Chapter 5
Chapter 5
Chapter 5
With the advent of the Internet, cyber law has become an emerging
field. Cyber law encompasses cyber crime, electronic commerce,
freedom of expression, intellectual property rights, jurisdiction and
choice of law, and privacy rights. Cyber crime involves activities like
credit card fraud, unauthorized access to computer systems, child
pornography, software piracy and cyber stalking. Electronic commerce
ar
includes with encryption and data security. Freedom of expression
includes defamation, obscenity issues and censorship. Intellectual
property rights cover copyright, software licensing and trademark
protection. Jurisdiction focuses on who makes and enforces the rules
el
governing cyberspace. Privacy rights addresses data protection and
privacy on the Internet.
For example, in cyber law there are only a limited number of cases on
point and no major statutory schemes on the books. Policy makers and
attorneys dealing with cyber crime are often confined to referring to the
imprecisely applicable and scarce existing statutes and cases1. In cyber
jurisdiction, the Court must address the question of which lawmaker has
jurisdiction over actions taking place on the Internet. In the few cases the
Courts have adjudicated, they have applied long-arms statutes and
personal jurisdictional principles in making decision. Due to the paucity
of cyber jurisdiction cases, there is a limited amount of law for the legal
practitioner for reference.
1 Stewart Biegel, The Emerging and Specialized Law of the Digital Revolution, Los Angele Daily
Journal, Jan. 25, 1996.
{276}
A. CYBER JURISDICTION:
ar
particular activity in cyberspace is controlled by the laws of the State or
country where website is located, or by the laws of the State where
Internet Service Provider (ISP) is located, or by the laws of the State
where user is located or by all these law?
el
The Internet can be seen as multi-jurisdictional because of the
ease which a user can access a Web site anywhere in the world. It can
even be viewed as a-jurisdictional in the sense that from the users
t
perspective state and national borders are essentially transparent 3 . For
Es
2 Ferrera G.R.: Cyber Law: Text and Cases (2001, Ohio) p.4.
3 David Post, Anarchy, State, and the Internet: An Essay on Law-Making in Cyberspace, 1995 J.
Online L. art. 3, Para. 36.
4.USDC, Western District of Pennsylvania, 1997 952 F. Supp. 1119, <http://zeus.bna.com/e-
law/cases/zippo.htm>
{277}
where the Internet service provider is located, by the laws of the state or
country where the user is located, or perhaps by all of these laws. 5 A
number of commentators have voiced the notion that cyberspace should
be treated as a separate jurisdiction.6 In practice, this view has not been
supported by the Courts or addressed by the lawmakers.
Cyber jurisdiction issues have been dealt with primarily in the civil
courts. Since the advent of U.S. v. Thomas7, and Minnesota v. Granite
Gate Resorts Inc8., however, cyber jurisdiction issues have begun to be
examined in criminal courts as well.
ar
(a) Cyber jurisdiction in Civil Cases:
Defendant, owner and operator of a small club called The Blue Note, in
Columbia, Missouri, had created a Web page, which allowed users to
order tickets to attend the clubs shows. The court had to decide whether
the creation of a Web site in Missouri containing a telephone number was
an offer to sell to citizens in New York.
{278}
The defendant argued the court lacked personal jurisdiction under
New Yorks long-arm statute. He defended all he had done was set up a
web site in Missouri aimed at Missouri residents. Furthermore, any
tickets sold over the Internet to users had to be picked up either at ticket
outlets in Columbia, Missouri, or at the club on the night of the show.
ar
someone can access information on the Internet about an allegedly
infringing product, it is not equivalent to a person selling, advertising,
promoting or otherwise attempting to target that product in New York.
el
Under Due Process, in order for the court to exercise personal
jurisdiction, it must be shown that the defendant had purposefully
established minimum contact with the forum state such that the
t
maintenance of the suit did not offend the traditional notions of fair play
and substantial justice. 11 The court ruled that the defendants simple
Es
creation of a Web site, that was available to any user who can find it on
internet, was not an act of purposeful availment of the benefits of the
state of New York. Creating a Web site was similar to placing a product
into the stream of commerce. The Web sites effect may be felt nationally
or even internationally, but this without more, was not enough to
establish an act was that purposefully directed towards the forum state.
Based on these rulings the Court held that an exercise of personal
jurisdiction would violate the protections of the Due Process Clause.12
11 Darby v. Compagnie Nationale Air France, 769 F.Supp. 1255, 1262 (S.D.N.Y.1991)
(quoting International Shoe Co. v. Washington, 326 U.S. 316 (1945).
12 Benususan, 937 F.Supp. at 301.
{279}
In Inset Systems, Inc. v. Instruction Set, Inc.13 the court held that
advertising over the internet was purposefully directed toward the forum
state14.
ar
In McDonough v. Fallon McElligott, 17 the court dismissed
plaintiffs contention stating that because the web enables easy world-
wide access, allowing computer interaction via the web to supply
sufficient contact to establish jurisdiction would eviscerate the personal
el
jurisdiction requirement as it exists. Thus, the fact that defendant has a
web site used by Californians cannot establish jurisdiction by itself18.
{280}
or entity, the states invocation of jurisdiction comports with its Due
Process obligations21.
ar
directed his activity in a substantial way toward the forum state.
The court in Zippo Mfg. v. Zippo Dot Com. Inc.,24 dealt with a
cyber squatting case, where the plaintiff sued an Internet news service for
el
trademark dilution, infringement and false designation for using the
domain names zippo.com, zippo.net, and zippo-news.com. The
court found jurisdiction and held that the likelihood of personal
t
jurisdiction being found can be constitutionally based on an entitys
presence on the Internet. The court held that the extent of an entitys
Es
21.Steven Jensen, Jurisdiction of the Internet: The Courts and Alternatives Solutions, at
http://www.suffolk.edu/law/hightech/classes/cyberlaw/siensen/ppaper.htm.
22.96 Cin. 3620, 1997 US Dist Lexis 206 (SDNY Feb. 26, 1997)
23.1998 us Dist Lexis 13154
24 952 F. Supp. 1119 (W.D.Pa. 1997)
{281}
should be determined by examining the commercial nature of the
exchange and the level of interactivity.
ar
(AABBS) from their home in Milpitas, California in February 1991.
The AABBS contained approximately 14,000 Graphic Interchange
Format (GIF) files. These files could be accessed by members who
possessed the password. Once the password was entered, the users were
el
able to select, retrieve, or download the GIF files to their own computers.
{282}
The defendant asserted that the GIF files were an intangible string
of 0s and 1s, which only became viewable images after being decoded
in the AABBS members computer. The court disagreed, ruling that the
fashion in which the images were transmitted did not affect their ability
to be viewed or printed out by members in Tennessee. The defendant also
argued that they were prosecuted under the wrong statute and that their
conduct, if criminal at all, fell within the prohibitions of the statute which
addresses commercial dial-a-porn operations. 26 The court declined to
accept this argument. Instead, it ruled that the statute must be construed
ar
to affect the intent of Congress, which was to prevent the channels of
interstate commerce from being used to disseminate any obscene matter.
flexible definition was needed because BBS operators could not select
who received their material.
{283}
communities it chose to serve. Accordingly, it was held by the court that
there was no need to develop a new definition of community.
The case turned on the fact that even though the GIF files never
actually left Northern California and were arguably not obscene under
Northern California, Bay Area standards 28 , they were obscene by the
standards of Memphis, Tennessee. The Court applied the community
standards of the geographic area where the materials were sent as the
proper test, in affirming the lower courts holding that defendants were
violating federal obscenity laws.
ar
In Minnesota v. Granite Gate Resorts Inc,
Minnesotas Attorney General had stated in its Interest warning was
tested in court. The Attorney General had asserted the right to regulate
29
the policy
el
the activities of an online gambling service based in Las Vegas, Nevada.
The Attorney General argued that the defendant had explicitly
misrepresented its service as lawful on its Web page.30 The court denied
t
the defendants motion to dismiss for lack of jurisdiction because of hits
from Minnesota at the defendants Website, the availability of a toll-free
Es
number that users could call advertised on its Web page, and the number
of Minnesota residents who had signed on to the defendants mailing list.
28 In 1992 the AABBS computers were seized by the San Jose high-tech crime unit,
scrutinized and found insufficiently offensive to warrant prosecution.
29. 65 USLW 2440, 1996 WL 767431 (D. Minn. Dec 10, 1996).
30 The advertisement on the Internet stated as follows: a. Wagernet will provide sports fans
with a legal way to Bet on sporting events from anywhere in the world 24 Hours a Day!
{284}
these policies in mind, the court must then consider the reasonableness of
assertion of jurisdiction examined in the light of the interest of the federal
government in its foreign relation policies. When extending jurisdiction
into the international field great care and reserve must be exercised.31
Because of these sovereignty concerns, there is a higher jurisdictional
barrier when litigating against a foreign national.32
ar
The Supreme Court in Asahi Metal Industry Company v.
Superior Court, 35 indicates that a plaintiff seeking to hale a foreign
citizen into court in the United States must meet a higher jurisdictional
el
threshold than is required when the defendant is a United States citizen.
In Asahi the court found that even though Asahi had minimum contacts
with the forum state, it would be unreasonable and unfair to find
t
jurisdiction for three reasons: (1) the distance between defendants
headquarters in Japan and the Superior Court of California and the
Es
31 Asahi Metal Industry Company v. Superior Court, 480 U.S. 102 (1987).
32 Simatra v. national Enquirer, 854 F.2d at 1119.
33 Asahi Metal Industry Company v. Superior Court, 480 U.S. 102 (1987).
34 Core-vent Corp. v. Nobel Industries AB., 11 F.3d 1482 (9th Cir. 1993)
35 480 U.S. 102 (1987).
{285}
Playboy Enterprises, Inc. v. Chuckleberry Publishing, Inc.36 is
an international civil case involving trademark infringement. In that case
court sidestepped the issue of international cyber jurisdiction relying on a
previous 1981 injunction against the defendant to base its finding of
jurisdiction. Nevertheless, the case provides useful insights into the
application of cyber jurisdiction principals in international cases.
ar
be satisfied as little as one contact. The trend appears to be that
information providers must comply with the limitations of the laws
wherever the user is located, or find themselves subject to the users state
el
jurisdiction, and its civil and criminal laws. Case law indicates that the
courts are inclined to expect the information provider to determine where
the user is located and to block access to their site if access would be
illegal in the users locale. If they own an 800 or 900 number, they could
t
also be expected to block certain area codes to avoid prosecution.
Es
However, the law has gone much further. It shall also apply to any
violation or contravention of the provisions of this Act done by any
person anywhere in the world. By means of this provision, the law is
assuming jurisdiction over violators of The Information Technology Act,
2000 outside the territorial boundaries of India. This provision is
explained perhaps by the unique nature of cyberspace, which knows no
boundaries.
