The ICFAI University, Dehradun
Report On
CYBER LAW - A Way Ahead
Summer Internship Program by
AKASH KUMAR SINHA 1205C0009 B.B.A LLB (Hons.)
A REPORT
1
ON CYBER LAW – A Way Ahead BY AKASH KUMAR SINHA
1205C0009
Prepared in partia !"#i$ent o! t%e S"$$er Intern&%ip Pro'ra$ Pro'ra$ Under
The ICFAI Universiy! "ehrad#n Faculty of Law s
($ %ay &'$ o $ s #ne &'$)
"isrib#ion *is+
-
,ro-. %r. H % %ia* (Faculty Guide)
-
Ass. ,ro-. %onia haro*a (Project Guide)
AC/0OWLE"E1E%E0T AC/0OWLE"E1E%E0T
2
I would like to express my gratitude gratitude and appreciation appreciation to Hon’!e "ean Sir# H M Mitta! , my faculty guide and my project guide whose help, suggestions and encouragement, motivated me to complete my project and especially in writing this report. I would like to express my sincere thanks and heart full gratitude to Hon’!e "ean Sir# H M Mitta! my faculty guide for the project for his immense support & guidance whenever needed during the course of my training. I would also like to extend my gratitude to Asst$ Pro%$ Mrs$ Moni&a Mam# my project guide for helping me in the successful completion of the project. inally, yet importantly, I would like to express my heart full thanks to my !eloved parents for their !lessings, my friends for their help and wishes for the successful completion of this project.
"
Table T able of Contents Contents 1(............. 1(............................ ............................. ............................. .............................. ............................. ............................. .............................. ............................. .............................. ................ ABSTRACT ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((( (((((((((( ) 2(............. 2(............................ ............................. ............................. .............................. ............................. ............................. .............................. ................................... .................... INTRO*UCTION ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((( (((((((((( + ,(............. ,(............................ ............................. ............................. .............................. ............................. ............................. .............................. ...................... ....... ORI-IN O. CYBER /A ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((( (((((((((( 9 (............. (............................ ............................. ............................. .............................. ............................. ............................. .............................. ......................... .......... NEE* O. CYBER /A ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((( (((((((((((((((((((((( (((((((((( ((((( 10 (1 In!or$ation te%noo'3 a4((((((((((((((((((((((((((((((((((((((( a4((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((( ((((((((((((((((((( ((((((((( ((( 10 5(............. 5(............................ ............................. ............................. .................................. ................... UNITE* NATIONS *E.INITION O. CYBER CRIME ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((( (((((((((((((((((((((( (((((((((( ((((( 11 )(............. )(............................ ............................. ............................. .............................. ............................. ............................. ........................................ ......................... CYBER /A IN IN*IA ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((( (((((((((((((((((((((( (((((((((( ((((( 12 )(1 "ri&pr"dene o! Indian C36er /a4((((((((((((((((((((((((((((((((((((((((((( /a4((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((( (((( 12 ............................. ............................. .............................. ............................. ........................................ .......................... . A*7ANTA +(............. +(............................ A*7ANTA-E -E O. CYBER C YBER /A ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((( (((((((((((((((((((((( (((((((((( ((((( 15 8(.............................................................. 8(.............................................................. TO SI*ES O. IN*IAN CYBER /A OR IT ACT O. IN*IA ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((( (((((((((((((((((((((( (((((((((( ((((( 1) T%e IT /a4 2000 t%o"'% appear& to 6e &e! &"!#iient it ta:e& $i;ed &tand 4%en it o$e& to $an3 pratia &it"ation&( It oo&e& it& ertaint3 at $an3 pae& i:e<(((((((((((((((((((((((((((((((((((((((((((((((1+ 9(............. 9(............................ ............................. ............................. .............................. ............................. .............................................. ................................ PRACTICA/ CHA//EN-ES ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((( (((((((((((((((((((((( (((((((((( ((((( 19 9(1 Need to enat ne4 a4&(((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((( ((((((((((( ((((((((((( ((((((((((( (((((((((( 20 9(2 Need !or ne4 a4& on(((((((((((((((((((((((((((((((((((((((( on(((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((( ((((((((((((((( 20 10(............... 10(............................. ............................. .............................. ............................. ............................. ............................. ............................. .................................... ..................... CYBER SPACE 21 11(............... 11(............................. ............................. .............................. ............................. ............................. ............................. ................................................. ................................... CYBER CRIME 22 11(1 T3pe& o! 36er ri$e(((((((((((((((((((((((((((((((((((((((((( ri$e((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((( ((((((((((((((((( ((((((((((( ((((((((((( ((((((((( 2,
#
12(............... 12(............................. ............................. .............................. ............................. ..................................... ....................... PUB/ISHIN- CYBER PORNO-RAPHY 2 ............................. .............................. ............................. ............................. ................... .... /E-A/ POSITION AROUN* THE -/OBE 1,(............... 1,(............................. 25 1( Po&ition in U(K((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((( (((((((((((( ((((((((((( (((((((((( ((((( 25 2( Po&ition in U(S(((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((( ((((((((((((((((( (((((((((( ((((( 2) 1(............... 1(............................. ............................. .............................. ............................. ............................... ................. IN.ORMATION TECHNO/O-Y ACT 2000 2+ O=er=ie4(((((((((((((((((((((((((((((((((((((((((((((((((((( O=er=ie4((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((( ((((((((((((((((((( ((((((((((( ((((((((((( (((((((( ((( 2+ Stren't% > S%orto$in'(((((((((((((((((((((((((((((((((( S%orto$in'(((((((((((((((((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((( (((((((((((((((((((((( ((((((( 28 15(. 