Law & IT
Law & IT
Akash Narayan
B.A. LL. B (Hons) (Self-Financed)
Roll No. 06
Semester IX
ACKNOWLEDGEMENT
To start off at the very outset, I would like to express my gratitude towards Dr. Ghulam Yazdani
sir for giving me the opportunity to make this project.
I would like to thank my parents and my batchmates without who’s help I wouldn’t have been
able to complete this project in these tough times as the world is going through such a horrible
pandemic.
TABLE OF CONTENTS
1. Abstract
2. Introduction
3. Information Technology Laws (Cyber Laws)
4. Scope and Applicability of IT Act
5. Acts amended after enactment of IT Act
6. Cyber Crime & IPC
7. Digital Evidence – Cyber Law & IEA
8. Bibliography
ABSTRACT
Computer chips have become increasingly powerful while costing less. That’s because over the
last five decades the number of transistors—or the tiny electrical components that perform basic
operations on a single chip have been doubling regularly.This exponential doubling, known as
Moore’s Law, is the reason a modern smartphone affordably packs so much dizzying capability
into such a small package.
Thus, in the today’s era of rapid growth, Information technology is encompassing all walks of
life all over the world. These technological developments have made the transition from paper
to paperless transactions possible. We are now creating new standards of speed, efficiency, and
accuracy in communication, which has become key tools for boosting innovations, creativity
and increasing overall productivity
Computers are extensively used to store confidential data of political, social, economic or
personal nature bringing immense benefit to the society. The rapid development of Internet and
Computer technology globally has led to the growth of new forms of transnational crime
especially Internet related. These crimes have virtually no boundaries and may affect any
country across the globe.
Thus, there is a need for awareness and enactment of necessary legislation in all countries for
the prevention of computer related crime. Globally Internet and Computer based commerce and
communications cut across territorial boundaries, thereby creating a new realm of human
activity and undermining the feasibility and legitimacy of applying laws based on geographic
boundaries.
This new boundary, which is made up of the screens and passwords, separate the “Cyber world”
from the "real world" of atoms. Territorially based law-making and law-enforcing authorities
find this new environment deeply threatening.
So, in this paper we will look at how the Indian legal system is coming to par with these
technological advancements and filling in the gaps of exposure that they might have with the
new and old legislations coming to work together to make India a cyber safe and a future ready
country.
INTRODUCTION
Anyone who has access to a computer and a telephone network is free to get hooked to the
Internet. This uncontrollable growth of the Internet makes the need for regulation a prominent
necessity. Systems across the globe have many different rules governing the behavior of users.
These users in most of the countries are completely free to join/ leave any system whose rules
they find comfortable/ not comfortable to them. This extra flexibility may at times lead to
improper user conduct. Also, in the absence of any suitable legal framework, it may be difficult
for System Administrators to have a check on Frauds, Vandalism or Abuses, which may make
the life of many online users miserable.
This situation is alarming, as any element of distrust for Internet may lead to people avoiding
doing transactions with online sites thereby directly affecting eCommerce growth.
The (mis)use of Internet as an excellent medium of communication may in some situations lead
to direct damage to physical societies. Non-imposition of taxes on online transactions may have
its destructive effect on the physical businesses and also government revenues. Terrorists may
also make use of web to create conspiracies and make violence in the society.
Therefore, all of us whether we directly use Internet or not, will like to have some form of
regulation or external control for monitoring online transactions and the cyber world for
preventing any instability.
INFORMATION TECHNOLOGY LAWS (CYBER LAWS)
Computer or Cyber-crimes are considered as illegal, unethical or unauthorized behavior of
people relating to the automatic processing and transmission of data, use of Computer Systems
and Networks.
IT law does not consist a separate area of law rather it encloses aspects of contract, intellectual
property, privacy and data protection laws. Intellectual property is a key element of IT law. The
area of software license is controversial and still evolving in Europe and elsewhere.
