Cyber Laws Notes
Transcript of Cyber Laws Notes
-
7/31/2019 Cyber Laws Notes
1/65
CYBER LAWS
1. INFORMATION TECHNOLOGY AND LEGAL RESPONSE
1 Introduction
We begin by giving you a brief picture of the electronic world we all live in. It is
apparent that geographical divide is no longer a limiting factor for doing business.
Electronic commerce has literally shrunk the globe and has virtually made it a market
without boundaries.
1.1 Objective
At the end of this chapter you will be able to understand the relationship between
electronic world and our lives. You will also be able to explain the nature of the net,
the features of the net and the impact of information technology revolution on
society.
1.2 We, Cyberspace and Our Lives
The virtual world has taken over the real one. Our society is increasingly relying on
new information technologies and the Internet to conduct business, manage industrial
activities, engage in personal communications and perform scientific research.
E-business and e-commerce are the new mantras and electronic transactions
dominate the overall business paradigm.
While these technologies facilitate enormous gains in efficiency, productivity and
communications, they also create new vulnerabilities in terms of possibilities of
misuse. The same interconnectivity that allows us to transmit information around the
globe at the click of a mouse or push of a button also creates unprecedented
opportunities for criminals, terrorists and hostile foreign nation - states, who might
seek to steal money or proprietary data, invade private records, conduct industrial
espionage, cause a vital infrastructure to cease operations, or engage in information
warfare.
-
7/31/2019 Cyber Laws Notes
2/65
Digitalization has radically transformed the ways of accessing and using information.
Technical convergence not only rendered fillip to this process, but also as a result,
affected positive impact on economics of the nations. The influence of cyber is so
striking in our day to day lives that one would discern not only in the realm of trade
and commerce, but also in the ambit of personal communications, academic and
scientific research, critical infrastructure and the like. But for the inherent lack of
capacity in terms of PC penetration, basic telephony, speaking for Indian context, the
obtaining cyber influence would have been far different from our own contemplation.
In view of, two significant strengths of internet, namely, connectivity and the pace
and accuracy with which the transmission of information takes place, online
transactions, particularly that of commercial nature, secured tremendous social
receptivity. The resultant outcome, as a natural corollary of the same, can be
observed not only in terms of swelling numbers of online users but also creative and
expansive nature of services t hat are rendered by the Internet providers. For
instance, in the initial stages of cyber influence, broadly, if one may put it, the
subject matter of substantial part of online transactions was merely focusing on
tangible or physical property and service rendering. Now, with the convergence,
digitalization of various products is taking place, as a result, transactions involving
particular kind of subject matter are more effectively facilitated by the cyber medium.
For instance, online music and software tools and techniques are some of the
products falling under this category. This clearly indicates how the strides in
information technology are changing the facets of cyberspace.
Again, the advent of global computer networks has rendered geographical
boundaries increasingly porous and ephemeral. As Internet subscription increases,just as any sizeable number of human beings interact, disagreements may be
expected to arise. As the community of Internet users grows increasingly diverse, and
the range of online interaction expands, disputes of every kind may be expected to
occur. Online contracts will be breached, online torts (any kind of civil wrong) will be
committed and online crimes will be perpetrated. Although, many of these disputes
will be settled informally, others may require formal mechanisms of dispute resolution
and adjudication of liability.
-
7/31/2019 Cyber Laws Notes
3/65
1.3 The Nature of the Net
The Internet has been called a network of networks - with local computer systems
hooked to regional systems, and to national or international high capacity backbone
systems. Each link, or node, in this web is a computer or computer site, all
connected together by a variety of connections fiber optic cable, twisted - pair
copper wire, micro wave transmission, or other communications media. Each
computer in the network communicates with the others by employing machine
language conventions known as the IP or Internet Protocols. It is these protocols that
define a network. Those machines that talk to one another using IP are the Internet.
This medium defined by these shared protocols is distinctly unlike any other. First,
the Internet is a packet switching network. Unlike communications media that tie up
the entire channel in real time during transmission, the Internet breaks information
into discreet packets of bits that can be transmitted as capacity allows. Packets are
labeled with the addresses of their final destination, and may follow any of a number
of different routes from computer to computer until finally their final destination,
where they are re-assembled by the recipient machine. Thus, packets from a variety
of sources may share the same channel as bandwidth allows, promoting more
efficient use of available carrying capacity. (Dan L. Burk, 1999).
There is no centralized control of packet routing, or for that matter, of almost any
other aspect of the Internet. From a technical standpoint, each computer acts
autonomously, coordinating traffic with its nearest connected neighbors, and guidedonly by the 'invisible hand' that arises from the sum of millions of such independent
actions. From a management standpoint, each node is similarly autonomous,
answering only to its own systems administrator. This means that there is no central
authority to govern the Internet usage, no one to ask for permission to join the
network, and no one to complain to when things go wrong.
-
7/31/2019 Cyber Laws Notes
4/65
1.4 Features of the Net
The IP provides for tele presence' or geographically extended sharing of shattered
resources. An Internet user may employ her Internet link to access computers,
retrieve information, or control various types of apparatus from around the world.
These electronic connections are entirely transparent to the user. Access to Internet
resources is provided via a system of request and reply; when an online user
attempts to access information or services on the network, his/her local computer
requests such access from the remote server computer where the addressee is
housed. The remote machine may grant or deny the request, based on its
programmed criteria, only if the request is granted does the server tender the
information to the user's machine.
These features make available a vast array of interconnected information, including
computerized digitalized text and graphics and sound. A crop of private Internet
access providers has developed to offer network access and facilities to such
customers outside the research community. Consequently, although the academic
and scientific research community remains an important part of the Internet
community as a whole, private and commercial traffic is becoming a dominant force
in the development and growth of the electronic frontiers'. In particular, the network
offers novel opportunities for transactions involving information - based goods and
services.
1.5 Geographical Indeterminacy
The rules of the road for online commerce are different from business interactions in
real space. Much of this difference stems from the Internet's telepresence features,
which render the network technologically indifferent to physical location. Soinsensitive is the network to geography, that it is frequently impossible to determine
the physical location of a resource or a user. In real space, a business can usually
locate a person or entity with which it is interacting; this tends to facilitate
identification of partners and validation of transactions. This process is far more
difficult in cyberspace, when the parties in a transaction may be in adjoining rooms,
or half the world away, and the network offers no way to tell the difference. In other
words, there is no nexus between cyberspace and real space. Even in some instances
an Internet address tells something about the location of a given machine; it tells
nothing about the location of the user of that machine.
-
7/31/2019 Cyber Laws Notes
5/65
To fully appreciate the inchoate nature of Internet geography, it is important to
consider the common Internet practice ofcaching' copies of frequently accessed
resources. In order to better to manage packet traffic, some Internet servers will
store partial or complete duplicates of the materials from frequently accessed sites;
keeping copies on hand elevates the need to repeatedly request copies from the
original server. An Internet user attempts to access the materials will never know the
difference between the cached materials and the original. The materials displayed on
the user's machine will appear to come from the original source, whether they are
actually transmitted from there or fro m a nearly cache. Nearby' connotes logical
proximity but not physical.
The modern world relies on computerized systems for almost everything in life from
air, train and bus traffic control to medical services and co-ordination of national
security. Even a small glitch in the operation of these systems can jeopardize human
lives. The society's dependence on computer systems, therefore, has a profound
human dimension too. The rapid boundary-less expansion of large-scale computer
networks and the ability to access systems through regular telephone lines increases
the vulnerability of these systems. And it also increases the opportunity for
perpetrating crimes. The consequences of computer crime may have serious
economic implications, as well as invaluable loss in terms of human security. In this
context, it is important to understand the motivation behind cyber crimes in terms of
perceived value of information as a critical source in today's digital society. This value
of information revolves around six factors:
a) The person's concerns and commitments;
b) The person's capabilities;
c) Availability of information resource to the person;
d) Availability of information resource to other persons affected;
e) Resource integrity;
f) Time. (Nina Godbole, 2000)
-
7/31/2019 Cyber Laws Notes
6/65
1.6 Information technological revolution and societal impact
Many of us tend to simplistically dismiss the potential impact of information
technology on our society. According to a recent treatise on Cyber Laws, while
comparing with erstwhile technologies and their impact with that of information
technology, the authors went on record by saying that; People often compare the
growth of the internet to the historic growth of other technologies, sometimes to
suggest that the internet is just the latest technological advance and may not signal a
revolutionary advance. But there are differences between the birth of the Internet
and technologies that preceded it. For example, electricity was first harnessed in
1831, but it was not until 1882 that the first power station was built, and it was
another 50 years before electricity powered 80 per cent of the factories and
households across the United States. Radio was in existence 38 years before 50
million people used it; TV took 13 years to reach the same benchmark. It was 16
years before 50 million people used a personal computer. Once the Internet was
made available to the general public, it took only 4 years for 50 million people to go
on -line.
