SlideShare une entreprise Scribd logo
1  sur  59
Dr. Tabrez Ahmad
               Professor of Law
       site.technolexindia.com
http://technolex.blogspot.com
   tabrezahmad7@gmail.com
Agenda
 1.      Digital Revolution and Its Effect on Management of
          Rights and Obligations
   2.    Rights and Duties in Cyberspace
   3.    Cyber trespass
   4.    Privacy in Cyberspace
   5.    Cyber libel
   6.    Cyber stalking
   7.    Spamming
   8.    Cybersquating
   9.    Data Protection and Identity theft
   10.   Protection of Content on Websites
   11.   Vicarious Liability of ISPs
   12.   Jurisdiction
   13.   Cases
   14.   Legislations
   15.   Future course of action

                                             Dr. Tabrez Ahmad, Blog:
                                             http://technolexindia.blogspot.com,   2
Three Outstanding Features Which Make
Digital Revolution Unique are the resultant

1. Cyberspace
2. Knowledge Economy
3. Speed with which it has transformed industrial
   economy into a knowledge Economy




                Dr. Tabrez Ahmad, Blog:               3
                http://technolexindia.blogspot.com,       3
Vanishing Borders In Cyberspace
• Sovereignty and exercise of Jurisdiction which are
  attributes of statehood are linked to territorial nexus
• In Cyberspace territorial boundaries are meaningless
• Internet address has no relation to the physical
  location of the computer or its user
• Law implies the application of coercive force but this
  is not feasible over individuals not within the
  territory


               Dr. Tabrez Ahmad, Blog:
               http://technolexindia.blogspot.com,     4
Anonymity And Pseudo-anonymity
 • Cyberspace        permits                anonymity   and   pseudo
  anonymity
 • Users can mask their real flesh and blood
  identities and assume digital avtars
 • anonymous remailers facilitate sending messages
  without revealing their identity or origin


                Dr. Tabrez Ahmad, Blog:
                http://technolexindia.blogspot.com,                5
Challenge Of Cyberspace
 Cyberspace calls into question many traditional
 legal conceptions like
 • Ownership and Fair Use
 • Balance of Freedom of expression-Reputation-
 Privacy
 • Balance of Rights-Liability of Netizens and ISP
 • Property etc
              Dr. Tabrez Ahmad, Blog:
              http://technolexindia.blogspot.com,    6
Influence Of US Constitutional And
Legal Doctrines On Growth Of
Cybertort
  Internet is a product of US Technology, so issues
  relating to Internet are heavily flavoured by US
  Constitutional and Legal doctrines




              Dr. Tabrez Ahmad, Blog:
              http://technolexindia.blogspot.com,     7
Two Schools Of Thought On
Governance Of Cyberspace
Regulation skeptics Governments should not
regulate Cyberspace
Reasons
• Laws involved on geographical basis have no
   application to cyberspace which is borderless
• Cyberspace transactions occur simultaneously in
   all jurisdictions assumption of jurisdiction by
   multiple states will lead to jurisdictional mayhem
• Architecture of Cyberspace precludes previous
   notice of applicable laws
              Dr. Tabrez Ahmad, Blog:
              http://technolexindia.blogspot.com,   8
Relationship Between Law And
Social Change
“The controversy between those who believe that law
should essentially follow and not lead and it should do
so clearly formulated social sentiment and those who
believe that law should be determined agent in the
creation of new social norms is one of the recurring
themes in the history of legal thought”

Professor Wolfgang Friedmann – Law in the
                               Changing Society

               Dr. Tabrez Ahmad, Blog:
               http://technolexindia.blogspot.com,   9
Digital Revolution Giving Way To
Cybertort
   The notion behind cybertort is that the Internet
   has created a connectedness that was not
   present previously
    Few areas of tort are most impacted by the
     Internet




             Dr. Tabrez Ahmad, Blog:
             http://technolexindia.blogspot.com,       10
Dis-balance of Right Duty
Co-relation due to Internet



     A Right Duty Co-relation                   B



          Dr. Tabrez Ahmad, Blog:
          http://technolexindia.blogspot.com,       11
2.   Rights and Duties in
         Cyberspace
          These include the right to:

            be free from any harm to system.

                     enjoy a good reputation

 conduct business without unwarranted interference




       Dr. Tabrez Ahmad, Blog:
       http://technolexindia.blogspot.com,       12
2. Rights and Duties in
   Cyberspace
        The law imposes a duty on all of us
          to respect the rights of others.
            Tort law governs this interplay
              between rights and duties.



        Dr. Tabrez Ahmad, Blog:
        http://technolexindia.blogspot.com,   13
3. Cyber trespass
  Trespass to Property
   Cybersquating
   Software piracy
   Infringement to database
   Infringement of the Contents on website
   Linking- Surface and Deep
   File sharing
     Napster Case
     Gnutella
     Kazaa
     Grokster case


               Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com,   14
3. Cyber Trespass Cont…
Trespass to person
 Breach of Cyber Privacy
   Identity Theft
   Phishing
   Cyberstalking
   Spamming
   Hacking-Magic Lantern Technique
 Cyber libel


                Dr. Tabrez Ahmad, Blog:
                http://technolexindia.blogspot.com,   15
4. Privacy in Cyberspace
 Privacy is deeply rooted in history and religion
 Several religious scriptures, texts and classical right-
  ups recognize the importance of privacy
 There is a recognition of privacy in the Quran and the
  sayings of Prophet Mohammed
( Surah An-Noor 24:27, 24:28, Surah Al-Hujraat 49:12)
 The Bible has numerous references to privacy and
 The Jewish law has long recognized the concept of
  ‘freedom from being watched’
                Dr. Tabrez Ahmad, Blog:
                http://technolexindia.blogspot.com,          16
4. Privacy in Cyberspace cont…
  The term ‘privacy’ has been described as “the rightful
  claim of the individual to determine the extent to
  which he wishes to share of himself with others. It
  means his right to withdraw or to participate as he sees
  fit. It also means the individual’s right to control
  dissemination of information about him.”




