Beruflich Dokumente
Kultur Dokumente
By
Justice Rajesh Tandon,
Chairperson,
Cyber Appellate Tribunal
Ministry of Communications & Information
Technology Department of Information Technology,
Jeevan Bharti (LIC) Building, Connaught Place,
New Delhi.
Subject
ROLE OF JUDGES AND PROSECUTORS
IN COMBATING WITH CYBER CRIMES
(b)
(c)
States
3
Law on Electronic Commerce adopted by the United Nations Commission
on International Trade law;
And whereas the said resolution recommends, inter alia, that all
States give favourable consideration to the said Model Law when they
enact or revise their laws, in view of the need for uniformity of the law
applicable to alternatives to paper-based methods of communication and
storage of information.
Gradually the Act was amended on 5th February,2009 being the
Amendment No.10 of 2009 which has introduced the world digital
signature instead of electronic signature as provided under Chapter II of
Section 3 of the Act. In Section 2, Clause (ha) was introduced after the
word (h) which provides the Communication device. It reads as under:
Communication device means cell phones, personal
digital assistance or combination of both or any other device
used to communicate, send or transmit any text, video, audio
or image;
The Information Technology Act,2000 came into force on 17th
October, 2000. It has 94 sections divided into 13 chapters. This Act was
amended vide notification dated 27th October,2009.
In the Advanced Law Lexicon, the `Cyber law deals with the
computers and the Internet. Rather we can say as a computerized process.
Advanced Law Lexicon, 3rd edition 2005 has defined the same in
the word of `Cyberspace.
Then the
Author has also defined the `Cyber theft known as the act of using an
online computer service.
In this dictionary `Cyber law is defined as under:The field of law dealing with computers and the Internet
including such issues as intellectual property rights, freedom of
expression, and free access to information.
In the Advanced Law Lexicon, the `Cyber law deals
with the computers and the Internet. Rather we can say as a
computerized process.
Advanced Law Lexicon, 3rd Edition 2005 has defined `Cyber
theft known as the act of using an online computer service.
In this dictionary `Cyber law is defined as under: The field of law dealing with computers and the Internet,
including such issues as intellectual property rights, freedom of
expression, and free access to information.
Section 1(2) of the Information Technology Act,2000 reads as under:1(2) It shall extend to the whole of India and, save as otherwise
provide din this Act, it applies also to any offence or contravention
hereunder committed outside India by any person.
6
I, therefore, classify the role of Informations Technology in three
parts.
i)
IN THE INFORMATION TECHNOLOGY , ROLE
OF ADMINISTRATION OF JUSTICE.
ii)WORLDS SCENARIO ON IMPLEMENTATION OF EENABLE
ADMINISTRATION OF JUSTICE SYSTEM
GLOCALIZATION.
JURISDICTIONAL ASPECT ITS ROLE IN THE
ADMINISTRATION OF JUSTICE
computerized process.
Advanced Law Lexicon, 3rd Edition 2005 has defined the
same in the word of `Cyberspace. It has used a term as a
`floating in an electronic environment, which is accessible
internationally.
7
The Information Technology Act,2000 (IT Act) came into
force on 17 October,2000.
8
this section we will highlight the movements.
The points to be
i)
ii)
9
In Administration of Justice , it is being used in the following forms: General information
Information on court activities & organization
Legal information
Case information
This concept probably had been the concept of judicial resources
planning.
iii)
iv)
10
disruption or both is just the one side of the coin the other side concerning
the judicial fraternity is how to develop a scientific methodology keeping
in mind the principles of admissibility of evidence as per the evidence Act
of the country. No doubt the initiative to create cyber police stations and
investigative agencies are putting all the efforts to pin point the technical
intricacies of the nature of the case but still lot have to be done in this
direction. Website Platforms are one of the most lucrative platforms for
terrorism due to the inherent benefit the user enjoys i.e. anonymity, easy to
access, low cost of technology procurement, lack of awareness among
users and also the fear of the consequence of negative impact.
