Unit I Cyber Law & Power of Arrest Without Warrant Under The It Acts, 2000 Q.) What Is Cyber Law? What Are Needs of Cyber Law?
Unit I Cyber Law & Power of Arrest Without Warrant Under The It Acts, 2000 Q.) What Is Cyber Law? What Are Needs of Cyber Law?
Unit I Cyber Law & Power of Arrest Without Warrant Under The It Acts, 2000 Q.) What Is Cyber Law? What Are Needs of Cyber Law?
Cognizable Offence :-
The offence in which arrest without warrant is provided are called
cognizable offence.
In case of cognizable offence the polices has the power to arrest the
person without warrant (order of arrest from the court/court order )
Example : cognizable offences are those offence which are serious in
nature such as murder, rape, dowry, kidnapping, theft etc.
Characteristics :
1. FIR is First Information Report is registered with the police.
2. Police can start investigation without taking the permission from the
court.
3. The state government is the prosecutor the responsibilities of the
complaining or of victim is only to participate & providing assistance
to the public prosecutor.
4. The burden to prove the allegation lies with the public prosecutor.
Section 154 Cr. P.C. provides that under cognizable offence the police
has to obtain the FIR from the deceased or from eased relatives or
represented without the permission of magistrate & the same has to be
entered in the general diary of the police station.
After completing the investigation the police is required to file the
change sheet before the criminal court & afterword further procedure
like framing the issues, evidence, defense evidence, final argument &
judgment.
Non- cognizable Offence:-
Non-cognizable Offence means a case in which a police officer has no
authority to arrest without a warrant.
Non-cognizable Offence is not serious in nature.
For example: Assault, cheating, forgery, defamation.
Characteristics :
1. FIR is Filed in the court.
2. Investigation of the case cannot be started when the court gives an
order to start the investigation.
3. The investigation can only be started when the court gives an order
to start the investigation.
4. It is the complaint who seeks to prosecute the accused 1.
5. The burden of proving of the offence lies upon the complaints.
6. No FIR can be registered the complaints can file a criminal complaint
in the court of magistrate.
1)Hacking :-
Hacking can be made in the following ways.
It refers to breaking into computer System. Hacking also means where hackers
destroys, deletes, after any information to stored in the computer system or
diminishes its value or utility.
Hacker is a person who hacks the computer system the can be classified in the
following.
a) Code Hackers.
b) Phreakers
c) Cyber Punks
d) Crackers
a)Code hackers :-
They have knowledge of intricacies of computer system and dear operation.
b) Phreakers:-
Phreakers have deep knowledge of Internet and Telecommunication system.
c) Cyber Punks :-
Cyber Punks specialized in cryptography (It is a method of storing and
transmitting data it can also be used for users authentication)
d)Crackers :-
Crackers the Backers into computer security system.
Out of all Cyber crimes hacking are now is the biggest threat to Internet and E-
commerce. The hacking is causing the huge loss which may be calculated in
billions and trillions if the hacking is unchecked it may cause a serious threat in
future to e-commerce and because of threat and its security system the e-
commerce is going to be costlier.
India is centre point of Pakistan; and Chinese hackers they sometimes insert al
link to pornographic website and also website of SEBI(Stock Exchange Board of
India ) had been Hacked there may be some reason for hacking such as
1) For fun as a hobby mostly teenagers
2) To damage competitors Business.
3) For fraud and misappropriation.
4) To test the Client system, Internet security and to win their confidence.
Punishment for Hacking:-
The punishment for hacking is as under
a) An imprisonment upto 3 yrs.
b) Imprisonment with a fine which may extend to 2 Lacs of props.
c) Sometimes the punishment as mentioned above may be given together(a
and b).
Case Law: -
In feb 2001 two person Mr. Amit and Mr. Kapil blocked access to the
complained website on the grounds of non-payment of charges for
hiring web space. They not only blocked but displayed the message
site closed due to non-payment of bill.
Blocking access was legal but display of message amounted to
hacking and wrongful loss under section 66 of IT Act and Section 23
of IPC
The IT Act also covers the damages up to rupees 1 core on the
commission of computer related crimes without the permission of
owner.
