It Notes
It Notes
1) The most visible and readily sensational concern is about the use of internet particularly
for the distribution of obscene, indecent and pornographic content. The use of internet
for child pornography and child sexual abuse and the relative ease with which the same
may be accessed calls for strict regulation.
2) The challenge that Cyberspace is posing to traditional notions of jurisdiction and
regulation is another factor. The increasing business transaction from tangible assets to
intangible assets like Intellectual Property has converted Cyberspace from being a mere info
space into important commercial space. The attempt to extend and then protect intellectual
property rights online will drive much of the regulatory agenda and produce many technical
methods of enforcement.
3) With the inventions of new technologies, the media has enhanced the possibility of
invasion of the privacy of individual and bringing it into the public domain. The major
area of concern where some sort of regulation is desirable is data protection and data privacy
so that industry, public administrators, netizens, and academics can have confidence as on-
line user.
4) Encryption is the process of converting a message or document into a form that hides the
content of the communication from the eyes of an eavesdropping third party and needs to be
decrypted if its content is to be read. New cryptographic techniques (cryptography is the
process used to encode/encrypt electronic information) are commonly cracked in a relatively
short time by computational force or by other analytical means. Therefore, another area in
which regulation has assumed importance is in the debate over whether the public
should be permitted to use ‘cryptography’ or not.
5) Internet has emerged as the ‘media of the people’ as the internet spreads fast there were
changes in the press environment that was centered on mass media. Unlike as in the
established press, there is no editor in the Internet. In the press and publication environment,
editors check the truthfulness of facts and circulate them once the artistic values are
confirmed. On the internet however, people themselves produce and circulate what they want
to say and this direct way of communication on internet has caused many social debates.
Therefore, the future of Cyberspace content demands the reconciliation of the two views of
freedom of expression and concern for community standard.
The Model Law was prepared in response to a major change in the means by which
communications are made between parties using computerized or other modem
techniques in doing business (sometimes referred to as trading partners). India moved
swiftly and promptly in this direction and the Indian Parliament passed the Information
Technology Act, 2000 on the pattern of the Model Law on Electronic Commerce
(UNCITRAL) adopted by the UN committee on International Trade Law and it came in
force on October 17, 2000.
The Model Law is aim to facilitate Electronic Commerce by providing internationally
acceptable rules and legal principles that may be used by the States in enacting legislation to
remove legal uncertainties arising from the application of paper-based rules and regulations
in the electronic environment.
The term ‘Electronic Commerce' itself has not been defined anywhere in the modal law.
Instead, the term 'Electronic Data Interchange’ (hereinafter referred to as EDI) has been
defined in art 2(b) as follows:(b) 'Electronic Data Interchange (EDI)' means electronic
transfer from the computer to computer of information using an agreed standard to
Structure the formation.
UNCITRAL Model Law on Electronic Commerce defines electronic data interchange (EDI)
as the electronic transfer from the computer to computer of information using an agreed
standard to structure the information. Businesses accept that EDI facilitates trade and offers
enormous commercial benefits. Among other things, EDI saves time and money by reducing
or eliminating expenditure on costs, postage and storage requirement.
Net Neutrality
Net neutrality is the principle that all internet traffic should be treated equally, without
discrimination or preference given to any particular website, service, or application. Net
neutrality ensures that everyone has equal access to information and services on the
internet, regardless of their financial resources or the size and power of the websites
they use. It is an important principle that helps to ensure a level playing field on the internet,
and to protect the free flow of information and ideas. Without net neutrality, Internet Service
Providers could potentially use their market power to steer users towards certain websites and
services, or to limit access to others.
Section 2 (i) "computer" means any electronic magnetic, optical or other high-speed data
processing device or system which performs logical, arithmetic, and memory functions by
manipulations of electronic, magnetic or optical impulses, and includes all input, output,
processing, storage, computer software, or communication facilities which are connected or
related to the computer in a computer system or computer network;
Section 2(j) "computer network" means the interconnection of one or more computers
through— (i) the use of satellite, microwave, terrestrial line or other communication media;
and (ii) terminals or a complex consisting of two or more interconnected computers or
communication device whether or not the interconnection is continuously maintained;
Section 2(l) "computer system" means a device or collection of devices, including input and
output support devices and excluding calculators which are not programmable and capable
of being used in conjunction with external files, which contain computer programmes,
electronic instructions, input data and output data, that performs logic, arithmetic, data
storage and retrieval, communication control and other functions
Section 2(k) "computer resource" means computer, computer system, computer network,
data, computer data base or software;
• Background
An important question as to whether an Automated Teller Machines (ATM) can be termed as
a computer came up before the courts in this case. In the state of Karnataka under state tax
law, electronic goods were taxed at rate of 12% while computer terminals were taxed at 4%.
The question was at what rate an ATM will be taxed and under what schedule of the
state tax law will it fall. Whether an ATM is an electronic good or a computer terminal
was needed to be clarified by the court so as to decide what will be the tax that Diebold
Systems will be liable to pay?
• Facts
This case came up before the Karnataka High Court as an appeal. The appellants in this case,
which is Diebold Pvt Ltd is a company engaged in the manufacture and supply of Automated
teller machines (ATM). The Company in order to clarify the rate of tax that is applicable on
the sale of ATM approached the Advance Ruling Authority which was constituted under the
Karnataka Sales Tax Act, 1957. Diebold Systems filed an application in Form 54 as provided
under Rule 27-E (1) of the Karnataka Sales Tax Rules, 1957. As a result, the company had
appeared before the authority and made had their submissions as to the facts, literature, and
description of the ATM. Appearing for the company was Sri Mohan Mudkavi the learned
Chartered Accountant along with the Vice-President of the Company.
The judgment of the Advance Ruling Authority
The majority view of the ARA was to classify ATMs as "computer terminals" liable for 4%
basic tax as they would fall under Entry 20(ii)(b) of Part 'C' of Second Schedule to the
Karnataka Sales Tax Act. However, The Chairman of the ARA dissented from the majority
view. In his opinion, ATMs would fit into the description of electronic goods, parts, and
accessories thereof. They would thus attract the basic rate of tax of 12% and would fall under
Entry 4 of Part 'E' of the Second Schedule to the KST Act.
• Order by Commissioner of Commercial Tax
The Commissioner of Commercial Taxes being of the view, that the authority for clarification
and Advance Ruling has erroneously classified ATM's as "computer terminals" and thereby
has caused prejudice to the interest of the revenue, therefore it initiated suo-moto revisional
proceedings under Section 22-A(1) of the Act by issuing a show-cause notice directing the
appellant company Diebold Systems to show cause, why the order passed by the Authority
for clarification and Advance Ruling should not be set aside and the 'goods' in question
should not be treated as "electronic goods". The Commissioner of Commercial Taxes, after
considering the reply filed by the appellant company passed an order that ATMs cannot be
classified as computer terminals. Aggrieved by the aforesaid order passed by
the Commissioner of Commercial Taxes, the appellant company is before the High Court in
this appeal filed under Section 24(1) of the KST Act.
