11 - Chapter 5
11 - Chapter 5
Legislative Trends in
Indian Perspective
Fraud/Illegal gain (120) accounted for 60 per cent of the total Cyber
Crime motives reported in the country. Greed/Money (15 cases)
accounted for 7.5 percent of the Cyber Crimes reported. Eve-teasing
and Harassment (8 cases) accounted for around 4 per cent. Cyber
Suspects include Neighbours / Friends/ Relatives (91), Disgrunted
employees (11), Business Competitors (9), Crackers Students /
42o;
Professional learners (3). Cybercrime is not on the decline. The latest
statistics show that cybercrime is actually on the rise. However, it is true
that in India, cybercrime is not reported too much about.
Consequently there is a false sense of complacency that cybercrime
does not exist and that society is safe from cybercrime. This is not the
correct picture. The fact is that people in our country do not report
cybercrimes for many reasons. Many do not want to face harassment by
the police. There is also the fear of bad publicity in the media, which
could hurt their reputation and standing in society. Also, it becomes
extremely difficult to convince the police to register any cybercrime,
because of lack of orientation and awareness about cybercrimes and
their registration andhandling by the police.
A recent survey indicates that for every 500 cybercrime incidents that
take place, only 50 are reported to the police and out of that only one is
actually registered. These figures indicate how difficult it isto convince
the pohce to register a cybercrime. The establishment of cybercrime
cells in different parts of the country was expected to boost cybercrime
reporting and prosecution. However, these cells haven't quite kept up
with expectations.
Netizens should not be under the impression that cybercrime is
vanishing and they must realize that with each passing day, cyberspace
becomes a more dangerous place to be in, where criminals roam freely
to execute their criminals intentions encouraged by the socalled anonymity
(321)
passed the law — Information Technology Act 2000. The IT Act 2000
has been conceptualized on the United Nations Commissions on
International Trade Law (UNCITRAL) Model Law.
The increase rate of technology in computers has led to enactment of
Information Technology Act 2000. The converting of the paper work
into electronic records, the storage of the electronic data, has led
tremendous changed the scenario of the country The Act further amends
the Indian Penal Code, 1860, The Evidence Act, 1872, The Banker's
Book's Evidence Act, 1891 and The Reserve Bank of India Act, 1934.
Offences:
Cyber offences are the unlawful acts which are carried in a very
sophisticatedmannerin which either the computer is the tool or target or
both. Cyber crime usually includes:
(a) Unauthorized access of the computers-
(b) Data diddling
(c) Virus/worms attack
(d) Theft of computer system
(e)Hacking
(f) Denial of attacks
(g) Logic bombs
(h) Trojan attacks
(i) Internet time theft
.323:
(j) Web jacking
(k) Email bombing
(1) Salami attacks
(m) Physically damaging computer system.
shall be con\dcted for a term not less then three years or to afineexceeding
two lakh rupees or to both.
The under this section is non-bailable & cognizable.
Penalties: Punishment: imprisonment up to a term not exceeding
three years Fine: not exceeding two lakh rupees.
Section 69. Directions of Controller to a subscriber to extend
facilities to decrypt information:
(1) If the Controlleris satisfied that it is necessary or expedient so to
do in the interest of the sovereignty or integrity of India, the security of
the State, friendly relations with foreign States or public order or for
preventing incitement to the commission of any cognizable offence; for
reasons to be recorded in writing, by order, direct any agency of the
Government to intercept any information transmitted through any
computer resource.
(2) The subscriber or any person in charge of the computer resource
shall, when called upon by any agency which has been directed under
sub-section (1), extend all facilities and technical assistance to decrypt
the information.
(3) The subscriber or any person who fails to assist the agency referred
to in subsection
(2) shall be punished with an imprisonment for a term which may
extend to seven years.
Penalties: Punishment: imprisonmentfor a term which may extend
333:
to seven years.
The offence is cognizable and non- bailable.
Section 70. Protected System:
(1) The appropriate Government may, by notification in the Official
Gazette, declare that any computer, computer system or computer
network to be a protected system.
(2) The appropriate Government may, by order in writing, authorize
the persons who are authorized to access protected systems notified
under sub-section (1).
(3) Any person who secures access or attempts to secure access to a
protected system in contravention of the provision of this section shall
be punished with imprisonment of either description for a term which
may extend to ten years and shall also be liable to fine.
Explanation: This section grants the power to the appropriate
government to declare any computer, computer system or computer
network, to be a protected system. Only authorized person hasthe right
to access to protected system.
thereby is liable under any other law for the time beingin force.
Explanation: The aforesaid section lays down a mandatory condition,
which states the Penalties or confiscation not to interfere with other
punishments to which the person affected thereby is liable under any
other law for the time being in force.
78. Power to investigate offences:
Notwithstanding anything contained in the Code of Criminal
Procedure, 1973, a police officer not below the rank of Deputy
Superintendent of Police shall investigate any offence under this Act.
Explanation: The police officer not below the rank of Deputy
Superintendent of police shalhnvestigate the offence.