2)Teenage Web Vandals:-
Artech, Nemesustn, Team holocaust and Doo-Doo Knew are teenage
Web Vandals also called by security experts as ankle, biters packet
monkeys and script kiddies.
It is noted that this teenage web vandals either deface web pages or
tag remarks on websites.
This type of cyber crime has become fashionable and hot fabric of
teenagers nudism in India.
E.g:-How to hack CD’s are easily and cheaply available only for 100-200-
300 which is affordable for any student such CD’s are helpful in cracking
a game to hacking a internet account and hijacking computer./
The significant motivating factor of teenage criminality which is district
from other teenage crime such as drug abuse and violence.
It can be checked by impacting information about the adverse
consequences of cyber crime to the IT Industry and the society the
parents can prevent children and check their acts.
3)Cyber Fraud :-
Fraud :-
A fraud is a deliberate deception to secure unfair and un lawful game or
to despised or to victim of a legal right section 17 of the Indian Contract
Act says fraud means and includes anty one of the following Acts
committed by a party through a contract with an intend to deceive
another party or his agent or to induced him to enter into the contract
1. The suggestion as a fact of that which is not true, by one who does not
believe it to be true.
2. By concealing (hide ) the material fact knowingly
3. A promise made without an intention to perform
4. Any other Act fitted to deceive
5. Any Act or a mission as the law declares to be fraudulent.
6. All Acts which amount to be cheating would be fraud but all fraud may all be
cheating.
Section 25 of IPC also defines the fraud a person is said to do fraudulent
things if he does that thing with the intend to defraud the other person.
Some of the examples of fraud in the cyber crime or as under like
misuse of credit cards by obtaining password by hacking, bogus
investment, deceptive investment, newsletter containing falls
information, auctions of website (online auction) and misappropriation
and transfer of funds.
Cyber cheating :-section 4/5 of IPC defines cheating
Under Section :
who is ever deceiving any person proudulenty or dishonestly the
person so deceive to deliver any property to any person or to concept
that any person shall return any property or intentionality induces. The
person so deceived to do or aimed to do any, it he were not so
deceived and which act or a mission causes or is likely to cause
damages or harm.
Dishonest concealment of fetch is a deception.
Eg. Mr.A boy exhibition to Z. a fall sample of an article intentionality
deceives Z into believing that the article corresponding with the sample
and there by dishonestly involves Z to buy and pay for the article. In this
case A has Cheated.
Punishment :-
The punishment for cheating is an imprisonment which may extended
upto 1 year or with fine or both as per section 4/7
Virus:
Section 43 Act IT Act says: -
Computer virus move, any computer virus any computer instruction
info. Data or programming that are destroy, damage or adversely
affected the performance of computer.
The edge it self to another computer resource and program, data or
instruction is executed or some other event take place in the computer.
Example:-
The low bug virus come as an attachment to an e-mail with the subject I
love u and when the victim clicks on attachment all the files in the
victim’s computer with junk data thereby destroy or damaging all the
details.
Damage and computer content to destroy, to modify to re-arrange any
computer by anomies.
Fine: -
The info at IT Act in the damage concern not executively to the victim
the Act at planning virus or other content marks in the computer is also
liable at mischief which is define under section 45.
Mischief many, if a person with intent to course is knowing that is out is
likely to course, wrong to loss or damage to the public or any person is
said to committee mischief.
The punishment for mischief if the loss is ranging from rs.50 lac is
punishable with imprisonment for expectedly two years all with fine or
with both (imprisonment & fine together).
Deformation & harassment &email abuse: -
Deformation means, injury or lowering down reputation of accuses.
Deformation is an offence under the IPC (India Panel court) consist of
following essential:
1) Publishing any bad articles are writing which is lowering the
representation of person.
2) Imputation is made intension of causing to the reputation of a
person.
3) Imputation is made by overall words is damaging reputation of a
person.
These are three types of determination
1) Libel :- This is are retained definition.
2) slander :- This is oral definition.
Punishment :-
Section 500 of IPC gives the following punishment.
1) An imprisonment for a term which many extended to two years.
