Sie sind auf Seite 1von 20

July 2006

Vol.-12 : Issue-7
Annual Subscription
Rs. 100/-

&& `: {H«$`mdmZ² g g{Md:Ÿ&&

Technology... the knack of so arranging the world that we don't have to experience it
Chairman’s Communique
Dear Members and students, visited the Pune Chapter on 10th June after the
At the outset, I happy to present meeting. All of them expressed satisfaction over the
the IT Special Issue of Sanhita to facilities and infrastructure available at the
all the members and students. It Chapter. They also praised the spirit of camaraderie
was planned at the beginning of among the members from Pune, that all of them
the year to come out with two experienced during their two day stay.
special issues of Sanhita in the The Chapter had organized two meetings on 4th June
year 2006. The committee is and 11th June with the students who had appeared
planning to come out with the for the HSC examination as a part of career
second special issue around Diwali. counseling drive. I am happy to inform that quite a
The Central Council Meeting was held at Pune on 9th number of students who participated in the
and 10th June after a long gap. On the evening of 9th programme registered for the CS course.
June, the Chapter had organized felicitation of the Incidentally, in the month of July and August the
President and Vice-President followed by informal Chapter will be organizing career counseling /
interaction of the members and students with all awareness programmes in various schools and
the Central Council members. The programme was colleges in and around Pune. The members who are
well attended. The President addressed the interested in participating in the career counseling
gathering with the PUNERI PAGDI on and everyone programmes are requested to get in touch with the
[including the President himself], enjoyed the Chapter. In the month of July, the Chapter is also
traditional way of welcoming him. The President organizing the Student Orientation Programme.I
and the Secretary also answered the queries raised appeal to the students to participate in the SOP.
by the members on matters relating to the “CS Arts Circle” is celebrating its fourth anniversary
profession of company secretaries, the in the month of July. On behalf of the Managing
developments that are taking place and also the Committee I take this opportunity to congratulate
efforts that the Institute is taking to create more and all the members of Arts Circle for their efforts to
more opportunities for the company secretaries, in carrying on this activity in spite of their busy
India and abroad. The Chapter had also organized schedule and also give the best wishes for the future
the interview of the President with Ms. Gauri Athale, journey.
Senior Journalist of The Economic Times and a co- With Best Regards,
opted member on the Managing Committee, which
was published in all the editions of The Economic
Times on 24th June 2006 throughout India.
The Central Council members and the Secretary Nishad Umranikar

Contacts 4 U
Rajas Bodas, Practicing Company Secretary

Office Reference Legislation Contact Details


The Director, Import- Export Policy Address : Plot no. P-1, Infotech Park,
Software Technology Hinjawadi, Pune 411027. Maharashtra.
Parks of India Tel Nos : 020-22932644, 22932645
Fax No. : 020-22932639 E-mail : sushil@stpp.soft.net
Website : http://www.stpp.soft.net
Cyber Crime Information Technology Address : Annex III, 1st floor, office of Commissioner of
Investigation Cell Act 2000 Police, D.N. Road, Mumbai 400001
Tel Nos : 022-22630829, 022-22641261
E-mail : officer@cybercellmumbai.com
punepolice@vsnl.com
Website : http://www.cybercellmumbai.com

Inside Sanhita Committee


1. Pune : an attractive IT and 5. Duty free import of equipment Editorial Board
ITes destination. ..... 1 by STPI unit ..... 8
2. Secretary 2.. eSecretary - 6. Drafting and Negotiating Kiran Chitale : Chairman
a real time transformation. ..... 3 Outsourcing Contracts ..... 11 Vikas Agarwal : Member
3. Knowledge Process Outsourcing : 7. Information Systems Audit ..... 13 Suraj Padhiyar : Member
a brief overview ..... 6 8. Cyber Crimes ..... 14 Rashmi Limaye : Member
4. Stock Options to Non-Resident 9. Chapter Report ..... 17 Jaee Athavale : Member
employees of Listed Companies ..... 7 10.Forthcoming Programmes ..... 17 Vandana Naik : Ex-officio

JULY 2006 ICSI - WIRC Pune Chapter Newsletter


Pune: an attractive IT and ITeS destination
Vivek Sadhale, Company Secretary and Head Legal, Persistent Systems Pvt. Ltd.
Vikas Agarwal, Senior Officer Secretarial, Persistent Systems Pvt. Ltd.

Till some years ago, Global, Veritas, Parametric, Tech Mahindra,


people thought of Cognizant, P&O Nedlloyd, TCS, Infosys, Wipro,
Pune as the ideal Satyam, Tata Technologies, Kanbay are the few
place to get away for examples of the growing list of successful
a weekend. Pune companies setting their shop in Pune. There are
seemed a pleasant quite a few local companies like Persistent Systems
place with a careless who have also made it big in this arena.
attitude. With its hygienic climate and a It all started in the year 1991, when Software
comparatively pollution-free atmosphere, Pune was Technology Parks of India (STPI), was set up as an
popularly billed as the 'Pensioner's Paradise'. autonomous body under the Ministry of Information
Today, the little town has changed into an energetic Technology with the aim of making India a global
and lively city. Pune is today fast emerging as an software leader. STPI opened its first office in Pune
InfoTech hub, challenging biggies like Bangalore and the rest as they say is history. Pune never
and Mumbai to emerge as one of the top contenders looked back.
for the 'Silicon Valley of India' slot. Last year, Pune made an export of Rs. 9,100 Crores
The once sleepy town, situated in the hills of the which is 48% higher than what it made in the year
Sahyadri range of the Western Ghats, Pune, 2004-05. While doing so, it has surpassed Mumbai.
described as the 'Queen of the Deccan', 'Cultural Today, Pune is only behind Bangalore and
Capital of Maharashtra' and 'Oxford of the East' has Hyderabad in terms of software exports and the
finally been able to forge its own identity as a days are not far when Pune would catch up with
business city. these cities.
Close proximity to the financial capital and rapidly Mr. P Venugopal, Director, Software Technology
improving infrastructure have made Pune one of the Park of India, Pune, Maharashtra, says, “The city is
most sought-after commercial destinations in the emerging as a major centre for software engineering
country today. The recent attractions have been the services. Pune is shaping up as an attractive
expressway connecting Mumbai and Pune, which location for niche companies that specialize in high
has reduced the traveling distance and time end work. The city is attracting engineering services
substantially. The evolution of modern Pune is quite companies and others that require special skills
dramatic, which was only known as a hub for sets such as testing software and for medical
automobile engineering till recently, to emerge as a implants. The growth has been phenomenal. Over
research hub for knowledge-based industries. 112 new units were registered in Pune for software
Pune, the place known for excellent academic and and services in 2005-06.”
research institutions, is fast and steadily emerging Maharashtra State Industrial Development
as the most preferred destination in the country for Corporation (MIDC) recognized the potential of Pune
some of the vital industrial sectors like information and set up a Pune Infotech Park at Hinjewadi in a
technology, pharmaceuticals, biotechnology and 200-acre area. MIDC had to come up with Phase II at
healthcare. Venture capitalist are looking for more Hinjewadi within 18 months of launching of the
investment opportunities. Phase I. Phase II is spread across 650 acres of land.
Positioned by the State Government as the latest Phase II which will also house Bio-Tech Companies,
and best IT destination, Pune in the past few years is sold out and MIDC has initiated the process for
has witnessed a slew of IT parks being sanctioned, Phase III and Phase IV. MIDC also set up an IT park
the largest of which is in Hinjewadi. The results of at Kharadi and at Talawade.
the State Government's efforts are slowly coming to Why Pune ?
light and in Hinjewadi all the major players have a Many state-of -art IT parks have come up in Pune
development centre. Also, a host of Multinational like:
Software Companies have commenced operations i) Cybercity Magarpatta Hadapsar, Pune
in private IT and software technology parks. IBM (www.magarpattacity.com)

