0% found this document useful (0 votes)
84 views32 pages

Unit IV

The document summarizes a case between a customer (petitioner) and ICICI Bank regarding fraudulent transactions on the customer's account. The petitioner received a phishing email posing as the bank asking for account details. Over Rs. 6 lakh was fraudulently transferred from the petitioner's account. An investigation found the money was transferred to another bank account ("Uday Enterprises") which was later determined to be fraudulent. The petitioner alleges negligence by the bank in security and compliance processes led to the fraud. The petitioner filed various police complaints and ultimately an IT adjudicator case against the bank seeking damages.

Uploaded by

HARSHIT KUMAR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views32 pages

Unit IV

The document summarizes a case between a customer (petitioner) and ICICI Bank regarding fraudulent transactions on the customer's account. The petitioner received a phishing email posing as the bank asking for account details. Over Rs. 6 lakh was fraudulently transferred from the petitioner's account. An investigation found the money was transferred to another bank account ("Uday Enterprises") which was later determined to be fraudulent. The petitioner alleges negligence by the bank in security and compliance processes led to the fraud. The petitioner filed various police complaints and ultimately an IT adjudicator case against the bank seeking damages.

Uploaded by

HARSHIT KUMAR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

Penalties and Adjudication

• According to Sec 43, a person shall be liable to pay


damages by way of compensation not exceeding one
crore rupees to the affected (aggrieved) person if
without permission of the owner or any other person
who is in-charge of a computer, computer system or
computer network:
• Accesses or secures access to such computer,
computer system or computer network.
• Downloads, copies or extracts any data, computer
data base or information from such computer,
computer system or computer network
including information or data held or stored in any
removable storage medium.
• Introduces or causes to be introduced any computer
contaminant or computer virus into any computer,
computer system or computer network.
• Damages or causes to be damaged any computer, computer
system or computer network, data, computer data base or
any other programmes residing in such computer, computer
system or computer network.
• Disrupts or causes disruption of any computer, computer
system or computer network.
• Denies or causes the denial of access to any person
authorized to access any computer, computer system or
computer network by any means.
• Provides any assistance to any person to facilitate access to
a computer, computer system or computer network in
contravention of the provisions of this Act, rules or
regulations made there under.
• Charges the services availed of by a person to the account
of another person by tampering with or manipulating any
computer, computer system, or computer network,
Umashankar Sivasubramanian
V