{286}
The Information Technology Act, 2000 specifically provides that
unless otherwise provided in the Act, the Act also applies to any offence
or contravention there under committed outside India by any person
irrespective of his nationality37. It is however clarified that the Act shall
apply to an offence or contravention committed outside India by any
person if the act or conduct constituting the offence or contravention,
involves a computer, computer system or computer network, located in
38
India. The words act or conduct constituting the offence or
contravention involves a computer, computer system or computer
ar
network located in India are very significant to determine jurisdiction of
the IT Act over acts committed outside India. For assuming jurisdiction
over an act constituting an offence or contravention under the IT Act,
which is committed outside India, it has to be proved that the said act
el
involves a computer, computer system or computer network located in
India.
the site unless the creation or maintenance or running of the site involves
a computer, computer system or computer network located in India. But
where the said website uses a server or any other computer network
located in India, the IT Act would assume jurisdiction to question the
website under section 67 of the IT Act.
{287}
person anywhere in the world plants a virus into a computer system
located in India, he would be liable under Section 43(c) of the IT Act to
pay damages by way of compensation net exceeding Rs. 1 crore to the
victim.
ar
fundamental principle on jurisdiction is the same under the IT Act39 and
the Criminal Procedure Code, 1973, though stated differently. The basic
legal principle of jurisdiction under the Code of Criminal Procedure,
el
1973 is that every offence shall ordinarily be inquired into and tried by a
court within whose local jurisdiction it was committed.40 These principles
in the Code of Criminal Procedure, 1973 apply for determining
jurisdiction in trial by courts as well as in investigation by the police. In a
t
case where an offence is committed in more places than one, or partly in
Es
{288}
In a case where an act is an offence by reason of anything, which
has been done and of a consequence, which has ensued, the offence may
be inquired into or tried by a court within whose local jurisdiction such
act has been done or such consequence has ensued43. For instance, in a
case of defamation, either of the courts, i.e. of the place from where the
defamatory letter was e-mailed and the place at which it was published or
received, if different, shall have jurisdiction to inquire and try the same. ]
ar
can be tried for the offence of cheating either at place X or Y. in a case
where a person in Bombay does an act of hacking of a computer system
located in Delhi, he may be tried either in Bombay or Delhi.
el
In a case where an act is an offence by reason of its relation to any
other act which is also an offence or which would be an offence if the
doer was capable of committing an offence, the first mentioned offence
t
may be inquired into or tried by a court within whose local jurisdiction
either of the acts was done. For instance, in a case of manufacture of sub-
Es
{289}
was received or retained or was required to be returned or accounted for,
by the accused person45.
ar
The law also provides that in the case of any offence which
includes cheating, if the deception is practiced by means of letters or
telecommunication messages, it may be inquired into or tried by any
court within whose jurisdiction such letters or messages were sent or
el
where the same were received46. Moreover, any offence of cheating and
dishonestly inducing delivery of property may be inquired into or tried by
a court having jurisdiction on the place where the property was delivered
t
by the person deceived or where it was received by the accused person.47
Es
{290}
In such circumstances, all other proceedings with respect to that
offence shall be discontinued. Where two or more courts have
jurisdiction over an offence, the choice of the court for institution of the
case lies with the complainant. He will obviously choose the forum,
which is most convenient for him and most inconvenient for the accused.
ar
when the parties interacting or transacting are not physically face to face
{291}
the victim is inflicted with the injury, whether personally, for instance by
fraud, or on his computer, computer system or computer network.
ar
Further compounding the problem is the issue that a particular act
in one national jurisdiction is legal and not barred by law but the same
el
activity is illegal and barred by law, prevailing in another national
jurisdiction. Another ground of criticism has been that Section 1 does not
lay down the parameters of how such a provision would be enforceable in
t
practical terms across transnational boundaries and jurisdictions.
Governments can take recourse to the extradition process to bring to
Es
{292}
of jurisdiction. This becomes all the more evident from the emerging
principles from various judgments relating to Jurisdiction over Internet.
From the beginning of Internet, the issue of jurisdiction has continued to
challenge legal minds, societies and nations in the context of the
peculiarly inherent character of the Internet. Section 1(2) and Section 75
of the IT Act, 2000 provide for extra-territorial jurisdiction of the Indian
courts, which, however, seem implausible to be implanted. The courts in
India at present have not been uniform in following the US trend of
asserting jurisdiction on the basis of active accessibility of site. So far, in
ar
various Internet domain names related cases, the Delhi High Court has
assumed jurisdiction merely on the basis of accessibility of Internet.
{293}
response, the plaintiff deposited the amount of 81.12 lakhs through a
cheque in favour of BCCL which accepted the cheque and encashed it
but did not deliver the coal to the plaintiff. Instead, it (BCCL) informed
the plaintiff through e-mail communication that the said e-auction stands
cancelled due to some technical and unavoidable reasons. The plaintiff
found that the e-auction of sale of coal was cancelled by BCCL as there
was some other person whose bid for the same was higher, which had not
been considered earlier due to some flaw in the computer or its program
or feeding of data.
ar
The plaintiff (P.R. Transport) challenged the validity of
cancellation of its contract by the defendant in the High Court of
Allahabad. The defendant (BCCL) objected the territorial jurisdiction of
el
the Court on the ground that the High Court of Allahabad had no
jurisdiction in the case as the cause of action had not arisen in the state of
Uttar Pradesh. The plaintiffs, on their part, argued that the case fell
within the jurisdiction of the Court because the communication of
t
acceptance of the tender was received by them through e-mail in
Es
Chandauli in U.P. Having heard both the parties, the High court held that
in case of e-mail acceptance, the data transmitted from anywhere by the
account-holder goes to the memory of server, which may be located
anywhere and can be retrieved by the addressee account-holder from
anywhere in the world. Therefore, there is no fixed point either for
transmission or for receipt of e-mail. As provided in Section 13 (3) of the
Information Technology Act, 2000, an electronic document is demand
to be received at the place where the addressee has his place of business.
{294}
Allahabad High Court had the jurisdiction to decide the case. On the
basis of decision in this case, it may be concluded that the judicial trend
with regard to exercise of jurisdiction by courts in cybercrimes must
conform to the norms of fair play and justice, which invariably depend on
following considerations:
ar
(c) the forum of States interest in adjudication of the dispute;
The internet culture in its wake has give rise to a number of online
disputes, differences, and controversies etc. resulting out of misuse of
abuse of computer networks for illegal activities. Though disputes as
such are not new to human society as they are known to have existed ever
since the dawn of human civilization, but the distressing factor is that
disputes relating to online transactions are entirely diverse in their nature,
scope and treatment and therefore, the resolution of these cyber-related
disputes has emerged as a serious challenge for the courts of law because
{295}
of the details involved in them with which the Judges are not thoroughly
conversant.
ar
iii. Variations in the legal systems and laws and procedure of different
countries as regard admissibility of cyber-related cases; and
el
iv. Uncertainty as to the exact definition of cybercrime and activities
which can be included within the ambit of cybercrime.
{296}
new situations. Various new developments leading to various kinds of
crimes unforeseen by our Legislature came to immediate focus.
Information Technology Act, 2000, although was amended to include
various types of cybercrimes and the punishment for them, does not deal
with all problems which are faced by the officers enforcing the Act.
ar
the offence was committed and its consequence on the victim or the
society also has a bearing on the sentencing of the accused.
{297}
Some international and national judicial responses on cybercrime
have been given below to put in the legal perspective of the issue.
ar
moral fabric of the society. Publishing the pornographic material,
therefore, it becomes urgent that the malaise of the same should be
checked Computer and internet are the easiest methods of circulating and
Generation, publication and circulation.
el
Pornography has been defined in the Oxford Dictionary as The
explicit description or exhibition of sexual subjects or activity in
literature, painting, films etc., in a manner intended to stimulate erotic
t
rather than aesthetic feelings; literature etc. containing this.53
Es
53 Amita Verma: Cyber Crimes & Law, 2009, Ist Edn. Central law Publications, p-120).
54 J.P. Mishra: An introduction to Cyber Laws. Ist Edn: 2012 Central law Publications, p-187).
55 74 F. 3d 701 (6th Cir. 1996) (USA)
{298}
convicted for delivering pornographic material which is an offence under
federal obscenity laws. The court laid down certain important principles
of law. It was held that GIF files are not intangible for the purpose of
federal obscenity laws. The distribution of obscene materials would fall
within the expression of knowing even without defendants having
specific knowledge of each individual transmission.
jurisdiction there.56
ar
downloading that occurred in Tennessee and thus amenable to
the First Amendment and the conversation through the internet could not
be used against him in evidence. The Court, however rejected the defence
and held that the Communications Decency Act under which the charges
were brought against the accused, criminalises the use of internet and
telephone lines for the purpose of attracting a minor into sexual activity.
56 Farooq Ahmad: Cyber Law of India (Law on Internet), 3rd Edn. New era Law Publication, p-408.
57 1997 (16) 997 F. Supp. 246 (USA).
58 A decision by the Crowns court, dated 30 June, 1999
{299}
US based Internet Service Provider (ISP). When charged of publishing
obscene articles contrary to S. 2(1) of UKs Obscene Publications Act,
1959, the defendant claimed that since he had published the said porn
literature abroad, the UK law did not apply to his act and, therefore, a UK
Court had no jurisdiction in his regard.
The Court, however, did not accept either of the pleas forwarded
by the defendant. The Court observed that, under section 1 (3) (b) of the
Obscene publications Act, 1959, publishing included data stored
electronically and transmitted. Since to transmit meant to send from one
ar
place or person to be other, in the instant case, the act of publication took
place as soon as the defendant transmitted the data to the service provide;
and the publication or transmission also took place while the data was
el
received. In case of the viewers from UK, the sending and receiving both
took place in UK, that is, within the jurisdiction of the Court; and it was
irrelevant that the transmission may have left the jurisdiction (for some
time) between the sending and receiving. Arguing thus the Court held
t
that it had the jurisdiction to prosecute the accused for pornography.
Es
59 J.P. Mishra: An introduction to Cyber Laws. Ist Edn: 2012 Central law Publications, p-188).
{300}
Sukanto Haldar v. State of West Bengal60 case were relating to
magazine Nara Nari which was treated as obscene publication.