2) With fine many also be post.
3) Imprisonment and fine many both many be avoided together.
Exception :-
In the following bases the imputation doesn’t amount to be an offense.
1) Imputation which is true concerning any person if it is for public good
2) An in good faith regarding the conduct of any person and the following
any public question.
3) Publishing a true report of processing a court of justice.
1. Shrink Wrap:-
Shrink Wrap Contract or licensed agreement.
The terms and condition which can be read and accepted by the
consumer after opening the product.
The terms describe the shrink wrap plastic wrapping used to coat
software boxes.
It is a practice to enclose warranty cards and contract terms inside
boxes containing products other than software’s.
The terms all generally available to review after the product have
been bought and open.
There are the following controversies regarding the shrink wrap
software’s
a. A consumer does not get the opportunities to know the terms and
condition of the software license before its purchase.
b. The terms in the contract are not connected because, it is
enforceable.
c. There is no chance to negotiate the contract.
d. They are for fixed terms of time.
e. They are void because they may be against public policy.
2. Click Wrap:-
A click wrap agreement is mostly found as part of installation process
of software package. It is also called a click through agreement or
click wrap license.
2. Icon clicking:-
Where the user must click on an OK on every button on a dialogue
box or pop-up window a user indicate reaction.
There are the following controversies Lapses.
a. It lacks bargaining power.
b. The term of service may not always appear on the web page. It
must be properly structured so as to enhance the credibility.
c. It user should be allowed to access the process easily.
Formation of Contract under Indian Contract Act 1872:-
2(a) Offer/Proposal
2(b) Acceptance.
Contract under Section 2(h)
A contract enforceable by law is called an contract.
Agreement after + Acceptance.
Contract an agreement + it’s enforceable.
2(c) Agreement:-
Every promise and every set of promise forming the consideration
for each other is any agreement.
Agreement means, where a person is saying to another person to do
or not to do something and the other person is doing the same and
agreement is said to be born between them. This is also known as
“Offeror / Promisor” and the person who accept it is known as
offeree / Promisee.
Enforceability means, that the agreement must be recognized by the
law.
2 (d) Consideration:-
Latin:-quid pro quo (Something in written).
Consideration is called soul of contract and therefore, it is said that
no consideration no contract.
Void:- An agreement not enforceable by law is called “Void
Agreement”.
Voidable:- An agreement which is enforceable by law of the option
one or more of the parties there through but not at the option of
others is a voidable contract.
Voidable contract is also a contract where the consent of a party
is affected by any one of the following elements.
a. Coercion Threat to the Body / Property.
b. Under influence undue pressure.
c. Fraud.
d. Miss-representation.
e. Mistake.
Communication of offer / Proposal and Acceptance :-
The communication of offer or proposal can either be made by oral
way or written way an offer is said to be a complete offer.
Communication of Acceptance:-
An offeree often accepting the proposal can send it back to the
offeror but sometimes an acceptance is forwarded to the offeror
butmay not be reaching to the offeror.
The law at this point is that nearly putting the acceptance in the
course at transmission such as it post pax, tellax is said to be
complete whether it is reaching to the knowledge of offeror or not.
Revocation:-
A proposal may be revoked at anytime before the communicate of
its acceptance an acceptance may be revoked at anytime before the
communication at it’s acceptance is received as against the acceptor
but not as the words.
Contract formation on Internet:-
Contract creates a relationship of right and obligations between the
parties Section 11, 12 and 13 plays important role in the for nation at
E-record. Could be attributed to the originator if it was sent by:-
a. The originator himself.
b. A person who may be the agent / authority to act at behalf of the
originator.
c. An information system programmed by or on behalf of the
originator to operate automatically.
Place:-
Creation an termination at right and obligation of the parties in the
contract.
Territorial jurisdiction.
Applicability of laws of land evidentiary consequences.
Time:-
Determination of the time at period at limitations for initiating
litigation (case).
Timely compliance at legal obligation (duties) and procedures.
As we know that electronic records or in the form of date,
records, images or sound stored received or sound in electronic form
or microfil at the same time there are certain problems in
ascertaining the time and place of dispatch and receipt of electronic
records.
