesh for dismissal of the criminal charges
for this section, and the list is non-exhaus- against it on the grounds that it enjoyed safe-har-
tive. The cases discussed herein are rele- bour protection under Section 79 of the IT Act. It
vant to provide an overview of the juris- was contended that Google is not the publisher
prudence which has evolved in India on or endorser of the information, and only provides
issues surrounding intermediary liability a platform for dissemination of information. It,
therefore cannot be held liable. The High Court
3.6.1 Avnish Bajaj v. State[75] (2008) refused to accept Google’s contention and dis-
As discussed previously, this case was an inflec- missed the petition on the grounds that Google
tion point for the debate on intermediary liabil- failed to take appropriate action to remove the
ity in India. For a detailed discussion on Avnish defamatory material, in spite of receiving a take-
Bajaj and what the court held in it, please refer down notice from the company.
to the section 3.1.
Aggrieved by the judgment of the High court,
This case holds importance in the intermediary Google filed an appeal in the Supreme Court in
liability landscape in India as for the first time 2011, where the matter is currently pending.
the managing director of a company (in this
situation eBay) was charged with criminal pro- 3.6.3 Shreya Singhal v. Union of India[78]
visions both, under the penal law of India and (2015)
under the IT Act, for content circulated by a As discussed previously, the Shreya Singhal
third party on an e-commerce platform. In this judgment was a watershed moment for the the
matter, Avnish Bajaj escaped liability on techni- debate on intermediary liability in India (for a
cal grounds as the company Baazee.com was not detailed discussion of the Shreya Singhal judg-
arraigned as an accused in both matters - before ment, kindly refer to the section - The Interme-
the High Court and subsequently the Supreme diary Liability Regime in India.)
(75) Supra 30
(76) Post this judgment, the intermediary law of India was amended, as discussed in the section 3.1.
(77) Google v. Visakha Industries, [Criminal Petition No. 7207 of 2009]
(78) Supra 41
20
3.6.4 Myspace Inc. vs. Super Cassettes Indus- The single judge bench of Justice Rajiv Sahai
tries Ltd.[79] (2017) Endlaw held that compelling an intermediary to
This case is important from a copyright perspec- screen content would be “an unreasonable inter-
tive as the division bench of the Delhi High Court ference with the rights of the intermediary to carry
in this matter reversed a single judge decision on its business.”[82]
holding Myspace liable for copyright infringe-
ment. The division bench held that if intermedi- The court also asserted that requiring an inter-
aries are tasked with the responsibility of iden- mediary to screen any kind of content would
tifying illegal content, it could have a chilling change the role of an intermediary from a facili-
effect on free speech. For a detailed discussion tator to an adjudicator. Under Section 79 and the
on what the court held in Myspace, kindly refer IT Rules, 2011, an intermediary is only obliged
to the section 3.1. to remove content on receipt of a court order or
Government notification.
In this matter, the court also distinguished the
‘actual knowledge’ requirement from Shreya In Kent RO, the court reiterated the specific
Singhal to mean ‘specific knowledge’ in matters knowledge requirement as expounded in Mys-
of copyright infringement i.e. if intermediaries pace, stating that when the attention of the in-
are pointed to specific infringing material by termediary is brought to infringing products,
rights holders then they must remove such con- then they are liable to remove such listings from
tent, without the necessity of a court order. their websites.
3.6.5 Kent RO Ltd & Anr. Vs. Amit Kotak & 3.6.6 The Registrar (Judicial), Madurai bench
Ors[80] (2017) of Madras High Court v. The Secretary to Gov-
In January, 2017, a single judge bench of the ernment, Union Ministry of Communications,
Delhi High Court, refused to compel intermedi- Government of India, New Delhi and Ors.[83]
aries to screen content that infringes intellectual (2018)
property laws on an ex-ante basis.[81] This case arose from the unfortunate circum-
stance of the death of a 19-year old student, al-
The petitioner Kent RO Systems, a company that legedly after playing the online game “The Blue
manufactures water purifiers filed for permanent Whale Challenge”. This game required players
injunction against one Amit Kotak (respondent) to undertake 50 extreme tasks which eventual-
for infringing its intellectual property rights by ly lead to them committing suicide. The Madras
copying its designs and eBay India Pvt Ltd. for High Court took suo motu cognizance of the
aiding the infringement by allowing the respon- matter as there was public interest at play.
dent to sell its product on their website.
The court had asked the government to request
eBay India Private Limited sought the protec- online services like Google, Facebook, Microsoft,
tion of Section 79 of the IT Act, under which it Yahoo and Instagram to remove ‘links’ of the blue
is saved from any liability arising out of third whale game from their portals. To this, Google
party generated information, data or commu- replied by stating that its Indian subsidiary can-
nication link established by it, as long as its not remove content as their app store was run
function is confined to providing access to a by the parent company, which was governed by
communication system. US laws. Google clarified, that their team in the
(79) Myspace Inc. vs. Super Cassettes Industries Ltd. [236 (2017) DLT 478]
(80) 2017 (69) PTC 551 (Del)
(81) R. Bajaj, In a Welcome Development, Delhi High Court Refuses to Compel Intermediaries to Screen Content Viola-
tive of Intellectual Property Laws on an Ex-ante Basis, SpicyIP (June 20, 2018, 8:30PM) https://spicyip.com/2017/03/
in-a-welcome-development-delhi-high-court-refuses-to-compel-intermediaries-to-screen-content-violative-of-intellectu-
al-property-laws-on-an-ex-ante-basis.html , last accessed 20 June 2017.
(82) 2017 (69) PTC 551 (Del)
(83) 2018 (1) CTC 506
21
US was aware of the game and will continue to will remain to be seen how tech-companies
take action against providers who violate their and governments solve the problem of access
app store policies. to information by law enforcement, but any
new changes will have to be in consonance
The court, while highlighting Google’s response with free speech and privacy rights.[84]
and noting how difficult it is for law enforcement
to get access to crucial information, reprimand- 3.6.7 Christian Louboutin SAS v. Nakul Bajaj
ed online services stating that they cannot abdi- and Ors[85] (2018)
cate their duties and responsibilities under law - In November 2018, the Delhi High Court laid
down certain guiding principles in respect of li-
“The service providers cannot abdicate their re- ability of e-commerce platforms for trademark
sponsibilities. They cannot also plead that they infringement.
have no control over the content. A mere look at
the net neutrality debate that is presently going The plaintiff, Christian Louboutin, a company
on would show that the service providers are in that manufactures high end luxury shoes, was
a position to have control over the content that the owner of registered trademarks in India
passes through their information highway. If the and sold its products only through authorized
service providers can attempt to control the con- dealerships. The defendant, Darveys.com was
tent for commercial considerations, they can cer- an e-commerce platform that markets itself as
tainly be called upon to exercise their power of a “luxury brands marketplace.” The plaintiff al-
control in public interest also. Rather they must leged that the defendant sells counterfeit prod-
be mandated to do so.” ucts bearing the plaintiff’s name on its website.
Apart from offering for sale and selling the
The court thus directed the Central Government Plaintiff’s products, on the website of the defen-
to take appropriate steps to bring “Over The Top” dant, it also alleged that the defendant used the
services into a legal framework obliging them to names “Christian” and “Louboutin” as meta tags
comply with the laws of India and to provide the to attract traffic towards its website, and this re-
required information to the law enforcing agen- sulted in infringement of the trademark rights of
cies - “Methods must to be devised to ensure that the Plaintiff, and violation of personality rights
those OTTs which could not be brought within of Mr. Christian Louboutin, the founder of the
such framework are not accessible in India.” The brand.
court also requested the government to amend
laws and regulations so that Indian laws are The defendant argued that the goods sold were
applicable to these foreign services and law en- genuine, and that there was no infringement on its
forcement can get access to relevant information part because it was a mere intermediary, and enti-
at crucial points. tled to protection under Section 79 of the IT Act.
The High Court examined in detail what consti-
This case highlights an important pain point in tutes an ‘intermediary’ under Section 2(w) of the
the current intermediary liability debate, not IT Act, and whether online marketplaces as in-
just in India, but around the world i.e. access termediaries qualify for safe harbour protection
to information by law enforcement. The govern- under Section 79.
ment, while introducing changes like the Draft
Rules (in reference to the previous section), of- In determining the role of an online marketplace
ten point to this problem highlighting the fact and ambit of ‘service’ as has been used in the
that foreign entities take refuge behind source definition of ‘intermediaries’ under the IT Act,
country laws at the time of providing assis- the court laid down twenty six tasks that an in-
tance to Indian law enforcement agencies. It termediary may undertake, ranging from iden-
(84) The IT Act gives the government powers to request for information, intercept, decrypt and also takedown content
as per Section 69 and 69A (kindly refer to Chapter IV of this report).
(85) Christian Louboutin SAS v. Nakul Bajaj & Ors, Civil Suit No. 344/2018
22
tification of the seller, advertising products on such a manner, which would see the presence of
the platform, transporting the product to the a large number of elements enumerated above, it
purchaser, using trademarks through meta tags, could be said to cross the line from being an inter-
among other things. mediary to an active participant”, the judgment
stated.
The judgment also stated that it has to be seen
whether the platform is taking adequate mea- After considering all the above mentioned fac-
sures to ensure that no unlawful acts are commit- tors, the Court concluded that Darveys.com can-
ted by the sellers. Measures include the manner not be termed as an intermediary that is entitled
in which the terms of the agreements entered to protection under Section 79 of the IT Act.
into between the sellers and the platform are en-
forced, consequences of violation of the terms, This case is particularly important because it was
among others. the first time that the Court decided on the is-
sue of trademark infringement by online e-com-
The Court noted that the elements summarised merce platforms that have maintained that they
above would be key to determining whether an are immune from liability by virtue of Section 79
online marketplace or an e-commerce website of the IT Act. It is also pertinent to mention that
is ‘conspiring, abetting, aiding or inducing’ and the court despite ruling that Darveys.com was
is thereby contributing to the sale of counterfeit not an an intermediary, it did not hold it liable
products on its platform. “When an e-commerce for trademark infringement.
website is involved in or conducts its business in
23
24
CHAPTER IV
Although Section 79 of the IT Act provides In 2008, Sabu Mathew George, a gender ac-
safe-harbour protection to intermediaries tivist and doctor, filed a writ petition in the
from liability arising out of third-party con- Supreme Court of India to ban advertisements
tent, with the intermediaries’ primary obliga- related to pre-natal sex determination from
tion in this regard being that unlawful content search engines like Google, Bing and Yahoo.
be taken down on receipt of a court order or It was contended by the petitioner that the
Government directive, a number of petitions display of these results violated Section 22 of
have been filed before various Indian courts the Pre-Conception and Pre-Natal Diagnostic
seeking to expand the scope of intermediar- Techniques (Prohibition of Sex Selection) Act,
ies’ obligations with respect to user-generated 1994 (“PCPNDT Act”). In their reply, the re-
content. These petitions filed before various spondents argued that they are “conduits” and
High Courts and the Supreme Court have been not content providers and hence protected un-
observed to attempt and partially succeed at der Section 79 of the IT Act. It was also argued
broadening the scope of obligations in two that there are innumerable activities banned
major directions i.e. proactive monitoring of by law, but their information is still available
content, and Right to be Forgotten. online and offline. Disentitling anyone from
receiving information or gaining knowledge
4.1 Proactive Monitoring of Content on a subject is violative of Article 19(1)(a) of
Despite the Supreme Court’s judgment in the Constitution, which includes the right to
Shreya Singhal, in which the Court clarified know and right to receive or access informa-
that intermediaries are not responsible for tion.
judging the legitimacy of content on their plat-
forms, the last two years have seen litigation Over the course of proceedings, the court is-
that involved intermediaries to act as content sued interim orders directing Google, Micro-
monitors. A few notable cases are: soft and Yahoo to ‘auto-block’ pre-natal sex
determination ads from appearing in search
4.1.1 Sabu Mathew George v. Union of India[86] results. The court also drew a list of forty key
(92) Ioania Stupariu, Defining the Right to be Forgotten: A comparative Analysis between the EU and US, CENTRAL EURO-
PEAN UNIVERSITY, 2015
(93) Id.
