Showing posts with label cyber law. Show all posts
Showing posts with label cyber law. Show all posts

Wednesday, 2 July 2025

From Paper to Pixels: What is importance of theory of Functional Equivalence under IT Act and BSA 2023?


 Theory of Functional Equivalence in Indian Cyber Law, Information Technology Act, and Bharatiya Sakshya Adhiniyam

The theory of functional equivalence represents a foundational legal principle that ensures electronic records and transactions receive the same legal validity and treatment as their traditional paper-based counterparts. In the context of Indian cyber law, this principle serves as the cornerstone for digital transformation while preserving the integrity of existing legal frameworks.

Core Concept of Functional Equivalence

Print Page

Sunday, 2 February 2025

Under which circumstances the court can release accused on bail relying on metadata of photo submitted by him by taking the plea of alibi?

 It is the submission of learned counsel for the applicant that applicant is suffering in confinement on false pretext. Counsel for the applicant referred the letter dated 28.02.2020 written by Station House Officer, Police Station Nai Saraye, District Ashoknagar addressed to Trial Court and report of Cyber Forensic Lab, Bhopal containing digital forensic examination report dated 12.12.2019 and subsequent report filed by the Cyber Forensic Lab, Bhopal indicates that photograph submitted by the applicant was in support of his innocence on the basis of plea of alibi. From perusal of Metadata of photograph, it is prima facie clear that the present applicant was present at Bakaspur Village Khajuri, Tahsil Badarwas, District Ashoknagar on 02.04.2019 at about 1.34 pm and time of incident is around 1.30 pm - 2.00 pm on the same day at Village Ranga, Tahsil Nai Saraye, District Ashoknagar. The distance of place of incident is around 60 kms.- 70 kms. from the place where applicant was present at 1.34 pm. Such distance can only be covered by the applicant in not less than one hour at least. Therefore, Metadata of photo and report indicate that he was present at that time at a place 60 kms.-70 kms. away from the place of incident and no tampering has been made in photograph.

According to applicant, benefit of doubt so far as grant of bail is concerned be given to him because it is the case of over implication. Applicant has been arrayed as accused on false pretext. He does not bear any criminal record. Confinement amounts to pretrial detention. 

This is the case mainly in respect of digital forensic evidence and Metadata of any photograph is a big tool in the hands of forensic experts to reach to the truth about the exact nature of incident. Trial Courts are expected to scrutinize the said scientific tool with care and deep study so that forensic examination of evidence can be done to its higher standards. Metadata can be very useful especially in cases where plea of alibi is taken by the parties or accused in particular. Photo, Metadata details and report of Digital Forensic Expert should carry due certification as per Evidence Act and other relevant provisions.

Madhya Pradesh High Court

Surendra vs The State Of Madhya Pradesh on 16 June, 2020.

M Cr. C No. 15796/2020

Author: Anand Pathak

Bench: Anand Pathak

Print Page

Saturday, 9 November 2024

Bombay HC: Facebook Screenshots Printouts of defamatory posts not sufficient to prove that it is made from a fake account

Learned Advocate appearing for applicant vehemently submits that First Information Report has been filed by respondent No.2, who is the brother-in-law (wife's brother) of applicant. According to informant, applicant had created a fake Facebook account in the name of one Minal Basavraj Swami and Chandra Surnal and through the said fake Facebook account the applicant has defamed the informant and his family members, especially the wife of applicant. There was marital discord at that time between the applicant and his wife. If we consider the charge sheet, then it can be seen that there is absolutely no proper investigation. Only the screen shots of Facebook, of which prints have been taken, are annexed after seizure and there are statements of two witnesses. Only on the basis of said material it cannot be said that the said Facebook posts were created by the applicant. Therefore, there is absolutely no evidence against the applicant and, therefore, it would be futile exercise to ask the applicant to face the trial. {Para 3}

4. We take the present case as a classic case, which is investigated in total ignorance of provisions of law and by a person, who appears to have not undergone training of detecting cyber crime. When it was specifically alleged in the First Information Report that two Facebook accounts have been fraudulently created, then the Investigating Officer ought to have got help of an expert to see from which IP address those accounts were created, whether any such electronic device of the said IP address is with the accused. Print of screen shots of Facebook material will not at any stretch of imagination would prove that the said post was created from an alleged fake account. Even if for the sake of argument we accept that there was dispute between applicant and his wife and the alleged post had a defamatory material in respect of informant, his family members including his sister i.e. wife of applicant; still we cannot reach the conclusion without any evidence that the applicant would have been the only person behind creation of such fake Facebook account.

