ultimate law

74
Information Technology Act 2000 Submitted To: Prof. Anant Amdekar Submitted By: Rather than giving Information and Technology gives rise to more Cyber crimes

Upload: priyesh

Post on 22-Feb-2015

50 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ultimate LAW

Information Technology Act 2000

Submitted To:Prof. Anant Amdekar

Submitted By:Abhimanyu MundraBhavana Lohia Geetesh ThakurHimanshu ShahJugal ShahKeshwanand Pandey

Rather than giving Information and Technology gives rise to more Cyber crimes

Page 2: Ultimate LAW

Kirti Shahu

Information Technology Act 2000 2

Page 3: Ultimate LAW

Table of Content

Sr. No.

Particulars Page No.

1 Introduction of Information Technology Act, 2000 (IT Act) 3

2 Advantages of IT Act 5

3 Shortcomings of IT Act 6

4 NASSCOM’s Contribution to IT in India 7

5 Introduction to Cyber Crime 10

6 Defining Cyber Crime 13

7 Types of Cyber Crime 14

8 Cyber Crime Statistics of India 21

9 Types of Cyber Criminals 22

10 Some of important Definition 23

11 Writing requirements 24

12 Penalties for Computer Crimes 24

13 Police Powers 25

14 Digital Signature 26

15 Possible use of E-Governance 28

16 MCA21 project under E-Governance 29

17 Contribution of Information Technology in Banking Sector 33

18 Comparison between India & China 36

19 Some Indian Case Studies 40

20 Conclusion 46

21 Suggestion 48

22 Bibliography 49

Information Technology Act 2000 3

Page 4: Ultimate LAW

Information Technology Act 2000

Connectivity via the Internet has greatly abridged geographical distances

and made communication even more rapid. While activities in this limitless new

universe are increasing incessantly, laws must be formulated to monitor these

activities. Some countries have been rather vigilant and formed some laws

governing the net. In order to keep pace with the changing generation, the Indian

Parliament passed the much-awaited Information Technology Act, 2000 .As they

say,

"It’s better late than never".

However, even after it has been passed, a debate over certain controversial

issues continues. A large portion of the industrial community seems to be

dissatisfied with certain aspects of the Act. But on the whole, it is a step in the

right direction for India.

The Information Technology Act 2000 regulates the transactions relating

to the computer and the Internet.

The objectives of the Act as reflected in the Preamble to the Act are:

1. The Preamble to the Act states that it aims at providing legal -

recognition for transactions carried out by means of electronic data

interchange and other means of electronic communication,

commonly referred to as "electronic commerce", which involve the

use of alternatives to paper-based methods of communication and

storage of information and aims at facilitating electronic filing of

documents with the Government agencies.

2. To facilitate electronic filing of the document with the government

of India.

3. To give legal recognition to digital signature for accepting any

agreement via computer.

4. According to I.T. Act 2000, any company can store their data in

electronic storage.

Information Technology Act 2000 4

Page 5: Ultimate LAW

5. To make more power to IPO, RBI and Indian Evidence act for

restricting electronic crime.

The General Assembly of the United Nations had adopted the Model Law

on Electronic Commerce adopted by the United Nations Commission on

International Trade Law (UNCITRAL) in its General Assembly Resolution

A/RES/51/162 dated January 30, 1997. The Indian Act is in keeping with this

resolution that recommended that member nations of the UN enact and modify

their laws according to the Model Law.

Thus with the enactment of this Act, Internet transactions will now be

recognized, on-line contracts will be enforceable and e-mails will be legally

acknowledged. It will tremendously augment domestic as well as international

trade and commerce.

The Information Technology Act extends to the whole of India and, saves

as otherwise provided in this Act , it applies also to any offence or contravention

there under committed outside India by any person.

However The Act does not apply to:

1. A negotiable instrument as defined in section 13 of the Negotiable

Instruments Act,1881;

2. A power-of-attorney as defined in section 1A of the Powers-of-

Attorney Act, 1882;

3. A trust as defined in section 3 of the Indian Trusts Act, 1882;

4. A will as defined in clause (h) of section 2 of the Indian Succession

Act, 1925 including any other testamentary disposition by whatever

name called;

5. Any contract for the sale or conveyance of immovable property or

any interest in such property;

6. Any such class of documents or transactions as may be notified by

the Central Government in the Official Gazette.

Information Technology Act 2000 5

Page 6: Ultimate LAW

Advantages of I.T. Act 2000:-

1. Helpful to promote e-commerce

• Email is valid

• Digital signature is valid.

• Payment via credit card is valid.

• Online contract is valid

Above all things validity in eye of Indian law is very necessary. After making IT

act 2000, all above things are valid and these things are very helpful to promote

e-commerce in India.

2. Enhance the corporate business

After issuing digital signature, certificate by Certifying authority, now Indian

corporate business can enhance.

3. Filling online forms

After providing facility, filling online forms for different purposes has become so

easy.

4. High penalty for cyber crime

Law has power to penalize for doing any cyber crime. After making of this law,

nos. of cyber crime has reduced.

Information Technology Act 2000 6

Page 7: Ultimate LAW

Shortcomings of I.T. Act 2000:-

1. Infringement of copyright has not been included in this law.

2. No protection for domain names.

3. The act is not applicable on the power of attorney, trusts and will.

4. Act is silent on taxation.

5. No, provision of payment of stamp duty on electronic documents

Information Technology Act 2000 7

Page 8: Ultimate LAW

NASSCOM’s contribution to IT in India: NASSCOM is India's National Association of Software and Service Companies, the premier trade body and the chamber of commerce of the IT software and services industry in India. NASSCOM is a global trade body with over 1100 members, of which over 250 are global companies from the US, UK, EU, Japan and China. NASSCOM's member companies are in the business of software development, software services, software products, IT-enabled/BPO services and e-commerce.

NASSCOM was set up to facilitate business and trade in software and services and to encourage advancement of research in software technology. It is a not-for-profit organization, registered under the Societies Act, 1860.

NASSCOM has been the strongest proponent of global free trade in India. NASSCOM is committed to work proactively to encourage its members to adopt world class management practices, build and uphold highest quality standards and become globally competitive.

In India and around the world, NASSCOM members are participants in the new global economy and are reputed for their cutting-edge business practices and social initiatives.

NASSCOM's Vision

NASSCOM's vision is to establish India as the 21st century's software powerhouse and position the country as the global sourcing hub for software and services.

NASSCOM Membership

NASSCOM welcomes as members, companies and firms that are incorporated and/or are registered in India, which have made and will make positive contributions to the IT industry in India and globally. Member companies are expected to comply with the Association’s code of conduct.

Membership Strength

The membership of NASSCOM has been steadily increasing. In 1988, NASSCOM had 38 members, who together contributed close to 65 percent of the revenue of the software industry. Since then, membership of NASSCOM has grown multifold to reach over 1100 members. These members currently account for over 95 percent of the revenues of the software industry in India.

Here is a list of prominent members of executive council of NASSCOM.

Som Mittal - President of NASSCOM for 2009-2010 Pramod Bhasin - Chairman of NASSCOM(former) Harsh Manglik -Chairman of NASSCOM for 2010-2011 Mr. Rajendra S. Pawar as the new Chairman of its Executive Council for the year

2011-2012 (April 26, 2011)

Information Technology Act 2000 8

Page 9: Ultimate LAW

Aims and Objectives

The primary objective of NASSCOM is to act as a catalyst for the growth of the software driven IT industry in India. Other goals include facilitation of trade and business in software and services, encouragement and advancement of research, propagation of education and employment, enabling the growth of the Indian economy and provide compelling business benefits to global economies by global sourcing.

NASSCOM also endeavors to leverage IT and narrow the digital divide in India and enable her citizens to enjoy the benefits of IT. It also boosts the process of Innovation; IT workforce development and enhance cyber security.

NASSCOM is achieving its objectives by following a seven fold strategy: Partner with Government of India and State Governments in formulating IT policies

and legislation. Partner with global stakeholders for promoting the industry in global markets.

Strive for a thought leadership position and deliver world-class research and strategic inputs for the industry and its stakeholders.

Encourage members to uphold world class quality standards. Strive to uphold Intellectual Property Rights of its members. Strengthen the brand equity of India as a premier global sourcing destination. Expand the quantity and quality of the talent pool in India. Continuous engagement with all member companies and stakeholders to devise

strategies to achieve shared aspirations for the industry and the country.

Partnership with the Government

NASSCOM acts as an advisor, consultant and coordinating body for the software and

services industry in India.

NASSCOM has representatives in various committees in the Government of India including

the Ministry of Information Technology, Ministry of Commerce, the Ministry of Finance,

Department of Telecommunication, Ministry of Human Resources Development, Ministry of

Labor and the Ministry of External Affairs. NASSCOM also acts as a consulting body for

various State Governments in India.