1.7 Check your progress
Questions:
1. E-Commerce is the new mantra of business -Explain
2. Describe the nature and features of the Internet
3. Discuss the impact of the information technology revolution on society
4. There is no nexus between cyber space and real space - Comment
-
7/31/2019 Cyber Laws Notes
7/65
2. Sources of the Law
2 Introduction
Despite divergent views and opinions about law, it is universally construed as an
instrument of social change. In other words, law and legal regulation is expected to
bring about desired social change and order which is quintessentially necessary to
maintain societal peace and tranquility. Yet times, it is necessary to facilitate rule or
norm compliance to ensure orderly human conduct in a particular activity like economic
one.
However, this is not to be understood that such desired rule compliance or social
change is only possible because of law and legal system. Suffice it to say that law
and legal system form part of series of measures which would influence such change
like education, economic parity, ethics and the like. But definitely plays a decisive role
in bringing about the required change subject to factors like, social receptivity and
fair and non -discriminatory nature of legal enforcement.
2.1 Objective
The objective of this unit is to give you a brief overview as to the evolution of law.
You will be able to exp lain the sources of law and the different branches of law
needed to cater to societal needs.
2.2 Sources of law
Speaking for our own context, our legal system is based upon the foundations of
common law conceived and shaped by British rulers and jurists. Common law
connotes judicial practice of recognizing customary, traditional practices of the peoplein a formal sense of judgments.
In this kind of system there are three main sources of the law, namely, legislation,
case law and custom.
"Legislation" is the formal enactment of law by the legislature created or authorized
by the Constitution. Essentially, the process of codification or legislative enactment is
the premise. It stands in contrast to judge made law; Legislation consists of leges
scriptae (written laws), as contrasted with judge made law or common law (jus
commune). Legislation also stands in contrast to customary law (consuetudines).
-
7/31/2019 Cyber Laws Notes
8/65
Common law' comp rises the body of principles, which derive their authority solely
from the decisions of courts. It is a body of law that develops and derives through
judicial decisions, as distinguished from legislative enactments. Its principles do not
derive their validity from formal law making by anybody of persons, but from their
enunciation through decisions of courts. Judicial decisions become a source of law by
reason of the practice of courts (in common law jurisdictions), of accepting
precedent" as a source of law, that is, the established judicial practice that a court
must follow the law laid down by a decision of the higher judiciary in the country or
State and the law laid down by itself in an earlier judgment, if it is itself an organ of
the higher judiciary.
Custom' (as a source of law) denotes a usage or practice of the people (including a
particular social group or a group residing in a particular locality) which, by common
adoption and acquiescence and by long and unvarying habit, has become compulsory
and has acquired the force of law with respect to the place or subject matter to which
it relates [Black, Law Dictionary, (1990), page 385]. Legislation and case law can
(subject to constitutional limitations) operate in any sphere of human activity, while
the operation of custom is generally restricted to a particular locality, group or
family. (P.M. Bakshi, 1996)
2.3 The Significance of Legislation
As a source of law, legislation assumes and is considered to be the foundation of
democratic polity. The main points are:
The legislature can legislate in advance. Judges cannot do so.
The legislature can make a law on any subject within its competence. But Judges can
deal with a subject, only when the point arises before them. They cannot spread their
canvas beyond the point or points that have actually arisen before them.
-
7/31/2019 Cyber Laws Notes
9/65
The legislature (both of parliament, state or even local self Government) can (subject
to constitutional limitations) override the law laid down by the courts, on a particular
point (though, because of the doctrine of separation of powers, the legislature cannot
reverse or modify the actual decision rendered by the court in a particular case). In
contrast" courts cannot repeal or modify a legislature enactment (though they can
declare it to be void, as unconstitutional).
Legislation is the most fertile source of law. Subject to limitations flowing from the
constitutional doctrine, that matters of policy cannot be delegated, the legislature can
vest a subordinate authority with power to make ru les, orders, etc. But a court
pronouncing a judgment cannot do so.
A legislative enactment is not subject to appeal; and the law enacted by it cannot be
reversed, as such, by a higher authority (though it can be declared to be void, if it is
unconstitutional). In contrast, the law laid down in a judgment of a court laying down
the law may be reversed on appeal by a higher judicial authority, which may take
a different view of the law. (P.M. Bakshi, 1996)
2.4 The common law or uncodified law
In earlier days, commands issued by the sovereign authority were considered as
either laws or norms to be obeyed. Similarly, the process of dispute resolution or
adjudication of liability by either village elders or people holding power through the
process of issuing commands has also received social acceptance. Thus uncodified
law or common law is the law flowing from judicial decisions. Fairly large segments ofthe legal regime are governed, in a substantial measure, by uncodified law. The
judgment pronounced by an organ of the higher judiciary performs at least two
important functions.
(a) For the immediate parties, the judgment becomes a source of rights and duties;
(b) For the world at large, it becomes a source of law, it happens to deal with a legal
proposition - and to make a definite pronouncement on the subject.
-
7/31/2019 Cyber Laws Notes
10/65
There is a difference between the two aspects set out at (a) and (b) above. As
regards (a), the, judgment can grant a concrete relief to the parties and that relief
can (if necessary) be enforced through the machinery of "execution" (if it is a civil
suit). If the judgment results in conviction and sentence (having been pronounced in
a criminal prosecution), the punishment so imposed will be appropriately carried out.
Thus, under aspect (a) above, the focus is on the individual plaintiff, defendant or
accused.
In contrast, when one comes to aspect (b) above, the judgment does not grant any
relief to an individual. Its impact is on the society at large. Aspect (a) creates no
ripples in the legal system (though it may seriously affect the fortunes of the
individual litigants). But aspect (b) may affect the content of the law. (P.M. Bakshi,
1996)
2.5 Precedent as a Source of law
In addition to what has been enumerated as sources of law, in common law system;
precedent also plays a vital role. When a higher court pronounces a judgment
deciding a question of law, it is reported in the law reports. A future judge,
confronted with the same question of law, will have to cull out from the judgment the
legal proposition flowing from the judgment. It is to be remembered that the earlier
judgment may not necessarily have enunciated the legal proposition in so manywords. The decision in the judgment may be found to be mixed up with the facts of
the case. The law, then, has to be isolated from the facts. The complex and concrete
factual matrix would have to be converted into an abstract proposition.
While one is so extracting the legal proposition, a problem may sometimes arise. One
has to decide which of the facts in the earlier judgment materials were for the legal
conclusion arrived at. One may have to formulate the "ratio decidendi", (means basis
or grounds of a particular judgment) forming the basis of the earlier judgment. On
-
7/31/2019 Cyber Laws Notes
11/65
this point, differences of opinion can arise. Ascertaining the ratio decidendi of the
earlier judgment is not only very important, but also a complex task. This is precisely
because it is the basis or ground alone, which has the character of binding the
subordinate courts and none other.
The situation becomes more complex, when, in the earlier judgment, there was a
plurality of judgments. Different judges who took part in the earlier judgment might
have expressed themselves in different manner (even if they have reached the same
conclusion). The later judge must analyze them, dissect the reasoning and come to
his own conclusion, as to what was the substantial conclusion arrived at, in the earlier
judgment. (P.M. Bakshi, 1996)
2.6 Branches of law
In the above backdrop of information, law within the realm of common law system,
could be at a fundamental level classified as substantive law and procedural law.