IN THE HIGH COURT OF BOMBAY (AURANGABAD BENCH)

Criminal Application No. 2850 of 2019

Decided On: 22.10.2024

Mahesh Shivling Tilkari Vs. The State of Maharashtra and Ors.

Hon'ble Judges/Coram:

Vibha Kankanwadi and S.G. Chapalgaonkar, JJ.

Author: Vibha Kankanwadi, J.

Citation: MANU/MH/6841/2024.

Print Page

Wednesday, 24 April 2024

Bombay HC: IPC Can Simultaneously Be Invoked If Sections Under IT Act(Cyber crime) Don't Address All Ingredients Of Offence

The common thread deducible from various judgments of the Supreme Court covering similar issues, where an act is an offence under a special statute having an overriding effect over the offence covered by the general law like Indian Penal Code, is that in order to exclude the general law or the offence therein, ingredients of the offence defined under the special statute and the Indian Penal Code will have to be the same. If even one ingredient of an offence under the Indian Penal Code is missing in the act which has been made punishable under the special statute, the Indian Penal Code section will not be excluded and still can be resorted to albeit, the provisions of section 71 of the Indian Penal Code and section 26 of the General Clauses Act will have to be borne in mind by the Courts while imposing the sentences.{Para 37}

IN THE HIGH COURT OF JUDICATURE AT BOMBAY

BENCH AT AURANGABAD

CRIMINAL APPLICATION NO. 2562 OF 2019

(AWADHESH KUMAR PARASNATH PATHAK V. THE STATE OF MAHARASHTRA AND ANOTHER)

CORAM : MANGESH S. PATIL, R.G. AVACHAT & SHAILESH P. BRAHME, JJJ.

PRONOUNCED ON : 15 APRIL 2024

JUDGMENT (MANGESH S. PATIL, J.) :
Print Page

Tuesday, 11 May 2021

Does posting a person's name or photograph on a pornographic website amount to a breach of that person's privacy?

 In the present case, the petitioner's photographs and images, though not in themselves obscene or offensive, were taken from her Facebook and Instagram accounts without her consent and were uploaded on a pornographic website, adding derogatory captions to them. It is an irrefutable proposition that if the name and/or likeness of a person appears on a pornographic website, as in the present case, without the the consent or concurrence of such person, such act would by and in itself amount to an offence inter-alia under section 67 of the IT Act. This is so since section 67 makes it an offence to publish or transmit, or causes to be published or transmitted, in the electronic form, any material which appeals to the prurient interests of those who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it. The only purpose of posting the petitioner's photograph on a pornographic website could be to use it to appeal to the prurient interests of those who are likely to see it. That apart, the inclusion of the name and/or likeness of a person on such website, even if the photograph of the person is not in itself obscene or offensive, without consent or concurrence, would at the very least amount to breach of the person's privacy, which a court may, in appropriate cases, injunct or restrain. It is is evident that such publication would likely result in ostracisation and stigmatisation of the person concerned in society; and therefore immediate and efficacious remedy is required in such cases. {Para 86}

 In the High Court of Delhi at New Delhi

(Before Anup Jairam Bhambhani, J.)

‘X’  Vs  Union of India and Others 

W.P.(CRL) 1082/2020 & Crl. M.A. Nos. 9485/2020, 10986-87/2020

Decided on April 20, 2021

Citation: 2021 SCC OnLine Del 1788.

Print Page

Sunday, 14 March 2021

Whether court can direct accused to disclose his password to investigating officer?


 DISCLOSURE OF PASSWORD:

5.13. There are several provisions in the Code of Criminal Procedure, 1973 as well as the Indian Evidence Act, 1872 that empowered the Trial Court to direct the Petitioner to  disclose the password.

