Beruflich Dokumente
Kultur Dokumente
Introduction
With the advancement of computers and information technology, people have found ways
to abuse the new found tools for their own benefits leading to the detriment of rest of the
world. As a result, new branches of law have emerged to prevent these malpractices.
Information Technology law and internet law are prominent among them.
The internet law deals with exactly the same legal issues as normal law and applied to the
different features in online world. Whenever you purchase, write or download anything
on the internet, you are subject to exactly the same consumer, defamation and copyright
laws as in the non-virtual world.
A common misconception about the internet is that all material on it is freely available to
the public. Like the rest of the world, all images, audio - video clips and data that are not
in public domain belongs to someone, and if you use it without permission you are
breaking the law. For instance, distributing a novel online is as much illegal as
duplicating the real book.
Anyone with the necessary technical knowledge and investment can set up their own
website, but most of them have a little legal knowledge. Amateur web sites create a
majority of websites on the internet, and material on them can be untrue or even illegal.
Having a site on the net doesn't mean that it is legal, and in some instances, such as child
pornography, it can be illegal to view or even possess certain images even you have no
prior knowledge that you have these materials. Also remember, just because something
may be legal in the country where the website is hosted does not mean it's legal to view
where you live.
There are many computer related offences such as using computers as tools for criminal
activity, hacking into other computers, distribution of illegal data (copyright infringement,
pornography) , unauthorized access in order to commit an offence, causing a computer to
perform functions without lawful authority, Illegal interception of data and use of an
illegal device, unauthorized disclosure of information .etc. IT law and internet law is
meant to control these activities through regulations.
1
Some of the main challenges against maintaining IT law are given below.
Conformity with IP Laws and educating people on new laws
Controls needed to prevent misuse the technology - Computer Crimes.etc
Ensuring secure transactions and safeguards to retention of information
Legal systems are based on human interface and manual processes making
it challenging to transit to IT based processes
Computer Crimes act No 24 of 2007 covers basically about two broad ranges of offences
as computer related crimes and Hacking that affects Integrity, Availability and
confidentiality. Some of the provisions of this act can be listed as follows.
Criminal Liability which prevents unauthorized access to computer information.
(section 3 & 4)
This act also prevents of an unauthorized damage to a computer system or related
computer programs. The main focus is on the intentional unlawful damages to a
computer system.
The section 8, 9 & 10 consists of the provisions regarding Illegal interception of
data, use of illegal devices and unauthorized disclosure of information
respectively.
The Intellectual property act, No 36 of 2003 controls the misuse of intellectual property.
This act provides Provisions for,
Protecting copyright for software,
Providing exclusive rights ownership,
Providing scope of copying for the defined fair use,
2
Safeguarding Information,
Ensuring compliance with licensed obligations,
Respecting ownership rights.
These are some basic provisions that have been provided with the Intellectual Property
act which are of so much importance. Apart from these two acts the Electronic
Transactions, no 19 of 2006 guide upon the electronic business on secure transaction and
storage. This act has no clear definition for the term Electronic transactions and covers
all the transactions that covered out via electronic form. This act basically covers,
Facilitating domestic and international electronic commerce by eliminating legal
barriers.
Ensuring the reliability factor for all forms of electronic commerce.
Providing by means of a better electronic communication
Promoting public confidence in the authenticity, integrity and reliability of data
messages and electronic communication.
There had been developments to the Electronic transactions act where all sections except
section 18 and 20 (1) brought into operation with a gazette dated 27th September 2007.
Also the UN convention on the use of Electronic communication and International
Contacts has also influenced the Electronic Transactions act and Sri Lanka has become
the first South Asian country to sign it with China & Singapore.
Apart from these basic acts there are some other acts operating with the Information
technology related issues. Data Protection act of 1998 has been constructed based on the
British Data Protection act of 1998, and computer crimes bill. This covers the Information
kept in both electronically and manually. Payment and Settlement Systems act No 28 of
2005 and Information and communication Technology act No 27 of 2003 are some of the
other important legislations enacted by the parliament.