As well the geographical borders may not be located at the time
of making the contract.
UNIT – III
META-TAGGING :-
Meta tagging is a process whereby the owner of website places certain words
on his website so that the site figures on search engines web a search of that
particular words is made. The reason behind is that a company name or the trade
mark maybe improperly use as a meta tag to divert the internet user to other
website
For example:- Mumbai University website when a student visits www.mu.ac.in he
does not see the description and keywords meta tags are illustrated as below
Meta Content = “Education, Syllabus, Examination, Notices”
Name = Description
Legislative and Innovative Moves Against Cyber SQUATTING
Copyright Act 1957 governs software computers and includes in the category
of literar work.
Literary works specially includes computer programs, tables and compilations
including computer database.
Computer program means a set of instructions expressed in words, courts,
schemes or in any other form, including a machine readable medium, capable
of causing a computer to perform a particular task or achieve a particular
result.
Meaning of Copyright:-
Copyright means the exclusive right subject to the provision of this act to do
or authorized to do of any of the following Acts.
OWNERSHIP OF COPYRIGHT:-
Section 17 defines the first owner of copyright the author of any work shall be
the first owner of copyright.
a. In case of Literary, dramatic, or artistic work made by the author during his
employment to proprietor of a newspaper, magazine or similar periodical
under a contract or service in newspaper etc said proprietor will be the first
owner in the absence of any contract to contrary.
b. On the other hand if the person is not under service or under an agreement
the author will be the first owner of copyright.
SECTION 30:-
1. The owner of the copyright will get the license for his existing work.
2. The prospective owner of the copyright may also get the license for his
future work.
3. The license for the copyright must be granted by the licensing authority in
writing to the owner of the copyright or to his authorized agent.
Copyright Infringement:-
i. Makes for sale or hire, or sells or lets for hire, or by way of trade
displays or offer sale or hire.
ii. Distributes either for the purpose of trade or to such an extent as to
affect prejudicially the owner of the copyright, or
iii. By way of trade exhibits in public, or
iv. Import in India, any infringing copies of the work provided that
nothing in sub-class
v. Shall apply to import of one copy of any work, for the private and
domestic use of the importer.
The infringement of copyright shall be held liable under the copyright Act the
damage can be made, fine may be closed, and imprisonment can be avoided.
The owner of copyright has the right to claim damages by means of
injunction, etc.
Punishment and Penalty under the Copyright Act:-
Hyper-Linking:- Linking is a system which permits the user to link the site
and through which internet users can browse the numerous website.
Hyper-Linking is a document on internet. It can be categorized into.
1. Loss of jobs.
2. Higher cost to the software industry and higher cost of software for legitimate
consumer.
3. Loss of taxes to the government.
4. Slowing the spirit of innovation in the field of computer science and
development of new software.
DIGITAL SIGNATURE:-
Authentication of document and protection of content of the document
are common by both online and physical world.
As regard physical document it is possible by putting signature and
preserving it at safe place however as regards to electronic record it is
imperative to make that communication legally binding.
In online communication there is always a fear of interception,
transmission, errors, delays, deletion, authenticity or verification of an
electronic message using internet as a medium.
To make the recipient in such communication ensure that the message
received has not been modified or make sure that the sender cannot deny
that he has send signature are used.
DEFINITION:- Digital Signature is defined as a short unit of data that
bears a mathematical relationship to the data in the documents context
and provides assurance to the recipients that the data is authenticate.
SECTION3 of IT Act contains the provision as regard to Digital
Signature
i. Subject to the provision of this Act `
ii. The authentication of the electronic record shall be effected
by the use of asymmetric crypto system and hash function
which envelope and transform the initial electronic record
into another electronic record.
EXPLANATION:- In simple word a hash function is algorithm which
creates a digital representation or fingerprint in the form of a hash value
Steps in obtaining digital Signature
1. Subscriber applies to Certifying Authority for Digital Signature.
2. Certifying Authority verifies identity of subscriber and issue Digital
Signature certificate.
3. Certifying Authority forward Digital Signature to repository maintain
by controller.
