0% found this document useful (0 votes)
62 views14 pages

A Study and Analysis of The Cyberspace With Special Reference To Jurisdictional Issues and Challenges

This document discusses jurisdictional issues related to cyberspace. It analyzes different approaches to dealing with jurisdiction over physically out-of-state defendants in different legal systems. Several proposed solutions are examined but found to be unsatisfactory. The document aims to develop a legal framework to address the complex jurisdictional situations that can arise in cyberspace, especially those involving defendants in different territories. It reviews literature on cyberlaw topics like cybercrime and jurisdiction across borders.

Uploaded by

Sabeel Nadaf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views14 pages

A Study and Analysis of The Cyberspace With Special Reference To Jurisdictional Issues and Challenges

This document discusses jurisdictional issues related to cyberspace. It analyzes different approaches to dealing with jurisdiction over physically out-of-state defendants in different legal systems. Several proposed solutions are examined but found to be unsatisfactory. The document aims to develop a legal framework to address the complex jurisdictional situations that can arise in cyberspace, especially those involving defendants in different territories. It reviews literature on cyberlaw topics like cybercrime and jurisdiction across borders.

Uploaded by

Sabeel Nadaf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

International Journal of Pure and Applied Mathematics

Volume 119 No. 17 2018, 1603-1616


ISSN: 1314-3395 (on-line version)
url: http://www.acadpubl.eu/hub/
Special Issue
http://www.acadpubl.eu/hub/

A Study and Analysis of the Cyberspace with Special


Reference to Jurisdictional Issues and Challenges
1
K. Ganimozhi and 2Aswathy Rajan
1
Saveetha School of Law, Saveetha Institute of Medical and Technical
Sciences, Saveetha University, Chennai. [email protected]
2
Saveetha School of Law, Saveetha Institute of Medical and Technical
Sciences, Saveetha University, Chennai. [email protected]

Abstract
Cyberspace is a factitious environment without solid boundary which
makes it very different from the physical world. This fact has a significant
meaning when personal jurisdiction issue is discussed because physical
boundary is generally an important consideration in the issue of
jurisdiction. Whether or how the ordinary rule would still apply to
Cyberspace and whether a new standard should replace such ordinary rule
are vigorously discussed in the state sovereignty. Diverse approaches in
different state sovereignties under the current situation related to the
physically out-of-state defendant make the jurisdiction issue highly
unpredictable within Cyberspace. In this article, different approaches are
introduced to deal with the jurisdictional issue over physically out-of-state
defendants in different state sovereignties. Besides explaining different
approaches, this article will also discuss and analyze several tentative
solutions brought up by commentators to show that they are not all
satisfactory to some extent with regard to this issue. Then, this article will
try to come up with some kind of legal infrastructure in order to encounter
the current complex situation in the issue of Cyberspace jurisdiction,
especially to the physically out-of-state defendant situation, which is the
main purpose in this article. Last but not the least, this article might also
contribute to possible future legislative modification in state sovereignty.
Jurisdiction is one of the determining factors in any legal system around
globe and hence the issues pertains vital influence while deciding any
matter in cyber space. Adjudication process and enforcement mechanism is
essence to any legal system and subsequently any adjudication mechanism
depends upon the territorial doctrines that are much shallow in cyber
world. Paper illustrates in very realistic approach while determining the
jurisdictional and territorial nexus in world of internet.
Key Words:Cyberspace, jurisdiction, crime, adjudication, legislative,
sovereignty.