NASSCOM has played a key role in enabling the government in India to develop industry

friendly policies. NASSCOM has been a proponent of free trade, arguing for zero tariff

protection, strong intellectual property and data protection laws, deregulation of the telecom

market and the creation of software technology parks and private sector participation in the

education system - measures which have resulted in significant growth of the industry.

NASSCOM has also been engaged with various governments overseas, to promote a win-win

Information Technology Act 2000 9

Page 10: Ultimate LAW

partnership via global sourcing. NASSCOM also plays a role in engaging with global

alliances on software quality standards, immigration policies, WTO and free trade in services,

and next-generation best practices in global sourcing of services.

Partnership with Members

NASSCOM provides value-added services to its members to grow their business and create an ecosystem which promotes growth and profitability.

This includes: Forums for making business connections and sharing best practices Participation in seminars and conferences (in India and abroad) with customer

delegations Access to world-class research and market intelligence services; and counsel from

leading analysts and think tanks and consultants Access to knowledge of global business practices (taxation, legislation, immigration

policies, recruitment and branding) Opportunity to "give back" to the society by participation in NASSCOM Foundation,

IT Workforce development initiative and other digital divide initiatives

Contribute in development of global standards and thought leadership in areas of IP creation,

security, data protection, and next-generation software quality standards.

Information Technology Act 2000 10

Page 11: Ultimate LAW

I ntroduction to Cyber Crime

The first recorded cyber crime took place in the year 1820! That is not

surprising considering the fact that the abacus, which is thought to be the earliest

form of a computer, has been around since 3500 B.C. in India, Japan and China.

The era of modern computers, however, began with the analytical engine of

Charles Babbage. Cyber crime is an evil having its origin in the growing

dependence on computers in modern life. In a day and age when everything from

microwave ovens and refrigerators to nuclear power plants is being run on

computers, cyber crime has assumed rather sinister implications. Major cyber

crimes in the recent past include the Citibank rip off. US $ 10 million were

fraudulently transferred out of the bank and into a bank account in Switzerland. A

Russian hacker group led by Vladimir Kevin, a renowned hacker, perpetrated the

attack. The group compromised the bank's security systems. Vladimir was

allegedly using his office computer at AO Saturn, a computer firm in St.

Petersburg, Russia, to break into Citibank computers. He was finally arrested on

Heathrow airport on his way to Switzerland.

With increased use of computers in homes and offices, there has been a

proliferation of computer-related crimes. These crimes include:

(i) Crimes committed by using computers as a means, including

conventional crimes.

(ii) Crimes in which computers are targets.

The Internet in India is growing rapidly. It has given rise to new opportunities

in every field we can think of – be it entertainment, business, sports or education.

There are two sides to a coin. Internet also has its own disadvantages. One of the

major disadvantages is Cybercrime – illegal activity committed on the Internet.

The Internet, along with its advantages, has also exposed us to security risks that

come with connecting to a large network. Computers today are being misused for

illegal activities like e-mail espionage, credit card fraud, spams, and software

piracy and so on, which invade our privacy and offend our senses. Criminal

activities in the cyberspace are on the rise.

Information Technology Act 2000 11

Page 12: Ultimate LAW

Success in any field of human activity leads to crime that needs

mechanisms to control it. Legal provisions should provide assurance to users,

empowerment to law enforcement agencies and deterrence to criminals. The law

is as stringent as its enforcement. Crime is no longer limited to space, time or a

group of people. Cyber space creates moral, civil and criminal wrongs. It has now

given a new way to express criminal tendencies. Back in 1990, less than 100,000

people were able to log on to the Internet worldwide. Now around 500 million

people are hooked up to surf the net around the globe.

"The modern thief can steal more with a computer than with a gun.

Tomorrow's terrorist may be able to do more damage with a keyboard than

with a bomb".

Until recently, many information technology (IT) professionals lacked

awareness of and interest in the cyber crime phenomenon. In many cases, law

enforcement officers have lacked the tools needed to tackle the problem; old laws

didn’t quite fit the crimes being committed, new laws hadn’t quite caught up to

the reality of what was happening, and there were few court precedents to look to

for guidance? Furthermore, debates over privacy issues hampered the ability of

enforcement agents to gather the evidence needed to prosecute these new cases.

Finally, there was a certain amount of antipathy—or at the least, distrust—

between the two most important players in any effective fight against cyber

crime: law enforcement agencies and computer professionals. Yet close

cooperation between the two is crucial if we are to control the cyber crime

problem and make the Internet a safe “place” for its users.

In the world of cyber crime, evil bytes are fast replacing whizzing bullets.

The Indian authorities are aware of the fight ahead. But the future does not look

optimistic, shares experts.

Life is about a mix of good and evil. So is the Internet. For all the good it

does us, cyberspace has its dark sides too. Unlike conventional communities

though, there are no policemen patrolling the information superhighway, leaving

it open to everything from Trojan horses and viruses to cyber stalking, trademark

counterfeiting and cyber terrorism.

Information Technology Act 2000 12

Page 13: Ultimate LAW

Given the unrestricted number of free Web sites, the Internet is undeniably

open to exploitation. Known as cyber crimes, these activities involve the use of

computers, the Internet, cyberspace and the World Wide Web. "Any criminal

activity that uses a computer either as an instrumentality, target or a means for

perpetuating further crimes comes within the ambit of cyber crime," says

Supreme Court advocate and cyber law expert Pavan Duggal.

While the worldwide scenario on cyber crime looks bleak, the situation in

India isn't any better. There are no concrete statistics but, according to Duggal,

Indian corporate and government sites have been attacked or defaced more than

780 times between February 2000 and December 2002.

Mr. Duggal stated that, Despite the Information Technology Act, 2000,

there are still several grey areas that exist within the law. "The IT Act, 2000, is

primarily meant to be a legislation to promote e-commerce. It is not very

effective in dealing with several emerging cyber crimes like cyber harassment,

defamation, stalking and so on."

Information Technology Act 2000 13

Page 14: Ultimate LAW

Defining Cyber Crime

Defining cyber crimes, as "acts that are punishable by the Information

Technology Act" would be unsuitable as the Indian Penal Code also covers many

cyber crimes, such as email spoofing and cyber defamation, sending threatening

emails etc. A simple yet sturdy definition of cyber crime would be "unlawful acts

wherein the computer is either a tool or a target or both".

Information Technology Act & Indian Penal Code

All cyber crimes do not come under the IT Act. Many cyber crimes come under

the Indian Penal Code.

Sending threatening messages by email: Section 506 IPC

Sending defamatory messages by email : Section 499 IPC

Web-jacking: Section 383 IPC

Online sale of narcotics: NDPS Act

Online sale of weapons: Arms Act

E- mail Abuse: Section 500 IPC

Hacking: Section 66 IT Act

Pornography: Section 67 IT Act

Virus attacks: Section 43, 66 IT Act

Salami attacks: Section 66 IT Act

Information Technology Act 2000 14

Page 15: Ultimate LAW

Types of Cyber Crimes

Financial crimes

This would include cheating, credit card frauds, money laundering etc. To

cite a recent case, a website offered to sell Alphonso mangoes at a throwaway

price. Distrusting such a transaction, very few people responded to or supplied

the website with their credit card numbers. These people were actually sent the

Alphonso mangoes. The word about this website now spread like wildfire.

Thousands of people from all over the country responded and ordered mangoes by

providing their credit card numbers. The owners of what was later proven to be a

bogus website then fled taking the numerous credit card numbers and proceeded

to spend huge amounts of money much to the chagrin of the card owners.

Caselet: Wipro Spectra mind lost the telemarketing contract from Capital

one due to an organized crime. The telemarketing executives offered fake

discounts, free gifts to the Americans in order to boost the sales of the Capital

one. The internal audit revealed the fact and surprisingly it was also noted that

the superiors of these telemarketers were also involved in the whole scenario.

Cyber pornography

This would include pornographic websites; pornographic magazines

produced using computers (to publish and print the material) and the Internet (to

download and transmit pornographic pictures, photos, writings etc). Recent Indian

incidents revolving around cyber pornography include the Air Force Balbharati

School case. A student of the Air Force Balbharati School, Delhi, was teased by

all his classmates for having a pockmarked face. Tired of the cruel jokes, he

decided to get back at his tormentors. He scanned photographs of his classmates

and teachers, morphed them with nude photographs and put them up on a website

that he uploaded on to a free web hosting service. It was only after the father of

one of the class girls featured on the website objected and lodged a complaint

with the police that any action was taken.