15(. .CYBER . CYBER E7I*ENCE CO//ECTION< MAOR CHA//EN-E TO /A EN.ORCEMENT IN IN*IA 29 1)(............... 1)(............................. ............................. .............................. ............................. ............................. ............................. ................................. ................... ....... CYBER /A CASES ,2 Ca&e 1< Te&&era In( =( =( Int? Trade Co$$?n Co$$?n 2010@11+) .ed( Cir( Cir( Ma3 2, 2011(((((((((((((( 2011((((( (((((((((((((( (((((((((( (((((,2 ,2 1+( SOME IN*IAN CASE STU*IES(((((((((((((((((((((((((((( STU*IES(((((((((((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((( (((((((((( , Ca&e 1( Rit" Ko%i Ca&e(((((((((((((((((((((((((((((((((((((((( Ca&e(((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((( ((((((((((((((((((( (((((((( , Ca&e 2( P"ne Citi6an: Mp%a&iS Ca Center .ra"d(((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((, Ca&e ,( Paria$ent Atta: Ca&e(((((((((((((((((((((((((((((((((((((( Ca&e((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((( ((((((((((( ((((((((((( ((((((((((( ((((((((( ((( ,5 Ca&e ( And%ra Prade&% Ta; Ca&e(((((((((((((((((((((((((((((((((((( Ca&e(((((((((((((((( ((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((((((((((( (((((((((((((((((((((((((((((((((((((((( ((((((((((((((((((((((((((((((( (((((((((((((((( ((((((((((( (((((( ,5 18(............... 18(............................. ............................. .............................. ............................. ............................. ............................. ............................. .............................. ...................... ....... CONC/USION ,) 19(............... 19(............................. ............................. .............................. ............................. ............................. ............................. .................................................. .................................... RE.ERENCES ,+
$
1( AB2TRACT AB2TRACT T%i& report i& a6o"t t%e 36er a4( C36er a4 i& a ne4 p%eno$enon 4%i% e$er'ed $"% a!ter a!ter t%e on&et on&et o! Intern Internet( et( Intern Internet et 're4 're4 in a o$pe o$pete te3 3 "npan "npanned ned and "nre'" "nre'"at ated ed $anner( E=en t%e in=entor& o! Internet o"d not %a=e rea3 antiipated t%e &ope and !ar rea%in' on&e"ene& o! 36er&pae( T%e 'ro4t% rate o! 36er&pae %a& 6een enor$o"&( Internet i& 'ro4in' rapid3 and 4it% t%e pop"ation o! Internet do"6in' ro"'%3 e=er3 100 da3& C36er&pae i& 6eo$in' t%e ne4 pre!erred en=iron$ent o! t%e 4ord( T%e 'ro4t% o! C36er&pae %a& re&"ted in t%e de=eop$ent o! a ne4 and %i'%3 &peiaiDed 6ran% o! a4 aed 36er a4&@ a4& o! t%e internet and t%e ord ide e6( C36er a4& are $eant to &et t%e de#inite pattern &o$e r"e& and '"ideine& t%at de#ined ertain 6"&ine&& ati=itie& 'oin' on t%ro"'% internet e'a and ertain ie'a and %ene p"ni&%a6e( C36er a4 i& a ter$ "&ed to de&ri de&ri6e 6e t%e e'a e'a i&&"e& i&&"e& reat reated ed to "&e o! o$$"n o$$"nia iatio tion& n& te%no te%noo' o'3 3 parti parti"a "ar r3 3 36er&pae i(e( t%e Internet( It i& e&& a di&tint #ied o! a4 in t%e 4a3 t%at propert3 or ontrat are a& it i& an inter&etion o! $an3 e'a #ied& in"din' inteet"a propert3 pri=a3 !reedo$ o! e;pre&&ion and F"ri&dition( In e&&ene 36er a4 i& an atte$pt to app3 a4& de&i'ned !or t%e p%3&ia 4ord to %"$an ati=it3 on t%e Internet( "ri&dition and &o=erei'nt3 &o=erei'nt3 i&&"e& o! F"ri&dition and &o=erei'nt3 %a=e %a=e "i:3 o$e to t%e !ore in t%e era o! t%e Internet( t%e Internet( T%e Internet doe& not tend to $a:e 'eo'rap%ia and F"ri&ditiona 6o"ndarie& ear ear 6"t Internet "&er& re$ain in p%3&ia F"ri&dition& and are &"6Fet to a4& independent o! t% t%ei eirr pr pre& e&en ene e on t% t%e e In Inte tern rnet( et( T%e T%e pri$ pri$ar ar3 3 &o"r &o"re e o! 36e 36err a4 a4 in Indi India a i& t%e t%e In-or3aion Te4hno*o5y A4! &''' %erein &''' %erein a!ter re!erred to In!or$ation Te%noo'3 At 4%i% a$e into !ore on date 1+ t% Oto6er 2000( T%e pri$ar3 p"rpo&e o! t%e In!or$ation Te%noo'3 At i& to pro=ide e'a reo'nition to eetroni o$$ere and to !aiitate #iin' o! eetroni reord& 4it% t%e -o=ern$ent( T%e In!or$ation Te%noo'3 At a&o penaiDe& =ario"& 36er ri$e& and pro=ide& &trit p"ni&%$ent&( I$pri&on$ent ter$& "p to 10 3ear& and o$pen&ation "p to rore& o! r"pee&( T%i& report i& an atte$pt to %i'%i'%t e;perti&e and e;peri$ent& in !e4 &i'ni#iant area& o! e;i&ti e;i&tin' n' ate'o ate'orie rie&& o! a4& a4& to t%e e=a&i e=a&ion on o! o$$"n o$$"nia iatio tion& n& and tran& tran&at ation ion&& in t%e
%
36e 36er& r&pa pae e eit% eit%er er 63 4a3 o! a$en a$endi din' n' t%e t%e e;i& e;i&ti tin' n' a4& a4& or 63 4a3 o! reat reatin in' ' ne4 ne4 e'i&ation&(
2( I0TRO"UCTIO0 uccess in any field of human activity leads to crime that needs mechanisms to control it. 'egal provisions should provide assurance to users, empowerment to law enforcement agencies and deterrence to criminals. (he law is as stringent as its enforcement. )rime is no longer limited to space, time or a group of people. )y!er space creates moral, civil and criminal wrongs. It has now given a new way to express criminal tendencies. *ack in 1++, less than 1, people were a!le to log on to the Internet world wide. ow around $ million people are hooked up to surf the net around the glo!e. dvent of technology not only widens scientific hori/on !ut also poses constant challenges for the jurisprudence, legal system and legal world as a whole. )omputer, internet, and cy!er space 0 together known as information technology 0 present challenge for the law. (he court courtss thro throug ugho hout ut the the world world have have !een !een deal dealin ing g with with thes thesee pro! pro!le lems ms or deali dealing ng with with the the information technology is termed as computer laws or information technology laws or cy!er laws. computer is a electronic machine that accepts data and instructions instructions as input, allows it to !e stored and manipulated3 and processes 4computes5 the data at high speed and gives information 6 data as output 4result5. 4result5. (hus computer is material medium. medium. Internet is not a physical or tangi!le entity, !ut rather a giant networks, which interconnects innumera!le smaller groups of link linked ed comp comput uter er netw networ orks ks.. (h (her eree is no cent centra rali li/e /ed d stor storag agee loca locati tion. on. )ont )ontro roll point point,, or communications channel for the internet, and it would not !e technically feasi!le for the single entity to control all of the information conveyed on the internet. (hus internet is a virtual medium. )y!er space is a virtual location. nyone with assess to the internet may take advantage of vide variet variety y of commun communica icatio tion n and inform informati ation on retri retrieval eval methods methods.. (hese (hese methods methods are consta constantl ntly y evolving and difficult to categori/ed precisely. *ut the presently constituted and most relevant are electronic mail 47e-mail85, automatic mailing list services 47mail exploder8, sometimes referred to a 7listservs85, newsgroups, chat rooms and the 7world wide we!8. ll these methods can !e used to transmit ext3 most can transmit sound, picture, and moving video images. (aken together, these tools constitute a uni9ue medium- known to its users as cy!erspace 0 located in no particular geographical location !ut availa!le to anyone. nywhere in the world, with the access to internet.