                Dr. Tabrez Ahmad, Blog:
                http://technolexindia.blogspot.com,          17
4.Privacy in Cyberspace cont…
  Fifty years ago, George Orwell, the English writer whose
   fears for the loss of individual liberty dominated his
   novels, imagined a totalitarian state where advanced
   technologies would be used to monitor the people in all
   their endeavors
  “Big brothers would be watching us and the privacy would
   be a thing of the past”.
 Orwell’s fears stands somewhat true in this era of
   Information and Communication Revolution (ICR)




                Dr. Tabrez Ahmad, Blog:
                http://technolexindia.blogspot.com,           18
4. Privacy in Cyberspace cont…
 The new technologies have enhanced the possibilities
  of invasion into the privacy of individual and provided
  new tools in the hands of eavesdroppers.
 Individual privacy is at greater stake than ever before.




               Dr. Tabrez Ahmad, Blog:
               http://technolexindia.blogspot.com,           19
4. Privacy in Cyberspace cont…
 International Convention
    UDHR- Art. 12
    International Convention on Civil and Political rights
     (ICCPR) -Art. 17
    UN Convention on Migrant Workers (UNCMW)-Art 14
    UN convention on Protection of the Child (UNCPC)-
     Art- 16
    European convention for the protection of Human
     Rights and Fundamental Freedoms 1950- Art. 8
    American Convention on Human Rights- Art. 11
               Dr. Tabrez Ahmad, Blog:
               http://technolexindia.blogspot.com,            20
4. Privacy in Cyberspace cont…
Right to Privacy under Indian Constitution
   Art.21
   Art. 19 (2)
   The court recognizes two aspects of privacy :
   1. the tortuous law of privacy which affords an action for
    damages resulting from an unlawful invasion of
    privacy, and
   2. the constitutional right to be let alone implicit in the
    right to life and liberty under Art. 21


                  Dr. Tabrez Ahmad, Blog:
                  http://technolexindia.blogspot.com,             21
4. Privacy in Cyberspace cont…
Right to privacy under tort law
 In 1890, American Lawyers Samuel Warren and Louis
  Brandeis wrote a seminal piece on the right to privacy as “
  the right to be left alone”
 Today we find four distinct common law torts that are
  available as remedy for breach of privacy
These are:
 Intrusion upon seclusion
 Appropriation of name or likeness
 Publicity given to private life
 Publicly placing a person in false light
                 Dr. Tabrez Ahmad, Blog:
                 http://technolexindia.blogspot.com,            22
4.     Privacy in Cyberspace cont…

Information Technology Act 2000

      Sec. 43-47         Civil Liability
      Sec. 65-78         Criminal Liability
      Sec. 79            Vicarious Liability of ISPs


                 Dr. Tabrez Ahmad, Blog:
                 http://technolexindia.blogspot.com,    23
5. Cyber Libel

 Reputation-damaging statements or publications can be
  made anywhere in cyberspace, potentially unlimited
  audience:
 • Websites
 • Blogs
 • Message Boards
 • Chat Rooms
 • Email
 • Online Journals
 • Use of Hyperlinks
              Dr. Tabrez Ahmad, Blog:
              http://technolexindia.blogspot.com,        24
5. Cyber Libel Cont…
 Online Defamation: An online message attacking
 another person or entity in harsh, often personal, and
 possibly defamatory, terms. Online defamation is difficult
 to combat because:
   the Communications Decency Act of 1996 absolves
    Internet service providers (“ISPs”) from liability for
    disseminating defamatory material
   the Internet affords a high degree of anonymity to the
    person who posted the defamatory message.


              Dr. Tabrez Ahmad, Blog:
              http://technolexindia.blogspot.com,             25
5. Cyber Libel Cont…

   Defamation--can be oral or written
       By and large cyberspace defamation is written so libel
        standards apply
       Defamation requires a showing that
          The defendant made or repeated false statements

          that were witnessed by third parties, and

          Harmed the reputation of the plaintiff

       If the media is the defendant and the pl. is a public
        figure, the pl. must show that the def. knew or should
        have known that the statements were false
                 Dr. Tabrez Ahmad, Blog:
                 http://technolexindia.blogspot.com,             26
5. Cyber Libel Cont…
  The crucial issue in cyberspace defamation cases is
  how to treat ISPs
   If the ISP is treated as a publisher, then they have
    tremendous liability exposure
   If the ISP is treated as a bookstore, then they are
    basically not liable for the contents of those using
    their service unless they contribute to the content of
    the message
      Bookstores are treated as distributors of the
       material and are not liable unless they knew or
       should have known that the material they transmit
       is defamatory
              Dr. Tabrez Ahmad, Blog:
              http://technolexindia.blogspot.com,            27
5. Cyber Libel Cont…
    In the early cases, liability of the ISP was based on whether
     the ISP supervised the content of the users of their service
       The unfortunate result was that ISPs that tried to clean
        up content of users in terms of obscenity, were liable for
        defamatory content of other users
    Congress did not like this outcome so they passed the
     Communications Decency Act (CDA) of 1996
       Section 230(C) of the CDA provides that no

