Workshop on “Cyber Crime”

Slides:



Advertisements
Similar presentations
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
Rohas Nagpal Asian School of Cyber Laws.  Information Technology Act, 2000 came into force in October 2000  Amended on 27 th October 2009  Indian Penal.
INFORMATION TECHNOLOGY ACT AND ITS IMPACT ON E-COMMERCE © of images belongs to the respective copyright holders.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
Confidentiality and HIPAA
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By – Sagar Rahurkar.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Presentation to OAS officials/ representatives 2 nd October, 2012.
BlueCare Tennessee and BlueCare, Independent Licensees of BlueCross BlueShield Association How the Deficit Reduction Act of 2005 Impacts BlueCare Tennessee.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Cyber Crime: Judicial Perspective By Talwant Singh Addl. Distt. & Sessions Judge Delhi
Cyber Crimes, Cyber Investigation and Cyber Evidence
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Roles and Responsibilities of Directors under Companies Act 2013
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Business Law Module 4 Module IV: Information Technology Act 2000
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Privileged & Confidential 1 India: an up-date on Data Protection Legislation by Tejas Karia (BSL, LLM (LSE), Advocate, Solicitor Associate, Amarchand &
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
National Smartcard Project Work Package 8 – Security Issues Report.
INFORMATION TECHNOLOGY ACT. Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities.
Unauthorized copying or distribution of this material is strictly prohibited IT Act 2000 Amendments in 2008.
PRESENTATION TO SELECT COMMITTEE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL ANDILE NGCABA12 JUNE 2002.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
1 How to Improve Law Enforcement - Service Providers Cooperation in India A presentation by: Lalit Mathur ISPAI.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Development of establishment of the Environmental Court Rungravee Sokhuma,Chief Judge in the Research Justice Environmental Division The Supreme Court.
Access to Justice Development of Green Bench in the Court of Justice October 2005 : The Green Bench, a specialized division was officially set up at the.
Chapter 6 Criminal Law and Cyber Crimes. 2  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Dimensions of E – Commerce Security
Indian Penal Code Act, 1860 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled Legal Expert with.
The law on Intermediary Liability in India
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
Cybercrime What is it, what does it cost, & how is it regulated?
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
IT Security in Nepal: Issues and challenges Rajan R. Pant ITSERT-NP.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
Cyber Law And Ethics And Ethics.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
NATIONAL ENVIRONMENTAL MANAGEMENT:1st AMENDMENT BILL AMENDMENTS TO CHP 7 ON COMPLIANCE, ENFORCEMENT & PROTECTION AMENDMENTS TO CHP 7 ON COMPLIANCE, ENFORCEMENT.
Cyber Laws in Pakistan.
Principles of Administrative Law <Instructor Name>
IT ACT 2000 and 2008 Important Sections Awareness Presentation
NATIONAL ENVIRONMENTAL MANAGEMENT:1st AMENDMENT BILL
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
Cyber Crime Laws and Mitigation of Cyber Crimes in Corporate Companies
Overview of the Budapest Convention on Cybercrime (2001)
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Forensic and Investigative Accounting
Cyber Laws in Pakistan Hassan Khalil.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Presentation transcript:

Workshop on “Cyber Crime” Wednesday, 18th June 2010 - Hotel Bristol, M.G. Road, Gurgaon Session III- An overview of Information Technology Act; 2000 & Issues related to Corporate liability By Karnika Seth Managing Partner, SETH ASSOCIATES

Presentation plan This session will explain our legal framework in cyberlaw and discuss implications the recent amendments to IT Act,2000 have on corporate businesses. Legal Provisions under the Information Technology Act: An Overview Recent amendments by the IT (Amendment Act),2008 Section 43A and corporate liability for BPOs/KPOs/LPOs Privacy & data protection provisions Role of digital signatures Admissibility of e-contracts Admissibility of e-evidence

IT Act,2000 The Act was passed in India in 2000 based on Model law of e-commerce adopted by UNCITRAL in 1996 Three fold objectives in Preamble- Legal recognition for e-transactions Facilitate electronic filing of documents with govt agencies To amend certain acts such as IPC,1860, Evidence Act,1872,etc

Legal recognition to e-contracts Main Features of IT Act,2000 Conferred legal validity and recognition to electronic documents & digital signatures Legal recognition to e-contracts Set up Regulatory regime to supervise Certifying Authorities Laid down civil and criminal liabilities for contravention of provisions of IT Act,2000 Created the office of Adjudicating Authority to adjudge contraventions