:
)omputer is a material medium3 internet is a virtual medium3 cy!erspace is a virtual location for electronic activities. (he offences are committed in cy!erspace with the help of internet and computer. )y!er laws are therefore those laws, which have !een adapted or reinterpreted to govern and apply to transactions or interactions in cy!erspace. )y!er law also cover those special enactments, which are specially design to govern or apply to cy!erspace for example information technology legislations enacted in different countries including information technology act, 2, enacted !y government of India or uniform electronic transaction act recently approved in the ; for adoption !y the various us states. )y!er states. )y!er pace 'aw
title II. (itle I - Interception of )ommunications and
atters. *asically takes the existing laws and updates them to include com comput puters ers.. ?he ?here re !ef !efore ore it was illegal illegal to intercept private telephone calls, it now says it is illegal to intercept private computer private computer transmissions. It also includes a provision to make it legal to intercept pu!lic radio transmissions like it is with pu!lic radio programs. It also allows Internet ervice @roviders to @roviders to keep a log of who called and their activity on-lin onlinee to pro protec tectt the themse mselve lves. s. (itl itlee II - to tored red ?ir iree and Ale Alectr ctroni onicc )om )ommun munica icati tions ons and (ransactional
B
,( ORI1I0 OF CYBER LAW
cience the !eginning of the civili/ation, man has constantly adapted himself with the changing circumstances and scenarios to usher in new eras of development and progress. Avery stage of human history has !een important in its own way. Internet has !ecome an all pervading revolution which is having an immense impact on all aspects of human life and existence. Internet is a new phenomenon which has set new !enchmarks for the entire mankind. Internet is a glo!al network of computers, all speaking same language. Internet has grown in a very rapid ar!itrary and unplanned manner. *ecause of this unplanned nature of internet. It was felt initially internet is a system of anarchy. Cowever as time flew, it !egan to drawn upon neti/ens that internet and cy!erspace need to !e regulated and a regulated cy!erspace would !e the catalyst for the future progress of mankind. Cerein lay the seeds of origin o% (er !a+ .
(he dawning of the 21st century seems to have had a magical effect on India. (he Indian government has taken the emergence of the new millennium as a signal to proceed forward in the direction direction of whole heartedly heartedly adopting adopting technologie technologiess and giving legal recognition recognition to the same and regulating the same. (his new chapter !egan with the passing of Indias Indias first cy!er law namely, the information technology act, 2.
+
( 0EE" OF CYBER LAW 1.
)oming of of in internet.
2.
Dreater Dreater cultural cultural,, economic, economic, political political and social social transforma transformation tion in the the history history of human human societ society y.
".
)omple )omplex x legal legal issue issuess arisi arising ng leadi leading ng to the the devel developm opment ent of of cy!er cy!er law law.
#.
Eiffer Eifferent ent approach approaches es for control controllin ling, g, regulati regulating ng and facilita facilitati ting ng electron electronic ic communic communicati ation on and commerce.
$.
)y!erspace has has com complete )isrespe(t %or 3uris)i(tiona! oun)aries . person in India could !reak into a !anks electronic vault hosted on a computer in ; and transfer millions of
%.
)y!erspace ha handles giganti( tra%%i( o!umes eer se(on) . *illions of emails are crisscrossing the glo!e even as we read this, millions of we!sites are !eing accessed every minute and !illions of dollars are electronically transferred around the world !y !anks every day.
:.
)y!e )y!errspac spacee is is a!s a!sol olut utel ely y open to parti(ipation a!! .
6.$ In-or3aion e4hno*o5y *a7 1.
lor lorid idaa ele elect ctro roni nicc sec secur urit ity y act act
2.
Illi Illino nois is elec electr troni onicc com comme merc rcee secu securi rity ty act act
".
(exas exas penal penal code code 0 comp comput uter er cri crime mess ssta tatu tute te
#.
>ain >ainee crim crimin inal al cod codee 0 comp comput uter er cri crime mess
$.
ing ingap apor oree elec electr tron onic ic tra trans nsac acti tion on act act
%.
>ala >alays ysia ia com comput puter cri crimes mes act act
:.
>ala >alays ysia ia digi digita tall sig signa natu ture re act act
B.
;)I ;)I(< (<' ' mo model del law law on on ele elect ctro roni nicc com comme merc rcee
+.
Info Inform rmat atio ion n tec techn hnol olog ogy y act act 2 2 of of Indi Indiaa
1
5( U0ITE" 0ATIO02 0ATIO02 "EFI0ITIO0 OF CYBER CRI%E )y!ercrime spans not only state !ut national !oundaries as well. @erhaps we should look to international organi/ations to provide a standard definition of the crime. t the (enth ;nited ations )ongress on the @revention of )rime and (reatment of Fffenders, in a workshop devoted d evoted to the issues of crimes related to computer networks, cy!ercrime was !roken into two categories and defined thusG a$ )y!ercrime in a narrow sense 4computer crime5G ny illegal !ehavior directed !y means of
electronic operations that targets the security of computer systems and the data processed !y them. $ )y!ercrime in a !roader sense 4computer-related crime5G ny illegal !ehavior committed !y
means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or distri!uting distri!uting information !y means of a computer system or network.