UK has the largest number of infected computers in the world followed
by the US and China. Financial attacks are 16 events per 1000, the
highest among all kinds of attacks. The US is the leading source country
for attacks but this has declined. China is second and Germany is third.
It is hard to determine where the attack came from originally The number
of viruses and worm variantsrose sharply to 7,360 that is a 64% increase
over the previousreportingperiod and a 332% increase over the previous
year. There are 17,500 variantsof Win.32 viruses. Threats to confidential
information are on the rise with 54%) of the top 50 reporting malicious
code with the potential to expose such information. Phishing messages
grew to 4.5 millionfrom 1 milhonbetween July and December 2004.
Pune Citibank MphasiS Call Center Fraud : US $ 3,50,000 from
accounts of four US customers were dishonestly transferred to bogus
44o:
accounts. This will give a lot of ammunition to those lobbying against
outsourcing in US. Such cases happen all over the world but when it
happens in India it is a serious matter and we can not ignore it. It is a
case of sourcing engineering. Some employees gained the confidence of
the customer and obtained their PIN numbers to commit fraud. They
got these under the guise of helping the customers out of difficult
situations. Highest security prevails in the call centers in India as they
know that they will lose their business. There was not as much of breach
of security but of sourcing engineering.
The call center employees are checked when they go in and out so
they can not copy down numbers and therefore they could not have
noted these down. They must have remembered these numbers, gone
out immediately to a cyber cafe and accessed the Citibank accounts of
the customers.
All accounts were opened in Pune and the customers complained
that the money from their accounts was transferred to Pune accounts
and that's how the criminalswere traced. Police has been able to prove
the honesty of the call center and has frozen the accounts where the
money was transferred.
There is need for a strict background check of the call center
executives. However, best of background checks can not eliminate the
bad elements from cominginandbreachingsecurity. We must still ensure
such checks when a person is hired. There is needfor a national ID and
a national data base where a name can be referred to. In this case
preliminary investigationsdo not reveal that the criminals had any crime
history. Customer education is very important so customers do not get
taken for a ride. Most banks are guilt of not doing this.
The Government of India realized the need for introducinga new law
and for making suitable amendments to the existing laws to facilitate e-
.342:
commerce and give legal recognition to electronic records and digital
signatures. The legal recognition to electronic records and digital
signatures in turn wUl facilitate the conclusion of contracts and the creation
of legal rights and obligationsthroughthe electronic communicationlike
Internet. This gave birth to the Information Technology Bill, 1999.
In May 2000, both the houses of the Indian Parliament passed the
Information Technology Bill. The Bill received the assent of the President
in August 2000 and came to be known as the Information Technology
Act, 2000. Cyber laws are contained in the IT Act, 2000.This Act aims
to provide the legal infrastructure for e-commerce in India and would
have a major impact for e-businesses and the new economy in India.
Therefore, it is important to understand 'what are the various perspectives
of the IT Act, 2000 and what it offers?'.
The InformationTechnologyAct, 2000 also aims to provide the legal
framework under whidi legal sanctity is accorded to all electronic records
and other activities carried out by electronic Information Systems means.
The Act states that unless otherwise agreed, an acceptance of contract
may be expressed by electronic means of communication and the same
shall have legal validity and enforceability
This Act was amended by Information Technology AmendmentBill
2006, passed in Loksabha on Dec 22nd and in Rajyasbha on Dec 23rd
of 2008. The then Hon'ble Minister of Communications & IT, Mr.
Dayanidhi Maran discussed the statement of Objects and Reasons for
343:
India Act, 1934 and for matters connected therewith or incidental thereto.
Objectives of the Act are: • To grant legal recognitionfor transactions
carried out by means of electronic data interchange and other means of
electronic communication commonly referred to as "electronic
commerce" in place of paper based methods of communication; • To
give legal recognition to Digital signatures for authentication of any
information or matter which requires authentication under any law. • To
facilitate electronic filing of documents with Government departments •
To facilitate electronic storage of data • To facilitate and give legal sanction
to electronic fund transfers between banks and financial institutions
• To give legal recognition for keeping of books of accounts by
banker's in electronic form. • To amend the Indian Penal Code, the
Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891, and
the Reserve Bank of India Act, 1934.
Some Important Features of Information Technology Act, 2008
This Act may be called the Information Technology Act, 2000. [As
Amended by Information technology (Amendment) Act 2008] Information
Technology (Amendment) Bill 2006 was amended by Information
Technology Act Am endmentBill 2008 and in the process, the underlying
Act was renamed as Information Technology (Amendment) Act 2008
herein afterreferred to as ITAA2008.
Nothing in this Act shall applyto documents or transactions specified
.346;
in the First Schedule by way of addition or deletion of entries thereto.
(Substituted Vide ITAA-2008)
Every notification issued under sub-section (4) shall be laid before
each House of Parliament (Inserted videITAA-2008) .