Therefore, to give effect to public morality above art, literature the court
under s. 292 of the Indian Penal Code 1860 convicted the petitioner and
sentenced him to two months rigorous imprisonment and fine of Rs. 200
in default to rigorous imprisonment for two weeks.61
ar
photographs and the descriptions of their practices. The accused was
charged for such pornographic distribution in public as an offence
because it corrupts the mind of people or individuals and this act was
treated by court as a conspiracy to corrupt public morality. The
el
judiciary referred here
(i) John Staurt mills principle of harm to others mentioned in his book
t
On liberty;
Es
(ii) The conclusion of the debate of H.L.A. Hart and Prof. Devline about
enforcement of morality by law where they concluded with the need
of the balance between law and morals and shared morality; and
{301}
without causing harm to others, the State shall not enter into
individuals private liberty and the same activities will not be treated
as a crime.
ar
However, obscenity is any material, which tends to corrupt, cause
annoyance, something of horror, indecent, immoral or with sexual
tendency. Pornography means any material in writing, picture or other
el
form, which is intended to arouse sexual desire. Both are against public
morality and decency.64
{302}
On 26th September 2001, the Division Bench of the Bombay High
Court consisting of B.P. Singh, CJ and Dr. D.Y. Chandrachurd, J.; and
passed an order to appoint a committee to suggest and recommended
ways of preventive and controlling measure and means to protect
children from access to pornographic and obscene material on the
internet.
ar
porn i.e., Protecting Minors from Unsuitable Internet Material on 30 th
(b) Procedures for licensing cyber fares as none are as yet licenced
or regulated.
{303}
(f) Providing for the maintenance of internet protocol address
allocation time-stamped logs for all machines in the cyber caf
network.
ar
(a) Electronic mail and website information to be provided by internet
el
service providers informing the public about hazards and possible
solutions.
{304}
documents in support of the prosecution case. The facts of the case were
as follows.
ar
accused was a known family friend of the victim who was residing in
Mumbai and was interested in marrying her. She, however, married
another person whom she divorced after sometime, so the accused again
el
started contacting her for marriage with him, to which she declined.
Thereupon, he started harassing her by sending obscene and defamatory
e-mails.
t
The accused was charged under Section 67 of the I.T. Act, 2000
read with Sections 469 and 509 of the Indian Penal Code. He pleaded that
Es
the offensive e-mails might have been sent to the complainant (lady)
either by her ex-husband whom she had divorced or she might have
herself managed to do so in order to implicate the accused because he
had turned down her request to marry her. It was also argued on behalf of
the accused that documentary evidence against him were not sustainable
under Section 65(b) of the Indian Evidence Act. The Court, however,
relied upon the expert witnesses and other evidence before it including
the witnesses of cyber caf owner and convicted the accused for the
offence under Sections 469/509; IPC and Section 67 of the I.T. Act.
{305}
The accused was sentenced to undergo rigorous imprisonment for
2 years and to pay a fine of Rs. 4500/- for the offence under Section 469,
and imprisonment for one year with a fine of Rs. 500/- for the offence
under Section 509 of IPC, and a sentence to undergo simple
imprisonment of 2 years and a fine of Rs. 4000/- for an offence under
Section 67 of the Information Technology Act. All the sentences were to
run concurrently.
ar
respondents 2 to 6 were accused facing trial for the offence of cyber
pornography under Section 67 of the Information Technology Act, 2000
read with Section 6 of the Indecent Representation of Woman
el
(Prohibition) Act, 1986 and Section 5 and 6 of the Immoral Traffic
(Prevention) Act, 1956 as also under Section 27 of Arms Act, 1959 and
Sections 120-B, 506(ii), 366, 306 and 375, IPC. The accused named Dr.
L. Prakash allegedly exploited certain men and women for the purpose of
t
making pornographic photos and videos in various acts of sexual
Es
intercourse and selling them to foreign websites. The case was tried by
Vth Fast Track Court, Chennai which was presided over by a lady Judge
as that Court happened to be a Mahila Court constituted by the
Government of Tamil Nadu for speedy trial of cases of offences
committed against women.
While the trial was pending before the said Fast Track Court, the
accused filed revision petition against the Court order rejecting their
demand of supply of copies of 74 compact discs (CDs) containing
alleged pornographic material. The revision petition was rejected by
67. Criminal Appeal 63 of 2005 arising out of SLP (Cri) No. 1606 of 2004 decided by the Supreme
Court on January 11, 2005.
{306}
Madras High Court holding supplying such a large number of copies of
CDs was not possible as it may give room for copying such illegal
material for further circulation. The Court, however, permitted the
accused persons to peruse the CDs in the chamber of the Presiding Judge
in the presence of their advocates, the expert and public prosecutor.
ar
of the said case to some male Judge, it was for the Presiding Lady Judge
to choose whether she wanted to try to case herself or get it transferred to
a male Judge colleague. The High Court, however, transferred the case to
el
Fast Track Court IV which was presided by a male Judge as requested by
the Public Prosecutor but without hearing the petitioner.
that such transfer was contrary to the object creating Mahila Courts, as
also the earlier decision of the Apex Court. The High Court rejected the
appeal and therefore, the appellant went in appeal before the Supreme
Court.
The Apex Court held that the entire approach of the High Court in
the instant case was against the interest of the witnesses who were really
the victims in the case. The Court further observed that since the
Presiding Lady Judge had not expressed any embarrassment, it was
unreasonable to presume that it would cause here embarrassment, more
so when she had not expressed any desire that the case be transferred to
{307}
some male Judge. Allowing the appeal, the Apex Court held that the
High Court should not have interfered in the matter.
The Additional District Court and Sessions Court here was upheld
a lower courts verdict in the first cyber case State v. Ts. Balan and
Aneesh Balan68 filed in the State sentencing a Pentecostal Church priest
and his son to rigorous imprisonment in 2006.
Disposing of the appeal filed by the priest T.S. Balan and his son,
Aneesh Balan, against the order of the Chief Judicial Magistrate.
ar
Additional District Judge T.U. Mathewkutty said it was time the
government took effective measures to e court check the growing trend
of cyber crimes in the state. The court upheld the magistrates order
sentencing the two to three-year rigorous imprisonments and imposing a
el
fine of Rs. 25,000 under section 67 of the Information Technology Act;
awarding six months rigorous imprisonment under section 120(B) of the
Indian Penal Code; and ordering one year rigorous imprisonment and
t
imposing a fine of Rs. 10,000 under section 469 of the code. The court
revoked the sentence under Section 66 of the IT Act. Te cyber case dates
Es
back to January-February 2002 and the priest and his son became the first
to be convicted of committing a cyber crime.
{308}
accused, who edited a local magazine called The Defender, wrote about
these photos in his publication.
Valsan received the pictures on the Internet and asked his father to
file a complaint to the police. A police party raided the house of Balan
and his son at Perumbavoor and collected evidences. The magistrates
verdict came after a four-year trial, for which the court had to procure a
computer with Internet connection and accessories. The police had to
secure the services of a computer analyst too to piece together the
evidence. Twenty-nine witnesses, including the internet service provider
ar
and Bharat Sanchar Nigam ltd., had to depose before the court.
{309}
In United States v. Crandon,69 Richard Crandon pleaded guilty
before the Court for receiving child pornography. His crime was much
more than just downloading the illicit material from the internet. Crandon
met a fourteen year old girl online and ultimately meeting with her to
have sexual relations and took the photographs of that intercourse.
Crandon and the girls use to frequently interact over the telephone and
used to discuss about their future prospects. The girl wanted to go to New
Jersey from Minnesota along with Crandon. They went about
materializing their plan and left for New Jersey form Minnesota. On their
ar
way they came to know that the authorities were looking for them. The
girl was sent from Minnesota. Crandon contested the deprivation of his
access to the Internet during the period of his imprisonment on the
ground that the Court has to seek the prior approval from the probation
el
officer. Further he pleaded that the non accessibility would hinder his
employment and the business wince computers and the internet are
inextricably tied. Court upheld that the restrictions was tenable in the
t
light of the first amendment which related to the protecting the interest of
the public.
Es
{310}
chat room to exchange child pornography was sufficient to constitute
portable cause in obtaining search warrant.
ar
In United State v. Gray,73 the court held that child pornography
discovered during a search conducted pursuant to obtaining a warrant for
materials related to computer tampering was admissible. Defendant
el
argued that files with the .JPG extension were presumptively pictures and
not related to subject of search. Court noted that hackers frequently
mislabel files, and FBI agents were not required to take file names at face
t
value.
Es
{311}
In U.S. v. Jesus Norberto Evans-Martinez,75 the defendant was
convicted for sending emails advertising the creation of a Yahoo! Group
for sharing child pornography.
ar
The Airforce Bal Bharti School Case77 was filed in the Juvenile
court, Delhi on the charge of cyber pornography. Some jurists say this is
the first Indian cyber pornographic case which was charge sheeted in the
juvenile court. The brief facts in issue were that a student of the Airforce
el
Bal Bharti School, Lodhi Road, New Delhi was arrested by the Delhi
Police in the year 2001 April.
The alleged accused was then a class XII student who created a
t
pornographic website as revenge of being teased by classmates and
Es
75 05-10280, 448 F.3d 458. (Vakul Sharma: Information Technology, Law and Practice, IIIrd Edn.
Universal Law Publishing Co. new Delhi, p-218).
76 1D02-4638, 873 So. 2d 430. (Vakul Sharma: Information Technology, Law and Practice, IIIrd Edn.
Universal Law Publishing Co. new Delhi, p-218).
77 The Air Force bal Bharti, Delhi Cyber Pornography Case 2001
{312}
In another case, a Swiss Couple78 in Mumbai would gather slum
children and then force them to appear for nude and obscene
pornography. They would then upload these photographs to websites
specially designed for pedophiles. The Mumbai Police arrested the
couple for pornography and charged them for the offence of cyber
pornography under Section 67 0f the I.T. Act read with Section 292 and
509, IPC. But they were later let off for want of sufficient evidence
against them.
ar
was an online auction website and Avnish Bajaj was in Chief Executive
Officer (CEO). He was arrested in December, 2004 for distributing cyber
pornographic material. The charges against him arose from the fact that
el
someone had sold copies of pornographic CD through Baazee.com web-
site. The CD was also being sold in the Delhi market. It was as a result of
joint action of Delhi and Mumbai police that the accused was arrested.
However, he was later released on bail by the Delhi High Court as there
t
was no prima facie evidence that Mr. Bajaj directly or indirectly
Es
published the said pornography and the actual obscene recording of chip
could not be viewed on Baazee.com. The investigation in this case
revealed that Bajaj was of an Indian origin and had family ties in India.
His companys web-site i.e. Baazee.com was a customer web-site which
was dealing online sale of property on commission basis. An obscene
MMS clipping A DPS girl having fun was listed for sale on
Baazee.com on November 27, 2004 and some copies of this clipping
were sold by the company.
{313}
The accused Mr. Bajaj in his defence pleaded that Section 67 of
the Information Technology Act under which he was charged and
arrested relates to publication of obscene material and not the
transmission of such material. Moreover, having come to know about the
illegal character of the disputed CD, he initiated steps to immediately
stop the sale within 38 hours since the intervening period was a week-
end. He further contended that the said obscene clip could not be viewed
on the portal of Baazee.com and the sale proceeds were not routed
through him.
ar
The question for decision before the Court in this case was to
draw a distinction between internet service provider (ISP) and content
provider. The Court ruled that the burden rests on the accused to prove
el
that he was only the service provider and not the content provider. The
court held that accused deserved to be released on bails as the evidence
showed that the obscene material may have been unwittingly offered for
sale on his companys web-site and there was probability of the alleged
t
crime having been actually committed by some other person. The
Es
accused was, however, ordered to furnish two sureties of one lakh rupees
each and surrender his passport and not to leave India without the
permission of the Court. He was finally enlarged on bail subject to
condition that he shall participate and assist in the investigation.