4. Subscriber digitally signs electronic message with private key to
ensure senders authenticity.
5. Receiving parties receives message verifies digital signature public
key and goes to repository to check the status of subscriber
certificates.
6. It is checked by repository and inform back to receiving party.
If the sender wishes to prove to the recipients that they are the
Source of information they use the private key to digitally sign a
message.
CERTIFYING AUTHORITY:-
Section 17 – 35 deals with the provisions of regulating of CA.
Participation of trusted 3rd party to certify for individuals identities and
their relationship to their Public Keys. This trusted 3rd party is called CA.
The Hierarchy of CA is as under
1. Controller of CA.
2. Deputy controller.
3. Assistant Controller.
4. Certifying Authorities.
Powers of CA
1. Exercising supervision over the activities of CA.
2. Certifying Public Keys of CA.
3. Laying down the standards to be maintained by CA.
4. Specifying the qualification and experience with employees of the CA.
5. Specifying the condition subject to which the CA shall conduct the
business.
6. Specifying the form and contents of Digital Signature certificates and
keys.
UNIT-V
INDIAN EVIDENCE ACT
Indian Evidence Act 1872 and IT Act 2000.
INTRODUCTION:-
Digital Signature E-agreements, E-messages have made a complete
change in transacting the business with one and other.
DEFINITION OF EVIDENCE IN INDIAN EVIDENCE ACT 1872:-
Evidence means and include.
1. All statements which court permit requires to be made before it by
witnesses in relation to matters of Act under inquiring they are called
Oral Evidence.
2. All documents produced for inspection of the court such documents are
called Documentary Evidence
DEFINITION OF EVIDENCE AFTER AMENDMENT BY IT ACT 2000
Evidence means and include.
1. All statements which the court permits to be presented before the
court of law in the matter under inquiring are known as Oral
Evidence.
2. All documents including electronic records produced for the
inspection of the court are called Documentary Evidence.
DATA:-
Data means a representation of information, knowledge, facts,
concepts or instructions which are being prepared or have been prepared in
a formulized manner and intended to be processed or have been processed
in computer system or computer network and may be in the form of
computer printouts, magnetic storage media, punched cards, punched taps
or stored internally in the memory of the computer.
COMPUTER SYSTEM:-
Computer system means a device or collection of devices including
input and output devices excluding calculated which are non-programmable
and capable of being used in conjunction with external file which contains
computer program, electronic instruction input data that performs logic
arithmetic, data storage communication control.
The IT Act has amended the banker book to Evidence Act to confer
equal status on e-records as compare to paper based document if a certified
copy of printout of bankers books has to be given then such printouts must
be accompanied by 3 certificates.
Section 2(A) has been inserted in the bankers book Evidence Act.
Conditions laid down:-
a. A certificate to the effect that it is the printout of such entry or a copy of
such printout by the principle accountant or branch manager.
b. A certificate by a person incharge of computer system containing a brief
description of a computer system and the particulars of :-
1. A safeguard adopted by the system to ensure that the data is entered
by an authorized person.
2. Safeguard also adopted to prevent any authorized change of data.
3. Safeguard also adopted to regain the lost data due to system failure.
4. The safeguard to the manner in which the data is transferable
removable media like floppy’s, disk, tapes and other storage devices.
5. The mode of verification to transfer the accurate data.
6. The mode of identification of such data storage devices.
7. Safeguard to tempering with the system.
8. Safeguard to protect the integrity and accuracy of the system.
c. A certificate from the person incharge of the computer system that to the
effect to the best office knowledge and belief that all data was genuinely
transferred to the person under which the printout is in question.
THE RBI:-
Section 58 of RBI 1934 through the IT Act 2000 the central board of RBI
has also being granted power for
The regulation of fund transfer though electronic means between the
bank or banks and other financial institution referred to in class (C) of Section
45(1) including laying down of the condition subject to which banks and
other financial institutions shall participate in such fund transfer, the manner
of fund transfer and the rights and obligation of the participate in such fund
transfer.
CONSUMER PROTECTION ACT
Q.) Who is Consumer and what are the objects of Consumer Protection
and whether cyber consumers are covered under the consumer
protection act?
