Cyber Law Notes
Cyber Law Notes
Definition
Cognizable Offence: A criminal offence in which the police have the authority to
register a case, start an investigation, and arrest the accused without prior approval
from a magistrate. These are generally serious offences that pose a significant threat
to society.
Non-Cognizable Offence: A criminal offence in which police cannot initiate an
investigation or arrest the accused without the prior approval of a magistrate. These
are relatively less serious offences.
1. Authority to Investigate
Police have the power to begin an investigation immediately without seeking prior
approval or direction from a magistrate.
This authority is granted under Section 156 of the Code of Criminal Procedure
(CrPC).
The police can independently visit the crime scene, gather evidence, question
witnesses, and take other necessary investigative actions as required.
This ensures a swift response to serious offences, preventing loss of evidence or delay
in justice.
Example:
If a murder is reported, the police can directly start investigating by visiting the crime scene,
collecting forensic evidence, and interrogating suspects.
2. FIR Registration
Example:
A person files a complaint about their house being burgled. The police register an FIR and
begin searching for clues like fingerprints or stolen goods.
3. Arrest Powers
The police have the authority to arrest the accused without obtaining a warrant.
This power allows them to act promptly in situations where delay could result in the
accused absconding, tampering with evidence, or committing further offences.
Arrests in such cases are governed by Sections 41 and 151 of CrPC, ensuring
immediate action and accountability.
Example:
In a case of armed robbery, if the accused is identified and located, the police can arrest them
immediately to prevent further danger.
4. Role of Magistrate
The magistrate plays a supervisory role in ensuring the investigation remains within
legal boundaries.
Under Section 157 of CrPC, the magistrate must be informed about the progress of
the investigation.
However, the police do not need prior approval from the magistrate to start or proceed
with the investigation.
The magistrate may provide directions or ensure the investigation is fair and lawful,
but they do not obstruct or delay police actions.
Example:
In a kidnapping case, the police may inform the magistrate about their findings, but they are
not required to wait for instructions to pursue leads or arrest suspects.
5. Investigation Speed
Investigations in cognizable cases are generally faster because the police can act
independently without waiting for judicial permission.
Immediate registration of FIRs, direct evidence collection, and prompt arrests allow
quicker progress in solving cases.
The ability to act swiftly is particularly important in serious offences where time is
critical to ensuring justice and preventing further harm.
1. Authority to Investigate
In non-cognizable cases, the police do not have the authority to investigate or take
action on their own.
They are required to seek prior approval or direction from a judicial magistrate to
begin an investigation.
This restriction ensures that minor or less serious offences are subjected to judicial
scrutiny before any law enforcement action is taken.
Example:
In a case of defamation, the police must submit an application to the magistrate seeking
permission to investigate. The magistrate reviews the complaint before granting approval.
2. FIR Registration
Example:
If someone reports an incident of verbal abuse, the police record an NCR and inform the
complainant that further action requires the magistrate’s permission.
3. Arrest Powers
The police cannot arrest the accused without obtaining a warrant from the magistrate.
This limitation ensures that arrests in minor offences are carried out only when
deemed necessary by the judiciary.
The magistrate evaluates the circumstances and determines if a warrant is justified.
Example:
In a case of cheating involving a small monetary amount, the police cannot arrest the accused
unless the magistrate issues a warrant after reviewing the evidence.
4. Role of Magistrate
The magistrate plays a central role in initiating any legal action in non-cognizable
cases.
Upon receiving a complaint, the magistrate examines the details of the case, evidence,
and witness statements to decide whether an investigation should be directed.
If the magistrate deems the complaint valid, they may order the police to investigate
under Section 155(2) of CrPC.
Example:
In a case of forgery, the informant must approach the magistrate, who evaluates the
allegations before permitting the police to investigate.
5. Investigation Speed
Example:
In a case of publishing false information, the magistrate may request additional evidence or
testimony before authorizing the police to proceed, delaying the investigation.
A non-cognizable offence refers to a category of crimes where the police do not have the
authority to register a First Information Report (FIR) or arrest the accused without prior
approval from a magistrate. These offences are considered less severe in nature compared to
cognizable offences and typically involve minor harm or disputes.
4. Judicial Oversight
o After studying the evidence, the magistrate may either:
Issue a process to the accused, leading to a trial.
Postpone the issuance of the process and order an investigation by
the police to collect more evidence.
o The magistrate’s decision-making is based on the judicial application of mind
to ensure fairness and proper legal procedure.
5. Longer Process
o The procedure for non-cognizable offences is lengthy, as it involves multiple
stages of judicial scrutiny.
o In some cases, it may take years to reach the trial stage due to the time
required for magistrates to examine complaints and evidence.
6. Purpose of Classification
o The classification of offences into cognizable and non-cognizable categories
helps reduce the burden on the police and judiciary by prioritizing serious
crimes for immediate action.
o Non-cognizable offences focus on cases that require less urgency and more
detailed judicial examination.
Advantages of Non-Cognizable Offences
3. In-depth Investigation
o The magistrate's involvement ensures that the investigation, if directed, is
thorough and properly handled, with a focus on gathering all necessary
evidence.
Misrepresentation to Authorities
o Suppressing material facts from the controller or certifying authority to obtain
licenses or digital certificates.
o Example: Providing false information to receive a government-issued
certificate.
A cognizable offence is a type of crime where the police have the authority to make an arrest
without a warrant and initiate an investigation without the permission of a magistrate. These
offences are typically considered serious in nature and have immediate implications for the
safety of the public or the order of society. In such cases, law enforcement can act swiftly to
prevent further harm or danger.
In a cognizable offence, the police can take action without waiting for a magistrate’s
order, which distinguishes it from non-cognizable offences, where the police must seek
approval before arresting or investigating. Once a cognizable offence is reported, the police
are required by law to register a First Information Report (FIR), and the investigation must
follow according to the provisions of the Criminal Procedure Code.
3. State Prosecution:
o The state assumes the role of the prosecutor in a cognizable offence. In such
cases, the victim acts only as a witness, and the state represents the broader
societal interest in prosecuting the crime.
4. Police Investigation:
o After the FIR is registered, the police have the power to start the investigation
immediately. Police officers can question witnesses, collect evidence, and
arrest the accused without requiring any judicial approval.
6. Charge Sheet:
o Following the investigation, the police must file a charge sheet or police report
in court. This document outlines the details of the case and formally brings
the matter to trial in front of a magistrate or judge.