In one of the case of search and seizure the police department raided the
physical location and seized lot of Floppy Disk, later the constable used a
punch to make a hole in the Floppy Disk and tied it up with a string.
ii)
The preamble of our constitution says that every citizen shall get justice
free from fetters of social, economic and political evils. Therefore, to get
speedy justice infusion of Information and Communication Technologies
11
in Indian judiciary is envisaged. We need to implement Information and
Communication Technologies in all four corners of the judiciary in order
to achieve its goals in a required and reasonable time. The implementation
of Information and Communication Technologies in judiciary is not only
for a time factor but also addresses following secondary facets:
i)
ii)
To provide web based information & query counter for the benefit of
litigants.
iii)
iv)
v)
12
Secondly,
if
lawyers
adapt
Information
and
Communication
Technology, it will surely become a boon for them. They can see the
cause list, latest judgments, courts manual, register their case
electronically, refer the latest cases through search engine beneficial for
their pleading without going into hectic schedule of reading hard bound
journals, will also get other incidental updates happening in the world at
one place.
13
platform. Information and Communication Technology will sooner or
later seek an electronic court, which is of utmost importance for the
redressal of disputes of the applicants. This will ensure cost effectiveness
in imparting justice, transparency, and disbursal of case quickly and
getting justice on time.
This judicial system throughout the world is facing with the adoption of
the Information and communication technology in the existing judicial
process. However, the maturity of the e-enable judicial system in at Phase
4 in many of the developing countries. Therefore we will discuss the
challenges related with tacking the complexity of the nature of
sophisticated cases
.
Cyber security to protect the I.T Infrastructure of the
Judiciary: who knows that the infrastructure that is used to give justice in
contrary used for crime i.e. having web identity and presence the
infrastructure is prone to many cyber attacks, for e.g. the digital repository
that is been used as a reference of similar nature of case is contaminated
and a manipulated judgment is uploaded, this will just change the whole
meaning of the judicial system and will have catastrophic results.
The Judicial Set-up: every country almost has a similar hierarchy of
judicial set-up though the internal processing may be different. When it
comes to the implementation of the Information and Communication
Technology infrastructure the policy maker also need to highlight the
topology of the infrastructure i.e. a centralized or decentralized set-up.
This will warrant avenue of different need of security and management of
the Information and Communication Technology infrastructure.
14
iii)
15
When the person moves from one cell to another cell in the same
city, the system, i.e. Mobile Telephone Switching Office (MTSO)
automatically transfers signals from tower to tower.
16
When the cell phone is switched on, it listens for a SID on the
control channel, which is a special frequency used by the phone
and base station to talk to one another about things like call set-up
and channel changing.
If the phone cannot find any control channels to listen to, the cell
phone displays no service message as it is out of range.
When a Reliance customer opts for its services, the MIN and SID
are programmed into the handset. If some one manipulates and
alters ESN, handsets which are exclusively used by them become
usable by other service providers like TATA Indocom.
17
PROVISIONS RELATING TO JURISDICTION IN CYBER SPACE
UNDER THE INFORMATION TECHNOLOGY ACT,2000
Section 1(2) of the Information Technology Act, 2000 reads as under:1(2) It shall extent to the whole of India and, save as otherwise
provided in this Act, it applies also to any offence or contravention
hereunder committed outside India by any person.
The aforesaid definition covers the offences or contravention even
committed outside India by any person.
Section 75 reads as under:75. Act to apply for offence or contravention committed outside India.(1) Subject to the Provisions of Sub-section (2), the provisions of this Act
shall apply also to any offence or contravention committed outside
India by any person irrespective of his nationality.
(2) For the purposes of Sub-section (1), this Act shall apply to an offence
or contravention committed outside India by any person if the act or
conduct constituting the offence or contravention involves a computer,
computer system or network located in India.
JURISDICTIONAL ISSUES
The major issues addressed by the IT Act are:
18
19
Offences by companies.