(ha) "CommunicationDevice" means Cell Phones, Personal Digital
Assistance (Sic), or combination of both or any other device used to
communicate,send or transmitany text, video, audio, or image. (Inserted
Vide ITAA 2008)
"Computer Network" means the interconnection of one or more
Computers or Computer systems or Communicationdevice through- (i)
the use of satellite, microwave, terrestrial line, wire, wireless or other
communication media;and (ii) terminalsor a complex consistingof two
or more interconnected computers or communicationdevice whether or
not the interconnection is continuously maintained; (Substituted vide
ITAA-2008)
OFFENCES
460;
[Section 65] Tampering with Computer Source Documents: Whoever
knowingly or intentionallyconceals, destroys or alters or intentionallyor
knowingly causes another to conceal, destroy or alter any computer
source code used for a computer, computer programme, computer system
or computer network, when the computer source code is required to be
kept or maintainedby law for the time being in force, sh all be punishable
with imprisonmentup to three years, or with fine which may extend up
to two lakh rupees, or with both.
Explanation - For the purposes of this section, "Computer Source
Code" means the listing of programmes. Computer Commands, Design
and layout and programme analysis of computer resource in any form.
Hacking with computer system 'Hacking' is a term used to describe
the act of destroying or deleting or altering anyinformationresiding ina
computer resource or diminishing its value or utility, or affecting it
injurioiBly in spite of knowingthat such action is hkely to cause wrongful
loss or damage to the public or that person. Section 66 provides that a
person who commitshacking shall be InformationTechnologyAct, 2000
10.39 punished with afineuptoRs.2 lakhs or with imprisonmentupto 3
years, or with both. As per ITAA2008, Section 66 is given as follows:
[Section 66] Computer Related Offences (Substituted vide ITAA
2008): If any person, dishonestly or fraudulently does any act referred
to in section 43, he shall be punishable with imprisonment for a term
which may extend to two three years or with fine which may extend to
five lakh rupees or with both.
Explanation: For the purpose of this section,- (a) the word
"dishonestly" shall have the meaning assigned to it in section 24 of the
Indian Penal Code; (b) the word "fraudulently" shall have the meaning
assigned to it in section 25 of the Indian Penal Code. [Section 66 A]
Punishment for sending offensive messages through communication
service, etc.( Introduced videlTAA 2008):
Any person who sends, by means of a computer resource or a
communicationdevice,- (a) any information that is grossly offensive or
has menacing character; or (b) any information which he knows to be
false, but for the purpose of causing annoyance, inconvenience, danger,
obstruction, insult, injury, criminalintimidation,enmity, hatred, or ill will,
persistently makes by making use of such computer resource or a
communication device, (c) any electronic mail or electronic mail message
for the purpose of causing annoyanceor inconvenience or to deceive or
to mislead the addressee or recipient about the origin of such messages
(Inserted vide ITAA2008) shall be punishable with imprisonmentfor a
term which may extend totthree years and with fine.
5. Unreported Case
312:
International Cases
Center for National Security Studies Vs U.S Department of
Justice^ The Circuit Court applied the mosaic theory to uphold the
Justice Department's categorical denial of FOIArequests for information
about more than seven hundred people detained in the wake of the 9/11
attacks. In North Jersey Media Group Vs Ashcroft"^ the third Court
appliedthe theory to upholdgovemment's decisionto close 9/11 "special
interest deportation" hearings to the Public and Press.
United States Vs Crandorf .Richard Crandon pleaded guilty before
the Court for receiving child pornography His crime was much more
than just downloadingthe illicitmaterial form the internet. Crandon met a
fourteen year old girl online and ultimately meeting with her to have
sexual relations and took the photographs of that intercourse. Crandon
and the girls use to frequently interact over the telephone and used to
discuss about their future prospects. The girl wanted to go to New
JerseyfromMinnesota along with Crandon. They went about matedahzing
their plan and left for New Jersey form Minnesota. On their way they
came to know that the authorities were looking for them. The girl was
sent from Minnesota. Crandon contested the. deprivation of his access
to the Internet during the period of his imprisonmenton the ground that
the Court has to seek the prior approval form the probation officer.
Further he pleaded that the non accessibility would hinder his employmait
6. 17F.Supp.2d58
7. 205RSupp.2d288,300
8. 494 U.S 152 (1990)
and the business wince computers and the internet are inextricably tied.
Court upheld that the restrictions was tenable in the light of the first
amendment whichrelated to the protecting the interest of the public.