Ff course, these definitions are complicated !y the fact that an act may !e illegal in one ation !ut not in another. another. (here are more concrete examples, including i$ ;nauthori/ed access ii$ Eamage to computer data or programs iii$ )omputer sa!otage i$ ;nauthori/ed interception of communications $ )omputer espionage
11
)( CYBER LAW I0 I0"IA (he primary primary source source of cy!er cy!er law in India is the In%ormation 'e(hno!og A(t , 2 4I( ct5 which came into force on 1: Fcto!er 2. (he primary purpose of the ct is to provide !ega! filing ng of e!e(tro re(ogn re(ognitio ition n to e!e(tr e!e(troni( oni( (ommer (ommer(e (e and to facilitate fili e!e(troni( ni( re(or re(or)s )s +ith +ith the penali/es various various cy!er crimes and provides strict punishments 4oernment . (he I( ct also penali/es 4imprisonment terms upto 1 years and compensation up to
8.$ #ris9r#den4e o- Indian Cyber La7 (he primary primary source source of cy!er cy!er law in India is the In%ormation 'e(hno!og A(t# 2000 4I( ct5 which came into force on 1: Fcto!er 2. (he primary purpose of the ct is to provide legal recogni recognitio tion n to electr electroni onicc commer commerce ce and to facil facilita itate te filin filing g of electr electroni onicc record recordss with with the Dovernment. (he I( ct also penali/es various cy!er crimes and provides strict punishments 4imprisonment terms upto 1 years and compensation up to inor errors in the ct were rectified !y the Information (echnology 4iscellaneous @rovisions5 ct, 22. (his introduced the concept of electronic che9ues and truncated truncated che9ues. Informati Information on (echnology (echnology 4;se of Alectronic Alectronic
of
fees
in
relation
to
the
Dovernment
!odies.
Fn the same day, the Information (echnology 4)ertifying uthorities5
ext were the Duidelines for su!mission of certificates and certification revocation lists to the )ontrol )ontroller ler of )erti )ertifyi fying ng uthor uthoriti ities es for pu!lish pu!lishing ing in the ation ational al
(hese
were
issued
on
1%
Eecem!er
22.
(he )y!er
)<(.
Fn 1: >arch 2", the Informati Information on (echnology echnology 4ualific 4ualification ation and Axperience Axperience of djudicati djudicating ng Ffficers and >anner of Colding An9uiry5
(he Dovernment had not appointed the djudicating Ffficers or the )y!er um!ai Cigh )ourt consisting of Con!le Hustice .@. hah and Con!le Hustice arch 2" appointing the 7ecretary of Eepartment of Information
1"
(echnology of each of the tates or of ;nion (erritories8 of India as the adjudicating officer for that tate or ;nion (erritory (erritory.. (he In%ormation 'e(hno!og Se(urit Pro(e)ure6 Ru!es# 2007 came into force on 2+ Fcto!er 2#. (hey prescri!e provisions relating to secure digital signatures and secure electronic records. lso relevant are the Information (echnology 4Fther tandards5
Amer Am erge genc ncy y
(eam eam
4)A< )A<(-IE -IE55
can can
inst nstruct ruct
Eepa Eepart rtm ment ent
of
(elecommunications 4Eo(5 to !lock a we!site. (he Indian @enal )ode 4as amended !y the I( ct5 penali/es several cy!er crimes. (hese include forgery of electronic records, cy!er frauds, destroying electronic evidence etc. Eigital evidence is to !e collected and proven in court as per the provisions of the Indian Avidence ct 4as amended !y the I( ct5. In case of !ank records, the provisions of the *ankers *ook Avidence ct 4as amended !y the I( ct5 are relevant. Investigation and adjudication of cy!er crimes is done in accordance with the provisions of the )ode of )riminal @rocedure and the I( ct. (he onitoring and Eecryption of Information5 onitoring and )ollecting (raffic Eata or Information5 em!ers5 is!ehavior or Incapacity Incap acity of )hairperson and >em!ers5
1#
+( A":A0T A":A0TA1E A1E OF CYBER LAW LAW (he I( act 2 attempts to change outdated laws and provides way to deal with cy!er crimes. ?e need such laws so that people can perform purchase transactions over the et through credit cards without fear of misuse. (he act offers the much- needed need ed legal framework so that information is not no t denied legal effect, validity or enforcea!ility, solely on the ground that it is in the form of electronic records. In view of the growth growth in transactions transactions and communicati communications ons carried out through through electronic electronic record, the act seeks to empower government departments to accept filing, creating and retention of official documents in the digital format. (he act also proposed a legal framework of authentication and origin of electronic records 6 communication through digital signature.
rom the perspective of e-commerce in India, the it act 2 and its provisions contain many positive aspects. irstly the implications of these provisions for the e-!usiness would !e that emails would now !e a valid and legal form of communication in our country that can !e duly produced and approved in court of law.
)ompanies shall now !e a!le to carry out electronic commerce using the legal infrastructure provided !y the act.
Eigital signatures have !een given legal validity and section in the act.
(he act now allows government to issue notification on the we! thus heralding e-governess.
(he act ena!les the companies to file any form, application or any other document with any office, authority, !ody or agency owned or controlled !y the appropriate government in electronic form !y means of such electronic form as may !e prescri!ed !y a appropriate government.
(he I( act also addresses the important issues of security which are also critical to success of electronic transactions. (he act has given a legal definition to the concept of secure digital signatures that would !e re9uired to have !een passed through a system of security procedure, as stipulated !y the government at the later day.