The Consumer Protection Act is a social legislation it came into being
after the direction of United Nation Organization instruction that all
members of UNO must have its consumer law.
The main objective of the consumer protection is to provide a better
protection and to minimize the sufferings of consumers for these consumer
councils were established and consumer dispute redressed agencies were
also established.
The main object of the act is to protect the consumers from
exploitation.
Objectives:-
The main objectives of consumer are as under:-
1. The right to be given protection against the marketing of the goods
which are hazardous, dangerous to the life and property.
2. Right to get correct information on the quality, quantity, standard
and price of the goods that is to protect the consumer from unfair
trade practices.
3. The right to be able to make transform a variety of product at
competitive price.
4. The right to seek redressed against unfair trade practices or
exploitation.
5. The right to consumer education.
6. In order to meet the said objectives, to provide for the establishment
of consumer councils and authorities.
7. To empower the consumer council and other authorities to settle
consumer dispute and other matters connected with.
Q.) Who is Consumer?
Section 2(D) consumer means any person who
1. Buys any goods for the consideration.
2. Uses the goods and pays the consideration.
3. Hires the goods and pays the hiring charges.
4. Avails of any services of service provider for a consideration which has
been paid are promised to be partly paid or fully paid.
Explanation:- If any goods are purchased for commercial purpose that
does not cover under consumer protection such as goods purchased for
resale.
Are cyber consumer are covered under consumer Act:-
1. The cyber consumers are same as healthy consumer only there is a
difference in purchasing the goods or hiring the services.
2. Since the cyber consumer does not come face to face with the seller in an
online purchase of goods or hiring of services. The risk of defective goods
may be delivering.
3. As the goods are purchased online from the cyber market and delivered
later and the consumer does not get the opportunity to examine them.
4. Similarly E-commerce players including manufacturer, supplier, retailers
and service provider in India and abroad catering to the need of Indian
consumer must also be responsibility towards them under the Consumer
Protection Act.
DEFECT AN DEFICIENCY:-
1. Defect:- according to Section 2(1)(F) defect is defined as.
Any fault, imperfection, short coming, or in adequacy in the quality,
quantity, potency, purity or standard which is required to be maintained
by or under any law for time being enforced or is claimed by the trader in
any manner what so ever in relation to any goods.
Example:- Certain defects were found in the construction of a flat after
use by the owner of the flat. A case must field against the Tamil Nadu
housing board which denied its liability that it was stated in the
agreement that the occupation of the flat by the purchaser could be with
full knowledge of its nature of construction and neither the purchaser nor
anybody on behalf of the purchaser have the right to claim the
compensation regarding the defect in the construction. It was held by
National Commission (Court) that the complainant (purchaser) cannot be
debarred from claiming the compensation.
Consumer Complaint:-
Relief under Consumer Protection Act:-
The Consumer Protection Act has the following power to grant the
reliefs to the consumers against the opposite party.
1. To remove the defects from the goods.
2. To replace the goods with new goods free form all the defects.
3. To return the price to the complainant and pay the compensation for the
negligent to remove the deficiency in the services.
4. To discontinue the unfair trade practices.
5. Not to offer hazardous goods for sale.
Beware Consumer (Responsibilities or Duties of Consumer):-
Still the consumers are facing the same problem else the problems of
19th century there is a little change in the suffering of the consumer in today
although the Act has been passed in the year of 1986 the consumer needs to
be made aware of their rights as well as their duties there is also a need to
consumer education. The government of India started a National Level media
awareness campaign (“Jago Grahak Jago”) in 2005.
The slogan Jago Grahak Jago has become a household name as a result
of publicity campaign.
However a consumer have the following responsibility and has to
perform the following duties:-
1. Examine the expiry date of the product.
2. Check the MRP of the product before buying.
3. Check the quality of Mark on the product.
4. Check the Warranty and Guarantee Term.
5. Check the Net Quantity on the package.
6. Check the name of the goods.
7. And always ask for bills.
8. Ask the durability of the product from the seller.
9. Ask for exchange and return term.