SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
LEGAL OBLIGATIONS OF TECHNOLOGY SERVICE PROVIDERS AS INTERMEDIARIES June 2019
A database of millions of customers including their contact details are found freely accessible online and are available for
sale at a very nominal price at various online social media platforms has brought a serious and basic question in focus-
who all can be held responsible and accountable for such unauthorize and illegal acts?
Prima facie, the person who is selling the database is responsible under the eyes of law, but do the technology services
providers or the platform where such database is been listed, owes any obligation to the customers and can be held
responsible for unauthorize acts by a third party on their platform?
The technology service providers or the online platform operators are
commonly known as “Intermediaries”.
In India, these technology service providers or Intermediaries are governed by
the provisions of Information Technology Act, 2000 (“IT Act”) along with
Information Technology (Intermediaries Guidelines) Rules, 2011
(“Intermediary Rules”)
Section 2 (1) (w) of the IT Act define intermediary as follows:
Intermediary with respect to any electronic messages means any person who on
behalf of another person receives, stores or transmits that messages or provides
any service with respect to that messages and includes:
 Telecom service providers;
 Network service providers;
 Internet service providers;
 Web hosting service providers;
 Search engines;
 Online payment sites;
 Online auction sites;
 Online market places; and
 Cyber cafes
The intermediaries play a very important role in the enforcement of various provisions under the IT Act. In any technology services,
there are multiple players involved in provision of services such as setting up web page or website, ISP providing internet connectivity,
service provider for registration of domain name and hosting the domain, different service provider for uploading the web pages etc.
The present definition of intermediaries is broad enough to encompass every technology service provider involved in any manner in
transmission, retention or hosting of electronic records. The IT Act places substantial burden on the intermediaries as briefed below:
1. Section 67C: Intermediaries to preserve and retain the information as prescribed under the IT Act and any intentional or knowingly
contraventions are punishable with 3 years’ imprisonment and fine;
2. Section 69: Intermediaries are required to comply with an order passed by the Central or State Government directly or through designated
agency for granting access or securing access to the computer resource containing the information or intercepting, monitoring or decrypting
encrypted data or provide information stored in a computer resource. Failure to assistance to the said Government or its designated agency
is punishable with 7 years’ imprisonment and fine;
3. Section 69A: An intermediary may be directed by the order of the Central Government to block access by the public or cause to be blocked
for access by public, any information generated, transmitted, received, stored or hosted in any computer resource, which such intermediary
has to comply with. Failure to do so would entail maximum imprisonment of 7 years’ and fine;
4. Section 69B: The Central Government may direct an intermediary to provide technical assistance and extend all facilities to its designated
agency or authority, to enable online access or to secure and provide online access to the computer resource generating, transmitting,
receiving or storing such traffic data or information, as required by such agency and non-compliance with such order may be prosecuted and
the intermediary may be punished with 3 years’ imprisonment and fine;
5. Section 70B: CERT-INmay call for information or give directions tointermediaries and anyintermediary fails tocomply with such directions
may be punished with 1 year imprisonment and fine;
6. Section 72A: An intermediary who discloses personal information obtained while providing services under the terms of lawful contract, with
the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain, without the consent of the person concerned, or in
breach of a lawful contract, may be punished with 3 years’ imprisonment or fine of maximum Rs. 5 lakhs or with both. With respect to
compliance with Section 72A, the intermediary is required to comply with the guidelines set out in the IT (Reasonable Security Practices &
Procedures And Sensitive Personal Information) Rules 2011, which sets out the procedure for collection, retention, use and dissemination of
sensitive personal information pertaining to users.
Section 79 of the IT Act exempts the intermediary
from any liability under the IT Act from
prosecution for third party actions, on fulfillment
of the following requisite:
a. That the intermediary’s role is limited to
providing access to a communication
system, which is used by third parties to
transmit, store or host information;
b. That the intermediary did not initiate the
transmission, and did not select the receiver
of transmission and also did not select or
modify the information forming part of such
transmission;
c. That the intermediary observed due
diligence and complied with the guidelines
set out by the Central Government, while
discharging its duties under the IT Act.
However, the intermediary cannot claim exemption
under Section 79 of the IT Act on the following
conditions:
a. An intermediary is involved in the commission of
an unlawful act, either through conspiring,
abetting or aiding such act or had induced,
whether through threats or promises or otherwise
the commission of the unlawful act;
b. An intermediary, after having received actual
knowledge, by itself or through notification from
the appropriate Government or its agency, that
any information, data or communication link
residing in or connected to a computer resource
controlled by the intermediary, is being used to
commit an unlawful act, fails to expeditiously
remove or disable access to that material on that
resource, without vitiating the evidence in any
manner.
Disclaimer: This publication by Equi Corp Associates, Advocates & Solicitors is to keep our clients and friends
informed of new and important legal issues. It is intended to be informational only and does not constitute legal
advice. Specialist advice should be sought regarding specific circumstances. © 2019 Equi Corp Associates,
Advocates & Solicitors, Delhi-NCR. All rights reserved. No part of this article may be reproduced or transmitted in
any form or by any means without written permission from the copyright holder.
An intermediary is required to act on information received about violation of any laws within 36
hours of such receipt and the intermediary is required to ensure that removal of content from a
website or computer resource would not affect the evidentiary value of such content.
Moreover, the intermediary is requisite to demonstrate due diligence and publish rules &
regulations, data privacy & protection, usage policy and user agreement for access or usage of
the intermediary’s online platform or computer access along with details of grievance officer
who has to dispose of the matter within one month from date of receipt of complaint.
With ongoing evolution in the business world, the technology service providers are part and parcel
of each and every business & their role as intermediary has increased manifold.
To know further details and other legal aspects of intermediaries including the data privacy &
usage policy, user rights, compliance under IT Act & Regulations, please connect with us at
admin@equicorplegal.com / +91 8448824659
Connect with Us:
EquiCorp Associates,
Advocates & Solicitors
1st Floor, NBBC, Inox
Towers, Tower-B, Plot No.17,
Sector-16 A, Film City, Noida-
201301, Delhi-NCR, India
+918448824659 /
01204797509
W: www.equicorplegal.com
Email:
admin@equicorplegal.com
Expertise:
Corporate &
Commercial
Finance
Employment &
Labour Laws
Intellectual Property
& Information
Technology
Litigation &
Arbitration
PE, Funds & M&A
Startup
Regulatory Policy &
Compliance Audit
Tax & Consulting

