0% found this document useful (0 votes)
21 views

It Notes

Uploaded by

manvendraba2124
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

It Notes

Uploaded by

manvendraba2124
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 70

MODULE 1

Cyberspace and its Components

Cyberspace is the total interconnectedness of human beings through computers and


telecommunication without regard to physical geography. Cyberspace is a realm in which
communication and interaction between two individuals or between an individual and a
computer is facilitated by digital data exchanged over computer networks.
Cyberspace is a global and dynamic domain (subject to constant change) characterized by the
combined use of electrons and the electromagnetic spectrum, whose purpose is to create,
store, modify, exchange, share, and extract, use, eliminate information and disrupt physical
resources.
Cyberspace includes:
a) physical infrastructures and telecommunications devices that allow for the connection of
technological and communication system networks, understood in the broadest sense
(SCADA devices, smartphones/tablets, computers, servers, etc.);
b) computer systems and the related (sometimes embedded) software that guarantee the
domain's basic operational functioning and connectivity;
c) networks between computer systems;
d) networks of networks that connect computer systems (the distinction between networks
and networks of networks is mainly organizational);
e) the access nodes of users and intermediaries routing nodes;
f) constituent data (or resident data).
Often, in common parlance (and sometimes in commercial language), networks of networks
are called the Internet which can be considered a part of the system. A distinctive and
constitutive feature of cyberspace is that no central entity exercises control over all the
networks that make up this new domain. Just as in the real world there is no world
government, cyberspace lacks an institutionally predefined hierarchical center.
Cyberspace can be divided into a multi-layer model comprised of:
1. Physical foundations: such as land and submarine cables, and satellites that provide
communication pathways, along with routers that direct information to its destination.
2. Logical building blocks: including software such as smartphone apps, operating
systems, or web browsers, which allow the physical foundations to function and
communicate.
3. Information: that transits cyberspace, such as social media posts, texts, financial
transfers or video downloads. Before and after transit, this information is often stored on (and
modified by) computers and mobile devices, or public or private cloud storage services.
4. People: that manipulate information, communicate, and design the physical and logical
components of cyberspace

Need for regulation of cyberspace

1) The most visible and readily sensational concern is about the use of internet particularly
for the distribution of obscene, indecent and pornographic content. The use of internet
for child pornography and child sexual abuse and the relative ease with which the same
may be accessed calls for strict regulation.
2) The challenge that Cyberspace is posing to traditional notions of jurisdiction and
regulation is another factor. The increasing business transaction from tangible assets to
intangible assets like Intellectual Property has converted Cyberspace from being a mere info
space into important commercial space. The attempt to extend and then protect intellectual
property rights online will drive much of the regulatory agenda and produce many technical
methods of enforcement.
3) With the inventions of new technologies, the media has enhanced the possibility of
invasion of the privacy of individual and bringing it into the public domain. The major
area of concern where some sort of regulation is desirable is data protection and data privacy
so that industry, public administrators, netizens, and academics can have confidence as on-
line user.
4) Encryption is the process of converting a message or document into a form that hides the
content of the communication from the eyes of an eavesdropping third party and needs to be
decrypted if its content is to be read. New cryptographic techniques (cryptography is the
process used to encode/encrypt electronic information) are commonly cracked in a relatively
short time by computational force or by other analytical means. Therefore, another area in
which regulation has assumed importance is in the debate over whether the public
should be permitted to use ‘cryptography’ or not.
5) Internet has emerged as the ‘media of the people’ as the internet spreads fast there were
changes in the press environment that was centered on mass media. Unlike as in the
established press, there is no editor in the Internet. In the press and publication environment,
editors check the truthfulness of facts and circulate them once the artistic values are
confirmed. On the internet however, people themselves produce and circulate what they want
to say and this direct way of communication on internet has caused many social debates.
Therefore, the future of Cyberspace content demands the reconciliation of the two views of
freedom of expression and concern for community standard.

Personal Data and Right to be Forgotten

History of right to be forgotten


The ‘Right to be Forgotten’ has been originated in the western countries. Its history can be
traced back to the year 1995 when European Union (“EU”) enacted its first legislation on
personal data protection i.e. Directive 95/46/EC (“Directives”). Though the said right was not
expressly codified in the Directives but a combined reading of Article 6(1)(e) and Article
12(b) gave an inference of ‘Right to be Forgotten’. Article 6(1)(e) mandated member states
that personal data shall be “kept in a form which permits identification of data subjects for
no longer than is necessary for the purposes for which the data were collected or for which
they are further processed” while Article 12(b) gave data subject the right to rectify, erase or
block the processing of personal data if the same is not in line with the Directives. The bare
language of Article 12(b) is read as “Member States shall guarantee every data subject the
right to obtain from the controller as appropriate the rectification, erasure or blocking of
data the processing of which does not comply with the provisions of this Directive, in
particular because of the incomplete or inaccurate nature of the data”.
The foundation of the ‘Right to be Forgotten’ was laid down by the European Court of
Justice in the case of Google Spain SL v/s Agencia Española de Protección de Datos &
Mario Costeja Gonzalez3 (“Google Spain Case”). The dispute in the said case arose in the
year 2010 when Mr. Costeja Gonzalez lodged a complaint against a newspaper publisher and
Google with Spanish data protection agency. The case of Mr. Costeja Gonzalez was that
whenever an internet user enters his name on the Google search page, link of two pages of La
Vanguardia newspaper dated Jan. 19 and March 09, 1998 appears on the result page. These
pages contained personal information of Mr. Costeja Gonzalez relating to an attachment
proceeding for recovery of social security debt which was later resolved. In the complaint
made to the data protection agency, Mr. Gonzalez requested that La Vanguardia and Google
shall remove or take measures to conceal the personal data concerning him. In response, the
data protection agency rejected his compliant relating to La Vanguardia newspaper as the
information published was legally justified but upheld the complaint against Google as the
operators of search engines were subjected to the Directives. In an appeal by Google, the
European courts and the European Court of Justice held that the operators of search engines
fall under the definition of ‘controller’ as envisaged under Article 2(d) of the Directives.
Further, the courts also confirmed the individual’s ‘Right to be Forgotten’ if the
personal data concerning him/ her is no longer needed for which it was collected.
On May 25, 2018, the EU Commission’s new legislation on data protection i.e. GDPR came
into force which repealed the Directives. As per Article 3(2), the GDPR has an extra
territorial application which binds some companies not being established in EU but to comply
with its regulations. As opposed to the Directives, the GDPR expressly included a provision
relating to the ‘Right to be Forgotten’ under Article 17 which grants ‘data subject’ a right
against the ‘controller’ to get erased his personal data on grounds like personal data is no
longer necessary to store, unlawful processing of personal data, withdrawal of consent by
‘data subject’ etc.

Judicial precedents in India


Though the ‘Right to be Forgotten’ is not found under SPDI Rules but there are some judicial
precedents on same in India. The Gujarat High Court and the Karnataka High Court have
taken a different view on ‘Right to be Forgotten’. In Dharamraj Bhanushankar Dave v/s
State of Gujarat & Ors, the Gujarat High Court denied any such right. In this case, the
petitioner through a writ petition under Article 226 of the Constitution prayed before the
court for restricting the disclosure of a hon‘ble court’s judgment dated 30.10.2007 published
by the respondent on the internet. The case of the petitioner was that initially he was an
accused of offences like criminal conspiracy, murder etc. in a complaint filed before the
Jamnagar Police Station. Later on, the Sessions Court acquitted the petitioner and the same
was upheld by the Division Bench of Gujarat High Court vide judgment dated 30.10.2007.
Though the said judgment was non-reportable, the respondent published it on the internet
which is hampering the petitioner’s personal and professional life. Referring to its rules, the
Gujarat High Court held that copies of the judgment of High Court can be given to any party
by the order of Assistant Registrar. Further, the court also held that the petitioner has failed to
prove any violation of Article 21 of the Constitution8 and in such way the Gujarat High Court
did not recognize the ‘Right to be Forgotten’.
On contrary, the Karnataka High Court on Jan. 23, 2017 in the matter of Sri Vasunathan
v/s The Registrar General & Ors.,9 recognized the ‘Right to be Forgotten’. The prayer of
the petitioner was to direct respondent for removal of his daughter’s name from an order
dated 15.06.2015 in the digital records maintained by the respondent. The said order was in
line with an FIR filed by the petitioner’s daughter against a man for offences relating to
compelling her for marriage, forgery etc. and a civil suit for annulling the marriage certificate
as there was no legal marriage between them. Subsequently, the parties entered into a
settlement on a condition that the criminal case against the man shall be withdrawn by the
petitioner’s daughter. Pursuant to that, the man filed an application under Section 482 of
Code of Criminal Procedure, 1973 for quashing the said FIR and the Hon’ble High Court
vide order dated 15.06.2015 allowed the application. The said order recorded the petitioner’s
daughter as respondent no. 2 with her name and identity details. The petitioner contended
before the court that the name wise search on search engines like google, yahoo etc. may
reflect the order dated 15.06.2015 on the result page. Further, there is a high chance that the
said order may affect his daughter’s relationship with her husband as well as her reputation in
public domain. Considering the arguments of the petitioner and recognizing the principle of
‘Right to be Forgotten’, the Karnataka High Court directed respondent to take necessary steps
to mask the name of the petitioner’s daughter in the order dated 15.06.2015. However, such
request of the petitioner cannot be undertaken in case of a certified copy of the said order is
applied for. Justice Anand Byrareddy disposed of the petition by concluding that:
“This would be in line with the trend in the Western countries where they follow this as a
matter of rule “Right to be Forgotten” in sensitive cases involving women in general and
highly sensitive cases involving rape or affecting the modesty and reputation of the person
concerned.”
In a pending suit in the matter of Zulfiqar Ahman Khan v/s Quintillion Business Media Pvt.
Ltd. and Ors.,10 the Delhi High Court in an order dated 09.05.2019 recognized the plaintiff’s
‘Right to be Forgotten’. The issue arose when two articles dated 12.10.2018 and 31.10.2018,
containing harassment allegations against the plaintiff during the #MeToo campaign, were
published by the respondent. The court vide order dated 19.12.2018 directed respondent to
take down these articles from the internet as they might cause massive injury to the plaintiff.
The court also ordered that these articles would not be republished by any other person.
However, it was pointed out by the plaintiff that the content of the said articles have been
republished by another platform. Based on this grievance, the court ordered to restrain the re-
publication of the said articles during the pendency of the suit. The court also said that the
‘Right to be Forgotten’ and the ‘Right to be Left Alone’ are the inherent facets of ‘Right to
Privacy’.
‘Right to be forgotten’ under PDP bill
Though the ‘Right to be Forgotten’ is not a settled law in India but it has been
incorporated under the PDP Bill. Section 27 of the PDP Bill deals with ‘Right to be
Forgotten’ which gives ‘data principal’ a right to restrict the disclosure of his/ her
personal data by ‘data fiduciary’. The ‘data principal’ can exercise the ‘Right to be
Forgotten’ on the grounds if (a) his personal data has served the purpose for which it was
collected; or (b) he withdraws his consent for collecting his personal data; or (c) the
disclosure of his personal data is in violation of any existing legislation. For exercising the
said right the ‘data principal’ shall have to file an application form before the Adjudicating
Officer appointed under Section 68. The power to make rules, regarding the manner in which
the application is to be filed, vests with the Central Government.11
The ‘Right to be Forgotten’ under PDP Bill can only be exercised if the Adjudicating Officer
satisfies that the said right overrides the Right to Freedom of Speech & Expression and the
Right to Information of other citizens of India. The factors to be taken into account by the
Adjudicating Officer before making any such order are sensitivity of personal data, data
principal’s role in public sphere, relevance of personal data to general public etc. Further,
sub-section 5 of Section 27 gives right to any person to apply for review of order of the
Adjudicating Officer if it is no longer satisfying the grounds for exercising the ‘Right to be
Forgotten’.

Analysis of ‘Right to be Forgotten’ under PDP bill


The ‘Right to be Forgotten’ has been a debated topic since the MeitY issued the PDP Bill.
There are several issues that have been highlighted by the legal scholars and industrial
experts with the said right. The PDP Bill has been drafted on the verge of GDPR but the
meaning assigned to the ‘Right to be Forgotten’ under PDP Bill is different from that
contains under GDPR. Under GDPR a ‘data subject’ can ask for erasure of his/ her
personal data from the ‘controller’ on the grounds mentioned therein while such right is
restricted only to prevent the continuing disclosure of personal data under PDP Bill.
The ‘data principal’ under PDP Bill cannot enjoy the full removal of his/ her personal data
from the database of the ‘data fiduciary’ which seems to be in contrary to the jurisprudence of
the ‘Right to be Forgotten’ and Google Spain Case.
However, there is a mixed kind of opinion over deletion of personal data under ‘Right to be
Forgotten’. Justice Sanjay Kishan Kaul in the case of Justice K.S. Puttaswamy (Retd.) &
Anr. v/s Union of India & Ors., which is also known as ‘Right to Privacy Judgment’ said
that if India is to recognize ‘Right to be Forgotten’ on the verge of GDPR, it cannot be
an absolute right. Such right cannot be exercised if the personal data is needed for the
purpose of public interest, compliance with any legal obligation, national security,
scientific and historical research etc. These conditions are exceptions to the right to
privacy, including data privacy. Even the Data Protection Committee Report states that
removing the information available to the public at large would infringe the individual’s right
to know as well as freedom of press. Granting such absolute right may affect the public realm
of information if the information is totally removed. Such right may also involve the deletion
of information from private storage which might create a hurdle in publishing the information
later on. Therefore, there must be a distinction between the deletion of information and
restriction over disclosure of information and only the later one is possible to grant to an
individual.
Though the ‘Right to be Forgotten’ does not envisage the right to erasure of personal data but
Section 10 of PDP Bill puts an obligation on ‘data fiduciary’ to delete the personal data if
such data is no longer required to be stored. Section 10 talks about data storage limitation and
envisages that ‘data fiduciary’ shall only retain the personal data as long as it is necessary to
store or for such longer period as mandatory under any law. When the purpose of processing
such data is achieved then the ‘data fiduciary’ must delete the data. This provision clears the
stand of PDP Bill that the deletion of personal data is not a matter of right for ‘data principal’
but it’s an obligation on ‘data fiduciaries’.
Further, ‘controller’ governing under GDPR has an obligation to inform other ‘controllers’
about exercising of ‘Right to be Forgotten’ by ‘data subject’. Such obligation comes into
picture when the principal ‘controller’ makes the personal data public and other ‘controllers’
process the same. In that case, if the ‘data subject’ exercises the ‘Right to be Forgotten’ then
the principal ‘controller’ shall inform the other ‘controllers’, who are processing the personal
data of ‘data subject’, about deletion of any link, copy etc. of personal data.13 The same
obligation is not provided under the PDP Bill. Therefore, if one of the ‘controllers’ in the
above situation happens to be an Indian party, who is governed under both the GDPR and
PDP Bill, then such ‘controller’ may not be able to act upon the request of the other
‘controller’. This may affect the principle of cross border transfer of personal data under
GDPR and India may not be seen as a country having an adequate level of data protection by
European Commission under Article 45 of GDPR.
Another issue that has come up under the PDP Bill is that for exercising the ‘Right to be
Forgotten’ a ‘data principal’ has to file an application form before the Adjudicating Officer
which is not the same with the other rights available to ‘data principal’. This provision has
made the process of exercising the ‘Right to be Forgotten’ as lengthy and time consuming.
Even in the GDPR, the ‘data subject’ can exercise the said right by simply asking the
‘controller’ to erase or remove his/ her personal data and when the ‘controller’ refuses then
the ‘data subject’ can approach the ‘supervisory authority’14. Further, this provision has also
created confusion over the ownership of personal data as the final decision with respect to
exercising of ‘Right to be Forgotten’ remains with Adjudicating Officer.
Talking about the ownership over personal data, Section 27 under PDP Bill also gives right to
a third party to apply before the Adjudicating Officer for reviewing his order granting ‘Right
to be Forgotten’. Any person, who thinks that such order is not satisfying with the conditions
mentioned under Section 27(1), may ask the Adjudicating Officer to review his order. This
provision has also created a buzz among the individuals and the industry over the unanswered
question i.e. who owns the personal data? On July 16, 2018, the Telecom Regulatory
Authority of India released a recommendation paper on “Privacy, Security and Ownership of
the Data in the Telecom Sector” whereby it recommended that the ownership of the data or
personal information shall vest with its user and the entities controlling or processing such
information are merely guardians.15 Despite these recommendations, the PDP Bill does not
talk about the ownership over personal data.
Further, Section 28(2) of PDP Bill empowers ‘data fiduciary’ to charge a reasonable fee
when any ‘data principal’ exercises the rights granted to him under the PDP Bill. However,
the PDP Bill does not talk about the criteria for determining such fee. Such an exclusive
authority to the ‘data fiduciary’ may end up in misusing the provision of this section and
charging the high fee from the ‘data principal’. Therefore, there is a need to specify the
criteria for determining fee under this sub-section and hopefully the final draft of Personal
Data Protection Bill may address this issue.
The UNICITRAL Model Law on Electronic Commerce

The Model Law was prepared in response to a major change in the means by which
communications are made between parties using computerized or other modem
techniques in doing business (sometimes referred to as trading partners). India moved
swiftly and promptly in this direction and the Indian Parliament passed the Information
Technology Act, 2000 on the pattern of the Model Law on Electronic Commerce
(UNCITRAL) adopted by the UN committee on International Trade Law and it came in
force on October 17, 2000.
The Model Law is aim to facilitate Electronic Commerce by providing internationally
acceptable rules and legal principles that may be used by the States in enacting legislation to
remove legal uncertainties arising from the application of paper-based rules and regulations
in the electronic environment.
The term ‘Electronic Commerce' itself has not been defined anywhere in the modal law.
Instead, the term 'Electronic Data Interchange’ (hereinafter referred to as EDI) has been
defined in art 2(b) as follows:(b) 'Electronic Data Interchange (EDI)' means electronic
transfer from the computer to computer of information using an agreed standard to
Structure the formation.
UNCITRAL Model Law on Electronic Commerce defines electronic data interchange (EDI)
as the electronic transfer from the computer to computer of information using an agreed
standard to structure the information. Businesses accept that EDI facilitates trade and offers
enormous commercial benefits. Among other things, EDI saves time and money by reducing
or eliminating expenditure on costs, postage and storage requirement.

1. The Principles of Non-Discrimination


Article 5 of the UNCITRAL Modal Law on Electronic Commerce indicates that
information would not be denied validity on the sole ground that such
information is presented or retained in an electronic form. Article 5 of the
UNCITRAL Modal Law on Electronic Commerce contains the fundamental principle
that the data messages should not be discriminated against, i.e., that there should be
no disparity of treatment between data messages and paper documents.

2. The Principles of The Functional Equivalence


The Model Law relies on the ‘functional equivalent approach’ which is based on the
analysis of purposes and functions of the traditional paper-based requirement with a
view to determine how those purposes or functions could have fulfilled through
Electronic Commerce Techniques. For example, the paper document served main
function as the following: to provide that the document would be legible by all; to
provide that the document would remain unaltered over time; to allow for
reproduction of a document so that each party would hold a copy of the same data; to
permit authentication of data by means of a signature; and to provide that the
document would be in a form acceptable to public authorities and courts. It is be noted
that in respect of all of the above mentioned functions of paper, electronic records
may provide the same level of security as paper and in some cases, a much
higher degree of reliability and speed, especially in the respect to the
identification of source and content of the data, provided that a number of the
technical and legal requirements should be met.