       “… provider or user of an interactive computer service
        shall be treated as the publisher or speaker of any
        information provided by another information content
        provider.”
                 Dr. Tabrez Ahmad, Blog:
                 http://technolexindia.blogspot.com,          28
6. Cyber stalking




        Dr. Tabrez Ahmad, Blog:
        http://technolexindia.blogspot.com,   29
 Threatening Communications/
  CyberHarrassment/Cyberstalking




            Dr. Tabrez Ahmad, Blog:
            http://technolexindia.blogspot.com,   30
7. Spamming
 Spam: Bulk, unsolicited e-mail or newsgroup postings –
 usually an advertisement for the “spammer’s” product or
 service sent to all users on an e-mailing list or
 newsgroup.
   Some states regulate or prohibit the use of
    spam, giving recipients of unwanted spam, and even
    ISPs, legal bases for blocking spam and for recovering
    against spammers.
  Who should be liable for “spam” and computer viruses
    that cause injury?
   Federal CAN-SPAM Act 2003.


              Dr. Tabrez Ahmad, Blog:
              http://technolexindia.blogspot.com,        31
What is Phishing?
--- listening to music by the band called Phish
--- a hobby, sport or recreation involving the ocean, rivers or
streams…nope

           “Fishing for personal information”
      Use “spoofed” e-mails and fraudulent
       websites designed to fool recipients into
       divulging personal financial data such as
       credit card numbers, account usernames and
       passwords, social security numbers, etc.
         Anti-Phishing Working Group
          http://www.antiphishing.org/


                    Dr. Tabrez Ahmad, Blog:
                    http://technolexindia.blogspot.com,           32
Prevent Phishing
  from Fraud Watch International

 Never click on hyperlinks                     Keep computer clean from
 Use Anti-SPAM filters                          Spyware
 Use Anti-Virus Software                       Know Fraudulent activity on
 Use personal firewalls
                                                 the Internet
                                                Check your credit report
 Keep all software updated
                                                 immediately for free!
 Always look for https and
                                                If unsure, ask!
  sites that ask for “personal
  information”



                 Dr. Tabrez Ahmad, Blog:
                 http://technolexindia.blogspot.com,                      33
What is ID Theft?

“Identity theft is a crime in which an imposter obtains key
 pieces of information such as Social Security and driver's
 license numbers and uses it for their own personal gain.”

              ID Theft Resource Center
      http://www.idtheftcenter.org/index.shtml




              Dr. Tabrez Ahmad, Blog:
              http://technolexindia.blogspot.com,         34
What is Spyware?
Any technology that aids in gathering information
 about a person or organization without their
 knowledge. On the Internet (where it is
 sometimes called a spybot or tracking
 software), spyware is programming that is put in
 someone's computer to secretly gather
 information about the user and relay it to
 advertisers or other interested parties.


             Dr. Tabrez Ahmad, Blog:
             http://technolexindia.blogspot.com,    35
What is Adware?
Any software application in which advertising
 banners are displayed while the program is
 running. The authors of these applications
 include additional code that delivers the ads,
 which can be viewed through pop-up windows or
 through a bar that appears on a computer
 screen.



            Dr. Tabrez Ahmad, Blog:
            http://technolexindia.blogspot.com,   36
CYBERSQUATTING: Anti Cybersquatting Consumer
Protection Act (ACPA) Under 15 USC 1125(d)(1)(A):
 The registration of a domain name with bad faith
  intent to profit from the mark of another.
 Taking another’s trademark as your secondary level
  domain name constitutes the act of Cybersquatting.
 This is as much an act of piracy as copyright or patent
  infringement.




                  Dr. Tabrez Ahmad, Blog:
                  http://technolexindia.blogspot.com,       37
Cybersquatting Elements:
 Registers, traffics in, or uses a domain name
    of
   a mark that is distinctive at the time of registration of
    the domain name
   that is identical or confusingly similar to that mark or
   of a famous mark that is famous at the time of
    registration of the domain name,
   is identical or confusingly similar to or dilutive of that
    mark.
   With the bad faith intent to profit from that mark
                  Dr. Tabrez Ahmad, Blog:
                  http://technolexindia.blogspot.com,            38
Cybersquatting Bad Faith Intent to Profit - Factors:
 The trademark & intellectual property rights of the
    parties
   The extent the Domain Name consists of another’s
    mark or name
   Prior uses if any of the Domain Name in offering
    goods/services
   Any “fair use” factors like non-profit
   An intent to divert traffic (users) to another site than
    the trademark owner’s.
   Intent to Dilute
   Offering to sell the Domain Name.
                 Dr. Tabrez Ahmad, Blog:
                 http://technolexindia.blogspot.com,           39
What is Identity Theft?




        Dr. Tabrez Ahmad, Blog:
        http://technolexindia.blogspot.com,   40
9. Data Protection and Identity
Theft

Conversion of Data or Information

 Test: Is there an unauthorized or wrongful exercise of
  dominion and control over personal property?
 • Thyroff v. Nationwide Mut. Ins. Co., 8 N.Y.3d 283 (N.Y.
  2007)–common law conversion applies to electronic
  data



               Dr. Tabrez Ahmad, Blog:
               http://technolexindia.blogspot.com,         41
Identity Theft
 Identity theft is a crime of stealing key pieces of
 someone’s identifying information, such as:
 name,
 address,
 Social Security number,
 birth date, and
 mother’s maiden name



                Dr. Tabrez Ahmad, Blog:
                http://technolexindia.blogspot.com,    42
If You’re a Victim...
1. Contact the fraud departments of the three
   major credit bureaus.