• Issue before the court
Is ATM a computer and whether it would fall under Entry 20(i) of Part 'C of Second
Schedule to the Act?
• Submissions before the High Court
The main submission before the authority by Diebold systems was that ATM is a
combination of a computer and it runs on a processor and the purpose for which it is put to
use is to dispense with cash to people and therefore, had requested the Authority to classify
ATM's as goods falling under Entry 20 of Part 'C' of the Second Schedule to the Act which
consists of a list of entries with main head Computers of all kinds and peripherals and not
Electronic goods falling under Entry 4 of Part 'E' of Second Schedule to the Act.
While the contention of Commissioner of Commercial Tax was that an ATM is not a
computer by itself. It is connected to a computer that performs the tasks requested by the
person using the ATM. The computer is connected electronically to many ATM's that may be
located some distance from the computer.
• Judgement
ATM is the acronym for Automated Teller Machine. this machine has a data terminal with
two inputs and four output devices. The ATM connects to and communicates with a host
processor that is analogous to an Internet Service provider. Then as a way of supporting the
Machine to the host processor, dial-up or leased lines are used. With the dial-up, the Machine
would dial into the host processor, using a standard telephone line and modem. With the
leased line. The machine is connected through the host processor through what is called a
four-wire, point to point, dedicated telephone line. The ATM does not have many parts; there
is a card reader, which is what captures a person's account information that is stored on the
magnetic strip located on the back of the ATM/debit card. This information is actually used
by the host processor in routing the transaction to the appropriate bank. Then it has a
'Keypad', which is used by the cardholder to tell the machine what type of transaction is
needed. It has an 'electric eye' that is used for the cash dispensing mechanism. In addition to
the eye, the ATM has a 'sensor that is capable of evaluating the thickness of each of the bills
being dispensed.
Coming to the Karnataka Sales Tax Act, it is clear that the Act is a taxing statute and the
Schedule to an Act is very much part of fiscal enactment. It is enacted by the hand of the
Legislature. The Schedule in an Act sets down things and objects and contains their names
and descriptions. The expressions in the Schedule have no evocative function. They can
neither enlarge nor cut down the meanings or articles or things specifically named in the
list. Therefore, the enlarged definition of "computers" in the Information Technology Act
cannot be made use of interpreting an Entry under fiscal legislation.
An Automatic Teller Machine is an electronic device, which allows a bank's customer to
make cash withdrawals and check their account balances at any time without the need
of human teller. ATM is not a computer by itself and it is connected to a computer that
performs the tasks requested by the person using ATMs. The computer is connected
electronically to many ATM's that may be located from some distance from the computer. As
a result, the appeal fails, and accordingly, it is rejected.
There is no dedicated legislation, particularly and solely, to the field of electronic governance
in our country. Although, some of the existing laws in India do apply to electronic
governance which have been talked about briefly below.
Safe Harbour
The “safe harbour” provision in the Information Technology (IT) Act refers to legal
protection for Internet service providers (ISPs) and other intermediaries that host or transmit
third-party content online.
Under Section 79 of the IT Act, ISPs and other intermediaries are not held responsible for
any third-party content that they host or transmit on behalf of others, as long as they comply
with certain conditions. These conditions include:
• They must not initiate the transmission of the content
• They must not select or modify the content
• They must observe due diligence in the operation of their services
• They must remove or disable access to the content upon receiving actual knowledge
or notification of the content’s illegality
The safe harbour provision is intended to encourage the growth of the Internet and e-
commerce by providing legal certainty for intermediaries that enable the flow of information
and services online, while still holding them accountable for illegal content if they have
actual knowledge of it.
Need for reconsidering safe harbour
• The Information Technology Act of 2000 currently serves as the main regulatory
framework for online businesses. The law must be updated, though, as it was created
for a time when the Internet was substantially different from what it is today. The
government has occasionally found it challenging to enact regulations because of the
parent Act’s restrictions due to its narrow scope.
• The new Digital India Bill’s main goals are to speed up the development of
technological innovation and provide an open and secure Internet in the nation in
order to protect users’ rights and lower their online risks. The proposed Digital
Personal Data Protection Bill, 2022, the Indian Telecommunication Bill, 2022, and a
policy for non-personal data governance are all components of a larger framework of
technological rules that the centre is constructing.
• Need for balancing fundamental rights (freedom of speech and expression) with the
dignity of the individual and misinformation.
• The emergence of different types of intermediaries like e-commerce, digital media,
search engines, gaming platforms, significant social media intermediaries, fact-
checking portals, etc.
MODULE 2
E-Contract
The Information Technology Act, 2000 has introduced certain statutory conditions pertaining
to methodology of contracts formed electronically using computer, computer system or
computer network.
➢ What Is E-Contract?
An E-contract (that are not paper-based rather they are electronic-based) is a kind of
contract formed in the course of e-commerce by the exchange of two parties using
electronic means, such as e-mail, telephones, faxes. The interaction of an individual should
happen with an electronic agent, such as a computer program, website forms like telephonic
discussions, or an exchange of at least two electronic agents that are organized to allow the
existence of a contract. An E-contract is a contract shaped, specific, executed, and expand by
a software system.
The 2 main parties to an e-contract are:
1. The Originator
An Originator, as per the IT Act, 2008, states that it is a person who sends, generates, stores,
or transmits any electronic message to be sent, generated, stored, or transmitted to some other
person, and does not, include any Intermediary.
2. The Addressee
An Addressee, as per the IT Act, 2008, states that it is a person who is intended by the
originator to receive the electronic record, but does not, include any Intermediary.
• Physical goods, where goods are ordered on an online platform and payment is made via
the internet, and delivery is made physically. For example, Amazon or Flipkart.
• Digital products like software can be ordered.
• Services like electronic banking, financial advice, etc are also subject matters.
It is clear from the aforesaid judgments that the courts have reinterpreted the contractual
obligations of the offeror/acceptor by evaluating the technological applications. It is an
established law that the contract is complete only when the acceptance is received by the
offeror and the contract is made at the place where the acceptance is received
(instantaneous communication rule). Mere mechanical application of either postal rule' or
'instantaneous communication rule without taking into accounts the facts and circumstances
would be fallacious).