According to Ministry of Electronic and Information Technology, Government of India:-
“Cyber Laws yields legal recognition to electronic documents and a structure to support e-
filing and e-commerce transactions and also provides a legal structure to reduce, check cyber
crimes.”
The basic approaches for creation of Cyber Laws, which will ensure the smooth governance of
Internet globally are as follows:
a) Formulation of new laws and amendment of existing laws by nations within their present
territorial boundaries thereby attempting to regulate all actions on the Internet that have any
impact on their own population.
b) Nations may enter into multi-lateral international agreements to establish new and uniform
rules specifically applicable to conduct on the Internet.
c) Creation of an entirely new international organisation, which can establish new rules and new
means of enforcing those rules.
d) Guidelines and rules may naturally emerge from individual decisions like domain name and
IP address registrations and by websites and users deciding about whom will they patronise
All of these approaches have their own merits and demerits and we shall not go into those
details here.
CYBER LAW LEGISLATION IN INDIA – IT ACT,2000
India does not have a dedicated cybersecurity law. The Information Technology Act 2000 (the IT Act) read
with the rules and regulations framed thereunder deal with cybersecurity and the cybercrimes associated
therewith.
The IT Act not only provides legal recognition and protection for transactions carried out through electronic
data interchange and other means of electronic communication, but it also contains provisions that are aimed at
safeguarding electronic data, information or records, and preventing unauthorized or unlawful use of a computer
system.
Some of the cybersecurity crimes that are specifically envisaged and punishable under the IT Act are hacking,
denial-of-service attacks, phishing, malware attacks, identity fraud and electronic theft.
In accordance with the Information Technology (The Indian Computer Emergency Response Team and Manner
of Performing Functions and Duties) Rules 2013 (the CERT Rules), the Computer Emergency Response Team
(CERT-In) has been established as the nodal agency responsible for the collection, analysis and dissemination
of information on cyber incidents and taking emergency measures to contain such incidents.
Other relevant rules framed under the IT Act in context of cybersecurity include:
• the Information Technology (Reasonable security practices and procedures and sensitive personal data
or information) Rules 2011 (the SPDI Rules), which prescribe reasonable security practices and
procedures to be implemented for collection and the processing of personal or sensitive personal data;
• the Information Technology (Information Security Practices and Procedures for Protected System) Rules
2018 (the Protected System Rules), which require specific information security measures to be
implemented by organisations that have protected systems, as defined under the IT Act. More
information on protected systems is provided in ‘Scope and jurisdiction’; and
• the Information Technology (Intermediaries Guidelines) Rules, 2011 (the Intermediaries Guidelines),
which require intermediaries to implement reasonable security practices and procedures for securing
their computer resources and information contained therein. The intermediaries are also required to
report cybersecurity incidents (including information relating to such incidents) to CERT-In.
Other laws that contain cybersecurity-related provisions include the Indian Penal Code 1860 (IPC), which
punishes offences, including those committed in cyberspace (such as defamation, cheating, criminal intimation
and obscenity), and the Companies (Management and Administration) Rules 2014 (the CAM Rules) framed
under the Companies Act 2013, which requires companies to ensure that electronic records and security systems
are secure from unauthorised access and tampering.
In addition to the above, there are sector-specific regulations issued by regulators such as the Reserve Bank of
India, the Insurance Regulatory and Development Authority of India Act 1999 (IRDA), the Department of
Telecommunication and the Securities Exchange Board of India, which mandate cybersecurity standards to be
maintained by their regulated entities, such as banks, insurance companies, telecoms service providers and
listed entities.
Under the IT Act, ‘cybersecurity’ means protecting information, equipment, devices, computers, computer
resources, communication devices and information stored therein from unauthorised access, use, disclosure,
disruption, modification or destruction. ‘Cybercrime’ on the other hand has been defined by the National Cyber
Crime Reporting Portal (a body set up by the government to facilitate reporting of cybercrime complaints) to
‘mean any unlawful act where a computer or communication device or computer network is used to commit or
facilitate the commission of crime’. The courts in India have also recognised cybercrime eg. the Gujarat High
Court in the case of Jaydeep Vrujlal Depani v State of Gujarat ordered, to mean ‘the offences that are
committed against individuals or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or
indirectly, using modern telecommunication networks such as Internet (networks including but not
limited to Chat rooms, emails, notice boards and groups) and mobile phones
(Bluetooth/SMS/MMS)’.