2. Contact creditors or financial institutions for
   any accounts that have been tampered with.


3. File a report with local police or police where
   the theft took place.



        Dr. Tabrez Ahmad, Blog:
        http://technolexindia.blogspot.com,     43
10. Protection of content on
Websites
 File sharing
  Napster Case
  Gnutella
  Kazaa
  Grokster




              Dr. Tabrez Ahmad, Blog:
              http://technolexindia.blogspot.com,   44
11. Liability of Internet Service
 Providers (ISPs)

 Should an Internet Service Provider (ISP) be liable
  for the actions of its subscriber?




                Dr. Tabrez Ahmad, Blog:
                http://technolexindia.blogspot.com,     45
13. Imp. Legislations
 UNCITRAL Model Law of E-Commerce
 World summit on Information Society( WSIS)
 United Nations Commission on Trade and
  Development( UNCTAD)
 Council of Europe (European Convention on Cyber
  Crime 2001)
 World Trade Organisation ( WTO), TRIPS etc.
 World Intellectual Property
  Organisation, WCT, WPPT
             Dr. Tabrez Ahmad, Blog:
             http://technolexindia.blogspot.com,    46
Indian Legislations
 Information Technology Act 2000., came into force on
  17th October 2000.
 Information Technology (Amendment Act 2008) came
  into force on 27th October 2009.




              Dr. Tabrez Ahmad, Blog:
              http://technolexindia.blogspot.com,        47
IT Act 2008 Amendment Act
 Some of the major modifications are:
 1. A special liability has been imposed on call
  centers, BPOs, banks and others who hold or
  handle sensitive personal data. If they are negligent
  in "implementing and maintaining reasonable security
  practices and procedures", they will be liable to pay
  compensation. It may be recalled that India's first
  major BPO related scam was the multi crore MphasiS-
  Citibank funds siphoning case in 2005. Under the new
  law, in such cases, the BPOs and call centers could also
  be made liable if they have not implemented proper
  security measures.
               Dr. Tabrez Ahmad, Blog:
               http://technolexindia.blogspot.com,       48
 2. Compensation on cyber crimes like spreading
  viruses, copying data, unauthorised access, denial of
  service etc is not restricted to Rs 1 crore anymore. The
  Adjudicating Officers will have jurisdiction for cases
  where the claim is upto Rs. 5 crore. Above that the case
  will need to be filed before the civil courts.
 3. The offence of cyber terrorism has been specially
  included in the law. A cyber terrorist can be punished
  with life imprisonment.
 4. Sending threatening emails and sms are punishable
  with jail upto 3 years.
               Dr. Tabrez Ahmad, Blog:
               http://technolexindia.blogspot.com,       49
 5. Publishing sexually explicit acts in the electronic form is
  punishable with jail upto 3 years. This would apply to cases
  like the Delhi MMS scandal where a video of a young couple
  having sex was spread through cell phones around the
  country.
 6. Voyeurism is now specifically covered. Acts like hiding
  cameras in changing rooms, hotel rooms etc is punishable
  with jail upto 3 years. This would apply to cases like the
  infamous Pune spycam incident where a 58-year old man
  was arrested for installing spy cameras in his house to
  'snoop' on his young lady tenants.
 7. Cyber crime cases can now be investigated
  by Inspector rank police officers. Earlier such offences could
  not be investigated by an officer below the rank of a deputy
  superintendent of police.

                   Dr. Tabrez Ahmad, Blog:
                   http://technolexindia.blogspot.com,             50
 Collecting, browsing, downloading etc of child
  pornography is punishable with jail upto 5 years for
  the first conviction. For a subsequent conviction, the
  jail term can extend to 7 years. A fine of upto Rs 10 lakh
  can also be levied.
 9. The punishment for spreading obscene material by
  email, websites, sms has been reduced from 5 years jail
  to 3 years jail. This covers acts like sending 'dirty' jokes
  and pictures by email or sms.
 10. Refusing to hand over passwords to an authorized
  official could land a person in prison for upto 7 years.
                 Dr. Tabrez Ahmad, Blog:
                 http://technolexindia.blogspot.com,             51
 11. Hacking into a Government computer or
  website, or even trying to do so in punishable with
  imprisonment upto 10 years.
 12. Rules pertaining to section 52 (Salary, Allowances
  and Other Terms and Conditions of Service of
  Chairperson and Members),
 13. Rules pertaining to section 69 (Procedure and
  Safeguards for Interception, Monitoring and
  Decryption of Information),

               Dr. Tabrez Ahmad, Blog:
               http://technolexindia.blogspot.com,         52
 14. Rules pertaining to section 69A (Procedure and
  Safeguards for Blocking for Access of Information by
  Public),
 15. Rules pertaining to section 69B (Procedure and
  safeguard for Monitoring and Collecting Traffic Data or
  Information) and
 16. Notification under section 70B for appointment of
  the Indian Computer Emergency Response Team.
 17. Rules Rules pertaining to section 54 (Procedure for
  Investigation of Misbehaviour or Incapacity of
  Chairperson and Members),
               Dr. Tabrez Ahmad, Blog:
               http://technolexindia.blogspot.com,          53
14. Imp. Cases
 Yahoo Inc. v. Akash Arora
 Styam infoway v. Siffy
 Napster Case USA
 Grokster case USA




               Dr. Tabrez Ahmad, Blog:
               http://technolexindia.blogspot.com,   54
Cyber trespass

Cases
 Thrifty-Tel, Inc. v. Bezenek, 46 Cal. App. 4th 1559 (Cal.
  App. 1996) (hacking)
 • Intel Corp. v. Hamidi, 71 P.3d 296 (Cal. 2003) (email)
 • CompuServe, Inc. v. Cyber Promotions, Inc., 962 F.
  Supp. 1015 (S.D. Oh. 1997) (commercial email)
 • ebay, Inc. v. Bidder’s Edge, Inc., 100 F. Supp. 2d 1058
  (N.D. Cal. 2000) (“

                Dr. Tabrez Ahmad, Blog:
                http://technolexindia.blogspot.com,           55
Dr. Tabrez Ahmad, Blog:
http://technolexindia.blogspot.com,   56
15. Future course of action
• LEGAL PROBLEMS OF THE NEW
  TECHNOLOGY

• APPLICATION OF JURISPRUDENTIAL
  CONCEPTIONS TO CYBERSPACE.

