Cyber World
Cyber World
Cyber World
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Indian Law Institute is collaborating with JSTOR to digitize, preserve and extend access to
Journal of the Indian Law Institute
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
354
Devashish Bharuka*
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
20021 INDIAN INFORMATION TECHNOLOGY ACT, 2000 355
2. Dileep Athavale, "Gartner Group Projects 43% CAGR for Indian IT Industry
The Times of India , November 19, 2000, available at 2000 WL 29244025.
3. Ministry of Information Technology, Government of India, at http://
www.mit.gov.in.
4. Functions of Ministry of Information Technology, at http://www.mit.gov.in
about.htm.
5. See, http://www.uncitral.org/enelish/texts/electcom/.
6. "Infotech Act comes into force", The Times of India, October 18, 2000,
available at 2000 WL 28349604.
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
356 JOURNAL OF THE INDIAN LA W INSTITUTE [Vol. 44 : 3
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
2002] INDIAN INFORMA TION TECHNOLOGY ACT, 2000 357
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
358 JOURNAL OF THE INDIAN LA W INSTITUTE [Vol. 44 : 3
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
2002] INDIAN INFORMATION TECHNOLOGY ACT, 2000 359
the digital bits on the computer, for example, to make the information require
different medication for the patient than what was prescribed. This action could be
achieved if the person physically broke and physically entered the hospital an
changed the information at the computer that physically resided at the hospital. Th
same result would be achieved but the difference is that of lack of physical presence
Are we as society ready then to regard the collection of digital bits the same as
physical "dwelling"? at http://www.cybercrimes.net/Virtual/Burney/page6.html.
14. American Libraries Association v. Pataki , 969 F. Supp 160 (analogising the
Internet to a highway and thus ruling that the state obscenity statute fell unde
interstate commerce purview) quoted in "Digital Discovery in Criminal Context",
http://cyber.law.harvard.edu/digitaldiscovery/diedisc librarv 3. html.
15. Gibson, Neuromancer 1984. "Cyberspace. A consensual hallucination
experienced daily by billions of legitimate operators, in every nation, by childre
being taught mathematical concepts.... A graphical representation of data abstracted
from the banks of every computer in the human system. Unthinkable complexit
Lines of light ranged in the non-space of the mind, clusters and constellations
data. Like city lights, receding...".
16. Burney, supra note 12, "What we conceive as 'folders' in Microsoft Windows,
are actually just allocations on a hard disk or other storage medium for the one
and zero's. We are not actually physically opening a 'folder' on our computer, but it
appears for all intents and purposes that we are. And we refer to our^ction as
'opening a folder'. This action of 'opening a folder' aooears real to us.
1 7. Mark D. Rasch, supra note 1 1 .
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
360 JOURNAL OF THE INDIAN LA W INSTITUTE ļ Vol. 44 : 3
18. ibid.
19. Whoever, intending to take dishonestly any moveable property out of the
possession of any person without that person's consent, moves that property in
order to such taking, is to commit theft.
20. Pawan Duggal, "India's first cyber crook nabbing raises sticky cyber law
issues ", The Financial Express , June 2, 2000, available at http://
www. financialexpress.com/fe/daily/20000602/efe02005. html.
21. Senior Electric Inspector v. Laxmi Narayan Chopra , AIR 1962 SC 159 at
163, '.. in the modern progressive society it would be unreasonable +o confine the
intention of a legislature to the meaning attributable to the word used at the time the
law was made, for a modern legislature making laws to govern a society which is
fast moving must be presumed to be aware of an enlarged meaning the same concept
might attract with the march of time and with the revolutionary changes brought
about in social, economic, political and scientific and other fields of human activity.
Indeed, unless a contrary intention appears, an interpretation should be given to the
words used to take in new facts and situations, if the words -are capable of
comprehending them.'
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
2002] INDIAN INFORMATION TECHNOLOGY ACT, 2000 361
22. The question which arises is whether the Internet hours are mov
immovable property. Before that can be answered one more point which ar
time a property? In the author's humble opinion, Internet hours should be
moveable property. The reasons for it are that one can use his Internet
anywhere in the circuit/country. The author further points out that it is
property as it can be severed from the earth, but to use it we may have t
substance from the earth viz., telephone line; it can be totally severed from
if connection is vide VSAT. As far as Internet hours are concerned the
"time" i.e. to say 9:15 a.m. or 12:00 noon or 6:00 p.m. They are hours,
hours or 25 hours or 500 hours. This is the time, which one can consum
his Internet account, it is his property which comes with an expiry date,
expiry date means not only within period of 3 months or 1 year but in
This brings the act well within s.378 of IPC and thus punishable u/s 3
Charu Mathur, "Cyber Chori", at http://www.indcyberlaws.com/~ind
cyber_chori.htm).