80 Criminal Appeal No. 907 of 2009 (Arising out of S.L.P. (Crl.) No.3336 of 2006).
{314}
of 18 years on or before the date of commencement of the Act and were
undergoing sentence upon being convicted.
The term Internet Fraud is very comprehensive but has not been
specifically defined under the IT Act. This term will possibly include
other crimes also which have been expressly defined in the IT Act. The
frauds through Internet Frauds will take a variety of forms and their
classification cannot be easily maintained. The courts in America are
busy to resolve Internet frauds
ar
United States v. Morris81 is one of the landmark case in the USA
which deals with cyber fraud. Morris, the accused was held guilty of
el
violating Title 18 U.S.C.s. 1030(a)(5)(a) by the Jury in trial. Morris was
authorised to use computers at Cornell, Harvard and Berkeley. He was
authorised to communicate through internet to other computers, computer
system and network. He was authorised to send e-mail, collect
t
informations etc. He transmitted worm which was considered as
Es
81 928 r. 2d 505 (2nd cir), Cir Court denied, 502 U.S>817 (1991).
{315}
to a protected computer be punished. Morris contended that his conduct
was almost exceeding authorised access. And the evidence was also not
sufficient to convict him of unauthorised access. The Circuit Judge
Newman affirmed the District Courts judgment.
ar
duped the business world to the tune of Billions of US dollars. It is
reported to be the fifth largest industry in Nigeria operated by
unscrupulous business elites under the successive Government of that
el
country. The modus operandi of the scam is as follows:
to pay an advance fee of some kind which may be in the form of transfer
tax, performance bond or for credit privileges. Once the victim pays
the fee, many more requests for advance payments on one pretext or
another come to the victim until he either decides to quit or runs out of
money, or both.
82 US Department of State of International Narcotics and Law Enforcement Affairs (April, 1997).
{316}
also Nigerian Embassy and the Central Bank of Nigeria. Those who have
fallen a pray to such scam may also file a complaint with the Nigerian
Economic and Financial Crimes Commission. In Canada, the regional
offices of the Commercial Crime Branch may be contracted for redressal
and relief. In UK, those effected or cheated by the 419 Advance Fee
Fund Nigerian Scam may forward their complaint to local fraud squad
for investigating quoting NCIS (Western African Organised Crime
Section) in the correspondence. Under no circumstances reply should be
sent to the fraud operators. Anyone outside the UK may also seek help
419 fraud.83
ar
and advice from UK in case he received a 419 letter or falls a victim to
In FTC v. Craig Lee Hare,84 the action was for deceptive trade
practices arising from on-line auction offering sale of computer
el
products that were never delivered. The defendant pleaded guilty to wire
fraud and was sentenced to six months home detention, three years
probation and ordered to pay restitution of over $22,000. He was also
t
barred for life from conducting internet commerce.
Es
In United States v. Hoke,86 a suit was filed against Gray Hoke for
disseminating misinformation on a counterfeit Bloomberg News Service
Web page regarding an alleged merger between his employer PairGain
83 The London Metropolitan Police website maintains an excellent section on 419 Advance Fee Fund
(AFF) Fraud.
84 S.D. Fla. 4/*/98 (USA)
85 35 F. Supp. 2d 1189 (N.D. Cal. 1999) (USA)
86 Magistrate No. 99-889M (C.D. Cal. 4/14/99) (USA)
{317}
Technology, Inc. and ECI Telecom Ltd. Initial investigation by the FBI
revealed that Hoke might use services of Angelfire.com to host the page
and Hotmail email service. Hoke was traced by IP addresses from these
services. Hoke pled guilty and was sentenced to five months of home
detention, five years probation, and restitution of $93,086.77.
ar
never delivered computers. The court held defendant liable for fraud by
using the Internet website to solicit orders for non-existent computers.
{318}
diligence. It also took a digital photography showing the delivery being
accepted by Arif Azim.
Nearly one and a half month after this transaction, the credit card
agency informed Sony (India) company that it was an unauthorised
fraudulent transaction as the real owner had denied having made the
purchase. Thereupon, the company lodged a complaint for online
cheating to the CBI which registered a case against Arif Azim under
Section 418, 419, 420 of the Indian Penal Code.
ar
The investigation of the case revealed that the accused Arif Azim
who was working at a cal center at Noida gained access to the credit card
number of an American national, which he had misused on the
companys website. The CBI recovered the coloured TV and cordless
el
headphone from Arif Azim. The Court on the basis of evidence of
witnesses and material before it found Arif Azim guilty of offence under
Section 418, 419, 420, IPC and convicted him for cyber fraud and
t
cheating. However, in view of the young age of the accused i.e. 24 years
and this being his first conviction, the Court ordered his release on
Es
89 The Times of India, 24th April 2005. See also http://www.ecommercetimes .com/story/42112.html.
{319}
aspects of crime not covered by ITA-2000 but covered by other statutes
since any IPC offence committed with the use of "Electronic Documents"
can be considered as a crime with the use of a "Written Documents".
Cheating", "Conspiracy", "Breach of Trust" etc are therefore applicable
in the above case in addition to section in ITA-2000. Under ITA-2000 the
offence is recognized both under Section 66 and Section 43. Accordingly,
the persons involved are liable for imprisonment and fine as well as a
liability to pay damage to the victims to the maximum extent of Rs 1
crore per victim for which the "Adjudication Process" can be invoked.
ar
In yet another case, i.e. Infinity e-search (Gurgaon BPO),90 a
young person Karan Bahari aged 24 years was working for a Gurgaon
based website designing and online marketing firm Infinity e-search. He
el
was alleged to have fraudulently sold information on 1000 bank accounts
of British customers from an Indian call centre to an undercover British
journalist working for a British newspaper, The Sun for 2750 pounds.
The employee karan, however, denied the charge and claimed that he was
t
only a middleman and that he did not sell data collected by his employer
Es
In this case, it was alleged that the British journalist for The Sun
used Karan Bahari who was working in the Infinity e-search, as an
intermediately, offered him a job and requested for a presentation on a
CD and later claimed that the CD contained confidential data about
thousand bank accounts of British customers who were customers from
an Indian call centre. However, on investigation, the fact that the CD
{320}
contained such data could not be substantiated by the journalist and
therefore, the charges of fraud could not be proved against Karan Bahari
or his employer i.e. the infinity e-search company. But the case has raised
on apprehension that there is possibility of an anti out-sourcing backlash
if Indian online companies do not take sufficient care of the data which
they handle.
ar
improve Indias prospects as an outsourcing destination. The National
Association of Software and Services Companies (NASSCOM)
announced setting up an independent watchdog self regulatory
el
organization (SRO) in April, 2007 for setting out data security standards
for the software industry with focus on global practices.
91 DIT (International Taxation) Mumbai v. Morgan Stanley & Co. Inc. decided on July 9, 2007
{321}
In Delhi Credit Card Fraud Case, 92 Court of Metropolitan
Magistrate Delhi found guilty a 24 year old engineer working in a call
centre, of fraudulently gaining the details of Campas credit card and
bought a television and a cordless phone from Sony website.
Metropolitan Magistrate Gulshan Kumar convicted Azim for cheating
under sections 418, 419, 420 of the IPC, but did not send him to jail.
Instead, Azim was asked to furnish a personal bond of Rs. 20,000 and
was released on a years probation.
ar
Hotel Le Meridien, Pune were cheated. Four persons were creating
duplicate credit cards from those belonging to customers and then using
them to make purchases. One of the person was a cashier at the Chingari
el
Restaurant in Hotel Le Meridien, and he used credit card skimmers and
readers which recorded details of the credit card being swiped. These
details were then copied on blank cards with magnetic strips. Altogether
they used 33 cards of 27 banks among themselves to go on a shopping
t
spree, with the total amount of such purchases being pegged at Rs. 1
Es
crore. The type of cards being targeted were the higher end ones, namely,
Gold, Titanium, Platinum and corporate cards, where the credit limit was
higher. This came to light when a Citibank employee went to the hotel
with some friends and lodged a police complaint after getting his card bill
with exorbitant purchases that he had no idea about.
Every person has a right to have his reputation preserved inviolate. This
right of reputation is acknowledged as an inherent personal right or every
92 Advocate, Prashant Mali: Cyber Law & Cyber Crimes, Ist Edn. 2012, Snow White Publications. P-
60.
93 Ibid.
{322}
person. It is a jus in rem, a right good against the entire world. A mans
reputation is his property, more valuable than other property.94
ar
users can post messages without verification by moderators. Minors are
increasingly using web forums and social networking sites where such
information can be posted as well. Criminal behavior can include the
el
publication of intimate photographs or false information about sexual
behaviours.
unfair business tactics through computer network. The District Court held
that, the computer service that provides subscribers with access to
electronic news or publication put together by independent third party
and loaded into companys computer website was a mere distribution of
information for which it could not be held liable for defamatory
statements made in the said news or publications unless it is shown that
computer company knew or had reason to believe of the existence of
such defamatory contents. The court further ruled that just as a public
library, bookstore or news stand does not have any editorial control over
{323}
the publications it distributes so also a computer company does not have
any control over the publications it distributes so also a computer
company does not have any control over its publications nor is it feasible
for it to examine the contents of any publication and see if it carries any
defamatory statements.
ar
publication unless it is shown that it had the knowledge or knowledge or
reason to believe about the existence of such libelous contents thereof.
96 Ibid.
97 (1995) NY Misc. Lexis 229 (US)
98 N.Y. Court of Claims, March 2000 (USA)
{324}
In Norway v. Tvedt,99 the accused was the founder of a far right
group in Norway. He was convicted for posting racist material that mixed
neo-Nazism, racial hatred, and religion, on a website. He was held
responsible for the material despite the fact that it was posted on a server
that was based in the United States.
ar
defamatory statements only to the person defamed is not publication.
Director Mr. R.K. Malhotra in order to malign the high reputation of the
company and its subsidiaries all over India and abroad. The plaintiffs
contended that such defamatory e-mails by the defendant were in blatant
violation of their legal right and the motive of the defendant in sending
such defamatory e-mails was to retaliate against the termination of his
services of by the management of the company. On the basis of evidence
produced before the Court, the defendant was found guilty of cyber
defamation therefore; the High Court of Delhi passed an ex-parte ad
{325}
interim injunction against the defendant restraining him from sending the
said defamatory, obscene, vulgar and abusive messages.
ar
toxicwriters identity. This is only the interim order. It is unclear as to
whether the company has asked for damages against Google (and
whether safe harbors will come into play).
el
Google seeked to comply with the order as not only the blog
which was available at www.toxicwriter.blogpost.com but also its cache
is available on Google. A few snapshots though were made available on
t
another website. Free Speech and Privacy issue notwithstanding Google
may give the identifying information of the blogger. The reason for this
Es
is its own privacy policy. It stated that, [w]e have a good faith belief that
access, use, prevention or disclosure of such information is reasonably
necessary to satisfy any applicable law, regulation, legal process or
enforceable governmental request.