Contenu connexe

Tendances

Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladeshOrko Abir
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in PakistanAyesha Majid
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crimefiza209
 
Cyber Tribunal and Cyber Appellate Tribunal in Bangladesh
Cyber Tribunal and Cyber Appellate Tribunal in BangladeshCyber Tribunal and Cyber Appellate Tribunal in Bangladesh
Cyber Tribunal and Cyber Appellate Tribunal in BangladeshAbir Hossain Talukder
 
Client presentation
Client presentationClient presentation
Client presentationzleste
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformShamseena Zubair
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Ben Allen
 
International principles on the application of human rights to communications...
International principles on the application of human rights to communications...International principles on the application of human rights to communications...
International principles on the application of human rights to communications...Rupinder K Gill
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000ShashankBajpai24
 
Principles of mobile privacy
Principles of mobile privacyPrinciples of mobile privacy
Principles of mobile privacyEuphodia Maluleke
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...n|u - The Open Security Community
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.anveshika thakur
 

Tendances (20)

Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladesh
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
 
Protection from-online-falsehoods-and-manipulation-bill10-2019
Protection from-online-falsehoods-and-manipulation-bill10-2019Protection from-online-falsehoods-and-manipulation-bill10-2019
Protection from-online-falsehoods-and-manipulation-bill10-2019
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Tribunal and Cyber Appellate Tribunal in Bangladesh
Cyber Tribunal and Cyber Appellate Tribunal in BangladeshCyber Tribunal and Cyber Appellate Tribunal in Bangladesh
Cyber Tribunal and Cyber Appellate Tribunal in Bangladesh
 
Client presentation
Client presentationClient presentation
Client presentation
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platform
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
 
International principles on the application of human rights to communications...
International principles on the application of human rights to communications...International principles on the application of human rights to communications...
International principles on the application of human rights to communications...
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Principles of mobile privacy
Principles of mobile privacyPrinciples of mobile privacy
Principles of mobile privacy
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
 

Similaire à Legal Obligations of Technology Service Providers as Intermediaries

Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proTalwant Singh
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 
Contract for the web
Contract for the webContract for the web
Contract for the webMassa Critica
 
Accountability of Social Media.pdf
Accountability of Social Media.pdfAccountability of Social Media.pdf
Accountability of Social Media.pdfsabrangsabrang
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
113/2009 Regulations on Protection
113/2009 Regulations on Protection113/2009 Regulations on Protection
113/2009 Regulations on Protectiontraoman
 