Alkhaz Case^
In this case, an individual proficient with theuse of a computer used
the Internet to post a child's (or adult's) name and telephone number on
sexual explicit Intemet sites. This posting invited visitors to call and
inquire about the named individual, who was a child. As a result, the
named individual was subjected to consistent, harassing and possibly
sexual explicit telephone calls every day of the week, at any and all
hours. The repeated inquiries caused the recipient of the calls and/or
messages to become fearful for his/her safety and the safety of their
family The Boehle family decided that they had to move outside of Will
County in order to protect their daughter who was the subject of the
postings, telephone calls and messages, from any potential harm they
feared might occur as a result of such harassment.^^ The Alkhabaz case
is one instance in which existing law proved to be inadequate to deal
with computer-facilitated anti-social conduct. Other examples abound,
some of which were ultimately addressed bythe amendment of existing
law or the adoption of new penal law
9. 200 U.S. 113(1993)
10. Brenner, Sussan W, University of Dayton School of Law, Cybercrime
Investigation and Prosecution : The Role of Penal and Procedural Law,
Available at http://unpanl.un.org/intradoc/groups/public/documents/
APCITY/UNPAN003073 .pdflittp://unpanl .un.org/intradoc/groups/pubhc/
documents/APCITY/UNPAN003073.pdf, accessed on 20-8-2009
:374:
In this case, even if some of the causes pleaded by the suit are
seeminglybarred, yet this court shouldnot reject the plaint on the ground
of the relief being barred in law; that can be gauged only at the final
17. 1982 (3) s e c 487
18. 1998 (7) s e c 184
19. 2005 (7) s e c 510)
^23:
stage, having regard to the composite nature of the claims in the pleadings.
For these reasons, the application for rejection of plaint cannot succeed.
Both the applications,that is, lANo. 9062/2008 in CS (OS) 691/2008 lA
No. 9011/2008 in CS (OS) No. 1021/2008, are accordingly dismissed.
In the circumstances, the applicant defendant shall bear the costs,
quantified at Rs. 20,000/- each.
A.Shankar vs State Of Tamil Nadu^" (i) Criminal case may be
registered and proceeded with under Sections of the Office Secret Act,
Section 43 and 66 of the Information Technology Act, Sections 378,
463,470 and 505 oflndiaPenal Code investi^ted and proceeded against
Thiru A.Shankar. (ii)To initiate departmental proceedings for miscmduct
and endangering the security and confidentiality of official communication
by accessing the computer unauthorisedly and leaking it to the media
persons in question".
Accordingly the Commission of Inquiry conducted an Inquiry and
submitted its report to Government. The Commission found that the
Telephone conversation made on 20.09.2007 between the Chief Secretary
to Governmeit and the former Director of Vigilanceand Anti-Corruption,
did take place and the same was recorded by the former Director, Vigilance
and Anti-Corruption, inhis laptop computer connectedto the Telephone
No.24612561. The transcript is by and large is as appeared in Deccan
Chronicle. The Commissionalso found that the main person responsible
24.(1996) 11 s e c 439
.382;
considered by the sanctioning authority while granting the impugned
sanction.
On coming to the instant case on hand it is obvious that there is no
mention in the sanction of prosecution in respect of Section 72 of
Information Technology Act 2000. It is also pertinent to mote here that
duringthe course of his arguments, the learned counsel for the petitioner
has posed three questions i.e.;
1. WhyDr.SubramanianSwamy andTmt.V.S.Chandralekhawerenot
examined by the investigating officer so as to ascertain the source of
telephonic conversationbetween Tmt Poongothaiand Tr.S.K.Upadhyay
which was released by the later to the press ?
2. Why the investigating officer has not seized thecomputer used by
Tr.S.Pattan, who is the Personal Assistant to' Mr.S.K.Upadhyay at his
residence and sent the same for analysis to find out whether he could be
the person who had leaked the conversation in questionto the press and
Television?
3. Why theinvestigatingagency has not seized the server in building
No.23 of the DVAC with a view to find out as to whether any person
sitting in the office of the confidential branch of DVAC could have
accessed the laptop of Thiru S.K.Upadhyay ?
This Court has carefully considered the submissions made on behalf
of both sides. The submissions made on behalf of the petitioner hinges
around both questions of fact and question of law. In so far as the
:383:
questions raised by the learned counsel for the petitioner this Court is of
the considered view that it could very well be agitated before the trial
court during the course of trial. In so far as the question of law relating
to non granting of sanction of prosecution in respect of Section 72 of
Information Technology Act is concerned, the charge sheet levelled against
the petitioner cannot be quashed on this ground alone.
With regard to the question of facts are concerned, the High Court
will not enter into an enquiry of disputed facts or thereafter, hold in
favour of the accused. The inherent power cannot be invoked to quash
the charge only on the groundof question of facts. This principleis laid
down in Maheshwari Oil Mill v. State of Bihar.^^
Further the High Court has also no jurisdiction to interfere with the
prosecution at the preliminary stage by prejudging the question without
affording reasonable opportunity to the prosecution to substantiate the
allegations. This principle has been laid dowii by the Hon'ble Supreme
Court of India in State of Bihar v. Raj Narain Singtf ^
29. Decided on (17 March, 2011) see also Siddharam Satlingappa Mhetre v.
State of Maharashtra and Others (2010 (4) KLT 930)
^86;
police station have visited the premises of Sundaram Infotech Solutions
on 29.01.2011 and served the impugned notices, dated 24.01.2011
challenged in W.P.Nos.2513 and 2514 of 2011. The said notices were
issued under Section 91 Criminal Procedure Code seeking certain
documents. On coming to know about the said impugned notices the
petitioners have realised that the fifthrespondent KENSOFT has filed a
criminal complaint before the third respondent in Crime No.30 of 2010
on the same subject matter for an alleged offence under Sections 406
and 420 IPC besides the provisions of the Information Technology Act
andCopyri^tAct. Immediiely thereafter, the petitioners have explained
to the third respondent about the pendency of the civil suit in the High
Court of Madras and requested the third respondent to hand over a
copy of the First Information Report stated to have been registered at
the instance of the fifthrespondent. There was a serious dispute regarding
the jurisdiction of Mumbai Police to investigate the matter especially
when the fifth respondent himselfhas filed a suit before the Madras High
Court in respect of the same subject claiming ownership over the software
and time was sought for consultation, however, the third respondent
again visited the office of the first petitioner company on 30.01.2011.