ICSI - WIRC Pune Chapter Newsletter 1 JULY 2006


ii) Kharadi Knowledge Park, Pune - Ahmednagar attention from one and all. Pune's growing shortfall
Highway, Pune (www.midcindia.com ) of 150 MW to 200 MW of power is worrisome. There
iii) Pune IT Park, Aundh Road, Pune are three to four hours of load shedding, five days a
(www.puneitpark.com) week.
iv) Information Technology Park, Talawade, Dehu- When Microsoft, India, wanted to expand and use
Moshi Road, Pune (www.midcindia.com) Pune as an R&D hub for high-end technologies, it
These IT parks offer ready to use infrastructure did an internal survey of six cities in the country.
facilities required by a software unit. Availability of Pune was an abysmal number four on the list. It
satellite link, network connectivity, optic fibre scored low on poor road conditions, high air
cables, telephone lines, uninterrupted power pollution and an appalling number of power trips
supply, video conferencing, electronic data through the day. "You cannot run an IT company on
interchange is of paramount importance to the diesel generator sets," Mr. Ravi Venkatesan,
success of a software unit which is provided by Microsoft India Chairman, says.
these IT Parks. It is necessary for the Maharashtra Government to
With the enactment of SEZ Rules, Pune is set to promote Pune as IT hub aggressively. Pune not
witness surge in corporate activities. Already many being the State's capital has its own drawbacks.
corporates have announced their intention of Pune also needs to emulate the example set by
making huge investments for setting up SEZs. Bangalore where corporate participate with the local
With high skilled availability of manpower, IT sector Municipal Corporation by extending helping hands
has grown leaps and bounds. The weather and to improve the infrastructure conditions.
culture of Pune jells well with the requirement of the Maratha Chamber of Commerce Industry and
software industry. Agriculture (MCCIA), Computer Society of India and
The city offers advantages of both, a small and big Software Exporter's Association of Pune (SEAP) are
city. Smaller distances ensure that logistics can be some of the local bodies putting their energies
managed easily. Commuting times are shorter. together to market Pune as the most preferred IT
Pune is also close to Mumbai, the financial capital of and ITeS destination. Partnering with the local
the country. The clearance of an international government bodies and organisations responsible
airport in Pune means it will soon be directly for the upliftment of the image of the city, they are
connected with the world. leaving no stone unturned to ensure success for the
Pune being "The Oxford of the East" has no dearth of software industry.
a talent pool either. There are specialised education 2003 IT and ITeS policy announced by the
institutes here and a large base of scientists working Maharashtra Government's has evoked favorable
on research and development. While Chennai, response from the Industry. However, it is upto the
Bangalore and Hyderabad suffer from the accent local Municipal Corporation and other local
factor, the BPO industry has Pune to look to, for a government bodies to give effect and implement
large English speaking public. these policies. Pune Municipal Corporation needs to
With high percentage of young educated English- play a more proactive role to create infrastructure
speaking population, IT enabled services (ITeS) is conducive to the growth of this sunrise industry.
another market which is a fast growing. Pune has With the IT spending in USA catching up, Pune is
again emerged as a leading city suited for ITeS strategically poised to reap dividends of the upside
market. With Nasscom predicting a huge potential in the market. It however, would be a litmus test for
for the ITeS, Pune is definitely going to be hub of all the policy makers to fast turnaround the “wrongs”
such activities. Big names like WNS, GTL, into “rights” if Pune is to become most preferred IT
Convergys, Xansa have set up huge facilities in and ITeS destination.
Pune. Now, after IT, ITES and the BPO revolution,
The Way Ahead: Knowledge Process Outsourcing (KPO) is the next
Pune still has a huge way to go before it can take a big thing to hit India. With its immense talent pool,
pause as the competition from other cities hots up. Pune is also poised to be the next KPO hub of India.
There is a dire need for improvement of conditions of Now just wait till that happens in Pune.
roads. Power situation is another area requiring ” ” ”
JULY 2006 2 ICSI - WIRC Pune Chapter Newsletter
Secretary 2... eSecretary - a real time transformation
Makarand Lele, Partner MRM Associates, Company Secretaries

Introduction: Tax Act, DGFT and fully under the Companies Act.
Indian corporate world on 18th In near future, we may witness more departments
February 2006 entered into a new like Excise, Sales tax coming under electronic filing.
era of e-governance. On this day Digital signatures :
Ministry of Company Affairs has Section 5 provides the recognitions to digital
launched its MCA21 programme in signatures. Digital signature is the identity of a
Coimbatore. person in eworld.
MCA21 is probably the first e-governance Digital signature is process whereby sender
programme of any ministry having largest authenticates the document by putting his digital
stakeholders and reaching to almost all corners of signature. He also protects the document by
India. `Tsunami' has hit all the shores of Indian encoding it and the receiver who is having the Public
corporate world. Key supplied by the sender, decrypts the documents
Company Secretary profession is the most and read the same.
concerned profession of this e-governance Digital signature is not a signature or impression or
programme. Company Secretaries are expected to mark. It is a unique pair of key provided by the
play a greater role in this process. They need to certifying authority. No person other than the
involve themselves in training, implementation, originator can use the said pair of keys. In easy
certification and facilitation processes of MCA21. terms, application of private key is known as affixing
Company Secretaries needs to be IT savvy to a digital signature to the document or form. Digital
remain in the competition. Profession is now more signature protects the document from tampering
demanding and needs adoption of techno legal and gives the authenticity, integrity and attribution
approach. MCA21 process has opened up new to the document and also gives extreme speed to the
avenues for the professionals. They may be in the transaction. Non-repudiation is the important
form of providing training, doing processing, feature of digital signature, which does not allow the
implementation, certification, to act as facilitator originator to disown the data or document.
and single service point. Any new opportunity does Now with the help of such recognition of digital
have the inherent risk attached to it. signature, any person can sign the document or
The provisions of the Information Technology (IT) form without taking print out of it and at any time
Act govern use of technology in the business and at any place. Boundaries are not the barriers
process. IT Act prescribes, regulates, monitor the now. Postal department or documents transport
technical process embedded in any business. system is not a hurdle now.
Therefore understanding the IT laws of India is a IT Act has established the offices of Certification
must for any processional, who is consulting or Authorities to enroll, validate issue, publish, revoke
helping businesses to grow. Understanding the or suspend the digital signatures. The set of rules
potential exposure to risk out of use of technology is were prescribed under the Act for Certification
become a first priority of the professional. It is Authorities.
therefore very vital for all of us to understand Section 35 prescribes the process of getting the
important concepts and impacts of Information digital signature. Verification of identity of the
Technology Act 2000. applicant for digital signature is the important step
Preamble : to be carried out by the Certification Authorities.
Information Technology Act 2000 came into Section 73 provides for imprisonment and penalty
existence on 17th October 2000 to provide legal for publishing digital signature certificates false in
recognitions to electronic transactions, electronic certain particulars.
communication, electronic data interchange, digital Secure Digital Signature :
signatures, e-governance, electronic records and to Section 15 prescribes the secure digital signature. It
regulate cyber crimes. is possible by application of security procedure to
One of the basic objectives of this Act is to facilitate verify that;
electronic filing of documents with the government (a) the digital signature affixed is unique to the
authorities. This is the basis for introduction of subscriber;
electronic filing system partially under the Income (b) it is capable of identifying the subscriber;