20
Important to E-Commerce is especially Art.13 para.3 fig.3 of the
Convention, which refers to contracts on services or goods. To establish a
specific relation to the consumers country of residence the consumer must
have been the subject to a specific invitation addressed to him or
advertising in his state of domicile, and in that state he must have
performed a legal act required for the conclusion of the contract. It is not
necessary to render the service in the consumers country of residence.
Appellate consideration
This case presents novel issues arising from the global nature of the
Internet, where cyberspace has no territorial boundaries. The crux of the
matter involves the US Constitution and whether another nation may
regulate freedom of speech a right which has been long cherished in the
United States- by a US resident within the United States on the basis that
such speech can be accessed by internet users of another nation.
21
address and a physical jurisdiction. Moreover, websites can be
interconnected, regardless of location, by the use of hyperlinks.
Information that arrives on a website within a given jurisdiction may flow
from a linked sitter entirely outside that jurisdiction. For example, one
packet of an e-mail message sent from California may travel via telephone
line through several different states and countries on its way to Italy. Part
of the trip may even go through a satellite in space. Meanwhile, another
packet of the same message may travel by fibre-optic cable, arriving in
Italy before the first packet, with both transmissions are completed in
nanoseconds. Finally, not with standing the Internets complex structure,
the Internet is predominately a passive system; Internet communication
only occurs when initiated by a user.
First, in cyberspace as
22
reality has been recognized by regulators in the United States under
federal securities laws.
(a)
(b)
(i)
(ii)
(e)
23
Spiritual backing of the electronic media in the Justice
System
Internet connection is not only present in the electronic
media but the same is also present in our heart. This is called
spiritual Internet.
24
When our spiritual batteries are low we lose touch with the
infinite Source of peace and joy; hence small events during the
course of each day take on exaggerated importance and our
emotional well-being is at the mercy of every person, every phone
call and every traffic jam.
How to recharge our batteries? Just plug yourself back into
the Source. Get connected again to God. Sometimes people
mistakenly say, God is so far away from me or God has left
me. No. It is never like that. It is we who have left God, we who
have gone astray. The moment we re-connect, the connection is
there.
The spiritual corner should be the place where we
reconnect to the Divine Source, where we recharge our batteries.
When our batteries are charged we can hear not only each other
clearly but we can also clearly hear the inner, Divine voice.
25
46.
Power to adjudicate.-
(1) For the purpose of adjudging under this Chapter whether any person
has committed a contravention of any of the provisions of this Act or
of any rule, regulation, direction or order made hereunder the Central
Government shall, subject to the provisions of Sub-section (3),appoint
any officer not below the rank of a Director to the Government of
India or an equivalent officer of a State Government to be an
adjudicating officer or holding an inquiry in the manner prescribed by
the Central Government.
(2) The adjudicating officer shall, after giving the person referred to in
Sub-section (1) a reasonable opportunity for making representation in
the matter and if, on such inquiry, he is satisfied that the person that
the person has committed the contravention, he may impose such
penalty or award such compensation as he thinks fit in accordance
with the provisions of that section.
(3)No person shall be appointed as an adjudicating officer unless he
possesses such experience in the field of Information Technology and
legal or judicial experience as may be prescribed by the Central
Government.
(4)Where more than one adjudicating officer are appointed, the
Central Government shall specify by order the matters and places with
respect to which such officers shall exercise their jurisdiction.
(5)Every adjudicating officer shall have the powers of a civil court
which are conferred on the Cyber Appellate Tribunal under SubSection (2) of Section 58, and(a)All proceedings before it shall be deemed to be judicial
proceedings within the meaning of Sections 193 and 228 of the Indian
Penal Code (45 of 1860)
26
(b)Shall be deemed to be a civil court for the purposes of Sections 345
and 346 of the Code of Criminal Procedure, 1973 (2 of 1974)
47.