3. The Principles of The Technological Neutrality


The Model Law provides essential procedures and principles to facilitate the use
of modern techniques for recording and communicating information in several
types of circumstances. The Model Law covers every aspect of the use of Electronic
Commerce. Accordingly, an enacting State can wish to issue regulations to fill in the
procedural details for procedures authorized by the Model Law and to take account of
the specific, possibly changing, circumstances at play in enacting State, without
compromising objectives of the Model Law

Net Neutrality
Net neutrality is the principle that all internet traffic should be treated equally, without
discrimination or preference given to any particular website, service, or application. Net
neutrality ensures that everyone has equal access to information and services on the
internet, regardless of their financial resources or the size and power of the websites
they use. It is an important principle that helps to ensure a level playing field on the internet,
and to protect the free flow of information and ideas. Without net neutrality, Internet Service
Providers could potentially use their market power to steer users towards certain websites and
services, or to limit access to others.

Originality of Data Message


The word 'original' is commonly thought of as referring to the medium on which information
was fixed for the first time. Article 8 is regarded as stating the minimum acceptable form
requirement to be met by the data message for it to be considered the functional
equivalent of an original. The provisions of Article 8 should be considered as mandatory, to
the same extent that existing provisions concerning the use of paper-based original
documents would be regarded as mandatory. The indication that the form requirements stated
in Article 8 are to be considered as the ‘minimum acceptable’ should not, however, be
construed as inviting States to establish requirements stricter than those contained in the
Model Law.
Article 8
(1) Where the law requires information to be presented or retained in its original form, that
requirement is met by a data message if:
(a) There exists a reliable assurance as to the integrity of the information from the time
when it was first generated in its final form, as a data message or otherwise;
Article 8(3)(a), by making referring to additions to the original data message refers to
computer-generated text automatically appended to text messages, digital signatures and
other forms of certification that may not be part of the message as originally drafted. This
clause makes it clear that so long as the additions do not alter the original text, the fact that
additions have been made, would not affect the originality of the message.
Formation and Validity of Electronic Contracts
Section 11:- (l) In the context of contract formation, unless otherwise agreed by the parties,
an offer and the acceptance of an offer may be expressed by means of data messages. Where
a data message is used in the formation of a contract, that contract shall not be denied
validity or enforceability on the sole ground that a data message was used for that purpose.
This clause allows the parties to the contract to choose whether or not they want to conclude
contracts electronically.

Attribution of Data Messages


In the context of contract formation, the appropriate and accurate attribution of the data
message is important for both parties.
Article 13. Attribution of data messages.
(1) A data message is that of the originator if it was sent by the originator itself.
(2) As between the originator and the addressee, a data message is deemed to be that of the
originator if it was sent:
a) By a person who had the authority to act on behalf of the originator in respect of
that data message; or
b) By an information system programmed by, or on behalf of, the originator to operate
automatically.
(3) As between the originator and the addressee, an addressee is entitled to regard a data
message as being that of the originator, and to act on that assumption, if:
(a) In order to ascertain whether the data message was that of the originator, the
addressee properly applied a procedure previously agreed to by the originator for
that purpose; or
(b) The data message as received by the addressee resulted from the actions of a person
whose relationship with the originator or with any agent of the originator enabled
that person to gain access to a method used by the originator to identify data
messages as its own.
(4) Paragraph (3) does not apply:
(a) as of the time when the addressee has both received notice from the originator
that the data message is not that of the originator, and had reasonable time to
act accordingly; or
(b) in a case within paragraph (3)(b), at any time when the addressee knew or should
have known, had it exercised reasonable care or used any agreed procedure, that
the data message was not that of the originator.
(5) Where a data message is that of the originator or is deemed to be that of the originator,
or the addressee is entitled to act on that assumption, then, as between the originator and
the addressee, the addressee is entitled to regard the data message as received as being
what the originator intended to send, and to act on that assumption. The addressee is not so
entitled when it knew or should have known, had it exercised reasonable care or used any
agreed procedure, that the transmission resulted in any error in the data message as
received.
(6) The addressee is entitled to regard each data message received as a separate data
message and to act on that assumption, except to the extent that it duplicates another data
message and the addressee knew or should have known, had it exercised reasonable care or
used any agreed procedure that the data message was a duplicate.
Clause 3 of this Article relates to circumstances under which the addressee may deem the
message to have been sent by the originator. Under the model law, so long as the originator
of the message agreed to authenticate a message using a given authentication method, the
message will be deemed to have been sent by the originator, if the receiver can verify that it
has been sent, by using that authentication method. The authentication method referred to in
this clause may be the use of digital signatures, dual key encryption or even a simple
password authentication system that is known only to the two parties. The addressee would
be entitled to act on the assumption that the data message was sent by the person who
purports to have sent it, unless the sender issues the receiver a notice to the contrary.

Time and Place of Dispatch and Receipt of the Data Messages


The internet knows no geographical boundaries, it is important that the question of how one
would determine 'place' in the context of electronic transactions, has added significance.
Article 15. Time and place of dispatch and receipt of data messages.
(1) Unless otherwise agreed between the originator and the addressee, the dispatch of a data
message occurs when it enters an information system outside the control of the originator
or of the person who sent the data message on behalf of the originator.
(2) Unless otherwise agreed between the originator and the addressee, the time of receipt of
a data message is determined as follows:
(a) If the addressee has designated an information system for the purpose of receiving
data messages receipt occurs:
i. At the time when the data message enters the designated information
system; or
ii. If the data message is sent to an information system of the addressee that is
not the designated information system, at the time when the data message is
retrieved by the addressee;
(b) If the addressee has not designated an information system, receipt occurs when the
data-message enters an information system of the addressee.
(3) Paragraph (2) applies notwithstanding that the place where the information system is
located may be different from the place where the data message is deemed to be received
under paragraph (4).
(4) Unless otherwise agreed between the originator and the addressee, a data message is
deemed to be dispatched at the place where the originator has its place of business, and is
deemed to be received at the place where the addressee has its place of business. For the
purposes of this paragraph:
(a) If the originator or the addressee has more than one place of business, the place of
business is that which has the closest relationship to the underlying transaction or
where there is no underlying transaction, the principal place of business;
(b) If the originator or the addressee does not have a place of business, reference is to be
made to its habitual residence.
Sub-clause 1 of Article 15 states that the time of dispatch of a data message is the time when
the data message enters in the information system outside the control of the person sending
the message. This could be interpreted to mean the message would be deemed to have been
dispatched once it enters either the information system of an intermediary (or several
intermediaries), or the information system of the addressee.
The concept of ‘dispatch’ refers to the commencement of the electronic transmission of the
data message. Where ‘dispatch’ already has an established meaning. If dispatch causes when
the data message reaches an information system of the addressee, dispatch under paragraph
(1) and receipt under paragraph (2) are simultaneous, except where the data message is sent
to an information system of the addressee that is not the information system designated by the
addressee under paragraph (2)(a).

Computer, Computer system:- Definition

Section 2 (i) "computer" means any electronic magnetic, optical or other high-speed data
processing device or system which performs logical, arithmetic, and memory functions by
manipulations of electronic, magnetic or optical impulses, and includes all input, output,
processing, storage, computer software, or communication facilities which are connected or
related to the computer in a computer system or computer network;
Section 2(j) "computer network" means the interconnection of one or more computers
through— (i) the use of satellite, microwave, terrestrial line or other communication media;
and (ii) terminals or a complex consisting of two or more interconnected computers or
communication device whether or not the interconnection is continuously maintained;
Section 2(l) "computer system" means a device or collection of devices, including input and
output support devices and excluding calculators which are not programmable and capable
of being used in conjunction with external files, which contain computer programmes,
electronic instructions, input data and output data, that performs logic, arithmetic, data
storage and retrieval, communication control and other functions
Section 2(k) "computer resource" means computer, computer system, computer network,
data, computer data base or software;

Diebold Assistance vs CIT

• Background
An important question as to whether an Automated Teller Machines (ATM) can be termed as
a computer came up before the courts in this case. In the state of Karnataka under state tax
law, electronic goods were taxed at rate of 12% while computer terminals were taxed at 4%.
The question was at what rate an ATM will be taxed and under what schedule of the
state tax law will it fall. Whether an ATM is an electronic good or a computer terminal
was needed to be clarified by the court so as to decide what will be the tax that Diebold
Systems will be liable to pay?
• Facts
This case came up before the Karnataka High Court as an appeal. The appellants in this case,
which is Diebold Pvt Ltd is a company engaged in the manufacture and supply of Automated
teller machines (ATM). The Company in order to clarify the rate of tax that is applicable on
the sale of ATM approached the Advance Ruling Authority which was constituted under the
Karnataka Sales Tax Act, 1957. Diebold Systems filed an application in Form 54 as provided
under Rule 27-E (1) of the Karnataka Sales Tax Rules, 1957. As a result, the company had
appeared before the authority and made had their submissions as to the facts, literature, and
description of the ATM. Appearing for the company was Sri Mohan Mudkavi the learned
Chartered Accountant along with the Vice-President of the Company.
The judgment of the Advance Ruling Authority
The majority view of the ARA was to classify ATMs as "computer terminals" liable for 4%
basic tax as they would fall under Entry 20(ii)(b) of Part 'C' of Second Schedule to the
Karnataka Sales Tax Act. However, The Chairman of the ARA dissented from the majority
view. In his opinion, ATMs would fit into the description of electronic goods, parts, and
accessories thereof. They would thus attract the basic rate of tax of 12% and would fall under
Entry 4 of Part 'E' of the Second Schedule to the KST Act.
• Order by Commissioner of Commercial Tax
The Commissioner of Commercial Taxes being of the view, that the authority for clarification
and Advance Ruling has erroneously classified ATM's as "computer terminals" and thereby
has caused prejudice to the interest of the revenue, therefore it initiated suo-moto revisional
proceedings under Section 22-A(1) of the Act by issuing a show-cause notice directing the
appellant company Diebold Systems to show cause, why the order passed by the Authority
for clarification and Advance Ruling should not be set aside and the 'goods' in question
should not be treated as "electronic goods". The Commissioner of Commercial Taxes, after
considering the reply filed by the appellant company passed an order that ATMs cannot be
classified as computer terminals. Aggrieved by the aforesaid order passed by
the Commissioner of Commercial Taxes, the appellant company is before the High Court in
this appeal filed under Section 24(1) of the KST Act.
• Issue before the court
Is ATM a computer and whether it would fall under Entry 20(i) of Part 'C of Second
Schedule to the Act?
• Submissions before the High Court
The main submission before the authority by Diebold systems was that ATM is a
combination of a computer and it runs on a processor and the purpose for which it is put to
use is to dispense with cash to people and therefore, had requested the Authority to classify
ATM's as goods falling under Entry 20 of Part 'C' of the Second Schedule to the Act which
consists of a list of entries with main head Computers of all kinds and peripherals and not
Electronic goods falling under Entry 4 of Part 'E' of Second Schedule to the Act.
While the contention of Commissioner of Commercial Tax was that an ATM is not a
computer by itself. It is connected to a computer that performs the tasks requested by the
person using the ATM. The computer is connected electronically to many ATM's that may be
located some distance from the computer.
• Judgement
ATM is the acronym for Automated Teller Machine. this machine has a data terminal with
two inputs and four output devices. The ATM connects to and communicates with a host
processor that is analogous to an Internet Service provider. Then as a way of supporting the
Machine to the host processor, dial-up or leased lines are used. With the dial-up, the Machine
would dial into the host processor, using a standard telephone line and modem. With the
leased line. The machine is connected through the host processor through what is called a
four-wire, point to point, dedicated telephone line. The ATM does not have many parts; there
is a card reader, which is what captures a person's account information that is stored on the
magnetic strip located on the back of the ATM/debit card. This information is actually used
by the host processor in routing the transaction to the appropriate bank. Then it has a
'Keypad', which is used by the cardholder to tell the machine what type of transaction is
needed. It has an 'electric eye' that is used for the cash dispensing mechanism. In addition to
the eye, the ATM has a 'sensor that is capable of evaluating the thickness of each of the bills
being dispensed.
Coming to the Karnataka Sales Tax Act, it is clear that the Act is a taxing statute and the
Schedule to an Act is very much part of fiscal enactment. It is enacted by the hand of the
Legislature. The Schedule in an Act sets down things and objects and contains their names
and descriptions. The expressions in the Schedule have no evocative function. They can
neither enlarge nor cut down the meanings or articles or things specifically named in the
list. Therefore, the enlarged definition of "computers" in the Information Technology Act
cannot be made use of interpreting an Entry under fiscal legislation.
An Automatic Teller Machine is an electronic device, which allows a bank's customer to
make cash withdrawals and check their account balances at any time without the need
of human teller. ATM is not a computer by itself and it is connected to a computer that
performs the tasks requested by the person using ATMs. The computer is connected
electronically to many ATM's that may be located from some distance from the computer. As
a result, the appeal fails, and accordingly, it is rejected.

Legal Perspective of E-Governance

There is no dedicated legislation, particularly and solely, to the field of electronic governance
in our country. Although, some of the existing laws in India do apply to electronic
governance which have been talked about briefly below.

RIGHT TO INFORMATION ACT, 2005


Indian RTI Act is similar to the Canadian Law. In India, unlike UK and US laws, RTI Act
provides citizens with the direct access to the Central Information Commission in case the
information is denied to the citizens by any department of the government. Such access
avoids delays in the procedures to grant the citizens their basic right to information and to go
through the hardships of the courts to enforce their basic rights.
RTI Act ensures transparency in the functioning of the government by placing an obligation
on the government at all the levels and it’s department to provide the common man with the
information about the policies, rules and regulations passed by them. The act also provides
for the penalties, in case, the government fails to provide the citizens with the appropriate
information, timely and in a proper manner.
To help the government provide the citizens with the information, Department of
Information Technology is spreading the use of technology through the system of
electronic governance and website to display all the information for easy access of the
citizens.
For the Act to be more effective, there need to be better information flow among people at the
village level who are unaware of their rights because that’s where the grassroot issue lies and
efforts are lacking. Government needs to set up NGO to create awareness at the level where
it’s needed the most. But still the RTI Act doesn’t totally take up the responsibility of its
proper implementation due to lack of enforceability procedures which needs to be taken care
of by the government of the country.

INFORMATION TECHNOLOGY ACT, 2000


India is a country to have legal framework for all the ‘e’ (electronic) promulgated as the IT
Act, 2000. The Act, also, effected the consequential amendments in the Indian Penal Code,
The Evidence Act, 1872, and The RBI Act, 1934, bringing all of them in line as per the
requirements of the digital transactions.
Ever gave a thought, what if all the data that is being provided by the citizens to the
government gets leak or is used for some other purpose? Such issues are dealt by the IT Act
so as to not shaken the trust and confidentiality that a common person places in the
government.
1) Legal Recognition of Electronic Records
Under Section 4, electronic records are treated at par with the written, typewritten, or
printed records and the only necessary condition is that such electronic records must be
available for subsequent or future reference. The term “electronic form” used in this
section has been defined under Section 2 (1) (r) of the IT Act as “any information generated,
sent, received or stored in media, magnetic, optical, computer memory, microfilm, computer
generated micro fiche or similar device.”
2) Legal Recognition of Electronic Signatures
Section 5 legalizes and makes electronic/digital signatures equivalent to handwritten or
manual signatures for authentication of any required record. How the affixation of such
electronic or digital signature is to be prescribed by the Central Government. What is to be
considered as an electronic signature has been dealt with under Section 3A. According to
Section 3(2), the authentication of electronic records can take place with the help of an
“asymmetric cryptosystem and hash system which envelope and transform the initial
electronic record into another electronic record.”
3) Use of Electronic Records and Electronic Signatures in Government and its Agencies
Section 6 of this Act calls for the decentralization of e-governance as it grants legal mandate
to the appropriate government. It recognizes the application of electronic or digital
signature in the filing of any form, application, or document under appropriate
government, for issuance, approval, or sanction of license and payment and receipt of
money ( if the given action is done through electronic means ). The appropriate
government is assigned with the authority to frame rules in order to decide the manner in
which such electronic records will be filed and the method of the payment of fee or fee
charges for filing of any electronic record. The basic aim of this section is to prevent red-
tapism and promote the use of electronic records and digital signatures in government and its
agencies.
Some of the e-governance applications using digital signatures are:
• Income tax e-filing.
• Indian Railway Catering and Tourism Corporation (IRCTC)
• Director-General of Foreign Trade (DGFT).
• RBI Applications (SFMS: Structured Financial Messaging System).
4) Delivery of Services by Service Provider
Section 6A of the IT Act is a distinctive section of this chapter as it allows private
participation in the delivery of e-government services with an aim to facilitate efficient
delivery of services through electronic means and enable such service providers to set-
up, maintain, upgrade the computerized facilities belonging to the government.
Service provider can be:
i. Individual
ii. Private agency
iii. Private company
iv. Partnership firm
v. Sole proprietor firm
vi. Any other body or agency permitted by the government to provide these services
through electronic means.
The government in order to enable private participation in e-governance has been issuing e-
procurement tenders with defined Scope of Work (SoW) and the service providers are
required to do their given work on the basis of:
i. BOO (Build-Own-Operate) Model
ii. BOOT (Build-Own-Operate-Transfer) Model
iii. ASP (Application Service Provider).
The appropriate government may also allow the service providers to collect, retain and
appropriate service charges from the concerned person utilizing those services and the scale
of the service charges charged and collected will be specified by the appropriate Government
by notification in the Official Gazette.
5) Retention of Electronic Records
Section 7 lays down certain conditions for the retention of electronic records which are as
follows:
i. Their information stored by means of the electronic form must be accessible for
future reference.
ii. The electronic record must be retained in the format in which it was originally
generated, sent, or received or in a format that accurately demonstrated the
information originally generated, sent, or received.
iii. The details of origin, destination, date, and time of despatch or receipt of such
electronic record must be contained in the electronic record.
This section does not apply to information that is automatically generated to record the
dispatch or receipt of electronic record.
Under this section, a huge responsibility is brought upon the government and its agencies in
fulfilling the necessary conditions for the retention of the electronic record and thus to ensure
and sustain effective governance.
States like Maharashtra, Chattisgarh already have their electronic record retention policies in
place. The Central Government has also introduced the Digilocker System with a digital
locker account for every Indian resident to store and retain all necessary electronic records in
one place for subsequent use.
6) Audit of Documents, etc. maintained in Electronic Form
According to Section 7A, if there is a provision for audit of documents, records, or
information, then the provision of audit will equally be applicable for such electronic
records or electronic counterparts. Thus, making auditing of such electronic records
compulsory. The audit period will be decided according to the law which is in force in
respect of a particular subject matter. For example the Income Tax Act, 1961 requires the
audit of documents or any similar records on an annual or semi-annual, or quarterly basis.
7) Publication of rules, regulations, etc. in Electronic Gazette
According to Section 8, where any law requires any rule, regulation, order, bye-law,
notification to be published in the Official Gazette, then the publication of such rule,
regulation, order, bye-law, notification in the Electronic Gazette will also be considered
legal and valid. This section makes Electronic Gazette functionally equivalent to Official
Gazette for the public of rules and regulation. The date of publication of any rule or
regulation would be the date in which it was first published in either form – official or
electronic.
In Orissa Consumer Association v. Orissa Electricity Regulatory Commission, it was held
that “ if a notification is published in the Electronic Gazette, the notification is deemed to
have been published in the Official Gazette. The proviso to Section 8 of the Act also makes it
clear that where the notification is published both in the Official Gazette and the Electronic
Gazette, the date of publication shall be deemed to be the date of Gazette which was first
published in any form.”
8) Section 6, 7, and 8 not to confer the right to insist document should be accepted in
electronic form
Section 9 of this Act highlights limitations of e-governance and rightfully points out that
no individual can insist the Central or State Government and its agencies to carry out
its monetary transactions in electronic form or to issue or accept documents in electronic
form as it depends upon the capability of the government to carry out its functions using
Information and Technology.
9) Power to make Rules by Central Government in respect of Electronic Signature
According to Section 10, the Central Government is entrusted with the sole authority to make
rules in respect of:
i. The type of electronic signature.
(a) The manner and format in which the electronic signature shall be affixed.
ii. The manner and procedure of establishing the identity of the person
affixing electronic signature.
iii. Control processes and procedures to ensure that sufficient integrity,
security, and confidentiality of the electronic records or electronic payments
are maintained.
iv. Any other matter necessary for the legality of electronic signatures.
10) Validity of Contracts formed through Electronic Means
Section 10A of this Act makes no distinction between contracts through physical
communication or contracts through electronic means as it gives legal recognition to all
contracts where there is communication of proposals, the acceptance of proposals, the
revocation of proposals etc. The contract does not stand unenforceable merely on the ground
that it was initiated through electronic means or with the help of electronic records.