1. Quick Response:
o The police can immediately arrest the accused and begin an investigation,
ensuring a faster response to serious crimes that could pose immediate
threats to public safety.
2. State Prosecution:
o The state takes responsibility for prosecuting the case, ensuring that the
public interest is prioritized and not just the individual interests of the victim.
4. Inadequate Investigation:
o Despite the immediate initiation of investigations, sometimes police
investigations can be rushed, leading to incomplete inquiries or failure to
gather all necessary evidence for a solid case.
A non-cognizable offence refers to a less serious crime where the police cannot make an
arrest without a warrant and cannot begin an investigation without the approval of a
magistrate. These offences are generally considered less severe, and the legal process for
handling them is more deliberate. In cases of non-cognizable offences, the police are not
authorized to take immediate action unless instructed by a judicial authority.
Unlike cognizable offences, where the police have broad powers to act swiftly, non-
cognizable offences require the police to first seek permission from a magistrate to
investigate or arrest the accused. The victim of a non-cognizable offence typically plays a
more active role in initiating the case, and the police must act only within the confines of
judicial oversight.
2. No Immediate Investigation:
o In non-cognizable offences, the police cannot begin an investigation on their
own. They must first obtain permission from a magistrate to conduct an
inquiry into the matter.
3. Filing a Complaint:
o The victim or the informant of a non-cognizable offence must file a formal
complaint at the police station. The police are required to record the complaint
but cannot proceed with any formal investigation without judicial approval.
Minor Assault: An incident where two individuals get into a physical altercation
without serious injury.
Defamation: A person spreading false information that harms another's reputation.
Cheating: Involving a person being deceived in a contractual matter, but the harm
done is not immediate or severe enough for urgent action.
Adultery: A marital issue where one partner engages in extramarital relations, but
the crime is treated with less urgency compared to other forms of abuse.
2. Judicial Oversight:
o As police cannot investigate without judicial approval, the system ensures that
all actions taken by the police are lawful and warranted, providing a layer of
protection against misuse of power.
1. Delay in Investigation:
o The requirement for judicial approval can result in delays in the investigation,
which might allow the accused to evade justice or destroy evidence.
4. Perceived Leniency:
o Non-cognizable offences are sometimes viewed as less serious by the public,
leading to a perception that justice may not be as swift or severe compared to
cognizable offences, even if the harm caused is significant.
Cyber-crime refers to any criminal activity involving computers or the internet, where the
crime is committed using digital devices or networked systems. Cybercriminals exploit
vulnerabilities in technology to commit offenses such as theft, fraud, and data breaches.
Though the Information Technology Act, 2000 (IT Act) of India does not specifically
define "cybercrime," it does address many digital offenses and their punishments.
Cybercrime can range from simple online fraud to more complex attacks on national security.
1. Malware: Malicious software like viruses and Trojans that disrupt systems. Example:
The WannaCry ransomware attack encrypted files and demanded payment for
decryption, affecting global organizations, including the NHS.
2. Denial-of-Service (DoS) Attacks: Flooding servers with traffic to make them
inaccessible. Example: The 2016 Dyn DDoS attack took down major websites like
Twitter and Amazon using an IoT botnet.
3. Phishing Attacks: Fraudulent emails or websites that trick users into revealing
sensitive information. Example: The 2016 Gmail phishing scam stole login
credentials by mimicking trusted sources.
4. Botnets: Networks of infected computers controlled by cybercriminals. Example: The
Mirai botnet used IoT devices to launch large-scale attacks on websites.
5. Exploits and Vulnerabilities: Cybercriminals exploit software weaknesses. Example:
The 2017 Equifax breach used a vulnerability to access personal information of 147
million people.
These crimes are directly associated with the use of technology and the internet. They involve
offenders exploiting digital platforms to cause harm, often through specialized knowledge or
tools.
Hacking: Unauthorized access to computer systems or networks, often with
malicious intent.
Virus Planting: The act of spreading malicious software (like viruses, worms,
or ransomware) to damage or compromise systems.
Intellectual Property Theft: Stealing or reproducing someone else’s
intellectual property, such as patents, trademarks, or copyrighted work,
without permission computers running Microsoft Windows and infected
hundreds of thousands of systems worldwide. The attack paralyzed hospitals,
government departments, and businesses, demanding ransom payments in
Bitcoin for file recovery.
4. International Cooperation:
o Cybercrime is often global in nature, requiring international collaboration to
track and apprehend offenders. Interpol and Europol work together to
combat cybercrime across borders, facilitating investigations and sharing
intelligence.
1. Financial Losses:
o Cybercrime leads to significant financial losses for both individuals and
organizations. The WannaCry ransomware attack caused millions of dollars
in damages across various sectors, especially healthcare.
2. Reputational Damage:
o Cyberattacks can severely damage the reputation of individuals and
companies. After the Equifax data breach, the company faced lawsuits and
lost consumer trust, leading to significant financial consequences.
3. Operational Disruption:
o Cybercrimes can disrupt business operations, resulting in downtime and
productivity loss. For instance, the NotPetya ransomware attack in 2017
disrupted operations at major companies like Maersk, leading to significant
operational and financial losses.
4. Legal Consequences:
o Cybercriminals may face severe legal consequences, including imprisonment
and hefty fines. The Aaron Swartz case, where the activist was charged with
hacking MIT’s academic database, highlighted the legal implications of
cybercrime.
1. Anonymity: Cyber criminals can hide their identity, making it difficult to trace the
offender.
2. Global Reach: Cyber crimes can occur across borders, affecting individuals and
organizations worldwide.
3. Rapid Execution: Cyber crimes can be committed quickly, often within seconds or
minutes, and can cause widespread damage in a short time.
4. Lack of Physical Evidence: Cyber crimes primarily occur in virtual spaces, meaning
there is often no physical evidence to investigate.
5. 24/7 Availability: Cyber crimes can be committed at any time, without the constraints
of working hours, making them difficult to prevent or track.
6. Scalability: Cyber crimes can be scaled up easily, affecting large numbers of people
or systems simultaneously with minimal effort.
7. Complexity: Cyber crimes often involve technical knowledge and sophisticated
methods, making them more challenging to detect and investigate.
8. Evolving Nature: Cyber crimes continuously evolve with technological
advancements, making it challenging for law enforcement and security systems to
keep up with new methods and tactics.