Need for amendments Diversifying nature of cybercrimes –all were not dealt with under IT Act,2000-cyber terrorism, spamming, MMS attacks,etc Use of wireless technology had no mention in definition of “computer network” in S2(j) Digital signatures only for authentication . Definition of ‘intermediary’ and their liability required clarification. Grey areas-Power of execution- Adjudicating authority No appointed statutorily authority for supervising cyber security of protected systems Power to investigate offences –only DSP and above Power to intercept & decrypt information limited under Section 69

Important definitions added in amended Act Section 2 (ha)- communication device-includes cell phones, PDA,etc Section 2 (j) computer network –interconnection through wireless added Section 2 (na) cybercafe Section 2(w)- intermediary- includes search engines, web hosting service providers, online auction sites,telecom service providers etc

IT Act ,2000 v 2008- Electronic Signatures Simpler Electronic signatures prescribing conditions Training

Corporate Responsibility introduced in Section 43A Applies to Corporate bodies handling sensitive personal information or data in a computer resource Need for data protection fulfilled-no limit to compensation claim Challenge is to define ‘reasonable security practices’ & ‘sensitive personal information’ Will help combat data theft, credit card and IP frauds To be r/w Section 85 IT Act,2000

Section 43A To protect from unauthorized access, damage,use,modification,disclosure,or impairment ‘Reasonable security practices’ as may be specified by agreement between parties Or Specified by any law Or Prescribed by Central Govt in consultation with professional bodies

Amended Section 43 –cyber contraventions Earlier Section 43 –contraventions-actus reus and Section 66-mens rea +actus reus Amended Section 43 , insertion of Section 43 (i) and (j)- requirement of mens rea with actus reus Section 43(j) uses words “stealing” and “intention to cause damage”. Same acts when committed ‘dishonestly’ or ‘fraudulently’ are placed under Section 66. Intent is to punish under section 66 and compensate for loss for same acts in S.43.Amended Section 43 removed ceiling limit for compensation

Amended Section 43 (j) If any person without permission of the owner or any other person who is incharge of a computer,computer system or computer network….steal, conceals,destroys or alters or causes any person to steal, conceal, destroy, or alter any computer source code used for a computer resource with an intention to cause damage…he shall be liable to pay damages by way of compensation to the person so affected.

EEE’s role Examiner of Electronic Evidence created in section 79A- Central Government empowered to appoint this agency To provide expert opinion on electronic form of evidence. “electronic form evidence” –inclusive definition-computer evidence, digital audio, digital video, cellphone, fax machines-information stored, transmitted in electronic form One EEE should be set up/appointed in every State

Strengthening India’s cyber security Section 70- protected systems- takes within its cover the ‘Critical Information Infrastructure’ Computer resource, incapacitation or destruction of which has debilitating impact on national security,economy,public health, safety. CERT appointed as Nodal Agency for incident response-Section 70B Multiple roles- alert system ,response team, issuing guidelines ,reporting incidents Non cooperating service providers, intermediaries,etc punishable with term upto one year or fine upto one lac or both Excludes jurisdiction of court

New cybercrimes Hacking –Section 66 Sending of offensive false messages(s.66A) Identity theft (s. 66C) Cheating by personation (s.66D) Violation of privacy (s.66E) Cyber terrorism (s.66F) Publishing sexually explicit content(s. 67A) Child pornography (s.67B) Stolen computer resource(s.66B) Attempt to commit an offence (s.84C) Abetment to commit an offence(s.84B)

Cognisability & bailability Most offences introduced by the 2008 amendments prescribe punishment of upto 3 yrs , fine of one lac/2 lac For hacking term of imprisonment remains upto 3yrs but fine increased from 2 lakhs to 5 lacs In S.67 imprisonment term reduced from 5 yrs to three yrs. Fine increased from one lac to 5 lacs. Most Offences are cognisable but bailable This is a new challenge for cyberlaw enforcement authorities- need quick action by trained investigators to collect and preserve evidence as probability of tampering increases .

Collection of evidence streamlined Section 67C- Intermediaries bound to preserve and retain such information as Central govt prescribes, for prescribed duration- contravention punishable with upto 2yrs imprisonment ,upto one lac fine or both Accountability of service providers increased-Section 72A added-disclosure of information in breach of lawful contract-punishment upto 3 years , fine upto 5 lakh or both

Collection of evidence streamlined Section 69 -Power of Central Govt to intercept, monitor, decrypt information IT (procedure and safeguards for interception, monitoring and decryption of Information) Rules, 2009. Non-cooperating Subscriber or intermediary -liable to punishment of upto 7 yrs imprisonment and fine is added by amendment. Maintenance of confidentiality, due authorisation process, exercise power with caution.