(94) Id.
(95) Kindly refer to Section 27 of the Draft Personal Data Protection Bill, 2018, which can be accessed, here - https://meity.
gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018_0.pdf
(96) W.P. (C) 1021/2016
(97) W.P (C) No. 8477/2016
28
would end up in certain web links defaming tal and it was available via a simple Goo-
him and his children, causing them immense gle search. Aggrieved by the same, the peti-
humiliation.[98] The petitioner cited the Google tioner approached the High Court of Gujarat
Spain decision, wherein the Court of Justice seeking deletion of the judgment from the
of the EU had ruled that Google must create website as it was affecting his personal and
a system by which it can be asked to remove professional life.
personal data, on the request of an individual.
Though this matter has been disposed off as Rejecting the petitioner’s plea and dismissing
per the Kerala High Court’s website, the final the petition, the court held that the High Court
order of the court is not available. On the pe- is a court of record and Rule 151 of the Gujarat
titioner’s name, the case status mentions - ‘X - High Court Rules, 1993 provides that copies of
Name and Address of the Petitioners Deleted’.[99] documents in any civil or criminal proceeding
and copies of judgment of the High Court can
4.2.3 Sri Vasunathan v. The Registrar[100] (2017) be given, even to third parties with the order
The petitioner had filed a writ petition in the of the Assistant Registrar. According to the
High Court of Karnataka, seeking removal High Court, the petitioner had not been able
of his daughter’s name from an earlier order to point to any provision of law by which the
passed by the court with respect to a criminal Respondent could be restrained under Art 226
case involving her and the defendant. Accord- of the Constitution. The court refused to ac-
ing to the petitioner, a name search on search cept the argument put forth by the petitioner
engines like Google and Yahoo revealed that that publication of the judgment was violating
she was embroiled in the dispute, thus harm- his Right to Life and Personal Liberty under
ing her marital relationship and reputation in Article 21. The Court further stated that pub-
society. lishing on the website would not amount to
being reported, as the word “ reportable” only
The court granted the request and made the refers to it being reported in the law reporter.
following observation: “This would be in line Thus, it can be seen that even though current-
with the trend in western countries of the ly there isn’t a statutory right to be forgotten
‘right to be forgotten’ in sensitive cases involv- in India, courts have requested search engines
ing women in general and highly sensitive cas- to delist content from their platforms. It is im-
es involving rape or affecting the modesty and portant to point out that successful RTBF re-
reputation of the person concerned.” quests in India have only lead to delisting of
The Court also directed its registry to ascer- posts from search engines and not deletion of
tain that the petitioner’s daughter’s name is content from the source.
not reflected on the Internet, with regard to
the criminal matter, thus upholding her right 4.3 Intermediary perspectives
to be forgotten. As part of the research, a number of intermedi-
aries were approached to solicit their views on
4.2.4 Dharmraj Bhanushankar Dave v. State India’s intermediary liability framework and
of Gujarat[101] (2015) the expanding content obligations brought
The petitioner in this case was acquitted in a about by the recently proposed Draft Rules
previous criminal matter in the Gujarat High and judicial pronouncements. Said intermedi-
Court and the judgment was supposed to be aries included leading social media platforms,
non-reportable. However, indiankanoon.org search engines, and consumer review web-
published the judgment on their web por- sites, as well as start-ups and small businesses
(98) Marital discord has Google in dock, THE DECCAN CHRONICLE ( June 6, 2018, 5:05PM),
http://www.deccanchronicle.com/nation/current-affairs/040316/marital-discord-has-google-in-dock.html
(99) For the case status , kindly refer to - https://services.ecourts.gov.in/ecourtindiaHC/cases/case_no.php?state_cd=4&dist_
cd=1&court_code=1&stateNm=Kerala#
(100) 2017 SCC Kar 424
(101) 2015 SCC Guj 2019
29
offering specialized services online. increase the cost and compliance burden of
smaller intermediaries. It was also mentioned
Every intermediary that was spoken with held that the 24-hour requirement to remove con-
the view that the current legislative framework tent will be difficult to comply with due to
is adequate in principle. The IT Act explicitly technological challenges. Such a requirement
provides safe harbour protection under Sec- doesn’t leave scope for review of takedown or-
tion 79, exempting intermediaries from liabil- ders. Automated tools for takedowns further
ity for user generated content, so long as they aggravate these problems and takes away the
exercise no editorial control. The Intermedi- review process. This also affects fair use and
aries Guidelines Rules then lay down a set fair dealing activities under copyright law. A
of due diligence conditions that must be met review mechanism should be in place, which
before qualifying for immunity under Section gives scope to intermediaries for checking the
79. While the language of the Intermediaries veracity of takedown orders. Intermediaries
Guidelines created some confusion initially recommended that, a graded approach to take-
and resulted in intermediaries having to exer- down could be implemented. More sensitive
cise their personal judgment when responding content like – terrorist content or child por-
to takedown requests and over-complying to nography could be treated more expeditiously
err on the side of caution, the Supreme Court’s as compared to other requests.
decision in Shreya Singhal was said to be of
tremendous help in clarifying the state of law. On the usage of automated tools to proactively
By virtue of the judgment, intermediaries are monitor content, it was felt that asking inter-
no longer required to takedown content upon mediaries to proactively filter their networks
receiving requests from third-parties, which of impermissible content under threat of legal
led to a very significant drop in the number of consequences overlooks certain ground reali-
such requests received. ties. This was also said to be contrary to the
prevailing jurisprudence of various courts in
On the Draft Rules, the intermediaries were of the country.
the view that the rules should not be applied
uniformly to all categories of service provid- Firstly, an intermediary’s function is limited
ers, there should be a function based approach to providing a platform for its users to pub-
and regulation should tie to the different func- lish content or avail services. The intermediary
tions that intermediaries play on the Internet. by definition does not play a role in deciding
It was felt that Rule 3(2) of the Draft Rules what content is published or what services are
should be less vague and more specific and offered/availed on its platform. Safe harbour
should not contain large, all-encompassing protection is provided to intermediaries on the
terms, such as - grossly harmful, harassing, basis of this very premise – that it would be
blasphemous etc. This would entail intermedi- unjust to hold platform providers answerable
aries to act as adjudicators to takedown con- under law for content/services that they have
tent and lead to private censorship. no connection with.
It was opined that the traceability require- Secondly it is in the intermediary’s own busi-
ment under Rule 3(5) of the Draft Rules is not ness interest to keep their platforms free from
framed clearly and the terms “enable tracing” unlawful or otherwise harmful content, as us-
lacks clarity. Also, enforcing this requirement ers will naturally tend to avoid using inhospita-
would impact the trust that customers place ble platforms. However, considering the sheer
on any sort of digital transaction. volume of activity that takes place on interme-
diary platforms on a daily basis, exhaustive fil-
Intermediaries pointed out that mandatory in- tering of impermissible content is impossible
corporation under the Companies Act, 2013, even after dedicating vast resources to do this.
along with appointing a nodal officer will A large intermediary said that it has set up
30
dedicated facilities and devoted vast numbers costs. Awareness building amongst judges on
of personnel all over the world to review con- intermediary liability laws as well as broader
tent that potentially violates its terms of use. technology laws was therefore highlighted as
It has also begun to implement automated re- a priority.
view and takedown processes with the help of
algorithms and artificial intelligence in limited On the issue of ‘Right to be Forgotten’, the in-
contexts. Despite such measures, comprehen- termediaries reported that they had received
sive filtration of impermissible content remains RTBF requests and such requests were mostly
elusive due to the millions of data points that for reputational harm.
are generated on a daily basis. Assigning le-
gal penalties for failure to proactively remove In conversation with intermediaries, some of
impermissible content would be crippling for them stated that sometimes, they receive or-
its business, leading to a situation where it ders from law enforcement agencies to take-
would be forced to adopt overbroad measures down content from their platforms under Sec-
that will inevitably affect legitimate content as tion 91 of the CrPC. This provision, empowers
well as free speech rights. Significant variance law enforcement agencies to request for ‘any
amongst national laws with regard to permis- document or other thing’ which would assist
sibility of certain types of content was also them in conducting investigation. Though,
identified as a critical bottleneck for interme- there are relevant provisions under the IT Act
diaries with a global presence. It was felt that for production and removal of content (Sec-
emphasis when it comes to content regulation tion 69 and 69A of the IT Act), law enforce-
should be on self-regulatory or co-regulatory ment agencies continue to use provisions un-
models, where the intermediaries are allowed der other laws which may lack the procedural
the bandwidth to develop and use their own safeguards installed under the provisions of
internal processes to identify and remove im- the IT Act and its rules therein.
permissible content while operating under the
ambit of safe-harbour protection from legal li- The table below shows the different stances that
ability over user-generated content. various intermediaries and industry associations
have taken on changes introduced in the Draft
Though intermediaries agreed that in principle Rules. Due to their far reaching effects on the
Shreya Singhal provided a much needed clar- intermediary landscape in India, this analysis
ification in law, they also said that significant is restricted to issues such as - i) traceability of
problems remained with the implementation originator of information; ii) local incorporation
of the Shreya Singhal judgment, especially requirement; and iii) deployment of automated
in the lower judiciary. Several intermediaries tools for content filtering.[102]
were of the view that judges of lower courts
are woefully unaware of intermediary liability The organizations that support a particular
laws. For instance, many judges remain igno- provision of the Draft Rules, their respective
rant of the Supreme Court’s verdict in Shreya position has been marked by a. The organiza-
Singhal, exempting intermediaries from acting tions that oppose a particular provision in the
on takedown requests sent by third-parties, Guidelines, their stance is depicted by r.
prompting them to issue verdicts unfavour-
able to intermediaries. Though, such verdicts Several intermediaries, both domestic and
are usually set aside on appeal, they neverthe- foreign, were approached, but not all of them
less tie up intermediaries for weeks, months provided their response
and years in needless litigation incurring great
(102) This information has been compiled based on the public submissions of the entities mentioned herein, to the govern-
ment consultation held on the Draft Rules.
31
Analysis of submissions sent to the Ministry of IT by various intermediaries/
industry associations
01 Wipro
a
---- a [Provided that
there are
certain
measures to
reinstate
genuine
content]
02 Freedom Publishers r ---- ----
Union
06 The Information r r r
Technology Indus-
try Council
07 Computer and r r r
Communications
Industry Associa-
tion-US
32
08 Broadband India r r r
Forum
09 CCAOI r r r
10 ISPAI a a a
[Provided that [Provided that
the terms “lawful the Rule is only
order” and “Gov- applicable to
ernment Agency” platform based
are defined. Also, services]
it should be clari-
fied that the Rule
applies only to
platform based
services.)
12 IAMAI r r r
13 CII r r r
15 NASSCOM r r r
16 Mozilla r r r
17 India Tech a a a
18 COAI r a r
19 Xiaomi a a r
[Provided that the [Only specific
power to enable intermediaries,
tracing should as notified by
be derived out of the Government,
sections 69, 69A should be required
or 69B of the IT to incorporate un-
Act. Moreover, the der the Companies
intermediary shall Act, 2013]
on a best efforts
basis enable trac-
ing. In case it is
not able to do so,
it shall provide
reasons in
writing.]