Substantive law is one, which basically recognizes, defines and confers rights on the
parties. Whereas procedural law focuses on procedure to be followed to give effect to
the predetermined rights, duties and obligations both outside and inside the courts of
law.
Similarly, another categorization is civil and criminal laws.
Another criterion for division could be connected with the impact and coverage of the
particular rule of law. Does it relate to the public domain, or does it concern
individuals, rather than the public, as such? The former categorizes "public law". For
instance, laws like constitution law, administrative law and criminal law are construed
as public laws as their impact can be discerned on the public at large. The latter
concerning individual is labeled as "private law". The law of contracts as envisaged by
the Indian Contract Act, 1872 is one example in this regard.
-
7/31/2019 Cyber Laws Notes
12/65
2.7.
Check your progress
Questions:
1. Explain the different sources of law.
2. Discuss the significance of legislation
3. Distinguish between the different branches of law
4. What is common law? How does it differ from codified law?
5. Exp lain howcustom' is a source of law.
-
7/31/2019 Cyber Laws Notes
13/65
Unit 3
The Judicial System
3 Introduction
Government under the Constitution consists of three independent units, namely, the
Legislature, the Executive and the Judiciary. Laws enacted by the Legislature laydown the rights and obligations of citizens in different situations. Law is not self-
executing. They require enforcement machinery, which is provided by the executive
government. Whenever the executive fails to implement the laws or implement them
improperly, citizens can seek relief through the Judiciary. The Judiciary also oversees
the working of the Constitution, thereby ensuring that the three wings of the
government act within their respective jurisdiction as conceived by the Constitution.
3.1 Objective
The object of this unit is to explain the hierarchy of the judicial administration in our
country. By reading through this unit you will be able to exp lain the different layers
that comprise the judicial set up. You will also be able to explain the jurisdiction of
each of the courts at the different levels.
3.2 Institutions of the Judicial System
The judicial system consists of a number of institutions such as Courts and Tribunals,
a code of procedural rules for conducting the adjudicatory process in fair manner,
and a set of personnel including lawyers and judges.
3.2.1 Courts
The Supreme Court of India is the supreme judicial body. It has at present 25 Judges
and a Chief Justice of India. The number can be increased by the Government if
found necessary. The Judges of the Supreme Court are appointed by the President
on the advice of the Union Council of Ministers and in consultation with such Judges
as the President may think necessary. The Judges retire at the age of 65 years. They
enjoy complete independence and cannot be removed except through an elaborateprocess of impeachment.
The Supreme Court has four types of jurisdiction. Disputes between two States ~; or
between a State and the Union of India are decided by the Supreme Court. This is
called original jurisdiction. The Supreme Court also has concurrent jurisdiction with
the High Courts to issue writ or direct ion to enforce fundamental rights. The third
type of jurisdiction is to hear appeals fro m civil and criminal cases decided by the
High Courts. The appellate jurisdiction is limited as defined by the provisions of the
Constitution. Finally, the President can seek advisory opinion from the Supreme
Court on any question of law of fact of public importance.
-
7/31/2019 Cyber Laws Notes
14/65
Being the highest court of the land, the law laid down by the Supreme Court in its
judgments is binding on all the courts in India.
Below the Supreme Court, in each State, is the High Court, which is the highest court
of the respective States. The High Court Judges are also appointed by the President
of India on the advice of the Chief Justice of India. Each High Court has several
Judges and a Chief Justice. They ret ire at the age of 62 and they also enjoy the
privileges and immunities guaranteeing independence essential for judicial function.
The High Courts have supervisory jurisdiction over all the courts and tribunals within
the State. It hears appeals fro m the superior courts and tribunals within the State. It
hears appeals from the superior courts and tribunals within the State. Finally, it
exercises writ jurisdiction along with the Supreme Court for enforcement of
Fundamental Rights of citizens.
The Courts and tribunals below the High Court in various States may be broadly
indicated by the following chart. There can be variations in the type and
nomenclature of these bodies in different States. (N.R. Madhava Menon, 1994)
Supreme Court
!High Courts
!Subordinate Courts -Special Courts/Tribunals
!District and Sessions Court
Civil Courts (District Judge) Criminal Courts (SessionsJudge)
! !Civil Judge Assistant Sessions Judge
! !Munsiff Chief Judicial Magistrate
!Magistrate
The civil courts are empowered to hear and settle disputes of a civil nature i.e.,
infringement of legal rights. The jurisdictions of the various courts are determined by
law (Code of Civil Procedure) on the basis of the nature of the claim, the value of the
subject matter and the territorial limits where the dispute has arisen. The jurisdiction
-
7/31/2019 Cyber Laws Notes
15/65
of the Civil Courts can be ousted in specific type of cases by express provisions of
law. There are numerous laws, like the Income Tax Act, which bar the jurisdiction of
the ordinary civil court and provide that those disputes be decided by special
tribunals (Inco me Tax Tribunals).
On the criminal side, the jurisdiction of courts is determined on the basis of the
authority to pass particular punishments (Death, imprisonment, fine etc.) and the
territorial areas where the court is located. Sessions Judge can award any
punishment though the award of death penalty has to be confirmed by the High
Court.
As the High Court exercises jurisdiction throughout the territory of the State, the
District Court or the Civil-Judges Court or the Munsiff Court can exercise jurisdiction
only in defined territories. Similarly, the values of the suit, as determined by the
Suits Valuation Act, determine the pecuniary jurisdiction of the various civil courts.
3.2.2 TribunalsThe Tribunals are set up to adjudicate not only tax cases (Income Tax Tribunal, Sales
Tax Tribunal), but also labor disputes (Industrial Tribunal), disputes of civil servants
(Administrative Tribunal) motor accident cases (Motor Accident Tribunal) etc. When
the Tribunals are set up all cases pending in courts and relating to such matters are
transferred to the respective tribunal. Tribunals are generally not bound a by
technicalities of procedure as in regular courts. They have usually subject matter
specialists sitting as Judges' along with professional judges. They also generally
enjoy the same powers as courts in conduct of trials before them. Appeals from these
tribunals generally lie to the High Court or the Supreme Court only.
3.3 Procedure in Civil Cases
A civil case ordinarily starts with a 'suit' (a grievance of claim filed in court). The
plaintiff (claimant) files a 'plaint' which carries the description of parties, the facts on
which the claimarises, the law on which the claim is based and the nature of relief
asked for. A civil suit has to be filed within the period of limitation prescribed under
the Limitation Act. The Court Fees Act also prescribes small fees to be paid by theplaintiff at the time o f filing the plaint which is excused in the case of indigent
persons. The suit must be filed in the court of competent jurisdiction as provided
-
7/31/2019 Cyber Laws Notes
16/65
under the Civil Procedure Code. If the plaintiff is a minor or a person of unsound
mind, the suit can be filed only through the lawful guardian.
If the court finds the suit properly filed, it issues a 'summons' to the opposite party
called the defendant along with a copy of the plaint. If the defendant does not appear
after receiving the summons, the court may proceed to decide the suit in his
absence, in what is called 'exparte' proceedings. If the plaintiff absents himself, the
suit can be dismissed.
If the defendant appears and accepts the claim, the court may decree the suit.
Otherwise, the defendant has to file a "written statement" containing facts he admits
and facts he denies. He may also give additional facts in support of his side of the
case.
These documents filed by the plaintiff and defendant are ordinarily called "pleadings"
of the parties. The court can seek clarifications on their pleadings wherever
necessary. Thereafter the court frames "issues" which are the main points are
perceived by the court for decision of the suit.
Thereafter comes the crucial part of the proceeding called "trial" in which parties are
expected to prove the facts alleged through "evidence" acceptable in legal
proceedings. What facts can be proved, by whom and what facts the court can
presume etc, are laid down by law in the Evidence Act. When is a fact proved or
disproved or not proved depends on the satisfaction of the court arising out of
evidence produced before it.
The Evidence act declares that it is the burden of the party which allege certain facts
to prove his part of the case to lead evidence on them. The party relying on a
document has to file th at document. In fact, a list of documents each party wants to
rely upon is invariably filed with the pleadings before the issues are framed.
