Professional Documents
Culture Documents
Introduction
Cyber Law is a term first coined by Jonathan Rosenoer as the title for a service aimed at
explaining legal issues to computer users. It derives from the term, Cybernetics. Cyber Law (tm)
was first published on an AOL user group no later than early 1992, as a version of a series of
articles published in print, under the name "The Legal Side," by major US computer (primarily
Macintosh) users groups, such as BMUG, and on The WELL. Many of the CyberLaw articles
were published in a book titled, Cyber Law: The Law of the Internet (Springer Verlag 1996).
Cyber Law describes the legal issues related to use of inter-networked information technology. It
is less a distinct fielding of law in the way that property or contracts are, as it is a domain
covering many areas of law and regulation. Some leading topics include intellectual property,
privacy, freedom of expression, and jurisdiction. It is a Body of law bearing on the world of
computer networks, especially the Internet. As traffic on the Internet has increased, so have the
number and kind of legal issues surrounding the technology. Hotly debated issues include the
obscenity of some on-line sites, the right of privacy, freedom of speech, regulation of electronic
commerce, and the applicability of copyright laws.
Page 1
Page 2
providers etc. These laws seek to address the challenges to privacy caused by collecting, storing
and transmitting data using new technologies.
Page 3
Here the original information, so to say, remains in the possession of the owner
and yet information gets stolen.
Cyber Crime
In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool
or a target or both
Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud,
forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of
computers has also given birth to a gamut of new age crimes that are addressed by the
Information Technology Act, 2000. Cyber Crime regulated by Cyber Laws or Internet Laws.
We can categorize Cyber crimes in two ways
Page 4
two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its
machine, the attacker will then use the Client to connect to the Server and start using the Trojan.
TCP/IP protocol is the usual protocol type used for communications, but some functions of the
Trojans use the UDP protocol as well.
Virus and Worm attack:
A program that has capability to infect other programs and make copies of it and spread into
other programs is called virus. Programs that multiply like viruses but spread from computer to
computer are called as worms.
E-mail related crimes:
1. Email spoofing
Email spoofing refers to email that appears to have been originated from one source when it was
actually sent from another source. Please Read
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users - similar to a
chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a
link of website which on visiting downloads malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a
particular address.
5. Sending threatening emails
6. Defamatory emails
7. Email frauds
Pornography:
The literal mining of the term 'Pornography' is describing or showing sexual acts in order to
cause sexual excitement through books, films, etc. This would include pornographic websites;
pornographic material produced using computers and use of internet to download and transmit
pornographic videos, pictures, photos, writings etc. Adult entertainment is largest industry on
Page 5
internet. There are more than 420 million individual pornographic WebPages today. Research
shows that 50% of the web-sites containing potentially illegal contents relating to child abuse
were Pay-Per-View. This indicates that abusive images of children over Internet have been
highly commercialized.
Pornography delivered over mobile phones is now a burgeoning business, driven by the
increase in sophisticated services that deliver video clips and streaming video, in addition to text
and images.
Forgery:
Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using
sophisticated computers, printers and scanners. Also impersonate another person is considered
forgery.
IPR Violations:
These include software piracy, copyright infringement, trademarks violations, theft of computer
source code, patent violations. etc.
Cyber Squatting- Domain names are also trademarks and protected by ICANNs domain dispute
resolution policy and also under trademark laws. Cyber Squatters registers domain name
identical to popular service providers domain so as to attract their users and get benefit from it.
Cyber Terrorism:
Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic
control, telecommunication networks are the most likely targets. Others like police, medical, fire
and rescue systems etc.
Cyber terrorism is an attractive option for modern terrorists for several reasons.
1. It is cheaper than traditional terrorist methods.
2. Cyberterrorism is more anonymous than traditional terrorist methods.
3. The variety and number of targets are enormous.
4. Cyberterrorism can be conducted remotely, a feature that isespecially appealing to terrorists.
5. Cyberterrorism has the potential to affect directly a larger number of people.
Banking/Credit card Related crimes:
Page 6
In the corporate world, Internet hackers are continually looking for opportunities to compromise
a companys security in order to gain access to confidential banking and financial information.
Use of stolen card information or fake credit/debit cards is common.
Bank employee can grab money using programs to deduce small amount of money from all
customer accounts and adding it to own account also called as salami.
E-commerce/ Investment Frauds:
Sales and Investment frauds. An offering that uses false or fraudulent claims to solicit
investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit
securities. Merchandise or services that were purchased or contracted by individuals online are
never delivered.
The fraud attributable to the misrepresentation of a product advertised for sale through an
Internet auction site or the non-delivery of products purchased through an Internet auction site.
Investors are enticed to invest in this fraudulent scheme by the promises of abnormally high
profits.