1603
International Journal of Pure and Applied Mathematics Special Issue

1. Introduction
The jurisdiction is the most critical inquiry postured in any official court of law.
In the event that the court does not have ward, the issue would not be continued
in the court. The court (Domestic or International) without purview does not
have any specialist to engage the issue, to choose rights and obligations or force
punishment or discipline. The internet has raised the fundamental issues of ward
in universal laws and household laws due to it's de-regional nature. As talked
about before, web enables gatherings to execute exchanges without unveiling
their personality; and the gatherings may not know each other's location.The
gathering may sit at any side of the world and abuse the privileges of the other
party or individual. The worldview of the ward in the International law and
national law is required to be moved due to the impossible to miss nature,
expanding use and need of the digital space1.Over the previous ten years,
wrongdoing (generally situated in the realm of physical element) has been
progressively advancing into the universe of data. Wrongdoing is advancing;
since the days when products were transported by stagecoach, theft has
switched to keep up, even to our cutting edge equal credit and platinum cards.
Web charge card number burglary has turned into an all around perceived
threat. The most well-known types of PC wrongdoing answered to Inter-GOV
incorporate kid erotica, extortion, and email mishandle. Considerably all the
more aggravating are new types of digital fear mongering made conceivable by
the huge measure of the physical apparatus currently worked by PCs. In this
article, in the wake of endeavouring to characterise Personal computer
wrongdoing, we look at the sorts that have been conferred previously, and the
new kinds prone to show up later on. We likewise inspected the trouble in
distinguishing and estimating Personal computer wrongdoing, techniques for
endeavouring to arraign or forestall such violations, and the adequacy of these
measures.2 This article assesses the ideas of Personal computer wrongdoings,
location and the controls.

2. Aim of the Study


The aim of the study is used to know about the cyber space with special
reference to jurisdictional issues and challenges.

3. Hypothesis
HO: Cyberlaw as it is enacted in the domestic legal sphere is not adequate in
preventing and enforcing against the crimes happened in the cyberspace .

1
Burno De ., Padirac., The international dimensions of cyberspace law ., published by Tata McGraw, Hill education ., on 2018 ., in
India.
2
Dudley ., Investigating cyber law and cyber ethics ., published by Universal law publishing ., on 2011., in UK.

1604
International Journal of Pure and Applied Mathematics Special Issue

HA : Cyberlaw as it is enacted in the domestic legal sphere is not adequate in


preventing and enforcing against the crimes happened in the cyberspace .

4. Objective
 To explain the term jurisdiction and discuss the importance in the
cyberspace.
 To analyse the importance of the criminal jurisdiction quoting relevant
provisions of Indian laws and court decisions.
 To analyse the importance of the effect doctrine in the light of the extra
territorial nature of the cyber crime.
 To examine the issues applicable law with the special reference to India
by citing relevant sections of the IT Act 2000

5. Research Question
Whether the Indian laws like IT Act 2000 IPC effectively address the
jurisdictional issues involved in cyberspace and comparing how other
jurisdictions like US effectively implemented laws address the transnational
nature of cyber space.

6. Review of Literature
Featuring current research, theoretical frameworks, and case studies, the book
will highlight the ethical and legal practices used in computing technologies,
increase the effectiveness of computing students and professionals in applying
(Author : Padirac Burno De ,2018) This book discusses the legal position of
Information Technology (IT), e-commerce and business transaction on the
cyberspace/Internet under the Information Technology (IT) Act in India(Author
: Dudley,2011) Examines cyberlaw topics such as cybercrime and risk
management, electronic trading systems of securities, digital currency
regulation, jurisdiction and consumer protection in cross-border markets, and
international bank transfers(Author: Henrik,2014) The book will be very useful
to a wide range of readers because it will both inform and provide the basis for
instruction. This book significantly advances the scholarly literature available
on the global problem of cyber-crime(Author: Tsun Chang ,2014) Law needs to
be developed to take advantage of technological improvements and to ensure
that states can respond to computer crime and related criminal law issues. This
book sets out the reports of two expert working groups(Author: Saria Mariaro,
2008) Concepts, Methodologies, Tools and Applications is a three-volume
reference that explores all aspects of computer-based crime and threats, offering
solutions and best practices from experts in software development,
information(Author: Weber Rolf.H,2011) This book will help both IT pros and
law enforcement specialists understand both their own roles and those of the
other, and show why that understanding and an organized, cooperative effort is
necessary to win the fight against this new (Author: Broadhurst,2005) This text
will be of interest to academics, professionals and practitioners involved in

1605
International Journal of Pure and Applied Mathematics Special Issue

building social capital; engaging with hard to reach individuals and


communities; the police and criminal justice sector as well as IT
professionals(Author: Prakekh Miss Prevy., 1870) The first chapters deal with
the technicality of firewalls and filters on public international computer
networks, anti-censorware, censoring and efficiency of filters(Author: T.S.
Somashekhar 2010).