ICSI - WIRC Pune Chapter Newsletter 3 JULY 2006


(c) it is created in a manner or using means under Section 7 provides for the compliance of following
the exclusive control of the subscriber and is link conditions to maintain the records in electronic
to electronic record and would be invalidated form.
upon alteration of such record. (a) the information contained therein remains
then such digital signature shall be deemed to be a accessible for a subsequent reference;
secure digital signature. (b) the electronic record is retained in the format in
It therefore mandatory that in each electronic which it was originally generated, sent or
transaction we use only the secure digital signature. received or which can be demonstrated to
It is essential to apply, enroll, process and download represent accurately the information originally
digital signature from own computer to qualify it as generated, sent or received;
a secure digital signature. (c) the details which will facilitate the identification
After downloading the protection of digital signature of the origin, destination, date and time of
is very important to avoid misuse of it. Because of dispatch or receipt of such electronic record are
non-repudiation, it will be very difficult for the available in the electronic record:
originator to prove that he has not used the digital Security of electronic record is the important aspect.
signature. Immediate communication to the Section 14 prescribes that; where any security
Registration Authority upon loss of digital signature procedure has been applied to an electronic record
token is very essential. at a specific point of time, then such record shall be
The Central Government has the power to make deemed to be a secure electronic record from such
rules in respect of digital signatures i.e. to prescribe point of time to the time of verification.
the type of signature, manner and format of Secured Electronic Process :
affixation, manner and procedure for identification MCA21 is a secured electronic process for
of affixing digital signature, control and security complying the provision under the Companies Act,
process, any other matter to give legal effect to 1956 and rules made there under.
digital signature. Therefore, we observe different
The system has been developed under the
types and forms and methods of digital signatures
provisions of section 6, which provides for electronic
for different purposes.
filing of forms and applications, issue and grant of
Electronic Record : licenses, sanctions and approvals and issue of
Section 3 provides legal recognition to electronic receipt or payment of money. This section further
records by way of affixing the digital signature. provides that provisions of any law will be treated as
“Electronic Record” means data, record or data complied if such filing, issue, grant of license,
generated, image or sound stored, received or sent sanction or approval and issue of receipt or payment
in an electronic form or microfilm or computer of money is effected in electronic form.
generated microfiche; Thus the MCA21 process has got the legality even
Company secretary can now make revolutionary before amending the provisions of Companies Act.
changes in his traditional function of maintenance Retention of Electronic Record :
of records. MCA21 process has created a database and
Section 4 provides legal recognition to electronic repository to maintain the entire registry records at
records. Records prescribed under any act or statue one place. The information stored in it is a record as
can be maintained in the electronic form. per provisions of the Companies Act.
Where any law provides that information or any Section 7 grants the legal recognitions to electronic
other matter shall be in writing or in the typewritten records to be maintained under the provisions of
or printed form, then, notwithstanding anything any act. The essential conditions to be satisfied are
contained in such law, such requirement shall be (a) the information contained therein is accessible
deemed to have been satisfied if such information or and usable for subsequent references;
matter is
(b) the originality of the electronic record is
(a) rendered /made available in an electronic form; maintained;
(b) accessible so as to be usable for a subsequent (c) the details of which will facilitate the
reference. identification of the origin, destination, date and
Section 4 has the overriding effect on provisions of time of dispatch or receipt.
any other law requiring maintenance of records and Attribution of Electronic Record :
documents. Therefore all secretarial records and
Attribution to any electronic record is the essence of
statutory registers can be maintained in electronic
any valid legal transaction. Electronic record should
form after complying with the specified norms.
JULY 2006 4 ICSI - WIRC Pune Chapter Newsletter
be attributed to originator. (a) accesses such computer or system or network;
Section 11 provides that attribution of electronic (b) download/copy/extract any data or information;
record to originator is possible only if it was sent by (c) introduce or causes the introduction of the virus;
the originator himself or by the person authorised (d) damage or cause damages ;
by the originator or by the system programmed by or
(e) disrupts or causes disruption ;
on behalf of the originator.
(f) denies or causes denial of access to any person
Therefore MCA21 process requires the signer of the
authorized to access;
form to attribute that he has been authorised to sign
(g) provide assistance to any person to facilitate
the eform. It is also essential to use the originator's
access ;
or authorised person's system and login for
submission of electronic record or document. (h) charges the services availed by any person to the
account of another by tampering or manipu-
Automated replies generated by the system will
lating shall be liable to pay damages by way of
qualify for attribution, if they are generated from the
compensation not exceeding one crore rupees to
system programmed by the originator. Therefore all
the person affected.
the electronic unsigned communications received
from the MCA are valid communications. Acknow- Section 44 provides for the penalty for failure to
ledgement of receipt of electronic record is provided furnish information, returns, documents, main-
under section 12 of the IT Act. tenance of documents & books under the Act.
License software : Section 45 is a residuary section provides for
compensation not exceeding twenty five thousand
Use of technology has triggered off the issue of IPR
rupees or a penalty not exceeding twenty five
protection and use of license software. We need to
thousand rupees.
respect the IP rights of others and need to use only
license software. We do not know who is watching Offences :
us on the net and collecting our system information The Act further lists down various types of offences
and checking whether we are using the licensed such as hacking, tampering, accessing to protected
software. If we wish to be a facilitator or Certified systems etc.
Filing Center for MCA21 then first priority is to have Amendments made in other acts :
the license software. IT Act, for smooth implementation and functioning
Electronic payments : made amendments to I.P.C., Indian Evidence Act,
Electronic payment by using the credit card/ debit Bankers Books Evidence Act and R.B.I. Act.
cards or through Internet banking facility is Rules notified under the Act :
inherent part of any electronic transaction. We need The Information Technology (Certifying Authorities)
to be extremely careful while using the electronic Rules, 2000.
payment facilities. We need to all the time protect The Cyber Regulation Appellate Tribunal
our money. Utmost care is therefore essential. Avoid (Procedure) Rules, 2000.
giving your credit card or its number to anybody.
Further Developments :
The owner should only make use of credit card.
With an objective to review the Information
Certification of eforms :
Technology Act, 2000, in the light of the latest
Certification of eforms to be done very carefully. You developments and to consider the feedback received
need to affix your digital signature as a part of your for removal of certain deficiencies in the Act, Hon'ble
certification. Protect your signature all the time Minister for Communications and Information
from misuse. Keep propose backups of the eforms Technology set-up an Expert Committee under the
and documents that you certify. Chairmanship of Shri Brijesh Kumar to review the
Penalties and Offences : present Information Technology Act and to suggest
IT Act has prescribed heavy penalties for various amendments. The committee has submitted its
wrong actions, which a person unknowingly recommendations in the month of August 2005.
commits in his daily interaction with the computers, These recommendations are under consideration of
use of Internet, visit to web sites. It is very essential the government.
to understand following sections of the IT Act. Peaceful and real time transformation of Secretary
Section 43: Penalty for damage to computer, to eSecretary is possible only by observing rules of
computer systems etc. the game and following the IT Act prudently.
Any person without permission of the owner or
incharge of the computer/computer system/ ” ” ”
network
ICSI - WIRC Pune Chapter Newsletter 5 JULY 2006
Knowledge Process Outsourcing : a brief overview
Anand Arvind Wadadekar , Student Company Secretary

KPO Potential: Who is needed in the KPO Industry?