Sale of illegal articles:
This would include trade of narcotics, weapons and wildlife etc., by posting information on
websites, auction websites, and bulletin boards or simply by using email communication.
Research shows that number of people employed in this criminal area. Daily peoples receiving
so many emails with offer of banned or illegal products for sale.
Online gambling:
There are millions of websites hosted on servers abroad that offer online gambling. In fact, it is
believed that many of these websites are actually fronts for money laundering.
Defamation:
Defamation can be understood as the intentional infringement of another person's right to his
good name. Cyber Defamation occurs when defamation takes place with the help of computers
and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or
sends e-mails containing defamatory information to all of that person's friends. Information
posted to a bulletin board can be accessed by anyone. This means that anyone can place Cyber
defamation is also called as Cyber smearing.
Cyber Stacking:
Cyber stalking involves following a persons movements across the Internet by posting messages
(sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms
frequented by the victim, constantly bombarding the victim with emails etc. In general, the
Page 7
harasser intends to cause emotional distress and has no legitimate purpose to his
communications.
Also there are persons who intentionally prey upon children. Especially with a teen they will let
the teen know that fully understand the feelings towards adult and in particular teen parents.
They earn teens trust and gradually seduce them into sexual or indecent acts. Pedophiles lure the
children by distributing pornographic material, and then they try to meet them for sex or to take
their nude photographs including their engagement in sexual positions.
Identity Theft:
Identity theft is the fastest growing crime in countries like America. Identity theft occurs when
someone appropriates another's personal information without their knowledge to commit theft or
fraud. Identity theft is a vehicle for perpetrating other types of fraud schemes.
Data diddling:
Data diddling involves changing data prior or during input into a computer. In other words,
information is changed from the way it should be entered by a person typing in the data, a virus
that changes data, the programmer of the database or application, or anyone else involved in the
process of having information stored in a computer file. It also includes automatic changing the
financial information for some time before processing and then restoring original information.
Theft of Internet Hours:
Unauthorized use of Internet hours paid for by another person. By gaining access to an
organizations telephone switchboard (PBX) individuals or criminal organizations can obtain
access to dial-in/dial-out circuits and then make their own calls or sell call time to third parties.
Additional forms of service theft include capturing 'calling card' details and on-selling calls
charged to the calling card account, and counterfeiting or illicit reprogramming of stored value
telephone cards.
Theft of computer system (Hardware):
This type of offence involves the theft of a computer, some part(s) of a computer or a peripheral
attached to the computer.
Physically damaging a computer system:
Physically damaging a computer or its peripherals either by shock, fire or excess electric supply
etc.
Breach of Privacy and Confidentiality:
Privacy
Page 8
Privacy refers to the right of an individual/s to determine when, how and to what extent his or
her personal data will be shared with others.
Breach of privacy means unauthorized use or distribution or disclosure of personal information
like medical records, sexual preferences, financial status etc.
Confidentiality
It means non disclosure of information to unauthorized or unwanted persons. In addition to
Personal information some other type of information which useful for business and leakage of
such information to other persons may cause damage to business or person, such information
should be protected.
Generally for protecting secrecy of such information, parties while sharing information forms an
agreement about he procedure of handling of information and to not to disclose such information
to third parties or use it in such a way that it will be disclosed to third parties. Many times party
or their employees leak such valuable information for monitory gains and causes breach of
contract of confidentiality.
Special techniques such as Social Engineering are commonly used to obtain confidential
information.
Page 9
4. The infringement of the exclusive right of the owner of a protected computer program with the
intent to exploit commercially the program and put in on the market;
5. The access to or the interception of a computer and/or telecommunication system made
knowingly and without the authorization of the person responsible for the system, either (i) by
infringement of security measures or (ii) for other dishonest or harmful intentions."
From 1985 to 1989, the Select Committee of Experts on Computer-Related Crime of the Council
of Europe discussed the legal problems of computer crime. The Select Committee and the
European Committee on Crime Problems prepared Recommendation No. R(89)9, which was
adopted by the Council on 13 September 1989.
The minimum list of offences for which uniform criminal policy on legislation concerning
computer-related crime had been achieved enumerates the following offences:
1. Computer fraud. The input, alteration, erasure or suppression of computer data or computer
programs, or other interference with the course of data processing that influences the result of
data processing, thereby causing economic or possessory loss of property of another person with
the intent of procuring an unlawful economic gain for himself or for another person;
2. Computer forgery. The input, alteration, erasure or suppression of computer data or computer
programs, or other interference with the course of data processing in a manner or under such
conditions, as prescribed by national law, that it would constitute the offence of forgery if it had
been committed with respect to a traditional object of such an offence;
3. Damage to computer data or computer programs. The erasure, damaging, deterioration or
suppression of computer data or computer programs without right;
4. Computer sabotage. The input, alteration, erasure or suppression of computer data or computer
programs, or other interference with computer systems, with the intent to hinder the functioning
of a computer or a telecommunications system;
5. Unauthorized access. The access without right to a computer system or network by infringing
security measures;
6. Unauthorized interception. The interception, made without right and by technical means, of
communications to, from and within a computer system or network;
7. Unauthorized reproduction of a protected computer program. The reproduction, distribution or
communication to the public without right of a computer program which is protected by law;
8. Unauthorized reproduction of a topography. The reproduction without right of a topography
protected by law, of a semiconductor product, or the commercial exploitation or the importation
for that purpose, done without right, of a topography or of a semiconductor product
manufactured by using the topography.