Safe Harbour

The “safe harbour” provision in the Information Technology (IT) Act refers to legal
protection for Internet service providers (ISPs) and other intermediaries that host or transmit
third-party content online.
Under Section 79 of the IT Act, ISPs and other intermediaries are not held responsible for
any third-party content that they host or transmit on behalf of others, as long as they comply
with certain conditions. These conditions include:
• They must not initiate the transmission of the content
• They must not select or modify the content
• They must observe due diligence in the operation of their services
• They must remove or disable access to the content upon receiving actual knowledge
or notification of the content’s illegality
The safe harbour provision is intended to encourage the growth of the Internet and e-
commerce by providing legal certainty for intermediaries that enable the flow of information
and services online, while still holding them accountable for illegal content if they have
actual knowledge of it.
Need for reconsidering safe harbour
• The Information Technology Act of 2000 currently serves as the main regulatory
framework for online businesses. The law must be updated, though, as it was created
for a time when the Internet was substantially different from what it is today. The
government has occasionally found it challenging to enact regulations because of the
parent Act’s restrictions due to its narrow scope.
• The new Digital India Bill’s main goals are to speed up the development of
technological innovation and provide an open and secure Internet in the nation in
order to protect users’ rights and lower their online risks. The proposed Digital
Personal Data Protection Bill, 2022, the Indian Telecommunication Bill, 2022, and a
policy for non-personal data governance are all components of a larger framework of
technological rules that the centre is constructing.
• Need for balancing fundamental rights (freedom of speech and expression) with the
dignity of the individual and misinformation.
• The emergence of different types of intermediaries like e-commerce, digital media,
search engines, gaming platforms, significant social media intermediaries, fact-
checking portals, etc.
MODULE 2

E-Contract

The Information Technology Act, 2000 has introduced certain statutory conditions pertaining
to methodology of contracts formed electronically using computer, computer system or
computer network.

➢ What Is E-Contract?
An E-contract (that are not paper-based rather they are electronic-based) is a kind of
contract formed in the course of e-commerce by the exchange of two parties using
electronic means, such as e-mail, telephones, faxes. The interaction of an individual should
happen with an electronic agent, such as a computer program, website forms like telephonic
discussions, or an exchange of at least two electronic agents that are organized to allow the
existence of a contract. An E-contract is a contract shaped, specific, executed, and expand by
a software system.
The 2 main parties to an e-contract are:
1. The Originator
An Originator, as per the IT Act, 2008, states that it is a person who sends, generates, stores,
or transmits any electronic message to be sent, generated, stored, or transmitted to some other
person, and does not, include any Intermediary.
2. The Addressee
An Addressee, as per the IT Act, 2008, states that it is a person who is intended by the
originator to receive the electronic record, but does not, include any Intermediary.

➢ The Subject Matter

• Physical goods, where goods are ordered on an online platform and payment is made via
the internet, and delivery is made physically. For example, Amazon or Flipkart.
• Digital products like software can be ordered.
• Services like electronic banking, financial advice, etc are also subject matters.

➢ Understanding Communication Process

For a contract to happen there should be a communication of proposal and communication of


acceptance as well. The postal rule lays emphasis on both communication of proposal and
communication of acceptance. A contract comes into existence when the acceptor puts his
acceptance/accent into transmission so as to be out of the power of the said acceptor. Contract
through post/correspondence is complete at the place where acceptance is made. The contract
is concluded when the letter of acceptance is posted.
A similar view was expressed by the Supreme Court in Bhagwandas Goverdhandas Kedia v.
Girdharilal Parshottamdas and Co. In this case the plaintiffs commenced an action in the City
Civil Court at Ahmedabad against the Kedia Ginning Factory & Oil Mills of Khamgaon
[defendants] for a decree of Rs. 31,150 on a plea that the defendant had failed to supply
cotton seed cake, which they had agreed to supply under an oral contract dated July 22,
1959 negotiated between the parties by conversation on long distance telephone.
The plaintiffs submitted that the cause of action for the suit arose at Ahmedabad, because the
defendants had offered to sell cotton seed cake, which offer was accepted by the plaintiffs at
Ahmedabad.
The decision by majority view was that telephone is an instantaneous mode of
communication, just as if the parties were in presence of each other. The exception to the
general rule, as applied to post, would not apply here. So, in this case, the contract would
be made at the place where acceptance is received, ie., Ahmedabad.

It is clear from the aforesaid judgments that the courts have reinterpreted the contractual
obligations of the offeror/acceptor by evaluating the technological applications. It is an
established law that the contract is complete only when the acceptance is received by the
offeror and the contract is made at the place where the acceptance is received
(instantaneous communication rule). Mere mechanical application of either postal rule' or
'instantaneous communication rule without taking into accounts the facts and circumstances
would be fallacious).
In WWE v. Reshma Collection, the Delhi High Court has decided the issue of territorial
jurisdiction on the basis of the instantaneous communication rule. One should not
forget that the difference between "postal" and "instantaneous" is the speed of
communication
In Trimex International FZE Ltd. v. Vedanta Aluminium Ltd. India, the Supreme
Court has held that in the absence of signed agreement between the parties, it would be
possible to infer from various documents duly approved and signed by the parties in the
form of exchange of e-mails, letter, telex, telegrams and other means of
telecommunications
The Information Technology Act, 2000 has not amended or substituted the Indian Contract
Act, 1872 in any manner whatsoever.

➢ E-contracts under Information Technology Act, 2000

1) Section 4
“Section 4: Legal recognition of electronic records: Where any law provides that
information or any other matter shall be in writing or in the typewritten or printed
form, then, notwithstanding anything contained in such law, such requirement shall
be deemed to have been satisfied if such information or matter is-
o rendered or made available in an electronic form; and
o accessible so as to be usable for a subsequent reference.”
Electronic contracts (E-Contracts) and are legal in India and are governed by the
Information Technology Act of 2000. (IT Act). The necessity for any information or
matter to be in writing, typewritten, or printed form under any legislation shall be deemed
satisfied if such information or matter is in an electronic form and is accessible so that it
can be used for future reference, according to Section 4 of the IT Act. Section 4 of the
Information Technology Act reads as:

2) Section 10A
“Section 10A: Validity of contracts formed through electronic means- Where in a
contract formation, the communication of proposals, the acceptance of proposals, the
revocation of proposals and acceptances, as the case may be, are expressed in electric
form or by means of an electronic record, such contract shall not be deemed to be
unenforceable solely on the ground that such electronic form or means was used for that
purpose.”

Proposals and acceptances may also be sent, accepted, and withdrawn electronically or
through electronic records, according to Section 10A of the IT Act.

3) Section 11
Attribution of electronic records.—An electronic record shall be attributed to the
originator—
(a) if it was sent by the originator himself;
(b) by a person who had the authority to act on behalf of the originator in respect of that
electronic record; or
(c) by an information system programmed by or on behalf of the originator to operate
automatically.

4) Section 12
Acknowledgment of receipt.—(1) Where the originator has not 3[stipulated] that the
acknowledgment of receipt of electronic record be given in a particular form or by a
particular method, an acknowledgment may be given by—
(a) any communication by the addressee, automated or otherwise; or
(b) any conduct of the addressee, sufficient to indicate to the originator that the electronic
record has been received.

An acknowledgment may be given either by any communication by the addressee,


automated or otherwise or any conduct of the addressee sufficient to indicate to the
originator that the electronic record has been received.

5) Section 13
Time and place of despatch and receipt of electronic record.—(1) Save as otherwise
agreed to between the originator and the addressee, the despatch of an electronic record
occurs when it enters a computer resource outside the control of the originator.
The dispatch of an electronic record occurs when it enters a computer resource outside the
control of the originator.

In light of the aforementioned provisions of the IT Act, Indian courts have upheld the validity
of contracts made in an electronic format on a number of occasions.

Trimex International FZE Ltd. Dubai vs. Vedanta Aluminium Ltd


(Where the parties had communicated their offer and acceptance via email in the absence of
signed documents that once a contract is concluded orally or in writing, the fact that a formal
contract must be prepared and initialled by the parties would not affect the contract.)
Facts
Trimex offered, via an email, the supply of bauxite to VAL which, after several exchanges of
e-mails, was subsequently accepted by latter, confirming the supply of 5 shipments of bauxite
from Australia to India. Though a draft contract had also been prepared but it yet needed to
be formalised. After VAL received first consignments of goods, it requested Trimex to hold
back next consignment of goods so as to enable them to check bauxite’s utility value.
However, on same day, ship owners nominated the ship for loading the cargo. Later when
contract was cancelled by Trimex, it claimed damages paid to ship owners from VAL which
latter refused by denying any contract.
Issues
Whether there was any valid subsisting contract between the parties in absence of any formal
contract?
Judgment
Once the contract is concluded orally or in writing, the mere fact that a formal contract
has not been prepared by the parties does not affect either the acceptance of the
contract so entered into or implementation thereof.
The SC held that all essential ingredients required for enforcing these kinds of shipment
contracts were decided by parties including price, quantity, product specifications, delivery
and payment terms, discharge port, shipment lots, demurrage rate, quality benchmark,
applicable arbitration laws, etc. Further, minute to minute correspondences exchanged b/w
the parties clearly show that both the parties were clearly aware of the various terms of the
contract and were ad idem.

Jurisdiction of E-Contracts

Jurisdiction is an extent of the power of the court to hear a case i.e., to take cognizance of the
case and to make legal decisions and judgements. It is the legal authority of the court to
resolve the dispute. E-contract involves instant communication of offer and acceptance.
Wherein the contract is complete at the end of originator where acceptance is received.
The Supreme Court of India in case of Bhagwandas Goverdhandas Kedia vs. Girdhari Lal
Parshottamdas & Co held that “at the place of proposer where the acceptance is received shall
have the jurisdiction for enforcement of contracts entered into by means of computer
internet.”
In India, the Code of Civil Procedure, 1908 provides the manner of determining the
jurisdiction of Civil Courts, which is based on the place of residence and the place where the
cause of action arises. Generally, the contracts insert a specific clause to determine the
territorial jurisdiction to resolve the dispute arising under such contracts.
An E-contract crosses the jurisdictional boundaries as it can be created from any place in the
globe. This raises the question of jurisdiction of the court in case of any dispute between the
parties to E-contracts.
If there is any dispute among the parties belong to the same jurisdiction related to E-contract,
then such dispute can be resolved similar to the traditional contract disputes. However, the
challenges would arise when the parties to E-contract are belong to the different countries.
Jurisdictional problem in E-contract has been resolved under IT Act in India. Specifically,
Section 13 of the IT Act deals with the time and place of despatch and receipt of an electronic
record and electronic contracts.

WWE v. M/S. Reshma Collection (Merchandise case)


Facts
The case in question was brought to the Delhi High Court on appeal from an order of a Single
Judge Bench which had rejected the plaintiffs argument of jurisdiction. The plaintiff, in this
case, is World Wrestling Entertainment, incorporated in Delaware, and all the
defendants in the case reside in Mumbai. Neither the plaintiff nor the defendants
‘carried on business’ within the territorial jurisdiction of the Court, but the plaintiff
argued that the Delhi Courts had jurisdiction to hear the matter under Section 134(2) of
the Trademarks Act, 1999 and Section 62(2) of the Copyright Act, 1957.
The High Court’s reasoning
The High Court, in allowing the petition, placed reliance on the M/S. Dhodha House vs S.K.
Maingi and the Bhagwan Goverdhandas Kedia v. Girdharilal Parshottamdas & Co. cases. In
this case, it was held that in order to meet the ‘carrying out business’ requirement, three
conditions have to be fulfilled. The first two conditions focus on ‘agents’, but it is the
third condition that is relevant here: “(iii) to constitute “carrying on business” at a
certain place, the essential part of the business must be performed at that place. “
Issue
Thus, the Court focused on the question that “when a transaction takes place over the
Internet, where is the contract concluded?”
Under existing Indian jurisprudence, a contract is concluded when the offeror receives
intimation that the offeree has accepted the offer. But there is a crucial difference between
contracts negotiated with the parties being in a ‘sense of presence’ of each other, and
contracts negotiated over slow mediums such as telegrams and post. Thus, there is an
exception to the general rule with regard to the latter, that in such cases the contract would be
complete when the acceptance of the offeree is put into a course of transmission by him.
The question then becomes which of these two categories does the medium of the internet fall
into. Crucially, in the case of Bhagwan Goverdhandas Kedia, the Supreme Court had
stated that the medium of the Telephone would fall into the former category due to the
instantaneous nature of telephonic conversations, and the exception would not apply.
The High Court’s Decision
The Court applied this line of reasoning to the Internet. It held that in this context, the
website of a plaintiff is an invitation to offer, not an offer itself. It becomes an offer
when the invitation is accepted by the consumer residing in Delhi, and he or she places
an order. Thus, the transaction is confirmed and payment is made to the website owner
(offeree), the offeree accepts the offer of the customer at Delhi. Since the transaction is
instantaneous, the acceptance of the offer by the website is instantaneously
communicated to its customer through the Internet at Delhi. Therefore, the Court held,
in such a case, part of the cause of action would arise in Delhi.
Using this line of reasoning, the Court held that since the offers are made by customers at
Delhi, subject to confirmation/ acceptance of the appellant/ plaintiff through its website, the
money would emanate or be paid from Delhi, the appellant/ plaintiff is, to a certain extent,
carrying on business at Delhi. The following extract from the case captures the judge’s line of
reasoning quite nicely:
“Because of the advancements in technology and the rapid growth of new models of
conducting business over the Internet, it is possible for an entity to have a virtual presence in
a place which is located at a distance from the place where it has a physical presence. The
availability of transactions through the website at a particular place is virtually the same
thing as a seller having shops in that place in the physical world.”

P.R. Transport Agency v. Union of India


Background of the case
Bharat Coking Coal Ltd. (BCC) held an e-auction for coal in different lots. P.R. Transport
Agency's (PRTA) bid was accepted for 4000 metric tons of coal from Dobari Colliery. The
acceptance letter was issued on 19th July 2005 by e-mail to PRTA's e-mail address. Acting
upon this acceptance, PRTA deposited the full amount of Rs. 81.12 lakh through a cheque in
favour of BCC This cheque was accepted and encashed by BCC. BCC did not deliver the
coal to PRTA. Instead, it e-mailed PRTA saying that the sale, as well as the e-auction in
favour of PRTA, stood canceled "due to some technical and unavoidable reasons". The only
reason for this cancellation was that there was some other person whose bid for the same coal
was slightly higher than that of PRTA. Due to some flaw in the computer or its programme or
feeding of data the higher bid had not been considered earlier. This communication was
challenged by PRTA in the High Court of Allahabad.
Issues raised by PRTA
The communication of the acceptance of the tender was received by the petitioner by e-mail
at Chandauli (UP) Hence, the contract (from which the dispute arose) was completed at
Chandauli (U.P.). The completion of the contract is a part of the "cause of action". The place
where the contract was completed by receipt of communication of acceptance is a place
where 'part of cause of action' arises.
Points considered by the court
With reference to contracts made by telephone, telex or fax, the contract is complete
when and where the acceptance is received. However, this principle can apply only
where the transmitting terminal and the receiving terminal are at fixed points.
In case of e-mail, the data (in this case acceptance) can be transmitted from anywhere by the
e-mail account holder. It goes to the memory of a 'server' which may be located anywhere
and can be retrieved by the addressee account holder from anywhere in the world. Therefore,
there is no fixed point either of transmission or of receipt.
Section 13(3) of the Information Technology Act has covered this difficulty of "no fixed
point either of transmission or of receipt". According to this section "...an electronic
record is deemed to be received at the place where the addressee has his place of
business."
The acceptance of the tender will be deemed to be received by PRTA at the places
where it has place of business. In this case it is Varanasi and Chandauli (both in U.P.)
Decision of the court:
The acceptance was received by PRTA at Chandauli/Varanasi. The contract became complete
by receipt of such acceptance.
Both these places were within the territorial jurisdiction of the High Court of Allahabad.
Therefore, a part of the cause of action had arisen in UP and the court had territorial
jurisdiction.

➢ Types of E-Contracts

1. Click-Wrap agreements
A click-wrap agreement is normally provided in a check box wherein the user is asked
to agree to terms of services and other information asked by the website or the software
concerned.
The Hotmail Corporation vs. Van $ Money Pie Inc.
It was one of the first cases in which the validity of the Click Wrap Agreement was upheld by
the court. The plaintiff (Hotmail) alleged that the consumer has violated the terms of the
agreement as the messages and e-mails were altered after submitting them once. The
defendant was also accused of violating the Computer Fraud and Abuse Act, breach of
contract, fraud, misrepresentation, etc.
The court after going through the terms and conditions of the agreement clearly held that it is
a valid and enforceable agreement in the eyes of the law. Since the customer has violated
them, he is liable to pay compensation.