Types of Hacking:
There are several types of hacking, each serving different purposes or goals. Here are some
common types:
Example: A hacker steals credit card information from an online shopping website to make
fraudulent purchases.
Example: A security researcher finds a flaw in a website’s security and informs the website
owner to fix it before malicious hackers can exploit it.
To hold someone guilty of hacking under the IT Act, the following elements need to be
established:
Civil Claims: Victims of hacking can file civil suits and claim compensation for the
damage caused. The compensation can go up to 1 crore rupees as per the law.
Criminal Liability: Hacking is a criminal offense under the IT Act. Offenders can be
punished by imprisonment, fines, or both.
Types of Hackers
1. Code Hackers:
Code hackers are individuals who possess an in-depth understanding of computer
systems, their coding, and their internal operations. They are often able to manipulate
or exploit software and hardware systems. While some use their skills to find and
report security vulnerabilities (ethical hackers), others might use their knowledge for
malicious purposes, such as stealing data or causing system damage.
Example: Kevin Mitnick is a famous code hacker. He was involved in high-profile
hacking cases, including breaking into the systems of companies like IBM and Nokia.
He gained unauthorized access to sensitive information and later became a
cybersecurity consultant after serving prison time.
2. Phreakers:
Phreakers specialize in telecommunication systems, particularly phone systems and
internet networks. They exploit vulnerabilities in these systems, often to make free
calls or disrupt communication channels. Phreaking was particularly prominent during
the 1960s and 1970s when phone systems were more vulnerable.
Example: Steve Jobs, in his early years, was involved in phreaking. Along with
Steve Wozniak, he built and sold blue boxes, devices that allowed people to make free
long-distance phone calls by manipulating the phone system. This was a form of
hacking that played a role in the early days of Apple.
Defamation, under Indian law, refers to the act of damaging the reputation of an individual
through false statements, whether written or spoken, or by visual representations. The
imputation made must harm the reputation of the person and lead others to lower the person’s
moral, intellectual, or professional character. It can also involve comments that cause people
to believe the person’s body is in a disgraceful or loathsome state.
As per Section 499 of the Indian Penal Code (IPC), defamation occurs when someone makes
a false statement about another person with the intention of harming their reputation or
knowing that it will harm them. However, there are exceptions outlined under IPC where
such statements do not amount to defamation.
Characteristics of Defamation:
1. False Statement: The core characteristic of defamation is that the statement made is
false. A true statement, even if harmful, is not considered defamation because truth is
a valid defense in such cases.
2. Harm to Reputation: The statement must harm the individual’s reputation, lowering
their esteem in the eyes of others, or damage their social standing or career. The harm
may manifest in lost job opportunities, friendships, or public ridicule.
3. Intent to Harm: The statement must be made with the knowledge or intent to harm
the individual’s reputation. This includes cases where the person making the
statement knew it was false or acted with reckless disregard for the truth.
4. Publicity: The defamatory statement must be communicated to a third party, meaning
it must be shared with someone other than the person being defamed. This can include
publishing in media, social networks, or even casual conversations.
5. Defamation Type: Defamation can be classified into two types: slander (spoken
defamation) and libel (written or published defamation). Both types can cause
significant reputational harm, but libel is generally considered more harmful due to its
permanent nature.
6. Damage to Character: The statement should be harmful in a way that lowers the
target’s character in terms of their credibility, work ethics, personal qualities, or
physical state. This damage is not just subjective but is generally assessed from how
society would view the individual after the statement is made public
5. Limited Scope: Only addresses harm caused by false statements, not other forms
of harm.
Exceptions to Defamation in India (IPC Section 499)
The following are five key exceptions under the Indian Penal Code that do not constitute
defamation:
Example: A news outlet publishes a factual and accurate report on a criminal trial and
its verdict, even if the accused’s reputation is negatively affected. This is not
considered defamation.
Example: After a trial, an individual discusses the honesty of a witness based on their
testimony, expressing their opinion in good faith. This is not considered defamation as
it pertains to the case’s outcome.
6. Sixth Exception – Opinion of Fair Criticism of a Person’s Work: If someone expresses
an opinion about the work or performance of another person, it is not considered defamation
as long as the criticism is fair and made in good faith. The criticism should relate to the
person's public actions, conduct, or work, and not be based on personal attacks or malicious
intent.
Example: A film critic giving an honest review of an actor's performance in a movie, stating
that the acting was poor, is not defamation as long as it is an opinion based on the actor's
professional performance in the movie.
7. Seventh Exception – Accusation Made in Good Faith for Public Good: If a person
makes an accusation against someone else in good faith and with the intention of promoting
public welfare or protecting the community, it is not considered defamation. This exception
applies to situations where someone exposes a wrongdoing or potential harm to society, even
if the accused’s reputation is damaged in the process.
Example: A person who reports a case of child abuse to the authorities, even though the
accused may be defamed in the process, is not committing defamation if the report is made in
good faith to protect public welfare.
Cyber Pornography refers to the use of cyberspace to create, distribute, display, or publish
pornographic or obscene materials. With the internet becoming a major platform for sharing
content, traditional forms of pornography have increasingly shifted to digital formats. This
has made regulation of such content a complex issue worldwide, with some countries banning
it outright while others regulate or legalize it under strict conditions.
In India, cyber pornography falls under the purview of the Information Technology (IT)
Act, 2000, which provides a legal framework to address such issues.
1. Section 67:
o Prohibits the publication or transmission of obscene content in electronic
form.
o Punishment: Imprisonment of up to 3 years and a fine of up to ₹5 lakhs for
first-time offenders.
o Subsequent offences carry a harsher penalty: imprisonment of up to 5 years
and a fine of up to ₹10 lakhs.
2. Section 67A:
o Deals with electronic publication, transmission, or causing to be transmitted
any material that contains sexually explicit acts or conduct.
o Punishment: Imprisonment of up to 5 years and a fine of up to ₹10 lakhs for
first-time offenders. Subsequent offences can result in imprisonment of up to
7 years and a fine of up to ₹10 lakhs.
3. Intermediary Guidelines:
o Intermediary platforms (e.g., websites, apps, or service providers) are
required to exercise due diligence to ensure that their portals are not misused
for sharing obscene or sexually explicit content.
o Failure to comply makes intermediaries liable for any obscene or
pornographic material shared through their platform.