103
In Tata Sons v. Greenpeace International, Justice S.
Ravindra Bhat, authoring the judgment noted that, though the internet has
a wider reach and potential for injury, traditional standards for the grant
of injunctions in cases of libel will be applicable. The court reasoned that
these traditional standards are well developed and there is no
{326}
constitutional mandate which allows the court to create a differentiation.
If this reasoning is strictly applied it would mean that the conventional
rules of defamation. If applied liberally, courts may in cases of a
legislative vacuum, apply other developed legal principles without
differentiation. [Cyber defamation Injunction not granted].
In the case of Tata Sons vs. Turtle International, the Delhi High
Court has held that publication is a comprehensive term, embracing all
forms and mediums including the Internet. That an internet
publication has wider viewership, or a degree of permanence, and greater
ar
accessibility, than other fixed (as opposed to intangible) mediums of
expression does not alter the essential part, i.e. that it is a forum or
medium. There is much sense to have more defined criteria taking into
el
account the nature of the internet content. Injunctions on internet content
should not be readily granted (especially ex-parte) since, firstly the
internet is an easy, self publishing platform providing a medium of
expression for marginal individuals not having corporatist outlets.
t
Secondly, the internet facilitates the distribution of content for a minor
Es
cost to a vast audience. Both the alleged injury and the free speech
concern are greater due to the wider dissemination of the content. These
are only some of the concerns which set the internet apart and it is
desirable to have a nuanced appreciation.
{327}
information technologies have brought with them certain issues which
were not foreseen by the legal regime earlier. Various new developments
leading to different kinds of cybercrime unforeseen by the Parliament
have come to fore in the new millennium. As regards the internet related
IPR disputes arising as a result of development of computer science, the
courts have played a role of an umpire between the contesting litigants so
as to ensure that no injustice is caused to anyone.
ar
of his rights, is an offence punishable under Section 43 of the
Information Technology Act, 2000. Software piracy is a common form
of IPR violation. Some other IPR violations include copyright
el
infringement, trademark and service mark violation, theft of computer
source code etc. The relevant case law indicating judicial trend in regard
to online IPR violations and offences are briefly discussed in the
succeeding paragraphs.
t
In Himalaya Drug Co. v. Sumit,104 the plaintiffs were engaged in the
Es
{328}
The appellants, therefore, moved the Delhi High Court for an
injunction alleging that the defendants were passing off their business
using the similar domain name as that of the appellants which was
causing deception and confusion among the consumers and the public.
The defendants having failed to respond and attend the Court despite
several notices, the High Court of Delhi proceeded ex-parte against the
defendants and ordered a permanent injunction restraining them from
reproducing, using and/or communicating to public on their herbal
website which they had copied from the appellants database. The Court
ar
also awarded punitive damages to the extent of eight lakhs rupees, which
the defendants were required to pay to the plaintiff by way of
compensation.
el
i. Judicial Response in Protection of Trademark:
{329}
restrained from using the name Kirloskar in their online advertisements
and internet communications.
In the instant case, the plaintiff was operating his business from
ar
Singapore whereas the defendant was using Banyan Tree holding
trademark in dealing with customers on internet. In a passing off action
against the defendant the Single Judge deferred the matter to the Division
Bench on ground that plaintiff and defendant both were not within the
el
jurisdiction of the present Court. It was contented on the behalf of the
plaintiff that the Court has the jurisdiction for passing off action
universally where the matter relates to dealing on internet and the
t
defendant had purposefully availed himself of the jurisdiction of the
forum Court to defeat plaintiffs claim. The Division Bench allowed the
Es
appeal and held that it had the jurisdiction because the internet user was
located within its jurisdiction. The defendant was therefore, restrained
from using the plaintiffs trade name on internet.
106Civil Suit (CS) (OS) No. 894/2008 decided by Delhi High Court on November 23, 2009.
107 2009 (40) PTC 54 (Del).
{330}
the High Court of Delhi ruled that petitioners trademark had acquired
unique goodwill and reputation and it had become a distinctive trademark
within the meaning of Section 9 of the Trademarks Act due to its long
continuity. Therefore, the court prohibited the defendant from using the
trademark under Section 29 (4) of the Act although it was not being used
by the respondent for commercial purposes.
ar
without proper license, simultaneous use of single user license software
by multiple users or loading of single user license software at multiple
sites, also amounts to software piracy. It is not possible to completely
eliminate Software piracy, but the same can be controlled by enforcing
el
the laws and generating awareness in the society. Under the IT Act, 2000
as amended by Information Technology (Amendment) Act, 2008,
According to Section 66, any accused who has committed software
t
piracy shall be liable to pay damages by way of compensation to the
person so affected also the affected person can file a Criminal Complaint
Es
under Section 66-B of Copyright Act, 1957 and under Section 120B, 420,
468 & 471 of the Indian Penal Code, 1860 in the nearest Police Station
where the above crime has been committed.
{331}
computers programs purpose or function including its structure,
sequences and organization.
ar
frowned upon, and therefore the court awarded the plaintiffs the
permanent injunction sought for as also punitive damage amounting to
Rs. 1 lakh against defendant.
el
iii. Judicial Response on Copyright Violation:
109 Advocate, Prashant Mali: Cyber Law & Cyber Crimes, Ist Edn. 2012, Snow White Publications.
P-106.
110 (1990) 240 F. Supp. 37 (US).
111 239 F.3d 1004 (2001) (US).
{332}
for the Northern District of California, holding that defendant, peer-to-
peer (P2P) file-sharing service Napster, could be held liable for
contributory infringement and vicarious infringement of the plaintiffs
copyrights. This was the first major case to address the application of
copyright laws to peer-to-peer file-sharing.
ar
telecast of the FIFA World Cup football matches.
{333}
plaintiffs firm, they could not claim exclusive right in respect of
database of the list of clients and the expert opinions and advice rendered
to them as they were under an obligation to maintain confidentiality. The
plaintiff also claimed to have spent substantial amount of money, time,
skill, computer network, law library, office infra-structure etc.
ar
data, write-up through plaintiffs local area network and allegedly have
stolen the hard copies compressed over ten proprietary drafts of the
plaintiffs and therefore, they prayed for protection of their exclusive data
el
under the Indian Copyright Act, 1957.
After hearing both the parties, the Court came a conclusion that
plaintiff had prima facie in the database which the defendants had taken
t
away from the plaintiffs office. The Court noted that the defendants
were free to carry on their legal profession, utilizes the skill and
Es
114 Narayanan on copyright and Industrial Design (3rd ed.) para 6 and 28.
{334}
In Hindustan Times v. www.legalpundits.com., 115 a recent
decision that has ramifications on free distribution of online content, the
Delhi High Court passed an ex-parte interim injunction against the
website for carrying and forwarding articles published by Hindustan
Times (HT) Media group. The Website www.legalpundits.com, was
allegedly found to have been picking new items from HTs online
portals. Further, the website was found to be forwarding the content to
the public without any consent, authorization or license of the content
owner, HT media group, and that too for final considerations.
ar
HT media group had moved to the court against the websites on
grounds of copyright infringement, trademark violation and unfair trade
practice. HT Media also claimed damages of INR 20 lakh from
el
Legalpundits, in the complaint.
115 2011 Delhi, HC cited in Advocate, Prashant Mali: Cyber Law & Cyber Crimes, Ist Edn. 2012,
Snow White Publications. P-65
116 Ibid. P-273.
{335}
The defendant did not appear before the court, so the proceedings
took place ex parte. The court eventually ruled against the defendant,
who was downloading Microsoft software onto the hard drives of
computers that if then sold, without a licence or permission to do so from
Microsoft.
ar
the decree of until the date of payment.
117 Ibid.
{336}
belonging to someone else. The cyber squatter then offers to sell the
domain to the person or company who owns a trademark contained
within the name at an inflated price.118
ar
playboys playmate trademark. The court emphasized the similarity of
the goods and service offered and indicated that the difference between
the registered mark playmate and the domain names were minimal. In
determining the use of the domain name also diluted the playmate
el
mark, the court focused on the intent of the defendant.
he offered to sell the domain name to them for USD 13,000. Toeppen had
previously offered similar sales to other trademark owners for domain
names incorporating their marks (Intermatic and American Standard).
Panavision filed suit claiming trademark dilution. Toeppen argued that
the requirements for dilution were not met because his use of the domain
name to display the city of Pana, it did not constitute commercial use.
The court determined that Toeppens business is to register trademarks as
domain names and then sell them to the rightful trademark owners. As
118 Karnika Seth: Cyber Laws in the Information Technology Age, Edn. Ist 2009, Lexis Nexis
Butterworths Wadhwa Nagpur, p- 452.
119 1998 WL 724000 (EDVa) USA
120 141 F 3d 1316 (9th Cir 4/17/98) USA
{337}
such, they found the requisite commercial use. Panavision establishes the
principle in cyber squatting cases that a offer to sell a domain name to the
trademark holder constitutes use in commerce purpose of trademark
infringement. Establishing commercial use, however, is not sufficient.
The plaintiff must also show that there has been dilution. Here the ninth
Circuit indicates that a court need not rely on the traditional definitions of
blurring or tarnishment to find dilution. Because Toeppens conduct
diminished the capacity of the Panavision marks to identify and
distinguish Panavisions goods and services on the Internet, the court
ar
finds that dilution has occurred. While this is one of the older case and its
interpretations have been questioned by scholars, it has frequently been
relied on by courts throughout the US in subsequent cases.
Yahoo Inc. v. Aakash Arora,121 was the first case in India with
el
regard to cybersquatting, where the defendant launched a website nearly
identical to the plaintiffs renowned website and also provided similar
services. Here the court ruled in favour of trademark rights of U.S. based
t
Yahoo. Inc (the Plaintiff) and against the defendant, that had registered
Es
{338}
defendant had registered a domain name radiff.com which was similar to
redifff.com. The court gave a decision in favour of the plaintiff.
ar
Another important fact was that the respondents websites using the
domain names in contention redirect the users to a different website
www.indiaheadlines.com which provided India related news.
el
In Mahindra and Mahindra Ltd. v. Ajay Kumar,124 the M&M
company lodged complaint against the cyber squatter Ajay Kumar that
the latter was using formers domain name mahindra.com and has
t
transferred his original address in India to one in the United States in
order to escape the jurisdiction of the Indian Courts. Disposing of the
Es
{339}
In Satyam Infoway Ltd. v. Sifynet Solutions,125 the Respondent
had registered domain names www.sifynet.com and www.siffynet.com.