2. Shrink-wrap agreements
Shrink-wrap agreements are mostly related to computer software. The software is
mostly distributed in CD-ROMs. When the licensing software is opened by the person for
his use, it means he accepts the terms and conditions of that software company.
The term “shrink-wrap” refers to the plastic wrapping which covers the software boxes.
This wrapping can be understood as the legally enforceable terms and conditions. As
soon as the user removes that wrapping, he is entering into a contract.
PC programming organizations are mainly dependent upon this type of agreement. It is a sort
of unsigned undertaking given by the customer while submitting to the terms and conditions.
Following are the terms and conditions which can be made through the Shrink-wrap
agreements-
• License
• Fees and payments
• Warranties
• Limitations of liability
The validity of the shrink-wrap agreement came into question in the case ProCd Inc vs.
Zeidenberg. In this case, the manufacturer has included a shrink license in its packaged
software. The customer purchased the software but didn’t follow the license restricting its
commercial usage. To enforce the license, the appellant filed for an injunction. The court
denied the injunction while stating that though the terms and conditions are not explicitly
provided, the license was to be treated as an ordinary contract. Thus, it is enforceable

3. Browse-wrap agreements
Browse-wrap agreements are probably seen on many websites while searching or
reading anything on websites. They are some kinds of pop-ups that ask you to click
“OK” or “I AGREE” though, you can use the website with or without clicking there.
In this agreement, there is a hyperlink or website containing the terms and conditions over the
screen of the website. When the person agrees to the above-stated terms and conditions, he
can access the material available and download the product available therein.
For instance- Electronic commerce websites such as Amazon and Paytm provide a disclaimer
while entering their website stating that by accessing or browsing the website, the user has
consented to all the terms and conditions. The terms and conditions clause are hyperlinked.
However, it is also observed that sometimes the browse wrap clause is hidden or not
explicitly shown on the website page. It may lead to conflict in the future.
Jurisdiction of E-Commerce

Jurisdiction is the power of State to regulate the conduct of its subjects by legislation,
adjudication and enforcement. The current module only deals with the adjudicative
jurisdiction of court prescribe by State to resolve issues and fix the liability of parties.
Cyber Jurisdiction or Jurisdiction in Cyber Space- In simple terms, is the extension of
principles of international jurisdiction into the cyberspace. Cyberspace has no physical
(national) boundaries. It is an ever-growing exponential and dynamic space.

➢ Jurisdiction in International Law

If we talk about, the Jurisdiction in International, sometimes called as Extra- Territorial


Jurisdiction. Then this Jurisdiction has been propounded, enunciated and established by
certain Theories or Principles. There are three pre-requisites of the Jurisdiction which are as
follows:
• Prescriptive Jurisdiction: It refers to the power of a State to regulate its people,
property and transactions or to prescribe their conduct, usually through passage
of laws or regulations. A state has unlimited prescriptive jurisdiction, this means that
the legislature of the state can create, amend or repeal any legislation.
• Enforcement Jurisdiction: It is the power of the Government of the State to
compel compliance or to punish non-compliance with laws, regulations, orders
and judgments. However, a state cannot enforce its laws over persons residing in
another country. And this jurisdiction shall only apply only when there is jurisdiction
to prescribe. And in very rare cases, a state may allow another state to However,
enforce their laws in the lands of the former state without earlier consent.
• Adjudicative Jurisdiction: It refers to the power of a state acting through its
judicial organ, to hear disputes and to render judgments binding upon parties
thereto. It is the power of a court to determine the rights and obligations of the party
to a dispute and to exercise and judicial power in relation to. It is also a possibility
that there is jurisdiction to prescribe but no jurisdiction to adjudicate.
But it was very difficult to assert the jurisdiction of one sovereign nation on another and thus
in order to enforce the laws of one country in the lands of other country there are certain
principles evolved by the International Community for furnishing better ways to render
Justice. These principles are equally applies in physical world or in cyberspace. These
principles are not mutually exclusive rather the courts routinely rely on more than one to
establish the Jurisdiction.

➢ Principles of Extra Territorial Jurisdiction

There are 5 principles of Extra Territorial Jurisdiction:


Territorial Nexus Principle
This principle states that a State’s territory for jurisdictional purposed extends to its land and
dependant territories, airspace, aircrafts, ships, territorial sea and, for limited purposes, to its
contagious zones, continental shelf and exclusive economic zone. The principle as adopted by
the National Courts is subject to national law, save only for those granted immunity under
International Law.
This principle is further divided in two variants
1. Objective Territorial Principle: In this a state can exercise its jurisdiction over
all the activities which are completely within its territory, provided that even if
some elements constitution the crime or civil wrong too place elsewhere: and
2. Subjective Territorial Principle: It states that a State asserts its jurisdiction over
matter commencing in its territory, even though the final even may have
occurred elsewhere.
Nationality Principle
It is totally on the state to determine under its law who its citizens are. This principle states
that a person of Indian nationality if committed any act in another nation, and if that
act in punishable under Indian laws, then he will liable to go for trial in his country.
For example: In India, under IPC sec. 3, an Indian national is liable to prosecution in India for
an offence committed in a foreign country which is punishable under Indian Law.
Passive Personality Principle
This principle was propounded by United States of America. It is an extension of the
Nationality Principle, and is to be applied against a national of a state, wherever that national
be. It provides that a national of one state when make a visit to another country, takes
with him the law of his land as a protection, and subject those who came in contact with
him.
Universal Principle
This principle has quite vast scope. The purpose for incorporating this principle is to ensure
that no offense shall go unpunished. A state has jurisdiction to define and prescribe
punishment for certain groups of offenses which are recognized by the Community of
Nations as of universal concern. A Universal Principle empowers the State to assert
jurisdiction irrespective of fact that who committed the act and where it occurred.

➢ Tests of Jurisdiction

Long-Arm Statute
The principle of ‘Long Arm Statute’ empowers the State to exercise its personal jurisdiction
over a non-resident defendant who has certain contacts with the state. This practice was
developed by United States over a long period of time.
For example, the long arm statute of New York gives its courts the power to exercise
jurisdiction over non-New York residents who; transact business within New York or
committed tort (other than defamation) within New York, or committed tort (other than
defamation) outside New York which injured persons or property located within New York,
or own, use, or possess any real property situated within New York.
Even IPC and IT Law have extra-territorial jurisdiction which work as long-arm statute, but
is difficult to apply.

Minimum Contact Test


Minimum contact rule establishes that so long as a corporation had a degree of contact within
the state bringing suit, they are subject to the laws of the state and can be sued by and within
the forum state in court.
This principle was established in the case of International Shoe Co. v. State of Washington,
where it was held that a court’s personal jurisdiction over a non-resident defendant can
apply if the defendant has maintained certain minimum contact with the forum state. It
carved three criteria for establishing minimum contact:
1. The defendant must “purposeful avail” himself of the privilege of doing business
in the forum state;
2. The cause of action arises from the defendant’s activities in the forum state; and
3. The exercise of Jurisdiction shall be reasonable and fair.
This ‘minimum contact” test laid down the foundation of a State’s jurisdiction over the other
State’s subject.
The term purposeful avail means a purposeful and successful solicitation of business from
forum state residents, establishment of contract with the state residents, associated with other
state related activity, and substantial enough connection with the state.
It is to be noted that this case for the first time established that the personal jurisdiction might
exist even though the defendant had no physical presence in the forum state.

Effect Test
This test was propounded in the case of Calder v Jones, it was held that the due process
requirements of the “minimum contact” may be satisfied on the basis of “effects” that the
conduct out of state has in the forum state.
Facts: In this case there was a magazine printed and published in Florida. An article saying
something defamatory about a citizen of California was published. The Californian citizen
filed a case against the writer of that article, the defendant then contends that the magazine is
of Florida is published in Florida and sold in Florida itself, then the Californian Court have
no Jurisdiction to entertain this case.
Judgment: The Court rejected the contention and held that as the magazine was also
available in the State of California and causes an effect to the Californian citizen. Thus,
we have the jurisdiction to entertain this case. And the court then propounded the
conditions needs to be satisfied-
i. an intentional action,
ii. that was expressly aimed at the forum state,
iii. with knowledge that the brunt of the injury would be felt in the forum state.

Sliding Scale Test:


This test was propounded in the case of Zippo Manufacturing Co. v. Zippo Dot Com,
Incorporation; the issue of personal jurisdiction arises in the context of trademark dilution,
infringement and false designation under the Federal Trademark Act.
Facts: There was a renowned company named Zippo Manufacturing Co., and is known for
“Zippo” tobacco lighters and was established in Pennsylvania. Zippo was the trademark
used by this Company. Another company was newly registered and worked in California
with the name of Zippo.com, Inc, providing free and paid news services. The Zippo
Manufacturing filed a suit against the Zippo Dot Com in the Court of Pennsylvania, the
Incorporation contends the basis of Jurisdiction, the Court held that as the Incorporation had
1,40,000 paid customers, out of which 2% i.e., 3,000 were Pennsylvania residents, and the
incorporation has also contracted with other internet service providers in the locality of
Pennsylvania.
Judgment: The Court held that this level of contact shall lie within the purview of
Specific Personal Jurisdiction. And also gave the “Sliding Scale Test”.
This Test talks about three types of website and says that according to the website type the
jurisdiction shall be established. The Three types of websites are:
1. Passive Website: These kinds of websites are those in which one can only see
information, and these kinds of websites do not interact with the party. For example
News websites etc.
The Court shall have no personal Jurisdiction in this kind of website.
2. Active Website: On this website, the make interacts with the parties and also do the
transaction with the users. For example, Shopping website etc.
The Court shall establish personal jurisdiction if issue is related to active website.
3. Interactive Website: These kinds of website offers interaction and connection with the
users. For example: Social Media, YouTube etc.
The Court can establish personal Jurisdiction but after determining the level of
interaction.
In the Sliding scale test the first two classifications of websites and establishment of
Jurisdiction was quite okay. But the last classification of Interactive Website and the
provision of “level of interaction” created some sort of problem in determining the cases
as there were no reference point from where one should evaluate the “level of
interaction”, thus now this rule is not in picture and is not been followed.
➢ Indian Jurisdiction in Cyberspace

CPC
In Indian context the Code of Civil Procedure and Criminal Procedure Code incorporates the
jurisdiction of the Court in the case national and international aspects of issues. Section 20 of
the Code covers the international jurisdiction and has interpreted in the internet related cases.

IT Act
Sec 1 specifies the extent of the application of this act.
It states that: (2) It shall extend to the whole of India, save as otherwise provided in this Act,
it applies also to any offence or contravention thereunder committed outside India by any
person.
Sec 75 deals with the provisions of the act to apply for offences or contraventions committed
outside India.
It states that: subject to the provision of sub section (2), the provision of this act shall also
apply to any offence or contravention committed outside India by any person irrespective of
his nationality.
For the purpose of sub section (1), this act shall apply to an offence or contravention
committed outside India by any person if the act or conduct constituting the offence or
contravention involves a computer, computer system or computer network located in India.

Cases

Banyan Tree Holding (P) Limited v. A. Murali Krishna Reddy


Facts
The Plaintiff Company involved in hospitality industry had registered office at Singapore and
defendants were from Hyderabad. It adopted the mark “Banyan Tree” and Banyan tree as
device and maintain website <www.banyantree.com>, <www.banyantreespa.com> since
1996. The Banyan tree was not a registered mark as per the law of the land as the application
was pending for registration. Defendant initiated the project by the name “Banyan Tree
Retreat” and advertised on website. Plaintiff filed case with Delhi High Court alleging
dishonesty on part of the defendant.
Judgment
The Division Bench, in a well thought out judgment, laid down that
• in cases of passing off or infringement, where the plaintiff is not carrying on his
business within the jurisdiction of the court and there is no long-arm statute, the
question whether this court has the jurisdiction to entertain the suit would be
decided if the plaintiff shows that the defendant has ‘Purposefully Availed’ the
jurisdiction of the forum court to himself.
• Further, in order to prove this, the plaintiff will have to show real commercial
transactions entered into by the Defendant with an internet user residing within the
jurisdiction of the forum court.
• In addition to Section 20(c) CPC, the plaintiff also has an option of approaching the Court
under Sections 62(2) and 134(2) of Copyright Act, 1957 and the Trademark Act, 2002
respectively.

Imperssario v/s S&D Hospitality


Facts
In this case the plaintiff's company offers restaurant services which has its registered office in
Mumbai and is carrying its business in New Delhi and a restaurant under the name and style
of 'SOCIAL' which it has trademark and has various branches as well. The plaintiff came to
know about the defendant's restaurant in Hyderabad under the name 'SOCIAL MONKEY.
Also, it has a popular beverage by the name A GAME OF SLING and the defendant has
named a beverage as Hyderabad Sling which is identical or deceptively similar to the
plaintiff's beverage. Both these outlets had entered into contract with websites like Zomato
and Dine Out and so the information of both, along with menu and contact info was made
available on the websites of Zomato and Dine Out. Therefore, issue before the Delhi High
Court was whether it had the jurisdiction to adjudicate upon the matter.
Judgment
The Hon'ble Court also observed that for the purposes of a passing off or an infringement
action (where the plaintiff is not located within the jurisdiction of the court), the injury on the
plaintiffs business, goodwill or reputation within the forum state as a result of the Defendant's
website being accessed in the forum state would must be shown. Therefore, the court held
that mere interactivity of the website in the forum State did not attract its jurisdiction.
Earlier similar view was given in the case of Banyan Tree Holding (P) Limited v. A. Murali
Reddy and Anr wherein the court held that a passive website, with no intention to
specifically target audiences outside the State where the host of the website is located,
cannot vest the forum court with jurisdiction.
MODULE 3

Copyright in Cyberspace

Copyright is about protecting original expression. Copyright protects "original works of


authorship" that are fixed in any tangible medium of expression from which they can
be perceived, reproduced, or otherwise communicated either directly or with the aid of
a machine or device, Copyright arises as soon as a 'work' is created (or fixed) does not
extend to any idea, procedure, process, system, method of operation, concept, principle
or discovery, unless fixed in a tangible form.
Copyrightable works include the following categories: literary works; musical works,
including any accompanying words; dramatic works, including any accompanying music;
pantomimes and choreographic works; pictorial, graphic, and sculptural works; motion
pictures and other audio-visual works; sound recordings, architectural works and computer
programs. In the digital medium, every web page accessible or published in the World Wide
Web is to be taken as a literary 'copyrightable' work.
• Caching - It is used to improve response time for end users. It means copying of a web
page/site and storing that copy for the purpose of speeding up subsequent accesses.
• Browsing - A software-driven process for searching the world wide web using a browser.
• Mirroring - It improves service for the users by replicating a web site across various
servers all over the world and make available the critical information to all the users at all
times)
• Downloading - It means to receive information, typically a file, from another computer
via modem.
• Uploading - It means to send information, typically a file, from another computer via
modem.
• File-swapping - A "peer-to-peer" transmission of digital files from one computer to
another via the Internet.
The question is whether such activities really infringe the five exclusive statutory rights of a
copyright owner, such as:
(b) to fix (store) the information in a tangible form
(c) to reproduce the copyrighted work.
(d) to sell, rent, lease, or otherwise distribute copies of the copyrighted work to the
public.
(e) to perform and display publicly the copyrighted work.
(f) to prepare derivative works based on the copyrighted work.
The answer is yes. Internet activities like caching, browsing, mirroring, scanning, uploading,
downloading or file swapping may result in:
a) transmission of information from one computer system or network to another, involving
temporary storage (RAM) of that information.
b) unauthorized storage of such information a violation of the copyright owner's exclusive
right to make copies, i.e. to reproduce the copyrighted work
c) a violation of the copyright owner's exclusive distribution right.
d) an appearance of a copyright image in a web browser infringing the copyright owner's
public display right
e) an infringement of the copyright owner's exclusive right to prepare derivative works
That is, prima facie, the nature and characteristic of Internet activities is such that there will
certainly be infringements to the exclusive statutory rights of a copyright owner.
1) Digital downloads and RAM
These digital downloads are also part of the memory called random access memory, or RAM.
It is volatile and needs a constant supply of power.
When a computer is turned off, everything in RAM disappears. In other words, digital
downloads are temporarily stored in RAM. Whether it is to be referred as "fixed" and thereby
constitute copy" depends upon the facts and circumstances of a given case. In Apple
Computer v. Formula Internationals, it was held that copies stored in random access
memory (RAM) were temporary and running a computer program from RAM does not
create a fringed copy. But if one applies the 'copyright law' in the aforesaid situation, then
the question is whether this temporary storage of (generally copyrighted) code constitutes
"fixation" of the code in RAM. If a code temporarily stored in RAM is considered to be
"fixed," the RAM would constitute a copy of the work, further constituting prima facie
infringement.
2) Digital Downloads and Reproduction Rights
The reproduction and display of a copyrighted work of another person, in a non- removable
(for example, hard disc of a computer, web server etc.) or removable storage medium,
without his authorization amounts to an infringement of statutory exclusive rights vested in
the said copyright owner.
3) Digital Downloads and Distribution Rights
Distributing and displaying copyrighted work of another, without his authorization amounts
to an infringement of statutory exclusive rights vested in the said copyright.
4) Digital Downloads and Display Rights
As evident from the aforesaid discussions that whether it is the infringement of reproductions
right or distribution right, the display right of a copyright owner is also equally affected).
5) Digital Downloads and Derivative Works
Copyright also subsists in derivative works. A copyright owner has an exclusive right to
prepare derivative works based on his original (copyrighted) presentation.
The Copyright Act (of the U.S.) defines derivative work as "a work based upon one or more
pre-existing works, such as a translation, musical arrangement, dramatization,
fictionalization, motion picture version, sound recording, art reproduction, abridgment,
condensation, or any other form in which a work may be recast.
Any attempt to create a similar "look and feel" of a copyrighted work would amount to an
infringement. "Look and feel" is the overall organization of a website including its home
page and web pages) in terms of navigational elements such as buttons and dropdown menus,
their positions, command terms, the choice of letters, font, size, symbols, colour scheme,
arrangement of text, images, graphics or sound, frames, etc that makes the interface unique
and hence copyrightable.
➢ Exception of Fair Use
Google v/s Oracle
Facts
In 2005, Google acquired Android, Inc., signaling the search company’s intent to move into
software development for the nascent mobile device market. To attract “a sizeable number of
skilled programmers” to develop applications for Google’s Android-based smartphones,
Google wanted its platform to take advantage of programmers’ familiarity with the popular
Java programming language. It negotiated with Java’s developer Sun Microsystems to license
Java technologies, but talks broke down over Sun’s insistence that “all programs written on
the Android platform be interoperable.” Google then elected to create its Android platform
independently. However, to ensure that programmers’ familiarity with Java would aid in
developing Android applications, Google copied about 11,500 lines of code from the Java
API. In 2010, Oracle acquired Sun and the copyright to the Java computing platform, which
includes the Java API. Oracle filed a suit against Google for copyright and patent
infringement soon after.

Judgment
The Supreme Court remanded with Justice Breyer writing for the majority. It began by
affirming that the constitutional objective of copyright is “to promote the Progress of Science
and useful Arts.” The Court found that all four factors favored Google and held that
Google’s copying was fair use as a matter of law.
• For “expository purposes,” the majority opinion began by examining the second factor:
the nature of the copyrighted work. It noted at the outset that although software is
copyrightable, all code is not created equal.
• Turning to the first factor, the Court next addressed the purpose and character of the
use the majority considered whether Google’s use imbued the copied code “with new
expression, meaning or message, or, more simply, whether it was “transformative.”
• In addressing the third factor — the amount and substantiality of the use — the
majority noted that when the amount copied is “tethered to a [copier’s] valid,
transformative purpose,” the factor will “generally weigh in favor of fair use.” Here,
the Court characterized Google’s “basic objective” as allowing programmers to use their
pre-existing knowledge of the Java API to create new programs for Android. As declaring
code was the “key” to “unlocking the programmers’ creative energies,” this factor
weighed in favor of fair use.
• The Court reached the fourth factor, assessing the potential market harm from
Google’s copying. The Court noted that the “potential loss of revenue was not the
whole story,” and that it also had to consider “the source of the loss” in addition to any
“public benefits the copying [would] likely produce.”
Justice Thomas dissented. He asserted that the majority skipped over the
copyrightability analysis, thereby ignoring “half the relevant statutory text and
distorting its fair-use analysis.” He argued that by failing to analyze the Copyright Act’s
definition of a copyrightable “computer program.”