Page 10
Page 11
Being at the forefront of computer technology, and being the country that developed what is
today referred to as the Internet, the USA has been the global leader in developing laws relating
to cyber crime.
In 1977, Senator Abraham Ribicoff introduced the first Federal Systems Protection Act Bill.
This evolved into House Bill 5616 in 1986, which resulted in the Computer Fraud and Abuse Act
of 1987 established as Article 1030, Chapter 47 of Title 18 of Criminal Code. The US states of
Florida, Michigan, Colorado, Rhode Island and Arizona were the first to have computer crime
laws based on the first Ribicoff bill.
Some of the earlier relevant federal legislations include the Communications Fraud and Abuse
Act of 1986, the Electronic Communications Privacy Act of 1986, the Credit Card Fraud Act of
1984, the Federal Copyright Act of 1976 and the Wire Fraud Act. Also relevant are provisions of
the Electronic Fund Transfer Act (Title XX of Financial Institutions Regulatory and Interest Rate
Control Act of 1978) and the Federal Privacy Act of 1974 (codified in 5 USC Sect. 552a).
Some of the more recent US legislations relevant to cyber law are the 'No Electronic Theft' Act
(1997), the Digital Millennium Copyright Act (1998), the Internet Tax Freedom Act (1998), the
Child Online Protection Act (1998), the U.S. Trademark Cyber piracy Prevention Act (1999), the
Uniform Electronic Transactions Act (UETA) (1999), the Uniform Computer Information
Transactions Act (UCITA) (2000), the Electronic Signatures in Global & National Commerce
Act (E-Sign) (2000), the Childrens Internet Protection Act (2001) and the USA Patriot Act
(2001).
In China, the relevant laws are the Computer Information Network and Internet Security,
Protection and Management Regulations (1997), the Regulations on Computer Software
Protection (2002) and the Criminal Law of the People's Republic of China (1979) as revised in
1997.
In Australia the relevant law for cyber crime is the Cybercrime Act (2001) and the revised
Criminal Code Act (1995). For electronic commerce, the relevant law is the Electronic
Transactions Act 1999. Also relevant is The Commonwealths Privacy Act (1988).
In Canada, the relevant law for cyber crime is the Criminal Code as amended to include
computer crimes. For electronic commerce, the relevant law is the Electronic Transactions Act
(2001).
In Malaysia, the relevant law for cyber crime is the Computer Crimes Act (1997). For electronic
commerce, the relevant law is the Digital Signatures Act (1997).
In Singapore the relevant law for cyber crime is the Computer Misuse Act. For electronic
commerce, the relevant law is the Electronic Transactions Act (1998).
In United Arab Emirates (UAE), the relevant law for cyber crime is the Federal Law No. 2 of
2006 Combating Information Technology Crimes. For electronic commerce, the relevant law is
the Law No. 2 of 2002 of the Emirate of Dubai Electronic Transactions and Commerce Law.
Page 12
In the United Kingdom the relevant laws for cyber crime are the Forgery and Counterfeiting
Act (1981), Computer Misuse Act (1990), Data Protection Act (1998), Terrorism Act (2000),
Regulation of Investigatory Powers Act (2000), Anti-terrorism, Crime and Security Act (2001)
and Fraud Act (2006). For electronic commerce, the relevant laws are the Electronic
Communications Act (2000) and the Electronic Signatures Regulations (2002).
In Japan the relevant laws for cyber crime are the Unauthorized Computer Access Law (Law
No. 128 of 1999) and the Online Dating Site Regulating Act (June 2008).
In India, the primary legislation for cyber crimes as well as electronic commerce is the
Information Technology Act (2000) as amended by the Information Technology (Amendment)
Act, 2008. Also relevant for cyber crimes is the amended Indian Penal Code.
Page 13
Authorizing an Inspector to investigate cyber offences (as against the DSP earlier)
PATENT
A patent is a legally enforceable monopoly right, granted by a government, over a device,
substance, method or process that is new, inventive and useful.
A patent is a set of exclusive rights granted by a state (national government) to an inventor or
their assignee for a limited period of time in exchange for a public disclosure of an invention.