On the date of hearing of the suit, parties lead oral evidence through witnesses and
experts. A witness is examined by the party who brings him (examination in chief).
The opposite party will have a right to cross -examine him, which is intended to test
the veracity of his statements. Witnesses are required to take oath before making
-
7/31/2019 Cyber Laws Notes
17/65
statements to ensure truthfulness. Sometimes, facts can be proved through
'affidavits' which are statements affirmed on oath.
The proceedings of court are open to public unless declared otherwise in certain
cases. The Judge is expected to record the evidence read over to the witness and get
signed by him. Sometimes, when the witness is sick or lives far away and cannot
appear in court, the Court may appoint a person to record the statement of such
witness 'on Commission'. Such court-appointed persons called 'Commissioners' can
also be directed to visit the area and hold local investigation, which is later submitted
as a report to the court concerned.
If any of the parties dies, the suit can be preceded by his legal heirs. Parties can
always compromise the dispute with the approval of the court. They can take the
matter to LokAdalats for informal negotiated settlement without full-fledged
adjudication.
On conclusion of evidence, parties present arguments through their lawyers. At the
end of the Court gives its Judgment in writing on the issues framed and decides on
the relief to be allowed or disallowed. A 'decree' is then prepared on the basis of
judgment, which contain briefly the relief allowed or disallowed. The court can award
costs from either party to the other if justice so demands.
On getting the Judgment and the decree, the party concerned (decree -holder) has to
seek execution proceedings against the "Judgment debtor" (the party against whom
judgment is given). An application for execution has to be made to the court, which
decided the case in the first instance. The method of execution of a decree depends'on what is required to be done in the circumstances of the case. In this process, the
court can attach and sell the property involved, eject the Judgment-debtor, arrest
and detain him, appoint a receiver, auction the property etc.
Finally in Civil Proceedings, the law allows parties dissatisfied with the Judgment to
prefer an appeal to a higher court or seek a review on some new facts from the same
court which passed the Judgment . In limited cases where no appeal lies, a superior
court can allow a revision of Judgment of the lower court as well. (N.R. Madhava
Menon, 1994)
-
7/31/2019 Cyber Laws Notes
18/65
3.4 Procedure in Criminal Cases
The Criminal Procedure Code not only lays down the jurisdiction and powers of th e
criminal courts but also the procedure to be followed in investigation of crimes and
trial of persons accused of crimes. What acts and omissions constitute crimes and
what punishments are provided therefore are contained in the Indian Penal code and
in some special and local laws. How is crime to be proved and by whom are laid down
in the Evidence Act.
A criminal proceeding starts with a First Information Report (FIR) which is
information of the occurrence of a crime received by the police. This information is
reduced into writing at the police station and a copy of it is given to the informant.
Recently, Supreme Court held that filing or registration of FIR need necessarily take
place in a police station having territorial jurisdiction. Territorial jurisdiction means
the identified geographical territory will be ascribed to a given police station. If the
alleged offence takes place in a particular territory, police station located in such
territory will have jurisdiction for the purposes of inquiry and investigation. In view of
Supreme Court ruling, the informants will not be constrained by the technical
requirement of territorial jurisdiction of police stations. In cases of non-cognizable
offences, the police cannot investigate the crime on their own and, as such, directs
the informant to the concerned Magistrate. In cases of cognizable offences (serious
crimes punishable with death or imprisonment) the police proceeds with
investigation which consists of proceeding to the spot, interrogating witnesses,
apprehending suspects, conducting search and seizure and other steps directed
towards collection of evidence in the case. Police can summon any person for
interrogation and persons are expected to answer truthfully. In the case of women
and children, statements are to be recorded in their houses rather than at police
stations. Statements made to police, if recorded in writing, need not be signed by thewitnesses. Police can make witnesses give statements to Magistrates during
investigations. If they are in the nature of a confession (admission of guilt) the
Magistrate has a duty to warn the accused that he is not bound to make it and that if
recorded it may be used against him. It is the duty of the Magistrate to satisfy
himself that confession is being made voluntarily and not out of coercion or
inducement.
During investigation of a cognizable offence, police can arrest persons suspected of
involvement in the offence. Arrest is a denial o f freedom of movement and force is
not necessarily an element of arrest. But if force becomes necessary the minimum
-
7/31/2019 Cyber Laws Notes
19/65
required force can be used. Ordinarily, arrest is made on the basis of a warrant
(order) issued by the Magistrate and persons to be arrested are served the warrant.
Arrest is a powerful weapon, which has to be exercised only when absolutely
necessary. To ensure that persons are not deprived of their freedom beyond what is
necessary to answer the charged, Criminal Procedure Code provides for liberal
granting of bail. In the case of bailable offences the arrested person has a right to be
released on bail if he furnishes bonds with or without sureties as demanded.
Similarly, a person arrested without a warrant has to be produced before a
Magistrate within 24 hours, excluding the time taken for journey. The Magistrate may
remand him to custody of the police or of jail authorities up to a period of 15 days.
The total period of detention before trial cannot exceed 90 days (60 days in less
serious offences). On the expiry of that period he has to be released on bail. In
recent times, while taking note of gross and blatant abuse of human rights in the
context of arrest, the Supreme Court in a substantive sense supplemented various
mandated procedures to be followed by the arresting officer. (N.R. Madhava Menon,
1994)
An investigating police officer can also search a place with or without warrant (in
cases where he thinks that he may not recover in case he spends time in securing a
warrant). A search has to be witnessed by two persons of the locality a
memorandum m of search and a list of articles found have to be prepared and a copy
of it is to be given to the occupier of the place.
When the police submits a report on completion of investigation to the Magistrate
competent to hear the case, a charge sheet is framed. Criminal proceedings can also
be initiated otherwise than a police report, through private complaints made to aMagistrate. On receiving a complaint, the Magistrate records the statement of the
complainant and witnesses present, if any, and then cause an enquiry himself or
through the police or any other person. If on enquiry he does not find sufficient
ground for proceedings, he dismisses the complaint, recording reasons for doing so.
Otherwise he issues summons to the accused.
The trial in Criminal cases can follow one of the three procedures depending on the
nature of the crime. They are Warrant trial, Summons trial and Summary trial. In
Summary trial, the Magistrate hears the case summarily, recording only the
-
7/31/2019 Cyber Laws Notes
20/65
substance of evidence. The maximum punishment that can be given in these cases is
a fine only or imprisonment of three months. In Summons trial, it is not necessary to
frame a formal charge. The accused is told about the particulars of the offence and, if
he pleads guilty the plea is recorded and he is convicted. If he does not, the evidence
of prosecution, the statement of the accused and any other evidence he may give are
recorded and, depending on the evidence, he is convicted or acquitted by the
Magistrate. In Summons cases, the complainant can withdraw or compromise the
case also.
In warrant cases (cases for which death, life imprisonment or imprisonment
exceeding 2 years) the trial can proceed either on police report or on a complaint.
There are minor differences of warrant trial on these two types of cases.
When an accused appears before a Court of Sessions, the prosecutor describes the
charge against him and informs the evidence he proposes to advance. After hearing
the parties and examining the materials if the judge finds no sufficient ground to
proceed, he discharges the accused. Otherwise, the judge frames a Charge and tries
it himself or sends to the appropriate judge. If the accused pleads guilty he may be
convicted. Otherwise, a date is fixed for prosecution evidence. (In criminal cases the
burden of proving the case against the accused is entirely about the prosecution side.
In cases of doubt on the prosecution case, the benefit is given to the accused and he
is acquitted). After prosecution evidence is over, the accused is given an opportunity
to explain the evidence against him. The accused may also lead evidence in his
defense. After evidence and arguments, judgment is pronounced in open court. If the
accused is found guilty, he is heard again on the question of sentence (punishment).
The Public Prosecutor can withdraw a prosecution with the permission of the Court.
Some criminal cases of a minor nature can be compounded which in effect would
mean acquittal. Giving false evidence in court is an offence liable to punishment.
In criminal proceedings, right to legal aid in case of indigent accused is guaranteed
under the Constitution of India. Constitution also provides that a person tried and
convicted or acquitted of an offence cannot be tried again for that offence.