33
20 Amcham India r ---- r
21 Jio a a a
22 Star India ---- ---- a
23 ShareChat r a r
24 Bombay Chamber a a r
of Commerce and
Industry [Provided that [Only applicable to
requests under this specifically notified
Rule should be intermediaries.]
made only if it is
required for inves-
tigation, detection,
prosecution or
prevention of an
offence. Further,
language should be
modified to refer to
information within
the intermediary’s
position. Further-
more, ‘government
agency’ should be
defined and
limited.]
25 IBM a ---- r
[Provided there
are enough safe-
guards]
26 FICCI r r ----
27 ASSOCHAM r r r
28 Large multination- r r r
al software compa-
ny (did not want
to be quoted)
29 Large multination- r r r
al technology com-
pany (did not want
to be quoted)
30 MouthShut.com r r r
34
On an analysis of the table, it can be stated of Commerce and Industry - agreed to all 3
that only a handful of organizations (6 out of proposed changes (traceability, incorporation
31) agreed to some form of a traceability re- and automated content filtering).
quirement. Barring Xiaomi and IBM (both of
which asked for more safeguards) all other Star India and the Indian Music Industry, that
organizations which agreed to the traceability specifically deal with copyrighted content,
requirement were Indian in origin. have supported the requirement for automat-
ed content takedowns. The reasons for espous-
A quarter of all organizations (8 out of 31) ing it, as given in their comments is to protect
were agreeable to the incorporation require- the intellectual property rights of artists and
ment, all of which were Indian organizations content creators and to curb online piracy.
except for Xiaomi.
From this data it can be gathered that In-
On automated content filtering, again, only dian businesses are leaning more towards
6 out of 31 organizations were in acceptance stricter government regulation on online
of the requirement - all of these were Indian intermediaries. Such regulation will grant
companies/ associations. Indian businesses greater control over
what flows through their pipelines, and at
Internet Service Providers Association of India, the same time weaken free speech and pri-
IndiaTech, Reliance Jio and Bombay Chamber vacy rights online.
35
CHAPTER V
The Manila Principles is a set of guidelines out- be clear, be unambiguous, and follow due
lining safeguards that must apply in all legal process.
frameworks on intermediary liability. The doc-
ument was launched at RightsCon, Southeast (4) Laws and content restriction orders and
Asia – a multi-stakeholder conference held in practices must comply with the tests of neces-
Manila, Philippines in 2015 – by a coalition sity and proportionality.
of Internet rights activists and civil society or-
ganizations. The main purpose of the Manila (5) Laws and content restriction policies and
Principles is to encourage the development practices must respect due process.
of interoperable and harmonized liability re-
gimes that can promote innovation while re- (6) Transparency and accountability 01 must be
specting users’ rights in line with the Universal built in to laws and content restriction policies
Declaration of Human Rights, the Internation- and practices.
al Covenant on Civil and Political Rights and
the United Nations Guiding Principles on Busi- By virtue of offering safe-harbour protection
ness and Human Rights.[103] to Internet intermediaries under Section 79 of
the IT Act, India can be said to comply with the
The six broad principles are as follows.[104] first of these principles (Intermediaries should
(1) Intermediaries should be shielded by law be shielded by law from liability for third-par-
from liability for third-party content. ty content). The immunity enjoyed by inter-
mediaries is of course conditional, and there
(2) Content must not be required to be restrict- is ambiguity in law that make compliance far
ed without an order by a judicial authority. from easy, yet immunity under law is never-
theless provided for.
(3) Requests for restrictions of content must
(103) Manila Principles on Intermediary Liability, MANILA PRINCIPLES (Feb 16, 2019, 7:09PM), https://www.manilap-
rinciples.org/
(104) Id
36
The second of the Manila principles (content thousands of websites and URLs at the same time,
must not be required to be restricted without a large number of which may not even contain in-
an order by a judicial authority) is more or less fringing material. As the lists of websites and URLs
respected under Indian intermediary liability to be blocked are so populous, it can be said with
laws, as intermediaries are required to take- certainty that no detailed examinations of alleged
down content only on receiving a court order infringements are undertaken before issuing take-
or Government directive asking them to do so. down orders, and even in cases where copyright
Though government directives are not or- infringement does exist, whole websites are fre-
ders by judicial authorities, it must be noted quently directed to be taken down even if specific
that Indian laws do not ask intermediaries to URLs within these websites will suffice.
exercise their own judgment in taking down
content. Intermediaries are no longer obli- The fifth Manila principle (laws and content
gated to remove content on receiving notic- restriction policies and practices must respect
es from any affected third-party. Rather, an due process) is not fully observed in India.
independent determination as to whether or With respect to legal provisions specifically re-
not particular content should be removed lated to intermediary liability i.e. Section 79 of
is taken by the judiciary or executive, then the IT Act and the Intermediaries Guidelines
conveyed to intermediaries (for takedowns Rules, deviations from due process include the
in situations of IP disputes, there still exists absence of opportunities for content creators
a notice-and-takedown regime, at the behest to defend their content, and the absence of
of the rightsholder). [105] means to restore content that has already been
removed. As for provisions that are unofficially
The third Manila principle (requests for re- used to direct content takedowns like Section
strictions of content must be clear, be unam- 91 of the CrPC, the question of due process
biguous, and follow due process) does not see does not even arise because such provisions
much compliance in the Indian legal frame- are not rightfully to be used for this purpose.
work. It can be argued that takedown orders
issued by the judiciary or executive or those The final Manila principle (transparency and
received under the Copyright Act are bound to accountability must be built in to laws and
be clear, unambiguous and in compliance with content restriction policies and practices) too
due process, in that the orders will always does not find compliance in India, especially
clearly direct takedowns, specify the particu- with regard to content taken down under
lar content to be removed and be authorized Section 69A of the IT Act. Rules framed under
by relevant law. However, intermediaries also Section 69A stipulate that strict confidenti-
receive what are effectively takedown orders ality must be maintained around complaints
through other channels, such as Section 91 of made, orders issued and action taken under
the CrPC, which does not have the requisite the provision, and reasons for takedowns
checks and balances in place against abuse. are never disclosed to the public. Websites
and URLs blocked under Section 69A simply
The fourth principle (laws and content restric- state that blocking order have been received
tion orders and practices must comply with from the Government. Moreover, requests
the tests of necessity and proportionality) is made under the Right to Information Act for
not fully observed in India, most notably in details on blocked content are consistently
cases of alleged copyright infringement. Indi- turned down by citing the confidentiality
an courts routinely issue website blocking or- clause built into the regulation.
ders to intermediaries like ISPs on the basis
of petitions alleging copyright infringement In review, India’s compliance with the Manila
against a large number of websites at once. principles, though improved over the past few
It is not uncommon for such orders to target years, is still wanting in many respects.
(105) Kindly refer to the ‘IP Effect - Distinguishing Actual Knowledge from Shreya Singhal’ section of the report.
37
CHAPTER VI
Different jurisdictions may establish differ- subscribers’ accounts are being used for such
ent enactments and procedures to restrict purposes by others. [107] It enables the com-
content that is considered unlawful. Differ- plainant and the content owner to resolve
ent regimes also follow different legal frame- the dispute among themselves without the
works to grant conditional immunity or safe involvement of the intermediary.
harbour to intermediaries. The notice and
notice model obliges intermediaries to direct The second model is the notice and takedown
any complaint of alleged infringement of model. It is followed by countries like South
copyright they get from the owner of copy- Korea [108] and the United States of America.
right to the user or subscriber in question. [109] According to this system, an intermediary
6.1 United States of America In 2018, a new legislation called Stop Enabling
The law relating to intermediary liability in Sex Traffickers Act was passed (SESTA) and Al-
the United States of America is mostly gov- low States and Victims to Fight Sex Trafficking
erned by Section 512(c) of the Digital Millen- Online Act (jointly known as FOSTA-SESTA),
nium Copyright Act (“DMCA”) and Section 230 which expands criminal liability for classifieds
of the Communications Decency Act (“CDA”). websites like Backpage.com which was alleged
Section 512 of the DMCA was enacted by the to host ads from sex traffickers in its adult ser-
US Congress with a view to limit the liabili- vices action. Backpage.com had claimed that
ty of intermediaries and to check online and it is an intermediary and is not responsible for
copyright infringement, including limitations content uploaded by users. Although, the new
on liability for compliant service providers to bill is well-intentioned, it dilutes the protec-
help foster the growth of Internet-based ser- tion provided by Section 230 of the Commu-
vices.[112] The intermediary must comply with nications Decency Act, which has been con-
the notice-and-takedown procedure under sidered the most valuable piece of legislation
Section 512 to qualify for protection. protecting freedom of speech and expression
online, by implicating intermediaries for user
The CDA was originally enacted to restrict generated content.
freedom of speech and expression but the re-
strictive sections were later struck down for 6.1.1 Case Studies
being unconstitutional. Section 230 is consid-
ered one of the most valuable tools for pro- 6.1.1.1 Dart v. Craigslist, Inc.[114]
tecting intermediaries from liability for third Craigslist is the largest online classified ad-
party generated content. It reads: “No provider vertisement service in the United States. Post-
or user of an interactive computer service shall ings on the site include advertisements for
be treated as the publisher or speaker of any in- jobs, housing, sale of various items and other
formation provided by another information con- services. The listings also included a section
Later, due to mounting pressure, Craigslist 6.1.1.3 Matthew Herrick v. Grindr LLC [120]
completely removed the “adult services” sec- Plaintiff Herrick alleged that his ex-boyfriend
tion from its website and the link to the sec- set up several fake profiles on Grindr (a dating
(115) Thomas Dart, Sheriff of Cook County V. Craigslist, Inc, 665 F. Supp. 2d 961
(116) [No. 07 Civ. 2103 2010 WL 2532404 (S.D.N.Y 2010)]
(117) Viacom v. YouTube, Electronic Frontier Foundation (Feb 20, 2019, 12:00PM) https://www.eff.
org/cases/viacom-v-youtube
(118) Miguel Helft, Judge Sides With Google in Viacom Suit Over Videos, NEW YORK TIMES (Feb 20,
2019, 12:05PM), http://www.nytimes.com/2010/06/24/technology/24google.html?_r=0
(119) Jonathan Stempel, Google, Viacom settle landmark YouTube lawsuit, REUTERS (Feb 20, 2019,
3:09PM), http://www.reuters.com/article/us-google-viacom-lawsuit-idUSBREA2H11220140318
(120) 17-CV-932 (VEC)
40
app for the LGBTQ community) that claimed to 6.2 European Union
be him and resulted in identity theft/ manipu-
lation. Over a thousand users responded to the 6.2.1 E-commerce Directive
impersonating profiles. Herrick’s ex boyfriend, Articles 12 to 15 of Directive 2000/31/EC of
pretending to be Herrick, would then direct 8 June 2000 on electronic commerce mandate
the men to Herrick’s’ workplace and home. the member states of the EU to establish de-
fenses, under both civil and criminal law for
The impersonating profiles were reported the benefit of certain types of online interme-
to Grindr (the app’s operator), but Herrick diary.[122] Directive 2001/29/EC on Copyright
claimed that Grindr did not respond, other in the Information Society (as to copyright)
than to send an automated message. Herrick and Directive 2004/48/EC on the Enforce-
sued Grindr, accusing the company of negli- ment of Intellectual Property Rights (other
gence, intentional infliction of emotional dis- than copyright) mandate EU member states to
tress, false advertising, and deceptive business give rights holders the right to seek an injunc-
practices for allowing him to be impersonated tion against those online intermediaries whose
and turned into an unwitting beacon for stalk- services are used by a third party to infringe
ers and harassers[121] liable to him because of an intellectual property right.
the defective design of the app and the failure
to police such conduct on the app. Articles 12 to 15 of Directive 2000/31/EC
is the primary piece of legislation governing
The Court rejected Herrick’s claim that Grindr is intermediary liability. It incorporates a no-
not an interactive computer service as defined tice-and-takedown system for intermediaries
in the CDA. With respect to Grindr’s products to abide to. Articles 12 to 14 categorises inter-
liability, negligent design and failure to warn mediaries into “mere conduits” , ‘caching’ ser-
claims, the court found that they were all predi- vices and ‘hosting’ services. Article 15 states
cated upon content provided by another user of that intermediaries have no general obligation
the app. Any assistance, including algorithmic to actively monitor the information which they
filtering, aggregation and display functions that transmit or store for illegal activity.