7. Methodology
In this research the researcher used the descriptive method. Descriptive
Research More simply put, descriptive research is all about describing people
who take part in the study. There are three ways a researcher can go about doing
a descriptive research project, and they are: Observational, defined as
a method of viewing and recording the participants.

8. Sources of Study
Various books, e-sources and journals are used for the study related to cyber
space with special reference to jurisdictional issues and challenges.

9. Limitation
1. The research has been limited to only referring to online sources and
books.
2. The topic is very vast with limited time.

10. Chapterisation
The entire study is divided into two chapters with an introduction and a
conclusion.

Chapter - I This paper deals with Cyber jurisdiction and judicial approach
around globe.

Chapter – II This paper deals with the Challenges and solutions of cybercrime.
CHAPTER – I
Cyber Jurisdiction and Judicial Approach Around Globe

The system in regards to jurisdictional test taxicab be imagined as non picking


up with the both of the conventions that are 'impact regulation' and 'subjective
regional standard' and accordingly these standards are supplanted by a
comprehensive worldwide digital jurisdictional drew closer and this paper
propose to layout a discussion for redressal for digital issues named as 'Global
Court for Cyber Related Issues'. The structure ought to perceive significantly
two issues wherein one is with respect to the jurisdictional issue and second is
its implementation. The previous will again be isolated in two sections as the
initial step is to setup a comprehensive locale specialist for managing digital
issues and another respects with separating the unjustifiable information or

1606
International Journal of Pure and Applied Mathematics Special Issue

transmissions in the internet. Separating can be drawn closer in two courses


component by confining the outlandish materials on both sender and recipient's
end as them two are enjoyed transmission of information that negatively affect
either two of them or to any outsider. 3

After these means a requirement for appropriate authorization component is


provided by the paper in order to reasonable and stringent execution of the
choices of the specialist setup to uncover and resolve the issues identifying with
the internet. A due adherence to standards of worldwide law ought to likewise
be kept up for the same. 4

Presently assuming first issue in position, the creator propose to frame a stage
where the issues identified with Cyberspace will be managed and the specialist
will be in charge of the mediation matter in reference with issues emerging
around the world. Name of expert as proposed by the paper may be 'Universal
Court on Cyber Related Issues'. This discussion is made in effectuating the
Declaration that develops the 'Global Court for Cyber Related Issues' to its
introduction to the world. 5This revelation includes those articles of
understanding that not just gives mandatory purview upon the signatory
gatherings to the assertion. This discussion shaped under the presentation
commands an instrument for the gatherings to oblige the principles and controls
made in assistance of satisfying the goal or reason for development of specific
discussion. In digital world a critical factor that should be contacted upon by
this specialist is in regards to the broadened participatory components included
not at all like some other worldwide arrangement/revelation/tradition and so on
that have just states as gatherings. These expanded gatherings to the
presentation will go from huge players in the market like Google, Yahoo,
Microsoft, IBM and so forth going from around the vast majority of the enrolled
associations managing in the field of the internet. 6

These national or multinational companies with the coordination of state need to


structure them in such a way in this way, to the point that an appeasing situation
is created that further collaborate International Court for Cyber Related Issues
in order to accomplish its goal. Major testing ambiguity will emerge with
respect to the contribution of these benefit making associations and surrendering
them in domain of obligatory purview of International Court for Cyber Related
Issues that can possibly damage or bear misfortune in future on the off chance
that a profession conflicts with the either party. Today world have gone up to
the stature of comprehensive worldwide connection that feathered the

3
Henrik., Cyberspace and International law on jurisdiction .,published by Kluwer Law International., on 2004 ., in Germany.
4
http://www.forbes.com/sites/quora/2013/01/07/how-many-things-are-currently-connected-to-the-internet-of-things-iot/
(last accessed on 15th September 2013)
5
Chang ., Tsun ., The emerging digital forensics applications for crime detection., published by Kluwer Law International.,
on 2004., in China.
6
Mariaro., Saria., Ethics and policies for cyber operations ., published by Kluwer Law International., on 2008 ., in Sweden.