In another incident, in Mumbai a Swiss couple would gather slum children

and then would force them to appear for obscene photographs. They would then

upload these photographs to websites specially designed for paedophiles. The

Mumbai police arrested the couple for pornography.

Information Technology Act 2000 15

Page 16: Ultimate LAW

Sale of illegal articles

This would include sale of narcotics, weapons and wildlife etc., by posting

information on websites, auction websites, and bulletin boards or 167 simply by

using email communication. E.g. many of the auction sites even in India are

believed to be selling cocaine in the name of 'honey'.

Phishing

In computing, phishing (also known as carding and spoofing) is a form of

social engineering, characterized by attempts to fraudulently acquire sensitive

information, such as passwords and credit card details, by masquerading as a

trustworthy person or business in an apparently official electronic

communication, such as an email or an instant message. The term phishing arises

from the use of increasingly sophisticated lures to "fish" for users' financial

information and passwords.

Caselet: RBI Phishing Scam: In a daring phishing attack of its kind, the fraudsters

even have not spared the Reserve Bank of India. The phishing email disguised as originating

from the RBI, promised its recipient prize money of Rs.10 Lakhs within 48 hours, by giving a

link which leads the user to a website that resembles the official website of RBI with the

similar logo and web address. The user is then asked to reveal his personal information like

password, I-pin number and savings account number. However, the RBI posted a warning

regarding the fraudulent phishing e-mail on the bank's official website.

Online gambling

There are millions of websites; all hosted on servers abroad, that offer

online gambling. In fact, it is believed that many of these websites are actually

fronts for money laundering.

Caselet: Recent Indian case about cyber lotto was very interesting. A man

called Kola Mohan invented the story of winning the Euro Lottery. He himself

created a website and an email address on the Internet with the address

'[email protected].' Whenever accessed, the site would name him as the

beneficiary of the 12.5 million pound. After confirmation a telgu newspaper

published this as news. He collected huge sums from the public as well as from

some banks for mobilization of the deposits in foreign currency. However, the

Information Technology Act 2000 16

Page 17: Ultimate LAW

fraud came to light when a cheque discounted by him with the Andhra Bank for

Rs 1.73 million bounced. Mohan had pledged with Andhra Bank the copy of a

bond certificate purportedly issued by Midland Bank, Sheffields, London stating

that a term deposit of 12.5 million was held in his name.

Intellectual Property crimes

These include software piracy, copyright infringement, trademarks

violations, theft of computer source code etc.

Caselet: These include software piracy, copyright infringement,

trademarks violations, theft of computer source code etc. In other words this is

also referred to as cybersquatting. Satyam Vs. Siffy is the most widely known

case. Bharti Cellular Ltd. filed a case in the Delhi High Court that some cyber

squatters had registered domain names such as barticellular.com and

bhartimobile.com with Network solutions under different fictitious names. The

court directed Network Solutions not to transfer the domain names in question to

any third party and the matter is sub-judice.

Cyber Defamation

This occurs when defamation takes place with the help of computers and or the

Internet. E.g. someone publishes defamatory matter about someone on a website

or sends e-mails containing defamatory information to all of that person's friends.

Caselet: India’s first case of cyber defamation was reported when a

company’s employee started sending derogatory, defamatory and obscene e-mails

about its Managing Director. The e-mails were anonymous and frequent, and were

sent to many of their business associates to tarnish the image and goodwill of the

company. The company was able to identify the employee with the help of a

private computer expert and moved to the Delhi High Court. The court granted an

ad-interim injunction and restrained the employee from sending, publishing and

transmitting e-mails, which are defamatory or derogatory to the plaintiffs.

Information Technology Act 2000 17

Page 18: Ultimate LAW

Cyber stalking

The Oxford dictionary defines stalking as "pursuing stealthily". Cyber

stalking involves following a person's movements across the Internet by posting

messages (sometimes threatening) on the bulletin boards frequented by the

victim, entering the chat-rooms frequented by the victim, constantly bombarding

the victim with emails etc.

Caselet: Ritu Kohli has the dubious distinction of being the first lady to

register the cyber stalking case. A friend of her husband gave her telephonic

number in the general chat room. The general chatting facility is provided by

some websites like MIRC and ICQ, Where the person can easily chat without

disclosing his true identity. The friend of husband also encouraged this chatters to

speak in slang language to Ms. Kohli.

Unauthorized access to computer systems or networks

This activity is commonly referred to as hacking. The Indian law has

however given a different connotation to the term hacking, so we will not use the

term "unauthorized access" interchangeably with the term "hacking".

Caselet: However, as per Indian law, unauthorized access does occur, if

hacking has taken place. An active hackers’ group, led by one “Dr. Nuker”, who

claims to be the founder of Pakistan Hackerz Club, reportedly hacked the

websites of the Indian Parliament, Ahmedabad Telephone Exchange, Engineering

Export Promotion Council, and United Nations (India).

Sending threatening emails

Caselet: A 16 year old student from Ahmadabad who threatened to blow up

Andheri Railway station in an email message was found guilty by the Juvenile

court in Mumbai. A private news channel received an email on 18 March 2008

claiming sender as Dawood Ibrahim gang saying a bomb would be planted on an

unspecified train to blow it up. The case was registered in Andheri Police station

under section 506 of IPC and transferred to cyber crime investigation cell. During

Investigation CCIC traced the cyber cafe from which the email account was

created and threatening email was sent. Cafe owner told police about friends

which had come that day to surf the net. Police summoned them and found that

Information Technology Act 2000 18

Page 19: Ultimate LAW

the system which was used to send email was accessed by only one customer. On

22nd March 08, police arrested the boy a Class XII science student who during

interrogation said that he sent the email for fun of having his prank flashed as

“breaking news’’ on

television.

Salami attacks

These attacks are used for the commission of financial crimes. The key

here is to make the alteration so insignificant that in a single case it would go

completely unnoticed.

Virus / worm attacks

Viruses are programs that attach themselves to a computer or a file and

then circulate themselves to other files and to other computers on a network. They

usually affect the data on a computer, either by altering or deleting it. Worms,

unlike viruses do not need the host to attach themselves to. They merely make

functional copies of themselves and do this repeatedly till they eat up all the

available space on a computer's memory

Caselet: E.g. love bug virus, which affected at least 5 % of the computers of the

globe. The losses were accounted to be $ 10 million. The world's most famous worm was the

Internet worm let loose on the Internet by Robert Morris in 1988 that almost brought

development of Internet to a complete halt.

Logic bombs

These are event dependent programs. This implies that these programs are

created to do something only when a certain event (known as a trigger event)

occurs. E.g. even some viruses may be termed logic bombs because they lie

dormant all through the year and become active only on a particular date

Information Technology Act 2000 19

Page 20: Ultimate LAW

Trojan attacks

A Trojan as this program is aptly called is an unauthorized program which

functions from inside what seems to be an authorized program, thereby

concealing what it is actually doing.

Web jacking

This occurs when someone forcefully takes control of a website (by

cracking the password and later changing it). The actual owner of the website

does not have any more control over what appears on that website in a recent

incident reported in the USA the owner of a hobby website for children received

an e-mail informing her that a group of hackers had gained control over her

website.

Caselet: Recently the site of MIT (Ministry of Information Technology) was hacked by the Pakistani hackers and some obscene matter was placed therein. Further the site of Bombay crime branch was also web jacked. Another case of web jacking is that of the ‘gold fish’ case. In this case the site was hacked and the information pertaining to gold fish was changed. Further a ransom of US $ 1 million was demanded as ransom. Thus web jacking is a process where by control over the site of another is made backed by some consideration for it.

Pay-Per Click Fraud

Caselet: Click fraud (sometimes called pay-per-click fraud) is the practice

of artificially inflating traffic statistics to defraud advertisers or Web sites that

provide venues for advertisers. In the common pay-per-click advertising model,

advertisers pay a fee for each click on their link. According to a CNET News

article some industry segments have costs-per-click of several dollars. By using

automated clicking programs (called hit bots) or employing low-cost workers to

click the links, the perpetrators create the illusion that a large number of potential

customers are clicking the advertiser's links, when in fact there is no likelihood

that any of the clicks will lead to profit for the advertiser.

Click fraud scammers often take advantage of the affiliate programs offered by

some Web sites, such as Google and Yahoo! Search Marketing. The scammers

sign up for the affiliate programs, agreeing to provide further exposure to the

advertising in question and receiving a portion of the pay-per-click fees in return.

The perpetrators place the ads on Web sites created solely for this purpose that,

Information Technology Act 2000 20

Page 21: Ultimate LAW

naturally, doesn’t have any real traffic. Once the ads are in place, the hitbots or

workers generate large volumes of fraudulent clicks, often in a very short time

period, for which the scammer bills the owner of the affiliate program. Both

Google and Yahoo! Search Marketing have had to reimburse advertisers for pay-

per-click fees that were discovered to have been the result of click fraud.