Grindr provided to his ex boyfriend was “neu-
tral assistance” that is available to good and bad The General Data Protection Regulation
actors on the app alike. (“GDPR”) which came into effect from 25th May
2018[123] is aligned with Directive 2000/31/EC.
The court also highlighted that choosing to Article 2(4) of the GDPR reads:
remove content or to let it stay on an app is
an editorial choice, and finding Grindr liable “This Regulation shall be without prejudice to
based on its choice to let the impersonating the application of Directive 2000/31/EC, in
profiles remain would be finding Grindr liable particular of the liability rules of intermediary
as if it were the publisher of that content. service providers in Articles 12 to 15 of that Di-
rective.”
An appeal has been filed against the court’s rul-
ing to the Second Circuit Court of Appeals, in Recital 21 of the GDPR [124] reads as follows:
this matter. “This Regulation is without prejudice to the
(121) Andy Greenberg, Spoofed Grindr Accounts Turned One Man’s Life Into a ‘Living Hell’ , WIRED (Feb 20, 2019.
5:40PM), https://www.wired.com/2017/01/grinder-lawsuit-spoofed-accounts/
(122) Trevor Cook, Online Intermediary Liability in the European Union, 17, JOURNAL OF INTELLECTUAL PROPERTY
RIGHTS, 157-159 (2012)
(123) The History of the General Data Protection Regulation, EUROPEAN DATA PROTECTION SUPERVISOR (Jan 20,
2019, 2:30PM) https://edps.europa.eu/data-protection/data-protection/legislation/history-general-data-protection-reg-
ulation_en
(124) A copy of the GDPR can be downloaded from here - https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CEL-
EX:32016R0679
41
application of Directive 2000/31/EC of the ticle excludes ‘uses of individual words or
European Parliament and of the Council, in very short extracts of a press publication’
particular of the liability rules of intermediary from its purview. [129]
service providers in Articles 12 to 15 of that
Directive. That Directive seeks to contribute to The more problematic provision of the
the proper functioning of the internal market proposed directive is, however, Article 13,
by ensuring the free movement of information which makes ‘online content sharing ser-
society services between Member States.” vice providers’ [130] liable for copyright in-
fringement for content uploaded by their
6.2.2 Directive on Copyright in the Digital users. The proposed copyright directive
Single Market COM/2016/0593 final - precludes the ‘safe-harbour’ protection af-
2016/0280 (COD) (EU Copyright Directive) forded to such online content sharing ser-
In September of 2016 the EU Commission vice providers, under the EU e-commerce
proposed a new directive to update its exist- directive, for user generated content which
ing copyright framework[125] after a number of is protected by copyright,. For protection
years of public consultation. Since then sev- against liability, these services must enter
eral negotiations and amendments have been into license agreements; make best efforts
incorporated in the proposal and a final text to get such authorisation for hosting copy-
[126] was agreed upon by the EU Parliament and right protected content and make best ef-
Council on 13th of February, 2019.[127] forts to ensure unavailability of protected
content (this will likely result in the use of
Two provisions, in particular, in the pro- upload filters) [131]; and implement a notice
posed EU copyright directive, warrant red and takedown mechanism, including pre-
flags: Article 11 and Article 13. vention of future uploads.
Article 11, grants publishers the right to re- This effectively means that intermediaries
quest payment from online platforms that will have to proactively monitor and pre-
share their stories. This provision is being screen all the content that users upload. This
called the “link tax” which gives publish- degree of monitoring for illegal content is
ers the right to ask for paid licenses when not possible manually and can only be han-
online platforms and aggregators such as dled by automated filters, that are far from
Google news share their stories. [128] The Ar- perfect and can be easily manipulated. For
(125) Hayleigh Bosher, Keeping up with the Copyright Directive, IPKITTEN (9 Mar, 2019, 2:14 PM), https://ipkit-
ten.blogspot.com/2019/02/keeping-up-with-copyright-directive.html
(126) Proposal For A Directive Of The European Parliament And Of The Council On Copyright In The Digital Single
Market, JULIA REDA (9 Mar, 2019, 2:20 PM), https://juliareda.eu/wp-content/uploads/2019/02/Copyright_Fi-
nal_compromise.pdf
(127) Id.
(128) Matt Reynolds, What Is Article 13? The EU’s Divisive New Copyright Plan Explained, WIRED (9 Mar, 2019,
2:23 PM), https://www.wired.co.uk/article/what-is-article-13-article-11-european-directive-on-copyright-ex-
plained-meme-ban
(129) Christiane Stuetzle and Patricia C. Ernst, European Union: The EU Copyright Directive Hits The Homestretch,
MONDAQ (9 Mar, 2019, 2:26 PM), http://www.mondaq.com/unitedstates/x/786366/Copyright/The+EU+Copy-
right+Directive+Hits+The+Homestretch
(130) This includes - online intermediaries who store and give access to a large amount of copyright protected con-
tent or other protected content uploaded by its users. This specifically excludes - non profit online encyclopedias,
non profit educational and scientific repositories, open source software developing and sharing platforms, online
marketplaces and B2B cloud services and cloud services for users. Kindly refer to Article 2(5) of the proposed copy-
right directive.
(131) Christiane Stuetzle and Patricia C. Ernst, European Union: The EU Copyright Directive Hits The Homestretch,
MONDAQ (9 Mar, 2019, 2:26 PM), http://www.mondaq.com/unitedstates/x/786366/Copyright/The+EU+Copy-
right+Directive+Hits+The+Homestretch
42
example, YouTube’s “Content ID” system has rorist content and stop it from reappearing
been deemed notorious for over-removing once it has been removed. A human review
innocent material. [132] Article 13 will turn step before content is removed, so as to avoid
intermediaries into the content police and unintended or erroneous removal of content
would hamper the free flow of information which is not illegal has also been recommend-
on the Internet.[133] There is also the problem ed in the proposed regulation.[139]
of dedicated infringers finding a way around
content filters and the possibility of automated These draft legislations in the EU, namely - the
tools making errors, specially in cases of fair proposed copyright directive and the terrorist
use like - criticism, reviews and parodies.[134] content regulation, point towards a shifting
trend in European countries wherein govern-
The proposed directive is scheduled for voting ments wanting to hold online intermediaries
before the European Parliament either in late more accountable and responsible for illegal
March or mid-April of 2019. user generated content generated on their
platforms.
6.2.3 Terrorist Content Regulation[136]
On 12th September 2018, the European Com- In both cases, for copyright and terrorist con-
mission released the draft - ‘Regulation on Pre- tent, the EU has suggested (through these
venting the Dissemination of Terrorist Content legislations) the use of automated tools for
Online.’ which requires tech companies and content filtering, which may lead to over-com-
online intermediaries to remove “terrorist con- pliance (to ring-fence themselves against lia-
tent” within one hour after it has been flagged bility), private censorship and resultant dilu-
to the platforms by law enforcement authori- tion of free speech rights on the Internet.
ties as well as Europol. [137] The proposal needs
to be backed by member states and the EU Par- 6.3 Case studies
liament before it can be passed as law. 6.3.1 Delfi v. Estonia[140] (2015)
The judgment in this case brings to light fas-
Websites that fail to take immediate action cinating issues of both human rights and the
will be liable to pay fines. Systematic failure law governing intermediary liability in the EU,
to comply will invite penalties of up to four making it one of the most important judgment
percent of the company’s global turnover in of recent times, with respect to intermediary
the last financial year (similar to fines un- liability.
der the GDPR)[138]. Requirement for proactive
measures, including automated detection, are Delfi is one of the biggest online news portals
needed to effectively and swiftly detect, iden- in Estonia. Readers may comment on the news
tify and expeditiously remove or disable ter- stories, even though Delfi operates a system
(132) Cory Doctorow, Artists Against Article 13: When Big Tech and Big Content Make a Meal of Creators, It Doesn’t
Matter Who Gets the Bigger Piece, ELECTRONIC FRONTIER FOUNDATION (9 Mar, 2019, 2:26 PM), https://www.
eff.org/deeplinks/2019/02/artists-against-article-13-when-big-tech-and-big-content-make-meal-creators-it
(133) Id.
(134) Id.
(135) Cory Doctorow, The Final Version of the EU’s Copyright Directive Is the Worst One Yet, ELECTRONIC FRON-
TIER FOUNDATION (9 Mar, 2019, 2:26 PM), https://www.eff.org/deeplinks/2019/02/final-version-eus-copyright-
directive-worst-one-yet
(136) European Commission, Proposal For A Regulation Of The European Parliament And Of The Council On Pre-
venting The Dissemination Of Terrorist Content Online, EUROPEAN COMMISSION (9 Mar, 2019, 2:35 PM), https://
ec.europa.eu/commission/sites/beta-political/files/soteu2018-preventing-terrorist-content-online-regulation-640_
en.pdf
(137) Id. Articles 4, 13
(138) Id. Article 18
(139) Id. Article 6
(140) Delfi v. Estonia, 64569/09, ECtHR (2015)
43
to regulate unlawful content within a notice Fifth Section of the ECHR, asserting that the
and takedown framework. In January, 2006, a liability against Delfi was justified and propor-
news article was published by Delfi that talked tionate because:
about how a ferry company, namely SLK Ferry
had wrecked the pathway that connected Es- (1) The comments in question were outra-
tonia’s mainland to its islands. There were one geous and defamatory, and had been posted
hundred and eighty five user generated com- in response to an article that was published
ments on the news article, out of which about by Delfi on its professionally managed online
twenty were viewed as offensive and threaten- news portal which is of commercial nature;
ing towards the company’s sole shareholder L. and
The comments were asked to be removed and (2) Delfi failed to take enough steps to remove
damages were claimed by L. Delfi removed the the offensive remarks immediately and the
comments but refused to pay damages. The fine of 320 Euros was insufficient.[143]
matter was brought to various lower courts
before it reached the Supreme Court in June The decision was criticized by digital and civ-
2009, which held that Delfi had a legal obli- il rights activists for being against Directive
gation to prevent unlawful and illegal content 2000/31/EC which protects intermediaries
from being posted on their website, since it from user generated content and freedom of
was the publisher of the comments, along with expression online. It also set a worrying prec-
the original author, and therefore was not pro- edent that could change the dynamics of free
tected by EU Directive 2000/31/EC. Further, speech on the Internet and intermediary liabil-
the court stated that defamatory speech is not ity. Furthermore, the decision was condemned
covered under right to freedom of expression. for the Court’s fundamental lack of under-
standing of the role of intermediaries.
Aggrieved by the Supreme Court’s judgment,
Delfi moved the European Court of Human 6.3.2 Magyar Tartalomszolgáltatók Egyesülete
Rights. The question before the ECHR was (“MTE”) and Index.hu Zrt (“Index”) v.
whether the previous court’s decision to hold Hungary[144] (2016)
Delfi liable was an unreasonable and dispro-
portionate restraint on Delfi’s freedom of ex- After the controversial Delfi judgment, which
pression, according to Article 10[141] of the Con- was considered by many a setback to online
vention for the Protection of Human Rights free speech and liability of intermediaries
and Fundamental Freedoms. with respect to third party generated con-
tent, the European Court of Human Rights
The ECHR was called upon to strike a balance delivered another landmark judgment, rul-
between freedom of expression under Article ing the other way.