• Forensic Computing- Forensic Evidence

             Dr. Tabrez Ahmad, Blog:
             http://technolexindia.blogspot.com,   57
Dr. Tabrez Ahmad, Blog:
http://technolexindia.blogspot.com,   59

Contenu connexe

Tendances

English in written
English in writtenEnglish in written
English in written
azhar manap
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
Suryakanta Rout
 

Tendances (20)

111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
English in written
English in writtenEnglish in written
English in written
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 

En vedette (6)

E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)
 
E contracts busines law
E contracts busines lawE contracts busines law
E contracts busines law
 
Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting Presentation
 
E commerce & contracts
E commerce & contractsE commerce & contracts
E commerce & contracts
 
E contracts
E contractsE contracts
E contracts
 
Types of electronic contracts
Types of electronic contractsTypes of electronic contracts
Types of electronic contracts
 

Similaire à Cybertort Imp Slides For Pub. Internet

Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
Ganesh Chindanuru
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Prof. (Dr.) Tabrez Ahmad
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
larkinsa
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & Technology
Mathias Klang
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
James Bollen
 

Similaire à Cybertort Imp Slides For Pub. Internet (20)

Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
Future of Intellectual Property and the Commons: Friends or Foes
Future of Intellectual Property and the Commons: Friends or FoesFuture of Intellectual Property and the Commons: Friends or Foes
Future of Intellectual Property and the Commons: Friends or Foes
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial ResponseCyber Crime Scenario in India and Judicial Response
Cyber Crime Scenario in India and Judicial Response
 
Cyber Crimes.pdf
Cyber Crimes.pdfCyber Crimes.pdf
Cyber Crimes.pdf
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Cyber law
Cyber lawCyber law
Cyber law
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & Technology
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 

Plus de Prof. (Dr.) Tabrez Ahmad

Plus de Prof. (Dr.) Tabrez Ahmad (20)

Plagiarism & internet
Plagiarism & internetPlagiarism & internet
Plagiarism & internet
 
Tabrez agro supply chain conf 7 oct 2016
Tabrez agro supply chain conf 7 oct 2016Tabrez agro supply chain conf 7 oct 2016
Tabrez agro supply chain conf 7 oct 2016
 
Trademark Infringements in E-commerce: A Comparative Study of India, China & USA
Trademark Infringements in E-commerce: A Comparative Study of India, China & USATrademark Infringements in E-commerce: A Comparative Study of India, China & USA
Trademark Infringements in E-commerce: A Comparative Study of India, China & USA
 
Dr. Tabrez Ahmad Presentation on Legal Education Challenges and Reforms in 21...
Dr. Tabrez Ahmad Presentation on Legal Education Challenges and Reforms in 21...Dr. Tabrez Ahmad Presentation on Legal Education Challenges and Reforms in 21...
Dr. Tabrez Ahmad Presentation on Legal Education Challenges and Reforms in 21...
 
Mining law
Mining lawMining law
Mining law
 
Nuclear energy law
Nuclear energy lawNuclear energy law
Nuclear energy law
 
Law & justice in globalised world
Law & justice in globalised worldLaw & justice in globalised world
Law & justice in globalised world
 
Part 3 lecture- environmnetal regulation in energy sector
Part 3 lecture- environmnetal regulation in energy sectorPart 3 lecture- environmnetal regulation in energy sector
Part 3 lecture- environmnetal regulation in energy sector
 
Part 2 lecture environmental regulation in energy sector
Part 2 lecture environmental regulation in energy sectorPart 2 lecture environmental regulation in energy sector
Part 2 lecture environmental regulation in energy sector
 
Part 1 lecture- environmental regulation in energy sector
Part  1 lecture- environmental regulation in energy sectorPart  1 lecture- environmental regulation in energy sector
Part 1 lecture- environmental regulation in energy sector
 
Law of technology transfer and interlinking issues
Law of technology transfer and interlinking issuesLaw of technology transfer and interlinking issues
Law of technology transfer and interlinking issues
 
Law of export processing zones
Law of export processing zonesLaw of export processing zones
Law of export processing zones
 
Law of Export Oriented Units
Law of Export Oriented UnitsLaw of Export Oriented Units
Law of Export Oriented Units
 
Foreign Exchange Management Law
Foreign Exchange Management LawForeign Exchange Management Law
Foreign Exchange Management Law
 
Foreign trade regulation
Foreign trade regulationForeign trade regulation
Foreign trade regulation
 
Sexual Harassment of Women at Work Place
Sexual Harassment of Women at Work PlaceSexual Harassment of Women at Work Place
Sexual Harassment of Women at Work Place
 
Negotiable instruments
Negotiable instrumentsNegotiable instruments
Negotiable instruments
 
Consumer protection law
Consumer protection lawConsumer protection law
Consumer protection law
 
Sale of Goods
Sale of GoodsSale of Goods
Sale of Goods
 
The conflicting interests in copyrightability of fictional characters
The conflicting interests in copyrightability of fictional charactersThe conflicting interests in copyrightability of fictional characters
The conflicting interests in copyrightability of fictional characters
 