ICICI Bank, 2010
The petitioner (complainant) is a non-resident Indian and is
employed as a Process Engineer, Dept: SUFEMS, ZAKUM
Development Company in Abu Dhabi and is currently
residing in Abu Dhabi. The petitioner maintains a savings
bank account (NRE) with ICICI Bank, V.E. Road, Tuticorin.
The Bank has activated an Internet Banking facility for the
account. Every month, the Bank NRI Services Team would
send a statement of account to the petitioner of this case
from an email id. The URL of which is
customercareicicibank.com. At the end of August 2007, the
balance in the petitioner's account was Rs.6,20,846 and on
4th September the ICICI Bank credited an interest
component of Rs.25,200 which then increased the
petitioner's credit balance to Rs.6,46,046.
• The entire incident begins when the customer had received
a security update from [email protected] for
updation and assuming it to be a routine mail from the
Bank that had sent similar mails earlier, the customer had
complied with the request consequent to which he was
shocked to find that his account had been debited to the
extent already mentioned. According to the petitioner, he
received a telephone call from Bank on September 7th ,
2007 when a representative from ICICI Bank, Mumbai
telephoned at 1800 hours (UAE time) and requested for
confirmation whether money transfer from the petitioners
account had been made to 'Uday Enterprises', Mumbai
through Internet banking on 6th and 7th September 2007.
The petitioner denied any transfer being made as suggested
by the Mumbai branch.
• The Branch accordingly instructed the petitioner that a
complaint be filed within 24 how's to Customer Care,
ICICI Bank Mumbai which was done by the petitioner
and a reference number given as SR37195467.
Following this, the petitioner faxed and emailed a
complaint to the ICICI Bank Tuticorin and the NRI
services center, Mumbai. Following this, an email was
received from the Customer Service Quality
department of the International Banking Division of
ICICI Bank that the matter was being investigated and
that within a month's time they would revert with a
resolution. The petitioner then receives a mail on
October 20,2007 (43 days after the loss of money from
his account) from one Mr.Shankar representing the
respondent bank on the immediate results of the
investigation. This mail from ICICI was sent by a
personal email id on a Gmail account and not on the
official ICICI email id.
• The details of investigation as reported in the mail
indicate the following: a) that the incident appears to
be a case of Actual Infinity Phishing Fraud b) that the
petitioner's account has been debited to the tune of
Rs.6,46,OOO and that the funds were transferred to
Uday Enterprises c) that Uday enterprises was a
current account and a partnership account with ICICI
Mumbai and d) that the account was in debit balance
since 23-04-2007 and e) that an amount of
Rs.4,60,OOO was withdrawn by Self Cheque across the
counter from the Uday Enterprises account. f) The
report further indicates that the address of Uday
enterprises was visited and the door was locked and
the residents there indicated that Uday Enterprises
had shifted two years earlier.
• Further verification reveals to the Bank that the firm is
a proprietorship firm and the proprietor’s name is
M'ohd Zulfqar Hasim Khan apart from the documents
submitted for proof to the bank and that the firm had
been in existence at the same address until two years
ago. The investigation report comments that as the
immediate case refers to a phishing case, the blame of
negligence lies with the customer and that the
customer would need to file the FIR. The observations
in the investigation report states that the customer
should file the FIR and then the case can be closed. An
observation is also made that the 'beneficiary' (namely
Uday enterprises) account has still a balance of Rs.
l,50,171 /- and which needs to reversed. This amount
of Rs. l,50,171 /- was subsequently reversed on 17th
July 2008 into the petitioner's customer's account.
• The petitioner filed a complaint before the Superintendent of
Police in Tuticorin detailing all the events and indicated the
possibility of the Bank or some of its staff being behind the
fraud. The petitioner requests the police to 'initiate action
against the ICICl Bank and retrieve the money. This petition
was subsequently transferred to the Cyber Crime Police
Station at Chennai. On the 6th February, 2008, the petitioner
lodged a fresh complaint with the Cyber Crime Cell, CCB at
Chennai. Finally, the petitioner has concluded in his
application that ICICI is primarily responsible for the loss and
that Uday Enterprises may be a benami of the bank or any of
its staff members. He has alleged that due diligence has not
been made by the bank in the entire case and in the case of
Uday Enterprises particularly when the account had actually
been in overdraft and suddenly to have been into a high
transaction. Further, he has stated that such a large
transaction by way of a self-cheque over the counter without
adhering to banking norms is indicative of negligence on the
part of the Bank.
• The immediate adjustment of the overdraft of Uday
Enterprises by the money so transferred has also been
questioned. The failure of the Bank to file a criminal complaint
on the matter in Mumbai even after the fraud has come to
light, failure to retain a record of the cctv clippings, failure of
the Bank to adequately adhere to the KYC (Know your
customer) norms, failure to part with the IP addresses
immediately after the incident that had led to the fraudulent
transfer and lack of maintenance of record of the same in
violation of RBI instructions, failure to use digital signatures in
official communication, lack of adequate controls by the Bank
to ensure information security, that Sections 11, 66, 43, 85 of
the IT Act have to be considered in the light of all the facts and
they have a bearing on the gross negligence of the Bank in
causing loss to the petitioner and all of these together have to
be considered in dealing with the petition made by the
petitioner under Section 43 and Section 46 of the IT Act of
2000.
• The petitioner in the course of the hearing filed an additional reply
to the initial counter affidavit filed by ICICI bank. He has stated in
addition to his earlier statement that there is due justification in
having approached the adjudicator as he is the main avenue for