5.14. Section 139 of the Indian Evidence Act itself provides that a person may be summoned to produce a "document". The term "evidence" has been defined in Section 3 of the Indian Evidence Act inter al i a to mean " al l documents including electronic records". Therefore, the term "document" used in Section 139 of the Indian Evidence Act includes any electronic record in possession of the Petitioner. Thus, Section 139 of the Indian Evidence Act authorises the disclosure of the password by the Petitioner and hence the order dated 14.09.2020 does not abridge Petitioner's right to privacy under Article 21 of the Constitution of India.

5.15. That apart, Section 54-A of the Code of  Criminal Procedure, 1973 inter alia stipulates that, where a person is charged with committing an offence; and  his identification is necessary for the purpose of investigation of an offence, the Court may direct the person so arrested to subject himself to identification by any person as the Court deems fit.

5.16. In the present case, the password is nothing but an 'identification mark' of the Accused/ Petitioner by the service providers hosting his data. Therefore, the disclosure of the password is sanctioned by Law under Section 54-A of the Code.

5.17. The disclosure of password is in the nature of giving specimen signatures or handwriting. Therefore, the disclosure of password can also be ordered under Section 311-A of the Code of Criminal Procedure, 1973. 5.18. In Ritesh Sinha v. State of Uttar Pradesh (2019) 8 SCC 1, the Supreme Court of India held that the Magistrate could order the collection of voice sample under Section 311- A of the Code of Criminal Procedure, despite there being no express provision to that effect, having regard to existing realities and imminent necessity of present situation. Therefore, given the fact that the disclosure of password is akin to giving specimen signature, disclosure can be ordered under the aforesaid provision. Hence, the order dated 14.09.2020 passed by the Trial Court is sanctioned by Law.

Karnataka High Court
Mr. Virendra Khanna vs State Of Karnataka By: on 12 March, 2021
Print Page

Tuesday, 24 November 2020

Orissa HC recognizes Right To Be Forgotten: Allowing Videos/Photos Of Rape Victims To Remain On Social Media Is Violative Of Their Fundamental Right To Privacy

 


The Hon’ble Supreme

Court of India in the case of K.S. Puttaswamy v. Union of

India (supra) held that purpose limitation is integral for

executive projects involving data collection – unless prior

permission is provided, third parties cannot be provided access

to personal data.See Para 166 of K.S. Puttaswamy Judgment

This principle is embodied in S.5 of the yet to-

be-implemented Personal Data Protection Bill, 2019.

Purpose Limitation enhances transparency in data processing

and helps examine the proportionality of the mechanism used

to collect data for a specific purpose. Moreover, it prevents the

emergence of permanent data ‘architectures’ based on

interlinking databases without consent. In the present case

the proposition of purpose limitation is not applicable as the

question of seeking consent does not arise at all. No person

much less a woman would want to create and display gray

shades of her character. In most of the cases, like the present

one, the women are the victims. It is their right to enforce the

right to be forgotten as a right in rem. Capturing the images

and videos with consent of the woman cannot justify the

misuse of such content once the relation between the victim

and accused gets strained as it happened in the present case.

If the right to be forgotten is not recognized in matters like the

present one, any accused will surreptitiously outrage the

modesty of the woman and misuse the same in the cyber

space unhindered. Undoubtedly, such an act will be contrary

to the larger interest of the protection of the woman against

exploitation and blackmailing, as has happened in the present

case. The sloganeering of “betibachao” and women safety

concerns will be trampled.

14. Section 27 of the draft Personal Data Protection Bill, 2018

contains the right to be forgotten. Under Section 27, a data

principal (an individual) has the right to prevent continuing

disclosure of personal data by a data fiduciary. The aforesaid

provision which falls under Chapter VI (Data Principal Rights)


of the Bill, distinctly carves out the "right to be forgotten" in no

uncertain terms. In terms of this provision, every data

principal shall have the right to restrict or prevent continuing

disclosure of personal data (relating to such data principal) by

any data fiduciary if such disclosure meets any one of the

following three conditions, namely if the disclosure of personal

data:

(i) has served the purpose for which it was made or is no

longer necessary; or (ii) was made on the basis of the data

principal's consent and such consent has since been

withdrawn; or (iii) was made contrary to the provisions of the

bill or any other law in force.

In addition to this, Section 10 of the Bill provides that a

data fiduciary shall retain personal data only as long as may

be reasonably necessary to satisfy the purpose for which it is

processed. Further, it imposes an obligation on every data

fiduciary to undertake periodic reviews in order to determine

whether it is necessary to retain the personal data in its

possession. If it is not necessary for personal data to be

retained by a data fiduciary, then such personal data must be

deleted in a manner as may be specified.