1. Publication:
o Uploading obscene or sexually explicit content to websites, WhatsApp
groups, or any digital portal that makes it accessible to third parties.
o Example: Posting an explicit video on a public forum or social media platform.
2. Transmission:
o Sending obscene or pornographic material via email, messaging apps, or
other forms of digital communication.
o Example: Sharing explicit images or videos via WhatsApp, email, or any other
electronic medium.
Suppose a person uploads a sexually explicit video to a public website, making it accessible
to users across the internet. This act is a clear violation of Section 67A, as it involves the
publication and transmission of sexually explicit content. Similarly, if another person sends
this video to someone via WhatsApp or email, they are guilty of transmitting obscene content
under Section 67.
On the other hand, if someone downloads and privately views such content without sharing
or transmitting it, this does not constitute an offence under Indian law.
The provision for arrest without a warrant under Section 80 of the Information Technology
(IT) Act, 2000, has become a topic of significant debate. It highlights the need for a balance
between combating cybercrimes effectively and safeguarding individual rights. Cybercrime is
a fast-evolving field that requires swift action, and the authority to arrest without a warrant
plays a crucial role in addressing these challenges.
1. Nature of Cybercrimes:
o Cybercrimes are not confined by geographical boundaries and often occur
across jurisdictions, making immediate action necessary.
o Delaying arrests due to procedural requirements (such as obtaining a
warrant) allows cybercriminals to delete evidence, escape law enforcement,
or commit further crimes.
Example: In a phishing scam targeting Indian citizens, cybercriminals were traced to
an international location. Authorities needed immediate action to arrest local
collaborators without waiting for a formal warrant, preventing further financial losses
to victims.
Example: A hacker group defaced government websites and sent threatening emails.
Without the power to arrest suspects identified at an internet café, investigators might
have lost the chance to gather crucial evidence from their devices.
3. Discouragement of Victims:
o Victims often hesitate to report cybercrimes due to lengthy and complex legal
procedures. Empowering authorities to take immediate action encourages
victims to come forward, knowing their concerns will be addressed swiftly.
Example: In a case of alleged cyber defamation, a suspect was arrested without clear
evidence, leading to a legal challenge. This highlights the need for accountability in
such arrests.
2. Judicial Oversight:
o Introduce a mechanism for post-arrest judicial review to ensure arrests are
based on valid evidence and to prevent misuse of power.
Section 80 of the Information Technology (IT) Act, 2000 empowers police officers and
other designated authorities to arrest individuals without a warrant in specific circumstances
related to cybercrime. However, certain legal ambiguities and gaps result in situations where
arrests can be made, but no punishment may follow due to the limitations of existing laws.
The IT Act lacks explicit provisions to punish attempts for most offences except for
Section 70.
Example: If a person is caught attempting to hack a system, they can be arrested under
Section 80 but not punished under Section 66, which does not cover attempts.
Section 80 does not extend to abettors or conspirators. For instance, a person planning
a phishing attack cannot be arrested unless they are actively committing the offence.
The phrase "about to commit" lacks clarity and often leads to misinterpretation. For
example, an individual preparing malware could be arrested but not punished due to
insufficient provisions in the IT Act.
Unlike Section 151 of the Criminal Procedure Code (CrPC), which allows
preventive arrest to stop cognizable offences, the IT Act has no similar mechanism for
cybercrimes.
o .
Real-Life Examples
2. Phishing Attempt:
o A cybercriminal caught setting up a phishing website to steal financial data
can be arrested but not prosecuted for merely creating the website without
evidence of theft. New provisions for attempt and preparation would address
this gap.
Offence:
Tampering or altering computer source code without authorization, such as deleting
or modifying source code files required for a computer system or program to function.
Penalty:
Imprisonment up to 3 years, or fine up to ₹2 Lakhs, or both.
Offence:
Unauthorized access or hacking into a computer system to destroy, alter, or steal
data, causing harm to its integrity or security.
Penalty:
Imprisonment up to 3 years, or fine up to ₹5 Lakhs, or both.
Offence:
Sending offensive, false, or threatening messages via email, social media, or other
electronic communication. (This section was struck down by the Supreme Court in
2015.)
Penalty:
Imprisonment up to 3 years, or fine up to ₹1 Lakh, or both.
Offence:
Receiving or possessing stolen computer hardware or data, knowing it to be stolen.
Penalty:
Imprisonment up to 3 years, or fine up to ₹1 Lakh, or both.
5. Identity Theft (Section 66-C):
Offence:
Using someone else’s digital identity, such as a password, signature, or biometric
details, to commit fraud.
Penalty:
Imprisonment up to 3 years, or fine up to ₹1 Lakh, or both.
Offence:
Impersonating another person via electronic means to deceive or cheat others, such
as through phishing or fake profiles.
Penalty:
Imprisonment up to 3 years, or fine up to ₹1 Lakh, or both.
Offence:
Capturing or sharing private images, videos, or information of an individual without
their consent.
Penalty:
Imprisonment up to 3 years, or fine up to ₹2 Lakhs, or both.
Offence:
Using a computer or network to threaten the unity, integrity, or sovereignty of India or
cause widespread damage or harm.
Penalty:
Imprisonment for life.
Offence:
Publishing, sharing, or storing obscene content, such as pornography, through
electronic means.
Penalty:
o First conviction: Imprisonment up to 3 years, or fine up to ₹5 Lakhs, or both.
o Subsequent conviction: Imprisonment up to 5 years, or fine up to ₹10
Lakhs, or both.
10. Publishing Sexually Explicit Content (Section 67-A):
Offence:
Publishing or transmitting sexually explicit material, including adult pornography,
through electronic means.
Penalty:
o First conviction: Imprisonment up to 5 years, or fine up to ₹10 Lakhs, or
both.
o Subsequent conviction: Imprisonment up to 7 years, or fine up to ₹10
Lakhs, or both.
Offence:
Publishing, transmitting, or viewing sexually explicit content involving children.
Penalty:
o First conviction: Imprisonment up to 5 years, or fine up to ₹10 Lakhs, or
both.
o Subsequent conviction: Imprisonment up to 7 years, or fine up to ₹10
Lakhs, or both.
Offence:
Failure by intermediaries (such as social media platforms or service providers) to
preserve data as required by law.
Penalty:
Imprisonment up to 3 years, and fine.
Offence:
Not adhering to orders given by the Controller of Certifying Authorities (CCA)
regarding digital signatures and other certifications.