1607
International Journal of Pure and Applied Mathematics Special Issue

improvement of monetary, political, social and consequently can make an


exhaustive community oriented approach for taking the benefit situated
enterprises on a similar stage and in consonance with the acceptability of locale
of International Court for Cyber Related Issues. State have additionally a critical
part to play in this measure to include the enterprises of their individual nations
by giving them some budgetary advantages by method for unwinding in charge,
financing the crude materials and notwithstanding unwinding approaches that
add up to more benefit age among the partnerships and consequently inducing
them to sign the assertion. 7

In the wake of marking by the company, the state signatory ought to likewise be
conformed to protecting under the necessary locale of the International Court
for Cyber Related Issues and for this undertakings must be made on worldwide
level by various associations in which inclusion of WTO 8and its appended
functionaries should likewise be included for fast and smoother contribution of
states and even stretch out up to some degree to beneficial enterprises. Likewise
the United Nations ought to be the principle player in the field in order to keep
up a trading off circumstance between state finishing up in most extreme
investment of states. Significant issue with global law is the non-use of laws
because of nonappearance of any unbending nature in the coupling nature in
light of standards like political power meaning through and through freedom of
state, financial freedom regarding exchange and business and so on. In spite of
the fact that the rule of power fills in as most consecrated rule in universal law
yet leaving to before said idea, most astounding thought might be given to
sympathetic welfare around globe. In display case, the marking of gatherings to
International Court for Cyber Related Issues' ward will be a stringent advance to
secure and social equity in the internet around globe.9
Case Laws
Case Law–I
Satyam Infoway Ltd vs Siffynet Solutions Pvt. Ltd on 6 May, 2004

The respondent began carrying on business of web advertising under the


domain names,www.siffynet.net and www.sijfynet.com from fifth June 2001.
The respondent cases to have acquired enlistment of its two space names with
ICANN on fifth June, 2001 and sixteenth March, 2002 separately. Coming to
know about the utilization of the word 'Siffy' as a feature of the respondent's
corporate and area name, the appealing party served see on the respondent to cut
it out from either carrying on business for the sake of Siffynet Solutions (P) Ltd.
or on the other hand Siffynet Corporation and to exchange the area names to the
appealing party. The respondent won't. The appealing party recorded a suit in
the City Civil Court against the respondent on the premise that the respondent
was going off its business and administrations by utilizing the litigant's business

7
Rolf.H., Weber.,Realizing a new global cyberspace framework ., published by PHI Learning , Pvt ltd ., on 2011., in London.
8
http://www.naavi.org/pati/pati_cybercrimes_dec03.htm (last accessed on 20th August 2013)
9
Training on cyber law , cybercrime and investigation need of awareness and requirements by Ray R. Venkatraman .

1608
International Journal of Pure and Applied Mathematics Special Issue

name and area name. An application for brief directive was additionally
recorded. 10The City Civil Court Judge permitted the application for transitory
directive in light of the fact that the appealing party was the earlier client of the
exchange name 'Sify', that it had earned great notoriety regarding the web and
PC benefits under the name 'Sify', that the respondent's space names were like
the area name of the litigant and that disarray would be caused in the brain of
the overall population by such misleading closeness. It was likewise discovered
that the adjust of comfort was supportive of giving a directive for the appellant.
these certainties, plainly both the Courts beneath had continued on the premise
that the standards identifying with going off activities regarding trademarks are
material to space names. Be that as it may, the respondent has fought that a
Domain Name couldn't be mistaken for "property names, for example, Trade
Marks. As per the respondent, an area name is simply an address on the web. It
was likewise presented that enrollment of an area name with ICANN did not
give any licensed innovation right; that it is an agreement with an enlistment
specialist enabling correspondence to achieve the proprietor's PC by means of
web joins diverted through the enrollment expert's server and that it is likened to
enrollment of an organization name which is a one of a kind identifier of an
organization however of itself gives no protected innovation rights. The appeal
is accordingly allowed. The decision of the High Court is set aside and that of
the City Civil Court affirmed. There will be no order as to costs.11
Case Law – II
Md.Jamiluddin Nasir vs State Of West Bengal on 10 October, 2014