-
7/31/2019 Cyber Laws Notes
21/65
3.5 Officers of Court
Lawyers (advocates) who assist the judges on behalf of the parties are often referred
to as officers of court. It is the Constitutional right of everyone to be represented in
legal proceedings through a lawyer of his choice. And if the person is unable to afford
one because of his socio-economic position, legal aid is provided by the State in
certain circumstances.
Advocates have an exclusive monopoly in practicing law. They are people trained in
law and court procedures that give advice to parties and plead their cases before
courts and tribunals. They belong to an independent professions governed by a code
of ethics and managed by a representative body of lawyers called the Bar Council. In
case a litigant has a complaint against any individual member of the legal profession,
a complaint can be preferred to the Bar Council o f the State concerned. The Council
has power to investigate the complaint with same status as that of a Court and award
punishments or direct compensation to the aggrieved litigant. (N.R. Madhav a Menon,
1994)
Check your progressQuestions:
1. Discuss the hierarchy of the judicial administration system in India
2. Exp lain the jurisdiction of the courts at different levels3. Distinguish between the procedures in a civil case with that of a criminal case.
-
7/31/2019 Cyber Laws Notes
22/65
Unit 4
Structure of Government
4 Introduction
The adoption of the Constitution and India becoming a Republic in 1950 was a
culmination of events that took place ever since the British landed in India. The
legacy of British rule left an indelible mark in the framing of the Constitution of
India. The Constitution has always been a Live' document. The fact that the
Constitution has been amended time and again shows that the Constitution has been
responsive to the changing aspirations and needs of the people.
4.1 Objective
By reading through this unit you will be able to explain in brief the history behind the
framing of the Constitution of India. You will also be able to explain which functions
of the government are the exclusive privileges of the Central Government and the
functions that are shared between the Central government and the state.
4.2 Framing of the Constitution
After the British rule in India which lasted for about 350 years. India gained
independence from the British on August 15, 1947. The series of charters issued by
the Crown in England from time to time, since 1600, the East India Company's rule,
the first war o fIndian independence, the establishment ofIndian National Congress,
the role played by great heroes like Gandhiji, Nehru, Tilak, etc. in the freedom
struggle, the two world wars were the few land marks in the development of
constitutional history of India prior to independence. Shri Rajagopalachari becamethe first and the last Governor-General o ffree India. To draft a Constitution for India
defining the structure of the Government, the powers and functions of different
authorities under the Constitution and the Fundamental Rights of citizens was the
first major task for the free India. For this a constituent Assembly, consisting of
eminent persons like M r. B.N .Rau, Dr .B.R.A mbedkar, Babu Rajendra Prasad,
Pandit Govind Vallabh Pant, Dr. S. Radhakrishnan and Maulana Abdul Kalam A zad
was appointed to draft a Constitution for the free India. Dr. B R. Ambedkar was the
Chairman ofthe Drafting Committee ofthe Constituent Assembly. It took almost two
years to complete the task, which was debated at length by the members. Finally,
-
7/31/2019 Cyber Laws Notes
23/65
the draft ofthe Constitution ofIndia was adopted on November 26, 1949. Some of
the provisions ofthe Constitution came into effect with immediate effect. The full text
of the Constitution came in to force on January 26, 1950, the day India became a
"Republic".
The Constitution of India, which is the fundamental law o f land, consists of a
preamble, 395 Articles, divided into 22 parts and 10 Schedules. According to the
Preamble of the Constitution, the sovereign power is vested in the hands of the
people. The organization, power and functions of the three different branches of
Government both at the Center as well as States are provided under the Constitution.
Accordingly, the executive power ofthe union is vested in the hands ofthe President,
the legislative power in the Parliament and the judicial power in the Supreme Court.
While the legislature/Parliament has the power to enact laws, the president executes
them and the judiciary interprets the law. A system ofchecks on these organs ofthe
state is also provided in the Constitution.
Although India is a Republic, it has adopted the parliamentary form ofgovernment
and made the executive power a nominal authority. The Preamble to the Constitution
describes India as a Sovereign, Socialist, Secular, and Democratic Republic. Along
with this, the object ofsecuring the social, economic and political justice, liberty of
thought and expression and equality ofstatus and opportunity to all citizens is also
provided. Moreover, the states are guided by the Directive Principles of the State
Policy. Both the Union and State governments have an obligation under Part IV of the
Constitution to formulate policies in the implementation of the Directive Principles of
State policy. Although the Directive Principles are not justifiable in the Courts of Law,
they provide the general guidelines for the realization of these goals. The judiciaryhas interpreted the Directive Principles in such a way to make them enforceable in
the day to day administration.
Some of the important Directive Principles of State policies are
a) to secure social, economic and political justice;
b) to minimize inequalities in income;
c) to provide free legal aid to economically backward classes;
d) Workersparticipation in management of industries;
e) Free and compulsory education for children;
-
7/31/2019 Cyber Laws Notes
24/65
f) to secure a uniform Civil Code and
g) protection and improvement of forest and wild life and to protect the monuments
and places of national importance.
In the conflicts arising between the fundamental rights and directive principles, the
judiciary exercises the power to review such laws.
4.3 Government Functions
The governmental functions under the Constitution have been divided and given
predominantly to the different levels of government. At the apex is the national or
central government and followed by twenty -five state governments. The State
governments have absolute powers over the organization of the local self-
governments within the State. The powers of the national and state governments
have been provided under the Constitution whereas that of the local
self-government does not find a place in the constitutional order. These three levels
of government jointly discharge different functions to keep the administration
moving. In the division of powers between the national and state governments the
Center has a dominating role both under the Constitution as well as in practice. The
nature and extent of such powers can well be understood with the help of the fo llo
wing chart:
Distribution of power -VII Schedule to the Constitution
Government List
No
Total no
of
Entries
Total No of Examples Remarks
Center/nati
onal
i 97Defense, foreign affairs,banking laws with currency
reference currency etc.
States cant make to
these powers. Only the
center can do so.
state ii 66 Police, local govt, public
health, sanitation,
agriculture etc.
The states as well as
the center can legislate
upon these powers. The
center can gets the
powers under article249,250,252 and 253.
Concurrent iii 4 Criminal laws, criminal Both states and center
-
7/31/2019 Cyber Laws Notes
25/65
powers procedure insolvency,
trust/trustees.
can legislate on these
powers. But in the
event of any conflict
only central law can
prevail over the state
law.
Residuary
Powers
-- -- Vested in the Central
government only under
the Entry 97 of List I
read with Art. 248 of the
Constitution.
Thus all the subjects of national importance are vested in the hands of the Central
Government. Although the State governments have 66 subjects, the national
government can also legislate upon any of the powers of the state under Articles 249,
250, 252 and 253. Accordingly, the Center can legislate on the State subjects in the
"national interest" (Art.249), during proclamation of emergency (Art.250) with the
consent of the States (Art.252) and for giving effect to treaties and international
agreements. The powers or subjects not mentioned in any of these three1ists are
known as 'Residuary power'. All the residuary powers are the Central Government
enjoys majority of the powers including those powers given to the states.
4.4 Processing of Bills
When a bill gets the assent from the executive (the President or the Governor as the
case may be), it becomes a law, till then it is referred to only as a bill. The Presidenthas no power to Veto (reject) a bill passed by both the Houses of Parliament. He may
refer the bill back to the House for reconsideration. If the bill is p assed as it is for the
second time after the reconsideration, the President has to give his assent. So far
this has been use only, once by the former President Mr. GianiZail Singh with regard
to the Postal Bill. Each of the Houses of the legislature has different committees
nominated and elected to consider the bills in detail. These committees have an
important role to play by checking the powers of the legislature from time to time. To
quote few examples of such Committees, mention must be made to the Committee
on Subordinate Legislation, Committee on the privileges of the House etc. If there is
-
7/31/2019 Cyber Laws Notes
26/65
any difference between the two Houses of Parliament over a particular Bill, which is
not a financial or money Bill, a deadlock emerges and the procedure comes to a
standstill. To resolve the deadlock between the two Houses of Parliament, the
President can summon a joint sitting of both the Houses, where the Bill will be
debated and votes by the members in that joint sitting.