The exclusive right granted to a patentee in most countries is the right to prevent others from
making, using, selling, importing or distributing the patented invention without permission
through out the whole life of the patent.
The procedure for granting patents, the requirements placed on the patentee, and the extent
of the exclusive rights vary widely between countries according to national laws and
international agreements
Patents & Copyrights grant exclusive rights for a limited time after which the work or
invention enters the public domain.
Patent holders receive exclusive rights to make, use, or sell an invention, design, or
plant.
The patentee must file a detailed description of the invention which is published by
the government.
Public disclosure provides a source of technical information.
Some companies prefer to protect their inventions called Trade Secrets kept private to
maintain a companys competitive advantage.
TYPES OF PATENTS GRANTED TO INVENTORS
Page 14
According to Law
A patent is not a right to practice or use the invention. Rather, a patent provides the right
to exclude others from making, using, selling, offering for sale, or importing the patented
invention for the term of the patent
Patents can generally only be enforced through civil lawsuits (for example, for a U.S.
patent, by an action for patent infringement in a United States federal court), although
some countries (such as France and Austria) have criminal penalties for wanton
infringement
PATENT APPLICATION
A patent is requested by filing a written application at the relevant patent office
The person or company filing the application is referred to as "the applicant". The
applicant may be the inventor or its assignee
The application contains a description of how to make and use the invention that must
provide sufficient detail for a person skilled in the art (i.e., the relevant area of
technology) to make and use the invention.
In some countries there are requirements for providing specific information such as the
usefulness of the invention, the best mode of performing the invention known to the
inventor, or the technical problem or problems solved by the invention.
Grant of Patent
Page 15
Most patent offices examine the application for compliance with these requirements. If
the application does not comply, objections are communicated to the applicant or their
patent agent or attorney and respond to the objections to bring the application into
compliance are usually provided.
Once granted the patent is subject in most countries to renewal fees to keep the patent in
force. These fees are generally payable on a yearly basis, although the US is a notable
exception.
PARTS OF THE PATENT
Typical patent includes:
Drawings
Brief Abstract or Summary
Detailed Description of How to Make or Use the Invention
Claims - phrases that precisely define the invention and outline the boundaries of the
claimed invention (prevents infringement)
Cost & Criticism
The costs of preparing and filing a patent application vary from one jurisdiction to
another, and may also be dependent upon the type and complexity of the invention, and
on the type of patent.
In principle, patents have been criticized as a restraint of trade, for conferring a negative
right upon a patent owner, permitting them to exclude competitors from using or
exploiting the invention, even if the competitor subsequently develops the same invention
independently
Patents have been criticized as inconsistent with free trade
Pharmaceutical patents prevent generic alternatives to enter the market until the patent
expire, and thus maintains high prices for medication.
THE PATENTS ACT, 1970
A Patent is an intellectual property right relating to inventions and is the grant of exclusive
right, for limited period provided by the Government to the patentee in exchange of full
disclosure of his invention for excluding others, from making, using, selling, importing the
patented product or process producing that product for those purposes
A patent is a Monopoly Right granted
Page 16
For an invention
By the government
To the inventor or his assignee
For a limited period
It is valid within the country of grant
INVENTION
Invention is a successful technical solution to a technical problem. To be granted a Patent, An
invention must be new, non obvious and capable of industrial application.
Different Ways of Dealing with an Invention
Make it public for free use by public (like publishing in the journal)
Work the invention in SECRECY without PATENTING it (like coco-cola composition)
Work the invention OPENLY without PATENTING it (directly put it in the market)
EXPLOIT the invention on the basis of a PATENT (like Rank Xerox)
What Does Patent System Do?
It encourages RESEARCH.
Induces an inventor to disclose his inventions instead of keeping them as secret.
Provides inducement for capital investment encouraging technological development.
It encourages establishment of new industries.
Advantages of a Patent to the Public
KNOWLEDGE OF INVENTION ADDS TO SCIENTIFIC BACKGROUND
FORMING BASE FOR FURTHER RESEACH
REASONABLE ASSURANCE FOR COMMERCIALIZATION
PATENT- OPEN TO PUBLIC FOR USE AFTER ITS TERM EXPIRES
Page 17
TRADEMARK
A trademark or trade mark is a distinctive sign or indicator used by an individual, business
organization, or other legal entity to identify the products or services, and to distinguish its
products or services from those of other entities
Symbols
(for an Unregistered trade mark, that is, a mark used to promote or brand goods)
(for an unregistered service mark, that is, a mark used to promote or brand services)
(for a registered trademark)
RIGHTS IN A MARK
Rights arise from either:
RIGHT TO USE - actual use of a mark in commerce
RIGHT TO REGISTER - The registration symbol is used when the mark is
registered and signifies ownership and all the commercial and legal benefits
that may derive by virtue of ownership.