Satyam (Plaintiff) had an image in the market and had registered the
name Sifynet and various other name with ICANN and WIPO. The word
Sify was first coined by the plaintiff using elements from its corporate
name Satyam Infoway and had a very wide reputation and goodwill in
the market. The Supreme Court held that domain names are business
identifiers, serving to identify and distinguish the business itself or its
goods and services and to specify its corresponding online location. The
ar
court also observes that domain name has all the characteristics of a
trademark and an action of Passing off can be found where domain
names are involved. The decision was in the favour of the plaintiff.
el
h. Judicial Response on Phishing:
{340}
In State v. Johnson Nwanonyi and Michel Obiorahmuozboa,
Anambra State in Nigeria,126 a local court in Malappuram district in
Kerala sentenced two Nigerians to five years rigorous imprisonment on
July 20, 2011 in a cyber crime case. The two had cheated a doctor in the
district of Rs. 30 lakh about two years ago. Johnson Nwanonyi (32) and
Michel Obiorahmuozboa (340, both hailing from Anambra state in
Nigeria, were sentenced each other section 420 (cheating)- 5 years, and
468 (forgery)- 5years of IPC and section 66D (phishing) of Information
Technology (Amendment) Act, 2008-2 years and a fine of Rs. 1.25 lakh
ar
by a Chief judicial Magistrate V Dileep in Manjeri in Malappuram
According to the charges filed by the Karipur police, the duo had
el
cheated the doctor Dr. C. Chomas, hailing from Valluvambram in
Malappuram district after they sent an e-mail inviting application to
recover a huge sum of unclaimed money left behind by a Nigerian
businessman. They had advertised that the money, kept aside for
t
charitable hospital, was lying unclaimed in a bank. When the doctor
Es
responded to the e-mail, they tricked him by asking to pay Rs. 30 lakh as
processing fee. But a planned move by the police and the doctor
succeeded when the Nigerians were lured into Kerala in March 2010.
They were then arrested by the Karipur police. The strong evidence based
on which the prosecution presented the case became crucial in the first
verdict against financial fraud under the IT Act.
126Prashant Mali: Cyber Law & Cyber Crimes, Ist Edn. 2012, Snow White Publications. P-35.
127. The Judgment in the case was delivered by the Delhi High Court on March 12, 2005.
{341}
internet is an illegal act entitling the victim for an injunction and recovery
of damages just as in case of passing off.
ar
complaint from the plaintiff, the High Court of Delhi passed an ex-parte
ad interim injunction restraining the defendants from using the trade
name or any other name deceptively similar to NASSCOM. The Court
el
further restrained the defendants from representing themselves as being
associated as a part of NASSCOM and ordered a search of the
defendants premises by a local Commission.
t
On the basis of two hard disks of computers recovered from the
defendants it was found that the e-mails were sent by the defendants to
Es
{342}
This case is considered as a landmark decision in the history of
Indian cybercrimes for two obvious reasons. Firstly, phishing is
punishable as a cyber offence although there is no specific statutory
legislation to this effect; and secondly, it reaffirms the faith of intellectual
property owners that their intangible property rights are well protected by
the judiciary.
The Court in this case expressed a view that of late, phishing has
developed as a sophisticated method of committing organized cybercrime
by befooling even the most experienced and knowledgeable persons.
ar
Phishing criminals sneak into a computer network or a social networking
site and obtain e-mail addresses of the people and create messages that
purport to come from direct bosses. They manipulate legitimate websites
to redirect e-mails to bogus sites that collect victims information.
el
In Mount Everest Mineral Water ltd. v. Bisleri International
Pvt. Ltd. and others, 128 the petitioner held registration for trademark
t
Himalayan in respect of mineral water since 2002. He filed a suit
against respondent Bisleri International (P) Ltd. seeking to restrain him
Es
{343}
such registration. Also, the written statement filed by respondent makes
no reference to Section 26 of the Geographical Indication of Goods
(Registration & Protection) Act, 1999, which protect marks registered
prior to 15th September, 2003, the date when the said legislation was
notified and came into force. The writ petition was therefore, allowed
with cost of Rs. 10,000/- to be paid by respondent (BIPL) to the
petitioner within four weeks from the date of judgment.
ar
Gambling in India is prohibited under the Public Gambling Act
1867. However the word gambling is not defined in the Public
Gambling Act 1867. According to the Supreme Court of India, Gaming
is the act or practice of gambling on a game of chance. It is staking on
el
chance where chance is the controlling factor. Internet gambling is
traditional crime of gambling where computer is used as tool provided it
is otherwise is an offence in a particular jurisdiction.129
t
There are thousands of Websites that offer online Gambling. The
Es
129 Balwinder Kaur: Internet Gambling, Criminal law Journal, October 2008- Journal Section.
130 Prashant Mali: Cyber Law & Cyber Crimes, Ist Edn. 2012, Snow White Publications. P-82
{344}
In Minnesota v. Granite Gate Resorts, Inc., 131 the policy
Minnesotas attorney General had stated in its Internet warning was
tested in court. The Attorney General had asserted the right to regulate
the activities of online gambling service based in Les Vegas, Neveda.
The Attorney General argued that the defendant had explicitly
misrepresented its services as lawful on its web page. The court defined
the defendants motion to dismiss for lack of jurisdiction because of hits
from Minnesota at the defendants Website, the availability of a toll-free
number that users could call advertised on its Web page, and the number
list.132
ar
of Minnesota resident who had signed on to the defendants mailing
131.65 USLW 2440, 1996 WL 767431 (D. Minn. Dec. 10, 1996)
132 Thomas E. Jensen, Supra note 81, at 4.
133 Kravitz, supra note 15, at 1.
134 High Court of South Africa, Witwatersrand Div., 10/97 (SOUTH AFRICA)
135 1999 N.Y. Misc. LEXIS 425 (N.Y. App. Div. 1999) (CANADA)
{345}
act of entering the bet and transmitting the information from New York
via the internet is adequate to constitute gambling activity within New
York State.
ar
Recent Indian Cyber Lotto Case136 was very interesting on online
gambling. A man called Kola Mohan invented the story of winning the
Euro Lottery. He himself created a website and an email address on the
Internet with the address [email protected]. Whenever accessed, the
el
site would name him as the beneficiary of the 12.5 million pound. After
confirmation a Telugu newspaper published this as a news. He collected
huge sums from the public as well as from some banks for mobilization
t
of the deposition in foreign currency. However, the fraud came to light
when a cheque discounted by him with the Andhra Bank for Rs. 1.73
Es
million bounced. Mohan had pledged with Andhra Bank the copy of a
bond certificate purportedly issued by Midland bank, Sheffields, London
stating that a term deposit of 12.5 million was held in his name.
136Prashant Mali: Cyber Law & Cyber Crimes, Ist Edn. 2012, Snow White Publications. P-85
{346}
targeted person is terrorized, embarrassed, ashamed, molested, outraged,
or frightened.
ar
In People v. Alan Munn,137 the defendant in a harassment case,
who asked the readers of a posting on an internet news group to kill a
el
police officer with family, moved to dismissed on the grounds that New
York statute did not cover the internet. Statute covered communications
by telephone, or telegraph, mail or any other form or written
t
communication. The judge held that posting was covered because it was
initiated by means of telephonic communication with the network
Es
community.
137 Crim. Court Queens Cty., No. 98Q-052574 (USA). (Amita Verma: Cyber Crimes & Law, 2009, Ist
Edn. Central law Publications, p-349).
138 (1999) VSCA 200.
{347}
Mrs. Ritu Kholi Case139 is a good example of cyberstalking. The
gravity of cyberstalking came into focus in India when Delhi Police was
asked by one Mrs. Ritu Kholi to file-complaint against an unknown
person who was using Mrs. Kholis name to chat over the Internet for
four consecutive days.
ar
Mrs. Kholi received 40 calls in three days mostly at odd hours from
places like Ahmedabad, Bombay, Cochin and Kuwait which shattered
personal life and mental peace of the victim.
el
The Police machinery swung into action. After making thorough
investigation, the IP addresses were traced which led to the arrest of
Manish Kathuria who pleaded guilty. The accused was arrested under
t
Section 509 of the IPC and was afterwards released on bails (the case
was registered before coming into force of the IT Act, 2000)
Es
139 Farooq Ahmad: Cyber Law of India (Law on Internet), 3rd Edn. New era Law Publication, p-411.
140 The expression Digital Signature has been replaced by the term Electronic Signature by the I.T.
(Amendment) Act, 2008.
{348}
1872. The recognition of electronic document as a valid evidence
admissible under the law of evidence has been facilitated the prosecution
of cyber criminals and establishing their guilt on the basis of such
evidence.
ar
In the case of Crown Life Insurance Co. v. Craig,141 it was held
that data from a computer database is a document within the meaning
of the American Law of Civil Procedures and it must be produced as
el
evidence in accessible form. The court in this case, rejected the argument
that written document referred only to documents in hard copy (on
paper) form.
t
In Armstrong v. Executive Office of the U.S. President,142 the
Es
{349}
means with intent to cause or knowing that he is likely to cause wrongful
loss or damage to the public or any person, he is said to have committed
an offence of hacking.144 The person who commits an offence of hacking
is called hacker. Websters Dictionary defines the term hacker as a
computer enthusiast who enjoys learning everything about a computer
system or network and through clever programming, pushing the system
to its highest possible level of performance.145
ar
Tappan Morris146 may be cited as illustration. In this case, the accused
Morris was a research student of the computer Ph.D. program of the
Carnell University in 1988. He had acquired sufficient expertise and
experience in computer technology and programmed a worm which
el
was difficult to read or defect and released it into the computer networks.
He devised four ways in which the worm could break into computers on
the network. As a result of this, several computers at locations around
t
USA either crashed or became catatonic. Morris realising the gravity of
Es
his illegal act, sent anonymous messages from Harvard over the network
instructing programmers how to kill the worm and prevent re-infection,
but the network route was clogged and this message did not reach the
users.
{350}
initial insertion of the worm simply amounted to exceeding the
authorised access but evidence showed that later on it was designated to
spread to other computer for which he had no authority, express or
implied.
ar
document. After the grant of relief by the higher official, he was required
to insert the data into compact computer system which was to be operated
only by the Debt Management Section and thereafter the data was finally
entered on the tax payers general file.
el
The accused had no authority to grant relief and his duties
included to enter various codes into the computer system only in case the
t
relief had been granted. But the accused intentionally entered data relief
code stating grant of relief in 19 cases of tax payers knowing it well that
Es
such relief was not granted. However, the evidence showed that he had
no personal gain or interest in taking this course and he did it solely in
order to expedite the disposal of cases as there were lots of
inconsistencies in determination of relief applications.