;nder the I( act, 2, it shall now !e possi!le for corporates to have a statutory remedy in case if anyone !reaks into their computer system or network and causes damages or copies data. (he remedy provided !y the act in the form of monetary damages, not exceeding
1$
8( TWO 2I"E2 OF I0"IA0 CYBER LAW OR IT ACT OF I0"IA )y!er laws are meant to set the definite pattern, some rules and guidelines that defined certain !usiness activities going on through internet legal and certain c ertain illegal and hence punisha!le. (he I( ct 2, the cy!er law of India, gives the legal framework so that information is not denied legal effect, validity or enforcea!ility, enforcea!ility, solely on the ground that it is in the form of electronic records. Fne cannot regard government as complete complete failure failure in shielding shielding numerous e-commerce e-commerce activities activities on the firm !asis of which this industry has got to its skies, !ut then the law cannot !e regarded as free from am!iguities. >> porn case in which the )AF of !a/ee.com 4an A!ay )ompany5 was arrested for allegedly selling the >> clips involving school children on its we!site is the most apt example in this reference. Fther cases where the law !ecomes ha/y in its stand includes the case where the newspaper >id-Eaily pu!lished the pictures of the Indian actor kissing her !oyfriend at the *om!ay nightspot and the arrest of Jrishan Jumar for illegally using the internet account of )ol. 4
1%
". (he act also talks a!out digital signatures and digital records. (hese have !een also awarded the status of !eing legal and valid means that can form strong !asis for launching litigation in a court of law. It invites the corporate companies in the !usiness of !eing )ertifying uthorities for issuing secure Eigital ignatures )ertificates. #. (he ct now allows Dovernment to issue notification on the we! thus heralding e-governance. $. It eases the task of companies companies of the filing filing any form, form, application application or document !y laying down the guidelines to !e su!mitted at any appropriate office, authority, !ody or agency owned or control controlled led !y the governmen government. t. (his will will help help in saving saving costs, costs, time time and manpower manpower for the corporates. %. (he act also provides statutory remedy to the coporates in case the crime against the accused for !reaking into their computer systems or network and damaging and copying the data is proven. (he remedy provided !y the ct is in the form of monetary damages, not exceeding
The IT La7 &'''! ho#5h a99ears o be se*- s#-;i4ien! i aes 3i
entering
into
the
e-commerce.
2. (he law even stays silent over the regulation of electronic payments gateway and segregates the negotia!le negotia!le instruments instruments from the applica!il applica!ility ity of the I( ct, which may have major effect effect on the
1:
growth of e-commerce in India. It leads to make the !anking and financial sectors irresolute in their
stand.
". (he act empowers the Eeputy uperintendent of @olice to look up into the investigations and filling of charge sheet when any case related to cy!er law is called. (his approach is likely to result in misuse in the context of )orporate India as companies have pu!lic offices which would come within the am!it of Lpu!lic placeL under the ct. s a result, companies will not !e a!le to escape potential potential harassment harassment at the hands of the E@. E@. (he ct initially initially was supposed supposed to apply to crimes committed all over the world, !ut no!ody knows how can this !e achieved in practice, how to enforce it all over the world at the same timeMMM (he I( ct is silent silent on filmi filming ng anyone anyoness person personal al action actionss in pu! pu!lic lic and then then distri distri!ut !uting ing it electronically. It holds I@s 4Internet ervice @roviders5 responsi!le for third party data and information, unless contravention is committed without their knowledge or unless the I@ has under und erta take ken n due dili diligen gence ce to preve prevent nt the the cont contra raven venti tion. on. or or examp example le,, many many Eelh Eelhii !ase !ased d newspapers advertise the massage parlors3 and in few cases even show the therapeutic masseurs hidden !ehind the mask, who actually are prostitutes. Eelhi @olice has !een successful in !usting out a few such rackets !ut then it is not sure of the action it can takeNshould it arrest the owners and editors of newspapers or wait for some new clauses in the ct to !e added upMM Aven the much hyped case of the arrest of *ajaj, the )AF of *a/ee.com, was a conse9uence of this particular am!iguity of the law. law. Fne cannot expect an I@ to monitor what information their su!scri!ers are sending out, all 2# hours a day. )y!er law is a generic term, which denotes all aspects, issues and the legal conse9uences on the Internet, the ?orld ?ide ?e! and cy!er space. India is the 12th nation in the world that has cy!er legislation apart from countries like the ;, ingapore, rance, >alaysia and Hapan. *ut can the cy!er laws of the country !e regarded as sufficient and secure enough to provide a strong platform to the countrys e-commerce industry for which they were meantMM India has failed to keep in pace with the world in this respect, and the conse9uence is not far enough from our sight3 most of the !ig customers of Indias outsourcing company have started to re-think of carrying out their !usiness in India .*ajajs case has given the strongest !low in this respect and have !roken Indias Indias share in outsourcing ou tsourcing market as a leader.
1B
If India doesnt want to loose its position and wishes to stay as the worlds leader forever in outsourcing market, it needs to take fast !ut intelligent steps to cover the glaring loopholes of the ct, or else the day is not far when the scenario of India ruling the worlds worlds outsourcing market will stay alive in the dreams only as it will !e overtaken !y its competitors.
9( ,RACTICAL ,RACTICAL CHALLE01E2 (he important issue !efore government and policy makers how to piggy ride advantages of new technology and how to harass its !enefits for the purpose of administration of justice.
?e must ensure that the final output of any electronic governance project must !e legal in a court of law.
eed to comply the strict re9uirements of an I( ct 2 emended Indian evidences.
I( ct 2 does not mention a!out domain names and the rights of domain names owners.
I( ct 2 does not mention a!out intellectual property right 0 copyrights, trade mark, patent.
I( act purports to !e applica!le to not only the whole of India !ut also to any offence or contravention there under commitment outside of India !y any person.
(his provisions in section1 425 is not clearly and happily h appily drafted. ot clear as to how and in what particular pa rticular manner, the said act shall apply to any offence and contravention there under committed outside of India !y any person.
Anforcement aspect of the I( act is an area of grave concerned numerous difficulties likely to arise in the enforcement of said act.
Internet has shrunk the si/e of world and slowly, national !oundaries shall cease to have much meaning in cy!er space.
I( act talks a!out the use of electronic records and digital signature in government agencies yet strangely it further says in section + that this does not confer any right upon any person to insist that the document in 9uestions should !e accepted in electronic form.
Alectronic payment issues not addressed.
o mention of electronic fund transfer. transfer.
ew forms and manifestations of cy!er crimes emerging everyday. eed for new legislative mechanism to control cy!er crimes.
1+
=.$ 0eed o ena4 ne7 *a7s
)oncerning electronic payments.
Fn electronic fund transfer.
Internet !anking laws.
=.& 0eed -or ne7 *a7s on
Eata protection
@>
Information security
@rivacy
@rotection of Indian children online.
