Professional Documents
Culture Documents
How should we understand concepts like legal rights and legal obligations or
duties
what is justice?
There are various theories in legal jurisprudence. According to the natural law theory
of jurisprudence, all laws enacted by an authority must closely correspond to natural
law, which is based on morality and the concept of 'general goods'. Laws prohibiting
or regulating child pornography have emerged from the fact that in general human
being find this type of pornography against public morality and decency.
According to legal positivism laws are made in accordance with socially accepted
rules. This view believes that laws may seek to enforce justice, morality, or any other
normative end, but their success or failure in doing so does not determine their
validity. This view believes that law is nothing more than a set of rules to
provide order and governance in society.
It was established way in 1854 in England that
"......... for the sure and true interpretation of all Statutes in general (be they penal or
beneficial, restrictive or enlarging of the common law) four things are to be discerned
and considered :1st. What was the common law before the making of the Act.,
2nd. What was the mischief and defect for which the common law did not provide.,
3rd. What remedy the Parliament hath resolved and appointed to cure the disease of
the Common wealth., and
4th. The true reason of the remedy; and then the office of all the judges is always to
make such construction as shall suppress the mischief, and advance the remedy, and
to suppress subtle inventions and evasions for continuance of the mischief, and pro
privato commodo, and to add force and life to the cure and remedy, accordingto the
true intent of the makers of the Act, probono publico".
Case law is the law that is established through the decisions of the courts and other
officials. Case law assumes even greater significance when the wordings of a
particualr law are ambiguos. the interpretation of the courts helps clarify the real
objectives and meaning of such laws.
State decisis (what is taken from the lating phrase stare decisis et quieta movere which
means "maintain what has been decided and do not alter that which has been
established") is the legal principle by which judges are obliged to obey the precedents
established by prior decisions.
3
The relevance of the principle of stare decisis has been discussed by many courts.
In Bengal Immunity co. V. state of Bihar, das
There is nothing in our Constitution which prevents us from departing from a previous
decision if we are convinced of its error and its baneful effect on the general interests
of the public
Cyber crime
Electronic commerce
The first comprehensive international effort dealing with the criminal law problems of
computer crimes was initiated by the ORGANISATION FOR ECONOMIC COOPERATION AND DEVELOPMENT (OECD)
The minimum list of offences for which uniform criminal policy on legislation
concerning computer related crimes had been achieved enumerates the following
offences:
1. COMPUTER FRAUD- The input, alteration, erasure or suppression of
computer data or computer programs, or other interference with the courses of
data processing that influences the result of data processing, thereby causing
economic or possessory loss of property of another person with the intention
of procuring an unlawful economic gains or for another person
2. COMPUTER FORGERY- The input, altercation erasure or suppression of
computers data or computer programs. or other interference with the course of
data processing in a manner or under such conditions, as prescribed by
national law that it would constitute the offence of forgery if it had been
committed with respect to a traditional object of such an offence
3. DAMANGE TO COMPUTER DATA OR COMPUTER PROGRAMSThe erasure, damaging deteriorate or suppression of computer program
without rights
4. COMPUTER SABOTAGE-The erasure, damaging deteriorate or suppression
of computer programs or other interference with computer system with the
intent to hinder the functions of a computer or a telecommunication system
5. UNAUTHORISZED ACCESS-The access without right to a computer
system or network by infringing security measures
6. UNAUTHORIZED INTERCEPTION-The interception made without right
and by technical means of communication to form and within a computer
system or network
7. UNAUTHORIZED REPRODUCTION OF A PROTECTED
COMPUTER PROGRAMS-The reproduction distribution or communication
5
Now consider that Riyaz has shifted to an online business. He sits in his house in
Lucknow and uses his computer to create pirated versions expensive software. He
then sells this pirated software through a website (hosted in china). People from all
over world can visit Riyazs website and purchase the pirated software. Riyaz collects
the money using a paypal account that is linked to his bank account in a tax haven
country like the cayman island.
It would be extremely difficult for any government to trace Riyazs activities.
8
It is for these and other complexities that conventional law is unfit to handle issues
relating to cyberspace. This brings in the need for a separate branch of law to tackle
cyberspace.