redressal of the issue on account of the fraud propitiated on him
and it being within the purview of the Information Technology Act
of 2000. Approaching the banking ombudsman was for the
redressal of the customer complaint and not replacement of any
other remedy and the complaint at Tuticorin Police Station was on
account of this being a cognizable offence. The cyber crime Police
Station registering an FIR under Section 66 of IT Act 2000 of the
initial investigation confirmed this. The petitioner has expressed
his disappointment on the failure of the respondent bank to file a
complaint in Mumbai even after being aware that the final
beneficiary of this IT fraud was also their customer. Also, the
petitioner has recorded his opinion with regard to the
jurisdictional relevance of the adjudicator and the powers therein
to try this case according to the IT Act, 2000.
• In response to the complaint filed by the petitioner, the
respondent submitted the following: That the respondent
bank provides net banking services to customers among
other services and that the internet banking services includes
transfer of funds, respondent enquiries about details in the
transactions of his account, statement of account etc.
Accordingly, at the time of opening of the account by a
customer, the customer agrees to the conditions imposed by
the bank and unconditionally undertakes to have the user ID
provided by ICICI bank changed and ensured that the scheme
is kept confidential and not to let any unauthorized person to
have access to the same and neither IC1CI bank nor its
affiliates shall be liable for any unauthorized transactions
occurring through internet banking and the user then fully
indemnifies and holds ICICI bank harmless against any
actions, suit proceeded against it. According to the
respondent, the complainant has negligently disclosed the
confidential information such as password and thereby had
fallen prey to a phishing fraud.
• Section 43 read with section 85 of the Act clearly highlight
that this case falls within the jurisdiction of this office as the
offence made out is within the purview of the IT Act of
2000. The petitioner has placed his trust in the services
offered by the Respondent Bank (a Banking company) in
providing a secure environment for his finances and has
operated an account in the respondent Bank Branch. In
furtherance of this trust, and reliability offered by the
respondent bank in providing secure transactions over the
Internet, and due to fact that he was working in another
country several thousand miles away, the petitioner has
extended his trust into operating his Bank account in the
Respondent's Bank Branch in Tuticorin through the Internet.
In this process, due to a transaction that he assumed as
genuine, he has suffered financial loss which he would not
have suffered had he stayed away from operating an
Internet Account. A prima facie case of the matter attracting
the relevant provisions of the Information and Technology
Act is made out.
• The court said “that the Respondent Bank namely ICICI has
failed to establish that due diligence was exercised to
prevent the contravention of the nature of unauthorised
access as laid out in Section 43 of the Information
Technology Act of 2000, I find the petitioner justified in the
instant case. The Respondent Bank has failed to put in place
a foolproof Internet Banking systern with adequate levels of
authentication and validation which would have prevented
the type of unauthorised access in the instant case that has
led to a serious financial loss to the petitioner customer. The
basic loophole in ensuring that a customer recognizes an
email as from the bank was a glaring error on the
respondent's part that would have prevented this incident.
The degree of connivance or complicity may be debated
upon but the neglect of the personnel of the Respondent
Bank both immediately prior to and immediately after the
loss in protecting the interests of the customer are clearly
evident.
• The petitioner has been made to run around in search of
justice and retribution following the incident without any
support from the bank. The Respondent Bank is found
guilty of the offences made out in Section 85 read with
relevant clauses of Section 43 of the Information
Technology Act of 2000. As regards, the quantum of
compensation, attention is drawn to section 47 (b) of the
Information Teclmology Act of 2000 which is in reference to
the same and states that due regard shall be had to the
quantum of loss suffered as a result of the default. Thus,
the respondent bank namely ICICI in the instant case is
directed to pay a total sum of Rs.l2,85,OOO/ - (Rupees
Twelve Lakhs Eight five Thousand only) to the petitioner
within 60 days from the date of issue of this judgment
against the financial loss of Rs 4,95,829, the total fee that
had been paid by the petitioner as applicable statutorily for
adjudication on account of the incident was Rs.27,850, all
the travel and incidental expenses computed on a lumpsum
basis as Rs 6,00,000 with an interest of Rs 12% per annum.
Residuary Penalty
• As stated in sec 45, whosoever contravenes
any rules or regulations made under this Act,
for the contravention of which no penalty has
been separately provided, shall be liable to
pay compensation not exceeding twenty-five
thousand rupees to the person affected by
such contravention or a penalty not exceeding
twenty-five thousand rupees.
Penalty for Failure to
Furnish Information and Return
According to Sec 44, for failure to furnish information and return
under this Act, a person shall be liable to a penalty not exceeding ten
thousand rupees for every day during which the failure continues, if
he is required under this Act or any rules or regulations made there
under to
• (a) Furnish any document, return or report to the Controller or the
Certifying Authority fails to furnish the same, he shall be liable to a
penalty not exceeding one lakh and fifty thousand rupees for each
such failure.
• (b) File any return or furnish any information, books or other
documents within the time specified therefore in the regulations
fails to file return or furnish the same within the time specified
therefore in the regulations, he shall be liable to a penalty not
exceeding five thousand rupees for every day during which such
failure continues.
• (c) Maintain books of account or records, fails to maintain the
same,
Appellate Tribunal
• Establishment of Cyber Appellate Tribunal