The owner of a registered trademark may commence legal proceedings for trademark
infringement to prevent unauthorized use of that trademark
Dilution
Page 18
A trademark is diluted when the use of similar or identical trademarks in other noncompeting markets means that the trademark in and of itself will lose its capacity to signify a
single source.
In other words, unlike ordinary trademark law, dilution protection extends to trademark uses
that do not confuse consumers regarding who has made a product
Nomenclature, classification & codification:
Unique
Non Prohibited words
Non Registered words
Ambiguity in phonetics (Speech)
Length
Color
Background
Trademark font
Logo is the Name
Function of a Trademark
Identification of goods and services.
Guarantees of unchanged quality.
Advertise goods / services.
Creation of image for goods /services.
Method to distinguish the goods of a merchant from those of others
Features of Trademark Act, 1999
Trademark for services
Period for registration
Procedure are simplified
Page 19
Types of trademark
Product trademark
Service trademark
Certification trademark
Collective trademark
Different Types Available for Adoption
Any name (like APPLE).
An invented word
Letters or numerals
Devices or symbols
Combination of colors
Shape of goods
Page 20
Page 21
Page 22
Page 23
Since most software is easy to duplicate, and the copy is usually as good as original, the
Copyright Act was needed. Some of the key aspects of the law are:
According to section 14 of this Act, it is illegal to make or distribute copies of
copyrighted software without proper or specific authorization.
The violator can be tried under both civil and criminal law.
A civil and criminal action may be instituted for injunction, actual damages (including
violator's profits) or statutory damages per infringement etc.
Heavy punishment and fines for infringement of software copyright.
Section 63 B stipulates a minimum jail term of 7 days, which can be extended up to 3
years.
Page 24
Company Act
Company Law 1956
What is a company?
A Company is a voluntary association of persons formed for the purpose of doing
business, having a distinct name and limited liability.
They can be incorporated under the Companies Act (it may be any type of company)
Corporations enacted under special enactments ( Even those which are incorporated
outside India)
Any other body corporate notified by the central government
Features of a company
A company is considered as a separate legal entity from its members, which can conduct
business with all powers to contract.
Independent corporate entity (Saloman V. Saloman) It is independent of its members and
shareholders
Limited Liability ( either by share or guarantee)
It can own property, separate from its members. The property is vested with the company,
as it is a body corporate.
The income of the members are different from the income of the company ( Income
received by the members as dividends cannot be same as that of the company)
Perpetual succession: Death of the members is not the death of the company until it is
wound up
As it is a legal entity or a juristic person or artificial person it can sue and be sued
The company enjoys rights and liabilities which are not as that of the members of the
company
Page 25
But if the court feels that such veil has to been used for any wrongful purpose, the court
lifts the corporate veil and makes the individual liable for such acts which they should not
have done or doing in the name of the company
Page 26
Prevention of fraud or Improper conduct- The incorporation has been used for fraudulent
purpose, like defrauding the creditors, defeating the purpose of law etc..
Determination of the character of the company- Enemy Company or all the members
being the citizens of the enemy country. (Daimler Co. Ltd V. Continental Tyre & Rubber
Co. Ltd)
Types of Companies
Limited Company ( Limited by share or by guarantee)
Unlimited company
Government Company
Foreign Company
Private Company
Public Company
Limited Company
Limited by Shares- In such companies, the liability are only the amount which remains
unpaid on the shares.
Limited by Guarantee not having share capital-In this type of companies the
memorandum of Association limits the members liability. It will be based on the
undertaking that has been given in MOA for their contribution in case of a winding up.
Limited by guarantee having share capital- In such cases, the liability would be based on
the MOA towards the guaranteed amount and the remaining would be from the unpaid
sums of the shares held by the person concerned.
Unlimited Company
There is no limit on the liability of the members. The liability in such cases would extend
to the whole amount of the companys debts and liabilities.
Here the members cannot be directly sued by the creditors.
When the company is wound up, the official liquidator will call upon the members to
discharge the liability.
The details of the number of members with which the company is registered and the
amount of share capital has to be stated in the Articles of Association (AOA).
Government Company
When 51% of the paid up share capital is held by the government.
Page 27
The share can be held by the central government or state government. Partly by central
and partly by two or more governments.
As the legal status of the company does not change by being a government company,
there are no special privileges given to them.
Foreign Company
A company incorporated outside India, but having a place of business in India.
If it does not have a place of business in India but only has agents in India it cannot be
considered to be foreign company.
Private Company
A company which has a minimum of two persons. They have to subscribe to the MOA
and AOA
It should be have a minimum paid up capital of 1 lakh or more as prescribed by the
article.
The maximum number of members to be fifty ( it does not include members who are
employed in the company, persons who were formerly employed)
The rights to transfer the shares are restricted in the Private companies
It prohibits acceptance of deposits from persons other than its members, directors or their
relatives.