Cybertort Imp Slides For Pub. Internet

  • 1. Dr. Tabrez Ahmad Professor of Law site.technolexindia.com http://technolex.blogspot.com tabrezahmad7@gmail.com
  • 2. Agenda  1. Digital Revolution and Its Effect on Management of Rights and Obligations  2. Rights and Duties in Cyberspace  3. Cyber trespass  4. Privacy in Cyberspace  5. Cyber libel  6. Cyber stalking  7. Spamming  8. Cybersquating  9. Data Protection and Identity theft  10. Protection of Content on Websites  11. Vicarious Liability of ISPs  12. Jurisdiction  13. Cases  14. Legislations  15. Future course of action  Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 2
  • 3. Three Outstanding Features Which Make Digital Revolution Unique are the resultant 1. Cyberspace 2. Knowledge Economy 3. Speed with which it has transformed industrial economy into a knowledge Economy Dr. Tabrez Ahmad, Blog: 3 http://technolexindia.blogspot.com, 3
  • 4. Vanishing Borders In Cyberspace • Sovereignty and exercise of Jurisdiction which are attributes of statehood are linked to territorial nexus • In Cyberspace territorial boundaries are meaningless • Internet address has no relation to the physical location of the computer or its user • Law implies the application of coercive force but this is not feasible over individuals not within the territory Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 4
  • 5. Anonymity And Pseudo-anonymity • Cyberspace permits anonymity and pseudo anonymity • Users can mask their real flesh and blood identities and assume digital avtars • anonymous remailers facilitate sending messages without revealing their identity or origin Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 5
  • 6. Challenge Of Cyberspace Cyberspace calls into question many traditional legal conceptions like • Ownership and Fair Use • Balance of Freedom of expression-Reputation- Privacy • Balance of Rights-Liability of Netizens and ISP • Property etc Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 6
  • 7. Influence Of US Constitutional And Legal Doctrines On Growth Of Cybertort Internet is a product of US Technology, so issues relating to Internet are heavily flavoured by US Constitutional and Legal doctrines Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 7
  • 8. Two Schools Of Thought On Governance Of Cyberspace Regulation skeptics Governments should not regulate Cyberspace Reasons • Laws involved on geographical basis have no application to cyberspace which is borderless • Cyberspace transactions occur simultaneously in all jurisdictions assumption of jurisdiction by multiple states will lead to jurisdictional mayhem • Architecture of Cyberspace precludes previous notice of applicable laws Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 8
  • 9. Relationship Between Law And Social Change “The controversy between those who believe that law should essentially follow and not lead and it should do so clearly formulated social sentiment and those who believe that law should be determined agent in the creation of new social norms is one of the recurring themes in the history of legal thought” Professor Wolfgang Friedmann – Law in the Changing Society Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 9
  • 10. Digital Revolution Giving Way To Cybertort  The notion behind cybertort is that the Internet has created a connectedness that was not present previously  Few areas of tort are most impacted by the Internet Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 10
  • 11. Dis-balance of Right Duty Co-relation due to Internet A Right Duty Co-relation B Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 11
  • 12. 2. Rights and Duties in Cyberspace These include the right to: be free from any harm to system. enjoy a good reputation conduct business without unwarranted interference Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 12
  • 13. 2. Rights and Duties in Cyberspace The law imposes a duty on all of us to respect the rights of others. Tort law governs this interplay between rights and duties. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 13
  • 14. 3. Cyber trespass  Trespass to Property  Cybersquating  Software piracy  Infringement to database  Infringement of the Contents on website  Linking- Surface and Deep  File sharing  Napster Case  Gnutella  Kazaa  Grokster case Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 14
  • 15. 3. Cyber Trespass Cont… Trespass to person  Breach of Cyber Privacy  Identity Theft  Phishing  Cyberstalking  Spamming  Hacking-Magic Lantern Technique  Cyber libel Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 15
  • 16. 4. Privacy in Cyberspace  Privacy is deeply rooted in history and religion  Several religious scriptures, texts and classical right- ups recognize the importance of privacy  There is a recognition of privacy in the Quran and the sayings of Prophet Mohammed ( Surah An-Noor 24:27, 24:28, Surah Al-Hujraat 49:12)  The Bible has numerous references to privacy and  The Jewish law has long recognized the concept of ‘freedom from being watched’ Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 16
  • 17. 4. Privacy in Cyberspace cont…  The term ‘privacy’ has been described as “the rightful claim of the individual to determine the extent to which he wishes to share of himself with others. It means his right to withdraw or to participate as he sees fit. It also means the individual’s right to control dissemination of information about him.” Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 17
  • 18. 4.Privacy in Cyberspace cont…  Fifty years ago, George Orwell, the English writer whose fears for the loss of individual liberty dominated his novels, imagined a totalitarian state where advanced technologies would be used to monitor the people in all their endeavors “Big brothers would be watching us and the privacy would be a thing of the past”. Orwell’s fears stands somewhat true in this era of Information and Communication Revolution (ICR) Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 18
  • 19. 4. Privacy in Cyberspace cont…  The new technologies have enhanced the possibilities of invasion into the privacy of individual and provided new tools in the hands of eavesdroppers.  Individual privacy is at greater stake than ever before. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 19
  • 20. 4. Privacy in Cyberspace cont…  International Convention  UDHR- Art. 12  International Convention on Civil and Political rights (ICCPR) -Art. 17  UN Convention on Migrant Workers (UNCMW)-Art 14  UN convention on Protection of the Child (UNCPC)- Art- 16  European convention for the protection of Human Rights and Fundamental Freedoms 1950- Art. 8  American Convention on Human Rights- Art. 11 Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 20