➢ Linking and Framing

1) Linking
"A "link" is a set of commands in Hypertext Markup Language (HTML) that when actuated
by right-clicking a mouse directs your browser to another page. The new page could be in the
website you're viewing or it could be a page in another website.
Three other well-known types of links are: "intra-page, intra-system, and inter-system. Intra-
page links connect different parts of the same document. For example, a long document may
have a link at the end which takes the user back to the beginning. Intra-system links connect
different documents on the same server. An intra-system link on a university's server might
connect the home pages of two different departments. An intersystem link connects
documents on different servers. Thus, a document concerning intellectual property law on a
university's server might be connected to the home page of the Governments Patent Office"
Some relevant cases in order to provide on a general perspective for linking:
Shetland Times, Ltd. v. Jonathan Wills and Another, is considered the first "linking" case;
"the issue presented in Shetland Times was whether the Shetland News's ("News") "deep
link" to embedded pages of the Shetland Times's ("Times") web site, through the use of
Times' web site's news headlines, was an act of copyright infringement under British law.
The matter settled on the day of trial, shortly after the court had issued a preliminary
injunction precluding the deep link. Although much discussed, this opinion has proved to be
of little legal significance, in part because of the extremely low evidentiary standard applied
by the court."
One of the most well-known cases was Ticket master v. Microsoft - The first major case
involving the practice of deep linking involved Microsoft's use of deep links from its
"Sidewalk" web guides. These web guides spotlighted, among other things, upcoming events
in a particular area, and would provide deep links to information on specific events on
interior pages of the Ticket master website. At that time, Ticket Master had recently signed
an agreement to provide event information and ticket-ordering links to a competing web
guide service, City Search. Through this agreement, City Search was paying Ticketmaster for
what Microsoft was taking for free. Ticketmaster filed suit against Microsoft on April 28,
1997, arguing that Microsoft's practices devalued Ticketmaster's site by bypassing its home
page.
2) Framing
Framing is a method of splitting one window into two or more screens. A web page can be
inserted into a frame, and that portion of the screen will remain static as a user moves through
other web pages. This method is called "framing," because it allows a webmaster to send an
individual through numerous web pages while retaining the appearance and the utility of the
frame inserted.
Most of the "Intellectual Property in Cyberspace" pages utilize frames. The pages in this
technical primer have been set to open outside of the frames." Technically explained, a
framing process works as follows: "The frames may contain either highlighted URL
addresses of other Web pages that are intended to be "selected" by the framing page user or
other pages within the same Web site.
Nevertheless, the most accepted legal concept is that framing can cause consumer confusion
and thereby violate trademark laws and under particular laws can be unfair competition. The
problem with a finding of copyright infringement of a literary work where such links are
concerned is similar to that raised in respect of meta-tags because these hypertext links are
likely to contain only relatively short phrases.
The case of Shetland Times is unlikely to be helpful as it was only an interim decision and
thus decided on a lower standard of proof. An example of such a pictorial link would be that
found in Ticketmaster Corp v Microsoft Corp where the link from the defendant's website to
the plaintiff's site comprised the plaintiff's logo. In that case, the plaintiff sold and marketed
tickets to various entertainment events through its website 'http://www.ticketmaster.com' on
the internet. The home page of the plaintiff displayed advertisements, products, and services
of other parties with which the plaintiff had contracts, thus providing it with an important
source of revenue. The defendant set up a website 'http://seattle.sidewalk.com' and initially
entered into negotiations with the plaintiff to have hyperlinks from their Seattle Sidewalk site
to the plaintiff's Ticketmaster site. When the negotiations failed, the defendant established the
links anyway.

➢ Copyright in the Digital Medium


An Indian Perspective It was in 1994, that for the first time, the Copyright Act, 1957 had
gone for a digital makeover by including computer programs as "literary work" [section
2(o)]. It is important to note that section 2(ffc) defines the term "computer program" as a set
of instructions expressed in words, codes, schemes or in any other form, including a machine-
readable medium, capable of causing a computer to perform a particular task to achieve a
particular result.

➢ Copyright in Computer Programs


The Act provides a very comprehensive definition of a computer program, it may include the
following copyrightable materials:
• Preparatory design materials, like flowcharts, diagrams, written specifications, form and
report layouts, designs for screen displays etc.
• Computer programs (object code and source code) and other executable code (executable
file).
• Software development tools, like relational database development compilers, report
generators etc.
• Databases and data files.
• Computer output, for example, sound, print-out, computer file or data, electronic signals
• Screen displays
• Manual and guides
• Programmed languages
Further the definition of "computer program" includes the term "... machine-readable
medium...." it implies that the said "computer program" must be capable enough to be read by
the machine [computer], stored or embedded in removable (magnetic, optical), non-
removable magnetic storage (hard disc) device, or RAM (temporary memory) of the
computer.
It is significant to note that in view of the enactment of the Information Technology Act,
2000, the definition of computer [section 2(ffb)] given in the Copyright Act, has to make way
for the much exhaustive definition in the former Act:
Section 2(1)(i) "Computer" means any electronic, magnetic, optical or other high-speed data
processing device or system which performs logical, arithmetic and memory functions by
manipulations of electronic, magnetic or optical impulses and includes all input, output
processing, storage, computer software or communication facilities which le co are connected
or related to the computer in a computer system or computer network.
The aforesaid definition of a computer consists of the following components: stems
(i) Any electronic, magnetic, optical or other high-speed data processing device or
system,
(ii) Performs logical, arithmetic and memory functions, and
(iii) By manipulating electronic, magnetic or optical impulses
And includes all input, output processing, storage, computer software or communication
facilities which are connected or related to the computer in a computer or system or computer
network.
The aforesaid definition of "computer" has further extended the concept of digital medium to
include any electronic, magnetic or optical material (or configuration) on which data is
recorded.

➢ Copyright in Digital Medium


Copyright subsists in the following classes of works [section 13]:
(a) original literary, dramatic, musical and artistic works;
(b) cinematograph films;
(c) sound recording.
Copyright arises as soon as a 'work' [section 2(y)] is created (or fixed). It does not extend to
any idea, procedure, process, system, method of operation, concept, principle or discovery,
unless fixed in a tangible form.
It is obligatory to note that under the Act, cinematograph film [section 2(f)] and sound
recording [section 2(xx)], may be fixed "regardless of the medium". That is cinematograph
film or sound recording may be taken as fixed in tangible form, even if they are stored or
embedded in an electronic, magnetic or optical medium. That is, the definitions of
cinematograph film [section 2(f)] and sound recording [section 2(xx)] to be read with section
14(d) and section 14(e) respectively of the Act in order to extend the "meaning of copyright"
to the digital copies of "cinematograph film" and "sound recording" as well. Surprisingly, the
right to reproduce an "artistic work" as defined in section 2(c) of the Act, "in any material
form" (i.e., tangible form) restricts the scope of the Act to cover digital copies of artistic
work.
Similarly by virtue of section 14(a)(i), "copyright" means the exclusive right in the case of
a literary, dramatic or musical work to "reproduce the work in any material form
including the storing of it in any medium by electronic means". That is, the copyright
owner has an exclusive right to reproduce the work in any form (including audio, video, data,
text or multimedia files generated, sent, received or stored in media, magnetic, optical,
computer memory, micro film, computer generated micro fiche or similar device).
➢ Copyright and Internet
Internet activities like catching, browsing, mirroring, swapping, scanning, and uploading may
result in:
(a) transmission of information from one computer system or network to another, Li
involving temporary storage (RAM) of that information.
(b) unauthorized storage of such information a violation of the copyright owner's exclusive
right to make copies, ie, to reproduce the copyrighted work.
(c) a violation of the copyright owner's exclusive distribution right.
(d) an appearance of a copyrighted image in a web browser infringing the copyright owner's
public display right.
(e) an infringement of the copyright owner's exclusive right to make adaptation, (re-
arrangement or alteration).
Hence, the Copyright (Amendment) Act, 2012 by amending the definition of
"communication to the public" [section 2(f)] provides protection to a copyright owner against
those who violate his statutory 'exclusive' rights to fix (store), reproduce, distribute, public
display (perform) and/or re-arrangement (adaptation) [section 14]. when they, upload,
download, scan or transmit any information (copyright material) on the Internet without
seeking authorization from the copyright owner. The new Amendment Act has made it clear
that acts, like caching and browsing do not constitute an infringement of copyright by
identifying "the transient or incidental storage of a work or performance...." in section
52(1)(b) & (c) as fair use category...
It is significant to note that the amended definition of "communication to the public" [section
2(f)] has made the intermediaries, including network service providers liable under section
51(a)(ii) of the Act, for copyright infringement in the digital medium. Intermediaries’ role to
provide communication service to download, transmit (distribute or swap files), and exhibit
(public display), someone else's copyrighted work would amount to copyright infringement
provided the intermediary is able to demonstrate that it was not aware and had no reasonable
ground for believing that such communication to the public would be an infringement of
copyright.
If one compares the role of an intermediary both under the Copyright Act and the Information
Technology Act, the following legal facts emerge:
Liability Standards Intermediaries under the Intermediaries under IT
Copyright act act
Immunity from liability No absolute immunity No absolute Immunity
Exemption from liability Yes, if and only if: Yes, if and only if:

(a) had no knowledge; and (a)the intermediary does not


(ii) initiate the
(b) had no reasonable transmission,
ground for believing that (iii) select the receiver of
such communication to the the transmission, and
public would be an (iv) select or modify the
infringement of copyright information
contained in the
transmission;

b) the intermediary observes


due diligence while
discharging his duties (under
the Information Technology
Act) and also observes the
IT (Intermediaries
Guidelines) Rules, 2021;

(c) the intermediary has not


conspired or abetted or aided
or induced whether by
threats or promise or
otherwise in the commission
of the unlawful act; and

(d) upon receiving the actual


knowledge or on being
notified by the Government
or its agencies, the
intermediary has
expeditiously removed or
disabled access to that
material
Distinction with third-party No distinction Primarily deals with third
information party information
Subject matter application of Narrow Broad
the law

➢ Super Cassette Industries v/s MySpace Inc

Facts
• The Plaintiff claims to be the owner of repertoire of songs, cinematograph films, and
recordings, etc with over 20000 Hindi Non film songs and around 50000 songs in
regional languages.
• A suit is filed against Myspace which is a social networking platform for infringement of
copyright of Plaintiff as the platform of Myspace allowed the users to upload and share
files which were under the authorisation of plaintiff.
• The suit was filed for infringement under section 51(a)(i) and section 51(a)(ii) of the
Copyright Act, 1957.
• The plaintiff claims that in year 2007 there was a non-disclosure agreement signed
between the plaintiff and the defendants, following which there were discussions with
regard to the defendants procuring a license from the plaintiff to display the plaintiff’s
copyrighted material.
• However, there arose a dispute between the parties and the material of Plaintiff continued
to be on the website of the Defendant even without any licence.
• A legal notice was sent by the Plaintiff to the defendant to take down the material to
which the reply received by the Defendant provided that the material has been taken
down.
• A few months later, the Plaintiff found that the material was not taken down despite the
assurance from the Defendants.
• Dissatisfied with the assurances of the defendants the plaintiff filed the present suit before
the Delhi High Court; the plaintiff also sought interim relief before the same court.

Issues and Decision


1) Whether MySpace could be said to have knowledge of infringement so as to attract
liability for secondary infringement under Section 51(a)(ii)?
Ans. No, according to the Court, in the case of internet intermediaries, section 51(a)(ii)
contemplates actual knowledge and not general awareness.
Elaborating on the circumstances of the case, the Court held that to attract liability for
secondary infringement, MySpace should have had actual knowledge and not mere
awareness of the infringement. Appreciating the difference between virtual and physical
worlds, the judgment stated “the nature of internet media is such that the interpretation of
knowledge cannot be the same as that is used for a physical premise.”
As per the court, the following facts only amounted to a general awareness, which was not
sufficient to establish secondary liability:
1. Existence of user agreement terms which prohibited users from unauthorized uploading
of content;
2. Operation of post-infringement mechanisms instituted by MySpace to identify and
remove content;
3. SCIL sharing a voluminous catalogue of 100,000 copyrighted songs with MySpace,
expecting the latter to monitor and quell any infringement;
4. Modifying videos to insert ads in them: SCIL contended that MySpace invited users to
share and upload content that it would use to insert ads and make revenues – and this
amounted to knowledge. The Court found that video modification for ad insertion only
changed the format of the video and not the content; further, it was a pure automated
process and there was no human intervention.
Additionally, no constructive knowledge could be attributed to MySpace to demonstrate
reasonable ground for believing that infringement had occurred. A reasonable belief
could emerge only after MySpace had perused all the content uploaded and shared on
its platform – a task that was impossible to perform due to the voluminous catalogue
handed to it and existing technological limitations.
The Court imposed a duty on SCIL to specify the works in which it owned copyright and
being shared without authorisation on MySpace. It held that merely giving names of all
content it owned without expressly pointing out the infringing works was contrary to the
established principles of copyright law. Further, MySpace contended and the judge agreed,
that in many instances the works were legally shared by distributors and performers – and
often users created remixed works that only bore semblance to the title of the copyright work.
In such cases, it becomes even more important for a plaintiff such as MySpace to provide
specific titles because while an intermediary may remove the content fearing liability and
damages, an authorized individual’s license and right to fair use will suffer or stand negated.
(Para 38 in decision)
Thus, whereas MySpace undoubtedly permitted a place of profit for communication of
infringing works uploaded by users, it did not have specific knowledge, nor reasonable
belief of the infringement.

2) Does the proviso to Section 81 override the "safe harbor" granted to intermediaries under
Section 79 of the IT Act, 2000? AND 3) Whether it was possible to harmoniously read and
interpret Sections 79 and 81 of the IT Act, and Section 51 of the Copyright Act?
Ans. No, the proviso does not override the safe harbor, i.e. the safe harbor defence
cannot be denied to the intermediary in the case of copyright actions. The three sections
have to be read harmoniously, indeed.
The judgment referred to the Parliamentary Standing Committee report as a relevant tool in
interpreting the two provisions, declaring that the rights conferred under the IT Act, 2000
are supplementary and not in derogation of the Patents Act or the Copyright Act. The
proviso (u/s 81)was inserted only to permit copyright owners to demand action against
intermediaries who may themselves post infringing content – the safe harbor only
existed for circumstances when content was third party/user generated.
Given the supplementary nature of the provisions- one where infringement is defined and
traditional copyrights are guaranteed and the other where digital economy and newer
technologies have been kept in mind, the only logical and harmonious manner to interpret the
law would be to read them together. Not doing so would lead to an undesirable situation
where intermediaries would be held liable irrespective of their due diligence. (Para 49 in
decision)
Regarding section 79, the court reiterated that the section only granted a limited immunity to
intermediaries by granting a measured privilege to an intermediary, which was in the nature
of an affirmative defence and not a blanket immunity to avoid liability. The very purpose of
section 79 was to regulate and limit this liability; whereas the Copyright Act granted
and controlled rights of a copyright owner.

On MySpace Complying with Safe Harbor Requirements under Section 79 of the IT Act,
2000 (and Intermediary Rules, 2011)
The court held that MySpace's operations were in compliance with section 79(2)(b). The
content transmission was initiated at the behest of the users, the recipients were not
chosen by MySpace, neither was there modification of content. On the issue of
modification, the court reasoned that since modification was an automated process (MySpace
was inserting ads) which changed the format only, without MySpace's tacit or expressed
control or knowledge, it was in compliance of the legislative requirement.
Despite several safeguard tools and notice and take-down regimes, infringed videos find their
way. The remedy here is not to target intermediaries but to ensure that infringing material is
removed in an orderly and reasonable manner. A further balancing act is required which is
that of freedom of speech and privatized censorship. If an intermediary is tasked with the
responsibility of identifying infringing content from non-infringing one, it could have a
chilling effect on free speech; an unspecified or incomplete list may do that. (Para 62 in the
decision)
On the second aspect of due diligence, the court held that MySpace complied with the
due diligence procedure specified in the Rules - it published rules, regulations, privacy
policy and user agreement for access of usage. Reading Rule 3(4) with section 79(2)(c), the
court held that it due diligence required MySpace to remove content within 36 hours of
gaining actual knowledge or receiving knowledge by another person of the infringing
content. If MySpace failed to take infringing content down accordingly, then only will safe
harbour be denied to MySpace. This liberal interpretation of due diligence is a big win for
internet intermediaries in India.

Relief Granted
Setting aside the Single Judge's order, the Court directed SCIL to provide a specific catalog
of infringing works which also pointed to the URL of the files. Upon receiving such specific
knowledge, MySpace has been directed to remove the content within 36 hours of the issued
notice. MySpace will also keep an account of the removals, and the revenues earned from ads
placed for calculating damages at the trial stage.

Trademark in Cyberspace

➢ Trademark - The Basics


A trademark means a mark capable of being represented graphically and may include a
word, name, symbol, device, numeral, letters, signature, label, ticket, brand, slogans,
pictures, characters, sounds, smell, shape, logo, graphic designs, three dimensional
form, moving image, product or packaging features etc. It is distinctive of a person's
goods or services and is used in a manner that identifies those goods or services and
distinguishes them from the goods and services of others.
Trademarks are classified into five categories:
(a) Generic marks
(b) Descriptive marks
(c) Suggestive marks
(d) Arbitrary marks
(e) Fanciful marks
Whether these are registrable (protectible) depends on their extent of distinctiveness (inherent
or acquired) and the evidentiary support an applicant could provide to support his claim.
1. Generic Marks
They do not receive protection because they do not distinguish a mark of a business mark
from other products or services) A generic mark is a common descriptive term for a particular
good (or service) It does not function as source identifiers, and should be left free for use by
competitors/For examples, the word 'ESCALATOR' is in common use as the name of a type
of product by multiple sources. A generic mark is not registrable as it is incapable of being or
becoming distinctive of the goods or services of one person or business. The test for
determining if a term is generic involves assessing its primary significance to the relevant
public.
2. Descriptive Marks
Distinctiveness is needed for registration of any sign as a trademark. Distinctiveness may be
either inherently distinctive, or may acquire distinctiveness through a secondary meaning (in
the market place)/A secondary meaning does not require that the trademark was inherently
distinctive, as long as there was a change in the public perspective about the meaning of the
trademark. For example, 'Apple' is an inherently distinctive trademark for a computer.
A claim for acquired distinctiveness of a mark may require the applicant to provide for:
(a) Sales, volume, or revenue from goods (or services)
(b) Length of use prior to filing
(c) Geographical area of sales of goods (or provision of services) (d) Extent of advertisement
featuring the mark
(e) Degrees of popular awareness among the consuming public that the mark emanates from
the applicant (submission of survey(s), statements by customers, retailers etc.)
3. Arbitrary, Fanciful or Suggestive Marks
It is significant to note that inherently distinctive marks have often been referred to as
arbitrary, fanciful or suggestive.
APPLE, when applied to computers, is an arbitrary mark while EXXON is a fanciful mark.
The use of fanciful or arbitrary marks in connection with the goods and services with which
they are associated has no meaning or significance other than as a trademark Suggestive
marks, in contrast, suggest some attribute or characteristic of the goods (or services) with
which they are associated. It uses a consumer's cognitive facilities to make an association
between the mark and the goods or services concerned. For example, EVERREADY when
applied to batteries suggests that the batteries will have a long life.