Information Technology Act 2000 21

Page 22: Ultimate LAW

Cyber Crime Statistics of India

Source:-http://www.consumerfraudreporting.org/internet_scam_statistics.htm

Information Technology Act 2000 22

Page 23: Ultimate LAW

Types of Cyber Criminals

Kids (age group 9-16 etc.)

It seems really difficult to believe but it is true. Most amateur hackers and

cyber criminals are teenagers. To them, who have just begun to understand what

appears to be a lot about computers, it is a matter of pride to have hacked into a

computer system or a website. There is also that little issue of appearing really

smart among friends. These young rebels may also commit cyber crimes without

really knowing that they are doing anything wrong.

Organized hacktivists

Hacktivists are hackers with a particular (mostly political) motive. In other

cases this reason can be social activism, religious activism, etc. The attacks on

approximately 200 prominent Indian websites by a group of hackers known as

Pakistani Cyber Warriors are a good example of political hacktivists at work.

Disgruntled employees

One can hardly believe how spiteful displeased employees can become. Till

now they had the option of going on strike against their bosses. Now, with the

increase independence on computers and the automation of processes, it is easier

for disgruntled employees to do more harm to their employers by committing

computer related crimes, which can bring entire systems down.

Professional hackers (corporate espionage)

Extensive computerization has resulted in business organizations storing

all their information in electronic form. Rival organizations employ hackers to

steal industrial secrets and other information that could be beneficial to them. The

temptation to use professional hackers for industrial espionage also stems from

the fact that physical presence required to gain access to important documents is

rendered needless if hacking can retrieve those.

Information Technology Act 2000 23

Page 24: Ultimate LAW

Some of the Important Definition

1. "Affixing digital signature" with its grammatical variations and cognate

expressions means adoption of any methodology or procedure by a person

for the purpose of authenticating an electronic record by means of digital

signature;

2. "Certifying Authority" means a person who has been granted a licence to

issue a Digital Signature Certificate under section 24;

3. "Certification practice statement" means a statement issued by a

Certifying Authority to specify the practices that the Certifying Authority

employs in issuing Digital Signature Certificates;

4. "Digital signature" means authentication of any electronic record by a

subscriber by means of an electronic method or procedure in accordance

with the provisions of section 3;

5. "Digital Signature Certificate" means a Digital Signature Certificate

issued under subsection of section 35;

6. "Electronic form" with reference to information means any information

generated, sent, received or stored in media, magnetic, optical, computer

memory, micro film, computer generated micro fiche or similar device;

7. "Secure system" means computer hardware, software, and procedure that—

(a) are reasonably secure from unauthorised access and misuse;

(b) provide a reasonable level of reliability and correct operation;

(c) are reasonably suited to performing the intended functions; and

(d) adhere to generally accepted security procedures;

Information Technology Act 2000 24

Page 25: Ultimate LAW

Writing requirements

Section 4 of the Act states that when under any particular law, if any

information is to be provided in writing or typewritten or printed form, then

notwithstanding that law, the same information can be provided in electronic

form, which can also be accessed for any future reference. This non-obstinate

provision will make it possible to enter into legally binding contracts on-line!

Penalties for Computer Crimes

Information Technology Act 2000 25

Page 26: Ultimate LAW

Source:- http://www.indiaitlaw.com/comcriact.htm

Police Powers

A police officer not below the rank of deputy superintendent of police has

the power to enter any public place and arrest any person without a warrant if he

believes that a cyber crime has been or is about to be committed. This provision

may not turn to be very effective for the simple reason that most of the cyber

crimes are committed from private places such as ones own home or office.

Cyber-cafés and public places are rarely used for cyber crimes. However, if the

Act did give the police department powers to enter people’s houses without

search warrants, it would amount to an invasion of the right to privacy and create

pandemonium. Keeping this in mind, the Legislature has tried to balance this

provision so as to serve the ends of justice and at the same time, avoid any chaos.

On being arrested, the accused person must, without any unnecessary

delay, be taken or sent to the magistrate having jurisdiction or to the officer-in-

charge of a police station. The provisions of the Code of Criminal Procedure,

1973 shall apply in relation to any entry, search or arrest made by the police

officer.

Information Technology Act 2000 26

Page 27: Ultimate LAW

Digital Signature

Digital Signature means authentication of any electronic record by a

subscriber by means of an electronic method or procedure.

Rapid developments in e-business pose a growing need for online security

and authentication. Many emerging technologies are being developed to provide

online authentication. The major concern in e-business transactions is the need

for the replacement of the hand-written signature with an online signature. The

traditional e-mail system, which has problems of message integrity and non-

repudiation, does not fulfil the basic requirements for an online signature.

Further, since the Internet communication system is prone to various types of

security breaches, the discussion of robust and authenticated e-business

transactions is incomplete without consideration of ‘security’ as a prominent

aspect of ‘online signatures’.

One may consider an e-signature as a type of electronic authentication.

Such authentication can be achieved by means of different types of technologies.

A Digital Signature (DS) can be considered as a type of e-signature, which uses a

particular kind of technology that is DS technology. DS technology involves

encrypting messages in such a way that only legitimate parties are able to decrypt

the message. Two separate but interrelated ‘keys’ carry out this process of

encryption and decryption.

One party in the transactions holds the secret key, or the private key, and

the other party holds the public key or the key with wide access. The selection

and use of an encryption technique plays a crucial role in the design and

development of keys. In short, a DS satisfies all the functions, such as

authenticity, non-repudiation, and security, of a hand-written signature. Such a

‘signature’ can be viewed as a means of authentication and can be owned by an

individual. While using this technology, there must be third party involvement

order to handle the liability issues that may be raised by bilateral transactions.

With this existing legal infrastructure and the rapid emergence of software

security products, it is important to understand the role of emerging technologies

Information Technology Act 2000 27

Page 28: Ultimate LAW

like DS in e-business. One of the major indicators of technological improvements

is the market development and commercialization of that technology.

Legitimacy and Use of Digital Signatures

The Act has adopted the Public Key Infrastructure for securing electronic

transactions. As per Section 3 of the Act, a digital signature means an

authentication of any electronic record by a subscriber by means of an electronic

method or procedure in accordance with the other provisions of the Act. Thus a

subscriber can authenticate an electronic record by affixing his digital signature.

A private key is used to create a digital signature whereas a public key is used to

verify the digital signature and electronic record. They both are unique for each

subscriber and together form a functioning key pair.

Section 5 provides that when any information or other matter needs to be

authenticated by the signature of a person, the same can be authenticated by

means of the digital signature affixed in a manner prescribed by the Central

Government. Under Section 10, the Central Government has powers to make rules

prescribing the type of digital signature, the manner in which it shall be affixed,

the procedure to identify the person affixing the signature, the maintenance of

integrity, security and confidentiality of electronic records or payments and rules

regarding any other appropriate matters.

Furthermore, these digital signatures are to be authenticated by Certifying

Authorities (CA’s) appointed under the Act. These authorities would inter alias;

have the license to issue Digital Signature Certificates (DSC’s). The applicant

must have a private key that can create a digital signature. This private key and

the public key listed on the DSC must form the functioning key pair.

Once the subscriber has accepted the DSC, he shall generate the key pair

by applying the security procedure. Every subscriber is under an obligation to

exercise reasonable care and caution to retain control of the private key

corresponding to the public key listed in his DSC. The subscriber must take all

precautions not to disclose the private key to any third party. If however, the

private key is compromised, he must communicate the same to the Certifying

Authority (CA) without any delay.

Information Technology Act 2000 28

Page 29: Ultimate LAW

Possible Uses of E-Governance

The future of e-governance is very bright. With the help of information

technology, the daily matters can be effectively taken care of irrespective of the

field covered by it. For instance, the Delhi Police Headquarter has launched a

website, which can be used for lodging a First Information Report. Similarly, the

Patna High Court has taken a bold step of granting bail on the basis of an online

bail application. The educational institutions, including universities, are issuing

admission forms electronically, which can be downloaded from their respective

websites. The results of examinations of various educational institutions, both

school level and university level, are available online, which can be obtained

without any trouble. These are but some of the instances of the use of technology

for a better e-governance.

The beneficial concept of e-governance can be utilized for the following

purposes:

To have access to public documents.

For making online payments of various bills and dues.

To file statutory documents online.

To file the complaints, grievances and suggestions of citizens online.

The online facility can be used to enter into a partnership the appropriate

government in cases of government contracts.

The citizens can use the online facility to file their income tax returns.

The citizens will enjoy the facility of online services.