At around 6:36 a.m., Calcutta Police Control Room at Lal Bazar got a data of
terminating before American Center. Control Room promptly asked the
Shakespeare Sarani Police Station to continue to the spot. On examination it
uncovered that a gathering of police faculty was guarding American Center. The
said gather was in regards to finish their night obligation and the new gathering
was to assume control. Amid the period while giving over of charge was going
ahead at 6:15 a.m., two people riding on a Motor Cycle one having a gun in his
grasp, driving the Motor Cycle and the pillion rider having Machine Gun being
AK-47 demonstrate unpredictably shot at the police gathering and after that fled
towards south bearing. The whole episode took around five minutes making loss
numerous police faculty and harming others. One private security watch of
American Center alongside one non military personnel additionally maintained
damage12. Eighteen police staff with weapon shot wounds were expelled to
S.S.K.M. Healing center, Calcutta. Five of them capitulated to their damage
while the others aside from one were dealt with and released in this manner.
Two regular folks Moti Jadav, a person on foot and a private security monitor
one Aubray Gallyat utilized by American Center likewise managed firearm shot

10
Satyam Infoway Ltd vs Siffynet Solutions Pvt. Ltd on 6 May, 2004 AIR 2004 SC 3540.
11
ibid
12
Md.Jamiluddin Nasir vs State Of West Bengal on 10 October, 2014 13 SCC 621.

1609
International Journal of Pure and Applied Mathematics Special Issue

damage. The examining group recouped cartridges from the place of event.
Shots were expelled from the dead bodies and additionally from the groups of
harmed people. Those were in this manner analyzed by the scientific expert.At
around 6:00 a.m. two companions specifically Gilbart Gomes and Sahid Ikbal
nom de plume Pappu (P.W. 62) went to buy drain in Beniapukur. Sahid saw a
Maruti Car and a Motor Bike at the intersection of Beniapukur Lane. He was
conversing with Gilbart Gomes just before the shop of one Ashok Nandy. He
saw blue hued Maruti 800 Car remaining there. A lorry was going from
Beniapukur side and couldn't pass as a result of the bar of street by the Maruti
Car. Two people were sitting in the front seat. He approached those people to
clear a path for the lorry to keep away from stick. The Maruti vehicle number
was BRK 4907. After around ten minutes, a dark hued Motorbike went to the
side of the Maruti vehicle. Two people got down from the bicycle with a cricket
bat cover having something inside it. One of them boarded the Maruti Car by
saying 'Insa Alla Kum Ho Gaya'. Both the auto and the bicycle left the place.
The Motorcycle was having enlistment number being W.B. 01 P-2144. At
around 9:00 a.m. he heard the news of American Center shoot out. He secured
that the morning occurrence saw by him may have some co-connection and
consequently, educated Shale Babu, a police overseer known to him working at
Lal Bazar. punishment be not executed for a period of three months from date to
enable them to approach the Apex Court.13
Chapter – II
Challenges and Solutions of Cybercrime

The threat from cyber crime is multi-dimensional, targeting citizens, businesses,


and governments at a rapidly growing rate.
Challenges : 1

There is presently a refined and independent advanced underground economy in


which information is the unlawful ware. Stolen individual and budgetary
information – utilized, for instance, to access existing ledgers and Master cards,
or to deceitfully set up new credit extensions – has a money related esteem. This
drives a scope of criminal exercises, including phishing (the demonstration of
endeavouring to secure data, for example, usernames, passwords, and Visa
points of interest and some of the time, by implication, cash, by taking on the
appearance14 of a reliable element in an electronic correspondence), charming
(the fake routine with regards to guiding Internet clients to a fake Web website
that emulates the presence of a honest to goodness one), malware circulation
and the hacking of corporate databases, and is upheld by a completely fledged
foundation of pernicious code authors, expert web hosts and people ready to
rent systems of a huge number of bargained PCs to do robotised assaults.