According to the petitioners, the third respondenthas no jurisdictionnot
only to register the First Information Report, the petitioners attributed
against the fifth respondent that filing)f complaint is malicious act with
an intention of extracting money from the petitioner company and it is
.382.
vexatious and therefore, directing the petitioners to produce the
documents and other softwares are in violation of Articles 20 and 21 of
the Constitution of India.
The orders are challenged on various grounds including that the
notices issued under Section 91 Criminal Procedure Code are
unconstitutional and ultra vires the provisions of Criminal Procedure
Code since it amounts to self-incriminationby compulsion which is not
permissibleby virtue of Article 20(3) of the Constitutionof India in view
of catena of decisions of the Hon'ble Supreme Court; that it is
unconstitutionalmakinginvasionto the petitioners' fundamentalrightby
the third respondent; that though a criminal complaint is technically
maintainable, the third respondent ought to have appreciated that the
fifth respondent complainant himself has claimed ownership in respect
of the software already sold in favour of the first petitioner which is a
subj ect matter of dispute in a civil dispute filed by the fifth respondent in
the Madras High Court; that for the first informationreport filed by the
fifth respondent and registered under the third respondent police, there
is no cause of action and no criminal case has been made out and cause
of action has never arisen within the jurisdiction of the third and fourth
respondents; that the fifth respondent has approached the Madras High
Court and filed C.S.No.270 of 2009 specifically stating that the cause of
action arose within the jurisdiction of the Madras High Court cannot
maintain any complaint in respect of the same matter before the third
488;
respondent; that even on merit, the entire dispute arose by the illegal
conduct of the fifth respondentand the filing of the complaintbefore the
third respondent is an abuse of Criminal Procedure Code; that the
impugnednotice and the first information reportare arbitrary and illegal
hit by Article 14 of the Constitution of India; that the first information
report does not even remotely show that the cause of action arose within
the Maharashtra State; that the first information report, on theface of it,
has not made out any case for the third respondentpolice to investigate,
since no cause of action arose within its jurisdiction and no commission
of offence has been made out by disclosing the same in the impugned
first information report especially, the commission of Cyber crime; that
the filing of first information report itself is only due to the mala fide
attitude of the fifth respondent; that the fifth respondent has wilfully
misrepresented and suppressed the material facts; that the third and fourth
respondents while demanding to collect Certain vital commercial
information pertainingto the petitioners business have kept the petitione's
in dark as to whether the petitioners are treated as accused or as witnesses;
that apart from the fact that the first information report does not make
out a criminal offence warranting investigation by the third respondent;
that no offence made out under Section 63 of the Copyright Act as the
very same claim of the fifth respondent in respect of the ownership of
software is seriously in disputein the civil suit; that the fifth respondent
admitted in his statement that the petitioners proposed to migrate to
^82;
another software and therefore, misrepresentationdoes not arise; that no
offence has been made outunder the InformationTechnologyAct, 2000
by the de-facto complainant, apart from various other grounds.
.It is stated that on a perusal of evidence and during prehminary
investigation, it was revealed that the copy right in the software as per
the petitioners own admission in November 2008 and September 2008
lie with the 5th respondent; that the petitioners have been handed over
complainant's software, in trust which was transferred, to a third party
Sundaram Infotech Solutions; thatwhile in possession of the third party,
the software was tampered and the software scheme hacked into; that
when offences were discovered, the petitioners resorted to various acts
of dishonesty and fraud to cover up their acts and various criminal
offences; that evidence of offences havd)een submitted and verified by
the fourth respondent; that reports from the IRCC (Industrial Research
and Consultancy Centre and Intellectual Property Cell, IIT Bombay)
and the Institute of Intellectual Property Studies (UPS Report -reference
from NASSCOM), establishing IPR and copyright of Kensoft and the
offences committed by the petitioners are on record; that after going by
the available facts and evidence, preliminary enquirywas conducted for
an offence under Section 406, 420 and 34 IPC, read with Section 43
(b)(i)(j) read with Sections 66, 65 72(A) of the Information 'Bchnology
Act read with Sections 63,63(b) of the CopyrightAct and the complaint
was registered with the third respondent in Crime No.30 of 2010; that
the statements of important witnesses, including those of renowned
industrial stalwarts and senior experts were recorded; that the digital
evidence produced by the complainant was also taken on record; that
the team went with Forensic Tool Kit to collect copies of certain digital
evidence of current use of the housing finance software which ensures
that back up of any digital record can be taken without disturbing any
source data and without causing any damage to the petitioners/usage/
user. Therefore, summons were issued under Section 91 Criminal
Procedure Code by the Investigating Officer namely, the fourth
respondent to the petitioners to produce documents. It is stated that
when the fourth respondent has proceeded to investigate at Chennai
with the assistance of D-2, Anna Salai Police Station, the petitioners
have chosen to challenge the criminal complaint without furnishing any
materials. It is also stated that afterwards search warrant was obtained
form the appropriate court namely, the Additional Chief Metropolitan
Magistrate, 37th Court Esplanade, Mumbai. It is also stated that
suppressing all these facts, interim order has been obtained by the
petitioners. It is furttier stated that the petitioners have made false affidavit
suppressingmaterial facts and that the Mumbai Police has jurisdictionto
investigate and it is stated that at least part of the offence has been
committed by the petitioners in Mumbai and therefore, the Mumbai Police
has got jurisdictionsince the complainantvoluntarilyresides and carries
on business personally works for gain in Mumbai. It is also stated that
:39i.