23. Network service providers not to be liable in certain cases - For the
of doubts, it is hereby declared that no person providing any service as
service provider shall be liable under this Act, rulés or regulations made th
for any third party information or data made available by him if he prov
offence or contravention was committed without his knowledge or tha
exercised all due diligence to prevent the commission of such o
contravention.
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
362 JOURNAL OF THE INDIAN LA W INSTITUTE [Vol. 44 : 3
Analysis
26. "Hacking with computer system (1) Whoever with tKe intent to cause or
knowing that he is likely to cause wrongful loss or damage to the public or any
person destroys or deletes or alters any information residing in a computer resource
or diminishes its value or utility or affects it injuriously by any means, commits
hack:...."
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
2002] INDIAN INFORMA TION TECHNOLOGY A CT, 2000 363
One of the serious cyber crimes with which the net users, e
governmental agencies and the corporations, are concerned is
In simple terms, it refers to the act of unauthorized entry into a p
computer system. However, there is more to it than just this.
has been termed as interacting with a computer in a play
exploratory rather than a goal-directed way.28 The word 'hack
Massachusetts Institute of Technology (MIT) usually refers to
benign, and "ethical" prank or practical joke, which is both ch
for the perpetrators and amusing to the MIT community (and s
even to the rest of the world!).29 Those who hack also concern t
with hack ethic (belief that system-cracking for fun and expl
ethically OK as long as the cracker commits no theft, vand
breach of confidentiality).30 However, trouble arises when thes
go overboard and start prying into protected system and data fo
gain or mischief.
27. "Hacking with computer system. (1) Whoever with the intent to
knowing that he is likely to cause wrongful loss or damage to the pub
person destroys or deletes or alters any information residing in a comput
or diminishes its value or utility or affects it injuriously by any mean
hack ..." (emphasis added).
28. The Jargon Dictionary at http://info.astrian.net/jargon/terms/h.html
29. See, http://hacks.mit.edu.
30. Supra note 28.
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
364 JOURNAL OF THE INDIAN LA W INSTITUTE [Vol. 44 : 3
Case situation # 1
Analysis
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
2002] INDIAN INFORMA TION TECHNOLOGY ACT, 2000 365
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
366 JOURNAL OF THE INDIAN LA W INSTITUTE [Vol. 44 : 3
of contractual obligation.
What is objectionable is that the court referred to sectio
in the view of the author, is of no consequence. The case i
of contractual obligation and should be treated as such. W
Act coming into play, we should be careful in interpr
developing the Indian IT jurisprudence lest in our haste an
we take wrong turns which would later take time to unra
be harmful to the booming IT industry in India.
The first cyber crime since the enactment of the IT Act was cracke
by the White Collar Offences (WCO) team in Hyderabad38 when, o
complaint of receiver of an e-mail with a virus39 attachment along wit
Diwali40 greetings posted by Satyam41 Online staff to all of
subscribers, the e-mail addressed was traced to the mailer. Investigatio
revealed the virus to be MTX42 , which got spread through the bu
Diwali greetings sent by Satyam Online staff.
Analysis
38. "City sleuths crack first cyber crime", Times of India , November 25, 2000,
available at http://www.timesofindia.com/25 1 1 00/25mhvd3.htm.
39. IT Act, s. 43, Explanation (iii) - "computer virus" means any computer
instruction, information, data or programme that destroys, damages, degrades or
adversely affects the performance of a computer resource or attaches itself to another
computer resource and operates when a programme, data or instruction is executed
or some other event takes place in that computer resource.
40. A Hindu festival in India celebrated in October-November.
41. One of the private Internet service providers in India; www.satyam.com.
42. MTX is a 32bit PE file infector for Windows 9x/NT systems. This virus
modifies WSOCK32.DLL in an effort to hook SMTP traffic as an attachment. This
virus searches for available shares through network neighbourhood in an effort to
transfer to host systems. It was discovered on August 23, 2000. (See, http://
vil.mcafee.com/dispVirus.asp? virus_k=98797&).
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
2002] INDIAN INFORMA TION TECHNOLOGY ACT. 2000 367
(1) Whether the ISP took adequate steps to ensure that there is no
virus attached to the e-mail?
(2) Whether the ISP, after being informed of the virus, took
immediate adequate steps to inform the consumers of the virus
and the remedies available?