13
Md.Jamiluddin Nasir vs State Of West Bengal on 10 October, 2014 13 SCC 621.
14
http://cybercrime.planetindia.net/intro.htm (last accessed on 17th August 2013)

1610
International Journal of Pure and Applied Mathematics Special Issue

Solution
 Active focusing of underground fora to upset the course of intense and
simple to utilize digital criminal instruments, for example, malware units
and botnets.
 Disrupt the foundation of noxious code scholars and master web has
through the dynamic recognizable proof of designer gatherings and a
joint activity of law authorization, governments and the Information and
Communication Technology industry to disassemble alleged "projectile
evidence" facilitating organizations.
 Active focusing of the returns of digital wrongdoing in a joint effort with
the budgetary part. For e.g. cash donkey (is a man who exchanges cash
obtained wrongfully (e.g., stolen) face to face, 15through a dispatch
benefit, or electronically, in the interest of others).
 Continue to form knowledge into the conduct of the contemporary
digital criminal by methods for insight examination, criminological
research and profiling systems, and in light of the joined law
requirement, IT security industry and scholastic sources, keeping in
mind the end goal to convey existing assets all the more adequately.16
Challenges : 2

Another most disturbing issue in the present day digital world is the
advancement and simple accessibility of erotica particularly Child pornography
which alludes to pictures or movies (otherwise called tyke manhandle pictures)
and, at times, works portraying sexually express exercises including a tyke17.
Mishandle of the kid happens amid the sexual demonstrations which are
recorded in the creation of tyke smut.
Solution

Place the PC in a midway found territory in your home - not in a tyke's room.
This anticipates "mystery" interchanges or get to and furthermore enables all
individuals from the family to utilize it. Converse with your youngsters about
the Internet. Clarify that it is a brilliant wellspring of data, yet a few locales are
unseemly and they are relied upon to avoid these destinations. Build up time
periods for Internet get to. This will urge your youngsters to acquire data in an
auspicious way and demoralise careless meandering. Keep an open line of
correspondence with your youngsters. Examine their Internet encounters and
guide them to destinations that are age-proper.18 Consider utilizing
programming that can piece or channel Internet locales or certain words that
may demonstrate wrong destinations. In a talk room never give out any
individual data including: name, address, city, state, school went to, phone

15
Rolf.H., Weber.,Realizing a new global cyberspace framework ., published by PHI Learning , Pvt ltd ., on 2011., in London.
16
Broadhurst., Rod., cyber Crime., published by Universal law., on 2005.,in India.
17
T.S. Somashekhar., The Indian journal of law and Technology ., published by law publishing house in 2000.
18
Miss Prevy., Prakekh ., cyberspace and jurisdiction ., published by little brown on 1870.,in USA.

1611
International Journal of Pure and Applied Mathematics Special Issue

number, family names or other individual family data. Never react to somebody
who needs to meet face to face or send photos. Teach your youngsters to leave
the visit room and advise you instantly if this happens. In particular, if your
youngster visits a specific talk room, spend no less than five or ten minutes
observing the discussion to check whether it is fitting. Consider acquiring PC
programming items that can enable you to screen and control your tyke's
entrance to the Internet. Screen your youngsters' Internet action by checking the
majority of the destinations went to.
Case Laws
Case Law : I
Shreya Singhal vs U.O.I on 24 March, 2015