27
(g)
(h)
Explanation.-For the purposes of this section(i)computer contaminant means any set of computer
instructions that are designed(ii)to modify, destroy, record, transmit data or programme
residing within a computer system or computer network;
by any means to usurp the normal operation of the
computer, computer system or computer network;
(ii)
computer data-base means a representation of
information knowledge, facts, concepts or
instructions in text, image, audio, \ video that are
being prepared or have been prepared or have
been prepared in a formalized manner or have
been produced by a computer, computer system or
system or computer network and are intended for
use in a computer, computer system or computer
network.
(iii)
(iv)
28
(j)
(k)
29
(c)
30
terror in the people or any section of the people
by(i)
denying or cause the denial of
access to any person authorized to
access computer resource; or
(ii)
attempting to penetrate or access a
computer
resource
without
authorization
or
exceeding
authorized access; or
(iii)
introducing or causing to introduce
any computer contaminant; and by
means of such conduct causes or is
likely to cause death or injuries to
persons or damage to or
destruction of property or disrupts
or knowing that it is likely to cause
damage or disruption of supplies or
services essential to the life of the
community or adversely affect the
critical information infrastructure
specified under section 70 or
(B) knowingly or intentionally penetrates or accesses a
computer resource without authorization or exceeding
authorized access, and by means of such conduct obtains
access to information, data or computer database that is
restricted for reasons of the security of the State or foreign
relations; or any restricted information, data or computer
database, with reasons to believe that such information,
data or computer database so obtained may be used to
cause or likely to cause injury to the interests of the
sovereignty and integrity of India, the security of the State,
friendly relations with foreign States, public order, decency
or morality, or in relation to contempt of court, defamation
or incitement to an offence, or to the advantage of any
foreign nation, group of individuals or otherwise.
Commits the offence of cyber terrorism.
(2) Whoever commits or conspires to commit cyber
terrorism shall be punishable with imprisonment which
may extend to imprisonment for life.
Section 67. Punishment for publishing or transmitting
obscene material in electronic form.-Whoever publishes
or transmits or causes to be published or transmitted in the
electronic form, any material which is lascivious or appeals
to the prurient interest or if its effect is such as to tend to
31
deprave and corrupt persons who are likely, having regard
to all relevant circumstances, to read, see or hear the matter
contained or embodied in it, shall be punished on first
conviction with imprisonment of either description for a
term which may extend to three years and with fine which
may extend to five lakh rupees and in the event of second
or subsequent conviction with imprisonment of either
description for a term which may extend to five years and
also with fine which may extend to ten lakh rupees.
Section 67A.
Punishment for publishing or
transmitting of material containing sexually explicit act,
etc. in electronic form. Whoever publishes or transmits or
causes to be published or transmitted in the electronic form
any material which contains sexually explicit act or
conduct shall be punished on first conviction with
imprisonment of either description for a term which may
extend to five years and with fine which may extend to ten
lakh rupees and in the event of second or subsequent
conviction with imprisonment of either description for a
term which may extend to seven years and also with fine
which may extend to ten lakh rupees.
(a)
(b)
(c)
(d)
(e)
32
a term which may extend to seven years and also with fine which
may extend to ten lakh rupees.
Provided that provisions of Section 67, Section 67A and this
section does not extend to any book, pamphlet, paper, writing,
drawing, painting representation or figure in electronic form.
Section 67C. Preservation and retention of information by
Intermediaries. (1) Intermediary shall preserve and retain such
information as may be specified for such duration and in such
manner and format as the Central Government may prescribe.
(2) Any intermediary who intentionally or knowingly contravenes
the provisions of sub-section (1) shall be punished with an
imprisonment for a term which may extend to three years and also
be liable to fine.
Section 70. Protected system.-(1)The appropriate Government
may, by notification in the Official Gazette, declare any computer
resource which directly or indirectly affects the facility of Critical
Information Infrastructure, to be a protected system.
(2) The appropriate Government may, by order in writing,
authorize the persons who are authorized to access protected
systems notified under sub section (1).
(3)Any person who secures access or attempts to secure access to a
protected system in contravention of the provisions of this section
shall be punished with imprisonment of either description for a
term which may extend to ten years and shall also be liable to fine.