under Sections 178 and 179 Criminal Procedure Code, the Mumbai Police
alone are competent to register and investigate the complaint.
It is stated that there is no coercion from the fourth respondent and it
is not correct to state that the copy of the first information report was
not shown to the petitioners and it is stated that the complaint was read
over and explainedin Hindi and English. It is stated that the software has
been developed in Mumbai. The Complainantcompany and complainant
are residing at Mumbai. The source code and IPR ofthe software are in
Mumbai. The Copyri^t registration certificate registered by the Registrar
of Copyrights, Government of India, at Mumbai and therefore, any
hacking or tampering of software anywhere affects the victim at Mumbai
and therefore, the registration of complaint by the Mumbai poUce is
within its jurisdiction and Cyber CrimePolice station of Mumbai is having
jurisdictionall over Mumbai and not restricted to any beat numbers etc..
It is also stated that when the petitioners themselves have admitted that
pendency of any civil proceedings in the Madras High Court does not
prevent the aggrieved person from launching criminal proceedings they
cannot have any grievance.lt is also stated that the third respondent has
never visited Chennai during the course of investigation and fifth
respondent was not present when the fourth respondent went to premises
of the petitioners. Hence, it is stated that the filing of the writ petitions is
abuse of process of law and any delay in investigation will defeat the
very object and if the timely action is not taken, there is every possibility
of the evidence being destroyed and will become a farce and therefore.
49g;
the third respondent has prayed to vacate the intaim order already granted
by this Court.
In the counter affidavit filed by the fifth respondent which is also in
the same line of counter affidavit filed by the fourth respondent, it is
stated that the writ petitions are not maintainablesince no cause of action
arose withinthe jurisdiction of this Court and FER was registered under
the third respondent only after prima facie case was made out about the
allegations and the third respondent after registering the FIR under various
sections forwarded the same to the Court of competent jurisdiction namely,
the Additional Metropolitan Magistrate, Court 37 which is under the
jurisdiction of Maharashtra High Court for all purposes under Articles
226 and 227 of the Constitution.lt is also stated that the fifth respondent
has chosen to file the suit ina place where the defendantsis carrying on
business as per Section 12 of the Letters Patent and Sections 51,55 and
62 of the CopyrightAct. Insofar as the filingof the FIR and the violations
of the provisions of Information Technology Act are concerned, the
fifth respondent is entitled to file such complaint before the third and
fourth respondents before whom the investigation is under progress.
A bare reading of the contents of the First InformationReport shows
that the third respondent police is the competent authority especially
when Sections 78, 80 and 81 make it very clear that the provisions of
Information Technology Act, 2000 will override the provisions of Code
of Criminal Procedure. While reiterating that the Ken soft Infotech Limited
is a software development company and that has developed finance
^93.