147. C.W. case No. 60488/95 decided by Supreme Court of New South Wales (Australia).
{351}
Court held that an entry intentionally made without lawful excuse and
known to be false, has to be treated as to have been made without lawful
authority.
ar
This website provides support and information to prospective employers
and job-seekers. The accused posted a message on that website declaring
that it was closed but actually it was very much open. The hackers were
el
sent to judicial custody for 14 days as they were charged under section
406 of Indian Penal Code i.e. criminal breach of trust, and section 66 0f
the Information Technology Act 2000 i.e. offence of hacking. Though
they were denied bail by the Metropolitan magistrate on 8 th February
t
2001 after they were arrested on 6th February 2001; on 12th February
Es
Additional Session judge of Delhi, Mr. P.K. Gauba granted bail to those
two hackers who were the partners of software solutions Mr. Amit Pasani
and Mr. Kapil Juneja.
148 M. Dasgupta: Cyber Crime in India, 2009, Eastern Law House Kolkata (Calcutta), p-88.
149 National Association of Software and Service Companies 2001, 10th January/ news.
150 M. Dasgupta: Cyber Crime in India, 2009, Eastern Law House Kolkata (Calcutta), p-91.
151 http://utcursch.wordpress.com/2006/12/17/my-answer-to-kalpesh-sharmas-allegations/See also
Cyber Criminal put behind bars, ICE News Search, new media, 26th September 2003.
{352}
on July 11 and send an e-mail to the bank authority with a message that
the website is weak and they should provide security. He expressed
that he can do good for security in exchange of Rs. 15 Lakh and posted
his contact numbers. Police arrested him from Ahmadabad. He was
charged under ss. 66 and 43(b) of the Information Technology Act 2000
and remanded to Police custody till October 6th as Maharashtra
Government Counsel stated that the culprit has hacked many other
websites and was capable to hack many others.
ar
Anothers, 152 where a 32-bit Electronic Serial Number (ESN) of a
handset provided by Reliance Infocomm under a special package to
customers, had been manipulated by some employees of Tata Indicom in
el
an attempt insert SIMs of Tata Indicom into those otherwise
electronically locked handsets; the Court took it as the offence of
tampering with computer source code under the meaning of section 65 of
the Information Technology Act, 2000.
t
Under the scheme launched by the Reliance Infocomm, a
Es
customer had to use the handset along with the in-fitted Reliance SIM;
and if he were to discontinue the scheme, he would have to pay some
charges plus the price of the handset. Sensing the popularity of the
scheme, it seems, the rival company Tata Indicom tried to enter in to
what may be termed as an unfair competition, whereby some of its
employees started contacting these newly wedded Reliance customers
to bring them to their fold, and reprogrammed their technologically
locked handset so that Tata Indicom SIMs could fit in there.
{353}
Acting upon a First information Report filed by Reliance Indicom,
the police raided some offices of Tata Indicom in Andhra Pradesh and
arrested some officials of Tata Tele Services Limited for reprogramming
the Reliance handsets, an offence under IPC as also Information
Technology Act, 2000. The person so arrested approached the High
Court requesting the Court to quash the FIR on the ground that their acts
did not violate the said legal provisions.
The Court observed that under section 2 of the IT Act, 2000, a cell
phone was a computer; and Electronic Serial number (ESN) 153 and
ar
System Identification Code (SID) 154 came within the definition of
computer source code under section 65 155 of the IT Act. It further
observed that to alter the ESN, was tantamount to alter a computer source
el
code, which was an offence under section 65 of the IT Act was
committed; and declined to quash the FIR.
153 Electronic Serial Number (ESN) is a unique 32 bit-number programmed into the phone when it is
manufactures by the instrumental manufacturer. ESN is a permanent part of the phone.
154 System identification Code (SID) is a unique 5-digit number that is assigned to each carrier by the
licensor. Every cell phone operator is required to obtain SID from the Government of India. SID is
programmed into a phone when one purchases a service plan and has the phone activated.
155 Section 65 of the IT Act deals with Tampering with computer source document.
156.AIR 2006 Ker 279: 2007 (34) PTC 98 (Ker).
157.FRIENDS was a project comprising seven alphabets denoting Fast, Reliable, Instant, Efficient,
Network, Disbursement, Services.
{354}
and various statutory government agencies etc. towards taxes, fees,
charges for electricity, water etc.
ar
window software facility. Feroz complied with the contract and set up
thirteen software centers and was paid the settled remuneration.
158. Government work as defined under Section 2 (k) of the Copyright Act means a work which is
made or published by or under the direction or control of (i) the Government or any of its department,
(ii) any Legislature in India, (iii) any Court, Tribunal or other judicial authority in India.
{355}
copyright and in the case of Government work, the Government shall, in
absence of any contract to the contrary, be the owner of the copyright
therein. Since there was no contract between Feroz and the Government
of Kerala regarding owners copyright, the Government had the
copyright as the work to be done by the modified system was a
Government-work
The term computer forensic was coined for the first time by the
ar
International Association of Computer Specialists (IACS) in Oregon
(USA) in the year 1191. It is a branch of forensic science which is
devised to identify local preserve of extract digital information from the
computer system to produce and store evidence of the cybercrime before
el
the law court. Dr. Clifford Stall, an astronomer and Professor in the
University of Berkely has defined computer forensic as that branch of
forensic science wherein cybercrime investigation and analysis
t
techniques are applied to determine potential legal evidence in a
computer environment. Internet related forensics broadly cover three
Es
areas, namely (i) computer forensics, (ii) cyber forensics, and (iii)
software forensics.
159 Case no. E-2663 (GA.Super. Court) decided on July 13, 1994 wherein the Court allowed the
plaintiffs expert to recover files from the defendants hard drives.
{356}
including files that had been deleted where they could be recovered. The
Court granted permission and issued an order for reviewing electronically
stored data by both the parties.
ar
Computer crime or any other crime for that matter requires lot of
evidence to make a small proof. Because of the intangible nature of large
amount of data held in a computer which has multi-functional role, a
considerable technical search expertise is required which only a
el
competent forensic expert can handle properly. The intecracies involved
in the investigation of computer crime drew attention of the investigating
agencies and the courts in Parliament Attack Case,161 which took place
t
in Delhi on December 13, 2001, wherein the Court held that investigation
of such crimes has to be entrusted to specially trained investigating
Es
160 (1996) 669 So. 2d. 1142 (Florida District Appeal Court, decided in April, 1996) the case relates to
litigation between two plastic surgeons relating to data protection.
161 State v. Mohd. Afjal and others, (2003) VIIth A.D.J. Delhi-1
162 AIR 2006 Ker 279
{357}
why, how and when it was done. The motive may be anything from
curiosity to money-making, revenge or misadventure.163
ar
Cyber terrorism is one of the cyber crimes in superhighway or
cyber world.164 It is a term esoteric, complex and difficult to circumscribe
within the four corners of the definition, which will be universally
acceptable. While the word cyber relates to cybernetics, which is our
el
tool of trade, terrorism denotes an act of violence. The ambiguity in the
definition of the term cyber terrorism brings indistinctness in action as
Dorothy Denning points out, An e-mail may be considered hacktivism
t
by some and some cyber terrorism by others. 165 In the form of cyber
Es
{358}
Cyber terrorism falls in the taxonomy of cybercrimes 168 as like
cybercrimes, it is the misuse of computer technology. Cybercrimes are
usually single-handed acts while cyber terrorism is a chain of acts
committed by organized terrorist groups.
ar
the battalion returned the firing towards the intruders who escaped by
scaling over the rear side boundary wall of the Red Fort. This attack
rocked the whole nation generally and the city of Delhi in particular.
el
The facts of case Mohd. Arif @ Asfaq v. State of NCT of Delhi
prove beyond doubt that there were used several mobile phones and a
computer centre called Knowledge Plus run by the appellant Arif alias
Ashfaq, in the process. It may be mentioned that Arif was a Pakistani
t
national but had fraudulently got a ration card, landline phone, cell
Es
phone, driving licence, and even a flat in Delhi in his name in Delhi in
order to play his role in executing the terrorists plan of attacking the
historic monument Red Fort.
168 Cyber terrorism is a specie of cybercrime. S.V. Rao, Chap 7 Typology of cyber Crimes: Trend
and Patterns in Law of Cyber Crimes and Information Technology Law (Wadhwa & Co., Nagpur
2004) 87; Parthasarathy Pati, Cybert Crimes: Hardship to curb it.
{359}
In fact, this is a unique case where there is one most
aggravating circumstances that it was a direct attack on the unity,
integrity and sovereignty of India by foreigners. Thus, it was an attack on
Mother India. This is apart from the fact that as many as three persons
had lost their lives. The conspirators had no placed in India. Appellant
was a foreign national and had entered India without any authorization or
even justification. This is apart from the fact that appellant built up a
conspiracy by practicing deceit and committing various other offences in
furtherance of the conspiracy to wage war against India as also to commit
ar
murders by launching an unprovoked attack on the soldiers of Indian
Army. We, therefore, have no doubts that death sentence was the only
sentence in the peculiar circumstance of this case.
el
We, therefore, confirm the judgment of the trial Court and the
High Court convicting the accused and awarding death sentence for the
offences under Section 302, Indian penal Code, 1860. We also confirm
all the other sentences on all other counts and dismiss these appeals.
t
(Emphasis added.) Laptop recovered from terrorist, who attacked
Es
Parliament. The laptop which was seized from the two terrorists, who
were gunned down when Parliament was under siege on December 13,
2001, was sent to Computer Forensics Division of BPRD after computer
experts at Delhi failed to trace much out of its contents. The laptop
contained several evidences that confirmed of the two terrorists motives,
namely the sticker of the Ministry of Home that they had made on the
laptop and pasted on their ambassador car to gain entry into Parliament
House and the fake ID card that one of the two terrorists was carrying
with a Government of India emblem and seal. The emblems (of the three
lions) were carefully scanned and the seal was also craftly made along
{360}
with residential address of Jammu and Kashmir. But careful detection
proved that it was all forged and made on the laptop.
ar
make an e-mail appear to haves come from third person. This flexibility
in communication has paved the way for e-mail misuse. Nowadays, e-
mails are being used to perpetrate frauds, scams, terrorist activities and
other heinous crimes. A good number of cases have been decided in
el
America pertaining to e-mail abuse
170
In United States v. Machado, the defendant had sent
threatening e-mail to Asian students at University of California at Irvine
based on race/ethnicity. The defendant contended that the e-mails were
sent idly and without intention to act on threats. The court, however, did
169 1998 U.S. Dist. LEXIS 8719 (D. Utah 1998) USA
170 C.D. Cal. 2/10/98 USA
{361}
not accept his contention and held accused liable for violating federal
hate-crime law.
ar
p. Judicial Response on Data Theft:
el
According to Wikipedia Data Theft is a growing problem
primarily perpetrated by office workers with access to technology such as
desktop computers and hand-hold devices capable of storing digital
information such as flash drives, iPods and even digital cameras. The
t
damage caused by data theft can be considerable with todays ability to
Es
transmit very large files via e-mail, web pages, USB devices, DVD
storage and other hand-held devices.