In WWE v. Reshma Collection, the Delhi High Court has decided the issue of territorial
jurisdiction on the basis of the instantaneous communication rule. One should not
forget that the difference between "postal" and "instantaneous" is the speed of
communication
In Trimex International FZE Ltd. v. Vedanta Aluminium Ltd. India, the Supreme
Court has held that in the absence of signed agreement between the parties, it would be
possible to infer from various documents duly approved and signed by the parties in the
form of exchange of e-mails, letter, telex, telegrams and other means of
telecommunications
The Information Technology Act, 2000 has not amended or substituted the Indian Contract
Act, 1872 in any manner whatsoever.
1) Section 4
“Section 4: Legal recognition of electronic records: Where any law provides that
information or any other matter shall be in writing or in the typewritten or printed
form, then, notwithstanding anything contained in such law, such requirement shall
be deemed to have been satisfied if such information or matter is-
o rendered or made available in an electronic form; and
o accessible so as to be usable for a subsequent reference.”
Electronic contracts (E-Contracts) and are legal in India and are governed by the
Information Technology Act of 2000. (IT Act). The necessity for any information or
matter to be in writing, typewritten, or printed form under any legislation shall be deemed
satisfied if such information or matter is in an electronic form and is accessible so that it
can be used for future reference, according to Section 4 of the IT Act. Section 4 of the
Information Technology Act reads as:
2) Section 10A
“Section 10A: Validity of contracts formed through electronic means- Where in a
contract formation, the communication of proposals, the acceptance of proposals, the
revocation of proposals and acceptances, as the case may be, are expressed in electric
form or by means of an electronic record, such contract shall not be deemed to be
unenforceable solely on the ground that such electronic form or means was used for that
purpose.”
Proposals and acceptances may also be sent, accepted, and withdrawn electronically or
through electronic records, according to Section 10A of the IT Act.
3) Section 11
Attribution of electronic records.—An electronic record shall be attributed to the
originator—
(a) if it was sent by the originator himself;
(b) by a person who had the authority to act on behalf of the originator in respect of that
electronic record; or
(c) by an information system programmed by or on behalf of the originator to operate
automatically.
4) Section 12
Acknowledgment of receipt.—(1) Where the originator has not 3[stipulated] that the
acknowledgment of receipt of electronic record be given in a particular form or by a
particular method, an acknowledgment may be given by—
(a) any communication by the addressee, automated or otherwise; or
(b) any conduct of the addressee, sufficient to indicate to the originator that the electronic
record has been received.
5) Section 13
Time and place of despatch and receipt of electronic record.—(1) Save as otherwise
agreed to between the originator and the addressee, the despatch of an electronic record
occurs when it enters a computer resource outside the control of the originator.
The dispatch of an electronic record occurs when it enters a computer resource outside the
control of the originator.
In light of the aforementioned provisions of the IT Act, Indian courts have upheld the validity
of contracts made in an electronic format on a number of occasions.
Jurisdiction of E-Contracts
Jurisdiction is an extent of the power of the court to hear a case i.e., to take cognizance of the
case and to make legal decisions and judgements. It is the legal authority of the court to
resolve the dispute. E-contract involves instant communication of offer and acceptance.
Wherein the contract is complete at the end of originator where acceptance is received.
The Supreme Court of India in case of Bhagwandas Goverdhandas Kedia vs. Girdhari Lal
Parshottamdas & Co held that “at the place of proposer where the acceptance is received shall
have the jurisdiction for enforcement of contracts entered into by means of computer
internet.”
In India, the Code of Civil Procedure, 1908 provides the manner of determining the
jurisdiction of Civil Courts, which is based on the place of residence and the place where the
cause of action arises. Generally, the contracts insert a specific clause to determine the
territorial jurisdiction to resolve the dispute arising under such contracts.
An E-contract crosses the jurisdictional boundaries as it can be created from any place in the
globe. This raises the question of jurisdiction of the court in case of any dispute between the
parties to E-contracts.
If there is any dispute among the parties belong to the same jurisdiction related to E-contract,
then such dispute can be resolved similar to the traditional contract disputes. However, the
challenges would arise when the parties to E-contract are belong to the different countries.
Jurisdictional problem in E-contract has been resolved under IT Act in India. Specifically,
Section 13 of the IT Act deals with the time and place of despatch and receipt of an electronic
record and electronic contracts.
➢ Types of E-Contracts
1. Click-Wrap agreements
A click-wrap agreement is normally provided in a check box wherein the user is asked
to agree to terms of services and other information asked by the website or the software
concerned.
The Hotmail Corporation vs. Van $ Money Pie Inc.
It was one of the first cases in which the validity of the Click Wrap Agreement was upheld by
the court. The plaintiff (Hotmail) alleged that the consumer has violated the terms of the
agreement as the messages and e-mails were altered after submitting them once. The
defendant was also accused of violating the Computer Fraud and Abuse Act, breach of
contract, fraud, misrepresentation, etc.
The court after going through the terms and conditions of the agreement clearly held that it is
a valid and enforceable agreement in the eyes of the law. Since the customer has violated
them, he is liable to pay compensation.
2. Shrink-wrap agreements
Shrink-wrap agreements are mostly related to computer software. The software is
mostly distributed in CD-ROMs. When the licensing software is opened by the person for
his use, it means he accepts the terms and conditions of that software company.
The term “shrink-wrap” refers to the plastic wrapping which covers the software boxes.
This wrapping can be understood as the legally enforceable terms and conditions. As
soon as the user removes that wrapping, he is entering into a contract.
PC programming organizations are mainly dependent upon this type of agreement. It is a sort
of unsigned undertaking given by the customer while submitting to the terms and conditions.
Following are the terms and conditions which can be made through the Shrink-wrap
agreements-
• License
• Fees and payments
• Warranties
• Limitations of liability
The validity of the shrink-wrap agreement came into question in the case ProCd Inc vs.
Zeidenberg. In this case, the manufacturer has included a shrink license in its packaged
software. The customer purchased the software but didn’t follow the license restricting its
commercial usage. To enforce the license, the appellant filed for an injunction. The court
denied the injunction while stating that though the terms and conditions are not explicitly
provided, the license was to be treated as an ordinary contract. Thus, it is enforceable
3. Browse-wrap agreements
Browse-wrap agreements are probably seen on many websites while searching or
reading anything on websites. They are some kinds of pop-ups that ask you to click
“OK” or “I AGREE” though, you can use the website with or without clicking there.
In this agreement, there is a hyperlink or website containing the terms and conditions over the
screen of the website. When the person agrees to the above-stated terms and conditions, he
can access the material available and download the product available therein.
For instance- Electronic commerce websites such as Amazon and Paytm provide a disclaimer
while entering their website stating that by accessing or browsing the website, the user has
consented to all the terms and conditions. The terms and conditions clause are hyperlinked.