Information Technology Act 2000 29

Page 30: Ultimate LAW

MCA21 project under E-Governance

Background

Keeping in tune with the E-Governance initiatives the world over, Ministry of Company Affairs (MCA), Government of India, has initiated the MCA21 project, which will enable an easy and secure access to MCA services in a manner that best suits the corporate entities and professionals besides the public. MCA21 is intended to achieve all the objectives of a versatile E-Governance project. The project is named as MCA21 as it aims at repositioning MCA as an organization capable of fulfilling the aspirations of its stakeholders in the 21st century. Rather than compelling the business community to physically travel to MCA offices, MCA services will be made available at the place of their choice, be it their homes or offices. The major components involved in this comprehensive E-Governance project are Front Office and Back Office.

The MCA21 project is designed to fully automate all processes related to the proactive enforcement and compliance of the legal requirements under the Companies Act, 1956. This will help the business community to meet their statutory obligations. From the customer perspective, the Front Office operations assume significance, which would be administered through the Front Office portal. The entire Back Office operations of the MCA would be automated so as to achieve the objective of a user friendly computerized environment. My MCA portal is the single point of contact for all MCA related services, which can be easily accessed over the Internet by all users.

The project also envisages a cost effective integrated software solution for computerizing various in‐house functions like Human Resources Management, Payroll, Accounting and Finance for internal users (employees) of MCA. Permanent documents of existing companies like memorandum of association, articles of association, current charge documents, are presently maintained in paper form across various Registrar of Companies (RoC) offices. These documents are being converted into electronic format and it is being carried out at the respective RoC offices as part of this project.

The scope of MCA21 project covers only the offices of RoCs, Regional Directors and the Headquarters at New Delhi. It does not include other offices of MCA like Official Liquidators, Company Law Board / Tribunal and Courts. The success of the service oriented approach, the most fundamental ingredient of this project, will depend greatly on analyzing and responding to the needs of all stakeholders. To that extent, the project will develop a mechanism to constantly develop and improve the MCA21 system. It will be made possible by analyzing usage patterns and error/status messages as well as feedback from the customers comprising the corporate, professionals and the public.

Key Benefits of MCA21 Project

MCA21 seeks to fulfill the requirements of the various stakeholders including the corporate, professionals, public, financial institutions and banks, Government and the MCA employees. The key benefits of MCA21 project are as follows:

a) On line incorporation of companies on line b) Simplified and easy mode of filing of Forms/ Returns c) Registration as well as verification of charges anytime and from anywhere d) Inspection of public documents of companies anytime from anywhere e) Corporate centric approach

Information Technology Act 2000 30

Page 31: Ultimate LAW

f) Building up a centralized database repository of corporate operating in India g) Enhanced service level fulfillment and customer relationship building h) Total transparency through E-Governance i) Timely redressed of investor grievances j) Availability of more time for MCA employees for qualitative analysis of

corporate information

An Overview of MCA set up

The MCA mainly administers the Companies Act, 1956 and The Monopolies and Restrictive Trade Practices Act 1969. Besides, it also administers the following Acts:

a) The Competition Act, 2002 b) The Chartered Accountants Act, 1949 c) The Costs and Works Accounts Act, 1959 d) The Company Secretaries Act, 1980 e) The Partnership Act, 1932 f) The Societies Registration Act, 1860 g) The Companies (Donation to National Fund) Act, 1951

The MCA, which functions under overall direction and supervision of the Minister of Company Affairs, has a three tier organizational set up for administration of the Act, namely, the Headquarters at New Delhi, the Regional Directors at Mumbai, Kolkata, Chennai and Noida and the RoCs in States and Union Territories. The Official Liquidators who are attached to various High Courts functioning in the country are also under the overall administrative control of the Ministry. The Company Law Board, a quasi judicial body, has its Principal Bench at Delhi, an additional Principal Bench for Southern States at Chennai and four Regional Benches located at Delhi, Mumbai, Kolkata and Chennai.

The four Regional Directors are in charge of the respective regions, each region comprising a number of States and Union Territories. They supervise the working of the offices of the RoCs and the Official Liquidators working in their regions. They also maintain liaison with the respective State Governments and the Central Government in matters relating to the administration of the Companies Act. Certain powers of the Central Government under the Act have been delegated to the Regional Directors. There is also an inspection unit attached to the office of every Regional Director for carrying out the inspection of the books of accounts of Companies under Section 209A of the Companies Act.

RoCs appointed under Section 609 of the Companies Act and covering the various States and Union Territories are vested with the primary duty of registering companies in the respective States and the Union Territories and ensuring that such companies comply with statutory requirements under the Act. These offices function as registry of records, relating to the companies registered with them, which are available for inspection by members of public on payment of the prescribed fee. The Central Government exercises administrative control over these offices through the respective Regional Directors.

Information Technology Act 2000 31

Page 32: Ultimate LAW

Services Available on MCA21

The following services will be available under the MCA21 Project: Registration and incorporation of new companies Filing of Annual Returns and Balance Sheets Filing of forms for change of names/address/Director’s details Registration and verification of charges Inspection of documents Applications for various statutory services from MCA Investor grievance redressed

Organization of RoC Office under MCA

The RoC office working from its present address will virtually become the Back Office of the Ministry. There are likely to be a number of companies/entities who may find it difficult to switch over to e-Filing at the initial stage. Facilitation Centers known as Physical Front Offices (PFOs) are being set up at 53 locations throughout the country to provide requisite comfort for e-Filing to such companies.

1. Front Office (FO)

The Front Office represents the interface of the corporate and public user with the MCA21 system. This comprises of Virtual Front Office and Physical Front Office. Virtual Front Office merely represents a computer facility for filing of digitally signed e-Forms by accessing the My MCA portal through Internet. It also pre supposes availability of related facilities to convert documents into PDF format and scanning of documents wherever required. When a company or user does not have these computer facilities, it can avail of these facilities at the designated facilitation centers, known as the Physical Front Offices.

2. Virtual Front Office (VFO)

Virtual Front Office facilitates online filing of the e-Forms using Internet. The system automatically does pre scrutiny of the e-Forms filed and indicates error messages in case of incomplete or invalid particulars. Upon successful submission, a Service Request Number (SRN) will be generated by the system for the user, which will be used for future correspondence with MCA. The system calculates the fee payable for the form and accepts online payment through credit cards and Internet banking. There is also an option to make offline payment at designated bank branches through challan generated by the system. In the latter case, the MCA system gets updated on the realizations made by the designated banks on a daily basis.

Virtual Front Office is meant for electronically delivering services at a place and time convenient to the business community through the Front Office portal. The following are the system requirements for VFO:

A Personal Computer Web Browser – Internet Explorer, Netscape Navigator Internet access Adobe Acrobat Reader 7.0.5 WinZip 8.0 Scanner (for scanning of paper documents to be filed as attachments to e-Form)

Information Technology Act 2000 32

Page 33: Ultimate LAW

Printer (for printing bank payment challan or service fee bill)

Thus, you have a Virtual Front Office in your home/office with the above mentioned facilities. You can even use a cyber café or kiosk equipped with above facilities as a Virtual Front Office.

3. Physical Front Office (PFO)

Physical Front Office replaces the existing RoC office counters. It is meant to serve as a facilitation centre to facilitate filing of e-Forms, scanning attachments to e-Forms, generating challans for making payment of fees at the designated bank and finally, uploading the filled in digitally signed e-Forms. The Physical Front Offices will be designed to facilitate electronic delivery of services, similar to the type available at the Virtual Front Office, and will serve corporate who do not have access to computers and Internet.

As part of MCA21, adequate number of Physical Front Offices, including Temporary Front Offices (TFOs), to cater to peak seasonal load, will be established throughout the country to serve better the interests of corporate and professionals. The details of likely Physical Front Offices are given in Appendix A. The finalized address of Physical Front Office in your city can be referred from My MCA portal. While encouraging customers to use Virtual Front Office for fulfilling their obligations as stipulated under the Companies Act 1956, Physical Front Offices would ensure a smooth transition to fully electronic delivery of MCA services. Members of the business community can walk into these offices and obtain services. All the services for scanning and uploading of e-Forms at PFOs would be available free of cost in the Physical Front Offices. Since these facilitation centers are being set up to facilitate e-Filing during the transition period, these will remain operational for a period of three years only, by which time, it is expected that all clients will operate through Virtual Front Offices.

Back Office

The Back Office represents the office of RoCs, Regional Directors, and Headquarters

and takes care of internal processing of the forms filed by the corporate user as per MCA

norms and guidelines. The e-Forms will be routed dynamically to the concerned

authority for processing depending upon the assigned role. All the e-Forms along with

the attachments will be stored in the electronic repository, which the staff of MCA can view

depending upon the access rights.