While the IT Act does not make any distinction between cybersecurity and data privacy, in our view, these
issues are distinct but also deeply interconnected as ensuring privacy of an individual's data requires adequate
cybersecurity processes to be implemented by organisations. Further, cybersecurity and information security
frameworks are developed by organisations at a broader level to build resilience against various forms of
cyberthreat, including cybercrimes that entail more extensive engagement with regulatory authorities depending
on the extent of harm caused, the nature of information handled by the body corporate, sector sensitivities, etc.
Digital evidence or electronic evidence is any probative information stored or transmitted in digital form
that a party to a court case may use at trial. Before accepting digital evidence it is vital that the determination of
its relevance, veracity and authenticity be ascertained by the court and to establish if the fact is hearsay or a
copy is preferred to the original. Digital Evidence is “information of probative value that is stored or transmitted
in binary form”. Evidence is not only limited to that found on computers but may also extend to include
evidence on digital devices such as telecommunication or electronic multimedia devices. The e-EVIDENCE can
be found in e-mails, digital photographs, ATM transaction logs, word processing, documents, instant message
histories, files saved from accounting programs, spreadsheets, internet browser histories databases, Contents of
computer memory, Computer backups, Computer printouts, Global Positioning System tracks, Logs from a
hotel’s electronic door locks, Digital video or audio files. Digital Evidence tends to be more voluminous, more
difficult to destroy, easily modified, easily duplicated, potentially more expressive and more readily available.
Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital
storage mediums. Computer forensics is also known as digital forensics. The goal of computer forensics is to
explain the current state of a digital artifact. The term digital artifact can include: A computer system storage
medium (hard disk or CD-ROM) an electronic document (e.g. an email message or JPEG image) or even a
sequence of packets moving over a computer network.
The definition of 'evidence' has been amended to include electronic records. The definition of 'documentary
evidence' has been amended to include all documents, including electronic records produced for inspection by
the court. Section 3 of the Evidence Act, 1872 defines evidence as under: "Evidence" - Evidence means and
includes:-
1) all statements which the court permits or requires to be made before it by witnesses, in relation to matters of
fact under inquiry; such statements are called oral evidence;
2) all documents including electronic records produced for the inspection of the court. Such documents are
called documentary evidence.
The term 'electronic records' has been given the same meaning as that assigned to it under the IT Act. IT Act
provides for "data, record or data generated, image or sound stored, received or sent in an electronic form or
microfilm or computer-generated microfiche". The definition of 'admission' (Section 17 of the Evidence Act)
has been changed to include a statement in oral, documentary or electronic form which suggests an inference to
any fact at issue or of relevance. New Section 22-A has been inserted into Evidence Act, to provide for the
relevancy of oral evidence regarding the contents of electronic records. It provides that oral admissions
regarding the contents of electronic records are not relevant unless the genuineness of the electronic records
produced is in question. The definition of 'evidence' has been amended to include electronic records. The
definition of 'documentary evidence' has been amended to include all documents, including electronic records
produced for inspection by the court. New sections 65-A and 65-B are introduced to the Evidence Act, under
the Second Schedule to the IT Act.
Section 65-A provides that the contents of electronic records may be proved in accordance with the provisions
of Section 65-B. Section 65-B provides that notwithstanding anything contained in the Evidence Act, any
information contained in an electronic, is deemed to be a document and is admissible in evidence without
further proof of the original's production, provided that the conditions set out in Section 65-B are satisfied. The
conditions specified in Section 65-B (2) are:
• Firstly, the computer output containing the information should have been produced by the computer
during the period over which the computer was used regularly to store or process information for the
purpose of any activities regularly carried on over that period by the person having lawful control over
the use of the computer.