software for use of housing companies and home loans business, the
fifth respondent company states that it is an ISO 9001:2000 certified
company with certificationfromBVQI and ANAB (ANSI-ASQ) National
Accreditation Board of USA. The company has also been an Oracle
partner for over 13 years and one of their major software that they
developed is KEN-HFS and that was Hcensed in India to various
companies since 1994, including the Bank of India, GIC Housing Finance,
ICICI Bank etc., and also to Government of Andhra Pradesh, Andhra
Pradesh State Financial Corporation, Economic Development
Corporation Goa etc. In addition to that various software have also been
used by the Reliance Petro Chemicals, Air India, Afro Asian Games,
Government of Andhra Pradesh etc.. It is stated that the petitioners have
violated by tampering with the software, schema, source code of the
fifth respondent resulting in tremendous loss to the fifth respondent. It is
also stated that the petitioners have themselves assured thefifthrespondent
that the IPR will be protected by them. However, after admitting the
same in November 2008 and in December 2008 after perpetuating the
fraud the petitioners have falsely claimed copyright of the software and
after violations were discovered the infringingcode found on petitioners'
server to cover up their illegal activities. It is stated that there is no
disruption in the software and letters written by the second and fourth
petitioners on behalf of the company would clearly indicate that they
have satisfied with thework of the fifth respondent. Itis also stated that
they exposed to and colluded withthe third parties who control hacking
^94:
and tampering, copying and offences were committed and reverse
engineered the software provided by the fifth respondent company and
hacked the software schema source code committing violations of the
provisions of the InformationTechnologyAct, 2000. While it is true that
the fifth respondent has filed a suit in C.S.No.270 of 2009 before the
High Court of Madras, seeking various reliefs against the petitioners and
the third party are not party to the arbitration and in spite of it an
application was made for the purpose of referring to arbitration under
Section 8 of the Act and that has been rejected in the appeal in
O.S.A.Nos.431 to 433 of 2009. It is true that against the order in the
abovesaid appeals, S.L.P has been filed by the petitioners and no stay
has been granted by the Hon'ble Supreme Court. It is also stated that
the petitioners have violated the Copyright of the fifth respondent and
the illegal acts done by the petitioners have been established in the
technical report of the Indian Institute of Technology Computer Science
and Engineering Department, IIT, Bombay, apart from the report of
Dr.N.L.Sarda, who is an independentand eminent expert of international
repute and other reports of experts.
According to the fifth respondent, a perusal of the First Information
Report indicates the gross violations committed by the petitioners and
there is no abuse of process of law and the First Information Report
cannot be quashed as a matter of course which has been well settled to
the effect that even if an iota of fact is available in the First Information
395:
It is his submission that when once the fifth respondent who has
formulated the software at Mumbai which is the subject matter of contract
between the fifth respondent and the petitioners, when it is the complaint
4OQ;
of the fiffti respondent that the petitioners against the contract have started
misusing the software by transferring the sameto the others which is an
offence under the Information Technology Act and therefore, the
Software having started in Mumbai, theMumbai Police has jurisdiction
to investigate and it cannot be stated that the third respondent Mumbai
Police station hasno jurisdiction at all.
It is the submission of the learned counsel for the fifth respondent
who also wouldrely upon the judgment of the Bajanlal's case and submit
that mere filing of a civil suit on the original side of the Madras High
Court by the fifth respondent does not bar the fifth respondent in giving
a complaintagainstthe petitioners, if there is violation of the Information
Technology Act or various other provisions of the Indian Penal Code.
According to her, they are parallel proceedings, the ownership in respect
of the software is different from misusing of software system which is
an offence under the provisions of Information Technology Act.
According to her, there is absolutely no mala fide in the sense that the
coding system is situated in Mumbai. Mere statement by the fifth
respondent in the suit filed in Madras High Court, the jurisdiction lies
with the Madras High Court does not in any way take away the powers
of the third respondent when a part of the offence has been committed
within the jurisdiction of the third respondent in respect of which the
fifth respondent has given complaint.
The claim of the fifth respondent about his IPR and its ownership
pending in the High Court of Madras has in my considered view has
nothing to do with the allegationof criminal offence statedto have been
committedby the petitioners. In such circumstances, I have no hesitation
to hold that on the facts and circumstances of the case, there is nothing
for this Court warranting interference at this stage. It is always open to
the petitioners to work out their remedy in the manner known to law, if
there are any procedural or legal violations committed by the third
respondent at any stage. In such view of the matter, looking at any angle,
I am fully satisfied that the petitioners are not entitled for any relief claimed
404;
in the writ petitions. The writ petitions fail and the same are dismissed.
No costs. Consequentl)5 connected miscellaneous petitions are closed.
Cyber Defamation
India's first case of cyber defamation was reported when a company's
employee started sending derogatory, defamatory and obscene e-mails
about its Managing Director The e-mails were anonymousand frequent,
and were sent to many of their business associates to tarnish the image
and goodwill of the company
The company was able to identify the employee with the help of a
private computer expert and moved the Delhi High Court. The court
granted an ad-interim injunction and restrained the employee from sending,
publishingand transmittinge-mails, which are defamatory or derogatory
:4ii:
to the plaintiffs.
Cyber stalking
RituKohlihas the dubious distincti en of being the first lady to register
the cyber stalking case. A friend of her husband gave her telephonic
numberin the general chat room. The general chattingfacility is provided
by some websites like MIRC and ICQ. Where person can easily chat
without disclosing his true identity. The friend of husband also encouraged
this chatters to speak in slang language to Ms. Kohli.
Unauthorized access to computer systems or networks
However, as per Indian law, unauthorized access does occur, if hacking
has taken place. An active hackers' group, led by one "Dr. Nuker", who
claims to be the founder of Pakistan Hackerz Club, reportedly hacked
the websites of the Indian Parliament,Ahmedabad Telephone Exchange,
EngineeringExport Promotion Council, and United Nations (India).