Bill
Lok Sabha or Rajya Sabha
First Reading
Second Reading
Committee Stage
Report Stage
Third Reading Bill goes to next House Presidential
which also follows assent.
all these steps.
4.5 Legislation: Subject to judicial review
The validity of the laws passed by the legislature can be called in question in any
Court of Law. The Constitution of India has established Courts at two levels. There is
a Supreme Court at Delhi consisting of a Chief Justice and twenty five other judges.
There are about 18 High Courts with a Chief Justice and other judges depending upon
their sanctioned strength. The validity of a law can be questioned in either of these
two courts whenever the law has violated any of the provisions of the Constitution or
the fundamental rights of the Citizens. The courts can declare such laws are
unconstitutional. This power is known as judicial review, which is one among the
basic procedures have been prescribed under the Constitution itself and by the rules
made by the respective Courts.
-
7/31/2019 Cyber Laws Notes
27/65
4.6 Public interest litigation
During the last 20 years, (i.e. from 1976), the courts have become active in
rendering Social justice. As such it has waived all procedural requirements in few
cases where the aggrieved persons have sent letters, post cards and telegrams to
the Supreme Court. The Court considered these as Writ petitions and granted
remedies. The other important development is the liberalization of the concept of
"Locus Standi" by the Courts which has le d to numerous public interest Litigation. It
is also known as the Social Action Litigation in India. Under this any person having
concern about a particular issue can move the Court to protect the interest of the
general public or a group of people. Various Social activists are involved in this
process. Prof. Upendra Baxi and Ms.Sheela Barse have made full use of the activist
role of the courts. These social activists made a sincere attempt to reduce the gap
between the theoretical existences of law and are practice. Thus, with the help of
both judicial activism, and public interest litigation, we have entered into the last
decade of 20th Century to make laws instruments of social justice.
Whenever the rights and liberties of the Citizens are violated by any state actions,
the aggrieved person has the right to seek remedy from the administrative
machinery itself. Appeal provisions have been provided in the set up to facilitate this.
When all these remedies are exhausted, the citizens can move the High Court or the
Supreme Court to protect their interest. As the population along with mass illiteracy
is increasing alarmingly it becomes the function of the 'social activists' to educate the
masses about their rights and obligations to make the social justice a reality. When
the government has failed in its endeavor the responsibility to create the awareness
among the people must be shared by the people themselves with the assistance of
the social activists. (N.R. Madhava Menon, 1994)
4.7 Check your progress
Questions:
1. Discuss the distribution of powers between the central government and the state
government
2. Exp lain briefly what you understand by the term public interest litigation'
-
7/31/2019 Cyber Laws Notes
28/65
Unit 5
Information Technology and the Attempted Legal Response
5 IntroductionLaw always finds it very difficult to respond effectively to a technological process.
Obviously, technological pace is something insurmountable for the law to keepabreast. In addition, the process of 'law making' itself has a definite contribution
towards this. A look into the assumptions upon would give an idea on the factors
involved in law making.
5.1 ObjectiveAfter going through this unit will be able to explain the primary assumptions which
any legal system is based upon. You will be able to understand the relationship
between national law, sovereignty and world commerce especially in the age where
world commerce is blurring geographical boundaries.
5.2 Primary assumptions of a legal systemAny legal system is premised upon the following primary assumptions as a
foundation. They are:
a) Sovereignty
b) Territorial Enforcement
c) Notion of property
d) Paper based transactions and
e) Real relationships
5.2.1 SovereigntyLaw making power is a matter of sovereign prerogative. As a result, the writ of so
vereign authority runs throughout wherever sovereign power exercises authority.
Beyond its authority, which is always attributed to determinate geographical
boundaries, the sovereign cannot regulate a subject matter through legal
intervention. However, in the cyber context, geography is a matter o f history, in the
sense that barriers in terms of distance and geographical boundaries do not make
much sense.
5.2.2 Territorial EnforcementAny law in real world context can only be subjected to predetermined territorial
enforcement. In other words, the territory over which the sovereign authority
-
7/31/2019 Cyber Laws Notes
29/65
exercises power without any qualification or impediment will be able to enforce the
law. However, this proposition carries some exceptions. It is a normal practice in the
case of criminal law, the sovereign authority enjoins extra -territorial jurisdiction as
well. It is to indicate that even if the crime is committed beyond the limits of
territory, still the sovereign authority will be able to initiate prosecution, provided if
the custody of the person is fetched. Towards this end, it is a normal practice to
invoke extradition proceedings (which reflect mutual understanding and undertaking
to Co -operate with each other nation in cases of crime commission). However,
serious impediment in this respect is, the proceedings must comply with the principle
of 'double criminality'. It means that, in both the countries, the alleged act of
commission must have been criminalized. In the context of cyber law, there are only
twelve countries in the g lobe, where relevant laws have been enacted. But when it
comes to Civil law, say in the case of international contracts, pertinent principles of
Private International Law are invoked to address these issues. When it comes to
cyber context, territory does not hold any meaning. Connectivity without any
constraint is the strength of cyber world.
5.2.3 Notion of Property
The obtaining premise (though of late subjected to marginal change) of the legal
response considers 'property' as tangible and physical. With the advent of intellectual
property, undoubtedly, this concept or understanding of 'property' has undergone
change. In the cyber context, 'property' in the form of digitized services or goods
pose serious challenges to this legal understanding. Similarly, 'do main names' raise
fundamental questions vis--vis the legal understanding of what constitutes
'property'.
5.2.4 Real Relationships
Quite often, legal response considers relationships, which are real world oriented. In
view of connectivity, pace and accuracy as to transmission, in the cyber context,
these relationships acquire unique distinction of virtual character. In the broad ambit
of trade and commerce, it is the commercial transaction in the form of contracts,
which constitutes the foundation of legal relationship. Hence, if the relationships are
virtual, what should be the premise of contract law, which is basically facilitating in
nature? Even with regard to other activities, which are potentially vulnerable to
proscription, what kind of legal regulation is required to be structured?
-
7/31/2019 Cyber Laws Notes
30/65
5.2.5 Paper Based Transactions
Obtaining legal response considers and encourages people to create and constitute
legally binding relationships on the basis of paper-based transactions. No doubt, the
definition of 'document' as is obtaining under Section 3 of Indian Evidence Act, 1872
takes within its fold material other than paper also; still popularly the practice covers
only paper based transactions. But in the cyber context, it is the digital or electronic
records, which form the basis of electronic transactions. As a result of which
transactions will be on the basis of electronic records.
In the light of these seemingly non-applicable foundations, the legal system
originating from a particular sovereign country has to face complex challenges in
formalizing the structure of legal response. However, the inherent complexity did not
deter select countries in making an attempt in this regard. From the obtaining
patterns it can be understood that, substantial numbers of these countries have
apparently considered the following benchmarks in structuring the relevant legal
response.
Application of the existing laws duly modified to suit the medium of cyber context
with an appropriate regulatory authority monitoring the process and adjudicating the
rights and liabilities of respective stakeholders; Respective legislations enacted by
the concerned sovereign states with a deliberate attempt to encourage and facilitate
international co-operation to enforce these laws.
5.3 Role of the Judiciary in the evolving legal frame
work
Apart from these, while interpreting the pertinent laws, judiciary has also played an
active role in evolving and conceptualizing various legal issues and responses.
-
7/31/2019 Cyber Laws Notes
31/65
The rapid development of information technology presents challenges for the law.
Challenges which are not confined to any single one of the traditional legal
categories but which arise in, for example, criminal law, intellectual property law,
contract law and tort law. For instance, presently, the following issues are being
addressed by law.
How does the law deal with computer hackers or those who introduce viruses? Should a contract for the acquisition of software be categorized as one dealing with
goods?
Similarly, should software be regarded as a product? Can copyright subsist in acomputer program? Would patent protection be more appropriate?
Does the widespread dissemination of text on networks herald the death of copyright? Should the content of the material on the Internet be regulated and, if so, by whom?
What about freedom of information and expression?