Penalty:
Imprisonment up to 2 years, or fine up to ₹1 Lakh, or both.
Offence:
Failure to assist agencies authorized to intercept, monitor, or decrypt information for
security purposes.
Penalty:
Imprisonment up to 7 years, and fine.
Offence:
Attempting to access or gain unauthorized entry into government-protected systems.
Penalty:
Imprisonment up to 10 years, and fine.
Offence:
Providing false information to the Controller or Certifying Authority.
Penalty:
Imprisonment up to 2 years, or fine up to ₹1 Lakh, or both.
Offence:
Disclosing private information obtained without consent.
Penalty:
Imprisonment up to 2 years, or fine up to ₹1 Lakh, or both.
Offence:
Publishing digital signature certificates with false or misleading information.
Penalty:
Imprisonment up to 2 years, or fine up to ₹1 Lakh, or both.
Offence:
Using electronic signatures or certificates for fraudulent activities.
Penalty:
Imprisonment up to 2 years, or fine up to ₹1 Lakh, or both.
14.What are the confusion would arise after an offence under the IT
Act is committed?
Cybercrimes often involve technical complexities and legal ambiguities, leading to several
confusions after an offence is committed. Below is a detailed discussion of these confusions,
along with real-life examples for better understanding.
1. Jurisdiction Issues
Confusion: Identifying the real offender is challenging due to the use of fake
identities, VPNs, or encrypted communication.
Example: A phishing email is sent using a spoofed email address pretending to be a
bank. Tracing the actual sender becomes difficult.
3. Evidence Authenticity
Confusion: Digital evidence can be altered or deleted, leading to doubts about its
authenticity and admissibility in court.
Example: A company accuses an employee of data theft, but the employee claims
the evidence (e.g., log files) was manipulated to frame them.
Confusion: Victims may not understand the nature of the offence or how to report it.
Example: A small business loses money in an online payment scam but delays
reporting the crime, assuming the bank will resolve the issue.
Confusion: Many cyber offences fall under multiple laws, creating uncertainty about
which law applies.
Example: A person sends threatening emails (covered under the IPC for criminal
intimidation) and also hacks into the victim’s account (covered under the IT Act).
6. Delay in Reporting
7. Technical Complexity
Confusion: Some provisions of the IT Act are broad or vague, leading to differing
interpretations.
Example: Section 66A (sending offensive messages) was struck down by the
Supreme Court, but confusion persisted about its enforcement for years.
9. International Cooperation
Confusion: Many law enforcement agencies lack the necessary technical expertise
to handle cybercrimes.
Example: A cybercrime cell in a small town receives a complaint about
cryptocurrency theft but lacks trained personnel to investigate blockchain
transactions.
Introduction: Section 80 of the Information Technology Act, 2000 was introduced to deal
with crimes in the digital realm, where the powers to arrest and search without a warrant are
given to police officers of a certain rank. The aim of this section is to empower law
enforcement to take swift action against individuals suspected of committing cybercrimes.
However, its applicability in the modern world of cybercrime, where crimes often occur
remotely, has raised concerns about its effectiveness.
Section 80 empowers police officers (not below the rank of Deputy Superintendent of
Police (DSP) or officers authorized by the Central or State Government) to arrest and
search without a warrant if they suspect someone of committing an offence under the
Information Technology Act, 2000. This power is only applicable in public places.
One of the major drawbacks of Section 80 is that it limits arrests to public places, which
makes it ineffective for cybercrimes. Cybercrimes often take place remotely and do not
require the criminal to be physically present at the crime scene.
Example: Consider a hacking case where a person hacks into a bank’s system from
their home computer. Even if the suspect is later found in a hotel (a public place),
they can be arrested without a warrant. However, if they are found at home, no such
arrest can occur under Section 80.
This limitation highlights how outdated the law is when it comes to cybercrimes, where
remote access is the norm, and the traditional distinction between public and private spaces
doesn’t apply.
Weapon for Traditional Crimes: For traditional crimes that occur in public spaces
(such as a hacker physically accessing a public terminal or committing fraud at an
internet café), Section 80 can be a useful tool for law enforcement to act swiftly.
Example: If a cybercriminal is suspected of using a public computer in a library to
carry out a crime like distributing malware, the police could use Section 80 to
search and arrest them without needing a warrant, as the crime occurred in a public
space.
Farce for Cybercrimes: However, for many cybercrimes that occur remotely,
Section 80's focus on public places becomes a farce. The law does not address the
digital nature of these crimes, which makes it ineffective.
Example: If someone uses social engineering to commit fraud online, and the
suspect is found at their home or office (not in a public space), the police cannot arrest
them under Section 80, even though the crime was digital in nature.
5. Conclusion
While Section 80 may have been a useful tool when the IT Act was initially enacted, it has
not evolved to keep pace with the digital age and the unique characteristics of cybercrimes.
The law’s focus on physical presence in public places is not suited to the nature of
cybercrimes, which often involve remote and anonymous activities.
To make the law more relevant, there needs to be an amendment to Section 80, allowing law
enforcement to take action against cybercriminals, regardless of whether the crime is
committed in a public place or not. Modernizing the approach would ensure that the law
remains an effective tool in fighting cybercrime.
OR
What does section (13)(2) of Indian Contract Act 1872 speak? What are the situations
covered by this law? (Apr 19,Nov 19,Apr 24)
Status and Formation of Contracts under the Indian Contract Act, 1872
The Indian Contract Act, 1872, defines the fundamental principles regarding the formation
of contracts, communication of offers and acceptances, and their revocation. These principles
are essential to understand the status and formation of contracts under the Act.
Key Provisions for Formation of a Contract:
1. Communication of Offer:
o Complete when the proposal comes to the knowledge of the person to whom
it is made.
o Example: A proposes to sell his house to B by letter. The proposal is
complete when B receives the letter.
2. Communication of Acceptance:
o Against the proposer: When it is put in a course of transmission.
o Against the acceptor: When it comes to the knowledge of the proposer.
o Example: B posts a letter accepting A’s offer. Acceptance is complete
against A when the letter is posted, and against B when A receives the letter.
3. Revocation of Offer and Acceptance:
o An offer can be revoked any time before acceptance is complete as against
the proposer.
o An acceptance can be revoked any time before it reaches the proposer.
o Example: A offers to sell his house to B. A can revoke the offer before B
posts the acceptance letter.