  • 21. 4. Privacy in Cyberspace cont… Right to Privacy under Indian Constitution  Art.21  Art. 19 (2)  The court recognizes two aspects of privacy :  1. the tortuous law of privacy which affords an action for damages resulting from an unlawful invasion of privacy, and  2. the constitutional right to be let alone implicit in the right to life and liberty under Art. 21 Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 21
  • 22. 4. Privacy in Cyberspace cont… Right to privacy under tort law  In 1890, American Lawyers Samuel Warren and Louis Brandeis wrote a seminal piece on the right to privacy as “ the right to be left alone”  Today we find four distinct common law torts that are available as remedy for breach of privacy These are:  Intrusion upon seclusion  Appropriation of name or likeness  Publicity given to private life  Publicly placing a person in false light Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 22
  • 23. 4. Privacy in Cyberspace cont… Information Technology Act 2000  Sec. 43-47 Civil Liability  Sec. 65-78 Criminal Liability  Sec. 79 Vicarious Liability of ISPs Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 23
  • 24. 5. Cyber Libel Reputation-damaging statements or publications can be made anywhere in cyberspace, potentially unlimited audience:  • Websites  • Blogs  • Message Boards  • Chat Rooms  • Email  • Online Journals  • Use of Hyperlinks Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 24
  • 25. 5. Cyber Libel Cont…  Online Defamation: An online message attacking another person or entity in harsh, often personal, and possibly defamatory, terms. Online defamation is difficult to combat because:  the Communications Decency Act of 1996 absolves Internet service providers (“ISPs”) from liability for disseminating defamatory material  the Internet affords a high degree of anonymity to the person who posted the defamatory message. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 25
  • 26. 5. Cyber Libel Cont…  Defamation--can be oral or written  By and large cyberspace defamation is written so libel standards apply  Defamation requires a showing that  The defendant made or repeated false statements  that were witnessed by third parties, and  Harmed the reputation of the plaintiff  If the media is the defendant and the pl. is a public figure, the pl. must show that the def. knew or should have known that the statements were false Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 26
  • 27. 5. Cyber Libel Cont…  The crucial issue in cyberspace defamation cases is how to treat ISPs  If the ISP is treated as a publisher, then they have tremendous liability exposure  If the ISP is treated as a bookstore, then they are basically not liable for the contents of those using their service unless they contribute to the content of the message  Bookstores are treated as distributors of the material and are not liable unless they knew or should have known that the material they transmit is defamatory Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 27
  • 28. 5. Cyber Libel Cont…  In the early cases, liability of the ISP was based on whether the ISP supervised the content of the users of their service  The unfortunate result was that ISPs that tried to clean up content of users in terms of obscenity, were liable for defamatory content of other users  Congress did not like this outcome so they passed the Communications Decency Act (CDA) of 1996  Section 230(C) of the CDA provides that no  “… provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 28
  • 29. 6. Cyber stalking Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 29
  • 30.  Threatening Communications/ CyberHarrassment/Cyberstalking Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 30
  • 31. 7. Spamming  Spam: Bulk, unsolicited e-mail or newsgroup postings – usually an advertisement for the “spammer’s” product or service sent to all users on an e-mailing list or newsgroup.  Some states regulate or prohibit the use of spam, giving recipients of unwanted spam, and even ISPs, legal bases for blocking spam and for recovering against spammers. Who should be liable for “spam” and computer viruses that cause injury?  Federal CAN-SPAM Act 2003. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 31
  • 32. What is Phishing? --- listening to music by the band called Phish --- a hobby, sport or recreation involving the ocean, rivers or streams…nope “Fishing for personal information”  Use “spoofed” e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc.  Anti-Phishing Working Group http://www.antiphishing.org/ Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 32
  • 33. Prevent Phishing from Fraud Watch International  Never click on hyperlinks  Keep computer clean from  Use Anti-SPAM filters Spyware  Use Anti-Virus Software  Know Fraudulent activity on  Use personal firewalls the Internet  Check your credit report  Keep all software updated immediately for free!  Always look for https and  If unsure, ask! sites that ask for “personal information” Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 33
  • 34. What is ID Theft? “Identity theft is a crime in which an imposter obtains key pieces of information such as Social Security and driver's license numbers and uses it for their own personal gain.” ID Theft Resource Center http://www.idtheftcenter.org/index.shtml Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 34
  • 35. What is Spyware? Any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 35
  • 36. What is Adware? Any software application in which advertising banners are displayed while the program is running. The authors of these applications include additional code that delivers the ads, which can be viewed through pop-up windows or through a bar that appears on a computer screen. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 36
  • 37. CYBERSQUATTING: Anti Cybersquatting Consumer Protection Act (ACPA) Under 15 USC 1125(d)(1)(A):  The registration of a domain name with bad faith intent to profit from the mark of another.  Taking another’s trademark as your secondary level domain name constitutes the act of Cybersquatting.  This is as much an act of piracy as copyright or patent infringement. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 37
  • 38. Cybersquatting Elements:  Registers, traffics in, or uses a domain name of  a mark that is distinctive at the time of registration of the domain name  that is identical or confusingly similar to that mark or  of a famous mark that is famous at the time of registration of the domain name,  is identical or confusingly similar to or dilutive of that mark.  With the bad faith intent to profit from that mark Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 38