10 of the Convention and the preservation of
personality rights of third persons under Arti- The parties, MTE and Index are a Hungarian
cle 8 of the same Convention.[142] In 2013, in self regulatory body of Internet content pro-
a unanimous judgment, Delfi lost the case at viders and a news website respectively. The or-
ECHR and the matter was thereafter brought ganizations had featured an opinion piece on
before the Grand Chamber. On 16 June, 2015, the unethical business practices of a real es-
the Grand Chamber upheld the decision of the tate company, which garnered a lot of resent-
(141) Council of Europe, European Convention on Human Rights, EUROPEAN COURT OF HUMAN RIGHTS (Feb 9,
2019, 2:35 PM), https://www.echr.coe.int/Documents/Convention_ENG.pdf
(142) Giancario Frosio, The European Court Of Human Rights Holds Delfi Liable For Anonymous Defamation, CEN-
TRE FOR INTERNET AND SOCIETY STANFORD LAW SCHOOL (Feb 9, 2019, 2:49 PM), http://cyberlaw.stanford.
edu/blog/2013/10/european-court-human-rights-holds-delfiee-liable-anonymous-defamation
(143) HUDOC - European Court of Human Rights, HUDOC (Feb 10, 2019, 6.25PM), http://hudoc.echr.coe.int/eng?
i=001-126635#{“itemid”:[“001-126635”]
(144) Application no. 22947/13
44
ful comments from readers. In response, the rective (Directive 95/46/ec) where there was
real estate company sued MTE and Index for no mention of this term, although it was im-
infringing its right to a good reputation. The plicit under Articles 12 and 14. The grounds
Hungarian courts declined to apply the safe under Article 17 of the GDPR are detailed and
harbour principles under Directive 2000/31/ broader than those provided in the 1995 Data
EC, stating that the same applies only to com- Protection Directive. The data subject has the
mercial transactions of electronic nature i.e right to demand erasure of the information
purchases made online. According to them concerning her in the following cases:
the comments were made in a personal capac-
ity and were outside the ambit of economic
•personal data is not required for processing;
or professional undertakings, and hence not •she withdraws consent;
qualified for safe harbour protection.
•when there has been unlawful processing of
data;
The matter was moved to the European Court
of Human Rights (ECHR). In a 2016 ruling •objection is on grounds under Article 21(1)
that was considered an enormous step forward and Article 21(2) of GDPR;[148]
for protection of intermediary from liability
and online free speech, the Court held that
•national laws require erasure of data and;
and
requiring intermediaries to regulate content
posted on their platform “amounts to requiring •when the data is provided in relation to in-
excessive and impracticable forethought capable formation society services by a child under Ar-
of undermining freedom of the right to impart ticle 8(1).[149]
information on the Internet.[145]” The Court also The Article also provides for situations in
declared that the rulings of the Hungarian which the Right to be Forgotten will not be
courts were against Article 10 of the Conven- applicable. The grounds are:
tion for the Protection of Human Rights and
Fundamental Freedoms.[146]
•exercise of the right of freedom of expres-
sion and information;
6.4 Right to Be Forgotten in the EU •public interest and public health;
The GDPR came into force on May 25, 2018,
repealing the 1995 Data Protection Directive.
•when the processing is a legal obligation;
It is meant to harmonize data privacy laws •for archiving purposes with respect to public
across Europe, protect data privacy of EU cit- interest, scientific, historical research, or sta-
izens and provide a comprehensive data pri- tistical purposes; and
vacy framework for organizations that collect
and process data.[147]
•exercise or defence of legal claims.
However, RTBF under the GDPR is plagued
with several problems, namely:
Article 17 of the GDPR provides for the Right
to Erasure or the Right to be Forgotten. This •Disproportionate Incentives: The infra-
is a development from the Data Protection Di- structure in place for Right to be Forgotten is
(145) Daphne Keller, New Intermediary Liability Cases from the European Court of Human Rights: What Will
They Mean in the Real World? STANFORD LAW SCHOOL- CENTER FOR INTERNET AND SOCIETY ( Feb 18,
2019, 6:20PM), http://cyberlaw.stanford.edu/blog/2016/04/new-intermediary-liability-cases-european-court-hu-
man-rights-what-will-they-mean-real
(146) Council of Europe, European Convention on Human Rights, EUROPEAN COURT OF HUMAN RIGHTS (9 Mar,
2019, 2:35 PM), https://www.echr.coe.int/Documents/Convention_ENG.pdf
(147) The European Union General Data Protection Regulation, (9 Mar, 2019, 2:49 PM), http://www.eugdpr.org/
(148) European Commission, Article 21 - Right to Object, EUROPEAN COMMISSION (9 Mar, 2019, 2:55 PM),
http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf
(149) European Commission, Article 8 - Conditions Applicable to Child’s Consent in Relation to Information Society
Services, EUROPEAN COMMISSION (9 Mar, 2019, 2:58 PM), http://ec.europa.eu/justice/data-protection/reform/
files/regulation_oj_en.pdf
45
heavily tilted toward Right to Privacy and not come along with it.
toward informational rights and freedom of
speech and expression. It provides unbalanced
• Applicability of E-commerce Directive [152]
(150) Search Removals under European Privacy Law, Google Transparency Report, GOOGLE (March 1, 2019,
2:00PM), https://transparencyreport.google.com/eu-privacy/overview?hl=en
(151) Daphne Keller, The Right Tools: Europe’s Intermediary Liability Laws and the 2016 General Data Protection
Regulation, STANFORD LAW SCHOOL CENTER FOR INTERNET AND SOCIETY (fEB 9, 2019, 4:56PM) https://pa-
pers.ssrn.com/sol3/papers.cfm?abstract_id=2914684
(152) Electronic Commerce Directive 2000/31/EC
(153) [C-131/12]
46
Controller. [154] The Court, however, rejected of individuals. The court further explained
this reasoning. Google was held to collect, that the processing of data cannot be justi-
record, retrieve, organize, store, disclose fied solely by the economic interests of the
and make data available to the public, which search engine. The rights of other Internet
comes under the definition of processing. users are also to be considered. The rights
The fact that the data is already published of the data subject and that of other In-
and not altered makes no difference. [155] The ternet users must be balanced by consider-
Court also held that because the search en- ing factors such as nature of information,
gine exercises control and determines the sensitivity of the data in the data subject’s
purpose and means of the activities that it life, the role of the data subject in public
undertakes during processing, it will be the life and public interest. [158] The court also
Controller with respect to these activities noted that because of ease in replication of
and cannot be excluded only on the basis data on the Internet, it may spread to web-
that it exercises no control over the per- sites over which the court does not have
sonal data on the website of third parties. jurisdiction. Due to this, it may not be an
The Court also emphasized that entering effective remedy to mandate that there
a person’s name into a search engine and be parallel erasure of the data from both
getting all information pertaining to that the publisher or to require erasure of data
person would enable profiling of that indi- from the publisher’s website first. There
vidual. [156] It was held that it is irrelevant may also be situations where the data sub-
that publishers possess the means to block ject has the Right to be Forgotten against
search engines from accessing their data. the search engine but not the publisher
The duty on search engines was separate (Eg: If the data is solely for journalistic
from that of publishers of data. [157] purpose [159]).
(2) What are the duties on the search engine (3) Scope of data subjects rights under the
operator as per the 1995 Data Protection Di- Data Protection Directive
rective?
The question referred to the court was wheth-
Google stated that as per the principle of pro- er the data subject can exercise his Right to
portionality, the publishers of the websites be Forgotten on the grounds that the data is
must take a call on whether the information prejudicial or that he wishes that the data be
should be erased or not as they are in the best deleted after a reasonable time.
position to make this determination and take
further action for removal of such information. Google submitted that it is only in cases where
Google further contended that its fundamental the processing violates the Data Protection Di-
right to free speech and expression along with rective or on compelling legitimate grounds
that of the Publisher will be negatively affect- particular to the data subject’s situation that
ed if it is asked to delist such links. Addition- the individual be allowed to exercise the Right
ally, informational rights of Internet users will to be Forgotten.
also be under threat.
The Court held that data collected could be
The Court once again emphasized the role of lawful initially, but, may, in the course of
search engines in profiling of data subjects time become irrelevant, inaccurate, inade-
and the threat it poses to the right to privacy quate, excessive with respect to the purpose
(154) Para 22 of the Google Spain vs AEPD and Mario Costeja Gonzalez decision
(155) Id. at Paras 28, 29
(156) Id. at Para 37
(157) Id. at Paras 39, 40
(158) Id. at Para 81
(159) Id. at Paras 84, 85
47
for which it was collected. [160] The Court also speech rights of Internet users. Also, the
stated that it is not necessary that the data question that arose was whether a country
sought to be erased has to be prejudicial to can enforce its laws in other countries to
the data subject. [161] limit speech and access to information.
“[T]here is a danger that the Union will prevent Google v. CNIL highlights the incompatibility
people in third countries from accessing infor- between principles of territorial jurisdiction
mation. If an authority within the Union could and global data flows.[166]
(165) ‘Right to be forgotten’ by Google should apply only in EU, says court opinion, THE GUARDIAN (Feb 8, 2019,
7:08PM), https://www.theguardian.com/technology/2019/jan/10/right-to-be-forgotten-by-google-should-apply-
only-in-eu-says-court
(166) Michele Finck, Google v CNIL: Defining the Territorial Scope of European Data Protection Law, THE GUARD-
IAN (Feb 7, 2019, 2:00PM), https://www.theguardian.com/technology/2019/jan/10/right-to-be-forgotten-by-goo-
gle-should-apply-only-in-eu-says-court
49
CHAPTER VII
Social media and messaging platforms pro- world. [168] This raises new concerns about the
vide the perfect condition for the creation vulnerability of democratic societies to fake
of cascades of information of all kinds. The news and the public’s limited ability to con-
power of these platforms has been leveraged tain it. [169]
to create social movements like Black Lives
Matter, MeToo and TimesUp campaigns. This Fake news[170] is not a recent phenomenon.
power has also been exploited to sow dis- The issue of disinformation has existed since
cord and manipulate elections. time immemorial in both traditional print
and broadcast media. The advent of the In-
The emergence of social media saw shifts ternet during the 90s opened the doors to a
in the media ecosystem with Facebook and vast repository of information for people. The
Twitter becoming important tools for relay- unimaginable growth of the Internet in a few
ing information to the public. Anyone with a years made it a host for a plethora of false and
smartphone can be a broadcaster of informa- unwanted information. The World Economic
tion. Political parties are investing millions Forum in 2013 had warned that ‘digital wild-
of dollars on research, development and im- fires’ i.e unreliable information going viral will
plementation of psychological operations to be one of the biggest threats faced by society
create their own computational propaganda and democracy: “The global risk of massive dig-
campaigns. [167] The use of automated bots to ital misinformation sits at the centre of a con-
spread disinformation with the objective of stellation of technological and geopolitical risks
moulding public opinion is a growing threat ranging from terrorism to cyber attacks and the
to the public sphere in countries around the failure of global governance”.[171]
(167) Philip N. Howard, Samantha Bradshaw, The Global Organization of Social Media Disinformation Campaigns,
COLUMBIA JOURNAL OF INTERNATIONAL AFFAIRS (Mar 2, 2019, 3:09PM) https://jia.sipa.columbia.edu/global-orga-
nization-social-media-disinformation-campaigns
(168) Dean Jackson, How Disinformation Impacts Politics and Publics, NATIONAL ENDOWMENT FOR DEMOCRACY
(Feb 7, 2019, 12:30PM) https://www.ned.org/issue-brief-how-disinformation-impacts-politics-and-publics/
(169) David Lazer, Matthew Baum, Nir Grinberg, Lisa Friedland, Kenneth Joseph, Will Hobbs, Carolina Mattsson, Com-
bating Fake News: An Agenda for Research and Action, HARVARD KENNEDY SCHOOL, SHORENSTEIN CENTER (Feb 10,
2019, 7:56PM), https://shorensteincenter.org/combating-fake-news-agenda-for-research/
(170) In this report, the term “Fake News” refers to news that is deliberately and verifiably false and created with the
intention to mislead readers.