15. In the instant case, prima facie, it appears that the

petitioner has not only committed forcible sexual intercourse

with the victim girl, but has also deviously recorded the

intimate sojourn and uploaded the same on a fake Facebook

account. Statement recorded under Section 161 of Cr. P.C. of

the victim girl is also clearly in sync with FIR version.

Considering the heinousness of the crime, the petitioner does

not deserve any consideration for bail at this stage. However,

this Court is of the view that Indian Criminal Justice system is

more of a sentence oriented system with little emphasis on

the disgorgement of victim’s loss and suffering, although the

impact of crime on the victim may vary significantly for

person(s) and case(s)-- for some the impact of crime is short

and intense, for others the impact is long-lasting. Regardless,

many victims find the criminal justice system complex,

confusing and intimidating. Many do not know where to turn

for help. As in the instant case, the rights of the victim to get

those uploaded photos/videos erased from Facebook server

still remain unaddressed for want of appropriate legislation.

However, allowing such objectionable photos and videos to

remain on a social media platform, without the consent of a

woman, is a direct affront on a woman’s modesty and, more

importantly, her right to privacy. In such cases, either the

victim herself or the prosecution may, if so advised, seek

appropriate orders to protect the victim’s fundamental right to

privacy, by seeking appropriate orders to have such offensive

posts erased from the public platform, irrespective of the

ongoing criminal process.

HIGH COURT OF ORISSA: CUTTACK

BLAPL No.4592 OF 2020

(In the matter of an application under Section 439,

Criminal Procedure Code, 1973)

Subhranshu Rout @ Gugul  Vs  State of Odisha 


PRESENT

 SHRI JUSTICE S.K. PANIGRAHI

 Date of judgment: 23.11.2020

Print Page

Saturday, 30 November 2019

Precaution to be taken by investigating officer for preserving electronic evidence if mobile phone was used for commission of crime

 In a case in which a mobile phone is used for the commission of the crime, the first and foremost thing the officer should have done was to secure the phone to prevent the destruction/manipulation of data. He should have first recorded the status of the device after taking a photograph and record any on-screen information. If the device was switched on, it should have been switched off and the batteries should have been removed. Turning off the phone would preserve the various information, metadata and call logs and it would also prevent any attempt to wipe off the contents of the phone remotely. The officer also was bound to seize all cables, chargers, packaging, manuals etc. if possible to assist the enquiry and minimise the delays in any examination by the digital evidence specialist. The password/pin of the device, if any, also had to be obtained from the owner of the phone. The phone had to be packed and sealed in antistatic packaging such as plastic bag, envelope or cardboard box and the secured device along with the collected data had to be sent to the digital evidence specialist. Only the said specialist can obtain and copy the digital evidence and also provide an analysis of the evidence. None of these procedures were adopted by the investigating officer. 

IN THE HIGH COURT OF KERALA AT ERNAKULAM

Bail Appl. No. 7022 of 2018

Decided On: 02.11.2018

 Vijesh  Vs. The State of Kerala and Ors.

Hon'ble Judges/Coram:
Raja Vijayaraghavan V., J.

Print Page

Friday, 29 November 2019

Supreme Court: Prosecution should give cloned copy of contents of memory card/pen drive to accused

 If the accused or his lawyer himself, additionally, intends to
inspect the contents of the memory card/pendrive
in question, he can request the Magistrate to provide him inspection in Court, if necessary, even for more than once alongwith his lawyer andI.T. expert to enable him to effectively defend himself during the
trial. If such an application is filed, the Magistrate must consider
the same appropriately and exercise judicious discretion with
objectivity while ensuring that it is not an attempt by the
accused to protract the trial. While allowing the accused and his
lawyer or authorized I.T. expert, all care must be taken that they
do not carry any devices much less electronic devices, including
mobile phone which may have the capability of copying or
transferring the electronic record thereof or mutating the
contents of the memory card/pendrive
in any manner. Such multipronged approach may subserve
 the ends of justice and also effectuate the right of accused to a fair trial guaranteed under Article 21 of the Constitution.
44. In conclusion, we hold that the contents of the memory
card/pen drive being electronic record must be regarded as a
document. If the prosecution is relying on the same, ordinarily,
the accused must be given a cloned copy thereof to enable
him/her to present an effective defence during the trial.
However, in cases involving issues such as of privacy of the
complainant/witness or his/her identity, the Court may be
justified in providing only inspection thereof to the accused and
his/her lawyer or expert for presenting effective defence during
the trial. The court may issue suitable directions to balance the
interests of both sides.
REPORTABLE
IN THE SUPREME COURT OF INDIA
CRIMINAL APPELLATE JURISDICTION
CRIMINAL APPEAL NO.1794 OF 2019