  • 39. Cybersquatting Bad Faith Intent to Profit - Factors:  The trademark & intellectual property rights of the parties  The extent the Domain Name consists of another’s mark or name  Prior uses if any of the Domain Name in offering goods/services  Any “fair use” factors like non-profit  An intent to divert traffic (users) to another site than the trademark owner’s.  Intent to Dilute  Offering to sell the Domain Name. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 39
  • 40. What is Identity Theft? Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 40
  • 41. 9. Data Protection and Identity Theft Conversion of Data or Information  Test: Is there an unauthorized or wrongful exercise of dominion and control over personal property?  • Thyroff v. Nationwide Mut. Ins. Co., 8 N.Y.3d 283 (N.Y. 2007)–common law conversion applies to electronic data Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 41
  • 42. Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such as:  name,  address,  Social Security number,  birth date, and  mother’s maiden name Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 42
  • 43. If You’re a Victim... 1. Contact the fraud departments of the three major credit bureaus. 2. Contact creditors or financial institutions for any accounts that have been tampered with. 3. File a report with local police or police where the theft took place. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 43
  • 44. 10. Protection of content on Websites File sharing  Napster Case  Gnutella  Kazaa  Grokster Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 44
  • 45. 11. Liability of Internet Service Providers (ISPs)  Should an Internet Service Provider (ISP) be liable for the actions of its subscriber? Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 45
  • 46. 13. Imp. Legislations  UNCITRAL Model Law of E-Commerce  World summit on Information Society( WSIS)  United Nations Commission on Trade and Development( UNCTAD)  Council of Europe (European Convention on Cyber Crime 2001)  World Trade Organisation ( WTO), TRIPS etc.  World Intellectual Property Organisation, WCT, WPPT Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 46
  • 47. Indian Legislations  Information Technology Act 2000., came into force on 17th October 2000.  Information Technology (Amendment Act 2008) came into force on 27th October 2009. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 47
  • 48. IT Act 2008 Amendment Act  Some of the major modifications are:  1. A special liability has been imposed on call centers, BPOs, banks and others who hold or handle sensitive personal data. If they are negligent in "implementing and maintaining reasonable security practices and procedures", they will be liable to pay compensation. It may be recalled that India's first major BPO related scam was the multi crore MphasiS- Citibank funds siphoning case in 2005. Under the new law, in such cases, the BPOs and call centers could also be made liable if they have not implemented proper security measures. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 48
  • 49.  2. Compensation on cyber crimes like spreading viruses, copying data, unauthorised access, denial of service etc is not restricted to Rs 1 crore anymore. The Adjudicating Officers will have jurisdiction for cases where the claim is upto Rs. 5 crore. Above that the case will need to be filed before the civil courts.  3. The offence of cyber terrorism has been specially included in the law. A cyber terrorist can be punished with life imprisonment.  4. Sending threatening emails and sms are punishable with jail upto 3 years. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 49
  • 50.  5. Publishing sexually explicit acts in the electronic form is punishable with jail upto 3 years. This would apply to cases like the Delhi MMS scandal where a video of a young couple having sex was spread through cell phones around the country.  6. Voyeurism is now specifically covered. Acts like hiding cameras in changing rooms, hotel rooms etc is punishable with jail upto 3 years. This would apply to cases like the infamous Pune spycam incident where a 58-year old man was arrested for installing spy cameras in his house to 'snoop' on his young lady tenants.  7. Cyber crime cases can now be investigated by Inspector rank police officers. Earlier such offences could not be investigated by an officer below the rank of a deputy superintendent of police. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 50
  • 51.  Collecting, browsing, downloading etc of child pornography is punishable with jail upto 5 years for the first conviction. For a subsequent conviction, the jail term can extend to 7 years. A fine of upto Rs 10 lakh can also be levied.  9. The punishment for spreading obscene material by email, websites, sms has been reduced from 5 years jail to 3 years jail. This covers acts like sending 'dirty' jokes and pictures by email or sms.  10. Refusing to hand over passwords to an authorized official could land a person in prison for upto 7 years. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 51
  • 52.  11. Hacking into a Government computer or website, or even trying to do so in punishable with imprisonment upto 10 years.  12. Rules pertaining to section 52 (Salary, Allowances and Other Terms and Conditions of Service of Chairperson and Members),  13. Rules pertaining to section 69 (Procedure and Safeguards for Interception, Monitoring and Decryption of Information), Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 52
  • 53.  14. Rules pertaining to section 69A (Procedure and Safeguards for Blocking for Access of Information by Public),  15. Rules pertaining to section 69B (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) and  16. Notification under section 70B for appointment of the Indian Computer Emergency Response Team.  17. Rules Rules pertaining to section 54 (Procedure for Investigation of Misbehaviour or Incapacity of Chairperson and Members), Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 53
  • 54. 14. Imp. Cases  Yahoo Inc. v. Akash Arora  Styam infoway v. Siffy  Napster Case USA  Grokster case USA Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 54
  • 55. Cyber trespass Cases  Thrifty-Tel, Inc. v. Bezenek, 46 Cal. App. 4th 1559 (Cal. App. 1996) (hacking)  • Intel Corp. v. Hamidi, 71 P.3d 296 (Cal. 2003) (email)  • CompuServe, Inc. v. Cyber Promotions, Inc., 962 F. Supp. 1015 (S.D. Oh. 1997) (commercial email)  • ebay, Inc. v. Bidder’s Edge, Inc., 100 F. Supp. 2d 1058 (N.D. Cal. 2000) (“ Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 55
  • 56. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 56
  • 57. 15. Future course of action • LEGAL PROBLEMS OF THE NEW TECHNOLOGY • APPLICATION OF JURISPRUDENTIAL CONCEPTIONS TO CYBERSPACE. • Forensic Computing- Forensic Evidence Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 57
  • 58.
  • 59. Dr. Tabrez Ahmad, Blog: http://technolexindia.blogspot.com, 59