A CII Report estimates the potential From Graduates and Post Graduates in Arts,
size of KPO Industry at $17 billion Science, Commerce to C.A., C.S., Lawyers,
by 2010, creationg 2,50,000 jobs in Management graduates. Those who do not have
5 years. Analysts estimate that MBA can build a career here.
about 30,000-50,000 people are Ambitious, smart, articulate people who can write
currently employed in this well and communicate well, is what this industry
industry. needs.
Difference between KPO and BPO: Liberalization, Globalization, etc. provides
BPO is about shifting functions that can be digitized professionals with exposure to the systems
to an offshore location, while KPO is offering work prevalent in a variety of countries and they will be in
that is higher skilled and decision based. In KPO, a demand.
professional would need to apply skills and Pay Packages:
judgement to interpret data rather than just apply Rs. 2-3 Lakhs p.a for Entry Level Recruits and upto
rules. Rs.8-9 Lakhs p.a. for Senior Level Management.
Scope of KPO Industry: Companies offering exposure in the KPO Industry:
Preparation of Accounts, Tax Returns, Architecture, OfficeTiger, Genpact India, JP Morgan, Merill
Computer aided simulation, Engineering Design Lynch, McKinsey, Adventity, Schwegman,
and Development, Financial Services, Risk Lundberg, Woessner & Kluth, Pangea3,
Management and Equity Research, Financial Data Hildebrandt, Geometric, QuEST, Atrenta, WHS
Mining and Modeling, Corporate and Market Global, Mphasis, MsourcE, Copal Partners, Pipal
Research, R&D in Pharmaceuticals, Biotechnology Research, Evalueserve, AC Nielsen, Irevna, Exevo
and Healthcare, Medical Diagnosis, Education, IPR India, Annik Systems, GE Analytics, Epitome Global
Research, Legal Support, Animation and Graphics, Services, iGate Global Solutions, Symphony
Writing and Content Development, HR Services, OnionPro, DecisionCraft Analytics, EXL,
Outsourcing, Supply Chain Management. Scandent, marketRx.
Working Areas in each KPO field of our Interest: (List is indicative)
1. Financial Research: ” ” ”
a) Analytical Support Pitch Books/Company
Profiles, Presentation Services, Financial
Analysis and Valuation. Appeals
b) Equity Research- Financial Models, Forecasts
and Updates, Report Preparation / Authoring, Members are requested to :
Earnings Calls/Q&A. 1. contribute articles, charts, checklists etc. to
c) Corporate Finance Statistical Modeling, MIS
Reporting, Credit Analysis. Sanhita. (email to vragarwalcs@gmail.com ).
d) Asset Management, Financial Modeling, Fund 2. communicate their academic / professional/
Accounting, Performance Reporting.
elevation achievement to Pune Chapter
2. Legal Outsourcing:
Office operations, Litigation support, Word (email to icsipune@vsnl.com).
Processing & Secretarial, Information Systems, 3. give their valuable suggestions / comments
Marketing, Legal Research, Finance and
Accounting, Library, Legal Recruiting, HR, on the make over of Sanhita for our section
Patent & Trademark Prosecution. “Bouquets and Brickbats”
3. Market Research:
Survey Designing, Primary Data collection,
(email to icsipune@vsnl.com).
Analysis, Strategic Planning, Sales Planning, 4. participate in various programmes of
Business Development, Business Research,
Insight Generation & Presentation. the Chapter.

JULY 2006 6 ICSI - WIRC Pune Chapter Newsletter


Stock Options to Non-Resident
employees of Listed companies
Ninad Umranikar , Company Secretary, Kale Consultants Ltd.

Grant of stock options by listed b) face value of the shares to be allotted under
companies is regulated by the scheme to the non-resident employees
Securities and Exchange Board of does not exceed 5% of the paid-up capital of
India (SEBI) through SEBI the issuing company.
(Employee Stock Option Scheme 2) The Trust (where the options / shares are issued
and Employee Stock Purchase through the trust route) and the issuing
Scheme) Guidelines, 1999 (“the company shall ensure that value of shares held
Guidelines”). by persons resident outside India under the
Eligibility : scheme does not exceed the limit specified in
Stock options can be granted to: clause (b) of sub-regulation (1).
i) a permanent employee of the company working 3) The issuing company shall furnish to the RBI,
in India or out of India, within thirty days from the date of issue of shares
ii) a director of the company, whether a whole time under the scheme, a report giving the following
director or not; or particulars/documents -
iii) an employee as defined in sub-clauses (a) or (b) of i) names of persons to whom shares are issued
a subsidiary, in India or out of India, or of a under the scheme and number of shares
holding company of the company irrespective of issued to each of them;
his nationality / country of origin. ii) a certificate from the Company Secretary of
As such, a foreign national who is a permanent the issuing company that the value of shares
employee / director of the company or its subsidiary issued under the scheme does not exceed 5%
or holding company can be granted stock options of the paid up capital of the issuing company
under the Guidelines. and that the shares are issued in compliance
with the regulations issued by the SEBI in this
Special Resolution under certain circumstances:
behalf.
According to the Guidelines approval of share-
In addition to the documents to be furnished under
holders by way of separate resolution in the general
(3) above, the issuing company shall submit Form
meeting shall be obtained by the company in case of:
FC-GPR to the RBI within a period of one month
a) grant of option to employees of subsidiary or from the date of allotment.
holding company and,
If a company proposes to allot shares in excess of 5%
b) grant of option to identified employees, during of its paid up capital (before allotment) to a Non-
any one year, equal to or exceeding 1% of the resident / Foreign National, it shall make an
issued capital (excluding outstanding warrants application to the RBI for obtaining specific
and conversions) of the company at the time of permission. There is no prescribed format for
grant of option. making this application.
FEMA Regulations : Opening of Demat account
Regulation 8 of Foreign Exchange Management There is no restriction on a NRI / Foreign National as
(Transfer or issue of Security by a Person Resident regards opening of a demat account.
outside India) Regulations, 2000 provides for issue
Remittance of Funds
of shares under Employees Stock Options Scheme
to persons resident outside India. Accordingly; The non-resident / foreign national shall be
required to remit funds from abroad via wire
1) an Indian company may issue shares under the
transfer to the bank account of the company
ESOS or by whatever name called, to its
towards purchase of ESOP shares. NRI may also
employees or employees of its joint venture or
contribute towards shares from his NRE Account.
wholly owned subsidiary who are resident
outside India, directly or through a Trust:- Restriction on sale of shares
Provided that There is no lock in period after allotment of shares as
the Guidelines provide for one year vesting period
a) the scheme has been drawn in terms of
(See Page No. 10)
regulations issued under SEBI Act, 1992 and

ICSI - WIRC Pune Chapter Newsletter 7 JULY 2006


Duty free import of equipments by STPI unit
Rashmi Limaye , Company Secretary, Great Software Laboratories Pvt. Ltd.