However, it is also observed that sometimes the browse wrap clause is hidden or not
explicitly shown on the website page. It may lead to conflict in the future.
Jurisdiction of E-Commerce
Jurisdiction is the power of State to regulate the conduct of its subjects by legislation,
adjudication and enforcement. The current module only deals with the adjudicative
jurisdiction of court prescribe by State to resolve issues and fix the liability of parties.
Cyber Jurisdiction or Jurisdiction in Cyber Space- In simple terms, is the extension of
principles of international jurisdiction into the cyberspace. Cyberspace has no physical
(national) boundaries. It is an ever-growing exponential and dynamic space.
➢ Tests of Jurisdiction
Long-Arm Statute
The principle of ‘Long Arm Statute’ empowers the State to exercise its personal jurisdiction
over a non-resident defendant who has certain contacts with the state. This practice was
developed by United States over a long period of time.
For example, the long arm statute of New York gives its courts the power to exercise
jurisdiction over non-New York residents who; transact business within New York or
committed tort (other than defamation) within New York, or committed tort (other than
defamation) outside New York which injured persons or property located within New York,
or own, use, or possess any real property situated within New York.
Even IPC and IT Law have extra-territorial jurisdiction which work as long-arm statute, but
is difficult to apply.
Effect Test
This test was propounded in the case of Calder v Jones, it was held that the due process
requirements of the “minimum contact” may be satisfied on the basis of “effects” that the
conduct out of state has in the forum state.
Facts: In this case there was a magazine printed and published in Florida. An article saying
something defamatory about a citizen of California was published. The Californian citizen
filed a case against the writer of that article, the defendant then contends that the magazine is
of Florida is published in Florida and sold in Florida itself, then the Californian Court have
no Jurisdiction to entertain this case.
Judgment: The Court rejected the contention and held that as the magazine was also
available in the State of California and causes an effect to the Californian citizen. Thus,
we have the jurisdiction to entertain this case. And the court then propounded the
conditions needs to be satisfied-
i. an intentional action,
ii. that was expressly aimed at the forum state,
iii. with knowledge that the brunt of the injury would be felt in the forum state.
CPC
In Indian context the Code of Civil Procedure and Criminal Procedure Code incorporates the
jurisdiction of the Court in the case national and international aspects of issues. Section 20 of
the Code covers the international jurisdiction and has interpreted in the internet related cases.
IT Act
Sec 1 specifies the extent of the application of this act.
It states that: (2) It shall extend to the whole of India, save as otherwise provided in this Act,
it applies also to any offence or contravention thereunder committed outside India by any
person.
Sec 75 deals with the provisions of the act to apply for offences or contraventions committed
outside India.
It states that: subject to the provision of sub section (2), the provision of this act shall also
apply to any offence or contravention committed outside India by any person irrespective of
his nationality.
For the purpose of sub section (1), this act shall apply to an offence or contravention
committed outside India by any person if the act or conduct constituting the offence or
contravention involves a computer, computer system or computer network located in India.
Cases
Copyright in Cyberspace
Judgment
The Supreme Court remanded with Justice Breyer writing for the majority. It began by
affirming that the constitutional objective of copyright is “to promote the Progress of Science
and useful Arts.” The Court found that all four factors favored Google and held that
Google’s copying was fair use as a matter of law.
• For “expository purposes,” the majority opinion began by examining the second factor:
the nature of the copyrighted work. It noted at the outset that although software is
copyrightable, all code is not created equal.
• Turning to the first factor, the Court next addressed the purpose and character of the
use the majority considered whether Google’s use imbued the copied code “with new
expression, meaning or message, or, more simply, whether it was “transformative.”
• In addressing the third factor — the amount and substantiality of the use — the
majority noted that when the amount copied is “tethered to a [copier’s] valid,
transformative purpose,” the factor will “generally weigh in favor of fair use.” Here,
the Court characterized Google’s “basic objective” as allowing programmers to use their
pre-existing knowledge of the Java API to create new programs for Android. As declaring
code was the “key” to “unlocking the programmers’ creative energies,” this factor
weighed in favor of fair use.
• The Court reached the fourth factor, assessing the potential market harm from
Google’s copying. The Court noted that the “potential loss of revenue was not the
whole story,” and that it also had to consider “the source of the loss” in addition to any
“public benefits the copying [would] likely produce.”
Justice Thomas dissented. He asserted that the majority skipped over the
copyrightability analysis, thereby ignoring “half the relevant statutory text and
distorting its fair-use analysis.” He argued that by failing to analyze the Copyright Act’s
definition of a copyrightable “computer program.”
1) Linking
"A "link" is a set of commands in Hypertext Markup Language (HTML) that when actuated
by right-clicking a mouse directs your browser to another page. The new page could be in the
website you're viewing or it could be a page in another website.
Three other well-known types of links are: "intra-page, intra-system, and inter-system. Intra-
page links connect different parts of the same document. For example, a long document may
have a link at the end which takes the user back to the beginning. Intra-system links connect
different documents on the same server. An intra-system link on a university's server might
connect the home pages of two different departments. An intersystem link connects
documents on different servers. Thus, a document concerning intellectual property law on a
university's server might be connected to the home page of the Governments Patent Office"
Some relevant cases in order to provide on a general perspective for linking:
Shetland Times, Ltd. v. Jonathan Wills and Another, is considered the first "linking" case;
"the issue presented in Shetland Times was whether the Shetland News's ("News") "deep
link" to embedded pages of the Shetland Times's ("Times") web site, through the use of
Times' web site's news headlines, was an act of copyright infringement under British law.
The matter settled on the day of trial, shortly after the court had issued a preliminary
injunction precluding the deep link. Although much discussed, this opinion has proved to be
of little legal significance, in part because of the extremely low evidentiary standard applied
by the court."
One of the most well-known cases was Ticket master v. Microsoft - The first major case
involving the practice of deep linking involved Microsoft's use of deep links from its
"Sidewalk" web guides. These web guides spotlighted, among other things, upcoming events
in a particular area, and would provide deep links to information on specific events on
interior pages of the Ticket master website. At that time, Ticket Master had recently signed
an agreement to provide event information and ticket-ordering links to a competing web
guide service, City Search. Through this agreement, City Search was paying Ticketmaster for
what Microsoft was taking for free. Ticketmaster filed suit against Microsoft on April 28,
1997, arguing that Microsoft's practices devalued Ticketmaster's site by bypassing its home
page.