• The second requirement is that it must be shown that during the said period the information of the kind
contained in electronic record or of the kind from which the information contained is derived was
regularly fed into the computer in the ordinary course of the said activity'.
• A third requirement is that during the material part of the said period, the computer was operating
properly and that even if it was not operating properly for some time that break did not affect either the
record or the accuracy of its contents.
• The fourth requirement is that the information contained in the record should be a reproduction or
derived from the information fed into the computer in the ordinary course of the said activity.
Under Section 65-B(4) the certificate which identifies the electronic record containing the statement and
describes the manner in which it was produced giving the particulars of the device involved in the production of
that record and deals with the conditions mentioned in Section 65-B(2) and is signed by a person occupying a
responsible official position in relation to the operation of the relevant device 'shall be evidence of any matter
stated in the certificate’.
Section 65-B(1) states that if any information contained in an electronic record produced from a computer
(known as computer output) has been copied on to a optical or magnetic media, then such electronic record that
has been copied 'shall be deemed to be also a document' subject to conditions set out in Section 65-B(2) being
satisfied. Both in relation to the information as well as the computer in question such document 'shall be
admissible in any proceedings when further proof or production of the original as evidence of any contents of
the original or of any fact stated therein of which direct evidence would be admissible.'
ELECTRONIC EVIDENCE -CASE LAW'S
1. Amitabh Bagchi Vs. ENA BAGCHI [Sections 65-A and 65-B of Evidence Act, 1872 were analyzed.]
The court held that the physical presence of person in Court may not be required for purpose of
adducing evidence and the same can be done through medium like video conferencing. Sections 65-A
and 65-B provide provisions for evidences relating to electronic records and admissibility of electronic
records, and that definition of electronic records includes video conferencing.
2. STATE OF MAHARASHTRA vs. DR PRAFUL B DESAI [The question involved whether a witness
can be examined by means of a video conference.] The Supreme Court observed that video conferencing
is an advancement of science and technology which permits seeing, hearing and talking with someone
who is not physically present with the same facility and ease as if they were physically present. The
legal requirement for the presence of the witness does not mean actual physical presence. The court
allowed the examination of a witness through video conferencing and concluded that there is no reason
why the examination of a witness by video conferencing should not be an essential part of electronic
evidence.
3. BODALA MURALI KRISHNA VS. SMT. BODALA PRATHIMA The court held that, “the
amendments carried to the Evidence Act by introduction of Sections 65-A and 65-B are in relation to the
electronic record. Sections 67-A and 73-A were introduced as regards proof and verification of digital
signatures. As regards presumption to be drawn about such records, Sections 85-A, 85-B, 85-C, 88-A
and 90-A were added. These provisions are referred only to demonstrate that the emphasis, at present, is
to recognize the electronic records and digital signatures, as admissible pieces of evidence.”
4. DHARAMBIR Vs. CENTRAL BUREAU OF INVESTIGATION The court arrived at the conclusion
that when Section 65-B talks of an electronic record produced by a computer referred to as the computer
output) it would also include a hard disc in which information was stored or was earlier stored or
continues to be stored. It distinguished as there being two levels of an electronic record. One is the hard
disc which once used itself becomes an electronic record in relation to the information regarding the
changes the hard disc has been subject to and which information is retrievable from the hard disc by
using a software program. The other level of electronic record is the active accessible information
recorded in the hard disc in the form of a text file, or sound file or a video file etc. Such information that
is accessible can be converted or copied as such to another magnetic or electronic device like a CD, pen
drive etc. Even a blank hard disc which contains no information but was once used for recording
information can also be copied by producing a cloned had or a mirror image.