{362}
Hames pleaded guilty to offence under Section 55 of the Data Protection
Act, but the fines were imposed under the Proceeds of Crime Act. Mr.
Turley was ordered to pay $45,000 and Mr. Hames was ordered to pay
$28,700. Both face an 18-month prison term if they fail to pay within six
months.
ar
In Just Dial v. Infomedia 18 Delhi HC,173 Just Dial, with a single
national number 69999999 in 240 cities, has obtained injunction against
Infomedia 18 Limited (one of the group company of media group TV
el
18), restraining it from carrying out any business or rendering any service
of providing information of business, services, and products, through
their newly launched website askme.in.
t
In a suit filed by Just Dial against Infomedia 18, Just Dial alleged
Es
that Infomedia 18, Just Dial alleged that information 18 had copied its
extensive database and was displaying the same on its website askme.in,
thereby infringing Just Dials copyright in its valuable database. The
Delhi High Court has granted an exparte injunction against Infomedia 18,
restraining them from infringing Just Dials copyright and from running
the website askme.in till the next date of hearing. The High Court has
also appointed commissioners to visit Infomedia 18 Ltd,s office in Delhi
and Mumbai and to seize and take into custody all the CPUs, compact,
173 Prashant Mali: Cyber Law & Cyber Crimes, Ist Edn. 2012, Snow White Publications. P-16
{363}
floppy discs and/or other storage media containing any part of the
commercial or business directory database belonging to Just Dial.
ar
control or prevent a criminal from setting up a website to transact in
illegal articles. Additionally, there are several online payment gateways
that can transfer money around the world at the click of a button. The
Internet has also created a marketplace for the sale of unapproved drugs,
el
prescription drugs dispensed without a valid prescription, or products
marketed with fraudulent health claims.
{364}
information without any knowledge as to commission of an offence
under the Act. The respondents (Narcotics Control Bureau) rebutted this
by stating that the petitioner and its associates are not an intermediary as
defined under section 79 of the said Act as their acts and deeds was not
simply restricted to provision of third party data or information without
having knowledge as to commission of offence under the NDPS Act. The
company (Xponse Technologies Ltd. And Xpose IT Services Pvt. Ltd
headed by Sanjay Kedia) has designed, developed, hosted the
pharmaceutical websites and was using these websites, huge quantity of
ar
psychotropic substances (Phentermine and Butalbital) have been
distributed in USA with the help of his associates. The Supreme Court
quite correctly applying the law as its stands held that (a) the petitioner
was not an innocent intermediary as defined under Section 79 0f the
el
Technology Act according to the investigating agencies, they were the
owners and were responsible for the contents therein; and (b) Section 79
will grant immunity to an accused who has violated the provisions of the
t
Information Technology Act, 2000 and not grant an immunity under the
Narcotics Drugs and Psychotropic Substances Act, 1985.
Es
{365}
Pranab Mitra, former executive of Gujarat Ambuja Cement
impersonating himself as a woman, Rita Basu created a fake e-mail ID
through which he contacted Mr. V.R. Ninawe an Abu Dhabi
businessmen. After long term relationship through interaction through
email and other cyber medium, Mitra sent an emotional e-mail that "she
would commit suicide" incase Ninawe ended the relationship. He also
gave him "another friend Ruchira Sengupta's" e-mail ID which was in
fact his second bogus address. When Ninawe mailed at the other ID he
was shocked to learn that Mitra had died and police is searching Ninawe.
ar
Now Mitra faced the liability under the law and he has to spend huge
amount to get out of the legal entangle. Finally however he went to
Mumbai to lodge a complaint regarding the fact that he was in fact
cheated by Pranab and he has no role in his murder.
el
s. Judicial Trend in Other Cases:
about more than seven hundred people detained in the wake of the 9/11
attacks.
{366}
visitors to call and inquire about the named individual, who was a child.
As a result, the named individual was subjected to consistent, harassing
and possibly sexual explicit telephone calls every day of the week, at any
and all hours. The repeated inquiries caused the recipient of the calls
and/or messages to become fearful for his/her safety and the safety of
their family. The Boehle family decided that they had to move outside of
Will County in order to protect their daughter, who was the subject of the
postings, telephone calls and messages, from any potential harm they
feared might occur as a result of such harassment.178
ar
The Alkhaz case is one instance in which existing law proved to be
inadequate to deal with computer-facilitated anti-social conduct. Other
examples abound, some of which were ultimately addressed by the
el
amendment of existing law or the adoption of new penal law.
178 Brenner, Sussan W, University of Dayton School of Law, Cybercrime Investigation and
Prosecution: The Role of Penal and Procedural Law, Available at
http://unpan1.un.org/intradoc/groups/public/documents/APCITY/UNPAN003073.pdfhttp://unpan1.un.
org/intradoc/groups/public/documents/APCITY/UNPAN003073.pdf, accessed on 20-8-2009
179. AIR 2000 SC 3214
{367}
Therefore, it is not necessary that in all cases the accused must
answer by personally remaining present in the court. Particularly, when
evidence is being recorded by video-conferencing, the accused person
may answer the questions put to him by court on the screen, and it will be
as good as his personal physical presence in the court.
ar
Keeranur, the B.S.N.L. higher officials suspected him and others for
having committed offences in manipulating the computer system and
thereby causing loss to B.S.N.L. The FIR in Crime No. 1 of 2004 was
el
come to be registered on 06.01.2004 by the Police, Pudukottai, for the
offence under Section 406, 420 and 468 I.P.C. and 43(g) of the
Information Technology Act, 2000.
t
The main trust of the grievance of the petitioner in this case is that
when there is a special enactment namely, the Information Technology
Es
180 2004, High Court of Madras. (Prashant Mali: Cyber Law & Cyber Crimes, Ist Edn. 2012, Snow
White Publications. P-256).
{368}
The point for consideration is as to whether FIR referred to supra,
has to be declared null and void as prayed by the Writ petitioner?
ar
In Kalyan Chandra Sarkar Vs Pappu Yadav,181 Pappu Yadav
was arrested for murder and was imprisoned in the Belur jail at the state
of Bihar. Pappu Yadav flagrantly violated all the norms envisaged in the
el
jail manual and he entertained a large number of guests from outside and
went to the extent of humiliating the Inspector General of Police
boastfully on the ground that since he is a political person his whims and
t
caprice would prevail. Hence it led to a hue and cry and it was almost
Es
going to be settled for once and all that he should be transferred out of
Bihar so that the trial could take place without fear and favour from the
political parties. However the defense lawyer contended that once it is
going to be materialized then it is going to vitiate the ends of justice as he
will not be able to attend the court proceedings and instruct the counsel
effectively. The Court placing reliance on the Praful Desai judgment held
that even if he is not transferred out of Bihar and is not physically present
in the Court room the trial can be held with the help of video
conferencing.
{369}
In Maharashtra Vs Praful Desai,182 the Supreme Court examined
the question regarding use of modern technology like recording of
evidence by way of video conferencing at length. In the said case,
interpretation of section 273 Cr.P.C., which requires that evidence in a
trial has be taken "in the presence of the accused" or his pleader, came up
for consideration. In that case, the prosecution wanted to record evidence
of a doctor in US through video conferencing, as the doctor refused to
come to India for deposing evidence and there was no way by which
presence of the said doctor could have been procured by our courts. The
ar
Supreme Court held that recording of evidence by use of videoconference
satisfied the requirement of section 273 Cr. P. C.
Anr.183:
Nirav Navinbhai Shah & 4 ors. V. State of Gujarat and
el
Conclusion
There has been significant change in the judicial trend with regard
to adjudication of cybercrime during the past two decades. Realising the
182Appeal (crl.) 476 of 2003 Appeal (crl.) 477 of 2003
183 2004, High Court of Gujarat. ( Prashant Mali: Cyber Law & Cyber Crimes, Ist Edn. 2012, Snow
White Publications. P-260).
{370}
fact that data stored, processed and transmitted in the electronic form is
not directly tangible; the courts while adjudicating on cyber cases no
longer adhere to strictly rigid and literal interpretation of law but adopt a
more pragmatic and practical approach to the problems involved in the
case before them for disposal, without, however, deviating from the basic
intent of the legislature in enacting the law applicable to the case.
ar
trained in various technological aspects of cybercrimes. In the present
scenario, the perpetrators of these crimes are moving much faster than the
law enforcement agencies in exercising effective control over them. The
el
need of the time therefore, is that the judiciary should move faster than
the law enforcement agencies in excersing effective control over them.
The need of the time therefore, is that the judiciary should move faster
than the cyber criminals by expediting disposal of cyber cases within a
t
time-frame and make sure that the guilty do not escape punishment due
Es
to vagaries of law and evidence. As it has been rightly said, the threat at
present is not from the intelligence of the cyber criminals but it is from
the ignorance and lack of will to fight against cyber criminality. It may
be reiterated that computer is a tool as well as a target for the preparation
of cybercrime. The Information technology Act, 2000 specifies the illegal
acts which have been made punishable as offences under the Act. The
amendments made in the Indian Penal Code, law of Evidence and
Criminal Procedure, Bankers Book Act and the Negotiable Instruments
Act also enable the law enforcement agencies and the judiciary to nab
cyber criminals promptly and punish them.
{371}
The statistical data of cybercrime in India indicates that the
incidents of these crime is constantly on an increase as compared to the
rate of conviction which is significantly low the reason being that there is
general lack of awareness about the computer crimes among the people
who at times even do not know that they have fallen a victim to the
illegal activities of perpetrators of cybercrime. In result, most of the
crime remain unreported, and a few which are reported, result in acquittal
due to ignorance of the police and investigating officials about the
technicalities of these crimes and lack of sufficient evidence against the
accused.184
and
ar
Realising the problem to and handicaps of the police, law
enforcement agencies prosecutors in handling cybercrime
el
investigation due to inadequate knowledge and skill in this hi-tech field,
Justice Yad Ram Meena, the Chief Justice of Gujarat High Court
suggested that a forensic science University be set up in the State which
will help the investigating officials and the judges to unravel vital clues
t
in solving cybercrimes, economic offences and crimes committed by
Es
184 Rohas Nagpal: Seven Years of Indian Cyber Law, paper presented in Clubhack in December,
2007.
{372}
One of the cyber law experts and Supreme Court lawyer Mr.
Pawan Duggal has suggested that there is urgent need for special
tribunals being set up headed by well equipped and properly trained
Judges to deal solely with cybercrime cases. 185 Another cyber law
specialist Shri Prathmesh Popat practicing in Mumbai has underlined the
need for computer friendly lawyers and Judges who are well versed with
the functioning of the computer system and its operational pitfalls to
handle cybercrime cases.
ar
t el
Es
{373}