(171) Lee Howell, Global Risks, Insight Report, WEF, 23 (2013)
50
In the 2016 United States Presidential elec- cause and motivation behind the viral dis-
tions [172] and the 2018 Brazilian Presidential semination of fake news. The study found
elections, [173] the power of social media and that the rising tide of nationalism along with
messaging platforms was leveraged to sway a distrust in mainstream media has pushed
elections in the favour of a particular candi- people to spread information from alterna-
date. The incidents commenced a global de- tive sources without attempting to verify the
bate on tackling fake news and whether tech information, under the belief that they were
platforms are complicit in the issue. In the helping to spread a real story. [178]
wake of these controversial elections there
has been mounting pressure on online plat- Following the spate of mob lynchings, the In-
forms such as Facebook and Twitter to ac- dian Government asked WhatsApp to devise
tively regulate their platforms. ways to trace the origin of fake messages cir-
culated on its platform. [179] The government
Governments around the world have been cautioned WhatsApp that it cannot evade re-
grappling with the question of how existing sponsibility if its services are being used to
laws that limit free speech for reasons such spread disinformation and will be treated as
as incitement to violence can be applied in an “abettor” for failing to take any action. [180]
the digital sphere. [174] Increasing calls for the
platforms to take a more proactive role in In India, as mentioned in chapter, the Draft In-
weeding out disinformation and hate speech formation Technology [Intermediaries Guide-
have raised fears that they might become the lines (Amendment) Rules], 2018 (“Draft
ultimate arbiters of what constitutes unac- Rules”) have been proposed by the govern-
ceptable content. [175] ment to fight ‘fake news’, terrorist content
and obscene content, among others. They
India has been reeling from the consequenc- place obligations on intermediaries to pro-
es of fake news floating on social media and actively monitor content uploaded on their
messaging platforms, especially WhatsApp platforms and enable traceability to deter-
that has more than 200 million active Indi- mine the originator of information.
an users. [176] Rumours related to possession
of beef and child kidnapping have led to The Election Commission of India announced
the deaths of thirty three innocent people. that all candidates contesting the 2019 gen-
[177] BBC conducted a research in India on the eral elections will have to submit details of
(172) Richard Gunther, Paul A. Beck, Erik C. Nisbet, Fake News Did Have a Significant Impact on the Vote in the 2016
Election, OHIO STATE UNIVERSITY, https://cpb-us-w2.wpmucdn.com/u.osu.edu/dist/d/12059/files/2015/03/
Fake-News-Piece-for-The-Conversation-with-methodological-appendix-11d0ni9.pdf
(173) Anthony Broadle, Explainer: Facebook’s WhatsApp flooded with fake news in Brazil election, REUTERS (Feb 19, 2019,
4:07PM), https://in.reuters.com/article/brazil-election-whatsapp/explainer-facebooks-whatsapp-flooded-with-fake-news-in-
brazil-election-idINKCN1MV04J
(174) Lee Howell, Global Risks, Insight Report, WEF, 23 (2013)
(175) Platform responsibility, The London School of Economics and Political Science, Department of Media and Commu-
nications, LSE (Mar 4, 2:09PM) http://www.lse.ac.uk/media-and-communications/truth-trust-and-technology-commission/
platform-responsibility
(176) WhatsApp now has 1.5 billion monthly active users, 200 million users in India, FINANCIAL EXPRESS (Dec 11, 2018,
5:06PM), https://www.financialexpress.com/industry/technology/whatsapp-now-has-1-5-billion-monthly-active-users-200-
million-users-in-india/1044468/
(177) Alison Saldanah, Pranav Rajput, Jay Hazare, Child-Lifting Rumours: 33 Killed In 69 Mob Attacks Since Jan 2017. Before
That Only 1 Attack In 2012, INDIA SPEND (Feb 5, 2019, 11:40AM), https://www.indiaspend.com/child-lifting-rumours-33-
killed-in-69-mob-attacks-since-jan-2017-before-that-only-1-attack-in-2012-2012/
(178) Santanu Chakrabarti, Lucile Stengel, Sapna Solanki, Duty, Identity, Credibility: Fake News and the Ordinary Citizen in
India, BBC (Feb 5, 2019, 11:45AM), http://downloads.bbc.co.uk/mediacentre/duty-identity-credibility.pdf
(179) PTI, Mob Lynchings: WhatsApp At Risk Of Being Labelled “Abettor”, BLOOMBERG QUINT (Feb 1, 2019, 10 AM),
https://www.bloombergquint.com/law-and-policy/mob-lynchings-whatsapp-at-risk-of-being-labelled-abettor#gs.UdkfqXqo
(180) Id
51
their social media accounts and all political ad- that it received 1,386 removal requests iden-
vertisements on social media will require prior tifying a total of 2,752 pieces of content be-
certification.[181] All expenditure of campaign- tween Jan-Dec, 2018. [185]
ing on social media is to be included in the
candidates election expenditure disclosure.[182] In 2018, the French Parliament passed a con-
troversial legislation that empowers judges to
The growing pressure worldwide on inter- order the immediate removal of “fake news”
mediaries to implement gatekeeping policies during election campaigns. The law allows the
led Germany to pass “Netzwerkdurchsetzu- French national broadcasting agency to render
ngsgesetz” (NetzDG), also known as the Net- the authority to suspend television channels
work Enforcement Act, which requires social “controlled by a foreign state or under the in-
networks with more than 2 million users to fluence” of that state if they “deliberately dis-
take down content that is “obviously illegal” seminate false information likely to affect the
within 24-hours after it is notified. [183] The sincerity of the ballot.[186]
law imposes fines of up to EUR 50 million on
social media companies that fail to remove The European Commission and four major social
unlawful content from their websites. media platforms - Facebook, Twitter, YouTube and
Microsoft announced a Code of Conduct on coun-
In its latest transparency report [184] on remov- tering illegal online hate speech.[187] The Code met
als under the NetzDG, Google stated that it with opposition from a number of rights groups
received 465,784 requests in 2018 from us- like Index of Censorship[188] and EFF for being in vi-
ers and reporting agencies to remove unde- olation of the fundamental right to freedom of ex-
sirable content from YouTube. The reasons pression.[189] The Code of Conduct is part of a trend
provided for the complaints include: privacy, where states are pressuring private corporations to
defamation, hate speech, political extrem- censor content without any independent adjudica-
ism, sexual content, terrorism-related and tion of the legality of the content.[190]
unconstitutional content, amongst others. In After the Cambridge-Analytica debacle, the Hon-
response to the removal requests, 112,941 est Ads Act was introduced in the United States
items were removed by Google. Facebook, in Senate which would hold social media and other
its NetzDG Transparency Report, mentioned online platforms to the same political advertis-
(181) Scroll Staff, Lok Sabha polls: All political ads on social media will need prior certification, says ECI, SCROLL (Mar 7,
2019, 2:30PM), https://scroll.in/latest/916091/lok-sabha-polls-all-political-ads-on-social-media-will-need-prior-certification-
says-eci
(182) Nikhil Pahwa, Key takeways from Election Commission’s 2019 India’s 2019 Elections announcement: On Fake News,
Online Political Advertising and Model Code of Conduct, MEDIANAMA (Mar 8, 12:30PM), https://www.medianama.
com/2019/03/223-key-takeways-from-election-commissions-2019-indias-2019-elections-announcement-on-fake-news-on-
line-political-advertising-and-model-code-of-conduct/
(183) BBC, Germany starts enforcing hate speech law, BBC (Feb 4, 2019, 11:30AM) https://www.bbc.com/news/technolo-
gy-42510868
(184) Removals under the Network Enforcement Law, Google Transparency Report, GOOGLE (Jan 4, 2019, 11:05AM), https://
transparencyreport.google.com/netzdg/youtube?hl=en
(185) NetzDG Transparency Report, FACEBOOK (Jan 4, 2019, 11:05AM), https://fbnewsroomus.files.wordpress.
com/2018/07/facebook_netzdg_july_2018_english-1.pdf
(186) Michael-Ross Florentino, France passes controversial ‘fake news’ law, EURONEWS (Mar 2, 2019, 2:30PM) https://www.
euronews.com/2018/11/22/france-passes-controversial-fake-news-law
(187) Code of Conduct on countering online hate speech – results of evaluation show important progress, EUROPEAN COM-
MISSION (Mar 2, 2019, 2:40PM) https://ec.europa.eu/newsroom/just/item-detail.cfm?item_id=71674
(188) EU agreement with tech firms on hate speech guaranteed to stifle free expression, INDEX ON CENSORSHIP (Mar 2,
2019, 1:20PM) https://www.indexoncensorship.org/2016/05/eu-agreement-tech-firms-hate-speech-guaranteed-stifle-free-
expression/
(189) Jillain York, European Commission’s Hate Speech Deal With Companies Will Chill Speech, EFF (Mar 7, 2019, 3:02PM),
https://www.eff.org/deeplinks/2016/06/european-commissions-hate-speech-deal-companies-will-chill-speech
(190) Responding to ‘hate speech’: Comparative overview of six EU countries, ARTICLE 19 (Mar 3, 2019, 6:00PM) https://
www.article19.org/wp-content/uploads/2018/03/ECA-hate-speech-compilation-report_March-2018.pdf
52
ing transparency requirements that bind cable pillar of education, alongside reading, writing
and broadcast systems.[191] The bill would require and maths. An educational levy can be raised
companies to disclose how advertisements were on social media companies to finance a com-
targeted as well as how much they cost.92[192] prehensive educational framework—devel-
oped by charities, NGOs, and the regulators
While governments are struggling to imple- themselves—and based online.[195]
ment regulations that would address the sig-
nificant challenge of combating the rising It was also recommended that social me-
instances of fake news without jeopardising dia companies should be more transparent
the right to free expression, there are diffi- about their sites and how they work. Instead
cult questions that arise: What should be the of hiding behind complex agreements, they
extent to which limits on free speech online should inform users about how their sites
should be imposed so that the utility of the work, including curation functions and the
Internet is not compromised? Does today’s way in which algorithms are used to priori-
digital capitalism make it profitable for tech tise certain stories, news and videos, depend-
companies to circulate click-worthy narra- ing on each user’s profile. [196] The Committee
tives? [193] Would regulating intermediaries advised the enactment of a compulsory code
without addressing the deeper and structur- of ethics, overseen by an independent reg-
al issues of lack of user education and media ulator which would have statutory powers
literacy be enough to solve the problem? to monitor tech companies. [197] On advertise-
ments related to political campaigning, the
In 2017, in a ‘J oint declaration on freedom Committee was of the view that the govern-
of expression and ‘Fake News’, disinforma- ment should define ‘digital campaigning’ in-
tion and propaganda’, United Nations Spe- cluding online political advertising, and that
cial Rapporteur on Freedom of opinion and paid political advertising should be publicly
expression, David Kaye, stated that “General accessible, clear and easily recognisable. [198]
prohibitions on the dissemination of informa-
tion based on vague and ambiguous ideas, in- In January 2018, the European Commission
cluding “false news” or “non-objective infor- set up a high-level group of experts to advise
mation”, are incompatible with international on policy initiatives to counter fake news and
standards for restrictions on freedom of ex- disinformation spread online. [199] The High
pression, and should be abolished.” [194] Level Committee recommended enhancing
transparency, promoting media and informa-
The UK House of Commons, Digital, Culture, tion literacy, developing tools for empower-
Media and Sports Committee in its final report ing users and journalists, safeguarding the
on disinformation and fake news recommend- diversity and sustainability of the news me-
ed that digital literacy should be the fourth dia ecosystem and promoting continued re-
(191) Ellen P. Goodman, Lyndsay Wajert, The Honest Ads Act Won’t End Social Media Disinformation, but It’s a Start, SSRN, (2017)
(192) Jack Nicas, Facebook to require verified identities for future political ads, NYTIMES (Mar 2, 2019, 2:50PM) https://
www.nytimes.com/2018/04/06/business/facebook-verification-ads.html
(193) Evgeny Morozov, Moral panic over fake news hides the real enemy – the digital giants, The Guardian, (Jan 4, 2019, 10 AM),
https://www.theguardian.com/commentisfree/2017/jan/08/blaming-fake-news-not-the-answer-democracy-crisis
(194) David Kaye, Freedom of Expression Monitors Issue Joint Declaration on ‘Fake News’, Disinformation and Propaganda, OHCHR
(Mar 2, 2019, 5:00PM) https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=21287&LangID=E
(195) Disinformation and‘fake news’: Final Report, House of Commons Digital, Culture, Media and Sport Committee, UK PAR-
LIAMENT (Mar 3, 2019, 1:52PM), https://publications.parliament.uk/pa/cm201719/cmselect/cmcumeds/1791/179102.
htm
(196) Id.