One of the many advantages given required to be supported by a valid Surety/


to a 100% EOU and STPI unit is security like a bank guarantee to the extent of 5%
that it is allowed to import of the Bond amount.
equipment without paying import l The importer is required to maintain a proper
duty to the Customs authorities. account of the import & export consumption and
The motive of the Government utilisation of all imported/locally procured
being clear “Promotion of Exports materials and submit them periodically to the
to boost the Economy ”. Development Commissioner/ Customs.
Various schemes have been devised to import l The STPI unit should be a Positive Exchange
inputs free from duty or to grant refund of the earner
import duty paid. In some schemes, the unit has to l The importer is required to abide by the terms
be isolated from domestic production units, while in and conditions of the Letter of Permission/Letter
some schemes, the units producing goods for of Intent /Industrial Licence issued to the unit.
domestic production are also entitled to import The Import Procedure can be briefly divided in 3
inputs without paying import duty. stages follows:
The benefit is undoubtedly tremendous however it
also requires careful compliance of some legal Import
provisions. The import procedure is a challenging procedure
task which apart from compliance of law requires
co-ordination with various agencies such as the
I. II. III.
authorized dealers nominated by the RBI, clearing Post-shipment
Pre-shipment Clearance of procedures and
house agents, octroi & transport authorities, STPI Co- ordination shipment Re-warehousing
and Customs authorities.
The aim of this article is to outline the legal
A. Obtaining B. Submission C. Final transport
provisions in brief and highlight the practical permissions of documents and octroi
aspects of importing equipment under the and document to the nominated payment for the
from STPI and clearing agent equipment imported
EOU/STP scheme. Customs
General conditions in accordance with the
EXIM/Foreign Trade Policy for duty free import: Stage I] Pre-shipment co-ordination:
l The goods are required to be imported into the It involves co-ordination and communication
EOU/STP unit's premises directly. between the exporting party and the importing
l The unit is required to get their premises party. The importing has to decide the basis The
customs bonded. The unit is also required to basis of import is very important to determine the
execute a B-17 bond with surety/ security with extent of outflow of foreign exchange. An import can
jurisdictional Customs/ Central Excise officers be made on the following basis:
and obtain a licence under section 58 of the i) Purchase basis : This involves import of the
Customs Act, 1962. desired equipment from a foreign market and
The B-17 Bond is a surety bond taken to cover involves outflow of foreign exchange through the
almost all the activities of the unit such as normal banking channels
transhipment of import/export goods between ii) Loan basis : Whenever equipment is imported on
port of import/export and units premises, duty loan basis for some R & D work without outflow of
free import/procurement from the indigenous any foreign exchange with a condition to return
sources as per relevant notification and the equipment on completion of work.
warehousing/storage in the unit, movement of STP units may import all required Capital Goods for
duty free goods for job work and return etc. The creating STP infrastructure. Unless otherwise
Bond amount is equal to 25% of the duty prohibited, STP units are allowed to import
foregone of the capital goods required and is equipment on Outright Purchase or on Loan or Free
JULY 2006 8 ICSI - WIRC Pune Chapter Newsletter
of Cost or Lease basis. Duty Free import of The following documents have to be produced by
equipment is permitted based on the import an STPI unit and a 100% EOU to its clearing
certificate and original attested shipping invoice agent unit at this stage:
granted by STPI. STP units are required to ensure l Import certificate which is a simple one-page
that they operate within the imported capital goods certificate is issued by the STPI for import of
(CG) limit as indicated in the approval letter for equipment against the application made and
setting up STPI unit. commercial invoice submitted to the STPI.
The equipment/goods proposed to be shipped have l Commercial Invoice sent by the exporting
to be packed strictly according to the Customs party and attested by STPI is the shipping
requirements. The package to be shipped must invoice against which the equipment is
fulfill the following conditions: imported and is generated only for Customs
i) Equipment should be packed and sealed well so Purpose.
as to preserve and safeguard its contents. Commercial invoice submitted to the STPI must
ii) Equipment should be accompanied by an invoice contain the following details such as Date and
that declares its value for Customs purpose. invoice number, Name of the exporter &
iii) It should clearly mention the addresses of the importer, Description and number of goods being
exporter as well the importer. imported, Weight and value of the equipment,
iv) The package must mention the contents and the Signature of the authorized signatory of the
gross weight of the equipment/package. exporting party and If the equipment is imported
The shipping agents of the exporter co-ordinates the on Loan or Free of cost the invoice should clearly
shipping of the equipment, and simultaneously the state: "Material is sent on Loan or Free of Cost
documents required by the Importing party's basis and the value is for custom purpose only".
clearing agents for clearing the shipment duty free Once the documents are found in order, the
from the Customs Authorities . Import certificate together with the attested
Stage II] Clearance of the shipment: Commercial invoice is issued by the STPI to the
This is the lengthiest stage in the process of import : unit concerned.
A. This stage basically involves obtaining sanctions l Procurement certificate from the Customs
from various statutory authorities and Authorities. The STP unit is required to obtain
submitting documents to the Customs a procurement certificate from the Customs
Authorities. STP units are placed in a special authorities on the basis of the import
category and are eligible for fast track clearance certificate and attested commercial invoice
through the Customs. Clearance of import issued by STPI.
consignments is allowed at the gateway port/ Following documents are required for obtaining a
Aircargo Complexes on the strength of the import procurement certificate from the office of the
certificate issued by STPI and the procurement Customs range in whose jurisdiction the STP
certificate issued by the customs authorities of Unit falls:.
the concerned range office within whose i) Simple application addressed to the
jurisdiction the unit falls. Superintendent of Central Excise and
When the shipment arrives at the port of entry, Customs of the jurisdiction within which the
the Clearing agents generate a “Cargo Arrival concerned STP unit falls.
Notice” which is accompanied by the airway bill ii) Certified true copy of the Import certificate.
or the shipping bill. The importer is informed iii) Certified true copy of the commercial invoice
about the arrival of cargo and is requested to attested by STPI.
produce the necessary documents required to iv) Procurement certificate in the prescribed
clear the shipment duty free through the format
Customs. Once the documents are found to be in order, the
It is important to clear the shipment in minimum Customs office issues a Procurement certificate.
possible time to avoid payment of demurrage B. Submission of documents to the Clearing agents:
charges or any damage to the equipment being Once the documents mentioned above are
imported. received from the STPI and Customs, the

ICSI - WIRC Pune Chapter Newsletter 9 JULY 2006


following documents have to be submitted to the address.
clearing agents by the importing unit in a sealed Once the particulars are filled in they are checked
envelope issued by the Customs office for correctness and counter signed by the Customs
i) Photocopy of the Airway bill. Inspector. The STPI unit has to obtain a Re-
ii) Photocopy of IEC certificate issued by DGFT. warehousing certificate for re-warehousing and
iii) Original Import certificate issued by STPI, maintaining the imported equipment in the
iv) Original Commercial invoice attested by STPI. company's bonded warehouse within a period of 90
v) Original procurement certificate issued by the days.
Superintendent of Central Excise and The application for re-warehousing certificate has to
Customs be made to the Customs range concerned along with
vi) 5 blank letter heads of the Company the Re-warehousing certificate in the prescribed
vii)Duly signed Form “N” (This is available with format, Bill of entry, Lorry receipt, and the Octroi
the clearing agent concerned) receipt,
viii)Octroi Exemption certificate incase the unit On receipt of the re-warehousing certificate, the
has been exempt from payment of Octroi by following documents need to be submitted to the
the Municipal corporation. Clearing agents in a sealed envelop stamped by the
C. Once all the documents are submitted to the Customs authorities to complete the import
clearing agents, they undertake the clearance formalities:
formalities and arrange for transportation of the 1. Original re-warehousing certificate issued by the
equipment to the importers unit. Customs.
Stage III] Post shipment procedures and 2. Original Bill of entry counter signed by the
Re-warehousing: Customs inspector
Once the equipment is transported to the importers The documents mentioned above have to be
office, it has to kept within the Custom bonded submitted through the Clearing agents to the office
premises of the importer. The imported equipment of the Assistant Commissioner of the relevant Port of
can only be opened in the presence of a Customs Entry. The Re-warehousing certificate is cancelled
Inspector. The Customs Inspector checks the Bill of and stamped by the Customs authorities as full and
Entry generated for the equipment and all the final endorsement of completion of the import
relevant papers before authorizing opening the related formalities.
equipment. Once the equipment is opened, he signs Conclusion:
on bill of entry and checks the entries made in the The procedure though a little lengthy and tedious is
Customs bond Register a blessing for STP units as they can use the benefit
On every duty free import made, the importing unit provided under the scheme for import of crucial
has to maintain the details in a physical register. equipment necessary for Software and Product
such as Bond number and date, Date of receipt of development absolutely duty free which in turn
goods in the warehouse, Vessel name with IGM and boosts the export of the country and also aids in
Index No., No. of packages, Marks/number, undertaking crucial R & D work by Software Product
Description and value of goods (as per the Bill of and Development companies.
entry), Amount and Rate of duty, Bonders name and ” ” ”
(Contd. from Page No. 7)
(which can be construed as lock-in) from the date of 1. ESOP letter.
grant of options for conversion into shares. 2. Certificate from Chartered Accountant to the
However, shares issued under ESPS shall be locked effect that capital gains tax has been paid.
in for a period of one year from the date of allotment. 3. Swift Code of the bank where the funds are to be
Documents required for remittance of funds to remitted through wire transfer.
the bank account of Non-resident / Foreign 4. Instruction from Non-resident / Foreign National
National on sale of share: to credit the amount to his bank account.
Following documents shall be provided by the Non- Once these documents are provided to the broker,
Resident / Foreign National to the broker for funds would be remitted abroad.
remittance of funds to his bank account: ” ” ”
JULY 2006 10 ICSI - WIRC Pune Chapter Newsletter
Drafting and Negotiating Outsourcing Contracts
Sonal Sharma , Legal Officer, Persistent Systems Private Limited