2
10( CYBER 2,ACE metaphor for descri!ing the non-physical terrain created !y computer systems. Fnline systems, for example, create a cy!erspace cy!erspace within which people can communicate communicate with one another another 4via email5, do research, or simply window shop. 'ike physical space, cy!erspace contains o!jects 4files, mail messages, graphics, etc.5 and different modes of transportation and delivery. ;nlike real space, though, exploring cy!erspace does not re9uire any physical movement other than pressing keys on a key!oard or moving a mouse. ome programs, particularly computer games, are designed to create a special cy!erspace, one that resem!les physical reality in some ways !ut defies it in others. In its extreme form, called virtual reality, users are presented with visual, auditory, auditory, and even tactile feed!ack that makes cy!erspace feel real.
21
11( CYBER CRI%E 'he term 8(er’ )erie) %rom (erneti(s# use) to )es(rie the entire range o% things ma)e aai!a!e through the use o% (omputer$
ll crimes performed or resorted to !y a!use of electronic media or otherwise, with the purpose of influe influenci ncing ng the functi functioni oning ng of comput computer er or comput computer er sys system tem.. )y!er )y!er crime crime is a term used to !roadly descri!e criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to ena!le the illicit activity. )y!er )rime )omputer crime mainly consists of unauthori/ed access to computer systems computer systems data alteration, data Eestruction, theft of intellectual properly. )y!er crime in the context of national security may involve hacktivism, traditional espionage, or information warfare and related activities. )y!er crime is the latest and perhaps the most complicated pro!lem in the cy!er world. 7)y!er crime may !e said to !e those species, of which, genus is the conventional crime, and where either the computer is an o!ject or su!ject of the conduct constituting crime8. 7ny criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the am!it of cy!er crime8 generali/ed definition of cy!er crime may !e 7 unlawful acts wherein the computer is either a tool or target or !oth8 (he computer may !e used as a tool in the following kinds of activityactivity- financial crimes, sale of illegal illegal articles, articles, pornography pornography,, online online gam!ling, intellectual property crime, e-mail spoofing, forgery, cy!er defamation, cy!er stalking. (he computer may however !e target for unlawful acts in the following cases- unauthori/ed access to computer6 computer system6 computer networks, theft of information contained in the electronic form, e-mail !om!ing, data didling, salami attacks, logic !om!s, (rojan attacks, internet time thefts, we! jacking, theft of computer system, physically damaging the computer system. )y!er crime is use of computer and the internet !y criminals to perpetrate fraud and other crimes against companies and consumers. (o avoid harm from these activities all users should check that we! sites they use all people to whom they e-mail sensitive information are genuine. )rime committed using a computer and the internet to seal a persons identity or sell contra!and or stalk victims or disrupt operations with malevolent programmes. )y!er crime is a !roadly use them to descri!e criminal activity commBitted on computers or the internet. ome of it is punisha!le !y
22
the laws of various countries, where as others have a de!ata!le legal status. (he term cy!er crime is a misnomer. (his term has nowhere !een defined in any statute6act passed or enacted !y the Indian parliament. (he concept of cy!er crime is not radically different from the concept of conventional conventional crime. *oth include include conduct weather weather act or omission, which causes !reach of rules of law and counter!alanced !y the sanction of the state.
$$.$ Ty9es o- 4yber 4ri3e Ha4in5 "enia* o- 2ervi4e Aa4 :ir#s "isse3inaion "isse3inaion 2o-7are ,ira4y ,orno5ra9hy Credi Card Fra#d 0e E<orion ,hishin5 29oo;in5 Cyber 2a*in5 Cyber "e-a3aion Threaenin5 2a*a3i Aa4
12( ,UBLI2HI01 CYBER ,OR0O1RA,HY Summar
ACTIO02 CO:ERE" CO:ERE"
,UBLI2HI01! CAU2I01 TO BE ,UBLI2HE" A0" TRA02%ITTI01 CYBER ,OR0O1RA,HY
2"
Firs o--en4e+ si39*e or ri5oro#s i39rison3en #9 o > years and ;ine #9 o Rs. $ *ah s#bse?#en o--en4e+ si39*e or ri5oro#s i39rison3en #9 o $' years and ;ine #9 o Rs. & *ah
,ena*y
Re*evan a#horiy
Co#r o- session
A99ea* *ies o Invesi5aion A#horiies
Hi5h 4o#r $. Conro**er o- 4eri-yin5 a#horiies (44a) &. ,erson a#hori@ed by 44a . ,o*i4e o-;i4er no be*o7 he ran o- de9#y s#9erinenden s#9erinenden $. Co39*ainan deai*s &. 2#s9e4 deai*s . Ho7 and 7hen he 4onravenion 7as dis4overed and by 7ho3 6. Oher re*evan in-or3aion
,oins o 3enion in 4o39*ain
1,( LE1AL ,O2ITIO0 AROU0" THE 1LOBE @ro!lem of cy!er crime induced many states to reconsider their own legislation. owadays more than 1 countries 4including %O Interpol mem!ers5 have no laws regulating fighting cy!er 2#
crimes. (he pro!lem in regulating cy!er crime is that there are no uniform laws. ome countries, such as ;.J, have cy!er crime laws like the )F>@;(A< >I;A )( 1++ that are well implemented. Fther territories have laws that have yet to !e fully implemented, while some countries and yet to make provisions for cy!er crime within their judicial system at all.
$. ,osiion in U./ (he computer misuse act 1++ is an act of the ;.J parliament. (he acts introduction followed the decision in R 4o!) , with the !ills critics charging charging that it was introduce introduce hastily hastily and was poorly through through out. Intens Intension ion they they said said was often diffic difficult ult to prove, prove, and that that the !ill !ill inade9u inade9uate ately ly differentiated 7joyriding8 crackers like gold and schifreen from serious computer criminals. (he act has nonetheless !ecome a model upon which several other countries including )anada and the repu!lic of Ireland, have drawn inspiration when su!se9uently drafting their own information security laws. (he act identifies three specific offencesG 1. ;nauthori/ed access to computer material 4that is, a program or data5. 2. ;nauthori/ed access to a computer system with intent to commit or facilitate the commission of a serious crime. ". ;nauthori/ed modification of computer material. In 2# the all party internet group pu!lished its review of the law and highlighted areas for develop developmen ment. t. (heir (heir recomm recommend endati ations ons led to the drafting drafting of the (ompute (omputerr misuse misuse a(t 1990 amen)ment6 amen)ment6 i!!$ ?hich sought to amend the )> to comply with the Auropean convention on
cy!er crime
&. ,osiion in U.2 (he computer crime is on the rise in ;, sense the introduction of computers into merican society in general. In an earlier era, the advent of the automo!ile opened the way for criminals to target the automo!ile itself 4e.g., auto theft5 or use it to facilitate traditional crimes. In addition law
2$
enforcement had to learn to sei/e vehicles to search them for evidence of some offense unrelated to the vehicle itself 4e.g. the !ox of document in the trunk5. In many of them ways, computers, too, have proven important to criminal investigations. irst, a computer may !e the target of the offence. In these cases, the criminals goals are to steal information from, or cause damage to, a computer may !e a tool of the offences. (his occurs when an individual uses a computer to facilitate some traditional offense such as fraud.