Information Technology Act 2000 33

Page 34: Ultimate LAW

Contribution of Information Technology in Banking Sector

IT in the Indian Financial Sector – the Beginnings

1. The use of technology in expanding banking has been a key focus area of the Reserve Bank. Technological innovation not only enables a broader reach for consumer banking and financial services, but also enhances its capacity for continued and inclusive growth.

2. There are several factors attributed to India’s high growth in the recent period - improved productivity, growing entrepreneurial spirit, and higher savings, to name the most important. But one factor usually goes unacknowledged – that is financial intermediation. Improvement in the quantum and quality of financial intermediation ranks along with other factors that are mentioned above is a key growth driver. And one of the factors that drove the improvement in the quantum and quality of financial intermediation is more wide spread and more efficient use of IT.

3. Implementing IT in an Indian banking system dominated by government-owned banks has not been easy. In his book ‘Imagining India – Ideas for the New Century’, Nandan Nilekani makes interesting references to this issue. He writes about his travels around the country in the early 1990s, speaking about the role of, what was then called in typical Indian English as ‘electronification’ in Indian banking. After one such presentation, Nandan writes, the chairman of a bank advised him to stop preaching, warning him that (quote), ‘The unions will gherao you in your house!’ Nandan goes on to describe another presentation before an incredibly hostile audience, who dismissed out of hand all his ideas and suggestions. But at the end of the presentation, the union leader told him privately that both his sons were working for Microsoft on software solutions.

Initial days of IT implementation at the Reserve Bank, systems had to be smuggled into the office when ‘the world was sleeping’. IT implementation no longer faces opposition from any quarter. Indeed, everyone welcomes it. Even the trade unions have become extensive users of technology.

IT in the Indian Financial Sector – Status Today

1. More than most other industries, banks and financial institutions rely on gathering, processing, analyzing and providing information in order to meet the needs of customers. Given the importance of information in banking, it is not surprising that banks were among the earliest adopters of automated information processing technology. The visible benefits of IT in day-to-day banking in India are quite well known. There’s ‘Anywhere Banking’ through Core Banking Systems, ‘Anytime Banking’ through new, 24*7*365 delivery channels such as Automated Teller Machines (ATMs), and Net and Mobile Banking.

In addition, IT has enabled the efficient, accurate and timely management of the increased transaction volume that comes with a larger customer base. It has also facilitated the movement from class banking to mass banking.

2. The past few years saw RBI marking some major milestones in the Indian payment and settlement systems. The introduction of the Real Time Gross Settlement (RTGS) System has resulted in compliance with the Basle Core Principles for Systemically Important Payment Systems of the Bank for International Settlements. It also has paved the way for risk-free, credit push based fund transfers settled on a real-time basis and in central bank money. The facility for inter-bank funds settlement through RTGS is today available

Information Technology Act 2000 34

Page 35: Ultimate LAW

across more than 55,000 bank branches, in more than 2500 regional centers across the country – a coverage span perhaps not seen anywhere else in the world.

Now, let’s compare today’s situation with what was in place in 2004, when only 4,800 branches offered RTGS. The rapid acceptance of RTGS by users can be measured by the daily transaction volume: today, close to 100,000 transactions a day in the RTGS mode, up from just about 6000 transactions a day in 2004-05.

3. In fact, quick, safe and efficient electronic movement of funds from virtually any part of the country to any other location is now almost guaranteed. This is enabled by the coordination with the National Electronic Funds transfer (NEFT) System and the National Electronic Clearing Service (NECS). In 2005, RBI was clearing about 2.70 lakh NEFT transactions a month. This number has jumped exponentially to nearly 40 lakh a month today. The establishment of the legal framework for all of this – in the form of the Payment and Settlement Systems Act, 2007 – provides the requisite supportive structure for these systems.

4. The extent of customer migration to electronic payments in India. From less than half a percent of transactions in the electronic mode in 2001, today we process close to about 30 crore transactions per year in the electronic mode. The same holds true for RBI’s recent initiative away from High Value Clearing to electronic modes – a move aimed at creating a safer, secure and credit-push based funds transfer route that has gained considerable traction.

5. There are developments seen in the communication network and messaging system in India. This Institute for Development and Research in Banking Technology (IDRBT), set up by the RBI in 1997, implemented the INdianFInancialNETwork – the INFINET – a ‘one-of-a-kind’ initiative for the banking sector aimed at sharing expensive IT resources so as to achieve economies of scale. One of IDRBT’s notable achievements has been the implementation of Public Key Infrastructure (PKI) - based electronic data transfer with very high security levels. The Institute also developed a messaging standard called Structured Financial Messaging System (SFMS) with security features superior even to SWIFT. Today INFINET has migrated to the latest MPLS technology in an effort to provide a state-of-the-art network.

6. IDRBT also set up the National Financial Switch for interconnecting ATMs. It’s interesting to note that at the turn of the century, there were only about 4000 ATMs in all of India, and today there are more than ten times this number, and all of them interconnected. These changes have enabled RBI to take major step in this area. Like, ATM card holders can use any ATM in the country irrespective of which bank issued them the card.

7. Given the growing importance of IT in the banking sector, it is appropriate that the IDRBT provides incentives to the IT-based operations of commercial banks by evaluating their IT capabilities and motivating them to push for improvements by instituting awards.

IT in the Financial Sector: the Continuing Agenda

1. Information technologies and the innovations they enable are strategic tools for enhancing the value of customer relationship. They reduce the costs of financial transactions, improve the allocation of financial resources, and increase the competitiveness and efficiency of financial institutions.

Information Technology Act 2000 35

Page 36: Ultimate LAW

2. Even as the achievements of IT in the banking sector are impressive, RBI has a big agenda on the way forward. Current financial sector leaders still need to take greater advantage of new technologies and information-based systems and expand the coverage of the Indian banking and financial system. For instance, the potential of IT in extending banking services to under-served markets in rural and semi-urban areas is enormous. The use of Smart Card technology, mobile ATMs, coverage of post offices under electronic payments networks in out-of-reach areas – all could play significant roles in providing financial services to more people and thereby serve financial inclusion.

3. There is tremendous potential for the business growth of financial institutions on the one hand and the inclusive growth of India on the other. We have already seen banks using innovative approaches such as solar power- and mobile technology-based connectivity for branches. A variety of options are available which enable extended reach of such services. The banks should identify the technological model that is right for them. We have already seen the positive benefits that come from extending the reach of banking services through pilot projects in Andhra Pradesh and parts of the North East. The Reserve Bank also has announced its intention to expand the reach of banking in the North East even further by funding the cost of connectivity using VSAT technology. IBA is working on the details of this effort.

4. India is experiencing an explosion in the use of mobile communication technology. And this is a development that the financial sector can exploit. Mobile phone users belong to all strata of society, spread across metropolitan centers, towns and villages. Banks can take advantage of this expanded reach of telecom if they provide services through this medium. The phone’s integrated chip can function as a multi-application smart card, thus making banking services available to virtually every mobile phone owner. This holds substantial promise as the delivery vehicle of the future: there is huge potential and an exciting opportunity. However, the expansion of such capabilities must be accompanied by a minimum level of essential security features and continued compliance with established covenants relating to privacy of customer transactions.

5. The potential of IT for the near future also includes:• Enabling differentiation in customer service;• Facilitating Customer Relationship Management (CRM) based on available

information, which can be stored and retrieved from data warehouses;• Improving asset-liability management for banks, which has a direct bearing on the

profits of banks;• Enhancing compliance with anti-money laundering regulations.

Hence, Investments in newer technologies must be made to modernize existing operations, to face competitive challenges, and to meet customer expectations. Some of these investments will also be made with the goal of achieving cost savings, energy efficiency and environmental friendliness. In the years ahead, the ability of banks to harness new technologies to meet the demands of households and businesses will be tested.

Information Technology Act 2000 36

Page 37: Ultimate LAW

Comparison between INDIA & CHINA

India China

Year 2006 2011 2006 2011

Cases 142 420 400 2050

Arrested 154 288 250 1300

Source: - http://www.gcl.in/downloads/bm_cybercrime.pdf

http://www.webwire.com/ViewPressRel.asp?aId=115645

Over 90% of computer crimes involved were registered under the Information

Technology Act.

Cases fell under two major categories -forgery and criminal breach of trust.

Cybercrime Rates

China 83 % followed by Brazil and India at 76 % and

America ranking third on the list of most victimized

countries. Less than one in 10 people (9%) who responded

said they feel ‘very’ safe online.

India have 10 million compared to China currently has 420 million Internet users, the

largest in the world.

Last year, 250,000 IP addresses in India were hit by Trojans.

262,000 IP addresses in China were hit by Trojans planted by

nearly 165,000 overseas IP addresses.