P. Gopalkrishnan @ Dileep Vs State of Kerala 

A.M. Khanwilkar, J.
Dated: November 29, 2019.
Citation: AIR 2020 SC 1,2019 SCC OnLine SC 1532. 
Print Page

Saturday, 11 February 2017

Whether accused can be prosecuted under S 292 of IPC if he is not charged under S 67 of information technology Act?

In Solidaire India Ltd. v. Fairgrowth Financial Services Ltd.20, this Court while dealing with two special statutes, namely, Section 13 of Special Court (Trial of Offences Relating to Transactions in Securities) Act, 1992 and Section 32 of Sick Industrial Companies (Special Provisions) Act, 1985, observed as follows:-
“Where there are two special statutes which contain non obstante clauses the later statute must prevail. This is because at the time of enactment of the later statute, the Legislature was aware of the earlier legislation and its non obstante clause. If the Legislature still confers the later enactment with a non obstante clause it means that the Legislature wanted that enactment to prevail. If the Legislature does not want the later enactment to prevail then it could and would provide in the later enactment that the provisions of the earlier enactment continue to apply.”
34. The aforesaid passage clearly shows that if legislative intendment is discernible that a latter enactment shall prevail, the same is to be interpreted in accord with the said intention. We have already referred to the scheme of the IT Act and how obscenity pertaining to electronic record falls under the scheme of the Act. We have also referred to Sections 79 and 81 of the IT Act. Once the special provisions having the overriding effect do cover a criminal act and the offender, he gets out of the net of the IPC and in this case, Section 292. It is apt to note here that electronic forms of transmission is covered by the IT Act, which is a special law. It is settled position in law that a special law shall prevail over the general and prior laws. When the Act in various provisions deals with obscenity in electronic form, it covers the offence under Section 292 IPC.
IN THE SUPREME COURT OF INDIA
CRIMINAL APPELLATE JURISDICTION
(Before Dipak Misra and Praffula C. Pant, JJ.)

Sharat Babu Digumarti  v. Govt. of NCT of Delhi 

Criminal Appeal No. 1222 of 2016

Decided on December 14, 2016
Citation:2016 SCC OnLine SC 1464,AIR 2017 SC 150,(2017) 2 SCC18
Print Page

Sunday, 14 August 2016

Whether Youtube can permit uploading of content which violates laws of India?