➢ Representing a Trademark
A trademark must be capable of being represented graphically, either as a word, a logo, or
image. If it is not capable of graphic representation, like ideas, emotions or business methods,
it must be rejected/Thus, it is important to note that for trademark registration purposes only
graphic representations are accepted as it supports accessibility. As outlined above,
distinctiveness is a 'key' element required for registration. Even for non-traditional marks,
like three-dimensional marks, colour marks, sound marks, moving image marks -
'distinctiveness' plays an important role in their registrability.
Thus a registered trademark:
• is a 'distinctive' asset that can be bought, sold or licensed; helps in notifying and enforcing
ownership of rights;
• identifies the origin of goods and/or services;
• denotes the goodwill of the company
• indicates quality of goods; and
• is often the basis of establishing licensing or franchising arrangements.

➢ Rights of a Trademark Owner


A registered trademark is an asset and provides its owner with proprietary rights. A duly
registered mark grants exclusive rights to the owner to:
(a) 'own' and exploit the said mark for the goods (or services) specified in the registration in
the market place;
(b) sell, or permit its limited use (license) for a fee;
(c) assign it a goodwill value;
(d) sell, exhibit, market and/or promote the goods (or services) in an exclusive manner;
(e) stop others from using the said mark, or a substantially or deceptively similar mark; and
(f) initiate legal action against the infringer

➢ Trademark Infringement
A trademark infringement is a violation of the trademark owner's rights. An infringement
occurs, when the impact of the proposed trademark is such that it is likely to cause
deception or confusion or mistake in the minds of persons accustomed to the existing
trademark.
In fact, in order to succeed in the court of law, the plaintiff has to show that the defendant has
used a mark 'deceptively similar to that of the plaintiff. It is crucial that the plaintiff must
make out a prima facie case of infringement against the defendant by articulating the
'defendants marks' visual, phonetic and/or structure closeness to its trademark.

➢ Establishing a Prima Facie Case


SC indicates that even prior small sales of goods with the mark are sufficient to establish
priority, the test being to determine continuous prior user and the volume of sale or the
degree of familiarity of the public with the mark. Bona fide test of marketing, promotional
gifts and experimental sales in small volume may be sufficient to establish a continuous prior
use of the mark. But on some other occasions, courts have classified small sales volume as so
small and inconsequential for priority purposes.
➢ Establishing Visual and/or Phonetic Similarities
In order to establish a strong prima facie case, a plaintiff has to identify visual and/or
phonetic similarities causing deception, confusion or mistake in the minds of persons
accustomed to the existing trademark.

➢ Passing off Action


Passing off is an action under Common Law. The passing off action depends upon the
simple principle that nobody has any right to represent his goods, as the goods of
somebody else. Passing off involves misrepresentations by a trader to his prospective
customers, calculated to injure (as a reasonably foreseeable consequence) to the
business or goodwill of another. It is treated as a form of unfair competition or wrongful
appropriation of the plaintiff's personality. In order to create a valid cause of action for
passing off, as per Lord Diplock in (Erven Warnink v. J. Townend & Sons Ltd. BV), five
characteristics that must be present are:
• a misrepresentation;
• made by a trader in the course of trade;
• to prospective customers of his or ultimate consumers supplied by him; of goods or
services
• which is calculated to injure the business or goodwill of another trader (in the sense
that this is a reasonably foreseeable consequence); and
• which causes actual damage to a business or goodwill of the trader by whom the
action is brought or (in a quia timet action) will probably do so.

➢ Search Engine and Meta Tags


A search engine or directory is a searchable index of resources available on the Internet. A
large majority of these resources are web pages, but one can also search even the content of
some databases. A search engine has a tool called 'robotic spider, which regularly scans the
web, crawling from link to link, visiting web pages, recording URLs (Universal Resource
Locator) and helps in building an index for the search engine. The manner in which a
particular spider conducts its search and the decision criteria by which it decides which
resources to retrieve are both determined by the programming ogic and algorithms composing
that spider.
Thus, when a user uses a search engine, he types one or more search terms into the text box
and presses the button to initiate a search. This is often referred to as "keyword search'. The
user requests is passed on to the search engine software that searches the index for Internet
resources that contain those terms. It is not unusual for hundreds and even thousands of
matches to be discovered. The web addresses of these resources are then arranged in a
descending order of relevance criteria adopted by the particular search engine or directory
and returned to the user as a list of hyperlinks on a series of web pages. Reviewing these
results pages, the user can often identify the website or other resource that he is attempting to
locate and with a click of the mouse proceed directly to it. The user, quite often is in a hurry
to locate his 'search item' in the first few web pages thrown by the search engine. Thus, for
every website developer the task is not only to be part of the "search query but also to achieve
a good 'rank' as and when a search result in thrown up against a related query.)
The relevance ranking that a web page receives from a search engine is determined by an
algorithm built into that search engine's software. For example, Google, MSM etc. uses the
'link structure' of the Web to calculate site rankings. As a result, if a website developer
understands how a search engine's relevancy algorithm works, the developer can design and
optimize the website to receive a higher ranking on the results pages that search engine
returns to its users. Many search engines employ relevancy algorithms that take account
of the presence of search terms (1) in certain "tagged" locations within the HTML code
that comprises the web page, (2) in the text of the web page, and (3) in the URL of the
web page.
The webmaster can try to increase their relevancy score under the first criterion by
including as many likely keywords as possible within the HTML tags- even when the
keywords have little or nothing to do with the content of the web page. This strategy is
often referred to as meta tagging". Meta is codes contained within websites that provide a
description (other than the actual text contained in the web page) that can be searched.
To enhance the relevance ranking of a web page under the second criterion, some
website operators repeat likely keywords over and over again on a web page.
The third strategy for enhancing the relevance ranking of a domain name that contains
a likely keyword, or using the keyword as part of the website - obtaining a directory
structure of the website.
Recognizing the value of website designers place on a high relevance ranking, some search
engines and directories are now selling higher rankings directly to the website owners. That
is, for a price, some search engines will guarantee a premium relevance ranking for searches
containing certain keywords, often referred to as 'paid listings' (or sponsored links).
Metatagging raises several trademark issues, including: Is it trademark infringement or
passing off (or dilution) to embed another's trademark in HTML tags on one's web page?
What about repeating another's trademark as buried code or invisible text on one's web page?
Is it unlawful for a search engine or directory to sell premium placements for banner ads
keyed to another's trademark?

➢ Use of Meta Tags and Initial Interest Confusion


There have been few instances where the courts have recognized trademark
infringement resulting from the use of meta tags and also its use causing initial
confusion. An infringement action may be based on a claim that the alleged infringement
creates initial consumer interest, i.e. when a user conducts a search using a trademark term
and the results of the search include websites not sponsored by the holder of the trademark
search term, but rather of competitors. In other words, the competitor has captured the
trademark holder's potential visitors or customers.

➢ Domain Names: Digital Marks in the Online Medium


In the last ten years, domain names have become a kind of 'e-commerce marks' in the line
medium These are digital business addresses - a point of business contact or transaction.
The term domain name describes any alphanumeric designation which is registered with or
assigned by any domain name registrar, domain name registry, or other domain name
registration authority as part of an electronic address on the Internet.
A domain name consists of different parts. The first part is known as 'second-level domain'
(or sub-domain), and is the part that can be chosen by the person registering the name. The
end part, which reflects standard term throughout the world is known as 'top- level domain'
(or domain extension). These are commonly referred to as gTLDs, Le. generic' (or global)
Top Level Domains. Earlier there were only seven gTLDs (.com, .edu, gov, int, mil, .net, and
.org)

➢ Domain Name Distribution


The Network Solutions Inc. (NSI) has been registering domain names since 1992 under an
agreement with the National Science Foundation and the US Department of eCommerce In
1999, the Internet Corporation for Assigned Names & Numbers (ICANN), a non-profit,
private sector corporation based in Marina del Rey, California, USA assumed management of
the domain name system from NS1. The main functions of ICANN are: (a) sets rules for
giving the numbered IP addresses/protocol parameters (b) adding new suffixes to the
directory and (c) sets rules for arbitrating disputes over domain ownership)
It is significant to note that like NSI, ICANN and its accredited registrars are also responsible
for the registration of 'second-level domain name along with 'top-level domain'. They
register the 'second-level domain name on a first-come, first-serve basis and do not
evaluate whether 'second-level domain name to be the same, or deceptively, similar to, a
registered trademark. The result has been mixed, on one hand it has given fillip to the
growth of e-commerce all over the world; on the other it has created a menace of
'cybersquatting. A cybersquatter is "an Internet user who has registered multiple
'domain names' with the hope of selling them to the businesses who own trademarks
identical to those names". Another variant is a typosquatter, who seeks to profit from
controlling domain names, but instead of acquiring a domain name identical to the
registered trademark owner, the typosquatters obtains common typographical
permutations of domain names surrounding a high traffic site.
Examples are www.amazom.com, www.dismey.com, etc.

➢ Non-Judicial Dispute Resolution and ICANN's Uniform Domain Name Dispute


Resolution Policy (UDRP)
ICANN as successor of NSI came out with its own version of dispute resolution policy,
called 'Uniform Domain Name Dispute Resolution Policy' on October 24, 1999. It is a
comprehensive policy that covers domain name dispute areas, like trademark or service mark
infringements. It has been able to create a basis for global uniformity in the resolution of
domain name disputes)
All registrars in the aero,asia, .biz, cat, com, coop, info, jobs, mobi, museum. .name, .net,
.org, .pro, .tel and travel top-level domains follow the Uniform Domain- Name Dispute-
Resolution Policy (UDRP). Under the policy, most types of trademark- based domain-name
disputes must be resolved by agreement, court action, or arbitration before a registrar will
cancel, suspend, or transfer a domain name. Disputes alleged to arise from abusive
registrations of domain names (ie., cybersquatting) may be addressed by expedited
administrative proceedings that the holder of trademark rights initiates by filing a complaint
with an approved dispute-resolution service provider,
To invoke the policy, a trademark owner should either (a) file a complaint in a court of proper
jurisdiction against the domain-name holder (or where appropriate an in rem action
concerning the domain name) or (b) in cases of abusive registration submit a complaint to an
approved dispute-resolution service provider.

➢ The UDRP
The dispute resolution proceedings are conducted before one of the administrative- dispute-
resolution service providers as mentioned above. Every domain name registrant has to submit
himself to a mandatory administrative proceeding in the event that a third party (a
"complainant") asserts [Para 4(a)] to the applicable Provider, in compliance with the Rules of
Procedure, that:
(i) the registrant domain name is identical or confusingly similar to a trademark or service
mark in which the complainant has rights; and
(ii) the registrant have no rights or legitimate interests in respect of name; and the domain
(iii) the registrant domain name has been registered and is being used in bad faith.
In the administrative proceeding, the complainant must prove that each of these three
elements are present. Much emphasis has been given to the bad faith registration [Para
4(a)(iii)], which is to be read with Para 4(b) of the UDRP.
It is significant to note that UDRP is a proactive dispute resolution mechanism, as it provides:
(a) a domain name registrant may continue to use his or her domain name while the
complaining party in the domain name is being determined before an ICANN- approved
arbitration panel or a court of competent jurisdiction [UDRP Para 7: Maintaining the Status
Quo].
(b) it permits the trademark owners to challenge the use of domain names that are
confusingly similar to their trademarks. It goes beyond the Anti cybersquatting Consumer
Protection Act, which restricts a trademark owner to challenge the use of a domain name
because it is dilutive of his or her famous mark.
(c) it applies not only to nationally registered trademarks but also to state and common law
trademarks.
(d) the proceedings under the UDRP are limited to domain name disputes in which the
disputed domain name "has been registered and is being used in bad faith". [UDRP Para
4(a)(iii)]. The UDRP is primarily targeted at cybersquatting. It does not apply if the domain
name registrant has registered the disputed domain name in good faith.

➢ Infringement of Trademarks in Online Medium - An Indian Perspective


As discussed previously in this chapter, the trademark law in India is a happening law. One of
the most significant facets of trademark law in India is that the judges have always given due
weightage to Indian consumers and their cultural background.
As Desai J. of Bombay High Court (which was later affirmed by the Supreme Court) aptly
puts in his judgment Corn Products Refining Co. v. Shangrila Food Products Ltd., that
"English cases proceeding on the English way of pronouncing an English word by
Englishmen, which it may be stated is not always the same, may not be of much assistance in
our country in deciding questions of phonetic similarity. It cannot be overlooked that the
word is an English word which to the mass of the Indian people is a foreign word"

➢ Domain Name Disputes and Trademark Law


Trademark law gives statutory protection to the trademark owner against trademark
infringement and passing off action. In order to obtain temporary injunction against an
infringer, the trademark owner has to establish a strong prima facie case against him and this
means that the plaintiffs has to identify visual and/or phonetic similarities causing deception,
confusion or mistake in the minds of persons, who are of average intelligence and imperfect
recollection but accustomed to the existing trademark.

➢ Establishing a Prima Facie Case


If the judgments are any indication, then it may be said that the Indian Courts have given a
new interpretation to the phrase "a man of average intelligence and imperfect recollection" by
equating him with "an unsophisticated consumer of information". However, establishing a
strong prima facie case against the infringer on the basis of visual and/or phonetic similarities
remain the basic criteria in the domain name disputes.
In Yahoo! Inc. v. Akash Arora, the defendant was restrained from using the domain name
"yahooindia.com" which had the format, content and colour scheme identical to the plaintiff's
"yahoo.com" It was observed by Dr. M.K. Sharma, J. of the Delhi High Court that "if an
individual is a sophisticated user of the Internet he may be an unsophisticated consumer
of information and such a person may find his/her way to the different internet site
which provides almost similar type of information as that of the plaintiff and thereby
confusion could be created in the mind of the said person who intends to visit the
Internet site of the plaintiff, but in fact reaches the Internet site of the defendant".
Further, The Delhi High Court rejected the argument that the provisions of the Indian
Trade Mark Act would not be attracted to the use of the domain trade name or domain
name on the Internet. It held that although the word 'services' may not find place Test of A
in the expression used in section 27 and 29 of the Act, services rendered have to be
recognized for an action of passing off. That is, the two marks/domain names "Yahoo!"
any sign of the plaintiffs and "yahoo india" of the defendants are almost similar
excepting for the use of suffix 'India' in the latter.

➢ Kapil Wadhwan v/s Samsung

Facts
Samsung Electronics Co. Ltd. and Samsung India Pvt. Ltd. (now “Respondents”) are the
brand owners and registered proprietors of the mark “SAMSUNG” in India. The Respondents
had originally filed a suit against Kapil Wadhwa and a few other distributors (now
“Appellants”) who were importing Samsung printers from licensed dealers in foreign markets
and selling it in India without authorisation at a cheaper price. The Respondents alleged that
the Appellants infringed their trademark rights in India and accordingly a Single Judge Bench
of the Delhi High Court passed a judgement in favour of the Respondents. The present
judgment by the Division Bench of the Delhi High Court arises out of an appeal to the
judgment passed by the Single Judge.

Issues:
i. Whether India follows the principle of national exhaustion or international exhaustion?
ii. Whether parallel import of goods is permissible in India?

Analysis:
i) Whether India follows the principle of national exhaustion or international
exhaustion?
Section 30(3) of the Trademarks Act, 1999 provides for the principle of territorial exhaustion
of trademark rights in India. It states that once lawfully acquired, the purchaser of the goods
may further sell those goods in the market without it constituting as trademark infringement.
(Principle of Territorial Exhaustion of Trademark Rights
The principle of territorial exhaustion of rights means that after goods are lawfully acquired
from the first owner, the rights of the first owner to prevent further sale of such goods is
exhausted. Principle of Territorial Exhaustion of Trademark Rights may be national,
international, and in some cases, regional.
National Exhaustion – means that any product can be lawfully acquired and sold within the
borders of a country, e.g. within India.
International Exhaustion – means that any product lawfully purchased could be sold
anywhere in the world, e.g. product lawfully acquired from Thailand sold in India.
Regional Exhaustion – means that any product may be lawfully acquired and sold within a
certain region, e.g. European Union.
The principle of territorial exhaustion of rights is based on the doctrine of first sale where the
title over any product passes on to the purchaser once it has been sold. In such a scenario,
the purchaser has complete rights over the product and may even choose to sell it to someone
else. This is also embodied in Section 19 of the Sale of Goods Act which provides that upon a
contract of sale for specific property, the property and the goods are transferred to the buyer.
Once the title passes to the buyer, no condition can be further imposed on the buyer.)
In order to determine whether parallel imports to India were permissible, the court had to first
determine whether the term ‘market’ in Section 30(3) of the Trademarks Act, 1999 referred
to a national or a global market. The Single Bench of the Delhi High Court held that India
only recognized the principle of national exhaustion.
However, on appeal, the Division Bench made a reference to additional documents to
determine the intent of the legislature while inserting ‘the market’ in Section 30(3). The
Division Bench relied upon the Statement of Objects and Reasons of the Trademark Bill 1999
placed before the Indian Parliament at the time of passing the Trademarks Act, India’s
communication at the ]Uruguay Rounds and a Report of the Standing Committee on the
Copyright (Amendment) Bill, 2010. It concluded that India follows the principle of
international exhaustion of rights.

ii) Whether parallel import of goods is permissible in India?


Section 29 of the Trademarks Act, 1999 provides for circumstances where a trademark is said
to be infringed. Section 29(1) of the Act states that trademark infringement means the use of
a registered trademark by any person unauthorised to do so, in the course of business and in
relation to deceptively similar goods and services. Section 29(6) enumerates what constitutes
use of a trademark – and includes but is not limited to import and export of goods bearing
such mark. Based on the aforementioned, the Single Bench held that import of goods,
whether genuine or fake, without authorisation, constitutes as trademark infringement.
On appeal with the Division Bench, the Respondent argued that it was entitled to prevent
such further sale based on Section 30(4) of the Act which seeks to limit the exception to a
trademark infringement already granted by Section 30(3). The Respondents argued that
allowing parallel imports would prejudice the rights of the trademark owners, and consumers.
In response, the Division Bench stated that Section 29 could not be read in isolation and must
be read with Sections 30(3) and 30(4). The Division Bench also stated that denial of
parallel imports will restrict the consumers’ access to a wider range of products at
better prices and stated that trademark laws are not intended to regulate the sale and
purchase of goods but to protect trademark rights.
It further held that since India recognised the doctrine of international exhaustion, the
Respondent cannot prevent the parallel import of its products in India. It also permitted
the sale of the printers under the condition that the Appellants shall provide disclaimers that
the product sold by them are imported independently and the Respondent gives no
guarantees/warranty qua the goods nor provide any after-sales service. The warranty and
after-sales services provided by the Appellants is at their own cost.