IPR Theft
The economic offences wing (EOW) of the Pune police on Monday
arrested a software engineer Asma Sandip Thorve (37), a resident of
Uday Society in Sahkar Nagar, for allegedly cheating Brainvisa
Technologies to the tune of Rs 46.5 crores, by stealing their source
code. Earlier, the police had arrested software engineer Sameer Ashok
Inamdar (36) of Kondhwain the same case. (Jun 23, 2009 at 0119 hrs
1ST ) According to the poHce, Inamdar resigned from Brainvisa
Technologies in August 2006. He allegedly Stole the source code and
other secret information of Brainvisa Technologies and started his own
company Owner of BrainvisaTechnologies NitinHemchandraAgarwal
had lodged a police complaint alleging that the company lost Rs 46.5
crores due to this. A team, led by assistant commissioner Pushpa
Deshmukh, arrested Thorve, who was Inamdar's business partner and
allegedlyprovided him the confidential data of Brainvisa.
Thorve worked as senior manager, business development, for
BrainvisafromMay 2004 to December 2005 and there on as vice president
till December 2008, after which shejoinedlnamdar as a partner Thorve
was produced before court on Monday and has been remanded to police
custody tillJune 26.
Email bombing (DoS)
In one case, a foreigner who had been residing in Simla, India for
almost thirtyyears wanted to avail of a scheme introduced bythe Simla
HousingBoard to buy land at lower rates. When he made an application
it was rejected on the grounds that the scheme was available only for
citizens of India. He decided to take his revenge. Consequently he sent
thousands of mails to the Simla Housing Board and repeatedly kept
sending e-mails till their servers crashed.
Data diddling
The NDMC ElectricityBillingFraud Case that took place in 1996 is a
typical example. The computer network was used for receipt and
accountingofelectricitybillsby the NDMC, Delhi. Collection of money,
computerized accounting, record maintenance and remittance in he bank
were exclusively left to a private contractor who was a computer
professional. He misappropriatedhuge amount of funds by manipulating
data files to show less receipt and bank remittance.
Internet time theft
This connotes the usage by an unauthorized person of the Internet
hours paid for by another person. In May 2000, the economic offences
wing, IPR section crime branch of Delhi police registered its first case
involvingtheft of Intemethours. In this case, the accused, Mukesh Gupta
an engineer with Nicom System (p) Ltd. was sent to the residence of the
complainant to activate his Internet connection. However, the accused
used Col. Bajwa's loginname and password from variousplaces causing
wrongful loss of 100 hours to Col. Bajwa. Delhi police arrested the
accused for theft of Internet time.
On further inquiry in the case, it was found that Krishan Kumar, son
of an ex army officer, working as senior executive in M/s Highpoint
Tours & Travels had used Col Bajwa's login and passwords as many as
207 times from his residence and twice from his office. He confessed
that Shashi Nagpal, from whom he had purchased a computer; gave the
login and password to him. Thepolice couldjiot believe that time could
be stolen. They were not aware of the concept of time-theft at all. Colonel
Bajwa's report was rejected. He decided to approach The Times of
India, New Delhi. They, in turn carried a report about the inadequacy of
the New Delhi Police in handling cyber crimes. The Commissioner of
Police, Delhi then took the case into his own hands and the police under
his directions raided and arrested Krishan Kumar under sections 379,
411, 34 of IPC and section 25 of the Indian Telegraph Act. In another
case, the Economic Offences \Wng of Delhi Police arrested a computer
engineer who got hold of the passwordof an Internet usei^ accessed the
computer and stole 107 hours of Internet time from the other person's
account. He was booked for the crime by a Delhi court during May
2000. SBI arm wins cybersquattingcase - PeeyushAgnihotri- Tribune
News Service (Chandigaih,August24) SBI Card and Payment Services
Private Limited, the credit card arm of the State Bank of India (SBI),
received a shot in.the arm when it won a case of cybersquatting against
Domain Active Pty Limited, an Austrahan dotcom company.
The venture offers a range of credit cards — SBI Classic Card, SBI
Gold Card, SBI International Card, SBI Doctors Card. It also has a
number of city affinity cards (SBI Kolkata Card, SBI Mumbai Card,
SBI Delhi Card, SBI Hyderabad Card, SBI Bangalore Card),
commanding sales of over one million.
It all began when Domain Active Pty Limited, an Australian entity,
floated a website on the domain name, www.sbicards.com, and even
'tricked'financialbig-time entities like Chase Manhattan into advertising
on the site.
The SBI arm, which had already registered the domain name with
Fabulous.Com Pty. Ltd, lodged a complaint on March 16 at the World
Intellectual Property Organisation (WIPO), Geneva.
The WIPO Administrative Panel found that the Australian entity's
website could have attracted potential attention fromthe public because
of its affiliation with SBI Cards' products and services. At the same time
it created a risk of confusion with the products/services and trademark
as to the source, sponsorship, affiliation or endorsement of its website.
The panel's independent verification showed that the current use of
the Australian firm's website, www.sbicards.com, was practically the
same. The panel held that the respondent (Domain Active Pty Limited)
"has registered the disputed domain name in bad faith".
^^•|«