 Mr. Rajiv Nayar, learned Senior Advocate appearing for Tata Sky pointed
out that there was an unacceptable delay in YouTube LLC responding to
Tata Sky's complaint to it about the offending video which virtually sought
to teach the public how to hack Tata Sky's set top boxes (STBs) which were
encrypted, thereby enabling free viewership of TV channels/contents which
were otherwise available only to subscribers. He referred to Rule 3 (2) (d)
and (e) and Rule 3 (4) of the Information Technology (Intermediaries
Guidelines) Rules 2011 ('ITIG Rules') and submitted that YouTube LLC
was obliged to act with promptitude once it was clear that the offending
videos were illegal inasmuch as that Tata Sky's STBs could be hacked into
through simple steps. He referred to the order of the Supreme Court in Sabu
Mathew George v. Union of India 2016 SCC OnLine SC 681 in which it
was observed that the intermediaries there "cannot put anything that violates
the laws of this country."
 In the present case neither Tata Sky nor YouTube appear to have been
clear, in the first instance, whether the complaint pertained to a trademark or
a copyright infringement or to some other legal issue. The correspondence
exchanged between them reflects this confusion. However, there could be
complaints regarding some material on the website of YouTube which by
their very nature require it to act immediately without insisting on the
Complainant having to clearly demonstrate that the complaint falls within
one or the other category that YouTube has identified for the purposes of
acting on such complaints.
 The Community Guidelines are meant to guide a person uploading
content on what should not be uploaded. It is understandable that with the
huge volume of uploads it is not practical for YouTube to be viewing each
upload in order to decide whether it is objectionable from the point of view
of its Community Guidelines. However, when a specific instance of possible
violation is drawn to its attention, its review team will have to view the
content and take a call on whether it requires to be taken down. The
response time as well as the response itself are both critical for a
complainant. In the present case Tata Sky's specific complaint was that the
video was "giving step by step instructions on possible hacking" of its STBs
in order to receive to receive High Definition content, free of cost. Tata Sky
pointed out that this was violative of its rights and of broadcasters who own
the HD content broadcast through Tata Sky Platform and was an offence 
under Section 66 of the IT Act. In terms of Rule 3 (1) (e) of the ITIG,
YouTube is obliged not to host content that violates any law for the time
being in force. In determining it to be a complaint regarding 'circumvention
of technological measures' which is defined as an offence under Section 65
A of the Copyright Act, YouTube's review team appears to have got into a
bind about correctly 'categorising' it instead of actually taking a call on
whether the nature of the content required taking down. If it had focused on
the latter aspect the need for Tata Sky to have approached this Court for
relief could have been avoided.
IN THE HIGH COURT OF DELHI AT NEW DELHI

CS (COMM) 223/2016
TATA SKY LTD.
versus
YOUTUBE LLC & ORS. .
CORAM: JUSTICE S. MURALIDHAR
DATED: 10.08.2016
Print Page

Thursday, 14 July 2016

Whether domain name is protected under Trade Marks Law?


The original role of a domain name was no doubt to provide an address for computers on the internet . But the internet has developed from a mere means of communication to a mode of carrying on commercial activity. With the increase of commercial activity on the internet, a domain name is also used as a business identifier. Therefore, the domain name not only serves as an address for internet communication but also identifies the specific internet site. In the commercial field, each domain name owner provides information/services which are associated with such domain name. Thus a domain name may pertain to provision of services within the meaning of Section 2 (1) (z) of Trade Marks Act, 1999.

Delhi High Court

Mr. Arun Jaitley vs Network Solutions Private Limited on 4 July, 2011

Author: Manmohan Singh

Print Page

Monday, 3 August 2015

How to ascertain liability of Cyber Cafe Owner Liability (S67C) in case of cyber crime?

 As per guidelines for Cyber Cafe rules intermediary and Cyber
Cafe means as per definition in Act. In I.T. Act intermediary includes
Cyber Cafe. Cyber Cafe means any facility from where access to   the
internate is occurred by any person in the ordinary course of business to
the members of the public.  As per rule 3 of the Information Technology
( guidelines for Cyber Cafe) Rules 2011 registration of Cyber Cafe is
compulsory. As per rule 4 taking ID proof of users is compulsory. As per
rule 5 log register is compulsory.  Preserving the information under rule
4 and 5 for 1 year is compulsory. In the present case Cyber Cafe was not
registered. Requisite information was not obtained and preserved.   As       ­  
per   section   67   C   (1)   preserving   and   retaining   the   information   by
intermediary is compulsory. Breach of sub section 1 is punishable as per
section 67 C (2) of I.T. Act. Internet connection was in the name of
accused Vishal Bhogade. It was being run by accused Sandesh Dere.
Hence,  considering   the   Act   and   rules   framed,   both   the   accused   are
responsible for contravention of rules.       ­   ­                           
IN  THE  COURT  OF  JUDICIAL  MAGISTRATE  FIRST  CLASS,
(COURT NO. 3),   PUNE
  (Presided over by S. R. Nimse)
R C. C. No. 2095/2013                
Complainant   ­           State of Maharashtra 

                            V E R S U S
Accused   ­              1.    Vishal Hiraman Bhogade.

                               2. Sandesh Sopan Dere

Offence Punishable Under Section  43 (g), 66, 67 C (2) of Information
    Techonology Act, 2000 and section 188 of Indian Penal Code  .
­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­­
   
( Delivered on  31 th July 2015  )
Print Page

Friday, 8 August 2014

Whether offence U/S 65 and 66 of information technology Act is made out against owner/in-charge of computer system?