The petitioners different insight raised a substantial number of focuses with


regards to the defendability of Section 66A. As indicated by them, as a matter of
first importance Section 66A encroaches the key ideal to free discourse and
articulation and isn't spared by any of the eight subjects canvassed in Article
19(2). As indicated by them, the causing of disturbance, burden, threat,
hindrance, affront, damage, criminal terrorising, animosity, disdain or
malevolence are for the most part outside the domain of Article 19(2). Further,
in making an offense, Section 66A experiences the bad habit of unclearness on
the grounds that dissimilar to the offense made by Section 66 of a similar Act,
none of the previously mentioned terms are even endeavoured to be
characterized and can't be characterized, the outcome being that blameless
people are reserved in and the individuals who are most certainly not. Such
people are not told unmistakably on which side of the line they fall; and it is
available to the experts to be as discretionary and unusual as they like in
booking such people under the said Section. Truth be told, an expansive number
of honest people have been reserved and numerous cases have been given as a
note to the Court. 19The authorisation of the said Section would truly be a
guileful type of control which impedes a centre esteem contained in Article
19(1)(a). What's more, the said Section chillingly affects the right to speak
freely and articulation. Likewise, the privilege of watchers is encroached all
things considered chilling impact would not give them the advantage of
numerous shades of dark as far as different perspectives that could be seen over
the web. 20The petitioner additionally fight that their rights under Articles 14
and 21 are broken because there is no comprehensible differentia between the
individuals who utilize the web and the individuals who by words talked or
composed utilize different mediums of correspondence. To rebuff some person
since he utilises a specific medium of correspondence is itself a prejudicial
question and would fall foul of Article 14 regardless.

19
Shreya Singhal vs U.O.I on 24 March, 2015 AIR 2015 SC 1523.
20
Ibid

1612
International Journal of Pure and Applied Mathematics Special Issue

Case Law :II


Mohd.Arif @ Ashfaq vs State Of Nct Of Delhi on 10 August, 2011

The appellant (as a matter of fact a Pakistani national) challenges his


simultaneous conviction by the trial Court and the High Court as additionally
capital punishment granted to him, in this interest. On 22.12.2000 at around 9
p.m. at night a few interlopers began aimless shooting and gunned down three
armed force Jawans having a place with seventh Rajputana Rifles. This
contingent was put in Red Fort for its assurance thinking about the significance
of Red Fort ever of. There was a Quick Reaction Team of this contingent which
restored the terminating towards the gatecrashers. Be that as it may, no
interloper was executed and the gatecrashers were fruitful in getting away by
scaling over the back side limit mass of the Red Fort. This assault shook the
entire country for the most part and the city of Delhi specifically as Red Fort is
extremely huge in the history which was assumed control by British Army path
in 1857 and was recovered back to India on 15.8.1947. It is likewise critical to
take note of that the Prime Minister tends to the country from this exceptionally
Red Fort on each fifteenth of August. the judgment of the trial Court and the
High Court convicting the accused and awarding death sentence for the offences
under Section 302, IPC.Also confirm all the other sentences on all other counts
and dismiss these appeals.21
Suggestion

An impartial body that acts as a dispute resolution body to deal with the
cyberspace disputes that take place between people from different countries. All
domestic cyber disputes should be tackled by the domestic courts of the various
countries in accordance with their own laws.An international monitoring or
regulatory body with some binding authority may be assigned the task of
analysing, etc. rules of cyber jurisdiction should be made that has binding
control over the countries.On a concluding note, the internet is big, vast,
complex and here to stay. Our traditional methods of legal systems have
miserably failed in front of technology. Instead of altering our current systems
and trying to find a method that is new, innovative and a kind where all have to
compromise a little so that the compromise can be used for a greater good of
justice and equity.

11. Conclusion
The virtual world is a set back to the customary standards; yet power and
different standards talked about above would not totally vanish. The
jurisdictional and decision of-law situations postured by the internet movement
can't be sufficiently settled by applying the "settled standards" and
"conventional lawful instruments" produced for the built up standards of law
and universal law are either not reacting to or are not ready to determine the
21
Mohd.Arif @ Ashfaq vs State Of Nct Of Delhi on 10 August, 2011 13 SCC 733.