2) Framing
Framing is a method of splitting one window into two or more screens. A web page can be
inserted into a frame, and that portion of the screen will remain static as a user moves through
other web pages. This method is called "framing," because it allows a webmaster to send an
individual through numerous web pages while retaining the appearance and the utility of the
frame inserted.
Most of the "Intellectual Property in Cyberspace" pages utilize frames. The pages in this
technical primer have been set to open outside of the frames." Technically explained, a
framing process works as follows: "The frames may contain either highlighted URL
addresses of other Web pages that are intended to be "selected" by the framing page user or
other pages within the same Web site.
Nevertheless, the most accepted legal concept is that framing can cause consumer confusion
and thereby violate trademark laws and under particular laws can be unfair competition. The
problem with a finding of copyright infringement of a literary work where such links are
concerned is similar to that raised in respect of meta-tags because these hypertext links are
likely to contain only relatively short phrases.
The case of Shetland Times is unlikely to be helpful as it was only an interim decision and
thus decided on a lower standard of proof. An example of such a pictorial link would be that
found in Ticketmaster Corp v Microsoft Corp where the link from the defendant's website to
the plaintiff's site comprised the plaintiff's logo. In that case, the plaintiff sold and marketed
tickets to various entertainment events through its website 'http://www.ticketmaster.com' on
the internet. The home page of the plaintiff displayed advertisements, products, and services
of other parties with which the plaintiff had contracts, thus providing it with an important
source of revenue. The defendant set up a website 'http://seattle.sidewalk.com' and initially
entered into negotiations with the plaintiff to have hyperlinks from their Seattle Sidewalk site
to the plaintiff's Ticketmaster site. When the negotiations failed, the defendant established the
links anyway.
Facts
• The Plaintiff claims to be the owner of repertoire of songs, cinematograph films, and
recordings, etc with over 20000 Hindi Non film songs and around 50000 songs in
regional languages.
• A suit is filed against Myspace which is a social networking platform for infringement of
copyright of Plaintiff as the platform of Myspace allowed the users to upload and share
files which were under the authorisation of plaintiff.
• The suit was filed for infringement under section 51(a)(i) and section 51(a)(ii) of the
Copyright Act, 1957.
• The plaintiff claims that in year 2007 there was a non-disclosure agreement signed
between the plaintiff and the defendants, following which there were discussions with
regard to the defendants procuring a license from the plaintiff to display the plaintiff’s
copyrighted material.
• However, there arose a dispute between the parties and the material of Plaintiff continued
to be on the website of the Defendant even without any licence.
• A legal notice was sent by the Plaintiff to the defendant to take down the material to
which the reply received by the Defendant provided that the material has been taken
down.
• A few months later, the Plaintiff found that the material was not taken down despite the
assurance from the Defendants.
• Dissatisfied with the assurances of the defendants the plaintiff filed the present suit before
the Delhi High Court; the plaintiff also sought interim relief before the same court.
2) Does the proviso to Section 81 override the "safe harbor" granted to intermediaries under
Section 79 of the IT Act, 2000? AND 3) Whether it was possible to harmoniously read and
interpret Sections 79 and 81 of the IT Act, and Section 51 of the Copyright Act?
Ans. No, the proviso does not override the safe harbor, i.e. the safe harbor defence
cannot be denied to the intermediary in the case of copyright actions. The three sections
have to be read harmoniously, indeed.
The judgment referred to the Parliamentary Standing Committee report as a relevant tool in
interpreting the two provisions, declaring that the rights conferred under the IT Act, 2000
are supplementary and not in derogation of the Patents Act or the Copyright Act. The
proviso (u/s 81)was inserted only to permit copyright owners to demand action against
intermediaries who may themselves post infringing content – the safe harbor only
existed for circumstances when content was third party/user generated.
Given the supplementary nature of the provisions- one where infringement is defined and
traditional copyrights are guaranteed and the other where digital economy and newer
technologies have been kept in mind, the only logical and harmonious manner to interpret the
law would be to read them together. Not doing so would lead to an undesirable situation
where intermediaries would be held liable irrespective of their due diligence. (Para 49 in
decision)
Regarding section 79, the court reiterated that the section only granted a limited immunity to
intermediaries by granting a measured privilege to an intermediary, which was in the nature
of an affirmative defence and not a blanket immunity to avoid liability. The very purpose of
section 79 was to regulate and limit this liability; whereas the Copyright Act granted
and controlled rights of a copyright owner.
On MySpace Complying with Safe Harbor Requirements under Section 79 of the IT Act,
2000 (and Intermediary Rules, 2011)
The court held that MySpace's operations were in compliance with section 79(2)(b). The
content transmission was initiated at the behest of the users, the recipients were not
chosen by MySpace, neither was there modification of content. On the issue of
modification, the court reasoned that since modification was an automated process (MySpace
was inserting ads) which changed the format only, without MySpace's tacit or expressed
control or knowledge, it was in compliance of the legislative requirement.
Despite several safeguard tools and notice and take-down regimes, infringed videos find their
way. The remedy here is not to target intermediaries but to ensure that infringing material is
removed in an orderly and reasonable manner. A further balancing act is required which is
that of freedom of speech and privatized censorship. If an intermediary is tasked with the
responsibility of identifying infringing content from non-infringing one, it could have a
chilling effect on free speech; an unspecified or incomplete list may do that. (Para 62 in the
decision)
On the second aspect of due diligence, the court held that MySpace complied with the
due diligence procedure specified in the Rules - it published rules, regulations, privacy
policy and user agreement for access of usage. Reading Rule 3(4) with section 79(2)(c), the
court held that it due diligence required MySpace to remove content within 36 hours of
gaining actual knowledge or receiving knowledge by another person of the infringing
content. If MySpace failed to take infringing content down accordingly, then only will safe
harbour be denied to MySpace. This liberal interpretation of due diligence is a big win for
internet intermediaries in India.
Relief Granted
Setting aside the Single Judge's order, the Court directed SCIL to provide a specific catalog
of infringing works which also pointed to the URL of the files. Upon receiving such specific
knowledge, MySpace has been directed to remove the content within 36 hours of the issued
notice. MySpace will also keep an account of the removals, and the revenues earned from ads
placed for calculating damages at the trial stage.
Trademark in Cyberspace
➢ Representing a Trademark
A trademark must be capable of being represented graphically, either as a word, a logo, or
image. If it is not capable of graphic representation, like ideas, emotions or business methods,
it must be rejected/Thus, it is important to note that for trademark registration purposes only
graphic representations are accepted as it supports accessibility. As outlined above,
distinctiveness is a 'key' element required for registration. Even for non-traditional marks,
like three-dimensional marks, colour marks, sound marks, moving image marks -
'distinctiveness' plays an important role in their registrability.