Session B: Handout 1
Session B: Handout 1Session B: Handout 1
Session B: Handout 1feitwincities
 
Saudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawSaudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawAbiel Abuy
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement toolsMarkDennielMontiano
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Adv Prashant Mali
 
Cyber law in India with sections and penalties
Cyber law in India with sections and penalties Cyber law in India with sections and penalties
Cyber law in India with sections and penalties Iramma Harijan
 
Group 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptxGroup 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptxStephenQuijano3
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptxsambaba17
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfInternet Law Center
 

Similaire à Legal Obligations of Technology Service Providers as Intermediaries (20)

Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_pro
 
FINAL
FINALFINAL
FINAL
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 
Contract for the web
Contract for the webContract for the web
Contract for the web
 
Accountability of Social Media.pdf
Accountability of Social Media.pdfAccountability of Social Media.pdf
Accountability of Social Media.pdf
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
113/2009 Regulations on Protection
113/2009 Regulations on Protection113/2009 Regulations on Protection
113/2009 Regulations on Protection
 
Session B: Handout 1
Session B: Handout 1Session B: Handout 1
Session B: Handout 1
 
Saudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawSaudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime Law
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
IT (4).pdf
IT (4).pdfIT (4).pdf
IT (4).pdf
 
Search engines, news aggregators and intermediaries
Search engines, news aggregators and intermediariesSearch engines, news aggregators and intermediaries
Search engines, news aggregators and intermediaries
 
Cyber law in India with sections and penalties
Cyber law in India with sections and penalties Cyber law in India with sections and penalties
Cyber law in India with sections and penalties
 
Group 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptxGroup 5 Banking Laws Semi Finals.pptx
Group 5 Banking Laws Semi Finals.pptx
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptx
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 

Plus de EquiCorp Associates

COVID-19: HOW DOES IT IMPACT YOUR COMMERCIAL LEASES?
COVID-19: HOW DOES IT IMPACT YOUR COMMERCIAL LEASES?COVID-19: HOW DOES IT IMPACT YOUR COMMERCIAL LEASES?
COVID-19: HOW DOES IT IMPACT YOUR COMMERCIAL LEASES?EquiCorp Associates
 
Investment Frauds by Investment Advisers
Investment Frauds by Investment AdvisersInvestment Frauds by Investment Advisers
Investment Frauds by Investment AdvisersEquiCorp Associates
 
Key Legal Developments of 2018 in India
Key Legal Developments of 2018 in  India Key Legal Developments of 2018 in  India
Key Legal Developments of 2018 in India EquiCorp Associates
 
EquiCorp-Decoding Supreme Court Judgement on Aadhaar & Its Impact on Your Bus...
EquiCorp-Decoding Supreme Court Judgement on Aadhaar & Its Impact on Your Bus...EquiCorp-Decoding Supreme Court Judgement on Aadhaar & Its Impact on Your Bus...
EquiCorp-Decoding Supreme Court Judgement on Aadhaar & Its Impact on Your Bus...EquiCorp Associates
 
Legal Framework for Doing Business of FinTech in India
Legal Framework for Doing Business of FinTech in IndiaLegal Framework for Doing Business of FinTech in India
Legal Framework for Doing Business of FinTech in IndiaEquiCorp Associates
 
India's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road AheadIndia's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road AheadEquiCorp Associates
 
Post Employment Restrictive Covenants- How Much Enforceable?
Post Employment Restrictive Covenants- How Much Enforceable?Post Employment Restrictive Covenants- How Much Enforceable?
Post Employment Restrictive Covenants- How Much Enforceable?EquiCorp Associates
 
Taxation of Damages- "Damages paid for Breach of Contract to attract GST"
Taxation of Damages- "Damages paid for Breach of Contract to attract GST"Taxation of Damages- "Damages paid for Breach of Contract to attract GST"
Taxation of Damages- "Damages paid for Breach of Contract to attract GST"EquiCorp Associates
 
Does & Don't of Raising Fund by Startups
Does & Don't of Raising Fund by StartupsDoes & Don't of Raising Fund by Startups
Does & Don't of Raising Fund by StartupsEquiCorp Associates
 
Doing Business of Public Deposit in India
Doing Business of Public Deposit in IndiaDoing Business of Public Deposit in India
Doing Business of Public Deposit in IndiaEquiCorp Associates
 