 In the present case, the computer network belongs to the school of the petitioner. Computer network is owned by the school and the Principal is owner/in-charge of the computer system and if any person commits any of the acts provided in Section 43 of the IT Act, he can be held liable nor the owner. Therefore, the offence under Sections 65 and 66 of the IT Act are also not made out from the complaint or from the preliminary evidence.

Punjab-Haryana High Court
Kavita C. Das vs Arvind Thakur And Another on 3 October, 2013

Coram: Hon'ble Mr. Justice Inderjit Singh .....

Citation;2014(3) crimes 75 (P & H)
Print Page

Sunday, 11 August 2013

Top 10 Tips to Protect Yourself Against Computer Viruses

When your computer gets infected with a virus it can be a devastating experience and this is exactly why you need to protect your computer from viruses. A virus can consume your precious computer files and even damage your computer hardware. Is this worth ignoring? I don’t think so!  Anything you can do when protecting your computer from viruses has to be a good thing and is well worth spending your time on. We all know prevention is better than a cure so I am going to share my top 10 tips on how to protect your computer from viruses.

10 Tips to Protect Your Computer From Viruses

There are many ways to protect your computer from nasty viruses invading. Protecting your computer is a number one concern for every computer user on earth. I do not know anyone that wants to have their computer crash due to a virus invasion. Here are 10 ways to protect your computer  from viruses and keep your files and data safe.

1. Learn about viruses

Print Page

Wednesday, 22 May 2013

Know the Risks of Using ATM and Online Banking

As convenient and user-friendly as the ATM (automated teller machine) and online banking services are, they have their own share of security risks. This blog entails the security risks of using ATMs and online banking, and discusses some valuable safety measures users can take.

Risks Involved with ATMs
The greatest security risk of using an ATM is falling prey to “card skimming”. It is an illegal activity carried out by criminals to obtain the data embedded in the magnetic strip of credit or debit cards that are used in ATMs. 
Risks Involved with Online Banking
Fake ICICI Bank website
Phishing Scam
Print Page

Thursday, 6 September 2012

Domain name is entitled same protection trade mark

Internet domain names are of importance and can be a valuable corporate asset. A domain name is more than an Internet address and is entitled to the equal protection as trade mark. With the advancement and progress in the technology, the services rendered in the Internet site have also come to be recognised and accepted and are being given protection so as to protect such provider of service from passing off the services rendered by others as his services. In yahoo Inc. (supra) it was observed that in a matter where services rendered through the domain name in the Internet, a very alert vigil is necessary and a strict view is to be taken for its easy access and reach by anyone from any corner of the globe.

Bombay High Court

Rediff Communication Limited vs Cyberbooth & Another on 22 April, 1999
Equivalent citations: 1999 (4) BomCR 278
Author: A Shah
Bench: A Shah

Print Page

Tuesday, 21 August 2012

How to protect yourself from phishing attack?



Phishing is a type of internet fraud in which criminals send emails that appear to come from your bank to get you to enter passwords and account details on a fake version of your bank’s website. Look for the following telltale signs to spot a phishing email:
    1. Generic greetings such as ‘Dear customer’. If your bank sends you official mail, it should have your full name.
      Threats to your account and requests for immediate action. Most companies want you as a customer and are not likely to be so quick to lose your business.
      Requests for personal information. Most businesses didn’t ask for personal information by phone or through e-mail even before phishing became widespread.
      Suspicious links. Links that are longer than normal, contain the @ symbol or are misspelled could be signs of phishing. It’s safer to type the business’s URL into your browser than to click on any link sent in an email.
      Misspellings and poor grammar.
Print Page

Saturday, 11 August 2012

Andhra Pradesh HC: Computer programme is protected by law as copyright

It becomes clear that a computer programme is by very definition original literary work and, therefore, the law protects such copyright. Under Section 63 of the Copyright Act, any infringement of the copyright in a computer programme/source code is punishable. Therefore, prima facie, if a person alters computer programme of another person or another computer company, the same would be infringement of the copyright
Andhra High Court
Syed Asifuddin And Ors. vs The State Of Andhra Pradesh And ... on 29 July, 2005
Equivalent citations: 2006 (1) ALD Cri 96, 2005 CriLJ 4314
Author: V Rao
Bench: V Rao
Print Page