(4) The Central Government shall prescribe the information
security practices and procedures for such protected system.
33
the consent of the person concerned discloses such electronic
record, book, register, correspondence, information, document or
other material to any other person shall be punished with
imprisonment for a term which may extend to two years, or with
fine which may extend to one lakh rupees, or with both.
Section 72A Punishment for disclosure of information in
breach of lawful contract.Save as otherwise provided in this
Act or any other law for the time being in force, any person
including an intermediary who, while providing services under the
terms of lawful contract, has secured access to any material
containing personal information about another person, with the
intent to cause or knowing that he is likely to cause wrongful loss
or wrongful gain discloses, without the consent of the person
concerned, or in breach of a lawful contract, such material to any
other person, shall be punished with imprisonment for a term
which may extend to three years, or with fine which may extend to
five lakh rupees, or with both.
34
(iii)
(iv)
(v)
Email spoofing
(vi)
Web-jacking
(ix)
Arms Act
35
vested in a civil court under the Code of Civil Procedure, 1908,
while trying a suit, in respect of the following matters, namely(a)Summoning and enforcing the attendance of any person and
examining him on oath;
(b)Requiring the discovery and production of documents or other
electronic records;
(c )Receiving evidence on affidavits;
(d) Issuing commissions for the examination of witnesses or
documents;
(e) Reviewing its decisions
(f) dismissing an application for default or deciding its ex parte;
(g) any other matter which may be prescribed.
(3)Every proceeding before the Cyber Appellate Tribunal shall be
deemed to be a judicial proceeding within the meaning of Sections
193 and 228, and for the purposes of Section 196 of the Indian
Penal Code and the Cyber Appellate Tribunal shall be deemed to
be a civil court for the purposes of Section 195 and Chapter XXVI
of the Code of Criminal Procedure.
Section 61 of the Information Technology Act, 2000 also
debars the civil court in respect of the matters which are being tried
by the Cyber Tribunal and directly the appeal goes to the High
Court against the judgment of the Cyber Appellate Tribunal.
36
As per report of Deputy Inspector General of Police, Panaji, Goa
upto February,2010, there are 22 cases pending and some of the cases are
Under Section 66 of the IT Act,2000 and some of the cases are under
Section 66A and 67 of the IT Act,2000. Three cases are under Section 420
IPC. Some cases are under Section 43, 43(a)(b) and(h) of the IT Act. As
per report, last case was filed on 16.5.2009. All the cases are still pending.
When I had a meeting with the Secretary (IT) personnels and police
officers at Goa, I had directed them to disposes of these cases promptly.
Credit Other
and
s
Debit
Card
misuse
1
3
2
Total
22
28
37
bank account. They have first transferred the amount from the victims
ICICI Bank SB Account to India Bulls account and from that to fake Axis
Bank account, Tarnaka Branch, Hyderabad from where they could
withdraw the whole amount. After the detection of the case, a letter was
addressed to the Reserve Bank of India mentioning the instances of
loopholes in the banking system exploited by the culprits for executing the
said fraud and with advice to take necessary corrective steps on the
loopholes in the banking system. There are already indications that RBI
has moved swiftly and alerted all the banks on this count and directing
them to adhere more stringently to the guidelines. Similarly CBI, DOT are
also addressed about such system loopholes that have come across while
the investigation of cyber offences. In specific addressed letters to DOT
with reference shared IP Addresses and to CBI with reference to Bank
Frauds, e-mail high jacking, Nigerian frauds.
Institute of Forensic Science
Day by day, law and enforcement agencies find it necessary to
regulate the activities that influence our daily lives with the assistance of
science. Laws are continually being broadened and revised to counter the
increasing crime rates. At the same time they are looking more and more
to the scientists for technical support.
delivery
system.
Besides
routine
work
in
the
38
required to collect and preserve the physical evidence, but
also
contributes
highly
professional
and
unique
39