Thus a registered trademark:
• is a 'distinctive' asset that can be bought, sold or licensed; helps in notifying and enforcing
ownership of rights;
• identifies the origin of goods and/or services;
• denotes the goodwill of the company
• indicates quality of goods; and
• is often the basis of establishing licensing or franchising arrangements.
➢ Trademark Infringement
A trademark infringement is a violation of the trademark owner's rights. An infringement
occurs, when the impact of the proposed trademark is such that it is likely to cause
deception or confusion or mistake in the minds of persons accustomed to the existing
trademark.
In fact, in order to succeed in the court of law, the plaintiff has to show that the defendant has
used a mark 'deceptively similar to that of the plaintiff. It is crucial that the plaintiff must
make out a prima facie case of infringement against the defendant by articulating the
'defendants marks' visual, phonetic and/or structure closeness to its trademark.
➢ The UDRP
The dispute resolution proceedings are conducted before one of the administrative- dispute-
resolution service providers as mentioned above. Every domain name registrant has to submit
himself to a mandatory administrative proceeding in the event that a third party (a
"complainant") asserts [Para 4(a)] to the applicable Provider, in compliance with the Rules of
Procedure, that:
(i) the registrant domain name is identical or confusingly similar to a trademark or service
mark in which the complainant has rights; and
(ii) the registrant have no rights or legitimate interests in respect of name; and the domain
(iii) the registrant domain name has been registered and is being used in bad faith.
In the administrative proceeding, the complainant must prove that each of these three
elements are present. Much emphasis has been given to the bad faith registration [Para
4(a)(iii)], which is to be read with Para 4(b) of the UDRP.
It is significant to note that UDRP is a proactive dispute resolution mechanism, as it provides:
(a) a domain name registrant may continue to use his or her domain name while the
complaining party in the domain name is being determined before an ICANN- approved
arbitration panel or a court of competent jurisdiction [UDRP Para 7: Maintaining the Status
Quo].
(b) it permits the trademark owners to challenge the use of domain names that are
confusingly similar to their trademarks. It goes beyond the Anti cybersquatting Consumer
Protection Act, which restricts a trademark owner to challenge the use of a domain name
because it is dilutive of his or her famous mark.
(c) it applies not only to nationally registered trademarks but also to state and common law
trademarks.
(d) the proceedings under the UDRP are limited to domain name disputes in which the
disputed domain name "has been registered and is being used in bad faith". [UDRP Para
4(a)(iii)]. The UDRP is primarily targeted at cybersquatting. It does not apply if the domain
name registrant has registered the disputed domain name in good faith.
Facts
Samsung Electronics Co. Ltd. and Samsung India Pvt. Ltd. (now “Respondents”) are the
brand owners and registered proprietors of the mark “SAMSUNG” in India. The Respondents
had originally filed a suit against Kapil Wadhwa and a few other distributors (now
“Appellants”) who were importing Samsung printers from licensed dealers in foreign markets
and selling it in India without authorisation at a cheaper price. The Respondents alleged that
the Appellants infringed their trademark rights in India and accordingly a Single Judge Bench
of the Delhi High Court passed a judgement in favour of the Respondents. The present
judgment by the Division Bench of the Delhi High Court arises out of an appeal to the
judgment passed by the Single Judge.
Issues:
i. Whether India follows the principle of national exhaustion or international exhaustion?
ii. Whether parallel import of goods is permissible in India?
Analysis:
i) Whether India follows the principle of national exhaustion or international
exhaustion?
Section 30(3) of the Trademarks Act, 1999 provides for the principle of territorial exhaustion
of trademark rights in India. It states that once lawfully acquired, the purchaser of the goods
may further sell those goods in the market without it constituting as trademark infringement.
(Principle of Territorial Exhaustion of Trademark Rights
The principle of territorial exhaustion of rights means that after goods are lawfully acquired
from the first owner, the rights of the first owner to prevent further sale of such goods is
exhausted. Principle of Territorial Exhaustion of Trademark Rights may be national,
international, and in some cases, regional.
National Exhaustion – means that any product can be lawfully acquired and sold within the
borders of a country, e.g. within India.
International Exhaustion – means that any product lawfully purchased could be sold
anywhere in the world, e.g. product lawfully acquired from Thailand sold in India.
Regional Exhaustion – means that any product may be lawfully acquired and sold within a
certain region, e.g. European Union.
The principle of territorial exhaustion of rights is based on the doctrine of first sale where the
title over any product passes on to the purchaser once it has been sold. In such a scenario,
the purchaser has complete rights over the product and may even choose to sell it to someone
else. This is also embodied in Section 19 of the Sale of Goods Act which provides that upon a
contract of sale for specific property, the property and the goods are transferred to the buyer.
Once the title passes to the buyer, no condition can be further imposed on the buyer.)
In order to determine whether parallel imports to India were permissible, the court had to first
determine whether the term ‘market’ in Section 30(3) of the Trademarks Act, 1999 referred
to a national or a global market. The Single Bench of the Delhi High Court held that India
only recognized the principle of national exhaustion.
However, on appeal, the Division Bench made a reference to additional documents to
determine the intent of the legislature while inserting ‘the market’ in Section 30(3). The
Division Bench relied upon the Statement of Objects and Reasons of the Trademark Bill 1999
placed before the Indian Parliament at the time of passing the Trademarks Act, India’s
communication at the ]Uruguay Rounds and a Report of the Standing Committee on the
Copyright (Amendment) Bill, 2010. It concluded that India follows the principle of
international exhaustion of rights.
Conclusion:
The Division Bench of the Delhi High Court permitted parallel imports to India, on the
condition that the Appellants would provide certain disclaimers in their shops. The principle
of international exhaustion laid down in this judgment has clarified a rather grey piece in
India’s trademark legislation.
Facts
The plaintiff in the case, one Christian Louboutin is a luxury brand which is specialized in
shoes and other related goods, Christian Louboutin has many products which enjoy
exclusivity through Intellectual Property Rights. The defendant is Darveys.com, Darveys is a
members-only luxury online shopping portal. It was noted in the investigation that the
company required members to pay ₹2000 to use the website. It was stated that the product
sold by Darveys.com especially the product line of the plaintiff were stated to be
unauthorized sales. The plaintiff further claimed that the products of their brand were sold
only under authorized sellers in India. The defendant claimed protection through section 79
of the Information Technology Act, 2000 as an intermediary.
Issues
i) Whether the "safe harbour" protection through section 79 should apply here?
ii) Whether the use of Mega Tags comprising the Plaintiff's Registered Trademark
amounts to infringement of IP rights?
Contentions by parties
i) The Defendant gave out certain points in their written statement:
That the praise for Mr. Christian Louboutin is not within the knowledge of the Defendants.