If two or more are holding one or more shares in a company jointly, they shall for the
purpose of this definition, be treated as a single member.
As there is no public accountability like a public company, there is no rigorous
surveillance.
Exemption and Privileges of a Private company
It can have a minimum of two members.
It can commence business immediately after obtaining certificate of incorporation.
It need not issue prospectus or statement in lieu of prospectus.
It can have a minimum of 2 directors.
It need not hold statutory meeting.
Public Company
Page 28
A Public company means a company which is not a private company and which has a
Conversion of Company
The Act provides for conversion of public company into a private company and vice
versa
A private company is converted into a public company either by default or by choice in
compliance with the statutory requirements.
Once the action for conversion takes place then, a petition can be filed with the central
government with the necessary documents for its decision on the matter of conversion
Incorporation of a Company
The persons who conceive an idea of a company decide and do the necessary work for
formation of a company is called the promoters of the Company.
The Promoters are the persons who decide on the formation of the company.
The promoters of a company stand undoubtedly in a fiduciary position though they are
not the agent or a trustee of a company. They are the ones who create and mould the
company.
They may have to enter into pre-incorporation contracts, which can be validated after the
incorporation of the company for obtaining certificate of incorporation.
Promoters
They can be remunerated for their services, but they have to enter into a contract before
the incorporation of the company through a pre incorporation of the company
Page 29
They will usually act as nominees or as the first directors of the company
They enter into contracts after the incorporation and before the commencement of
business.
But they need not compulsorily participate in the formation of the company.
Sometimes, a few persons may only act as professionals who help the promoters on
behalf of the company... Like the solicitor, chartered accountant etc.. and get paid for
their services.
The promoters in most of the cases decide as to What is the type of a company to be
formed?
In India promoters generally secure the management of the company that is formed and
have a controlling interest in the companys management
Legal Position of the Promoters
They cannot make profit at the expense of the company, which they have promoted
without the knowledge and consent of the company. In case they do so , they may be
compelled to account for it.
They cannot sell their property to the company at a profit unless all the material facts are
disclosed at the independent board of directors or the shareholders of the company.
If they do so, the company may repudiate the contract of sale or confirm the sale after
recovering the profit made by the promoter.
Promoters have the following liabilities under the Companies Act, 1956
They can be liable for non compliance of the provisions of the Act
Severe penalty may be imposed
The court may suspend the promoter from taking part
company
Liable for any untrue statement in the prospectus to the person who has subscribed for
any shares or debentures on the faith of the prospectus
The liabilities are .
a) To set aside the allotment of shares,
b) Sued for damages,
c) Sued for compensation
d) Criminal proceedings
Page 30
Memorandum of Association
It is the charter of the company
It contains the fundamental conditions upon which the company can be incorporated
It contains the objects of the companys formation
The company has to act within objects specified in the MOA
It defines as well as confines the powers of the company
Anything done beyond the objects specified in the MOA will be ultra vires. Their
transactions will be null and void
The outsider have to transact looking into the MOA
Conditions of the MOA
It should be printed
Divided into paragraph and numbers consecutively
Signed by at least seven persons or two in case of public and private company
respectively.
The signature should be in the presence of a witness, who will have to attest the signature
Members have to take shares and write the number of shares taken with full address
The MOA of the Limited Company
The name of the company with limited as the last word
The name of the state where the registered office of the company is to be situated
The objects of the company stating the Main objects and the other objects
Page 31
The declaration about the liability of the members is limited ( limited by shares or
guarantee)
The amount of the authorized share capital, divided into shares of fixed amounts.
The Compulsory Clauses in MOA
The Name Clause it decides on the name of the company based on the capital involved
The Registered Office Clause- where it has registered its head office and other branch
office ( The registered office can be changed with the permission of the ROC)
The Object Clause- Main object, ancillary object and the other objects of the company
are clearly specified (Ashbury Railway Carriage Co V. Riche). The applicable doctrine
here is the Doctrine of Ultra Vires beyond the powers of the company (opposed to
Intra Vires)
The Liability Clause- What is the liability of its members.. limited by shares or guarantee
or unlimited, there can be alteration in the liability clause
The Capital Clause - The amount of the nominal capital of the company, number of
shares in which it is to be divided alteration of the capital clause etc
The Association or Subscription clause- Where the subscribers to the MOA declare that
they respectively agree to take the number of the shares in the capital. It has to have the
following:
a) They have to sign in the presence of two witnesses, who attest the signatures,
b) The subscriber to take at least one share.
c) After the name the subscriber has to write the number of shares taken
Page 32
a) Injunction
b) Directors personal liability.
c) If a property has been purchased and it is an ultra vires act, the company can have a right
over that property.
d) The doctrine to be used exclusively for the companies interest.
e) But the others cannot use this doctrine as a tool to attack the company
Articles of Association
It is the companys bye- laws or rules to govern the management of the company for its
internal affairs and the conduct of its business.