5. STATE (NCT OF DELHI) Vs. NAVJOT SANDHU There was an appeal against conviction following
the attack on Parliament on December 13 2001. This case dealt with the proof and admissibility of
mobile telephone call records. While considering the appeal against the accused for attacking
Parliament, a submission was made on behalf of the accused that no reliance could be placed on the
mobile telephone call records, because the prosecution had failed to produce the relevant certificate
under Section 65-B(4) of the Evidence Act. The Supreme Court concluded that a cross-examination of
the competent witness acquainted with the functioning of the computer during the relevant time and the
manner in which the printouts of the call records were taken was sufficient to prove the call records.
This judgment will have severe implications in all the cases where the prosecution relies heavily on the
electronic data specially those cases where the audio-video recordings are produced in the form of CD/DVD
before the court. The anticorruption cases are generally based on a lot of electronic / digital evidence and the
CD/DVD forwarded to the courts are without a certificate and shall therefore not be admissible as evidence u/s
65B Evidence Act, which makes it mandatory to produce a certificate u/s 65 B(4). The failure to provide the
certificate u/s 65 B(4). further occludes the judicial process as the expert view in that matter cannot be availed
of till the preceding condition is fulfilled. It has been specified in the judgment that Genuineness, Veracity or
Reliability of the evidence is looked into by the court subsequently only after the relevance and admissibility is
fulfilled. The requirement to ensure the source and authenticity, pertaining to electronic records is because it is
more vulnerable to tampering, alteration, transposition, excision, etc. without such safeguards, the whole trial
based on proof of electronic records can lead to mockery of justice.
The original recording in Digital Voice Recorders/mobile phones need to be preserved as they may get
destroyed, in such a case the issuance of certificate under section 65B(4) of the Evidence Act cannot be given.
Therefore such CD/DVD is inadmissible and cannot be exhibited as evidence, the oral testimony or expert
opinion is also barred and the recording/data in the CD/DVD’s do not serve any purpose for the conviction.
The progression of the Indian evidence law is apparent as it has withstood the pressures and challenges of
technology and the cyber world. The appropriate amendments in Evidence Law, incorporated by our judiciary
show pro-activism. In my opinion the law enforcement agencies and investigating officers have to update
themselves about the authentication process prescribed by the court regarding the admissibility of
electronic/digital evidences so that impediments in trial procedures can be successfully overcome. Proper
training of law enforcement agencies in handling cyber related evidence and correct application of procedure
and sections of Evidence Law while presenting such evidence in court is the primary need of recent times.
Common man in the role of a complainant should be now aware that while submitting evidence to police or
courts, he should submit it with a certificate under section 65B(4) of The Indian Evidence Act so the court takes
cognizance and reads it as a primary evidence.
BIBLIOGRAPHY
1. Computer Law: Drafting and Negotiating Forms and Agreements, by Richard Raysman and Peter
Brown. Law Journal Press
2. Cyber Law: A Legal Arsenal For Online Business", New York: World Audience, Inc.
3. Emerging Technologies and the Law: Forms and Analysis, by Richard Raysman, Peter Brown, Jeffrey
D. Neuburger and William E. Bandon, III.
4. Zittrain, Jonathan (2003). "Be Careful What You Ask For: Reconciling a Global Internet and Local
Law".
5. Gibson, Owen (March 23, 2006). "Warning to chatroom users after libel award for man labelled a
Nazi".
6. The Guardian. http://www.guardian.co.uk/law/
7. Myers KS (Fall 2006). : Fitting the Communications Decency Act to Wikipedia.
8. http://www.cyberlawsindia.net/
9. Law and Borders - The Rise of Law in Cyberspace
10. Zittrain, Jonathan (2003). "Be Careful What You Ask For: Reconciling a Global Internet and Local
Law".
11. Gibson, Owen (March 23, 2006). "Warning to chatroom users after libel award for man labelled a
Nazi". The Guardian.
12. Myers KS (Fall 2006). "Wikimmunity: Fitting the Communications Decency Act to Wikipedia".
Harvard Journal of Law & Technology
13. Electronic Evidence/ Digital Evidence & Cyber Law in India (Blogpost)