Penalty for unauthorized data accessing:

India $4500

China $20000

.

Information Technology Act 2000 37

Source: - http://www.globe7.com

Page 38: Ultimate LAW

CHINA

The Ministry of Public Security set up a public information and internet security

supervision department. Police from the supervision department became a new police entity,

mainly in charge of tasks such as supervising, checking and directing the protection of

computer internet information system security; and detecting and dealing with illegal

behaviors and crimes endangering computer internet information system security.

Regarding investigation skills, the public information and internet security supervision

department initiated a research project for “cyber crime investigation skills” with the

approval of the Ministry of Science and Technology, and has been listed in the tenth five-year

plan of technology break-through.

20% of cyber crime cases have been investigated and solved. In China, 25% of major

cyber crimes are internet frauds. A second form of cyber crimes is to spread pornographic

messages and shows. Another form is that criminals reach potential victims through the

internet, with the purpose of committing sexual assault or murder. There are also internet

traps and canvassing etc, which are present in 15% of cases.

Beijing: Nearly 180 cyber crimes were solved during November and more than 460

suspects were arrested for their involvement, China's ministry of public security said on

Tuesday.

Fourteen websites were shut during the month for allegedly providing hacker

software, training hackers and organizing cyber attacks, Xinhua reported.

Information Technology Act 2000 38

Page 39: Ultimate LAW

INDIA

The MoU establishes collaboration through the Cyber and Hi-Tech Crime

Investigation & Training (CHCIT) Centre of CBI and the Data Security Council of India

(DSCI), a section 25 not-for-profit company, setup as an independent self regulatory

organization by Nasscom. The scope for the collaboration ranges from better awareness on

emerging technologies and security standards to best practices and education in emerging

cyber technologies.

Hacking ruled the roost within these 420 cases, where 233 cases were of alleged

hacks. Pornography closely followed by 139 offences. They both were 74 and 88

respectively in 2006.

According to sources, Under the Indian Penal Code (IPC) a total of 276 cases,

were registered during 2009 as compared to 176 such cases during 2008, an increase of 56.8

percent. Majority of the crimes out of276 cases fell under two categories -forgery and

criminal breach of trust.

Cities like Bangalore, Ahmedabad, Delhi, Ludhiana, Pune among others, saw

high occurrence of cyber crime cases under the IT act with a total of 145 of the 178

cases.

Information Technology Act 2000 39

Page 40: Ultimate LAW

Critical Infrastructures under Constant Cyber attack Globally

Critical infrastructure systems around the world are the targets of repeated cyber

attacks, according to a new global survey of technology executives in these industries. They

believe some of the attacks are coming not just from individual cybercriminals but terrorists

and foreign nation states. The United States and China are believed to be the most likely

countries to conduct a cyber attack against the critical infrastructure of another nation,

according to the respondents.

Companies and agencies operating in the banking and finance sectors, energy and

natural resources, telecommunications and internet service providers, transportation and mass

transit, chemical production and storage, food distribution and government services are

considered critical infrastructure companies.

Information Technology Act 2000 40

Page 41: Ultimate LAW

Some Indian Case Studies:

First conviction in India

A complaint was filed in by Sony India Private Ltd, which runs a website called

sony-sambandh.com, targeting Non Resident Indians. The website enables NRIs

to send Sony products to their friends and relatives in India after they pay for it

online.

The company undertakes to deliver the products to the concerned recipients. In

May 2002, someone logged onto the website under the identity of Barbara Campa

and ordered a Sony Colour Television set and a cordless head phone.A lady gave

her credit card number for payment and requested that the products be delivered

to Arif Azim in Noida. The payment was duly cleared by the credit card agency

and the transaction processed. After following the relevant procedures of due

diligence and checking, the company delivered the items to Arif Azim.

At the time of delivery, the company took digital photographs showing the

delivery being accepted by Arif Azim. The transaction closed at that, but after

one and a half months the credit card agency informed the company that this was

an unauthorized transaction as the real owner had denied having made the

purchase.

The company lodged a complaint for online cheating at the Central Bureau of

Investigation which registered a case under Section 418, 419 and 420 of the

Indian Penal Code. The matter was investigated into and Arif Azim was arrested.

Investigations revealed that Arif Azim, while working at a call centre in Noida

gained access to the credit card number of an American national which he

misused on the company’s site. The CBI recovered the colour television and the

cordless head phone. The accused admitted his guilt and the court of Shri Gulshan

Kumar Metropolitan Magistrate, New Delhi, convicted Arif Azim under Section

418, 419 and 420 of the Indian Penal Code — this being the first time that a cyber

crime has been convicted. The court, however, felt that as the accused was a

Information Technology Act 2000 41

Page 42: Ultimate LAW

young boy of 24 years and a first-time convict, a lenient view needed to be taken.

The court therefore released the accused on probation for one year.

India's First ATM Card Fraud

The Chennai City Police have busted an international gang involved in cyber

crime, with the arrest of Deepak Prem Manwani (22), who was caught red-handed

while breaking into an ATM in the city in June last, it is reliably learnt.

The dimensions of the city cops' achievement can be gauged from the fact that

they have netted a man who is on the wanted list of the formidable FBI of the

United States.

At the time of his detention, he had with him Rs 7.5 lakh knocked off from two

ATMs in T Nagar and Abiramipuram in the city. Prior to that, he had walked

away with Rs 50,000 from an ATM in Mumbai.

While investigating Manwani's case, the police stumbled upon a cyber crime

involving scores of persons across the globe.

Manwani is an MBA drop-out from a Pune college and served as a marketing

executive in a Chennai-based firm for some time. Interestingly, his audacious

crime career started in an Internet cafe. While browsing the Net one day, he got

attracted to a site which offered him assistance in breaking into the ATMs. His

contacts, sitting somewhere in Europe, were ready to give him credit card

numbers of a few American banks for $5 per card. The site also offered the

magnetic codes of those cards, but charged $200 per code.

The operators of the site had devised a fascinating idea to get the personal

identification number (PIN) of the card users. They floated a new site which

resembled that of a reputed telecom company's. That company has millions of

subscribers. The fake site offered the visitors to return $11.75 per head which, the

site promoters said, had been collected in excess by mistake from them.

Information Technology Act 2000 42

Page 43: Ultimate LAW

Believing that it was a genuine offer from the telecom company in question,

several lakh subscribers logged on to the site to get back that little money, but in

the process parted with their PINs.

Armed with all requisite data to hack the bank ATMs, the gang started its

systematic looting. Apparently, Manwani and many others of his ilk entered into a

deal with the gang behind the site and could purchase any amount of data, of

course on certain terms, or simply enter into a deal on a booty-sharing basis.

Meanwhile, Manwani also managed to generate 30 plastic cards that contained

necessary data to enable him to break into ATMS. He was so enterprising that he

was able to sell away a few such cards to his contacts in Mumbai. The police are

on the lookout for those persons too.

On receipt of large-scale complaints from the billed credit card users and banks in

the United States, the FBI started an investigation into the affair and also alerted

the CBI in New Delhi that the international gang had developed some links in

India too.

Manwani has since been enlarged on bail after interrogation by the CBI. But the

city police believe that this is the beginning of the end of a major cyber crime.

Case of Cyber Extortion

He does not know much about computer hacking, yet 51-year-old cyber criminal

Pranab Mitra has stunned even the cyber crime investigation cell of Mumbai

police with his bizarre fraud on the Net. Mitra, a former executive of Gujarat

Ambuja Cement, was arrested on Monday for posing as a woman and seducing

online an Abu Dhabi-based man, thereby managing to extort Rs 96 lakh from him.

Investigating officer, Assistant Commissioner of Police, J.S. Sodi, said Mitra has

been remanded to police custody till June 24, and has been booked for cheating,

impersonation, blackmail and extortion under sections 420, 465, 467, 471, 474 of

the IPC, read with the newly formed Information Technology Act.

Mitra posed as a woman, Rita Basu, and created a fake e-mail ID through which

he contacted one V.R. Ninawe. According to the FIR, Mitra trapped Ninawe in a

Information Technology Act 2000 43

Page 44: Ultimate LAW

‘‘cyber-relationship’’ sending emotional messages and indulging in online sex

since June 2002.Later, Mitra sent an e-mail that ‘‘she would commit suicide’’ if

Ninawe ended the relationship. He also gave him ‘‘another friend Ruchira

Sengupta’s’’ e-mail ID which was in fact his second bogus address. When Ninawe

mailed at the other ID he was shocked to learn that Mitra had died. Then Mitra

began the emotional blackmail by calling up Abu Dhabi to say that police here

were searching for Ninawe. Ninawe panicked on hearing the news and asked

Mitra to arrange for a good advocate for his defence. Ninawe even deposited a

few lakh in the bank as advocate fees. Mitra even sent e-mails as high court and

police officials to extort more money. Ninawe finally came down to Mumbai to

lodge a police case.