Contracts are the medium through Indemnity:


which the parties define the scope The customer will try to negotiate and make us
of work, their roles and indemnify for any damages that they will suffer due
responsibilities and the commer- to our acts and omissions. We are a service provider
cial terms. Before drafting any and our liability should ideally expire after the
contract we need to know comp- deliverables are accepted by the customer but this
letely the business our company is into. We should may not sell and we may have to indemnify the
coordinate with our technical team to understand customer for our acts of gross negligence or willful
the type of work that we would be offering under a misconduct. The customer will require us to
contract. Draft a contract which takes care of any of indemnify for any intellectual property infringement
our future work possibility with the customer. If we or gross negligence or willful misconduct. Provide
are drafting contract for a specific customer then carve out to intellectual property infringement and
read the terms of the Request for Proposal (RFP) should be only related to the deliverables and have
responded to that customer to reduce the number of not resulted due to any modifications to the
iterations for negotiations. Get involved at an early deliverables. The term gross negligence or willful
stage while the commercial or technical details are misconduct is too broad and should be only limited
being discussed. We should always push for our to death or personal injury or property damage.
draft as we have complete control over the clauses Key concerns of Service Provider:
being stated in the draft and it helps in negotiating Scope of work and payments:
the contract and reduces the number of iterations. Define the scope of work in the statement of work.
We should include our draft along with our Introduce a concept of changes order to take care of
response to RFP so that the customer becomes any changes to the scope of work, the service
aware of our contract terms. provider should have a right to change the
The customer key concern in an IT contract is IP commercials terms accordingly. Define the Service
and confidentiality. level (SLA) in terms of providing services to the
customer. Define the payment terms. Do not link
Intellectual Property (IP):
the payment terms with the acceptance of
We need to write our clauses which states that the deliverables under time and material contract. In a
work done for the customer is “work for hire” and fixed price contract we may define the payment
the deliverables belong exclusively to the customer. milestone in line with the deliverables milestone.
We need to state clearly that the deliverables will be Provide an expiry date to the rates provided in the
assigned only if the payment obligations by the contracts. We should keep a provision of charging
customer's are met. Define our pre-existing interest if the customer delays in making the
intellectual property used in the project. As a service payments.
provider, we should retain a complete ownership on The contract shall also list down in detail what
our pre-existing IP and the customer acquires a hardware and software will be provided by us to
perpetual right to use the pre-existing IP only in execute the work. If the customer requires any
connection with the deliverables. We should have a additional hardware and software, the contract
right to use the residual knowledge in any of our shall clearly provided that it will be at additional
other customer's project or for our internal cost to customer. We should always discuss the
development purpose. commercial issues with the technical team to
Confidentiality: understand the type of additional cost that may be
This clause will obligate us to maintain the passed on us while providing services and we should
confidentiality of the information that we acquire provide some provision in the contract to take these
during the term of the Agreement. As a service issues later as and when it will come up.
provider we should always provide a definite term Approval of deliverables:
for the survival of confidentiality obligations so that Define the approval period within which the
we know when our liabilities under a contract will customer should provide its conformity for the
end. deliverables. If the customer fails in providing its
ICSI - WIRC Pune Chapter Newsletter 11 JULY 2006
non-conformity then the deliverables should be accepted by the customer. They propose their
deemed to be accepted by the customers. The own draft. It is necessary for the negotiation team
contract provides for improvement, modification not to be too rigid. There were times, when certain
etc. of the deliverables during the time the customer clauses of the customer were not negotiable but now
is evaluating the deliverables. the scenario is changing as the service providers are
Liability: becoming aware of the impact of such one-sided
Restrict contractual liability to maintain clauses on their business. While accepting such
equilibrium between the risk and reward ratio. We clauses, it is necessary for the negotiation team to
should indemnify the customer only for the direct have a future foresight about how the existing
damages and disclaim any third party, indirect, clauses in the contract will govern the relationship
consequential and incidental damages. Limit between the parties. In today's competitive world,
liability to a particular value it should be either the negotiating the contract is becoming more and more
value of the contract or the company's insurance difficult and challenging task. It is also necessary
coverage. that in the changing business scenario, we continue
Resources: to update our contract template. We cannot put
Provide restrictions in the contract so that the forward the contract template, which has no
customer is not free to solicit the service provider's business significance at present and we might be
employees. forced to accept our customer's template, but if the
No compete: contract template is in line with the current
The customer may try to impose certain conditions business practices, the chances of such draft being
which may restrict us in doing business with any accepted increases.
third party. Avoid having such clauses in contract.
Termination Rights:
” ” ”
The Service Provider should have the termination
rights under the contract. The contract should
define the obligations of both the parties upon
termination.
WANTED
Jurisdiction:
Ensure that the jurisdiction agreed in the contract
COMPANY SECRETARY
support the terms and conditions of the contract. The candidate should have relevant
We should always push for the jurisdiction of the
experience of handling secretarial and
countries where our company has some local
presence. Litigation may not be a preferred mode to legal matters of the company. Interested
settle the dispute then provide an alternative for candidates may forward their resume to :
arbitration. Define the process, mode and the venue
for arbitration.
Mr. Kailash Nair
Manager Finance
Tips for Negotiation:
Read the clauses well. Prepare a separate list of KAESER COMPRESSORS
issues it will help in concentrating only on the (INDIA) PVT. LTD.
contentious issues in the contract. Make the Survey No. 255/1, Hinjewadi Gaon,
technical team aware of the legal issues brief them Tal. Mulshi, Pune 411 057.
the concerns related to the issues. We should also
do some due diligence on the customer to have an Tel. : + 91 20 22934610/616
idea about the type of business the customer is into.
Keep alternatives ready to propose during the time Fax : +91 20 22934648
of negotiations, this will help in early closure of Email : info.india@kaeser.com
issues.
It is not necessary that the draft proposed by us will Websit : www.kaeser.com

JULY 2006 12 ICSI - WIRC Pune Chapter Newsletter


Information Systems Audit
Uday V Kulkarni , F.C.A., CIA (USA) CISA(USA)
Abhijit V Chirputkar , M.Com, F.C.A., CISA. (USA)

'Information' plays meet business objectives. The Audit of


key role in the Computerised Information System & Audit through
business world Computerised Information System are two different
today. Almost all concepts. In this article our focus is on audit of
types of decisions Information & Communication system.
in business Objectives of IS audit :
environment are
taken on the basis Audit is process of colleting and evaluating
of reports/information generated through evidences to authenticate and validate the data
'Management Information Systems'. Information processing system. The objective of IS audit
Technology has integrated computers and includes;
communications, which help users to take a) To provide reasonable assurance about
appropriate decisions in time. management of IT risks;
The organisations have changed its business b) To provides reasonable assurance about
processes. This requires information to be current, existence of different types of controls including
accurate and be made available to users as & when internal controls (eg: in computer programs) and
required. Information is also collected from various recommending improvement in internal and
departments of the organisation for decision- other controls;
making, legal compliance & for communication to c) Evaluation of systems and processes to ensure;
various stakeholders e.g: shareholders. The i) Safeguarding of assets ( IS assets)
generation of information is dependent on computer ii) Data integrity
system, which is now a days well described as
Information Systems. The system involves people, iii) System efficiency and effectiveness
software, hardware, communication devices, d) To ensure law compliance (RBI has recognised IS
networking & the most important data. audits in banks)
In the era of globalization and acute competition, Need of Information System Audit:
most of the organizations have implemented a) Now a days all types of transactions are entered
Information Technology (IT). It has resulted into through computer systems. As transactions
carrying lot of IT related risks, problems of internal entered the system, these are automatically
controls as well as security of IT resources. This has processed for recording, reporting or as input to
necessitated review of and assurance to the top next set of transactions. These processes are
management about its Information Systems. Like carried out by programs creating a problem of
other audit and assurance services, IS audit 'audit trail'. The accuracy, speed & flow of
provides an assurance to top management that IT process largely depend on quality of software
related controls, security and other measures, are implemented. Software development includes
in place and adequate. It is worthwhile to note that process of testing however Software audit is one
few traditional controls like segregation of duties of the processes or part of testing. To ensure the
play pivotal role even in IS audit. quality of software & implementation
Information Systems Audit : (customization) Information System audit is
IS audit is an independent appraisal of activities necessary. Computer programs should ensure
related to Computer Systems by team of that all transactions are processed correctly.
professionals. IS auditor reports audit findings b) Security of Information System is on the top
accompanied with recommendations. The agenda in all the organizations. Security of
organisation should ensure proper internal control. people, data, networking, hardware, software is
IS Auditor reviews the same and recommends on most important. In absence of security
any deficiencies in the control system. IS audit measures, organization may collapse. It has led
assures management that controls embedded in the to introduction of various international
computer systems and related operations are standards. (e.g. BS7799/ISO17799 are available
proper and adequate. IS audit is an independent for Information Security). As a part of IS audit,
appraisal of Information System which ensures that auditor ensures adherence to various security
Internal controls are effective and efficient to norms mentioned therein.
provide up to date, accurate, relevant information to c) The accuracy of annual financial reporting as
(See Page No. 16)