Conclusion:
The Division Bench of the Delhi High Court permitted parallel imports to India, on the
condition that the Appellants would provide certain disclaimers in their shops. The principle
of international exhaustion laid down in this judgment has clarified a rather grey piece in
India’s trademark legislation.

➢ Christian Louboutin v/s Nakul Bajaj

Facts
The plaintiff in the case, one Christian Louboutin is a luxury brand which is specialized in
shoes and other related goods, Christian Louboutin has many products which enjoy
exclusivity through Intellectual Property Rights. The defendant is Darveys.com, Darveys is a
members-only luxury online shopping portal. It was noted in the investigation that the
company required members to pay ₹2000 to use the website. It was stated that the product
sold by Darveys.com especially the product line of the plaintiff were stated to be
unauthorized sales. The plaintiff further claimed that the products of their brand were sold
only under authorized sellers in India. The defendant claimed protection through section 79
of the Information Technology Act, 2000 as an intermediary.

Issues
i) Whether the "safe harbour" protection through section 79 should apply here?
ii) Whether the use of Mega Tags comprising the Plaintiff's Registered Trademark
amounts to infringement of IP rights?

Contentions by parties
i) The Defendant gave out certain points in their written statement:
That the praise for Mr. Christian Louboutin is not within the knowledge of the Defendants.
The Defendants have not had any direct dealings with the Plaintiff. They further claimed that
the sale was legally carried out.
ii) The Plaintiff in their contentions stated the following:
The use of the brand’s trademarks on the website is a clear indication of an infringement. The
usage of Mega tags comprising the brand names was also infringing. The use of an article on
the website by Christian Louboutin clearly differs from the plaintiff's contention of not
having knowledge about the brand. It also points at the various mentioning of the brand and
its founder through writeups and photographs.

Judgement
i. Whether the "safe harbour" protection through section 79 should apply here?
The website of the defendant comes under the definition of the intermediary under section
2(w). Section 79 of the Information Technology Act provide safe harbour protection to
intermediaries alone on certain conditions over content uploaded or sold through third parties,
like in the sense of Amazon, Flipkart.
The court examined various judgements and concluded that the knowledge of the
infringement by the intermediaries makes the liability shift. This was also stated in an Indian
Judgement MySpace Inc. v. Super Cassettes Industries Ltd. There too the concept of
constructive knowledge and the active knowledge was discussed. In the MySpace judgement,
it was declared that even if the intermediary has a knowledge of the illegality happening in
their website then the intermediary does not need a court order to stop the counterfeited
product or infringing product from using their intermediary service. The activities that
happen even after a minimum knowledge of the infringement can be claimed to be of a
sort of abiding by the infringement done by the third party and it would amount to the
intermediary becoming liable.
ii. Whether the use of Mega Tags comprising the Plaintiff's Registered Trademark amounts
to infringement of IP rights?
In the issue of meta-tags, the decision of Delhi High Court itself in the Kapil Wadhwa v.
Samsung Electronics was relied upon, where it was stated that the use of meta-tags which
comprises of brand names of others would amount to infringement.
"Meta tags are links that are provided using keywords. If a trade name is used as a keyword
and a link is provided, the website comes up whenever a customer searches for the said
trademark. The trademark used in the code as a keyword is invisible to the end-user or
customer. Such use, though invisible to the customer, has been held to be illegal."

Decision
The court gave out the decision that the darveys.com in support of transporting the
infringed goods to the customer would definitely be held liable even as an intermediary.
The court also referred to the IT (Intermediaries guidelines) rules 2011. The court also
insisted that the aforesaid of intermediary guidelines is advisable but not a sole criterion for
providing the protection that the intermediaries need.

➢ Amway v/s Amazon

Facts
A Division Bench of the Delhi High Court overruled the judgment passed by Single Judge in
Amway India Enterprises Pvt. Ltd v. 1MG Technologies Pvt. Ltd. & Anr in 2019 (“previous
order”) where several e-Commerce marketplaces like Amazon, Snapdeal, 1MG, and other
independent sellers were barred from making any sale, advertise, offer to sell, or even display
any goods in violation of trademark and third-party agreements. Direct Selling Corporations
(“DSCs”) namely Amway, claimed that e-Commerce marketplaces were selling and
advertising their items without their permission, in violation of their trademark rights and the
Direct Selling Guidelines, 2016 (“2016 DSG”). An appeal was made against the previous
order.

Issues
i. Whether the DSCs’ merchandise being sold on e-commerce marketplaces amount to
trademark violation, as well as degrading their brands’ goodwill and reputation?
ii. Whether e-Commerce marketplaces could be considered “intermediaries” under the
Information Technology Act and the Intermediary Guidelines of 2011, and if they could
be granted Safe Harbor Protection?

Judgment
i. Whether the DSCs’ merchandise being sold on e-commerce marketplaces amount to
trademark violation, as well as degrading their brands’ goodwill and reputation?
The Division Bench was of the opinion that the reports presented before the Single Judge
were just not sufficient and even at present no evidence can prove conclusively that the goods
of DSCs were tampered with, altered, or counterfeited before being sold on e-commerce
marketplaces. It also rejected the alleged misrepresentation or passing off claims because the
Direct Sellers’ information was already listed on these marketplaces, and additionally stated
that even the DSCs had never asserted anything related to trademark registration in their
plaints.
Further, by citing the judgment laid down in Kapil Wadhwa vs. Samsung Industries, the
Division Bench reaffirmed that India adopts the Principle of International Exhaustion.
According to this principle, a trademark owner’s rights terminates when the goods are sold
for the first time, and the buyer acquires ownership of it. And therefore, it will not be
considered an infringement whether it is sold in any market, domestic or foreign. Also, the
Trade Marks Act of 1999, Section 30(3), does not limit the lawful acquisition and subsequent
sale to an international market.
Thus, the Division Bench held that the sale of Amway products by the Direct Sellers on
the e-marketplaces could not be deemed to be an infringement because once the goods
are sold and the ownership is transferred from the DSCs to their individual Direct
Sellers, no restrictions on online sales of the commodities can be imposed on the Direct
Sellers.

ii. Whether e-Commerce marketplaces could be considered “intermediaries” under the


Information Technology Act and the Intermediary Guidelines of 2011, and if they
could be granted Safe Harbor Protection?
According to Section 79 of the Information Technology Act, 2000 (“IT Act“), “safe harbor
protection” is provided to any intermediary that makes information, data, or communication
links available or hosted by him and shall be exempted from legal liability in such
circumstances.
The Single Judge wrongly interpreted Section 79 of the IT Act and ruled that e-Commerce
marketplaces are more than just passive non-interfering marketplaces; they are also providers
of additional value-added services, effectively removing them from the category of mere
intermediaries.
The Division Bench contrarily held that the mere fact of e-Commerce marketplaces
providing a wide range of value-added services such as packaging, shipping &
delivering, and warehousing does not preclude them from benefiting from the liability
exemption provided by Section 79 of the IT Act. It came to the conclusion that, under
Section 79 of the IT Act, an intermediary would not face any legal action for any third-party
information, data, or communication link is posted as long as it followed Sections 79(2) and
(3).
The court based this decision on Shreya Singhal v. Union of India, which ruled that a
social media marketplace’s obligation to remove content emerges only if a court order
or a notification from a government agency based upon the grounds listed under Article
19(2) of the Indian Constitution exists. As a result, claims from DSCs were insufficient to
trigger a takedown obligation without a supporting court order or government notice.
Intermediary Liability

➢ Intermediary
An "intermediary", with respect to any particular electronic records, means any person who
on behalf of another person receives, stores or transmits that record or provides any service
with respect to that record. The term network service provider is ever-expanding. It is now
being seen as synonymous to the term 'intermediary' and includes telecom service providers,
network service providers, Internet service providers, web-hosting service providers, search
engines, online payment sites, online auction sites, online marketplaces, and cyber cafes.
Basically, intermediaries are kind of service providers providing services online.
The function of an intermediary has to be understood in terms of its role as a facilitator with
respect to any particular electronic message between an "originator" and an "addressee".

Information Carrier Information Publisher Information Seller

Intermediary which merely Intermediary, which Intermediary which


acts as a carrier of publishes and transmits the publishes, transmits and
information transmitting information. sells the
'electronic message’ from information/products and
one place to another, may take reasonable care in
without examining its relation to its publication
content. Its primary role is to
provide access to Internet
connectivity to the users

Examples: 'Access only Examples: 'Enhanced' Examples: 'E-commerce


intermediaries like, intermediaries like, portals/intermediaries,
airtel.in, rcom.co.in, etc. yahoo.co.in, rediff.com, like ebay.in, indiatimes.com.
google.com etc. flipkart.com, amazon.in etc

The question is under what circumstances, would an intermediary be held liable?


Section 79. Exemption from liability of intermediary in certain cases.-
(1) Notwithstanding anything contained in any law for the time being in force but subject to
the provisions of sub-sections (2) and (3), an intermediary shall not be liable for third party
information, data, or communication link made available or hosted by him.
(2) The provisions of sub-section (1) shall apply if-
a. the function of the intermediary is limited to providing access to a communication
system over which information made available by third parties is transmitted or
temporarily stored or hosted; or
b. the intermediary does not-
i. initiate the transmission,
ii. select the receiver of the transmission, and
iii. select or modify the information contained in the transmission;
c. the intermediary observes due diligence while discharging his duties under this Act
and also observes such other guidelines as the Central Government may prescribe in
this behalf.
(3) The provisions of sub-section (1) shall not apply if-
a. the intermediary has conspired or abetted or aided or induced whether by threats or
promise or otherwise in the commission of the unlawful act;
b. upon receiving actual knowledge, or on being notified by the appropriate Government
or its agency that any information, data or communication link residing in or
connected to a computer resource controlled by the intermediary is being used to
commit the unlawful act, the intermediary fails to expeditiously remove or disable
access to that material on that resource without vitiating the evidence in any manner.
Explanation.-For the purpose of this section, the expression "third party information" means
any information dealt with by an intermediary in his capacity as an intermediary.
Comment
The aforesaid section lays down the set of specific rules governing intermediaries. If sub-
section (1) provides for an all-encompassing exemption rule for the intermediaries, then
sub-section (2) and (3) refers to the applicability or non-applicability of the said
exemption rule, respectively.

➢ Applicability of exemption rule


Exemption rule, i.e., sub-section (1) states that "notwithstanding anything contained in any
law for the time being in force but subject to the provisions of sub-sections (2) and (3), an
intermediary shall not be liable for any third party information, data, or communication link
made available or hosted by him."
The courts' while addressing the question whether sub-section (1) of section 79 is applicable
or not have to perform the test of applicability. It has three distinct components. Presence of
any one of the components would grant exemption to any such concerned intermediary from
liabilities in certain cases. Three distinct components of 'test of applicability providing
exemption under sub-section (2) are:
Component 1:
(a) the intermediary merely provides access to third-party information, which is transmitted
or temporarily stored or hosted by such intermediary and includes:
i. storage for the purpose of carrying out transmissions (mere conduit), or
ii. storage for the purpose of making more efficient the information's onward
transmission (proxy caching), or
iii. storage of information provided by a subscriber (hosting).
OR
Component 2:
(b) the intermediary being a facilitator only plays a passive role in the sense that it does not.
i. initiate the transmission,
ii. select the receiver of the transmission, and
iii. select or modify the information contained in the transmission;
In other words, it was other than the intermediary, who initiated the transmission, -elected the
receiver of the transmission and selected or modified the information contained in the
transmission.
OR
Component 3:
(c) the intermediary observes due diligence while discharging his duties under this Act and
also observes such other guidelines as the Central Government may prescribe in this behalf.
'Due diligence' means reasonable steps taken by a person in order to avoid commission of
offence or contravention, ie, adopting reasonable steps to determine if the information content
it transmits is unlawful. It is defined as "such a measure of prudence, activity or assiduity, as
is properly to be expected from, and ordinarily exercised by, a reasonable and prudent man
under the particular circumstances; not measured by any absolute standard, but depending on
the relative facts of the special case." A due diligence exercise is a statutory duty on the part
of the intermediary to observe regulatory practices/guidelines as may be prescribed by the
Central Government to prevent transmission or publication of the unlawful content.

➢ Applicability of Non-Exemption Rule


Further, sub-section (3) of section 79 provides that the aforesaid exemption rule, i.e sub-
section (2) shall not be applicable, if:
(a) the intermediary has been involved in criminal acts, i.e., if he has conspired or abettor or
aided or induced whether by threats or promise or otherwise in the commission of the lawful
act.
Further, clause (b) of sub-section (3) of section 79 restricts immunity to the intermediaries on
the premise that:
(b) the intermediary has the actual knowledge of the fact that any information, data or
communication link residing in or connected to a computer resource controlled by the
intermediary is being used to commit the unlawful act and the intermediary fails to
expeditiously remove or disable access to that material on that resource without vitiating the
evidence in any manner.
'Actual knowledge' here means constructive knowledge, i.e. a person is deemed to have
constructive knowledge of the contents of material, which would put a reasonable and
prudent person on notice as to the suspect nature of the material. In other words, the
intermediary knows, or has reason to believe that the information content it is transmitting is
unlawful. The sources of actual knowledge may include, use of appropriate filters (filtering
software), moderators, receipt of notices from offended parties or any user etc.

➢ Shreya Singhal v. UOI


It must first be appreciated that section 79 is an exemption provision. Being an exemption
provision, it is closely related to provisions that provide for offenses including section 69A.
We have seen how under section 69A blocking can take place only by a reasoned order after
complying with several procedural safeguards including a hearing to the originator and
intermediary. The intermediary applying its own mind to whether information should or
should not be blocked is noticeably absent in section 69A read with 2009 Rules.
Section 79(3)(b) has to be read down to mean that the intermediary upon receiving
actual knowledge that a court order has been passed asking it to expeditiously remove
or disable access to certain material must then fail to expeditiously remove or disable
access to that material. This is for the reason that otherwise it would be very difficult
for intermediaries like Google, Facebook etc. to act when millions of requests are made
and the intermediary is then to judge as to which of such requests are legitimate and
which are not. Unlawful acts beyond what is laid down in Article 19(2) striking down
section 79(3)(b) obviously cannot form any part of section 79. With these two caveats, we
refrain from section 79(3)(b).
Section 79 is valid, subject to Section 79(3)(b) being read down to mean that an intermediary
upon receiving actual knowledge from a court order or on being notified by the appropriate
government or its agency that unlawful acts relatable to Article 19(2) are going to be
committed then fails to expeditiously remove or disable access to such material. Similarly,
the Information Technology "Intermediary Guidelines" Rules, 2011 are valid subject to Rule
3 sub-rule (4) being read down in the same manner as indicated in the judgment.

➢ Avnish Bajaj vs State & Sharat Digumati vs State


In Avnish Bajaj v. State, one of the questions before the court was whether the Portal Baaze
had the actual knowledge of the content?
Facts
• However, in spite of the filters having the word ‘sexual’ in its list, the program of
Baazee.com failed to block off the offending advertisement.
• Further, in-spite of being categorically informed by one of the users thread [email protected]
on 27.11.2004 at 8:20 p.m. the company, Baazee.com a 24 x 7 platform, failed to act to
stop the sale immediately. All through the day on 28.11.2004 the sale was going on
unabated and it was finally closed on 29.11.04.
• The language of the advertisement written down and represented by accused Ravi Raj, on
the website clearly conveyed the meaning that school children were involved in explicit
sexual act.
• Further the portal has charged and received commission on the sale of the offending clip.
The portal knew of the illegality of the fact, as the same was blocked on 29.11.04 but still
chose to profit from it by appropriating the commission, 15 days later.
• The investigation proves that Avnish Bajaj as the MD of Baazee.com as well as Sharat
Digumarti as Head Fraud and Risk Control had knowledge of the contravention, through
the Community Watch scheme.
• In spite of being informed, the item was not blocked for 38 hours. 75% of all sales took
place after the web portal was informed about it. The filters that were put up by the website
were also grossly inadequate. In spite of the word 'sexual' (at serial number 70) the word
'dp (at serial number 106) and word 'RKP (at serial number 110) existing in the suspect list,
their program was not able to detect and block the advertisement which carried the same
word.
• Likewise, Avnish Bajaj was the domain administrator and all policy decisions were made
through him. In spite of the hue and cry made in the media about the issue, the policymakers
for the website did not put the names like DPS, R.K. Puram on their watch list till after the
case was registered.
• Sharat Digumarti was the Senior Manager, Trust and Safety who was responsible for
maintaining the subject and banned key word list and ensuring that no lascivious item is
listed for sale on the website. Sharat Digumarti was responsible for ensuring that no banned
and illegal items are traded on the website.
• However, he did not take appropriate measures to ensure that the list of the banned and
suspect words are updated, keeping in mind the social and moral norms. Although the
website runs a 24 x 7 operations, no person had been deputed by him from his unit to review
the listings and to respond to alerts generated by the system.
• This allowed the item to remain listed for 38 hours after an alert was raised by the
Community Watch program. The filters that have been claimed by the accused as a measure
to block objectionable materials were found to be grossly inadequate during the
investigations. Sharat Digumarti has been charge-sheeted on recognizance without arrest.
Judgement
...the prosecution was unable to show at what stages the petitioner as MD was directly
involved in the screening of the listing or its subsequent removal. In the circumstances, it
would be a mere surmise that the petitioner was himself responsible for the offence. There
must be a specific allegation in the charge sheet that, despite knowing the failure of the
filters, he nevertheless did nothing about it. There is no such averment in the charge sheet.
In fact the liability sought to be attached to the petitioner is only in his capacity as MD of the
company and not in his individual capacity.

➢ Super Cassettes vs Myspace


Knowledge has a definite connotation, i.e a consciousness or awareness and not mere
possibility or suspicion of something likely. The nature of Internet media is such that the
interpretation of knowledge cannot be the same as that used for a physical premise. A general
awareness or apprehension that a work may be violative of copyright here would not pass
the knowledge test.
i. In the present case, where the system stores millions of videos, can MySpace be attributed
with specific knowledge of infringement as to attract content responsibility?
To say so would require MySpace - to know all owners of all works, and not just that of SCIL
- a possibility not contemplated by the Copyright Act. A further aspect to this exception is
"reason to believe" or what is referred to as constructive knowledge. Mere suspicion is
insufficient; and similarly apprehension is not enough.
ii. Here again would it be reasonable to expect defendant/content host to sift through millions
of videos or audio files to form a reasonable belief that certain specific data infringes the
copyright of someone?
The requirement is to give specific information to the content host or the website
(MySpace) that infringement occurs with respect to the specific work. A general or vague
description of the works would be insufficient as this then leaves room for MySpace to rely
guesswork as to what content has to be removed. Therefore, the onus is upon the plaintiff to
give a detailed description of its specific works, which are infringed to enable the web
host to identify them.
In the absence of such evidence, at a prima facie level, this Court is of the opinion that if
the modification/addition is entirely through an automatic process without any human
intervention then knowledge cannot be attributed to MySpace. (Regarding a contention
raised by SCIL that insertion of an advertisement by MySpase disclosed its knowledge,
Myspace contended that insertion of the advertisement was through an automated process)
The knowledge can also be attributed if the intermediary has been notified by the appropriate
Government or any of its agency that that any information, data or communication link residing
in or connected to a computer resource controlled by the intermediary is being used to commit
the unlawful act and the intermediary fails to expeditiously remove or disable access to that
material on that resource without vitiating the evidence in any manner.