2%
1( I0FOR%ATIO0 TECH0OLO1Y ACT &'''
The 18th Day of October of this millennim! "ndia #itnessed the enactment of "nformation Technolo$y Act% An Act that is a class of le$islation of its o#n% An act to $o&ern and re$late the hi$h-tech &irtal electronic #orld the cyber #orld% The information Technolo$y Act is an otcome of the resoltion dated '(th )anary 1**+ of the ,eneral Assembly of the nited .ations! #hich ado/ted the 0odel La# on Electronic Commerce! ado/ted the 0odel La# on Electronic Commerc Commerce e on "nternation "nternational al Trade La#% La#% This resolti resoltion on recomm recommended ended!! inter inter alia! that all states $i&e fa&orable consideration to the said 0odel La# #hile re&isin$ enactin$ ne# la#! so that niformity may be obser&ed in the la#s! of the &arios cyber-nations! a//licable to alternati&es to /a/er based methods of commnication and stora$e of information%
Overvie7 The heart and sol of any enactment is reected rather en$rafted in its 23reamble2 or introdction% The intention of the le$islatre! the /roblem at #hich #hich it aims! aims! the ri$or! ri$or! #hich #hich it tries tries to miti$a miti$ate! te! is reec reected ted from the 3reamble% " /ersonally feel that the /reamble e&en $i&es a clear o&er&ie# of the statte concerned% The "%T Act aims at le$ali4in$ 5electronic Commerce5 and /ro&ide
2:
for 5electronic $o&ernance5% 6rther this Act has also amended the /ro&isions of
the
71
3enal Code9 E&idence Act9 Ban:er2s Boo: E&idence Act9 The basic aim of these amen amendm dmen ents ts is to str stren$t en$the hen n the the ;st ;stic ice e deli deli&e &ery ry mech mechan anis ism m and $i&e $i&e reco$nition to the &irtal 2e-medim2%
2ren5h 2hor4o3in5 .othin$ is /erfect in this #orld% .ot e&en the /ersons #ho le$islate% Therefore it #ol #old d not not at all all be feas feasib ible le to e
cate$ories=
$."i5ia* 2i5na#re &. E1overnan4e . #si4e "e*ivery 2yse3 6. O--en4es ,ena*ies >. A3end3ens in he vario#s A4s.
2B
15( CYBER E:I"E0CE COLLECTIO0+ %AOR CHALLE01E TO LAW E0FORCE%E0T E0FORCE%E0T I0 I0"IA I0"I A It is more than ten years since law was passed in India to recogni/e electronic documents as admissi!le evidence in a )ourt of law. (he necessary amendments were made to the Indian Avidence ct 1B:2 !y the Information (echnology (echnology ct 2 4I(-25. 4I(-25. In the case of electronic documents produced as L@rimary AvidenceL, the document itself must !e produced to the )ourt. Cowever, such electronic document o!viously o!v iously has to !e carried on a media and can !e read only with the assistance of an appropriate )omputer with appropriate operating software and application software. In many cases even in non-electronic documents, a document may !e in a language other than the language of the )ourt in which case it needs to !e translated and su!mitted for the understanding of the )ourt !y an LAxpertL. ormally the person making su!mission of the document also su!mits the translation from one of the LAxpertsL. If the counter party does not accept the LAxpert=s opinionL, the court may have to listen to another LAxpertL and his interpretation and come to its own conclusion of what is the correct interpretation of a document. In the case of the Alectronic documents, under the same analogy, L@resentationL of document is the responsi!ility of the prosecution or the person making use of the document in support of his contention !efore the )ourt. *ased on his L
2+
ccording to Indian Avidence ct, section %$ refers to L)ases in which secondary evidence relating to documents may !e givenL. Cowever, the modifications made to this section !y I(2 have added ections %$ and ection %$ *. (hough these sections have !een num!ered as and * of %$, these are not to !e treated as su! sections of ection %$. s per schedule II to I(-2, serial num!er +, it appears that %$ and %$* are to !e treated as independent sections. ccording to ection %$ therefore, L)ontents of electronic records may !e proved in accordance with the provisions of ection %$*L. ?hether !y design or otherwise, ection %$* clearly states that L ot withstanding anything contained in this 4AdG Indian Avidence ct5 ct, any information contained in an electronic record which is printed on a paper, stored, recorded or copied in optical or magnetic media produced !y a computer 4herein after called the )omputer Futput5 shall !e deemed to !e also a document....L Cowever, for the L)omputer FutputL to !e considered as admissi!le evidence, the conditions mentioned in the ection %$ * 425 needs to !e satisfied. ection %$*425 contains a series of certifications which is to !e provided !y the person who is having lawful control over the use of the )omputer generating the said computer output and is not easy to !e fulfilled without extreme care. It is in this context that the responsi!ility of the 'aw Anforcement uthorities in India !ecomes onerous while collecting the evidence. In a typical incident when a )y!er )rime is reported, the @olice will have to 9uickly examine a large num!er of )omputers and storage media and gather leads from which further investigations have to !e made. ny delay may result in the evidence getting o!literated in the ordinary course of usage of the suspect hard disk or o r the media. ny such investigation has to cover the following main aspects of )y!er orensics, namely, 1. )ollection of suspect evidence
"
2.