ICSI - WIRC Pune Chapter Newsletter 13 JULY 2006


Cyber Crimes
Adv. Rahul Risbud , B. Com, LL.B. M.LL. & L.W., Dipl. In Cyber Laws
In 21st Century the nature of l A student of the Air Force Balbharati School,
offences started taking a different New Delhi was teased by schoolmates for
way and specie of sophisticated having pockmarked face. Annoyed with this,
offenders took birth, which started he decided to take revenge and he hosted a
committing offences using Hi-tech website at the URL www.amazing-
technology. The old Indian Penal gents.8m.net and provided in text material
Code for the first time expressed its lucid, explicit, sexual details of various sexy
inabilities to handle such offences committed girls from the school and the school teachers.
through Internet and with the help of tools of The father of the girl being an Air Force officer
Information Technology, and therefore in the year registered a case under Section 67 of the IT
2000 Indian Government felt necessity to have a Act, 2000. The police arrested the concerned
special Act, to deal with such type of offences/ student.
crimes and therefore Information Technology Act l Sale of illegal articles : The sale of narcotics,
2000 was passed. weapons and wildlife etc. by posting
Now let us see the offences (cyber crimes) committed information on website, would fall under this
through computer, computer systems, Internet etc. offence. E.g. many of the auction sites even in
l The first reported cyber crime is of the year 1820. India are believed to be selling cocaine in the
One Mr. Jacquard from France, a textile name of 'honey'.
manufacturer produced the loom. With the help l Online gambling: Many websites worldwide
of this device repetition of series of steps in the are dedicated to gambling. Infact it is believed
weaving of special fabric were increased, and this that many of these websites are actually
created a fear amongst Jacquad's employees that fronts for money laundering.
their traditional employment and livelihood is l Intellectual property crimes : These include
threatened. Therefore they committed act of software piracy, copyright infringement,
sabotage to discourage Jacquard from using trademarks violations, theft of computer source
technology. code etc. One M/s Network Solutions have
l Financial Crimes: registered domain names such as
l Misappropriation of Funds : Punjab National barticellular.com and bhartimobile.com with
Bank was cheated to the tune of Rs. 1.39 different fictitious names. Bharati Cellular Ltd.
Crores through false debit and credits in had filed a case in Delhi High Court against M/s
computerised accounts. Network Solutions for cyber squatting, and the
l The Hyderabad police had arrested two High Court has directed M/s Network Solutions
persons. Manohar was an unemployed not to transfer the domain name in question to
computer engineer and Moses was a steward any third party and the matter is sub-judice.
in a five star hotel in the city. Moses used to l Email Spoofing : When an email appears to be
note down various details of credit cards generated from one source but is actually
handed over by clients of the hotel for paying generated from another source, it is called as
their meal bills. Then he used to pass on the spoofed email. In Global Trust Bank case, some
said information to Manohar, and then body send a spoofed email to the customers of the
Manohar used the details to make online bank, stating that the bank is in bad financial
purchases on various websites such as condition, as a result numerous customers
sify.com, rediff.com etc. On the complaint of a decided to withdraw all their money and close
businessman, who handed over his credit their accounts. The email which seems to be
card to Moses for payment of dinner bill the originated from one source but is actually
case was investigated and both were arrested originated from other source is known as spoofed
l Cyber pornography : Pornographic websites, email.
pornographic magazines produced using l Forgery : Counterfeit currency notes, postage
computers, pornographic downloads using and revenue stamps, mark sheets etc. can be
Internet is included in this offence. forged using sophisticated computers, printers

JULY 2006 14 ICSI - WIRC Pune Chapter Newsletter


and scanners. Whenever news flashes in all the accounts in the bank and put them into
newspaper that Mr. X arrested for selling fake the account of the person whose name was
mark sheet, remember that Mr. X can be alphabetically the last in the banks list. Then he
punished under the I T Act, 2000. went and opened an account in the name of
l Cyber Defamation : Whenever somebody Ziegler. The amount being withdrawn from each
publishes some defamatory information, about of the accounts in the bank was so insignificant
somebody using computer and/ or the internet, that neither any of the account holders nor the
it amounts to cyber defamation. India's first case bank officials noticed the fault. It was brought to
of cyber defamation was reported when a their notice when a person by the name of Zygler
company's employee started sending defamatory opened his account in the bank. He was
and obscene e-mails about its Managing surprised to find a sizeable amount of money
Director, which were sent to many business being transferred into his account every
associates to tarnish the image and goodwill of Saturday and the entire scheme was revealed.
the company. The Company was able to identify l Denial of service attack : By sending excessive
the person and approached to Delhi High Court. demands to the victims computer/s in excess of
l Cyber stalking : Stalking means “pursuing the demands that one computer can handle,
stealthily”. It means following a person's leading to crashing of computer system or
movements across the internet by posting computer network, and thereby causing denial of
messages or bulletin boards frequented by service by the resource to the authorised users is
victim, entering the chat-rooms frequented by known as denial of service attack. Denial of
the victim, constantly sending e-mails to the service attacks have had brought down the
victim etc. websites like CNN, Yahoo, eBay, Amazon etc.
l Unauthorised access to computer systems or l Virus/ worm attacks : Viruses are programmes
networks : This is commonly known as hacking which attacks to a computer or a file and them
but Indian law has given a different connotation circulate themselves to other files and other
to this i.e. unauthorised access. computers on a network, and affects data on a
l Theft of information contained in electronic computer by either altering or deleting it.
form : Any information stolen which is kept in Whereas worms do not need any host, and they
computer hard disks, any removable storage make functional copies of themselves till they eat
media etc. is an offence punishable under the all available space on a computer memory.
Information Technology Act, 2000. l Logic bombs : These are a virus which gets
l Email bombing : It means sending of large activated on doing something. They may even
number of emails to the email account of an remain dormant for a year and get activated on
individual or to server of a company so that doing or not doing something.
victims email account or server crashes. l Trojan attacks : As name aptly suggest, a Trojan
l Data diddling : It means altering data before it is is an unauthorised program which seems to be
processed by a computer or computer system harmless in nature which thereby concealing
and changing it back after the processing is what it is actually doing, causes harm to the
completed. The NDMC Electricity Billing Fraud computer, computer system, computer network
Case is the best example of this offence, wherein or to any files in the computer.
NDMC Delhi had outsourced to a computer l Internet time theft : This means usage by an
professional work of collection of money, unauthorised person of the internet hours paid
computerised accounting, record maintenance for by another person. In Delhi one person by
etc. He misappropriated huge amount of funds name Mr. Mukesh Gupta an engineer with Nicom
by manipulating data files to show less receipt Systems (P) Ltd. was sent to the residence of the
and bank remittance. complainant to activate his Internet connection.
l Salami attacks : These attacks are used for However, the accused used Col. Bajwa's login
commission of fraud. The alterations made in name and password from various places causing
computer system with the help of a programme wrongful loss of 100 hours to Col. Bajwa. Delhi
in this case are so significant that in a single case police arrested the accused for theft of internet
it goes* With a minimum
unnoticed. In a 6case
month validity
in USA anprepaid time, onapply.
plan. Conditions
employee a complaint lodged by Col. Bajwa.
programmed a logic bomb to take ten cents from l Web jacking : When someone by cracking a