The Defendants have not had any direct dealings with the Plaintiff. They further claimed that
the sale was legally carried out.
ii) The Plaintiff in their contentions stated the following:
The use of the brand’s trademarks on the website is a clear indication of an infringement. The
usage of Mega tags comprising the brand names was also infringing. The use of an article on
the website by Christian Louboutin clearly differs from the plaintiff's contention of not
having knowledge about the brand. It also points at the various mentioning of the brand and
its founder through writeups and photographs.
Judgement
i. Whether the "safe harbour" protection through section 79 should apply here?
The website of the defendant comes under the definition of the intermediary under section
2(w). Section 79 of the Information Technology Act provide safe harbour protection to
intermediaries alone on certain conditions over content uploaded or sold through third parties,
like in the sense of Amazon, Flipkart.
The court examined various judgements and concluded that the knowledge of the
infringement by the intermediaries makes the liability shift. This was also stated in an Indian
Judgement MySpace Inc. v. Super Cassettes Industries Ltd. There too the concept of
constructive knowledge and the active knowledge was discussed. In the MySpace judgement,
it was declared that even if the intermediary has a knowledge of the illegality happening in
their website then the intermediary does not need a court order to stop the counterfeited
product or infringing product from using their intermediary service. The activities that
happen even after a minimum knowledge of the infringement can be claimed to be of a
sort of abiding by the infringement done by the third party and it would amount to the
intermediary becoming liable.
ii. Whether the use of Mega Tags comprising the Plaintiff's Registered Trademark amounts
to infringement of IP rights?
In the issue of meta-tags, the decision of Delhi High Court itself in the Kapil Wadhwa v.
Samsung Electronics was relied upon, where it was stated that the use of meta-tags which
comprises of brand names of others would amount to infringement.
"Meta tags are links that are provided using keywords. If a trade name is used as a keyword
and a link is provided, the website comes up whenever a customer searches for the said
trademark. The trademark used in the code as a keyword is invisible to the end-user or
customer. Such use, though invisible to the customer, has been held to be illegal."
Decision
The court gave out the decision that the darveys.com in support of transporting the
infringed goods to the customer would definitely be held liable even as an intermediary.
The court also referred to the IT (Intermediaries guidelines) rules 2011. The court also
insisted that the aforesaid of intermediary guidelines is advisable but not a sole criterion for
providing the protection that the intermediaries need.
Facts
A Division Bench of the Delhi High Court overruled the judgment passed by Single Judge in
Amway India Enterprises Pvt. Ltd v. 1MG Technologies Pvt. Ltd. & Anr in 2019 (“previous
order”) where several e-Commerce marketplaces like Amazon, Snapdeal, 1MG, and other
independent sellers were barred from making any sale, advertise, offer to sell, or even display
any goods in violation of trademark and third-party agreements. Direct Selling Corporations
(“DSCs”) namely Amway, claimed that e-Commerce marketplaces were selling and
advertising their items without their permission, in violation of their trademark rights and the
Direct Selling Guidelines, 2016 (“2016 DSG”). An appeal was made against the previous
order.
Issues
i. Whether the DSCs’ merchandise being sold on e-commerce marketplaces amount to
trademark violation, as well as degrading their brands’ goodwill and reputation?
ii. Whether e-Commerce marketplaces could be considered “intermediaries” under the
Information Technology Act and the Intermediary Guidelines of 2011, and if they could
be granted Safe Harbor Protection?
Judgment
i. Whether the DSCs’ merchandise being sold on e-commerce marketplaces amount to
trademark violation, as well as degrading their brands’ goodwill and reputation?
The Division Bench was of the opinion that the reports presented before the Single Judge
were just not sufficient and even at present no evidence can prove conclusively that the goods
of DSCs were tampered with, altered, or counterfeited before being sold on e-commerce
marketplaces. It also rejected the alleged misrepresentation or passing off claims because the
Direct Sellers’ information was already listed on these marketplaces, and additionally stated
that even the DSCs had never asserted anything related to trademark registration in their
plaints.
Further, by citing the judgment laid down in Kapil Wadhwa vs. Samsung Industries, the
Division Bench reaffirmed that India adopts the Principle of International Exhaustion.
According to this principle, a trademark owner’s rights terminates when the goods are sold
for the first time, and the buyer acquires ownership of it. And therefore, it will not be
considered an infringement whether it is sold in any market, domestic or foreign. Also, the
Trade Marks Act of 1999, Section 30(3), does not limit the lawful acquisition and subsequent
sale to an international market.
Thus, the Division Bench held that the sale of Amway products by the Direct Sellers on
the e-marketplaces could not be deemed to be an infringement because once the goods
are sold and the ownership is transferred from the DSCs to their individual Direct
Sellers, no restrictions on online sales of the commodities can be imposed on the Direct
Sellers.
➢ Intermediary
An "intermediary", with respect to any particular electronic records, means any person who
on behalf of another person receives, stores or transmits that record or provides any service
with respect to that record. The term network service provider is ever-expanding. It is now
being seen as synonymous to the term 'intermediary' and includes telecom service providers,
network service providers, Internet service providers, web-hosting service providers, search
engines, online payment sites, online auction sites, online marketplaces, and cyber cafes.
Basically, intermediaries are kind of service providers providing services online.
The function of an intermediary has to be understood in terms of its role as a facilitator with
respect to any particular electronic message between an "originator" and an "addressee".
Cyber crime is a collective term encompassing both 'cyber contraventions' and 'cyber
offences.
The mens rea in case of 'cyber crime' comprises of two elements. First, there must be
intent to secure access to any program or data held in any computer, computer system
or computer network. Secondly, the person must know at the time that he commits the
actus reus that the access he intends to secure is unauthorized. The intent does not have
to be directed at any particular program or data or at programs or data held in any
computer, computer system or computer network.
The difference between 'cyber contravention' and 'cyber offence' is more about the degree and
extent of criminal activity rather than anything else. For example, a mere unauthorized access
to a computer, computer system or computer network may amount to 'cyber contravention'
but for a 'cyber offence it is the specific criminal violation that resulted from the unauthorized
access to a computer, computer system or computer network or computer resource that has to
be taken into consideration.
Sec 66A Shreya Singhal
Issues involved
1) Whether Sections 66-A, 69-A and 79 of the IT Act are constitutionally valid?
2) Whether Section 66A of IT Act is violative of fundamental right of freedom of speech and
expression?
Judgment
In the case of Shreya Singhal vs Union of India, the supreme court of India has tried to
balance between rights guaranteed in Article 19(1)(a) and reasonable restrictions under
Article 19(2). In remarks of the judgment, the Supreme Court has rightly and clearly
observed that "when it comes to democracy, liberty of thought and expression is a cardinal
value that is of paramount significance under our constitutional scheme".