How is the privacy of the individual to be protected amid the increasing capacity forstoring, gathering and collating information?
An overview of these concerns will enable us to broadly identify the applicab le
parameters for better comprehension and understanding:
Cyber crimes; Cyber contracts; Cyber privacy; Cyber intellectual property rights.
5.4 Check your progress
Questions:
1. State and discuss the primary assumptions of a legal system
-
7/31/2019 Cyber Laws Notes
32/65
Unit 6
CYBER CRIMES
6 Introduction
At the outset, terminological clarification about usage of this phrase namely, cyber
crimes is warranted. Many a time, cyber crimes' is used synonymously to indicate
computer crimes also. However, technically speaking, the phrase cyber crime entails
a different and unique understanding. No doubt, computer, in whatever sense we use
the term, basically is required to undertake any activity in the cyber context. In other
words, possible crime can be perpetrated with the help of a computer devoid of cyber
context. But as matters stand now, without the help of a computer network it is not
possible to involve in any kind of activity in the cyber context.
6.1 Objective
The objective of this unit is to define what constitutes Cyber Crime. You will be able
to identify the offences that constitute Cyber Crime under the I.T. Act 2000.
6.2 Cyber Crime - A perspective
In an influential research work, Pro f. Ulrich Sieber observed that; the vulnerability
of today's information society in view of computer crimes is still not sufficiently
realized: Businesses, administrations and society depend to a high degree on theefficiency and security of modern information technology. In the business
Communities, for example, most of the monetary transactions are administered by
computers in form of deposit money. Electronic commerce depends on safe systems
for money transactions in computer networks. A Company's entire production
frequently depends on the functioning of its data-processing system. Many
businesses store their most valuable company secrets electronically. Marine, air, and
space control systems, as well as medical supervision rely to a great extent on
modern computer systems. Computers and the Internet also play an increasing role
in the education and leisure of minors. International computer networks are the
-
7/31/2019 Cyber Laws Notes
33/65
nerves of the economy, the public sector and society. The security of these computer
and communication systems and their protection against computer crime is therefore
of essential importance.
In the course of this development computer crime has developed into a major threat
of today's information society. The spreading of computer technology into almost all
areas of life as well as the interconnection of computers by international computer
networks has made computer crime more diverse, mo re dangerous, and
internationally present. An analysis of relevant criminogenic factors shows that
modern computer and communication networks have specific characteristics which
are highly useful for perpetrators but which imply difficulties for potential victims and
for law enforcement (such as complex security questions, multiple hardware and
software systems, inexperience of many users, anonymity, encryption and
international mobility). Groups active in organized crime, professional business
espionage and secret services around the world are already exploiting these new
features of computer crime. However, many governments, businesses and private
users are not aware of the attacks that happen or could happen to them in the data
processing area. Thus, governmental agencies, the industry and private users should
be made aware that protection against computer attacks is of great significance.
They should be informed about the main threats of computer crime and the
responses thereto. (Prof. Ulrich Sieber, 1997)
6.3 The Problem: Current Forms of Computer CrimeIn most countries, the discussion about computer misuse began in the 1960s with
the endangerment of privacy, which was discussed under the headword of "data
protection" and was later integrated with in the concept of "computer crime". Since
the 1970s, scientific research concentrated on computer-specific economic crimes,
especially computer manipulations, computer sabotage, computer espionage and
software piracy. The rap id growth of the telecommunications sector since the 1980s
and especially the spread of the WWW since the 1990s then brought along the
dissemination ofillegal and harmful contents, such as pornography, hate speech and
other communication offences in international computer networks. At the same time,
-
7/31/2019 Cyber Laws Notes
34/65
the use of computers and modern communication technology by perpetrators in new
fields of crime, e.g. in organized crime, made it obvious that there were almost no
boundaries for computer-related crime and that from a phenomenological point of
view - homogeneous computer crime no longer existed. Since the respective
Modioperandi no longer follow a continuous path, but constantly adapt to new
technologies, the following analysis of these four main groups of computer crime will
each start with a short description of the historical development and then give an
analysis of the present main forms of crime.
6.3.1 Infringements of Privacy
While computers began their triumph in the 1960s, it was realized in several western
countries that the collection, storage, transmission and connection of personal data
endangered the personal (ity) rights of citizens. Orwellian visions and the mistrust of
the revolting youth of the late sixties inspired the discussion about the dangers of the
"big brother". However, during the 1980s, the old pattern of the computer as an
exotic instrument in the hands of the powerful became obsolete with the massive
spreading of personal computers. It became clear that the protection of privacy
within the data processing area also had to consider the multitude of private
computer systems and to establish a difficult balance of interests between the
privacy interests of data subjects concerned and the economic freedom of the holders
of personal data.
6.3.2 Economic offences
Since the 1970s, the discussion about computer misuse was not only marked by
infringements of privacy but also by computer-related economic crimes, which todayare regarded as the central area of computer crime and which were at first
exclusively characterized by that term. During the 1970s, fraudulent computer
Manipulations were the starting point of the discussion about computer-related
economic offences and the core center of computer-related economic crime.
However, today hacking has increasingly become a "basic offence" which is then used
to commit acts of espionage, software piracy, and sabotage as well as computer
fraud.
-
7/31/2019 Cyber Laws Notes
35/65
6.3.3 Computer Hacking
The term "computer hacking" traditionally describes the penetration of sabotage or
espionage but for the pleasure of overcoming the technical security measures. In
practice, this kind of offence can be frequently found. As far as the damage of these
cases is concerned, a differentiation is essential: In numerous cases, the penetrated
computer user is not actually harmed, but only endangered. However, in these
cases, too, the formal sphere of secrecy or the integrity of the concerned
computer systems is violated. Contrary to this considerable damages occur in other
cases especially when the perpetrators later use their knowledge for committing
espionage, sabotage or fraud.
Due to recent developments in the field of telephone and telecommunications
technology (such as ISDN hacking does not only affect classic computer systems but
also increasing telephone lines, answer phones and voice -mail- systems. "Telephone
hackers" dial themselves in to the telephone companys local phone exchanges and
are thus able to eavesdrop on the digitally led conversations in a respective part of
town. In the US, besides other confidential information, especially the numbers of
telephone access cards (so -called calling cards) are eavesdropped on, which are
then resold.
6.3.4 Computer Espionage
Computer espionage only rarely appearing in official statistics- constitutes a special
danger compared with traditional economic espionage, because in computer s stems
huge quantities of data are store in an extremely narrow space, and the data can becopied quickly and easily with the help of modern technology, also via data
telecommunication. The objects of offence are especially computer programs, data of
research and defense, data of commercial accounting as well as addresses of clients.
As the modus operandi, the simple copying of data is predominant; the theft of data
carriers the evaluation of "remaining data" or the absorbing of electromagnetic
emissions are also affected. Besides young hackers and competing business
enterprises, secret services increasingly appeared to be dealing with economic
espionage in recent years.
With the convergence of data processing and telecommunication as well as with the
-
7/31/2019 Cyber Laws Notes
36/65
digitalization of telecommunication, the line between traditional computer espionage
and telephone fax and e-mail monitoring becomes increasingly blurred. In the case of
telephone tapping, the criminals are able to penetrate the telephone exchanges of
the telephone companies especially via normal data lines. Car phones, directional
radio stations and satellite connections are particularly easy to attack in case of
uncoded communication.
6.3.5 Software Piracy and other forms of Product
Piracy
The unauthorized copying and use of computer programs -often called theft of
software or software piracy at first involved, in accordance with the historic
development of computer technology, the copying of individual software which
frequently contains important internal company know-how. Therefore software theft
overlaps with computer espionage in many cases.
6.3.6 Computer Sabotage and Compute r Extortion
The high concentration of data stored in the electronic devices mentioned above,
along with the dependence of many companies and administrative authorities on
data processing, make computer sabotage another particular danger for business and
administration. The objects of computer sabotage are the tangible computer
Facilities as well as the intangible data containing computer programs and other
valuable information.
For the modi operandi, one can be differentiate between methods causing physical
damage and those causing logical damage. During the 1970s, the most frequently
practiced methods of causing physical damage were igniting or bombing a building.