AOA defines the powers of its officers and also establishes a contract between the
company and the members and between the members inter se
It can be originally framed and altered by the company under previous or existing
provisions of law.
AOA plays a subsidiary part to the MOA
Anything done beyond the AOA will be considered to be irregular and may be ratified by
the shareholders.
The content of the AOA may differ from company to company as the Act has not
specified any specific provisions
Flexibility is allowed to the persons who form the company to adopt the AOA within the
requirements of the company law
The AOA will have to be conversant with the MOA, as they are contemporaneous
documents to be read together.
Any ambiguity and uncertainty in one of them may be removed by reference to the other.
Contents of the AOA may be as follows:
Share capital
Lien on shares
Calls on shares
Transfer and transmission of shares
Forfeiture of the shares
Surrender of the shares
Page 33
General meetings
Alteration of the capital
Directors Etc...
Dividends and reserves
Account and audit
Borrowing powers
Winding up
Adoption of the preliminary contracts etc.
Page 34
Prospectus
It is an invitation issued to the public to purchase or subscribe shares or debentures of the
company.
Every prospectus must be dated. The date of publication and the date of issue must be
specifically stated in the prospectus.
The golden rule of the prospectus is that every detail has to be given in strict and
scrupulous accuracy. The material facts given in the prospectus are presumed to be true.
( New Brunswick and Canada Railway. Land & Co. Vs. Muggerridge).
Page 35
Every person including the person who is an expert and has authorized his name to be
issued with the prospectus
Remedies for misstatements in the prospectus
Relying on the prospectus if any person buys shares, the person may
Rescind the contract (only when there is misrepresentation relating to the material facts.
The rescission has to be done within a reasonable time
Claim damages- it can be claimed from the directors, promoters or other persons who has
authorized their name to be written during the issue of the prospectus
Share Capital
Share: Share is defined as an interest having a money value and made up of diverse
rights specified under the articles of association.
Share capital: Share capital means the capital raised by the company by issue of shares.
A share is a share in the share capital of the company including the stock.
Share gives a right to participate in the profits of the company, or a share in the assets
when the company is going to be wound up.
Other features of a share
A share is not a negotiable instrument, but it is a movable property.
It is also considered to be goods under the Sale of Goods Act, 1930.
The company has to issue the share certificate.
It is subject to stamp duty.
The Call on Shares is a demand made for payment of price of the shares allotted to the
members by the Board of Directors in accordance with the Articles of Association.
The call may be for full amount or part of it.
Share Certificate and Share Warrant
Share Certificate: The Share Certificate is a document issued by the company and is
prima facie evidence to show that the person named therein is the holder ( title) of the
specified number of shares stated therein.
Share certificate is issued by the company to the (share holder) allotted of shares.
Page 36
The company has to issue within 3 months from the date of allotment. In case of default
the allotted may approach the central government
Share Warrant: The share warrant is a bearer document issued by the company under its
common seal. As share warrant is a negotiable instrument, it is transferred by
endorsement and by mere delivery like any other negotiable instrument.
Kinds of shares
Preference shares- It can be further classified as
Participating preferential shares.
Cumulative preferential shares
Non Cumulative preferential shares
Redeemable Shares and Irredeemable Shares
Equity or ordinary shares
Shares at premium
Shares at discount
Bonus shares
Right shares
Transfer and Transmission of shares
AOA provides for the procedure of transfer of shares. It is a voluntary action of the
shareholder.
It can be made even by a blank transfer In such cases the transferor only signs the
transfer form without making any other entries.
In case it is a forged transfer, the transferors signature is forged on the share transfer
instrument.
Transmission of shares is by operation of law, e.g. by death, insolvency of the shareholder
etc.
Buy-Back of Securities
The company may purchase its securities back and it is popularly known as buy back of
shares
To do so, the company has to be authorized under the AOA.
Page 37
The company has to comply with the provisions of the Company law to buy back its
securities.
The listed company has to seek permission from the SEBI (SERA 1998). Specifically for
the private company etc, the Buy Back Securities Rules1999 will be applicable.
Dividends
The sharing of profits in the going concerns and the distribution of the assets after the
winding up can be called as dividends
It will be distributed among the shares holders
The dividends can be declared and paid out of Current profits Reserves Monies provided
by the government and the depreciation as provided by the companies. It can be paid after
presenting the balance sheet and profit and loss account in the AGM
Other than the equity shareholders, even the preferential shareholders can get the
dividends. Rather they are the first ones to get the dividends.
Dividends are to be only in cash, if otherwise specified in the AOA.