➢ Google India Put. Ltd. v. M/s Visakha Industries Ltd.


(Section 79 of the IT Act, prior to 2009 amendment, did not protect an intermediary in regard
to an offence under Section 499/500 of the IPC)
Facts
The complaint made by Complainant alleging that Accused No. 1's statement in the
articles in the group hosted by the Accused No. 2 (Google India Pvt. Ltd.) was filled with
hatred towards Complainant which was defamatory in nature, and which a person of
ordinary intelligence in society would believe the said statements. Indeed, the said
statement injured the reputation of the Complainant. The Appellant came to be summoned
by the Magistrate pursuant to the complaint which seeks to invoke Sections 120B, 500
and 501 read with Section 34 of the Indian Penal Code, 1860 (Code). The Appellant filed
petition before the High Court to quash order passed by Magistrate summoning Appellant for
offences punishable under Sections 120B, 500 and 501 read with Section 34 of Code. The High
Court dismissed the petition.
Issue
Whether appellant could avail of intermediary sale harbour for defamation under Section 79 of
the IT Act?
Decision
In this case, Hon'ble Supreme Court held that since the complaint was filed and cognizance of
the matter was taken prior to the substitution of Section 79 with the expanded scope of the safe
harbour the adjudication of intermediary liability needed to be done as per the unamended
Section 79 only. The appellant (Google) argued exemption under the unamended Section
79 on the basis of the 'Sharat Babu Digumarti v Government of NCT of Delhi' case before the
Supreme Court, where the criminal charge of obscenity had been made against an
intermediary both under the IT Act as well as under IPC.
The Supreme Court held that the matter is deemed to be decided on the basis of Section 79 of
the IT Act, prior to the amendment of 2009 as the complaint was filed before the amendment.
After the amendment, the scope of protection for intermediaries has increased, as it states
that intermediaries shall be granted exemption from liability 'notwithstanding thing
contained in any law for the time being in force'.
The only option to seek protection is if the intermediary had "knowledge" of the
objectionable material. "Actual Knowledge" was dealt by Supreme Court in the case of
'Shreya Singhal v. Union of India' to mean an order from court or a competent authority
under law. But the precedent of Shreya Singhal Case cannot be made applicable as the
complaint arose before the amendment. Hence, Section 79 of the IT Act, prior to 2009
amendment, did not protect an intermediary in regard to the offence under Section 499/500 of
the IPC.

➢ Swami Ramdev & Anr. v Facebook Inc. & Ors.


(Online Defamation - Global Injunction passed to block defamatory web content uploaded
from India)
Facts
The allegation of the Plaintiffs is that various defamatory remarks and information
including videos, based on a book titled 'Godman to Tycoon the Untold Story of Baba
Ramdev' are being disseminated over the Defendants' platforms.
The Plaintiffs submit that the defamatory content contained in the said book was subject matter
of a judgment passed in wherein a Ld. Single Judge of this Court had restrained the publisher
and author from publishing distributing and selling the book without deleting the offending
portion. The allegations contained in the videos, which have been uploaded on the Defendants
platforms are in fact the defamatory allegations contained in the book which have already been
directed to be removed. In the present case, the petitioners (Swami Ramdev and Patanjali
Ayurved Ltd.) asked the court to issue a global take down order, for the defamatory
content in question, to Facebook, Google, YouTube, Twitter and other unidentified
Internet intermediaries.
Issue
Whether a global injunction can be passed to block defamatory content uploaded from India or
located in India on a computer source?
Decision
In this case, Hon'ble Delhi High Court delivered a landmark judgment thereby ordering
to remove all defamatory content posted online against Plaintiff No. 1 Swami Ramdev,
without any territorial limit, stating that if the content is uploaded from India or such
content is located in India on a computer resource, then the Courts in India should have
international jurisdiction to pass global injunctions
The court directed all defendants to take down, remove block restrict/disable access, on a global
basis, to all such defamatory videos weblinks/URLS in the list annexed to the plaint, which
have been uploaded from IP addresses within India. Insofar as the URLs/links in the list
annexed to the Plaint which were uploaded from outside India are concerned, the defendants
are directed to block access and disable them from being viewed in the Indian domain and
ensure that users in India are unable to access the same.
The plaintiffs are allowed to notify the defendants in case they discover any further URLS
containing defamatory/offending content who shall then take down/block access to the said
URLS. (However, if the Defendant - platforms are of the opinion that the material/content is
not defamatory, they shall intimate the Plaintiffs and the Plaintiffs would seek their remedies
in accordance with law.
The court made important observations on the issue of intermediaries. It held that in order to
avail of the exemptions provided under Section 79(1) and (2), the intermediaries have a duty
to "expeditiously remove or disable access" The intermediaries have to remove or disable
access to "that material". The said material would be the information or data "residing in or
connected to a computer resource" What would be the material to which access is to be disabled
or expeditiously removed? The answer to this is in the Information Technology (Intermediaries
Guidelines) Rules, 2011. Under Rule 3(2), the information or data which constitutes "that
material" would be "the material or information that is grossly harmful, harassing,
blasphemous, defamatory.... or otherwise unlawful in any manner whatsoever Thus, the access
would have to be disabled to any material or information which falls in any of these categories
from (a) to (i) If a material or information falls in this category, upon receiving a Court order,
the intermediary has to remove expeditiously or disable access to the same.
As far as location of removal or disabling is concerned, the removal or disablement to the
offending material has to take place "on that resource". Here, "that resource" is a computer
resource in which the "information, data or communication link" is "residing in" or is
"connected to".
Computer resource is defined as a computer, a computer system or a computer network. It is
not merely a single computer. It encompasses within itself a computer network, which would
include a maze or a network of computers. Such a computer network could be a global
computer network. Thus, a proper reading of Section 79(3)(b) would mean that if any
information, data is residing in or connected to a computer network, .e., a computer resource,
the intermediary has to remove or disable access to the said information or data on that
resource. The use of the words "that material" and "that resource" shows that the same is
intricately connected to the initial part of the link" and "a computer resource." Thus, if any
information or data has provision which deals with "any information, data or communication
been uploaded network, the information or data which has to be removed or disabled from that
very computer resource or network. (The computer resource or is residing in a computer
resource i.e., a computer in the initial part of the Section is the same computer resource as used
in the later part of the Section/ The latter resource cannot be a sub-set or a species of the former.
It has be the entire computer resource which was initially connected when the uploading of the
information or data took place. Thus, if an information or data has been uploaded on a computer
network, the platforms would be bound to remove it and disable it from that computer network
completely.
Module 4

The Cyber Offences

Cyber crime is a collective term encompassing both 'cyber contraventions' and 'cyber
offences.
The mens rea in case of 'cyber crime' comprises of two elements. First, there must be
intent to secure access to any program or data held in any computer, computer system
or computer network. Secondly, the person must know at the time that he commits the
actus reus that the access he intends to secure is unauthorized. The intent does not have
to be directed at any particular program or data or at programs or data held in any
computer, computer system or computer network.
The difference between 'cyber contravention' and 'cyber offence' is more about the degree and
extent of criminal activity rather than anything else. For example, a mere unauthorized access
to a computer, computer system or computer network may amount to 'cyber contravention'
but for a 'cyber offence it is the specific criminal violation that resulted from the unauthorized
access to a computer, computer system or computer network or computer resource that has to
be taken into consideration.
Sec 66A Shreya Singhal

Brief Facts of the Case


In the year 2012, two girls named as Shaheen Dhada and Rinu Srinivasan, was arrested by the
Mumbai police. The arrest was made for expressing their displeasure at a bandh which was
called in by the members of Shiv Sena people in Maharashtra for the incident of Shiv Sena
chief Bal Thackery’s death. The accusation made against the petitioners was that they were
involved in posting their comments on the Facebook and liking the comment at the same time
which resulted in widespread public protest. The petitioners by the way of Public Interest,
filed the writ petition under Article-32 of the Constitution claiming that section 66A of IT
Act 2000 violates the right of freedom of speech and expression of an individual.

Issues involved
1) Whether Sections 66-A, 69-A and 79 of the IT Act are constitutionally valid?
2) Whether Section 66A of IT Act is violative of fundamental right of freedom of speech and
expression?

Judgment
In the case of Shreya Singhal vs Union of India, the supreme court of India has tried to
balance between rights guaranteed in Article 19(1)(a) and reasonable restrictions under
Article 19(2). In remarks of the judgment, the Supreme Court has rightly and clearly
observed that "when it comes to democracy, liberty of thought and expression is a cardinal
value that is of paramount significance under our constitutional scheme".
Further, most importantly, the Court has provided the distinction between discussion,
advocacy, and incitement and the Court held that reasonable restrictions under Article
19(2) on free speech and expression may be imposed only in instances where incitement
is evident. In this case, the constitutional validity of section 66A of the IT Act was mainly
challenged because of its violative nature of right guaranteed under Article 19(1)(a), and also
it falls outside the ambit of reasonable restrictions under Article 19(2).
In this case, court found that section 66A is capable of limiting all forms of internet
communications as it doesn't "make any distinction between mere discussion or advocacy of
a particular point of view, which may be annoying or inconvenient or grossly offensive to
some and incitement by which such words lead to an imminent causal connection with public
disorder, security of State etc.". Further, section 66A of the IT Act fails to establish a clear
proximate relation to the protection of public order.
In the landmark case of Romesh Thappar, the term public order has been defined as "a state
of tranquillity which prevails amongst the members of a political society.” According to the
Court in Shreya Singhal's case under Section 66A, an offense has been committed by sending
a message for the purpose of causing annoyance or insult, but the same law fails to make a
distinction between mass dissemination and dissemination to an individual without requiring
the message to have a clear tendency of disrupting public order.
In this case, difference between "Hate Speech and Fair Speech" was also highlighted, and
according to the Apex court, "any innocent comment made by anyone whose aim is not to
defame or disrespect anyone cannot fall under the ambit of hate comment."
With regards to the vagueness of the section 66A, the Honourable Apex court in Shreya
Singhal's case referred to judgments given by U. S. Supreme Court in series of judgments
U.S. Supreme court held that:
"there where no reasonable standards are laid down to define guilt in a Section which
creates an offense, and where no clear guidance is given to either law-abiding citizens or to
authorities and courts, a Section which creates an offense and which is vague must be struck
down as being arbitrary and unreasonable."
Further, section 66A is also capable of imposing a chilling effect because the provision fails
to define terms like inconvenience or annoyance; therefore, "a very large amount of protected
and innocent speech" could be curtailed. Therefore, we can understand that section 66A of
the IT Act is unconstitutional. Similarly, the Honourable Supreme Court, in the case of
Shreya Singhal vs. Union of India, also struck down Section 66A of the IT Act and declared
it as unconstitutional.
Sec 67 Avanish Bajaj, Sharad Digumati

Factual Background of the case: Sharat Babu Digumatri v. Government of NCT of Delhi
• An obscene MMS video was listed for sale on the website www.bazeee.com (now An
obscene MMS video was listed for sale on the website www.bazeee.com
(now www.ebay.in) ("Website"). Though the Website had requisite filters to detect
such listings, this listing was not tracked.
• The item was first listed on the evening of November 27, 2004 on the Website and
deactivated only two days later i.e. on 29 November, 2004 after a complaint was
lodged. In the meantime, a few sales took place through the Website.
• Upon investigation by the Crime Branch of Delhi, Ravi Raj, Avnish Bajaj, the
managing director of the Website, and Sharat Digumarti, the manager of the Website,
were held responsible for handling the content on the Website. They were listed as the
accused on the charge sheet.

Relevant Provisions of the IPC and IT Act


• Section 292 of the IPC deals with obscenity, and states that a figure or any object
shall be deemed to be obscene if it is lascivious or appeals to the prurient interests
such as to tend to deprave and corrupt a person. Further, the section makes it an
offence to distribute, import, export, exhibit, advertise, etc. obscene content by means
of traditional print media
• Section 294 of the IPC makes it an offence to do any obscene acts, or utter obscene
words or songs in public places to the annoyance of others.
• Section 67 of the IT Act makes it an offence to publish or transmit obscene content
in electronic form.
Thus, the difference between Section 292 of the IPC and Section 67 of the IT Act is that
while the latter criminalizes the transmission of obscene content by electronic means,
the former criminalizes the dissemination of obscene content through conventional print
media, such as through writings, drawings, books or pamphlets.

Court Proceedings in the Avnish Bajaj Case


Avnish Bajaj filed a petition for quashing of the criminal proceedings against him. He
contended, among other grounds, that the MMS was transferred directly between the seller
and buyer without the intervention of the Website. Hence, he could not be held responsible
for a mere listing on the Website which was not obscene and in no way attracted either
Section 292 or 294 of the IPC or Section 67 of the IT Act.
In 2005, the Delhi High Court ("DHC") observed that1:
• There was a prima facie case against the Website in respect of the listing of the video
clip and its contents and an offence, under certain sub- sections of Section 292 of the
IPC was made out.
• Avnish Bajaj could not be held liable as the company was not arraigned as a
plaintiff.
• The IPC did not recognize the concept of automatic criminal liability of a
director of a company, when the company itself was not a party to the suit.
• A prima facie case was made out against Avnish Bajaj for an offence under
section 67 of the IT Act, since the law recognizes the deemed criminal liability of
the directors even where the company is not arraigned as an accused. This is
because, Section 85 of the IT Act provides that, when a company commits an
offence under the IT Act, every person who was in charge of the company at the
time may be proceeded against.
However, the SC, in 2012, overturned this finding while holding that, vicarious liability
cannot be fastened to Avnish Bajaj and he could not be held guilty under the IT Act
provisions as the company was not arraigned as an accused. In this respect, the SC drew a
parallel between section 141 of the Negotiable Instruments Act, 1881 ("NI Act"), and section
85 of the IT Act. Section 141 of the NI Act is of the same substance as section 85 of the IT
Act, in the context of certain offences by companies under the NI Act. In interpreting section
141 of the NI Act, the SC held that the commission of an offence by the company was an
express condition precedent to attract the liability of others in charge of the company, hence,
since there was no case made against the company, Avnish Bajaj was acquitted.
Post this case, the IT Act was amended to introduce, amongst other amendments, an
amendment to Section 79(1) of the IT Act ("Section 79"). This section, subject to certain
conditions, provides immunity / safe harbor to intermediaries (such as the Website)
from the penalties under the IT Act for content made available on its platform by third
parties.

Court Proceedings in Sharat Digumatri Case


Following the judgment of the SC quashing all proceedings against Avnish Bajaj, Sharat
Digumatri ("Sharat"), the other manager of the Website, filed an application before the trial
court to drop proceedings against him as well. The trial court dropped the proceedings
against Sharat for offences under section 294 of the IPC ("Section 294") and section 67
of the IT Act ("Section 67"), however it framed the charge in terms of section 292 of the
IPC ("Section 292"). This order framing the charge was upheld by the DHC. The DHC
stated3 that liability could attach to Sharat in his individual capacity. Sharat appealed
against this DHC order before the SC in the present proceedings.

Issue adjudicated upon by the two judge bench of the Supreme Court
Whether Sharat, who had been discharged under Section 67 could be proceeded under
Section 292?

Sharat's Arguments
It was submitted before the SC that:
• Sharat could not be proceeded under Section 292 after having been discharged under
Section 67. It was argued that, Section 67 was a special provision and it would
override Section 292. There was a distinction drawn between offences in relation to
the internet under Section 67 and offences in relation to conventional media under
Section 292;
• Even if all the allegations against Sharat were accepted, he would be protected under
Section 79 since it was established that the offending material was an electronic
record under the IT Act and hence Section 79 would have to apply;
• Section 81 of the IT Act ("Section 81") provided that the provisions of the IT Act had
overriding effect on any other law in force.4 Hence, by virtue of Section 81, Section
79 would get automatically attracted to electronic forms of publication and
transmission of obscene material by intermediaries. The horizon of Section 79 had
been expanded to extend its protection to individuals as well. For this argument,
reliance was placed on the landmark case of Shreya Singhal v Union of India in which
the SC read down Section 79 to hold that an intermediary would have to receive
actual knowledge by means of a court order or a government notification prior to
taking down offensive content on the internet.

Judgment
The SC reasoned that it was beyond dispute that the alleged possession of the MMS clip by
Sharat constituted an electronic record under the IT Act.
The SC referred to the Shreya Singhal ruling in which the SC had at the time of striking down
section 66 A of the IT Act, held that the provision did not contain the word 'obscene.' It
criminalized what was 'grossly offensive' or 'annoying,' and hence, it could not be said to
create an offence pertaining to decency or morality. The SC further reasoned that what could
be grossly offensive or annoying under the section needn't have been obscene at all. In the
instant case, the SC was required to adjudicate upon which of the provisions and statutes i.e.
Section 292 or Section 67, or both, the accused were required to be tried under.
The SC looked at the nomenclature of certain provisions of the IT Act:
• Section 67 provided for punishment for publishing or transmitting obscene material in
electronic form.
• Section 67A of the IT Act stipulated punishment for publishing or transmitting of
material containing sexually explicit acts, etc. in electronic form.
• Section 67B of the IT Act, too, provided for publishing or transmitting material
depicting children in sexually explicit acts, etc., in electronic form.
The court referred to these provisions to emphasize on the fact that the legislature had
deliberately used the words 'electronic form' in all places. Relying on this, the court reasoned
that Section 67, read with section 67A and 67B, was a complete code relating to offences
under the IT Act. Section 79 was an exemption provision providing protection to individuals,
which protection had been expanded by virtue of the ruling in Shreya Singhal.
The SC rationalized that all the aforementioned provisions of the IT Act, along with
Section 81, would apply if the offence applied to an electronic record. While Section 292
made it an offence for the sale of obscene books, etc., once the offence had a nexus with an
electronic record, Section 79 could not be ignored. The logic underlying this
interpretation, according to the SC, was that Section 79 was a special provision laid
down for a specific purpose.
The SC while quashing the criminal proceedings against Sharat, held that:
• obscenity pertaining to electronic records fell under the scheme of the IT Act.
• Electronic forms of transmission were covered by the IT Act, which was a special
law and if the alleged offender has been acquitted under the relevant provisions
of the IT Act, he could not have been proceeded against under the IPC for the
same offence.
• the DHC had erred in holding that Sharat could be proceeded under Section 292
despite the charges against him under Section 67 being dismissed.

Sec 65B IEA, Anvar vs. PK Basheer


“Arjun Panditrao Khotkar v. Kailash Kushanrao Gorantyal & Ors
The Supreme Court has held that the certificate required under Section 65B(4) is a condition
precedent to the admissibility of evidence by way of electronic record.
A Three Judge Bench of the Supreme Court comprising Justices RF Nariman, S Ravindra
Bhat and V Ramasubramanian delivered this judgment on a reference on the question "Is
requirement of certificate u/s 65-B(4) Evidence Act mandatory for production of electronic
evidence?" A two Judge Bench of Justices Ashok Bhushan and Navin Sinha had referred the
question in view of the conflict between “Shafhi Mohammad v. State of Himachal Pradesh”
and “Anvar P.V. v. P.K. Basheer”.

You might also like