1613
International Journal of Pure and Applied Mathematics Special Issue

issues postured by the internet. The internet is in a general sense not the same as
cyberspace. It is in a general sense distinctive in its tendency, control, degree
and effect. Web is new and isolate purview in which the principles and
directions of physical world don't have any significant bearing as it seems to be.
As indicated by a portion of the creators it is a consistent worldwide monetary
zone, borderless and unregulatable. globe needs to move from regional theory to
new legitimate reasoning known as worldwide transnationalism. The universal
law should act in such a route in order to determine the contention thinking
about the rights and interests of each influenced party. For that reason the
internet might be proclaimed as res additional commercial .To deal with this
domain, there should be a supra-national association under the control of UNO.
Foundation of such association under UNO would have different focal points,
for example, the State would get dealing power while taking decision the
mechanically capable nations won't have the capacity to utilize self-assertive
control over different countries; it would prompt harmonization of the standards
and frameworks, which would prompt neighbourly and speedier answers for the
contentions. At exhibit the utilization of guideline of co-task, comity, equity by
giving due respect to the universal obligations can be an answer for the issue of
ward postured by the internet.

References
[1] Burno De ., Padirac., The international dimensions of cyberspace
law ., published by Tata McGraw, Hill education ., on 2018 ., in
India.
[2] Dudley ., Investigating cyber law and cyber ethics ., published by
Universal law publishing ., on 2011., in UK.
[3] Henrik., Cyberspace and International law on jurisdiction
.,published by Kluwer Law International., on 2004 ., in Germany.
[4] Chang ., Tsun ., The emerging digital forensics applications for
crime detection., published by Kluwer Law International., on
2004., in China.
[5] Mariaro., Saria., Ethics and policies for cyber operations .,
published by Kluwer Law International., on 2008 ., in Sweden.
[6] Rolf.H., Weber.,Realizing a new global cyberspace framework .,
published by PHI Learning , Pvt ltd ., on 2011., in London.
[7] Broadhurst., Rod., cyber Crime., published by Universal law., on
2005.,in India.
[8] Miss Prevy., Prakekh ., cyberspace and jurisdiction ., published
by little brown on 1870.,in USA.
[9] T.S. Somashekhar., The Indian journal of law and Technology .,
published by law publishing house in 2000.

1614
International Journal of Pure and Applied Mathematics Special Issue

[10] Satyam Infoway Ltd vs Siffynet Solutions Pvt. Ltd on 6 May, 2004
AIR 2004 SC 3540.
[11] Md.Jamiluddin Nasir vs State Of West Bengal on 10 October,
2014 13 SCC 621.
[12] Shreya Singhal vs U.O.I on 24 March, 2015 AIR 2015 SC 1523.
[13] Mohd.Arif @ Ashfaq vs State Of Nct Of Delhi on 10 August, 2011
13 SCC 733.
[14] Motorola Solutions India Pvt. ... vs Assessee on 14 August, 2014
1652/Del/2014 A.Y.: 2002-03.
[15] Training on cyber law , cybercrime and investigation need of
awareness and requirements by Ray R. Venkatraman .
[16] Internet domain names and Trademark law by Ahmad Farooq.
[17] Cyber crime and law in India by Behra Abhimanyu .
[18] Liability of online intermediaries emerging trends by Fatima Talat.
[19] Jurisdiction over cross border wrongs on the Internet by Bigos,
Oren .
[20] http://www.forbes.com/sites/quora/2013/01/07/how-many-things-
are-currently-connected-to-the-internet-of-things-iot/ (last
accessed on 15th September 2013)
[21] http://en.wikipedia.org/wiki/Computer_crime (last accessed on
15th August 2013)
[22] http://cybercrime.planetindia.net/intro.htm (last accessed on 17th
August 2013)
[23] http://www.legalservicesindia.com/articles/cyber.htm (last
accessed on 15th August 2013)
[24] http://www.naavi.org/pati/pati_cybercrimes_dec03.htm (last
accessed on 20th August 2013)

1615
1616

You might also like