(3) A virus does not get activated unless the virus file attached to
the e-mail is opened. Is the consumer sophisticated enough to
take precaution not to open an attachment, which he/she is not
expecting from the sender?
(4) Is the consumer using an effective, updated virus scanner?
(5) Did the consumer immediately inform the ISP in case the virus
hit him/her?
How would the Indian courts surf through these inquiries is yet to be
seen....
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
368 JOURNAL OF THE INDIAN LA W INSTITUTE [Vol . 44 : 3
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
2002] INDIAN INFORMA TION TECHNOLOGY ACT, 2000 369
48. If any person without permission of the owner or any other person who is
incharge of a computer, computer system or computer network, - (e) disrupts or
causes disruption of any computer, computer system of computer network; he shall
be liable to pay damages by way of compensation not exceeding one crore rupees to
the person so affected.
49. To throw into confusion or disorder (See, http://www.dictionary.com/cgi-
bin/dict.pl? term=disruptiort).
50. If any person without permission of the owner or any other person who is
incharge of a computer, computer system or computer network, - (f) denies or
causes the denial of access to any person authorized to access computer, computer
system or computer network by any means; he shall be liable to pay damages by way
of compensation not exceeding one crore rupees to the person so affected.
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
370 JOURNAL OF THE INDIAN LA W INSTITUTE [Vol. 44 : 3
51. "Opt-in" means the e-mail recipient chooses to join the list. It
permission, meaning the recipient has given the sender explicit permi
him/her e-mail in a certain capacity.
52. "Opt-out" means that you tell a company that you don't want t
your information for certain purposes or sell it to others. Typically, wh
out, you are not aptually taken off of a list "but added to a list of people
want their personal information shared with other companies or who do
receive telemarketing calls or direct mail. Sometimes businesses allow
out of having them use your information to send you solicitations. Freq
will receive some kind of confirmation (e.g., online you may get a We
mail confirmation), but sometimes you may not. A company's privacy
give you more information about their opt-outs. (See, http://opt-out.cdt.org
#1).
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
2002] INDIAN INFORMATION TECHNOLOGY ACT, 2000 371
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
372 JOURNAL OF THE INDIAN LA W INSTITUTE [Vol. 44 : 3
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
2002] INDIAN INFORMATION TECHNOLOGY ACT, 2000 373
59. Sudeep Chakravarti, "Cyber Chatter: The Law in these Parts", Ind
October 30, 2000, available at 2000 WL 2152523
60. Editorial, "The Big Brahmins want to Police the Net", Times of
16, 2000, available at http://dalitstan.0rg/i0urnal/recthist/t0tal/i t bill.ht
61. Pramod Mahajan, IT Minister, "IT law gives police powers
cybercrimes", The Times of India, October 1 8, 2000. available at 2000 WL
62. Pervez Iqbal Siddiqui, "UP Police caught web-footed", Times
February 16, 2001, available at 2001 WL 13629585.
63. Case Example: Deborah has been stalked in a chat room for over s
during which time detailed personal information and a doctored por
photograph with her likeness has been posted on a website. The cyber
threatened to rape and kill her. And too often, untrained police offic
address the situation, as they should. Advocacy groups say that when vict
their situation to authorities, a frequent response is "turn off your comp
http://www.wired.eom/news/politics/0, 1 283, 35728, 00.html).
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
374 JOURNAL OF THE INDIAN LA W INSTITUTE [Vol. 44 : 3
64. A recent incident demonstrates how the lack of law enforcement traini
and expertise can frustrate cyber stalking victims: A woman complained to a l
police agency that a man had been posting information on the web claiming that
nine-year-old daughter was available for sex. The web posting included their ph
number. They received numerous calls. The problem was reported to the local poli
agency on numerous occasions, but the agency simply advised the couple to cha
their phone number. Subsequently, the couple contacted the FBI, which opened
investigation. It was discovered that the local police agency did not have a comput
expert, and the investigative officer had never been on the Internet. The local agen
lack of familiarity and resources may have resulted in a failure to understand
seriousness of the problem and the options available to law enforcement to respon
to such problems. (See, "1999 Report on Cyber Stalking: A New Challenge for L
Enforcement and Industry", available at http://www.cybercrime.gov/cyber
talking.htm).
65. Clarke, "From Criminal to Cyber-Prep: Toward an Inclusive Approach to
Policing the Evolving Criminal mens rea on the Internet", 75 Or L Rev 191.
66. Kevin Sack, "Racism of a Rogue Officer Casts Suspicion on Police
Nationwide", NY Times , Sept. 4, 1995, s 1, at 1 (quoting Huber Williams, President
of the Police Foundation, Washington, D.C.)