Collective Investment Schemes in India
Collective Investment Schemes in IndiaCollective Investment Schemes in India
Collective Investment Schemes in IndiaEquiCorp Associates
 
General Data Protection Regulations (GDPR) & Impact on Your Business
General Data Protection Regulations (GDPR) & Impact on Your Business General Data Protection Regulations (GDPR) & Impact on Your Business
General Data Protection Regulations (GDPR) & Impact on Your Business EquiCorp Associates
 
Doing Business of Blockchain in India
Doing Business of Blockchain in IndiaDoing Business of Blockchain in India
Doing Business of Blockchain in IndiaEquiCorp Associates
 
A Structured Overview of Corporate Insolvency Regime in India
A Structured Overview of Corporate Insolvency Regime in IndiaA Structured Overview of Corporate Insolvency Regime in India
A Structured Overview of Corporate Insolvency Regime in IndiaEquiCorp Associates
 
Doing Business of Cryptocurrency w.r.t. India Legal Perspective
Doing Business of Cryptocurrency w.r.t. India Legal PerspectiveDoing Business of Cryptocurrency w.r.t. India Legal Perspective
Doing Business of Cryptocurrency w.r.t. India Legal PerspectiveEquiCorp Associates
 
Doing Business of Microfinance in India
Doing Business of Microfinance in IndiaDoing Business of Microfinance in India
Doing Business of Microfinance in IndiaEquiCorp Associates
 
Raising Funds by Startups- Is Your Startup Ready For It?
Raising Funds by Startups- Is Your Startup Ready For It?Raising Funds by Startups- Is Your Startup Ready For It?
Raising Funds by Startups- Is Your Startup Ready For It?EquiCorp Associates
 
Small & Payment Banks: Future of Local Banking
Small & Payment Banks: Future of Local BankingSmall & Payment Banks: Future of Local Banking
Small & Payment Banks: Future of Local BankingEquiCorp Associates
 

Plus de EquiCorp Associates (20)

COVID-19: HOW DOES IT IMPACT YOUR COMMERCIAL LEASES?
COVID-19: HOW DOES IT IMPACT YOUR COMMERCIAL LEASES?COVID-19: HOW DOES IT IMPACT YOUR COMMERCIAL LEASES?
COVID-19: HOW DOES IT IMPACT YOUR COMMERCIAL LEASES?
 
Investment Frauds by Investment Advisers
Investment Frauds by Investment AdvisersInvestment Frauds by Investment Advisers
Investment Frauds by Investment Advisers
 
Key Legal Developments of 2018 in India
Key Legal Developments of 2018 in  India Key Legal Developments of 2018 in  India
Key Legal Developments of 2018 in India
 
EquiCorp-Decoding Supreme Court Judgement on Aadhaar & Its Impact on Your Bus...
EquiCorp-Decoding Supreme Court Judgement on Aadhaar & Its Impact on Your Bus...EquiCorp-Decoding Supreme Court Judgement on Aadhaar & Its Impact on Your Bus...
EquiCorp-Decoding Supreme Court Judgement on Aadhaar & Its Impact on Your Bus...
 
Legal Framework for Doing Business of FinTech in India
Legal Framework for Doing Business of FinTech in IndiaLegal Framework for Doing Business of FinTech in India
Legal Framework for Doing Business of FinTech in India
 
India's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road AheadIndia's Data Protection Law 2018- Future Road Ahead
India's Data Protection Law 2018- Future Road Ahead
 
Post Employment Restrictive Covenants- How Much Enforceable?
Post Employment Restrictive Covenants- How Much Enforceable?Post Employment Restrictive Covenants- How Much Enforceable?
Post Employment Restrictive Covenants- How Much Enforceable?
 