Section 13(2) emphasizes mutual consent in the formation of a contract, where both parties
must agree on the same thing in the same sense (consensus ad idem). Without mutual
consent, no valid contract exists.
1. Formation of Contracts:
o Establishes the process for forming valid agreements.
o Ensures clarity and mutual understanding.
2. Revocation:
o Protects parties’ rights to withdraw offers or acceptances under specified
conditions.
3. Enforceability:
o Differentiates between agreements that are legally binding and those that are
not.
3. Explain different types and elements of electronic Contracts (Apr 19,Apr 23)
E-contracts are legally binding agreements formed, executed, and validated entirely through
electronic means without requiring physical documentation. These contracts leverage digital
platforms such as emails, online forms, electronic marketplaces, and software systems to
facilitate the offer, acceptance, and communication between parties. Common types of e-
contracts include click-wrap agreements, browse-wrap agreements, and shrink-wrap
agreements.
1. Click-Wrap Agreements
Definition:
Click-Wrap agreements are electronic contracts where users must explicitly agree to terms
and conditions by clicking a button or checkbox labeled "I Agree," "Accept," or similar
before proceeding with a service, product purchase, or software installation. These
agreements ensure the user's active consent before they can access or use a product or service.
Characteristics:
Explicit Consent: The user must take an action (clicking) to accept the terms.
Visibility: The terms and conditions are usually presented on the screen, often as a
scrollable text box or a link to the full agreement.
Mandatory Acceptance: Users cannot proceed without agreeing to the terms.
Example:
2. Shrink-Wrap Agreements
Definition:
Shrink-Wrap agreements are contracts included within the packaging of a product, typically
software or hardware. The user is considered to have accepted the terms by opening the
package, using the product, or retaining it beyond a specific return period.
Characteristics:
Passive Acceptance: The agreement assumes acceptance by the user’s actions,
such as opening the package or continuing to use the product.
Inclusion in Packaging: The terms are either printed on the package, included as a
physical document, or displayed during the installation of the software.
No Prior Review: Users often do not see the terms until after purchasing or opening
the product.
Example:
o .
4. Lawful Object:
o The purpose of the contract must not be illegal, fraudulent, or against public
policy.
o Example: An agreement to sell prohibited goods online is void.
5. Competent Parties:
o Parties entering into the contract must be legally competent (not minors,
unsound of mind, etc.).
o Autonomous Computers: Since computers are neither natural nor legal
persons, their operator becomes the contractual party.
6. Free Consent:
o Consent must be free from coercion, fraud, undue influence,
misrepresentation, or mistake.
o Example: Clicking "I Agree" without fully understanding the terms could
question free consent.
7. Certainty of Terms:
o The terms of the contract must be specific and unambiguous.
o Example: An online subscription service must clearly outline pricing, renewal,
and cancellation terms.
Exclusion clauses are provisions in contracts that limit or exclude the legal rights or remedies
available to one of the parties. They are commonly used to define the jurisdiction of the court
in which disputes related to the contract will be adjudicated. However, there are important
limitations and legal principles surrounding such clauses in India.
Partial Jurisdiction Ousting: The Supreme Court of India has held that an
exclusion clause can be valid as long as it does not oust the jurisdiction of all
courts. For example, if parties agree to submit disputes to a specific set of courts but
not to others, such a clause is legally valid.
Jurisdiction Limitation: Some clauses restrict jurisdiction to a particular court
using terms such as "only" or "alone." Such clauses are generally not upheld by the
courts if they lead to unfair outcomes or prohibit the weaker party from accessing
justice.
Unequal Bargaining Power: Exclusion clauses can be problematic when one party
has more bargaining power than the other. For example, if the contract limits
jurisdiction to a court far from the weaker party's location, it could impose an undue
hardship. This could make it prohibitively expensive or practically impossible for the
weaker party to pursue their case, leading to an unjust outcome.
Example of Unfair Exclusion Clause: If an e-commerce website based in Dubai
sells a television to a consumer in India, and the contract specifies that disputes
should be resolved in Dubai, this would be highly inconvenient for the consumer in
India. If the product is defective and requires legal action, the consumer may be
unable to afford the cost of litigation in Dubai. In such a case, the Indian courts may
refuse to enforce the exclusion clause, prioritizing equality and fairness.
OR
OR
What is civil law of Jurisdiction in India
In India, the jurisdiction of civil courts is governed primarily by the Code of Civil Procedure
(CPC), 1908. The jurisdiction determines the authority of a court to hear and adjudicate cases
based on three key factors: pecuniary, subject matter, and territorial jurisdiction. These
classifications help to ensure that the proper court handles a particular case.
1. Pecuniary Jurisdiction:
o Definition: This refers to the jurisdiction of a court based on the monetary
value of the claim.
o Courts are classified according to the amount involved in the dispute.
o For example:
High Courts: Hear cases with higher monetary value (e.g., suits
above ₹5 lakh).
District Courts: Handle suits involving lower monetary values (e.g.,
up to ₹5 lakh).
o This classification helps in determining which court should deal with a case
based on the financial stakes involved.
3. Territorial Jurisdiction:
o Definition: This refers to the geographical area within which a court has the
authority to hear a case.
o CPC, 1908 lays down the rules for territorial jurisdiction, primarily focusing on
where the cause of action arises or where the defendant resides.
o For example:
Immovable Property: A suit related to immovable property must be
filed in the court located within the jurisdiction of that property.
Section 16 of CPC, 1908: If a suit is for compensation related to
immovable property, it can be filed where the property is situated or
where the defendant resides.
o Territorial jurisdiction is essential to ensure that the court hearing a case has
a geographical connection to the dispute.
Examples of Jurisdiction:
Pecuniary Jurisdiction:
o A suit for ₹10 lakh will be filed in the High Court, but a suit for ₹3 lakh will go
to the District Court.
Territorial Jurisdiction:
o If A residing in Delhi beats B in Calcutta, B can file a suit for compensation in
either Calcutta or Delhi, as per Section 18 of CPC, 1908.
7. Explain Jurisdiction Dispute w.r.t. the Internet in the United States of America.
(Apr 19,Apr 23)
The rise of the internet as a borderless and global communication platform has created
challenges for courts in determining jurisdiction for legal disputes. Jurisdiction refers to a
court's authority to hear a case and make legal decisions. As the internet enables businesses
and individuals to operate globally, questions have arisen about how to apply traditional
jurisdictional rules in cyberspace.
