Академический Документы
Профессиональный Документы
Культура Документы
Transactions and
Cyber Laws
Change in the
Environment
Technological Revolution.
Increase in Volumes & Complexities of
transactions.
User wants the electronic records to be
confidential & protected from tampering
User wants to trust the participants are who
they claim to be
Information Technology Act
2000
Became statute on 17th May 2000- 12th nation
in the world to have cyber laws
Also Amended: -
Indian Panel Code 1862
Indian Evidence Act 1872
The Bankers’ Book Evidence Act 1891
Reserve Bank of India Act 1934
Objectives
To provide legal recognition for transactions:-
Sent by originator
By a person having authority to act on behalf
of originator
By an information system programmed by
originator or his behalf to operate
automatically.
Section 12- Acknowledgement of
Receipt
If Originator did not specified particular
method- Any communication automated
or otherwise or conduct to indicate the
receipt
If specified that the receipt is must- Then
unless acknowledgement has been
received ER shall be deemed to have
been newer sent
Where ack. not received within time
specified or within reasonable time the
originator may give notice to treat the
ER though never sent.
Section 13- Dispatch of
ER
Unless otherwise agreed dispatch occurs when
ER enters resource outside the control of
originator
Shall be deemed to be dispatched and
received where they have their principal
place of business otherwise at his usual place
of residence
Section 13- Receipt of ER
Unless otherwise agreed time of Receipt of
ER shall occur: -
If Computer Resource designated- at the
time ER enters the Designated Resource
If sent to Resource not designated when
the addressee retrieves the record
If no Computer Resource designated- when
ER enters Computer Resource of
Addressee.
Section 15- Secure Digital
Signatures
If Digital signatures are applied in such a
manner that if ER was altered the Digital
Signatures would be invalidated then it is
called Secured Digital signatures
Digital Signatures
Section 16- to prescribe security procedures
Sec 17 to 34- Appointment and Regulation of
Controller and certifying authority
Sec 35 to 39- Obtaining DSC
Sec 40 to 42- Duties if Subscriber of DSC
Administration
Sec 43 to 47- provides for penalties and
adjudications
Sec 48 to 64- prescribes for establishment of
Appellate tribunals etc and compounding of
contraventions.
Sections 65-78 Offences
Tampering with computer source documents
(sec 65)
Hacking with computer system (sec 66)
Publishing of information which is obscene
(Sec 67)
The act to apply for offences or
contraventions committed outside India.
(sec 68)
Net work service provider
Section 79- provides for non liability of network
service provider in certain cases if he proves
that the offence or contravention was
committed without his knowledge or that he
had exercised all due diligence to prevent the
commission of such offence or contravention.
Amendments- Indian Evidence
Act 1872
Section3 of the Evidence Act amended to take
care of admissibility of ER as evidence along
with the paper based records as part of the
documents which can be produced before the
court for inspection.
Evidence Act (Contd)
Section 22A has been inserted which provides
that oral evidences as to the content of the
electronic records are not relevant unless
the genuineness of the electronic record
produced is in question.
The entries in the electronic records have been
recognized as are the entries in the books
of accounts.
Admissibility of ER without further
proof Section 65A & B
The output was produced by the computer
during the period over which computer
was regularly for the purposes of any
activity regularly carried on over the
period by the person having lawful
control over the use of the computer.
During the period the information of the
kind contained in the ER or of the kind
from which the information so contained
was derived was regularly fed into the
computer in the ordinary course of such
activity.
Admissibility of ER without further
proof Section 65A &B
For the material part of the said period the
computer was operating properly. Or if
not operating properly was not such as
to affect the electronic record or the
accuracy of the contents.
The information contained in the ER
reproduces or is derived from such
information fed into the computers in
the ordinary course of the said activities.
Presumption as to Secured
ER
Unless the contrary is proved the courts
shall presume that the secure ER have not
been altered since the specific point of
time to which secure status relates & the
court shall also presume that the Secured
digital signature is affixed by subscriber
with the intention of signing and approving
the ER. Otherwise if the record or signature
is not secured there will be no presumption
relating to authenticity & integrity of the
record or signatures.
Amendments
Negotiable Instruments Amendment Act 2002
w.e.f 6.3.2003 has brought cheques within
the preview of IT Act by changing section
1(4)(a) and inserting section 81-A
Adjudicating Process
The Adjudication process covers
contraventions of ITA-2000 under Chapter IX
of ITA-2000. This covers Section 43, 44 and
45 of the Act.
Adjudicating officers appointed by notification
dated 25th March 2003 u/s 46
Gray Areas & Special
Issues
Should not be technology specific but
technology neutral- namely asymmetric
crypto system and hash function
Domain Names and rights of domain name
owners and squatting
IPR issues not addressed
SPAM issues
Gray Areas (Contd)
New forms of cyber crimes
Internet Banking, E-fund transfer and e-
payments laws.