"1
1)( CYBER /A /A CASE CASES S Case $+ Tessera! In4. In 4. v. v. InD* Trade Co33Dn! &'$'$$8 &'$' $$8 (Fed. Cir. Cir. %ay &! &'$$) (he ederal )ircuit )ircuit upheld a decision decision of the I() regarding patent exhaustion exhaustion 'essera# In($ $ Internationa! Internationa! tra)e (ommission$ (ommission$ (he patent holder permitted its licensees to sell the patented
invention and received royalty payments later. ?hen some licensees failed to pay, the patent holder argued that its authori/ed sales had !een transformed into unauthori/ed sales and thus that the licensees customers were infringing the patent. (he ederal )ircuit rightly disagreed, (hese agreements expressly authori/e licensees to sell the licensed products and to pay up at the end of the reporting period. (hus, in these agreements, (essera authori/es its licensees to sell the licensed products on credit and pay later. (hat some licensees su!se9uently renege or fall !ehind on their royalty payments does not convert a once authori/ed sale into a non-authori/ed sale. ny su!se9uent non-payment of royalty o!ligations arising under the ()) 'icenses would give rise to a dispute with (essera (esserass licensees, not with its licensees customers. (esseras argument that the sale is initially unauthori/ed until it receives the royalty payment is hollow and unpersuasive. (he parties do not dispute that the ()) 'icenses permit a licensee to sell licensed products !efore that licensee pays royalties to (essera. *ut according to (essera, that licensees licensees sale, permitted under the ()) 'icense, would later !ecome unauthori/ed if that licensee somehow defaulted on a su!se9uently due royalty payment. (hat a!surd result would cast a cloud of uncertainty over every sale, and every product in the possession of a customer of the licensee, and would !e wholly inconsistent with the fundamental purpose of patent exhaustionPto prohi!it postsale restrictions on the use of a patented article. In !loomer v. >cuewan, $$ ;.. 41# Cow.5 $"+, $#+ 41B$25 4stating 7when the machine passes to the hands of the purchaser, it is no longer within the limits of the monopoly85. It is this same a!surd result and the same cloud of uncertainty that results after every sale of a copy of software software in light of the inth )ircuits )ircuits worst copyright copyright opinion in decadesG decadesG Qernor v. utodesk, %21 ."d 112 4+th )ir. 215. *y permitting postsale restrictions on the use of software "2
the the int inth h )irc )ircui uitt has adopt adopted ed a view view of the the )opyr )opyrig ight ht ct ct whol wholly ly incon inconsi sist sten entt with with the the fundamental purpose of copyright exhaustion0i.e., the first sale doctrine. Qernors counsel has recently filed filed an excellent !rief petitioning for a writ of certiorari, certiorari, and one can only hope that the upreme )ourt will choose to straighten this out so that we can get opinions in the copyright context as cogni/ant co gni/ant of the harms of ignoring exhaustion principles as a s this opinion is in the patent context.
""
$. 2O%E I0"IA0 CA2E 2TU"IE2 Ca&e 1( Rit" Ko%i Ca&e
Case &. ,#ne Ciiban Ciiban %9hasi2 Ca** Cener Fra#d ; K ",$, from accounts of four ; customers were dishonestly transferred to !ogus accounts. (his will give a lot of ammunition to those lo!!ying against outsourcing in ;. uch cases happen all over the world !ut when it happens in India it is a serious matter and we can not ignore it. It is a case of sourcing engineering. ome employees gained the confidence of the customer and o!tained their @I num!ers to commit fraud. (hey got these under the guise of helping helping the customers customers out of difficul difficultt situation situations. s. Cighest Cighest security security prevails in the call centers centers in India as they know that they will lose their !usiness. (here was not as much of !reach of security !ut of sourcing engineering. (he call center employees are checked c hecked when they go in and out ou t so they can not copy down num!ers and therefore they could not have noted these down. (hey must have remem!er remem!ered ed these these num num!er !ers, s, gon gonee out immediat immediately ely to a cy!er cy!er cafR cafR and accessed accessed the )iti!ank accounts of the customers. ll accounts were opened in @une and the customers complained that the money from their accounts was transferred to @une accounts and thats how the criminals were traced. @olice has !een a!le to prove the honesty of the call center and has fro/en
t he
accounts
where
the
money
wa s
transferred.
(here is need for a strict !ackground check of the call center executives. Cowever, !est of !ackground checks can not eliminate the !ad elements from coming in and !reaching security. security. ?e must still ensure such checks when a person is hired. (here is need for a national IE and a national data !ase where a name can !e referred to. In this case preliminary investigations do not
"#
reveal reveal that that the crimin criminals als had any crime crime histor history y. )ustom )ustomer er educat education ion is very very import important ant so customers do not get taken for a ride. >ost !anks are guilt of not doing this.
Case . ,ar*ia3en Aa4 Case *ureau of @olice inistry of Come that they had made on the laptop and pasted on their am!assador car to gain entry into @arliament Couse and the fake IE card that one of the two terrorists was carrying with a Dovernment of India em!lem and seal. (he em!lems 4of the three lions5 were carefully scanned and the seal was also craftly made along with residential address of Hammu and Jashmir. Jashmir. *ut careful detection proved that it was all forged and made on the laptop.
Case 6. Andhra ,radesh Ta< Ta< Case Eu!ious tactics of a prominent !usinessman from ndhra @radesh was exposed after officials of the department got hold of computers used !y the accused person. (he owner of a plastics firm was arrested and
.
"$
$. $. CO0CL O0CLU2 U2IO IO0 0 s we move forward into the 21st century, technological innovations have paved the way for us to experience new and wonderful conveniences in the how we are educated, the way we shop, how we are entertained and the matter in which we do !usiness. *usiness that have grown to rely upon computeri/ation to collect and assem!le sensitive information on their critical resources. )apacity of human mind is immeasura!le. It is not possi!le to eliminate cy!er crime from the cy!er crime from the cy!er space. It is not possi!le to eliminate cy!er crime from the cy!er space. It is 9uite possi!le to check them. Cistory is the witness that no legislation has succeede d in totally eliminate crime from the glo!e. (he only possi!le step is to make laws and try to prevent them.
"%
$=. $=. REFE REFERE RE0C 0CE2 E2 h9+4yber.*a7.harvard.ed# h9+5re9.*a7.harvard.ed# h9+777.4yber*a74ons#*in5.4o3 h9+4yber*a74ases.4o3 h9+777.4yber*a7india.4o3 h9+7774yber*a7india.ne Ari4*es 7rien 7rien by ,av ,avan an "#55a* and and "r. "r. ,raibha ,raibha Rasa* Boos G#si4e Yaindra 2in5h! "r. R./ Cha#bey Ari4*es Har9ree /a#r /a#r!! 1#Gara 1#Gara La7 Hera*d Hera*d
":