3
including criminal behavior, a number of countries across the globe, have reviewed and
upgraded their existing criminal laws, and have also framed new set of laws to deal with
such crimes, and criminal behavior.
Example for one of the earliest such legislations is the Computer Misuse Act 1990,
enacted by Great Britain on 29 June 1990 which came into force on 29 August 1990. The
main purpose of this act was to protect "provision for securing computer material against
unauthorized access or modification." This act relates to unauthorized access and
modification of computer materials. Information Technology law of India also enacted in
2000. This act applies for any offence or violation committed even outside the territory of
India.
When compared to these laws in the other countries the Information Technology act in Sri
Lanka is relatively new. 1978 constitution does not explicitly recognize the personal
privacy which is one area which could get affected as a result of breeching this
Information Technology law. Some of the related laws that come with this act are
Intellectual Property act, Copyright Law, Patents etc. An important aspect of legal
reform which has been successfully implemented in Sri Lanka is the Intellectual Property
measures to ensure adequate and meaningful protection for Computer Software. Inhere
the weight which is given to Software is very high since Software is heavily involved in
the field of Information Technology. Intellectual Property Rights in Information
Technology based products have grown rapidly in importance even in Sri Lanka.
Although the Code of Intellectual Property Act of 1979 (based on the WIPO model) did
not expressly contain provisions to protect Computer Software, Section 7 of the 1979
Code protected original literary, artistic and scientific works.
Digitization has made it much easier to manipulate, reproduce, and distribute protected
work. Digital content can be combined, altered, mixed, and manipulated easily.
4
Furthermore, digital material can be copied repeatedly with no loss of quality. Digital
compression allows extremely large volumes of information to be stored on a single
device and to be transmitted online. Posting on the Internet is sometimes compared to
broadcasting, because one single act of posting can communicate information to an
indefinite number of people worldwide. However, broadcasting is traditionally based on
point-to-multipoint transmission, with an active communicator and passive recipients.
The Internet, by contrast, supports both point-to-multipoint and point-to-point
service. Much content is distributed only on demand of a recipient, giving her much
greater control over the content and the circumstances under which it is accessed. Hence
the internet communication can be easily misused in doing certain things.
Case Law is a set of reported judicial decisions of selected appellate courts and other
courts of first instance which make new interpretations of the law. These interpretations
are distinguished from statutory law which are the statutes and codes enacted by
legislative bodies.
5
and it has been suggested instead that the Internet can be self-regulated as being its own
trans-national "nation". At the same time In many countries, speech through cyberspace
has proven to be another means of communication which has been regulated by the
government. Therefore there should be a good control over the many underlying
questions concerning the freedom of speech. For example, does the government have a
legitimate role in limiting access to information? And if so, what forms of regulation are
acceptable? Internet law has to play a vital role in common scenarios, thus its essential to
learn about case laws related to the internet law, since the usage of internet is going high
day by day.
There are several categories/acts in creation of privacy in internet laws. Those categories
are,
Privacy act of 1974
Foreign Intelligence Surveillance Act of 1978
(1986) Electronic communication privacy act
(1999) Gramm-Leach-Bliley Act
(2002) Homeland Security act
Intelligence Reform and Terrorism Prevention act
6
The IRTPA also sought to establish protection of privacy and civil liberties by setting up a
five-member Privacy and Civil Liberties Oversight Board. This Board offers advice to
both the President of the United States and the entire executive branch of the Federal
Government concerning its actions to ensure that the branch's information sharing
policies are adequately protecting privacy and civil liberties.
The IRTPA requires the Department of Homeland Security to take over the conducting of
pre-flight comparisons of airline passenger information to Federal Government watch
lists for international and domestic flights. The Transportation Security Administration is
currently developing the Secure Flight program and issuing this rule making to implement
this congressional mandate. Airline personnel will have the right to demand government-
issued ID be shown if ordered by the TSA to do so, but those orders are to remain
confidential so there is no oversight as to when the airline has been ordered to request ID
and when they are requesting it on their own imperative.