Further, most importantly, the Court has provided the distinction between discussion,
advocacy, and incitement and the Court held that reasonable restrictions under Article
19(2) on free speech and expression may be imposed only in instances where incitement
is evident. In this case, the constitutional validity of section 66A of the IT Act was mainly
challenged because of its violative nature of right guaranteed under Article 19(1)(a), and also
it falls outside the ambit of reasonable restrictions under Article 19(2).
In this case, court found that section 66A is capable of limiting all forms of internet
communications as it doesn't "make any distinction between mere discussion or advocacy of
a particular point of view, which may be annoying or inconvenient or grossly offensive to
some and incitement by which such words lead to an imminent causal connection with public
disorder, security of State etc.". Further, section 66A of the IT Act fails to establish a clear
proximate relation to the protection of public order.
In the landmark case of Romesh Thappar, the term public order has been defined as "a state
of tranquillity which prevails amongst the members of a political society.” According to the
Court in Shreya Singhal's case under Section 66A, an offense has been committed by sending
a message for the purpose of causing annoyance or insult, but the same law fails to make a
distinction between mass dissemination and dissemination to an individual without requiring
the message to have a clear tendency of disrupting public order.
In this case, difference between "Hate Speech and Fair Speech" was also highlighted, and
according to the Apex court, "any innocent comment made by anyone whose aim is not to
defame or disrespect anyone cannot fall under the ambit of hate comment."
With regards to the vagueness of the section 66A, the Honourable Apex court in Shreya
Singhal's case referred to judgments given by U. S. Supreme Court in series of judgments
U.S. Supreme court held that:
"there where no reasonable standards are laid down to define guilt in a Section which
creates an offense, and where no clear guidance is given to either law-abiding citizens or to
authorities and courts, a Section which creates an offense and which is vague must be struck
down as being arbitrary and unreasonable."
Further, section 66A is also capable of imposing a chilling effect because the provision fails
to define terms like inconvenience or annoyance; therefore, "a very large amount of protected
and innocent speech" could be curtailed. Therefore, we can understand that section 66A of
the IT Act is unconstitutional. Similarly, the Honourable Supreme Court, in the case of
Shreya Singhal vs. Union of India, also struck down Section 66A of the IT Act and declared
it as unconstitutional.
Sec 67 Avanish Bajaj, Sharad Digumati
Factual Background of the case: Sharat Babu Digumatri v. Government of NCT of Delhi
• An obscene MMS video was listed for sale on the website www.bazeee.com (now An
obscene MMS video was listed for sale on the website www.bazeee.com
(now www.ebay.in) ("Website"). Though the Website had requisite filters to detect
such listings, this listing was not tracked.
• The item was first listed on the evening of November 27, 2004 on the Website and
deactivated only two days later i.e. on 29 November, 2004 after a complaint was
lodged. In the meantime, a few sales took place through the Website.
• Upon investigation by the Crime Branch of Delhi, Ravi Raj, Avnish Bajaj, the
managing director of the Website, and Sharat Digumarti, the manager of the Website,
were held responsible for handling the content on the Website. They were listed as the
accused on the charge sheet.
Issue adjudicated upon by the two judge bench of the Supreme Court
Whether Sharat, who had been discharged under Section 67 could be proceeded under
Section 292?
Sharat's Arguments
It was submitted before the SC that:
• Sharat could not be proceeded under Section 292 after having been discharged under
Section 67. It was argued that, Section 67 was a special provision and it would
override Section 292. There was a distinction drawn between offences in relation to
the internet under Section 67 and offences in relation to conventional media under
Section 292;
• Even if all the allegations against Sharat were accepted, he would be protected under
Section 79 since it was established that the offending material was an electronic
record under the IT Act and hence Section 79 would have to apply;
• Section 81 of the IT Act ("Section 81") provided that the provisions of the IT Act had
overriding effect on any other law in force.4 Hence, by virtue of Section 81, Section
79 would get automatically attracted to electronic forms of publication and
transmission of obscene material by intermediaries. The horizon of Section 79 had
been expanded to extend its protection to individuals as well. For this argument,
reliance was placed on the landmark case of Shreya Singhal v Union of India in which
the SC read down Section 79 to hold that an intermediary would have to receive
actual knowledge by means of a court order or a government notification prior to
taking down offensive content on the internet.
Judgment
The SC reasoned that it was beyond dispute that the alleged possession of the MMS clip by
Sharat constituted an electronic record under the IT Act.
The SC referred to the Shreya Singhal ruling in which the SC had at the time of striking down
section 66 A of the IT Act, held that the provision did not contain the word 'obscene.' It
criminalized what was 'grossly offensive' or 'annoying,' and hence, it could not be said to
create an offence pertaining to decency or morality. The SC further reasoned that what could
be grossly offensive or annoying under the section needn't have been obscene at all. In the
instant case, the SC was required to adjudicate upon which of the provisions and statutes i.e.
Section 292 or Section 67, or both, the accused were required to be tried under.
The SC looked at the nomenclature of certain provisions of the IT Act:
• Section 67 provided for punishment for publishing or transmitting obscene material in
electronic form.
• Section 67A of the IT Act stipulated punishment for publishing or transmitting of
material containing sexually explicit acts, etc. in electronic form.
• Section 67B of the IT Act, too, provided for publishing or transmitting material
depicting children in sexually explicit acts, etc., in electronic form.
The court referred to these provisions to emphasize on the fact that the legislature had
deliberately used the words 'electronic form' in all places. Relying on this, the court reasoned
that Section 67, read with section 67A and 67B, was a complete code relating to offences
under the IT Act. Section 79 was an exemption provision providing protection to individuals,
which protection had been expanded by virtue of the ruling in Shreya Singhal.
The SC rationalized that all the aforementioned provisions of the IT Act, along with
Section 81, would apply if the offence applied to an electronic record. While Section 292
made it an offence for the sale of obscene books, etc., once the offence had a nexus with an
electronic record, Section 79 could not be ignored. The logic underlying this
interpretation, according to the SC, was that Section 79 was a special provision laid
down for a specific purpose.
The SC while quashing the criminal proceedings against Sharat, held that:
• obscenity pertaining to electronic records fell under the scheme of the IT Act.
• Electronic forms of transmission were covered by the IT Act, which was a special
law and if the alleged offender has been acquitted under the relevant provisions
of the IT Act, he could not have been proceeded against under the IPC for the
same offence.
• the DHC had erred in holding that Sharat could be proceeded under Section 292
despite the charges against him under Section 67 being dismissed.