28
7 years of 7 years of Indian Cyber Law Indian Cyber Law Rohas Nagpal President, Asian School of Cyber Laws

7 years of Indian Cyber Law

  • Upload
    thisbe

  • View
    49

  • Download
    1

Embed Size (px)

DESCRIPTION

7 years of Indian Cyber Law. Rohas Nagpal President, Asian School of Cyber Laws. Cyber Pornography. Cyber Pornography. Section 67 of IT Act Publishing, transmitting, causing to be published Porn in the electronic form Strict punishment 5 years jail (SI or RI) + 1 lakh fine - PowerPoint PPT Presentation

Citation preview

Page 1: 7 years of  Indian Cyber Law

7 years of 7 years of Indian Cyber LawIndian Cyber Law

Rohas NagpalPresident,

Asian School of Cyber Laws

Page 2: 7 years of  Indian Cyber Law

Cyber PornographyCyber Pornography

Page 3: 7 years of  Indian Cyber Law

Cyber PornographyCyber PornographySection 67 of IT Act

– Publishing, transmitting, causing to be published

– Porn in the electronic form

Strict punishment– 5 years jail (SI or RI) + 1 lakh fine– 10 years jail (SI or RI) + 2 lakh fine

Page 4: 7 years of  Indian Cyber Law

Baazee caseBaazee case

Page 5: 7 years of  Indian Cyber Law

Baazee caseBaazee caseObscene MMS clipping listed for sale on

27th November, 2004 - “DPS Girl having fun".

Some copies sold through Baazee.com

Avnish Bajaj (CEO) arrested and his bail application was rejected by the trial court.

Page 6: 7 years of  Indian Cyber Law

Points of the prosecutionPoints of the prosecution

The accused did not stop payment through banking channels after learning of the illegal nature of the transaction.

The item description "DPS Girl having fun" should have raised an alarm.

Page 7: 7 years of  Indian Cyber Law

Points of the defencePoints of the defence

Section 67 relates to publication of obscene material and not transmission.

Remedial steps were taken within 38 hours, since the intervening period was a weekend.

Page 8: 7 years of  Indian Cyber Law

Findings of the CourtFindings of the Court It has not been established from the evidence that

any publication took place by the accused, directly or indirectly.

The actual obscene recording/clip could not be viewed on the portal of Baazee.com.

The sale consideration was not routed through the accused.

Page 9: 7 years of  Indian Cyber Law

Findings of the CourtFindings of the Court Prima facie Baazee.com had endeavored to plug

the loophole.

The accused had actively participated in the investigations.

The nature of the alleged offence is such that the evidence has already crystallized and may even be tamper proof.

Page 10: 7 years of  Indian Cyber Law

Findings of the CourtFindings of the Court

Even though the accused is a foreign citizen, he is of Indian origin with family roots in India.

The evidence indicates – only that the obscene material may have been

unwittingly offered for sale on the website.

– the heinous nature of the alleged crime may be attributable to some other person.

Page 11: 7 years of  Indian Cyber Law

Court orderCourt order The court granted bail to Mr. Bajaj subject

to furnishing two sureties of Rs. 1 lakh each.

The court ordered Mr. Bajaj to – surrender his passport – not to leave India without Court permission – to participate and assist in the investigation.

Page 12: 7 years of  Indian Cyber Law

Protected SystemsProtected Systems

Page 13: 7 years of  Indian Cyber Law

Protected SystemsProtected SystemsGazette notification for declaring protected

system.

Government order authorizing persons to access protected systems.

10 years jail for accessing or attempting to access protected systems.

Page 14: 7 years of  Indian Cyber Law

Firos vs. State of KeralaFiros vs. State of KeralaGovt of Kerala declared the FRIENDS

application software as a protected system.

The author of the application software challenged the notification and the constitutional validity of section 70.

The Court upheld the validity of both

Page 15: 7 years of  Indian Cyber Law

Tampering with source codeTampering with source code

Page 16: 7 years of  Indian Cyber Law

Tampering with source codeTampering with source code

Computer source code need not only be in the electronic form.

It can be printed on paper (e.g. printouts of flowcharts for designing a software application).

Page 17: 7 years of  Indian Cyber Law

Tampering with source codeTampering with source code

Following are punishable with 3 years jail and / or 2 lakh fine:– Concealing– Altering– Destroying

Page 18: 7 years of  Indian Cyber Law

Syed Asifuddin caseSyed Asifuddin case

Tata Indicom employees were arrested for manipulation of the electronic 32-bit number (ESN) programmed into cell phones that were exclusively franchised to Reliance Infocomm.

The court held that such manipulation amounted to tampering with computer source code as envisaged by section 65.

Page 19: 7 years of  Indian Cyber Law

Digital EvidenceDigital Evidence

Page 20: 7 years of  Indian Cyber Law

Parliament attack caseParliament attack caseSeveral terrorists attacked Parliament House

on 13-Dec-01

Digital evidence played an important role during their prosecution.

The accused had argued that computers and digital evidence can easily be tampered and hence should not be relied upon.

Page 21: 7 years of  Indian Cyber Law

Parliament attack caseParliament attack caseA laptop, several smart media storage disks

and devices were recovered from a truck intercepted at Srinagar pursuant to information given by two of the suspects.

These articles were deposited in the police “malkhana” on 16-Dec-01 but some files were written onto the laptop on 21-Dec-01.

Page 22: 7 years of  Indian Cyber Law

Parliament attack caseParliament attack case

Evidence found on the laptop included:– fake identity cards, – video files containing clippings of political

leaders with Parliament in background shot from TV news channels,

– scanned images of front and rear of a genuine identity card,

Page 23: 7 years of  Indian Cyber Law

Parliament attack caseParliament attack case

– image file of design of Ministry of Home Affairs car sticker,

– the game 'wolf pack' with the user name 'Ashiq'. Ashiq was the name in one of the fake identity cards used by the terrorists.

Page 24: 7 years of  Indian Cyber Law

Parliament attack caseParliament attack caseNo forensic backup was taken.

Court held that:– Challenges to the accuracy of computer

evidence should be established by the challenger.

– Mere theoretical and generic doubts cannot be cast on the evidence.

Page 25: 7 years of  Indian Cyber Law

General OverviewGeneral Overview

Page 26: 7 years of  Indian Cyber Law

General overviewGeneral overview

Information Technology Act

Filing complaints

Power of the police (search, arrest etc)

Hacking

Page 27: 7 years of  Indian Cyber Law

General overviewGeneral overview

Malicious code

DOS attacks

Piracy

Page 28: 7 years of  Indian Cyber Law

Rohas Nagpal President Asian School of Cyber Laws

rohasnagpal.com [email protected]