The act is formally divided into 8 titles:
1. Reform of the intelligence community also known as the National Security
Intelligence Reform Act of 2004 which monitors the improvement of
education for the intelligence community, additional improvements of
intelligence activities, privacy and civil liberties etc.
2. Federal Bureau of Investigation which is responsible for Federal Bureau of
Investigation", concerns intelligence within the Federal Bureau of
Investigation.
3. "Security clearances"
4. "Transportation security" - deals with "Aviation Security" "Air Cargo
Security" "Maritime Security" "General Provisions
5. National Strategy for Transportation Security" -
6. "Border protection, immigration, and visa matters"
7. "Terrorism prevention" - Individual Terrorists as Agents of Foreign Powers
Money Laundering and Terrorist Financing additional Enforcement Tools
8. "Implementation of 9/11 Commission recommendations", also known as the
9/11 Commission Implementation Act of 2004 that monitors the diplomacy,
foreign aid, and the military in the war on terrorism, terrorist travel and
effective screening, national preparedness, homeland security etc.
9. "Other matters"
3.2 Case Law related to IT Law
7
With the advancements of information technology such as e-Commerce, mobile and
satellite communication, bio-informatics, social networks and data mining and data
warehousing, people tend to use IT related services more frequently due to the ease of
use, availability, user friendliness etc. But compared to the traditional paper based
services there are some drawbacks with these technologies specially with the authenticity
and privacy. Therefore the computer based crimes such as hacking, violation of
copyrights have become more popular with the criminals due the lack of awareness of
the user and the difficulty to trap them with the low. Therefore users need to be careful
about ensuring their own protection while obtaining the benefits of the modern
information technology trends. Hence rule and regulations has been established to ensure
the protection of civilians.
There are several categories of acts prevailing for the IT law under Case law such as,
Florida Electronic Security Act
Illinois Electronic Commerce Security Act
Texas Penal Code - Computer Crimes Statute
Maine Criminal Code - Computer Crimes
Singapore Electronic Transactions Act
Malaysia Computer Crimes Act
Malaysia Digital Signature Act
UNCITRAL Model Law on Electronic Commerce
Information Technology Act 2000 of India
8
Statute 15.16 says people can submit legal documents electronically and they will remain
valid in the Department of State. The statute also says the electronic transmission of
records such as photographs, diagrams, facsimiles and prints have the same "force and
effect as originals" for use as evidence. This includes electronic filing of legal documents
using electronic signatures, as well as using email addresses as valid forms of
communication and notification under the law.
9
the laws as they currently exist still protect against the same conduct, they are
considerably different from the laws that were enacted in 1985.
"Breach of Computer Security" makes it a crime to knowingly access another person's
computer without the 'effective consent of the owner'. Interestingly, the name for this
offense originated with a requirement in the original law that the actor breaches" a
computer security system in order to commit this offense. The legislature removed the
requirement that a security system be involved in the offense, but did not change the
name of the offense.
In a nutshell, it is a crime in Texas to use someone else computer, without proper consent
of the computer's owner. It is important to note that an individual does not have to
damage or change anything in order to be guilty of a crime. It is a common myth that
"just looking" at computer data is never a crime. But it is now. This offense prohibits
more than just the unauthorized use of the computer. It also prohibits authorized users
from using a computer for an unauthorized purpose. The statute states that consent is not
'effective' if 'used for a purpose other than that for which the consent was given'.
10
The Electronic Transactions Act (ETA) (Cap 88) was first enacted in July 1998 to provide
a legal foundation for electronic signatures, and to give predictability and certainty to
contracts formed electronically. In July 2010, the ETA was repealed and re-enacted to
provide for the continuing security and use of electronic transactions. Singapore was one
of the first countries in the world to enact a law that addresses issues that arise in the
context of electronic contracts and digital signatures, and continues this trend by being
amongst the first to implement the United Nations Convention on the Use of Electronic
Communications in International Contracts, adopted by the General Assembly of the
United Nations on 23rd November 2005 (the UN Convention).