Facts: This case involved two companies: an Arizona corporation that advertised
commercial services over the internet, and a Florida corporation that provided
website construction services under a similar name.
Issue: The plaintiff claimed that the Florida company's website infringed on its
trademark.
Court's Ruling: The court held that the defendant's website, though accessible by
Arizona residents, did not target or conduct business specifically in Arizona. The
court found that this passive accessibility was insufficient to establish jurisdiction over
the Florida corporation in Arizona. The ruling emphasized that merely making a
website accessible does not automatically subject a business to the jurisdiction of
every state where the site can be accessed.
Facts: Granite Gate Resorts, based in Nevada, advertised on the internet through a
website called WagerNet. The site was maintained on a server located in Belize and
operated by a Belize-based company. The Minnesota Attorney General sued Granite
Gate for deceptive trade practices, false advertising, and consumer fraud, claiming
the company's advertisements targeted Minnesota residents.
Issue: Whether Minnesota could exercise personal jurisdiction over a company
located in Nevada, operating out of Belize, due to its internet advertisements directed
at Minnesota residents.
Court's Ruling: The Minnesota Court of Appeals ruled that Minnesota could
exercise jurisdiction, as the website was accessible by Minnesota residents and the
defendant directed its advertisements at customers in the U.S., including those in
Minnesota. The court emphasized that jurisdiction could be based on the defendant’s
active targeting of specific states or residents, regardless of the physical location of
the server or the company.
Location of the Web Server: One significant issue is the misconception that the
location of a website’s server determines the jurisdiction. Courts have increasingly
rejected this approach, recognizing that the server is merely a technological tool and
does not necessarily indicate where the business activities are conducted.
Targeting of Jurisdictions: Courts have started to focus on whether the defendant
has purposefully availed themselves of the jurisdiction by targeting a particular state
or group of people. If the website is actively seeking business from a specific state or
country, it may be subject to jurisdiction in that location.
Passive vs. Active Websites: A key distinction courts make is between passive
websites (which simply provide information) and active websites (which engage in
commercial transactions). Jurisdiction is more likely to be established in cases
involving active websites that engage with users in a specific jurisdiction.
OR
Explain the Subsections (3), (4), and (5) of Section 13 of the IT Act 2000(Apr 24)
The Information Technology Act, 2000 (IT Act, 2000) is a key legislation in India that
governs electronic commerce, digital signatures, cybercrime, and other aspects of the
information technology space. One of the challenges that arise in cyberspace is determining
the jurisdiction in which a dispute involving the internet can be adjudicated. The IT Act,
2000 includes provisions that help clarify the place of jurisdiction for such disputes,
particularly when electronic records or communications are involved.
Key Provisions of the IT Act, 2000 Affecting Jurisdiction
The IT Act contains specific sections that define where the cause of action will be considered
to have occurred. This is important for determining which court or jurisdiction should hear a
dispute.
1. Section 13(1):
o Electronic Record Deemed to Be Dispatched and Received:
The place where an electronic record is considered to be dispatched is the
place where the originator (the sender) has their place of business. Similarly,
the place where an electronic record is considered to be received is the place
where the addressee (the receiver) has their place of business.
o Implication: The jurisdiction is determined based on the originator's and
addressee’s places of business, which might not be the physical location of
the computer resources.
2. Section 13(2):
o Location of Computer Resources Does Not Determine Dispatch or
Receipt:
This section makes it clear that the location of the computer resources (such
as the server or device used) is irrelevant for determining the place of
dispatch or receipt of electronic records. The relevant factors are the places
of business of the originator and addressee.
3. Section 13(3):
o Alternative Locations if No Agreement Exists:
If there is no agreement between the originator and addressee on the place of
dispatch or receipt, the law stipulates that the electronic record will be
considered dispatched at the originator’s place of business and received at
the addressee’s place of business. This helps establish a default jurisdiction
in the absence of specific agreements between the parties involved.
4. Section 13(4):
o Multiple Places of Business:
If either the originator or the addressee has more than one place of business,
the principal place of business will be considered the place of dispatch or
receipt. In case there is no place of business, the usual place of residence
will be deemed the place of business.
o Implication for Corporations: For corporations, the place of registration is
considered the usual place of residence.
5.Section 13(5):
o For individuals, if they do not have a place of business, their usual place of
residence is deemed to be their place of business.
o For a body corporate (such as a company), the place of registration is treated
as the usual place of residence, which helps establish the jurisdiction in case
the company has no other place of business.
The provisions above help in determining where a legal action related to an electronic
transaction or dispute should be filed. Here’s a summary of the implications:
Agreed Place of Dispatch and Receipt: If the parties have agreed upon a place for
the dispatch and receipt of electronic records, that place will govern the jurisdiction.
No Agreement: In the absence of an agreement, the jurisdiction will depend on the
place of business of the originator (for dispatch) and the place of business of the
addressee (for receipt).
Location of Computer Resources: The actual physical location of the server or
device used for transmitting electronic records is not relevant for determining
jurisdiction.
Principal Place of Business: If the parties have multiple places of business, the
principal place of business will be used to determine jurisdiction. If neither has a
place of business, their usual place of residence will be considered.
Corporate Entities: For corporations, the jurisdiction is based on the location where
the corporation is registered.
The present laws governing internet jurisdiction have faced challenges, mainly based on the
following two grounds:
Global nature of the internet: Websites can be accessed from anywhere in the
world, leading to the possibility that a website could face litigation in foreign courts.
Extreme hardship: Websites may face significant financial and legal challenges if
exposed to litigation in foreign countries.
Misconception: It's often overstated that just because a website is accessible
internationally, it is automatically subject to litigation worldwide. Courts generally
require evidence that the website specifically targets or engages with users in the
foreign jurisdiction.
Court rulings: The creation of a website alone does not confer global jurisdiction.
Courts typically examine whether the website's activities are directed at a specific
jurisdiction.
10.Write an exhaustive note on "Contractual and IPR Disputes (Nov 19, Apr 24)
In today's digital age, many contractual and Intellectual Property Rights (IPR) disputes are
arising directly or indirectly due to the increasing prominence of the internet and e-
commerce. These disputes are particularly significant for businesses operating online, as the
internet transcends geographical boundaries, raising complex legal issues regarding
jurisdiction and the place of cause of action. Let's explore these issues in depth.