These techniques were typically applied by "outsiders" not employed or otherwise
related with the owners of the facilities damaged.
-
7/31/2019 Cyber Laws Notes
37/65
6.3.7 Computer Fraud
During the era of large mainframe computers, fraud committed by computer
Manipulations constituted a uniform group of crimes. Due to the diversification of
computer systems in the 1980s, nowadays the term computer fraud describes a
spectrum of various cases within the field of economic crimes.
Among the "classic" large-scale computer fraud cases, invoice manipulations
concerning the payment of bills and salaries of industrial companies as well as the
manipulations of account balances and balance sheets at banks were and still are the
predominant offences. In addition to this, an extension of manipulations to increase
the inventory could be perceived due to the recession of the recent year.
6.3.8 Illegal and harmful contents
In the late 1980s, first cases occurred in which information glorifying violence or
information of racist content was distributed with the help of computers especially by
political extremists.
In the USA, the Ku Klux Klan, the White Aryan Resistance, skinheads, and other neo-
Nazi organizations had already realized in the 19805 that it was much more effective
to work with means of electronic communication than with traditional "newsletters".
These groups used electronic communication systems mainly to distribute the names
of Jewish "opponents" and to give advice for violent actions.
In Germany, right-wing and left-wing extremist organizations first used Bulletin
Board Systems (BBS) and other electronic communication systems at the beginning
of the 1995. Right-wing extremist organizations especially used the so called "Thule-
Network", which consists of about 10 BBSs. In these BBSs, information about neo -
fascistic organizations and corresponding propaganda material was stored. The
electronic means of communication were used for the communication within private
groups of users as well as for informing the public. Left -wing radical groups
-
7/31/2019 Cyber Laws Notes
38/65
(particularly from the anarchistic autonomous scene and fro m the sphere of the so
called Red Army Fraction) distribute their plans of action especially via the BBS-
network "Spinnennetz (cobweb)", which is included in an international exchange of
information via the "European Counter Net work (ECN)".
At the beginning of the 1990s, the triumphant rise of the Internet was accompanied
by an exchange of illegal and harmful material which was intensively monitored by
the press and public. Today the center of attention is focused especially on child
pornography, hate speech and libel in international computer networks.
The distribution of child pornography and contents glorifying violence within the
Internet and similar computer networks was illustrated in the famous "CompuServe-
Case": In 1997, Bavarian State prosecutors indicted the head of the German
CompuServe GmbH subsidiary for not having filtered pornographic newsgroups and
games glorifying violence within the proprietary service, both types of data stored on
servers of CompuServe Inc. in the USA.
In 1996 the Spanish public was stunned by a case of distribution of child
pornography. Two students had a collection of over 150 floppy disks with child
pornography all collected over the Internet. Both had to be released from prison after
3 days because of a legal gap in the new Spanish Criminal Code of 1996.
Increasingly video games with a racial background in which the user could
discriminate against foreigners and ethnic minorities served as propaganda material
for young people. E.g., in the video game "Concentration Camp - Manager"
distributed mostly via BBS -the player must decide whether a foreign worker is first
to be sent to work in a mine or whether he is to be gassed immediately.
An example for libel was dealt with by court in the United States in 1991. In this
case, CompuServe contracted with a third party for that user to conduct a special-
-
7/31/2019 Cyber Laws Notes
39/65
interest forum (called "Rumorville") on CompuServe. The plaintiff claimed that
defamatory material about its business was posted by a user in that forum, and sued
both the forum host and CompuServe. CompuServe moved for, and received,
summary judgments in its favor.
The prosecution of perpetrators disseminating illegal contents in the Internet is not
only made d ifficu lt by the fact that these perpetrators are acting from abroad and
that the international mechanisms of co -operation are often weak and slow.
Prosecution is often impossible since perpetrators can hide behind the anonymity
which today is granted by anonymous re-mailers and by the abuse of free access
software.
6.4 Other offences
Along with the advance of information technology to new areas of live computers can
be (ab)used for almost all offences. This includes, e.g., threats to human life, various
activities of organized crime as well as electronic warfare.
6.4.1 Attacks on Life
Computer manipulations described above did not only serve the purpose of gaining
pecuniary benefits, but were also used for attacks on life -as in the case of the
manipulation of a flight control system or of a hospital computer. An example for the
spreading of computer crime in traditional fields of offences is the manipulation of aBritish hacker, who accessed the information system of a Liverpool hospital in 1994
because he simply wanted to see "what kind of chaos could be caused by penetrating
the hospital computer". Among other things, he changed the medical prescriptions
for the patients: A nine-year-old patient who was "prescribed" a highly toxic mixture
survived only because a nurse re-checked his prescription.
6.4.2 Organized Crime
-
7/31/2019 Cyber Laws Notes
40/65
It is obvious that the powerful tools of modern computer and communication
systems to store, administer and transfer data are also used by organized crime
groups in many areas. Organized crime is especially involved in the above described
acts of sophisticated computer fraud, credit card fraud, and telephone fraud as well
as software and product piracy. Computer data stored and transmitted in encrypted
form is also used e.g. by drug and arms dealers to administer their activities. In the
future, electronic money transactions and "cyber money" will be increasingly used for
illegal gambling and for money laundering on the Internet.
The involvement of organized crime groups in the field of computer fraud was
illustrated when a Russian group attacked one of the best known US banks in New Yo
rk via data networks in 1994. Operating from St. Petersburg, the group succeeded in
causing the American bank to transfer over US$ 10 million to foreign accounts.
Monitoring and following the "money trail" of the manipulations, some of the
perpetrators finally could be arrested. The responsible security officer of the bank
told the author that the arrested perpetrators possessed false Greek and Israeli
passports which were forged in a quality which could be produced in Russia only by
members of the former Russian secret service KGB.
6.4.3 Electronic Warfare
In the meantime, the possibilities of computer manipulations have also been
recognized in the military sector. "Strategic Information Warfare" has become a form
of potential warfare of its own. This type of warfare is primarily directed to paralyze
or manipulate the adversary's computer systems. The dependency of military systems
on modern information systems became evident in 1995 when a "tiger-team" of the
US Air Force succeeded in sending seven ships of the US Navy to a wrong destinationdue to manipulations via computer networks.
There is no need to point out the possible danger originating from a manipulated
nuclear power station in order to stress that meanwhile, computer misuse has
become a global threat and the security of modern computer systems has gained
central significance for the information society of our days.(Prof.Ulrich Sieber, 1999)
-
7/31/2019 Cyber Laws Notes
41/65
Thus broadly speaking, the following specified natures of offences are recognized by
respective nation -states in their legislations. The list by no means is to be construed
as exhaustive but only illustrative. As the technological potential misuse unfolds, we
need to expand the scope of criminalization. The possibility of marginal differences as
to the scope and ambit of respective cyber crimes cannot be ruled out. In addition,
strides in information technology further blurred the legislative understanding of what
constitutes cyber crime.
Computer Fraud: The input, alteration, erasure, or suppression of computer data or
computer programs or other interference with the course of data processing that
influences the result of the data processing, thereby causing economic or possessory
loss of property of another person with the intent of procuring an unlawful economic
gain for himself or any other person; Computer Forgery: The input, alteration,
erasure, or suppression of computer data or computer programs or other interference
with the course of data processing in a manner as prescribed by the law; Damage to
computer Data or computer Programs: The erasure, damaging, deterioration, or
suppression of computer data or computer programs without right; Computer
Sabotage: The input, alteration, erasure, or suppression of computer data or
computer programs or other interference with computer systems, with an intent to
hinder the functioning of a computer or a telecommunication system; Unauthorized
Access: The access without right to a computer system or network by infringing
security measures; Unauthorized Interception: The interception made without right
and by technical means, of communications to, from and within a computer system or
network; Unauthorized Reproduction of a Protected Computer Program: The
reproduction, distribution, or communication to the public without right; Pornographiccontent on the net.
6.5 Classification of Cyber Crimes in I.T. Act, 2000.
While considering the general terrain of cyber law, as of now, the following acts are
construed as cyber crimes in the I.T. Act, 2000.
Without permission of the authorized user Acc