ICICI Bank Phishing

Did you know that e-mails, long considered the most convenient form of

communication, can actually spring some nasty surprises for you? Recently, a few

ICICI Bank customers in Mumbai, to their utter dismay, discovered that e-mails

can be extremely hazardous, if not to their health, at least to their security. These

ICICI Bank customers received an e-mail from someone who posed as an official

of the bank and asked for sensitive information like the account holder's Internet

login name and password and directed them to a Web page that resembled the

bank's official site. When some customers wrote in to find out what the e-mail

was about, the bank officials registered a complaint with the police.

New as it may be in India, it is actually a popular banking scam, a warning

against which had been issued by many international banks including Barclays

and Citibank. rediff.com presents a guide that will help readers understand what

the scam is about and how they can stay clear of it.

What happened in the case of the e-mail scam involving ICICI Bank? A few

customers of ICICI Bank received an e-mail asking for their Internet login name

and password to their account. The e-mail seemed so genuine that some users

even clicked on the URL given in the mail to a Web page that very closely

resembled the official site. The scam was finally discovered when an assistant

manager of ICICI Bank's information security cell received e-mails forwarded by Information Technology Act 2000 44

Page 45: Ultimate LAW

the bank's customers seeking to crosscheck the validity of the e-mails with the

bank. Such a scam is known as 'phishing.'

Cyber Lotto an Effective Tool of Frauds

"It is a classic case of cyber crime, the first of its kind in Andhra Pradesh," was

how Vijayawada Police Commissioner Sudeep Lakhtakia summed up the case of

cheating and fraud registered against Kola Venkata Krishna Mohan, the self-

styled winner of the multi-million dollar Euro lottery. Mohan admitted that he did

not win the 12.5 million pound Euro lottery in November 1998, as he had

claimed, but merely played fraud to make good his losses in gambling.

"With the help of computers, the accused took the people for a ride," the

Vijayawada police commissioner pointed out. Mohan, using the Internet and

forged documents, allegedly cheated banks and several persons to the tune of 60

million rupees.

Kola Mohan was arrested by the Vijayawada city police on Monday in connection

with cases of fraud and forgery registered against him. He was remanded to

judicial custody till December 13 by Fifth Metropolitan Magistrate K B

Narsimhulu. He was shifted to the district jail at Gandhinagar in Vijayawada.

Mohan was accused of cheating the Andhra Bank to the tune of Rs 1.73 million.

By perpetrating the multi-million rupee fraud, Mohan has achieved the dubious

distinction of allegedly committing the first and biggest cyber crime in Andhra.

The state incidentally is making rapid strides in information technology, thanks to

the initiative of cyber-savvy Chief Minister N Chandrababu Naidu.

A compulsive gambler who played cards regularly at high stakes in various clubs

in the coastal city, Mohan told newsmen at the police commissioner's office at

Vijayawada on Monday that he had lost as much as Rs 30 million in 1998 when a

gambling syndicate led by a real estate dealer and a restaurant-owner cheated

him.

"I was on the look-out to make good the losses by hook or crook. During a visit to

London, I learnt about the Euro lottery. I staked some money on it in vain. Then,

Information Technology Act 2000 45

Page 46: Ultimate LAW

I invented the story that I won the lottery. I created a website and an email

address on the Internet with the address '[email protected].' Whenever

accessed, the site would name me as the beneficiary of the 12.5 million pound

(that is, $ 19.8 million or Rs 840 million) Euro-lottery," Kola Mohan recalled.

A Telugu newspaper in Hyderabad received an email that a Telugu had won the

Euro lottery. The website address was given for verification. The newspaper sent

the query and got the "confirmation" since Kola Mohan had himself created and

manipulated the website

Information Technology Act 2000 46

Page 47: Ultimate LAW

Conclusion

As we can see that there where so many cyber crimes happening in India before

the amendment of information technology act the rate of crime have not stopped

nor it have come down but it is reaching its high .

We have try to find out various reasons that despite of such a tight act and high

penalties and punishments what are the lope holes in the act which is blocking

the proper implementation of such a force full act .

Cyber Law in India is in its infancy stage. A lot of efforts and initiatives are

required to make it a mature legal instrument. Law has been instrumental in

giving Cyber Law in India a shape that it deserves. To make the circle complete

we are proudly introducing another effort in this direction.

Following are some of the lope holes which we have tried to figure out:

1. Reporting of important matters pertaining to Cyber Law in India:

2. Analysis of Cyber Law scenario in India,

3. Providing a comprehensive database for cases and incidents related to

Cyber Law in India,

4. A ready reference for problems associated with Cyber Law in India, etc.

The discussion group cum database will analyze Cyber Law of India that suffers

from the following drawbacks:

1. Non-inclusion of contemporary Cyber crimes and Contraventions like

Phishing, Spamming, Cyber extortions, Compromised e-mails, Cyber

Terrorism, etc.

2. An obscure position of Freedom of speech and expression under the IT Act,

2000.

3. Absence of Liability for illegal blocking of websites, blogs, etc.

4. Lack of Techno-Legal compliance under the IT Act, 2000.

5. Lack of Wireless security under the IT Act, 2000.

6. Absence of legal protection pertaining to IPRs in cyberspace.

Information Technology Act 2000 47

Page 48: Ultimate LAW

7. A confusion regarding Locus-standi and due diligence.

8. Absence of Private defense in cyberspace.

9. Non-dealing of issues like Cyber terrorism and private defense,

10. E-waste in India must be taken seriously, etc.

Besides these grey areas India is also facing problems of lack of Cyber

Security in India as well as ICT Security in India. A techno-legal base is the need

of the hour. Unfortunately, we do not have a sound and secure ICT Security Base

in India and Cyber security in India is still an ignored World. If opening of Cyber

Cells and Cyber Units is Cyber Security than perhaps India is best in the World at

managing Cyber Security issues. Unfortunately ICT Security in India is equated

with face saving exercises of false claims and redundant exercises. The truth

remains that ICT Security in India is a myth and not reality. The Cyber Law in

India requires a dedicated and pro active approach towards ICT and Cyber

Security in India. In the absence of a dedicated and sincere approach, the Cyber

Law in India is going to collapse.

Now as we know what are the major lope holes in the act let us try to fine the

possible suggestion to over come these and try to learn form what US/UK are

following in order to have a virus free cyber.

Information Technology Act 2000 48

Page 49: Ultimate LAW

Suggestion

Recruitment

There is a high need to increase the strength of staff for proper functioning

of the ACT.

Red coding System

Set - up a red coding system, with the help of which the government can

keep a tap on mails, chat, etc. this system will help the government to detect the

possibility of further cyber crime.

Training and Development

One of the most important requirements for the proper function of the ACT

is that, there should be good quality training programs on a regular base.

Domain

It is necessary, Domain should be treated as a separate entity rather then

treating it as IP ACT.

Cyber theft, cyber stalking, cyber harassment and cyber defamation are

presently not covered under the act.

These crimes need to have specific provisions in the act to enable the

police to take quick action.

Vague Definitions

Definitions, prescriptions of punishment and certain provisions (such as

that dealing with hacking) need specific amendment.

Parameters for its implementation

Law enforcement officials need to be trained for effective enforcement.

Information Technology Act 2000 49

Page 50: Ultimate LAW

Bibliography:

http://www.cyberlawclinic.org/casestudy.asp

http://www.cybercellmumbai.com/case-studies

http://satheeshgnair.blogspot.com/2009/06/selected-case-studies-on-cyber-

crime.html

http://legalserviceindia.com/cyber/itact.html

http://www.cyberlawclinic.org/cybercrime.html

http://www.cyberlawclinic.org/cyberlaw.html

http://teck.in/news/indian-cyber-laws-it-rules-it-act-2000-and-objectives-

t118.html

http://business.svtuition.org/2009/11/what-is-information-technology-act-

2000.html

www.naavi.org/pati/pati_cybercrimes_dec03.htm

http://cybersecurity.nitrd.gov/profiles/blogs/phishing-scams-in-india-and

http://services.indiabizclub.com/info/types_of_service/nasscom

http://centralyma.org.in/seminar/Statistical%20Report%20of%20Cyber

%20Crime.pdf

http://www.emergence.nu/events/budapest/ahuja.pdf

http://rbidocs.rbi.org.in/rdocs/Speeches/PDFs/GOVSPC1805.pdf

http://www.reportcybercrime.com/offences.php

http://newstonight.net/content/r-chidambaram-committee-fight-cyber-

crime.htm

Information Technology Act 2000 50