11
The Digital Signature Act was enacted in 1997 and came into effect on 1st Oct 1998. The
first total revision was in 2002, the second in 2006. This Act incorporates all amendments
up to 1 January 2006, which provides the licensing framework for the provision of digital
signatures including the type of services, the qualification requirements, the application
and registration fees.
The emergence of digital signatures aroused with the idea of secure communication
between two transactional parties. As internet is an open network which is open for lots of
problems regarding identity, manipulation of information, interference of third parties
security and commitment has become major issues in online transactions. This act
introduces and implements the usage of digital signatures in online commercial
transactions.
12
Code, the Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891 and the
Reserve Bank of India Act, 1934 and for matters connected therewith or incidental
thereto."
4. Conclusion
The development of information technology is apparently visible despite of the country
you live in. The key feature of IT is that it is always making sure of improving the
existing technologies to a new level. Whatever the activity or field, information
technology actually has a huge say to the enhancement of it. But the development of
information technology leads to more complex and advanced illegal operations. In fact
misusing of internet services and utilization of software for unfair deeds has been
becoming familiar day by day. For the purpose of preventing such illegal circumstances
and providing a fair value and honor to actual owners of intellectual properties,
information technology law was enacted. As information technology is considerably
shrinking the world these issues become global and therefore Sri Lanka also have to face
the same fate. But due to Sri Lankas tag of a developing country, all these laws are
improving at snails pace. Sri Lanka is still deficient of some areas of legal protection.
The main reason for this is actually the dynamic nature the information technology which
makes the protection over the illegal operations hard. Due to the complexity of new
technologies it is somewhat easy to sneak through any barrier in order to commit
malpractices such as unauthorized usage of intellectual property in information
technology sources and cybercrimes. However in a continuously improving field like
information technology you cannot set up laws forever as every single day a new trend of
illegal operation can occur. Therefore it is important to continuously amend the IT law
according to the prevailing trends.
13
References
1. Dias, L. Sri Lankan Perspective in Meeting the Cyber Crime Challenge.ppt. Retrieved
From https://www.scribd.com/presentation/87028721/Sri-Lankan-Perspective-in-
Meeting-the-Cyber-Crime-Challenge
2. Electronic Signature. (05.07.2016) . Retreived from. https://en.wikipedia.org /wiki/
Electronic_signature
3. Electronic Transactions Act of Singapore. (n.d). Retrieved from
http://unpan1.un.org /intradoc/groups/public/documents/apcity/unpan025623.pdf
4. Fernando, J. (19.08.2010). Business Governance of Information Technology the CXO
Perspective Legal Framework. Retrieved from http://www.slideshare.net
/tomwinfrey/jayantha-fernando-llm-it
5. Malaysian Computer Crime Act in 1997. (n.d). Retrieved from http://unpan1.un.org/
intradoc/groups/public/documents/APCITY/UNPAN025630.pdf
6. Online Digital Signature Authority. (n.d.) E-Signature. http://www.e-signature.com/e-
signature-law/
7. Parliament of the Democratic Socialist Republic of Sri Lanka, Computer Crime Act
No.24 of 2007.(n.d). Retrieved from http://www.slcert.gov.lk/Downloads/Acts/
Computer_Crimes_Act_No_24_of_2007(E).pdf
8. Parliament of the Democratic Socialist Republic of Sri Lanka, Electronic
Transactions Act No.19 of 2006. Retrieved from http://www.slcert.gov.lk/
Downloads/Acts/ElectronicTransactionActParliamentver(E).pdf
9. Property Law. (30.01.2012). Retrieved from http://www.bu.edu/bucflp/
files/2012/01/Intellectual-Property-Act-No.-36.pdf
14