2002:
An executive order dated 12th september 2002 contained instructions relating
provisions of the act with regard to protected system and application for the issues of
a digital signature certificate.
Next were the Guidelines for submission of certificates and certification revocation
lists to the Controller of Certifying Authorities for publishing in National Repository
of Digital Certificates. These were issued on 16th december 2002.
The Information Technology Act was amended by the Negotiable Instruments
(Amendments and Miscellaneous Provisions) Act, 2002. This introduced the concept
of electronic cheque and truncated cheques.
2003:
On 17th march 2003, the Information Technology (Qualification and Experience of
Adjudicating Officers and Manner of Holding Enquiry) Rules, 2003 were passed.
These rules prescribe the qualification required for adjudicating officers. Their chief
responsibilities under the IT act is to adjudicate cases such as unauthorised access,
unauthorised copying of data, spread of viruses, denial of service attacks. Disruption
of computers, computer manipulation etc. these rules also prescribe the manner and
mode of inquiry and adjudication by these officers.
The Bombay high court, in its order dated 9th october 2002, directed the central
10
2009:
The Information Technology (Amendment) Act, 2008 which came into force on 27th
october, 2009 has made sweeping changes to the informtion technology act. The
following rules have also come into force on 27th october 2009:
(1) Information Technology (Procedure and Safeguards for Interception, Monitoring
and Decryption of Information) Rules, 2009.
(2) Information Technology (Procedure and Safeguard for Monitoring and Collecting
Traffic Data or Information) Rules,2009
(3) Information Technology (Procedure and Safeguards for Blocking for Access of
Information by Public) Rules, 2009.
(4)the Cyber Appellate Tribunal (Salary, Allowances and Other Terms and Conditions
of Service of Chairperson and Members)Rules, 2009.
11
2011:
Information Technology (Reasonable security practices and procedures and sensitive
personal data or information) Rules,2011 passed. These rules define sensitive personal
data or information and from the crux of indias data privacy law.
14
17
Case laws
(B.S.N.L.)
The petitioner is an employee B.S.N.L, working as a Telecom Technical Assistant
(Switch). It so happened that while he was working in SIPCOT MBM Main
Exchange, Keeranur, the B.S.N.L. higher officials suspected him and others for
having committed offences in manipulating the computer system and thereby causing
loss to B.S.N.L. Fir was registered under for the offences under Section 406, 420 and
468 I.P.C. and 43(g) of the Information Technology Act, 2000.
The main thrust of the grievance of the petitioner in this case is that when there is a
special enactment namely, the Information Technology Act, 2000, which is in
operation relating to the alleged misconduct attributed as against the petitioner, there
is no question of invoking the penal sections under the Indian Penal Code, It is also
18
his specific plausible argument that section 43(g) of the Information Technology Act,
2000, has been invoked without any basis.
The point for consideration is as to whether the FIR referred to supra, has to be
declared null and void as prayed by the Writ petitioner?
It was held that The Section 43(g) of the Information Technology Act, 2000, invoked
by the police and specified in the FIR is declared void. Accordingly, the Writ petition
is ordered. No costs, connected M.P. is closed.
2005 712.
The case relates to exploitation of certain men and women by one of the accused Dr.
L. Prakash for the purpose of making pornographic photos and videos in various acts
of sexual intercourse and thereafter selling them to foreign websites.
The accused facing trail for offences punishable under Section 67 of Information
Technology Act, 2000 r/w Section 6 of Indecent Representation of Women
(prohibition) Act, 1986, Under Section 5 & 6 of Immoral Traffic (Prevention) Act,
1956.
(Del)
The case is related to the publishing of pornographic material. The accused was
involved in the making and publishing of lascivious material. Sections involved are:
Section 67 of the Information Technology Act, 2000 an offence is committed by a
person who publishes or transmits any material which is lascivious or appeals to the
prurient or transmits any material which is lascivious or appeals to the prurient
19
interest. Sections 292 and 294 of the Indian Penal Code have also been mentioned
which contemplate the selling, letting on hire, distribution pr public exhibition of the
absence matter.
20