1. Contractual Disputes: Applicability of Cause of Action
In the case of contractual disputes, the cause of action determines the place where a suit can
be filed. The cause of action refers to the set of facts or circumstances that gives rise to a
legal right, and it is relevant to decide which court has jurisdiction over a dispute.
Example:
Court's Decision: The court held that the mere execution of the bank guarantee
in Delhi would not give rise to a cause of action in Delhi. The performance of the
contract was to occur in Mumbai, and the cause of action arose where the contract
was executed and where its performance was to be carried out.
Conclusion: In contractual disputes, the location where the contract was executed or
where the performance is to occur typically determines the jurisdiction, even if parts
of the contract are executed or performed in different locations.
Place of Execution: The place where the contract is executed is often the relevant
jurisdiction.
Place of Performance: The place where the contract’s terms are fulfilled or
executed is also a key factor in determining jurisdiction.
Bank Guarantees and Other Instruments: In cases involving instruments like bank
guarantees, courts will look at where the guarantee is issued and where it is to be
enforced.
In the context of Intellectual Property Rights (IPR), especially in e-commerce, the internet
creates challenges regarding where to file a lawsuit, as IPR infringements can happen across
multiple jurisdictions. The application of cause of action is important in determining where a
dispute should be heard.
A Delhi-based plaintiff files a suit in the Delhi High Court alleging trademark
infringement. The defendant is accused of using a trademark that is allegedly
similar to the plaintiff’s, and this infringement allegedly occurred because of an
advertisement in a Rajasthan-based newspaper with a circulation limited to
Bikaner.
Court's Decision: The Delhi High Court held that it did not have jurisdiction to
hear the case. The newspaper in Rajasthan had a limited circulation within the
territory of Bikaner, and the court rejected the argument that because the newspaper
was available in Delhi, it created a cause of action in Delhi. It was held that there was
insufficient cause of action in Delhi to justify jurisdiction.
Place of Sale/Offer: The place where the defendant sells or offers goods that
allegedly infringe upon the plaintiff’s trademark or intellectual property rights often
becomes the basis for determining jurisdiction. If a website targets a specific region
or its goods are being sold in a particular location, that jurisdiction can claim authority
over the dispute.
Geographical Limitations: In trademark disputes involving physical publications or
advertisements, the court may consider where the advertisement was specifically
targeted or where the goods were sold. Merely having access to the internet or an
advertisement being available online does not automatically create jurisdiction in any
location.
The internet has no physical boundaries, which complicates the identification of the
appropriate jurisdiction for a dispute. A website can be accessed globally, and
actions originating from one country can affect businesses and individuals in another.
In traditional legal cases, jurisdiction is often tied to the physical location of the
parties involved. However, the internet allows individuals and businesses to interact
from any location. E-commerce businesses can operate from one country, sell to
consumers across the world, and host their operations on servers located in different
jurisdictions.
c. Enforcement of IPR
In the age of the internet and global commerce, legal disputes between parties often span
multiple jurisdictions. The rise in cyber-related issues and cross-border litigation has brought
the question of foreign judgments to the forefront. When a foreign court pronounces a
judgment, the question arises whether such a judgment can be enforced or recognized in
Indian courts.
Under Section 13 of the Civil Procedure Code (CPC), a foreign judgment is generally
considered conclusive on matters directly adjudicated between the parties. However, there
are certain exceptions that prevent the automatic recognition or enforcement of foreign
judgments in India. These exceptions ensure that foreign rulings do not contradict Indian
laws, principles of justice, or public policy.
12.Analyze "Compuserve Inc. V. Patterson" – Case Study of US in July, 1996 (Nov 19)
The case CompuServe Inc. v. Patterson (1996) is a landmark legal case that helped define
the application of jurisdiction in the context of the internet and electronic commerce. It
revolved around a dispute involving the issues of contractual obligations, jurisdiction, and
the enforcement of contracts over the internet. Here's an analysis of the case:
CompuServe, a major internet service provider at the time, entered into a contract with
Patterson, a software developer. The contract was related to Patterson's software being
distributed through CompuServe's service, which allowed users to download software via the
internet. The dispute arose when Patterson allegedly violated the terms of the contract and
failed to deliver the promised software.
Location of Parties: CompuServe was based in Ohio, while Patterson was located
in the state of Texas.
Contract Terms: The contract between CompuServe and Patterson was executed
online. It specified the use of CompuServe's platform for distributing Patterson's
software.
Breach of Contract: Patterson was accused by CompuServe of breaching the
contract by failing to meet its obligations, specifically regarding the timely delivery of
software.
Legal Issues
The United States District Court for the Southern District of Ohio ruled in favor of
CompuServe, stating that the Ohio court had jurisdiction over the case. The key points of the
ruling included:
Setting a Precedent for Internet Jurisdiction: The case set a critical precedent for
how courts would handle jurisdictional issues related to internet and e-commerce
activities. It confirmed that even in the absence of physical presence in a state, the
internet could establish enough of a connection to justify jurisdiction.
Online Contracts Are Enforceable: The ruling made it clear that contracts formed
over the internet could be enforceable across state lines, as long as they met certain
legal criteria, such as a valid agreement and forum selection clauses.
Impact on E-Commerce and Virtual Transactions: The case established that
electronic contracts and transactions in e-commerce could be subject to the
jurisdiction of the place where the business entity is located, even if the other party is
in a different jurisdiction.
Use of Long-Arm Statute: It underscored the growing importance of the long-arm
statute in the digital age, where traditional concepts of physical presence no longer
applied. The internet enabled businesses to reach global markets, but this case
clarified how courts could still exert control over interstate and international disputes.
13. "Mr. Akash in response to an order from Bala offering to purchase 5 computers at
the rate of Rs. to be delivered in 5 days. "---Write an e-record to Bala. Also state
when this e-record will be bounded. (Nov 19)
Subject: Acceptance of Order for 5 Computers
Dear Bala,
I am writing in response to your offer to purchase 5 computers at the rate of Rs. [specify the
rate] each, to be delivered within 5 days from today. I am pleased to confirm that we accept
your order under the terms specified in your communication.
We assure you that the computers will be delivered within the specified timeframe. Should
you have any further questions or require additional details, feel free to reach out.
Best regards,
Mr. Akash
[Your Company Name]
[Contact Information]
Thus, the e-record becomes binding at the moment it is dispatched by Mr. Akash from his
system, unless specified otherwise in a contract.