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
2002] INDIAN INFORMA TION TECHNOLOGY A CT. 2000 375
(2) For the purposes of sub-section (1), this Act shall apply to
an offence or contravention committed outside India by any
person if the act or conduct constituting the offence or
contravention involved a computer68, computer system69 or
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
376 JOURNAL OF THE INDIAN LA W INSTITUTE [Vol. 44 : 3
70. S.2 (1) - 'computer system' means a device or collection of devices, including
input or output support devices and excluding calculators which are not programmable
and capable of being used in conjunction with external files which contain computer
programes, electronic instructions, input data and output data that performs logic,
arithmetic, data storage and retrieval, communication control and other functions.
71. CLA 1977, S.l (4), reaffirming the rule in Stonehouse [1978] AC 55 in
Glanville Williams, Textbook of Criminal Law , (2nd ed) at 165.
72. E.g. a wound inflicted in Scotland is triable in England if a person standing
on the Scottish Bank of the Tweed fires at and wounds a person in England. This is
the 'terminatory theory' of the criminal act; the elements of the crime being split
between two countries, it is regarded as being committed where the prescribed result
takes place. Even if the attacker misses, he can be tried in England for the attemot.
73. A person, though himself abroad, may by the hands of an innocent agent
commit a crime in England, e.g., by posting in France a libellous letter or a forged
telegram, which the postman will deliver for him in London. If the Frenchman
comes to England, he may be tried there. (See, Kenny's, Outlines of Criminal Law ,
18th ed., 535 pr. 647 (1962 Cambridge University Press); Where a man in Paris by
false returns caused incorrect figures to be entered in the account books of his firm
in London, it was held that the offence of false accounting was committed by him in
London. (R. v. Oliphant , [1905]2 K.B. 67; R. v. Harden , [ 1 962] 1 All ER 286); D,
in Miami, falsely staged his death by drowning with the intention that his innocent
wife in England should claim life insurance monies. He was guilty of attempting to
enable his wife to obtain money by deception. The 'effect' was the communication
through the media to her and the insurance companies of the false statement that he
had died. ( Director of Public Prosecution v. Stonehouse , [1977] 2 All ER 909);
Coombes from the shore shot a man engaged in pushing off a boat aground on a
sandbank in the sea, 100 yards from the shore, it was held that Coombe's crime was
committed on the high sea, and that he was subject to the Admiralty jurisdiction.
(Leach, 388 in Sir James Fitzjames Stephen, A History of the Criminal Law of
England , Vol. II at 11).
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
2002] INDIAN INFORMA TION TECHNOLOGY ACT, 2000 377
74. Simpson v. State , 92 Ga 41, 17 SE 984 (1893) - The victim was in a sma
boat near the Georgia side of the wide Savannath River. Simpson, the defendan
stood on the opposite South Carolina Bank and fired several shots at the vessel. T
bullets missed the boat but struck the water nearby. The Supreme Court of Georgi
held that jurisdiction attached with these circumstances and that Simpson coul
properly be prosecuted in Georgia even though the defendant was clearly in anoth
state at the time of shooting. The location of the victim and the place where t
bullets landed established the basis for the decision; U.S. v. Davis , 2 Sumner, 482
an American sailor in a ship in one of the Society Island's harbours fired a sho
which killed a man in (apparently) a foreign ship. The American court held that th
crime was committed on board the foreign ship, and that therefore the Americ
court had no jurisdiction to try it.
75. R. v. Kver , L.R. 2 Ex. 103.
76. See, e.g., 1968 Cr LJ 555 (All); AIR 1961 AP 266: 1961 (1) Cr LJ 804.
77. Mobarak AH Ahmed v. State of Bombay, AIR 1957 SC 857.
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
378 JOURNAL OF THE INDIAN LA W INSTITUTE [Vol . 44 : 3
VI Conclusion
78. São Paulo section of the Brazilian Bar Association (OAB-SP) has prepared
a draft bill project, which was submitted to the Brazilian Congress in order to
regulate e-commerce, electronic signatures and electronic documents
79. Draft Bill No. 1589.
80. Froehnor, Juliano, The Potentiality of the Online Dispute Resolution System
for Cyber conflicts: A Personal Analvsis . Julv 2000 at 16-18
81. Law no. 8.078/1990.
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms
2002] INDIAN INFORMATION TECHNOLOGY ACT. 2000 379
This content downloaded from 14.139.62.117 on Thu, 17 Jan 2019 16:22:13 UTC
All use subject to https://about.jstor.org/terms