Cyber Taxation issues:-
Jurisdictional problems
PE- issues whether a website a PE
Internet Transactions &
Jurisdictional Issues
Legal Jurisdiction- belongs to the sovereign
government
Judicial Jurisdiction- belongs to courts
Enforcement Jurisdiction- belong to law
enforcement authorities
Internet Operates in “Border Less” cyber
space- hence inter jurisdictional conflicts
Auditor & Legal Framework
The ER is stamped with the system date
and time when it enters or leaves a
computer system. The system date
and time can be very easily tampered
with.
The Auditor has to make sure that the ER
on the basis of which he is generating
audit evidences to carry on his attest
function is reliable, not been
tampered and is secured. The
reliability of various other documents
on the basis of which he is forming his
opinion are reliable and have been
duly signed digitally of course.
Auditor & Legal
Framework
In spite of many provisions emphasizing the
necessity of maintaining adequate security,
no provision has been made for the audit
and certification of the reliability of the
computers used.
What is the
Cyberspace?
William Gibson in 1980s wrote
a science fiction named
Neuromancer wherein
computer hackers waged
war against secure data.
The setting had no physical
existence and was named
‘Cyberspace’ by Gibson.
Unique features - dynamic,
borderless space,
anonymity, speed, cost
effective, marked with
rapid technological
advances
Regulating the Internet..
Proponents of Cyberlaws Critics who advocate ‘no
believe that one’s activities regulation’ or ‘self
on the Internet need regulation’ in the Virtual
regulation by framing laws space believe that
government should have
and rules that govern our
minimum interference in
activities in the cyberspace.
regulating the cyberspace
This branch of law is termed and its use of surveillance
as “Cyberlaws” or censorship measures.
European Union, USA, John Perry Barlow’s
UNCITAL framed important “Declaration of the
laws to govern cyberspace Independence of the
UNCITRAL Model law of e- cyberspace” and David G.
commerce 1996 Post, The “Unsettled
EU data protection Directive Paradox”: The Internet, the
State, and the Consent of
DMCA Act 1998 in USA the Governed, 5 IND. J.
WIPO domain name dispute GLOBAL LEGAL STUD. 521,
Resolution policy 539 (1998)
Inherent challenges in
framing Cyberlaws
Some early adopters in the US and the West drafted their own
legislations by either adapting their existing laws in the context
of cyberspace or creating new laws in respect thereof.
Determining jurisdiction and formation the e-contracts are two key
issues on which traditional legal principles have been largely applied
by Courts worldwide . For e.g . Longarm Statutes enacted in US and
Minimum Contacts test.
General consensus that in the e-world, electronic signatures and
electronic documents are equally legally valid as the hand-
written signatures or hard copy paper documents. Model law on
Electronic Commerce in 1996 promotes application of principle of
‘ functional equivalence’
India enacted its first law of IT through the IT Act, 2000 based on the
principles elucidated in the UNCITRAL Model law of e-commerce.
Extends to whole of India and also applies to any offence or
contravention thereunder committed outside India by any person
{section 1 (2)} read with Section 75
No Homogenous
Cyberlaw
Nature of the internet- anonymity
element coupled with no
territorial borders and absence
of uniform law poses a challenge to
legislators and enforcement
authorities
A global consensus with respect to
legal enforcement and internet
censorship against certain offences
C a te g o rie s o f IP rig h ts
Utility model / Designs Geographical
Indications
Plant Breeder ’ s
rights
Classification of
IPR
Intellectual Property
IPR
Patents Broadcasting
Music
Copyright Dramatics
Trademarks Works
Literature
Industrial Sound
Design Recording
Works of Art
Geographical Computer
Indications Programs
Different Acts governing IP
assets
T h e Tra d e M a rks A ct, 1 9 9 9
Tra d e M a rks
Pa te n ts T h e Pa te n ts A ct, 1 9 7 0
T h e D e sig n s A ct, 2 0 0 0
D e sig n s
IP
Regimes category.)
Protecting Copyright in the
digital millennium
The question of new, sui generis form of protection was
seriously considered in the 1970s, but copyright
protection became the norm. the TRIPS Agreement
requires that ‘Computer program, whether in source or
in object code, shall be protected as literary works under
the Berne Convention’. Case on point-Ibcos computers v
Barclays FinanceLtd(1994)FSR 275,Apple computer inc
vsFranklin ComputerCorpn714F2d1240(3rd Cir 1983).
India party to Berne convention, Paris convention and
UCC1952.
India-Copyright Act-Section 2(o)-computer programme is
literary work.section 2(ffc) defines computer
programme.,section 2(ffb) defines computer-copyright –
tangible –storage in any medium
THANK YOU