ICSI - WIRC Pune Chapter Newsletter 15 JULY 2006


password gets hold of a website, thereby denying l Password cracking is one of the cyber crimes.
the control over the website to the real owner, are l Threatening emails : Sending threatening emails
called as web jacking. is a cyber crime.
l Theft of computer system and/ or physically l Similarly spreading defamatory emails, a
damaging a computer system is two cyber fraudulent email is a cyber offence.
crimes. These are some of cyber crimes committed by using
l Gaining entry into, instructing or computer, computer system and internet and are
communicating with the logical, arithmetical, or punishable under the Information Technology Act
memory function resources of a computer, 2000.
computer system or computer network is a cyber ” ” ”
crime.
(Contd. from Page No. 13)
business, processes and operations through
well as submission of various reports to SEBI, computers, should conduct information system
CLB, and Government departments as part of audit. Even now a days most of the banks are
compliance of laws is largely dependent on conducting IS audit on regular basis.
Information and communication system. Such Types of Information System Audits:
information is generated & gathered through
ERP packages or other packages. Even for IS Audit is not a single type of audit. It is done for
statutory audit also Information System Audit different facets of Information Systems. A few types
may be treated as a pre-requisite. IS audit are as follows;
ensures reliability & accuracy of information a) General Computer Control Audit
before it is submitted to outsiders. b) Reviewing Controls: It includes reviewing wide
d) To achieve business objectives, internal controls range of controls like environmental access
are essential in all types of organizations. controls, physical access controls, logical access
Internal controls like separation of duties etc are controls, IS operations controls, Application
part of day-to-day functions. Now-a-days due to controls, IT implementation controls, System
computerization and automation, various Development Life Cycle controls etc.
controls are also automated and embedded in the c) Application Software Audit
systems. IS audit ensures that the required
d) Information & Communication System Security
internal controls are automated & functioning
properly. Audit/review
e) Post Enron circumstances led different countries e) Information System procedural audit
to introduce laws such as SOX in US, SAS70 etc. f) Pre-Post software implementation audit
Internal controls related declaration is also g) Data conversion audit
required in India. The primary objective of these h) Review of BCP controls and disaster recovery
laws is to provide timely accurate information to planning
various stakeholders. Information System has
IS Audit and IS Auditor:
become a part of Internal Control hence
declaration, certification of Internal Control is IS audit is conducted by professional called as IS
largely dependent on the quality, accuracy and Auditor. The skill sets required for these type of
security of Information system. These aspects audits are certification like CISA, CISM, or
can only be evaluated and assured as a part of qualification as ISA. IS Auditor should be
Information System audit. technically competent and possess requisite skills
f) Various types of frauds, malicious acts are to carry out IS audit. As a requirement to any
conducted through computers. To prevent, professional member he should undergo
detect & correct these types of acts Information Continuous Professional Education. The Audit
System audit is required. charter should clearly state responsibility,
g) The quality of information largely depends on the authority and accountability of IS Auditor.
quality of various computer controls. Proper Company Secretary is also required to carry out
evaluation of these controls like input controls, secretarial audit and in some cases system audit
process controls, data integrity controls, output related to his/her area. In present scenario IS audit
controls is carried out in IS Audit qualification may be of great help to understand
h) IS audit plays key role in Business Continuity computer processes, programs related to his/her
Planning. professional work.
i) Every organization, which is running its ” ” ”

JULY 2006 16 ICSI - WIRC Pune Chapter Newsletter


Chapter Report
Pallavi Kulkarni -Salunke , Secretary, Pune Chapter

l Study Circle Meeting members were also felicitated by offering them a


A Study circle meeting on the topic “Basic memento. Mr Arvind Gaudana, Chairman WIRC
concepts in Capital Markets” was organized at who was present at the function, was also
the Pune Chapter on Saturday the 27th May, felicitated. An exclusive interview of the
2006 in between 4.00 pm to 6.00 pm. Mr Amit President and Vice President was also organized
Modak, Director, Pune Stock Exchange Limited with Ms Gauri Athalye, Senior Journalist , The
delivered a lecture elaborating the basic concepts Econoimc Times on 9th of June, 2006 at 6.15 pm.
involved in the capital markets and incidental Secretary & CEO, Vice President and President
issues related thereto. Around 10 members were addressed the gathering. President informed the
present for the said lecture. members that the Institute is planning to bring
l Free Seminar for HSC students and their out Post Membership Qualification course on
parents Corporate Governance. He added that effective
Every year the chapter organizes a free seminar steps are being taken to obtain recognition for the
for the students of HSC and their parents at Pune profession in Labour Law audits and Institute
Chapter premises with an objective of giving would also be coming out with a guideline for
them information about career as Company such audits for the benefit of members. Apart
Secretary. This year two such seminars were from that, steps were being taken to liaison with
organized at Pune Chapter on 4th of June, 2006 Professional Institutes in countries like Kenya ,
i.e. one day prior to the declaration of HSC Singapore etc.
results and again on 11th June, 2006. More than While talking to students present he informed
50 students and their parents attended the said further that the syllabus of the course was under
free seminars. Office bearers of Pune Chapter review and the same would be changed in the
briefed the students present about the CS next year. Also efforts are being taken to
course, its contents and scope in employment as introduce seventy hours of computer training for
well as in practice. the students and discussions were being held
l Visit of President of ICSI with NIIT in this regard.
Mr H.M.Choraria , President of ICSI, Ms Preeti On 10th of June, 2006 President, Vice President ,
Malhotra, Vice President of ICSI, Mr N.K.Jain , Secretary & CEO along with other central council
Secretary and CEO of ICSI along with other members visited the Pune Chapter office and had
central council members visited Pune on the interaction with the chapter staff.
occasion of Central Council meeting, which was l OTC Intermediate Faculty Meeting
held on 9th and 10th June, 2006. Felicitation of On 15th of June, 2006 a meeting of Office bearers
President, Vice President and Secretary & CEO of Pune Chapter with faculties of Intermediate
was organized on 9th May, 2006 at Hotel Oral Tuition Classes was held at the Chapter.
President at 7 pm. More than 70 students and The meeting was held in order to inform the
members were present for the felicitation faculty members about the guidelines issued by
function. Mr H M. Choraria , President was ICSI, fix the lectures for the next batch of OTC ,
felicitated by Mr Nishad Umranikar, Chairman decide dates of CC examination and in all
Pune Chapter by offering him “Puneri Pagdi & conveying the expectations of the Managing
Uparane” and a memento. Vice President , Committee to the faculty members.
Secretary & CEO and all other central council
” ” ”

Forthcoming Programmes
Sr. No. Date Programme Venue
1. July 19, 2006 Inauguration of Intermediate OTC Pune Chapter
2. July 24, 2006 Full day programme on MCA 21 To be decided
3. July 30, 2006 Study Circle Meeting Pune Chapter

ICSI - WIRC Pune Chapter Newsletter JULY 2006


Study Circle Meeting Free Seminar for HSC students and their parents

Visit of President of ICSI Visit of President of ICSI

Visit of President of ICSI Visit of President of ICSI

If undelivered please return to :


The Institute of
S Company Secretaries of India
IN PURSUIT OF PROFESSIONAL EXECELLENCE
Statutory body under an Act of Parliament

PUNE CHAPTER
23,Mukund Nagar, Corner of Lane No.1,
Above Joshi Hospital, Pune - 411 037.
Ph. 020-24263228 / 0341
E-mail : icsipune@vsnl.com
For Private Circulation only. All opinions / views expressed in "Sanhita" are those of the authors only. The opinions expressed
herein should not be construed as legal or professional advice. The Chapter/ICSI does not take any responsibility for the
information published in "Sanhita" including intellectual property rights of third parties. Published by Mr. Nishad Umranikar for
and on behalf of the Pune Chapter of the Western India Regional Council of the Institute of Company Secretaries of India, 23,
Mukund Nagar, Corner of Lane No. 1, Above Joshi Hospital. Pune-411 037. Telefax:020-24263228/0341. E-mail : icsipune@vsnl.com

JULY 2006 ICSI - WIRC Pune Chapter Newsletter

Das könnte Ihnen auch gefallen