Collection of evidence streamlined Section 69 B added- confers power on central govt to appoint any agency to monitor and collect traffic data or information generated,transmitted,received,or stored in any computer resource Use in order to enhance cyber security& identification,analysis and prevention of intrusion or spread of computer contaminant IT (procedure and safeguards for monitoring and collecting traffic data or information) Rules ,2009 Responsibility to maintain confidentiality-intermediaries. Authorisation procedures laid down Review committee provision,destruction of records Non cooperating intermediary-liable to punishment –term upto 3 yrs and fine. Helpful in curbing cyber terrorism cases –power exercise with caution-right to privacy may be affected.

New Challenges Controller no more to act as repository of digital signatures Role assigned to Certifying Authority in Section 30. Concerns of ensuring secrecy and privacy of electronic signatures is maintained Need to strengthen security infrastructure Publishing information wrt electronic signatures & regular updation

New challenges Blocking of unlawful websites –Section 69A Power lies with Central Govt or any authorised officer Grounds for blocking fairly wide- issue of censorship vs free flow of information Information Technology (procedure and safeguards for blocking for access of information by public) Rules 2009 Websites containing hate speech, defamatory matter, slander, promoting gambling, racism ,violence, terrorism, pornography, can be reasonably blocked Blocking of websites also possible by court order Calls for cooperation from intermediary-non cooperation- punishable offence-term 7 yrs, fine

Recent amendments & Role of Adjudicating Authority The Subject matter of its jurisdiction is widened –adjudging more contraventions under Section 43,43A Power to impose penalty & award compensation both Excludes jurisdiction from matters where compensation claimed is more than 5 crores Quantum of compensation –discretion of adjudicating officer- objective criteria laid down for guidance maintained-Amount of unfair advantage gained, amount of loss, repetitive nature of default IT (qualification and experience of adjudicating officers and manner of holding enquiry ) Rules ,2003

Strengthening the role of Adjudicating Authority Reliance on documentary evidence, investigation reports , other evidence Compounding of contraventions Powers of Civil court and Section 46(5)© confers power of execution of orders passed by it- attachment of property, arrest & detention of accused, appointment of receiver- greater enforceability

Lacunae under amended IT Act,2000 Power of Controller under Section 28 – to investigate ‘any contravention of the provisions of this Act,rules, or regulations made’. Should be replaced with words ‘any contravention of the provisions of this Chapter’ since amended Section 29 –controller power to access computers, data has also been amended and limited the power ‘to contravention of the provisions of this chapter’ Controller’s power cannot overlap with Adjudicating officers, CAT or Police

Lacunae under amended IT Act,2000 Section 55 of IT Act,2000 –order of CAT not open to challenge on ground of defect in constitution of tribunal- contrary to principles of natural justice Analogy to Arbitration law –defect in constitution of tribunal renders award subject to challenge

Liability of ISP revisited Under earlier Section 79, network service providers were liable for third party content only if they failed to prove offence was committed without knowledge or due diligence was exercised. Burden of proof was on Network service provider. The amended section excludes certain service providers and holds intermediary liable only if he has conspired , abetted or induced whether by threats or promise or otherwise in the commission of unlawful act (S.79(3)(a).Onus to prove conspiracy, abetment, is shifted on Complainant. Intermediary is liable also if on receipt of actual knowledge or on receipt of intimation from govt agency, it fails to remove or disable such website’s access. Could give rise to Red-tapism & difficulty in access of speedy remedy

Strategies for effective enforcement of cyberlaws Imparting legal & technical training to law enforcement personnel One cyber cell in every state and trained police Set up EEE/ cyber forensic labs in each state Immediate rulemaking in S.67C-intermediary to preserve information Build International cooperation regime for solving cybercrime cases

Thank you! SETH ASSOCIATES ADVOCATES AND LEGAL CONSULTANTS New Delhi Law Office: C-1/16, Daryaganj, New Delhi-110002, India Tel:+91 (11) 65352272, +91 9868119137 Corporate Law Office: B-10, Sector 40, NOIDA-201301, N.C.R ,India Tel: +91 (120) 4352846, +91 9810155766 Fax: +91 (120) 4331304 E-mail: mail@sethassociates.com