Taxation of Damages- "Damages paid for Breach of Contract to attract GST"
Taxation of Damages- "Damages paid for Breach of Contract to attract GST"Taxation of Damages- "Damages paid for Breach of Contract to attract GST"
Taxation of Damages- "Damages paid for Breach of Contract to attract GST"
 
Does & Don't of Raising Fund by Startups
Does & Don't of Raising Fund by StartupsDoes & Don't of Raising Fund by Startups
Does & Don't of Raising Fund by Startups
 
Doing Business of Public Deposit in India
Doing Business of Public Deposit in IndiaDoing Business of Public Deposit in India
Doing Business of Public Deposit in India
 
Collective Investment Schemes in India
Collective Investment Schemes in IndiaCollective Investment Schemes in India
Collective Investment Schemes in India
 
General Data Protection Regulations (GDPR) & Impact on Your Business
General Data Protection Regulations (GDPR) & Impact on Your Business General Data Protection Regulations (GDPR) & Impact on Your Business
General Data Protection Regulations (GDPR) & Impact on Your Business
 
Doing Business of Blockchain in India
Doing Business of Blockchain in IndiaDoing Business of Blockchain in India
Doing Business of Blockchain in India
 
A Structured Overview of Corporate Insolvency Regime in India
A Structured Overview of Corporate Insolvency Regime in IndiaA Structured Overview of Corporate Insolvency Regime in India
A Structured Overview of Corporate Insolvency Regime in India
 
Doing Business of Cryptocurrency w.r.t. India Legal Perspective
Doing Business of Cryptocurrency w.r.t. India Legal PerspectiveDoing Business of Cryptocurrency w.r.t. India Legal Perspective
Doing Business of Cryptocurrency w.r.t. India Legal Perspective
 
Doing Business in India
Doing Business in IndiaDoing Business in India
Doing Business in India
 
Doing Business of Microfinance in India
Doing Business of Microfinance in IndiaDoing Business of Microfinance in India
Doing Business of Microfinance in India
 
NBFC Registration in India
NBFC Registration in IndiaNBFC Registration in India
NBFC Registration in India
 
Raising Funds by Startups- Is Your Startup Ready For It?
Raising Funds by Startups- Is Your Startup Ready For It?Raising Funds by Startups- Is Your Startup Ready For It?
Raising Funds by Startups- Is Your Startup Ready For It?
 
Small & Payment Banks: Future of Local Banking
Small & Payment Banks: Future of Local BankingSmall & Payment Banks: Future of Local Banking
Small & Payment Banks: Future of Local Banking
 

Dernier

Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,1882Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,18822020000445musaib
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideillinoisworknet11
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklosbeduinpower135
 
Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointMohdYousuf40
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxjennysansano2
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 

Dernier (20)

Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,1882Conditions Restricting Transfer Under TPA,1882
Conditions Restricting Transfer Under TPA,1882
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guide
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklos
 
Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791Alexis OConnell mugshot Lexileeyogi 512-840-8791
Alexis OConnell mugshot Lexileeyogi 512-840-8791
 
Presentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal pointPresentation1.pptx on sedition is a good legal point
Presentation1.pptx on sedition is a good legal point
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docx
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 