(197) Id.
(198) Id.
(199) A multi-dimensional approach to disinformation, Report of the independent High level Group on fake news and online
disinformation, EUROPEAN COMMISSION (Mar 2, 2019, 8:10PM), https://ec.europa.eu/digital-single-market/en/news/fi-
nal-report-high-level-expert-group-fake-news-and-online-disinformation
53
search on the impact of disinformation. [200] It was agreed that the best way to under-
stand the term Fake News is to deconstruct
Oliver Sylvain in Connecticut Law Review it into three terms: misinformation, disinfor-
proposes that courts should scrutinize the mation and malinformation. Misinformation
manner in which each website elicit user was construed as circulation of incorrect
content and the extent to which they exploit information without any bad intention, Ma-
that data in secondary or ancillary markets. linformation was defined as spread of real
Based on that, the level of protection un- information to cause harm to a person, or-
der the intermediary liability legal regime ganization or society. Disinformation was
should be decided, depending on whether a understood to be false narrative deliberately
particular provider qualifies as an active or spread to inflict harm.
passive intermediary. [201]
• Information diet is coming from algorithms
on social media platforms. There is a real
Governments should enact a regulatory
problem of filter bubbles on these platforms.
framework that ensures accountability and
Therefore, it is important to think about al-
transparency of digital platforms without
gorithmic transparency and algorithm ac-
curbing free speech and innovation. The an-
countability.
swer to bad speech should not be censorship.
Such a regulatory framework should be de- • Regarding deployment of artificial intelli-
veloped as a result of multi-stakeholder con- gence, industry experts dealing with AI on a
sultations that involves the government, le- regular basis claimed that AI was nowhere
gal community, tech companies, civil society near being ready for the task of solving hu-
and regular users of social media. man and political problems.
(200) Id.
(201) Olivier Sylvain, Intermediary Design Duties, 50, CONNECTICUT LAW REVIEW, 1 (2018)
(202) Blue Paper: Misinformation and Intermediary Liability, SFLC.in (Mar 1, 2019, 2:45PM), https://sflc.in/blue-paper-misinfor-
mation-and-draft-intermediary-guidelines/
54
efforts to fact check and down-rank informa- their platform. [203] The messaging platform
tion proliferating on their platforms by col- launched TV and Radio campaigns to spread
laborating with third party fact checkers. awareness [204] and partnered with local NGOs
to educate users about the need to verify in-
• There is a problem in the education system. formation. [205]
Apart from digital literacy, there is a need to
teach critical thinking skills to young peo- Facebook is working with their communi-
ple. A culture of questioning and skepticism ty and third-party fact-checking organiza-
should be encouraged. tions to identify false/fake news and limit
• Decentralization of technology is important the spread. Ahead of the General Elections
to break information monopolies. 2019, Facebook has partnered with seven
third party fact-checkers namely: BOOM-
• Other suggested solutions included provid- Live, AFP, India Today Group, Vishvas.news,
ing incentives to startups that do fact check- Factly, Newsmobile and Fact Crescendo cov-
ing, giving tax breaks to small organizations ering six languages, to review and rate the
that bring truth back as an important value in correctness of stories on Facebook. [206] The
the digital realm. platform is also in the process of setting up
• The proposed Draft Rules can act like a an operations centre in Delhi which would
minesweeper and have the potential to be be responsible to monitor election content
misused. Regulation should be such that it 24X7. To achieve this, the centre will be co-
aids in the growth of a free Internet instead ordinating with global Facebook offices lo-
of restricting it. cated at Menlo Park (California), Dublin and
Singapore. [207]
While digital and media literacy is indispens-
able in ensuring that consumers of informa- Facebook has devised new features to bring
tion on social media do not fall prey to dis- more transparency in advertisements on its
information, we cannot dismiss the roles that platform in India. [208] The platform will allow
tech companies should play in addressing the its users to view the publishers and spon-
issue by ramping up their efforts to keep their sors of the advertisement they are accessing.
platforms clean. Platforms should expand [209] It has rolled out a searchable ad library
their endeavours to work jointly with third for its viewers to analyze political ads. The
party fact checkers and invest in educating information provided by this ad library in-
users and developing tools to help them dis- cludes range of impressions, expenditure on
tinguish between news that comes from a re- the said ads and the demographics of who
liable source and stories coming from outlets saw the ad. [210]
that are regarded as unreliable. WhatsApp
recently limited forwarding messages to five Any efforts to label and identify question-
chats to contain the virality of messages on able stories or sources should be consistent
(203) WhatsApp Blog, More changes to forwarding, WHATSAPP (Mar 2, 2019, 5:40PM), https://blog.whatsapp.com/10000647/
More-changes-to-forwarding
(204) PTI, WhatsApp rolls out TV campaign in India to tackle fake news, LIVEMINT (Mar 2, 2019, 5:40PM), https://www.livemint.
com/Companies/QU7LWGcHf0m49uiBqDRzlN/WhatsApp-rolls-out-TV-campaign-in-India-to-tackle-fake-news.html
(205) WhatsApp embarks on user-education drive to curb fake messages, HINDU BUSINESS LINE (Mar 2, 2019, 6:00PM), https://
www.thehindubusinessline.com/news/whatsapp-embarks-on-user-education-drive-to-curb-fake-messages/article24812353.ece
(206) Nandita Mathur, Facebook planning a ‘war room’ in Delhi to monitor Elections 2019, LIVE MINT, (8th March 2019, 12:20
PM), https://www.livemint.com/elections/lok-sabha-elections/facebook-wants-to-set-up-a-war-room-in-delhi-to-monitor-elec-
tions-2019-1552246631884.html
(207) Id.
(208) Shivnath Thukral, Bringing More Transparency to Political Ads in India, (8th March 2019, 12:50 PM), https://newsroom.
fb.com/news/2018/12/ad-transparency-in-india/
(209) Id.
(210) Id.
55
across platforms. [211] Voters should be able to without curbing free speech and innovation.
identify untrustworthy content across plat- The answer to bad speech should not be cen-
forms and trust that all platforms use the sorship. Such a regulatory framework should
same standards to classify it. [212] be developed as a result of multi-stakeholder
consultations that involves the government,
Transparency about algorithms, content legal community, tech companies, civil soci-
moderation techniques and political adver- ety and regular users of social media.
tising will go a long way in countering the The objective of the Draft Information Tech-
problem. [213] Large social media platforms are nology [Intermediaries Guidelines (Amend-
generally founded on the economic model of ment) Rules], 2018 (“the Draft Rules”) seems
surveillance capitalism rooted in delivering to be to counter disinformation / fake news
advertisements based on data collection. [214] on social media and messaging platforms but
Decentralized, user owned, free and open its purpose will not be served by such ar-
source platforms that do not rely on wide- bitrary and sweeping provisions. The Draft
spread data collection can potentially limit Rules are violative of the fundamental rights
the spread of fake news. [215] to free speech and privacy and the dictum of
the judgment of the Supreme Court in Shreya
It is short-sighted to think that laws can Singhal v Union of India. While transparency
completely fix the problem, it is neverthe- and accountability of platforms is the need
less necessary to have a discussion about a of the hour, the government should enact a
regulatory framework that ensures account- less-invasive and proportional means of reg-
ability and transparency of digital platforms ulation of the internet.
(211) Abby K. Wood, Ann M. Ravel, Fool Me Once: Regulating “Fake News” and other Online Advertising, 1227, SOUTHERN CAL-
IFORNIA LAW REV., 55 (2018)
(212) Id.
(213) Matteo Monti, Perspectives on the Regulation of Search Engine Algorithms and Social Networks: The Necessity of Protecting
the Freedom of Information, 1, OPINIO JURIS IN COMPARATIONE, 10 (2017)
(214) Natasha Singer, The Week in Tech: How Google and Facebook Spawned Surveillance Capitalism, NYTIMES (Mar 1, 2019,
8:30PM), https://www.nytimes.com/2019/01/18/technology/google-facebook-surveillance-capitalism.html
(215) Mark Verstraete, Derek E. Bambauer, Jane R. Bambauer, Identifying and Countering Fake News, Discussion Paper 17-15,
ARIZONA LAW JOURNAL, 25 (2017)
56
CHAPTER VIII
Increase in the number of users of online Although law is often said to be lagging
platforms that allow sharing of user gener- technology, recent developments have
ated content coupled with a lack of media shown that content platforms were slow in
literacy have led to an explosion of harmful identifying the root causes that led to the
content ranging from hate propaganda to rise of disinformation on the platforms. In-
disinformation to revenge porn and child termediaries could have been faster to re-
pornography. Targeted messages aimed at act to the problem of harmful messages on
manipulating democratic processes as seen their platforms which led to harm in the
in the 2016 US Presidential election and offline world including incidents of physi-
the 2018 Brazil elections led to greater cal violence. This inaction has contributed
scrutiny of the accountability of platforms to a decrease in trust of users on the plat-
over user generated content, often focus- forms in the recent past.
ing on the technology rather than system-
atic interventions. The trust deficit of online platforms and
incidents attributed to harmful content
Platforms like Facebook are no longer spread online have been used by Govern-
passive players like blogging platforms ments in various countries as excuses to
or web hosts and they decide the reach justify new regulations that seek to control
of content and ranking. What users see information on these platforms. Whether it
on their feeds are determined by their is NetzDG law in Germany or mandatory
past browsing habits and their posts and back-doors as per the new Australian law
shares. Thus, platforms have a major role or the proposed amendment to the Inter-
to ensure that their platforms are safe mediary Rules in India, the underlying nar-
and that the spread of disinformation is rative has been the need to control harmful
contained. The initiative of intermediar- content spread on social media platforms.
ies in working together with fact check-
ers across the world is a positive move In India, the Shreya Singhal judgment has
and will improve the trust of users in the given intermediaries the much needed cer-
content shared. tainty on the requirements for enjoying
57
safe-harbour protection. However, the pro- •The law should mandate governance
posed amendments to the Intermediaries structures and grievance mechanisms on
Guidelines Rules endangers this protection. the part of intermediaries enabling quick
Attempts at regulating intermediaries by take-down of content determined as ille-
weakening encryption or by mandating gal by the judiciary or appropriate Gov-
automated take-down on a broad range ernment agency.
of content deemed to be harmful will be •The right to privacy of users should be
counterproductive and will affect the fun- protected and there should not be any
damental rights of free speech and privacy mandate forcing intermediaries to weaken
guaranteed to citizens. However, a laissez encryption or provide back-doors.
faire approach permitting intermediaries •Government should work with Intermedi-
complete freedom is also not advisable as aries to educate users on identifying disin-
the real-world harm caused by illegal con- formation and in secure use of the Internet.
tent cannot be ignored. •The Government should formulate train-
ing programmes on technology law for
Governments should be free to mandate in- lower judiciary so that the developments
termediaries to ensure quick resolution of in jurisprudence in this area are dissemi-
legitimate takedown requests and to have nated.
in place governance structures and griev-
ance mechanisms to enable this. Recommendations for Intermediaries:
2 Rule No. 2 (Definition Did not contain the defi- Inserted the term ‘Critical
Clause) nition of the term ‘Critical Information Infrastructure’
Information Infrastructure’. to mean the same as per
Sec. 70(1) of the IT Act.