In exceptional cases, even the central government may permit the payment of interest to
shareholders, even though there is no profit.
Directors
The Legal Status of the director
The director occupies the position of a:
As a Trustee- In relation to the company
As Agents- When they act o n behalf of the company
As Managing Partner-As they are entrusted with the responsibility of the company
Qualification Shares
In case there is requirement as per the
AOA for the director is bound to buy qualification
shares. If acts are done by the director prior to he or she being disqualified, the acts are
considered to be valid.
Disqualifications
As per the company law, the following persons are disqualified from been appointed as a
director:
Unsound mind
An undercharged insolvent
Page 38
Appointment of Directors
The appointment can sometimes be by based on the proportional representation like
minority shareholders.
There can be alternate directors, additional directors, casual directors.
The third parties can appoint the directors
Other than the shareholders and the first directors ,the central government and
NCLT may also appoint directors.
Duties and Liabilities of the Directors
Fiduciary Duties
To act honestly and with good faith
Not to use confidential information of the company for their own purpose
Duty of Care and to act reasonably while acting for the company
Statutory Duties
Not to contract with company, where he/she or his relative has an interest in the
contract
where he/she has a interest, they need to inform the board or seek prior approval
while entering into contract, otherwise the contract is voidable
Duty to attend and convene meetings
Duty not to delegate
The directors liabilities
The liability of the directors can be either civil or criminal.
Page 39
If provided in the MOA, the liability may be unlimited, for a limited company, otherwise
it may be altered.
Liability may be for breach of fiduciary duties
The directors are personally liable for the following:
a) Ultra vires acts
b) Malafide acts
c) Negligent acts
d) Liability for the acts of third parties
Criminal Liability
Liability of the director for any untrue statement in the prospectus
Inviting any deposits in contravention of the law
Liability for false advertisement
Failure to repay the application money, which was excess
Concealing the names of the creditors
Failure to lay the balance sheet.
Failure to provide information to the auditor etc
Company Meetings
A meeting may be convened by the director, requisitions, or the NCLT
Notice to be given by the secretary after the time and place have been fixed by the
directors
Even the shareholders can call a meeting as an extraordinary general meeting (EGM)
The NCLT can call an Annual General Meeting (AGM)
Classification of Meetings
Shareholders meetings
a) Statutory meetings ( which happens only once in the lifetime of the company)
b) EGM- Convened to transact some special or important decision to be taken
c) Class meetings- This is the meeting of the shareholders- which is convened by the class
of shareholders based on the kind of shares they hold.
Page 40
AGM-it can be conducted based on the provisions given in the Articles or by passing a
resolution in one AGM for the subsequent AGMs
Board Meetings- This is conducted for the smooth running of the company and for
collectively taking the decisions. The meetings may be conducted to call on shares, issue
debentures, borrow money, to make loans, To invest the funds etc
How to conduct meeting?
Written notice to be given
Notice to be issued under the authority of the company
In case of failure to give a notice, the persons concerned may be punished with fine and
the proceedings of the meeting will be rendered invalid.
Resolution
A motion when passed is called a resolution.
The resolution in the General body meetings can be an ordinary resolution (Simple
Page 41
It has been broadly defined as all forms of capital reorganizations either by consolidation
of shares or division of shares or both
Reorganization and arrangement are done when there is only one company is involved
Reconstruction can be effectively done through a compromise or arrangement.
To do so the meeting or the members or the separate class of the shareholders has to be
conducted or in case of winding up the meeting to be called by the liquidator
Even a banking company (sick bank) may be reconstructed or amalgamated by the
central government on the basis of the Reserve Banks application for a fixed period of
time.
The reconstruction or amalgamation can be done with any other banking institution.
Scheme to be approved
Any kind of scheme to be accepted, it has to get approval from the members or the
members may reject the scheme.
After the scheme is approved by voting, the court has to sanction the scheme or reject, if
it is against the public interest or if it feels that the scheme is not beneficial.
The legal provisions vary based the mode of scheme adopted by the company.
Page 42
In a merger- one of the companies loses its corporate existence and the survivor company
acquires the assets as well as the liabilities of the merger company.
In acquisition, it is acquiring the ownership in the property is the purchase of a
controlling interest in the share capital of another existing company. It is an act of
acquiring asset and management of the company.
Winding up
It is the process whereby the life of the company is ended and its property is administered
for the benefit of its creditors and members.
During this process a liquidator is appointed to take control of the company. The
liquidator will be responsible for the assets, debts and final distribution of the surplus to
the members.
It is the process for discharge of liabilities and returning the surplus to those who are
entitled for it.
But even a company which is making profit can be wound up is the special feature of
winding up, which is different from that of the process of insolvency.
The just and equitable grounds can be like loss of substratum, where there is dead lock in the
management, etc
Page 43
Page 44