Legal Obligations of Technology Service Providers as Intermediaries

  • 1. LEGAL OBLIGATIONS OF TECHNOLOGY SERVICE PROVIDERS AS INTERMEDIARIES June 2019 A database of millions of customers including their contact details are found freely accessible online and are available for sale at a very nominal price at various online social media platforms has brought a serious and basic question in focus- who all can be held responsible and accountable for such unauthorize and illegal acts? Prima facie, the person who is selling the database is responsible under the eyes of law, but do the technology services providers or the platform where such database is been listed, owes any obligation to the customers and can be held responsible for unauthorize acts by a third party on their platform? The technology service providers or the online platform operators are commonly known as “Intermediaries”. In India, these technology service providers or Intermediaries are governed by the provisions of Information Technology Act, 2000 (“IT Act”) along with Information Technology (Intermediaries Guidelines) Rules, 2011 (“Intermediary Rules”) Section 2 (1) (w) of the IT Act define intermediary as follows: Intermediary with respect to any electronic messages means any person who on behalf of another person receives, stores or transmits that messages or provides any service with respect to that messages and includes:  Telecom service providers;  Network service providers;  Internet service providers;  Web hosting service providers;  Search engines;  Online payment sites;  Online auction sites;  Online market places; and  Cyber cafes
  • 2. The intermediaries play a very important role in the enforcement of various provisions under the IT Act. In any technology services, there are multiple players involved in provision of services such as setting up web page or website, ISP providing internet connectivity, service provider for registration of domain name and hosting the domain, different service provider for uploading the web pages etc. The present definition of intermediaries is broad enough to encompass every technology service provider involved in any manner in transmission, retention or hosting of electronic records. The IT Act places substantial burden on the intermediaries as briefed below: 1. Section 67C: Intermediaries to preserve and retain the information as prescribed under the IT Act and any intentional or knowingly contraventions are punishable with 3 years’ imprisonment and fine; 2. Section 69: Intermediaries are required to comply with an order passed by the Central or State Government directly or through designated agency for granting access or securing access to the computer resource containing the information or intercepting, monitoring or decrypting encrypted data or provide information stored in a computer resource. Failure to assistance to the said Government or its designated agency is punishable with 7 years’ imprisonment and fine; 3. Section 69A: An intermediary may be directed by the order of the Central Government to block access by the public or cause to be blocked for access by public, any information generated, transmitted, received, stored or hosted in any computer resource, which such intermediary has to comply with. Failure to do so would entail maximum imprisonment of 7 years’ and fine; 4. Section 69B: The Central Government may direct an intermediary to provide technical assistance and extend all facilities to its designated agency or authority, to enable online access or to secure and provide online access to the computer resource generating, transmitting, receiving or storing such traffic data or information, as required by such agency and non-compliance with such order may be prosecuted and the intermediary may be punished with 3 years’ imprisonment and fine; 5. Section 70B: CERT-INmay call for information or give directions tointermediaries and anyintermediary fails tocomply with such directions may be punished with 1 year imprisonment and fine; 6. Section 72A: An intermediary who discloses personal information obtained while providing services under the terms of lawful contract, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain, without the consent of the person concerned, or in breach of a lawful contract, may be punished with 3 years’ imprisonment or fine of maximum Rs. 5 lakhs or with both. With respect to compliance with Section 72A, the intermediary is required to comply with the guidelines set out in the IT (Reasonable Security Practices & Procedures And Sensitive Personal Information) Rules 2011, which sets out the procedure for collection, retention, use and dissemination of sensitive personal information pertaining to users.
  • 3. Section 79 of the IT Act exempts the intermediary from any liability under the IT Act from prosecution for third party actions, on fulfillment of the following requisite: a. That the intermediary’s role is limited to providing access to a communication system, which is used by third parties to transmit, store or host information; b. That the intermediary did not initiate the transmission, and did not select the receiver of transmission and also did not select or modify the information forming part of such transmission; c. That the intermediary observed due diligence and complied with the guidelines set out by the Central Government, while discharging its duties under the IT Act. However, the intermediary cannot claim exemption under Section 79 of the IT Act on the following conditions: a. An intermediary is involved in the commission of an unlawful act, either through conspiring, abetting or aiding such act or had induced, whether through threats or promises or otherwise the commission of the unlawful act; b. An intermediary, after having received actual knowledge, by itself or through notification from the appropriate Government or its agency, that any information, data or communication link residing in or connected to a computer resource controlled by the intermediary, is being used to commit an unlawful act, fails to expeditiously remove or disable access to that material on that resource, without vitiating the evidence in any manner.
  • 4. Disclaimer: This publication by Equi Corp Associates, Advocates & Solicitors is to keep our clients and friends informed of new and important legal issues. It is intended to be informational only and does not constitute legal advice. Specialist advice should be sought regarding specific circumstances. © 2019 Equi Corp Associates, Advocates & Solicitors, Delhi-NCR. All rights reserved. No part of this article may be reproduced or transmitted in any form or by any means without written permission from the copyright holder. An intermediary is required to act on information received about violation of any laws within 36 hours of such receipt and the intermediary is required to ensure that removal of content from a website or computer resource would not affect the evidentiary value of such content. Moreover, the intermediary is requisite to demonstrate due diligence and publish rules & regulations, data privacy & protection, usage policy and user agreement for access or usage of the intermediary’s online platform or computer access along with details of grievance officer who has to dispose of the matter within one month from date of receipt of complaint. With ongoing evolution in the business world, the technology service providers are part and parcel of each and every business & their role as intermediary has increased manifold. To know further details and other legal aspects of intermediaries including the data privacy & usage policy, user rights, compliance under IT Act & Regulations, please connect with us at admin@equicorplegal.com / +91 8448824659 Connect with Us: EquiCorp Associates, Advocates & Solicitors 1st Floor, NBBC, Inox Towers, Tower-B, Plot No.17, Sector-16 A, Film City, Noida- 201301, Delhi-NCR, India +918448824659 / 01204797509 W: www.equicorplegal.com Email: admin@equicorplegal.com Expertise: Corporate & Commercial Finance Employment & Labour Laws Intellectual Property & Information Technology Litigation & Arbitration PE, Funds & M&A Startup Regulatory Policy & Compliance Audit Tax & Consulting