3 Rule No. 3(2) (Terms and Rule 3(2) required interme- The Draft Rules have insert-
Conditions and Privacy Poli- diaries to publish rules and ed the term ‘privacy policy’
cy) regulations; or terms and in place of ‘terms and condi-
conditions; or user agree- tions’ in this provision.
ments to inform users about
certain content.
4 Rule No. 3(2) (Details to be Contained sub-clauses (a) The Draft Rules inserted
mentioned in user agree- to (i), which enlists the clause (j) and (k), which bar
ments) types of content which users information which - (a) threat-
cannot share on the inter- ens public health/ safety; (b)
mediary’s platform. Such as, ‘promotes’ cigarettes/ tobacco
content which, inter alia, products; (c) promotes con-
is - grossly harmful; harms sumption of intoxicant, includ-
minors; and infringes intel- ing alcohol/ e-cigarettes/ and
lectual property. like products; and (d) threat-
ens critical information infra-
structure.
5 Rule No. 3(4) of the Old Rules Rule Rule 3(4) required The Draft Rules have deleted the
and 3(8) of the Draft Rules intermediaries to ‘disable’ language used in Rule 3(4) of the
information which was in Old Rules and have inserted Rule
contravention of param- 3(8) in place of it. According to
eters laid down in their the new Rule 3(8), intermediaries
user agreements/ terms are required to takedown content
and conditions [as per only when instructed by a court
Rule 3(2)], upon obtaining or notified by the appropriate
knowledge themselves or government or its agency. Such
by an affected person in takedown requests need to adhere
to the restrictions laid down in
writing. This provision
Art. 19(2) of the Indian Consti-
required intermediaries tution. Intermediaries under the
to takedown content new provision are required to
within 36 hours and also remove content ‘as far as possible
retain such information immediately’ but in no case later
for 90 days to aid inves- than 24-hours of being intimated.
tigation. The new provision also requires
intermediaries to retain taken
down content for 180 days or
longer (as required).
59
NO Rule No. IL Rules, 2011 (‘Old Draft IL Rules, 2018
Rules’) (‘Draft Rules’)
6 Rule No. 3(5) of the Old Rule 3(5) required inter- Rule 3(4) of the Draft Rules
Rules and 3(4) of the Draft mediaries to intimate their (which replaces the old
Rules users on their right to ter- provision) now requires such
minate access and remove intimation to be ‘at least once
non-compliant information every month’.
for not adhering to their
internal rules/ user agree-
ments/ privacy policies.
7 Rule No. 3(7) of the Old Rule 3(7) required interme- Rule 3(5) of the Draft Rules
Rules and 3(5) of the Draft diaries to provide informa- replaces Rule 3(7) and makes
Rules tion to government agencies the following changes :
who are lawfully authorised a) Introduces a requirement
for investigative, protective to assist ‘any government
and cyber security activity. agency’ within 72 hours of
The information under this intimation;
provision could be sought b) The written request by
for punishment of offenc- government agencies could
es under any law in force. also be through ‘electronic
Such seeking of information means’; and
by government agencies had c) Intermediaries need to
to be in writing and clearly enable ‘tracing out of origi-
stating the purpose. nator’ of information on their
platforms as required by
government agencies, legally
authorised.
Note: This table does not discuss the unchanged provisions from the earlier
Intermediaries Guidelines from 2011.
60
SECTIONS OF THE IT ACT tend to five lakh rupees and in the event of
second or subsequent conviction with im-
66A (Now Repealed). Punishment for prisonment of either description for a term
sending offensive messages through com- which may extend to five years and also
munication service, etc. with fine which may extend to ten lakh ru-
Any person who sends, by means of a com- pees.
puter resource or a communication device,—
69. Power to issue directions for intercep-
(a) any information that is grossly offensive tion or monitoring or decryption of any
or has menacing character; or information through any computer re-
(b) any information which he knows to be source.–
false, but for the purpose of causing annoy-
ance, inconvenience, danger, obstruction, (1) Where the Central Government or a
insult, injury, criminal intimidation, enmity, State Government or any of its officers spe-
hatred or ill will, persistently by making use cially authorised by the Central Government
of such computer resource or a communica- or the State Government, as the case may be,
tion device, in this behalf may, if satisfied that it is nec-
(c) any electronic mail or electronic mail essary or expedient so to do,in the interest
message for the purpose of causing annoy- of the sovereignty or integrity of India, de-
ance or inconvenience or to deceive or to fence of India, security of the State, friendly
mislead the addressee or recipient about the relations with foreign States or public order
origin of such messages, or for preventing incitement to the commis-
shall be punishable with imprisonment for sion of any cognizable offence relating to
a term which may extend to three years and above or for investigation of any offence, it
with fine. may subject to the provisions of sub-section
(2), for reasons to be recorded in writing, by
Explanation.— For the purpose of this sec- order, direct any agency of the appropriate
tion, terms “electronic mail” and “electronic Government to intercept, monitor or decrypt
mail message” means a message or informa- or cause to be intercepted or monitored
tion created or transmitted or received on or decrypted any information generated,
a computer, computer system, computer re- transmitted, received or stored in any com-
source or communication device including puter resource.
attachments in text, images, audio, video
and any other electronic record, which may (2) The procedure and safeguards subject to
be transmitted with the message. which such interception or monitoring or de-
cryption may be carried out, shall be such as
67. Punishment for publishing or trans- may be prescribed.
mitting obscene material in electronic
form.–Whoever publishes or transmits or (3) The subscriber or intermediary or
causes to be published or transmitted in the any person in-charge of the computer
electronic form, any material which is las- resource shall, when called upon by any
civious or appeals to the prurient interest agency referred to in sub-section (1), extend
or if its effect is such as to tend to deprave all facilities and technical assistance to–
and corrupt persons who are likely, hav- (a) provide access to or secure access to the
ing regard to all relevant circumstances, to computer resource generating,transmitting,
read, see or hear the matter contained or receiving or storing such information; or
embodied in it, shall be punished on first (b) intercept, monitor, or decrypt the infor-
conviction with imprisonment of either de- mation, as the case may be; or
scription for a term which may extend to (c) provide information stored in computer
three years and with fine which may ex- resource.
61
(4) The subscriber or intermediary or apply if–
any person who fails to assist the agency (a) the function of the intermediary is
referred to in sub-section (3) shall be limited to providing access to a com-
punished with imprisonment for a term munication system over which information
which may extend to seven years and made available by third parties is transmit-
shall also be liable to fine. ted or temporarily stored or hosted; or
69A. Power to issue directions for block- (b) the intermediary does not–
ing for public access of any informa- (i) initiate the transmission,
tion through any computer resource.– (ii) select the receiver of the transmission,
and
(1) Where the Central Government or any of (iii) select or modify the information con-
its officers specially authorised by it in this tained in the transmission;
behalf is satisfied that it is necessary or ex-
pedient so to do,in the interest of sovereign- (c) the intermediary observes due diligence
ty and integrity of India, defence of India, while discharging his duties under this Act
security of the State, friendly relations with and also observes such other guidelines as
foreign States or public order or for prevent- the Central Government may prescribe in
ing incitement to the commission of any cog- this behalf.
nizable offence relating to above, it may sub-
ject to the provisions of sub-section (2),for (3) The provisions of sub-section (1) shall
reasons to be recorded in writing, by not apply if–
order, direct any agency of the Govern-
ment or intermediary to block for access (a) the intermediary has conspired or abet-
by the public or cause to be blocked for ted or aided or induced, whether by threats
access by the public any information gener- or promise or otherwise in the commission
ated, transmitted, received, stored or hosted of the unlawful act;
in any computer resource.
(b) upon receiving actual knowledge, or on
(2) The procedure and safeguards subject being notified by the appropriate Govern-
to which such blocking for access by the ment or its agency that any information,
public may be carried out, shall be such as data or communication link residing in
may be prescribed. or connected to a computer resource con-
trolled by the intermediary is being used
(3) The intermediary who fails to comply to commit the unlawful act, the interme-
with the direction issued under sub-sec- diary fails to expeditiously remove or disable
tion (1) shall be punished with an impris- access to that material on that resource with-
onment for a term which may extend to sev- out vitiating the evidence in any manner.
en years and also be liable to fine.
Explanation.–For the purposes of this sec-
79. Exemption from liability of in- tion, the expression “third party informa-
termediary in certain cases.–(1) Not- tion”means any information dealt with by an
withstanding anything contained in any intermediary in his capacity as an interme-
law for the time being in force but subject diary.
to the provisions of sub-sections (2) and
(3), an intermediary shall not be liable SECTIONS OF THE COPYRIGHT ACT, 1957
for any third party information, data,
or communication link made available or 51. When copyright infringed.— Copyright
hosted by him. in a work shall be deemed to be infringed—
(2) The provisions of sub-section (1) shall (a) when any person, without a licence
62
granted by the owner of the copyright or the be an “infringing copy”.
Registrar of Copyrights under this Act or in
contravention of the conditions of a licence 52. Certain acts not to be infringement of
so granted or of any condition imposed by a copyright.—
competent authority under this Act— (1) The following acts shall not constitute an
(i) does anything, the exclusive right to do infringement of copyright, namely,—
which is by this Act conferred upon the own-
er of the copyright, or (b) the transient or incidental storage of
(ii) permits for profit any place to be a work or performance purely in the tech-
used for the communication of the work nical process of electronic transmission or
to the public where such communication communication to the public;
constitutes an infringement of the copyright
in the work, unless he was not aware and (c) transient or incidental storage of a
had no reasonable ground for believing that work or performance for the purpose of
such communication to the public would be providing electronic links, access or integra-
an infringement of copyright; or tion, where such links, access or integration
has not been expressly prohibited by the
(b) when any person— right holder, unless the person responsible
(i) makes for sale or hire, or sells or lets for is aware or has reasonable grounds for be-
hire, or by way of trade displays or offers for lieving that such storage is of an infringing
sale or hire, or copy:
(ii) distributes either for the purpose of trade
or to such an extent as to affect prejudicial- Provided that if the person responsible for
ly the owner of the copyright, or the storage of the copy has received a writ-
(iii) by way of trade exhibits in public, or ten complaint from the owner of copyright
(iv) imports into India, any infringing copies in the work, complaining that such tran-
of the work: sient or incidental storage is an infringe-
ment, such person responsible for the
Provided that nothing in sub-clause (iv) storage shall refrain from facilitating such
shall apply to the import of one copy of access for a period of twenty-one days or
any work for the private and domestic use till he receives an order from the competent
of the importer. court refraining from facilitation access and
in case no such order is received before
Explanation.— For the purposes of this the expiry of such period of twenty- one
section, the reproduction of a literary, dra- days, he may continue to provide the facility
matic, musical or artistic work in the form of such access.
of a cinematograph film shall be deemed to
63
NOTES
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................
.........................................................................................................................................