• Composition of Cyber Appellate Tribunal
• Qualifications for Appointment as Presiding
Officer of the Cyber Appellate Tribunal
• Term of Office
• Salary, Allowances And Other Terms And
Conditions Of Service Of Presiding Officer
• Filling Up of Vacancies
Offences and Penalties
• Computer Related Offences: As per Sec 66, if
any person, dishonestly or fraudulently, does
any act referred to in section 43, he shall be
punishable with imprisonment for a term,
which may extend to three years or with fine,
which may extend to five lakh rupees or with
both.
• Tampering With Computer Source Documents:
According to Sec 65, whoever knowingly or
intentionally conceals, destroys or alters or
intentionally or knowingly causes another to
conceal, destroy, or alter any computer source
code used for a computer, computer programme,
computer system or computer network, when the
computer source code is required to be kept or
maintained by law for the time being in force,
shall be punishable with imprisonment up to
three years, or with fine which may extend up to
two lakh rupees, or with both.
Syed Asifuddin and Ors.
V
The State of Andhra Pradesh & Anr.
2005CriLJ4314
• Under a sale scheme launched by the Reliance
Infocomm, the subscriber was given a digital handset
worth Rs. 10,500 as well as service bundle for 3 years
with an initial payment of Rs. 3350 and monthly
outflow of Rs. 600. The subscriber was also provided a
1 year warranty and 3 year insurance on the handset.
The handset was technologically locked so that it only
works with the Reliance Infocomm services. If the
customer wanted to leave Reliance services, he would
have to pay some charges including the true price of
the handset. Since the handset was of a high quality,
the market response to the scheme was exceptional.
• Unidentified persons contacted Reliance customers
with an offer to change to a lower priced Tata Indicom
scheme. As part of the deal, their phone would be
technologically “unlocked” so that the exclusive
Reliance handsets could be used for the Tata Indicom
service. Reliance officials came to know about this
“unlocking” by Tata employees and lodged a First
Information Report (FIR) under various provisions of
the Indian Penal Code, Information Technology Act
and the Copyright Act. The police then raided some
offices of Tata Indicom in Andhra Pradesh and arrested
a few Tata Tele Services Limited officials for
reprogramming the Reliance handsets.
• These arrested persons approached the High Court
requesting the court to quash the FIR on the grounds
that their acts did not violate the said legal
provisions. They argued that it is always open for the
subscriber to change from one service provider to
the other service provider. The subscriber who wants
to change from Tata Indicom always takes his
handset, to other service providers to get service
connected and to give up Tata services. The handsets
brought to Tata by Reliance subscribers are capable
of accommodating two separate lines and can be
activated on principal assignment mobile (NAM 1 or
NAM 2). The mere activation of NAM 1 or NAM 2 by
Tata in relation to a handset brought to it by a
Reliance subscriber does not amount to any crime.
• Further, a telephone handset is neither a
computer nor a computer system containing a
computer programme and there is no law in force
which requires the maintenance of "computer
source code". Hence section 65 of the Information
Technology Act does not apply. The Court found
that as per section 2 of the Information
Technology Act, any electronic, magnetic or optical
device used for storage of information received
through satellite, microwave or other
communication media and the devices which are
programmable and capable of retrieving any
information by manipulations of electronic,
magnetic or optical impulses is a computer which
can be used as computer system in a computer
network.
• The instructions or programme given to computer in a
language known to the computer are not seen by the users
of the computer/consumers of computer functions. This is
known as source code in computer parlance. Further, a city
can be divided into several cells. A person using a phone in
one cell will be plugged to the central transmitter of the
telecom provider. This central transmitter will receive the
signals and then divert them to the relevant phones. When
the person moves from one cell to another cell in the same
city, the system i.e., Mobile Telephone Switching Office
(MTSO) automatically transfers signals from tower to tower.
All cell phone service providers have special codes
dedicated to them and these are intended to identify the
phone, the phone's owner and the service provider.
Moreover, System Identification Code (SID) is a unique 5-
digit number that is assigned to each carrier by the licensor.
• Every cell phone operator is required to obtain SID
from the Government of India. SID is programmed
into a phone when one purchases a service plan
and has the phone activated. Electronic Serial
Number (ESN) is a unique 32-bit number
programmed into the phone when it is
manufactured by the instrument manufacturer.
ESN is a permanent part of the phone. Mobile
Identification Number (MIN) is a 10-digit number
derived from cell phone number given to a
subscriber. MIN is programmed into a phone when
one purchases a service plan. When the cell phone
is switched on, it listens for a SID on the control
channel, which is a special frequency used by the
phone and base station to talk to one another
about things like call set-up and channel changing.
• If the phone cannot find any control channels to listen to,
the cell phone displays "no service" message as it is out of
range. When cell phone receives SID, it compares it to the
SID programmed into the phone and if these code numbers
match, cell knows that it is communicating with its home
system. Along with the SID, the phone also transmits
registration request and MTSO which keeps track of the
phone's location in a database, knows which cell phone you
are using and gives a ring. So as to match with the system of
the cell phone provider, every cell phone contains a circuit
board, which is the brain of the phone. It is a combination
of several computer chips programmed to convert analog to
digital and digital to analog conversion and translation of
the outgoing audio signals and incoming signals. This is a
micro processor similar to the one generally used in the
compact disk of a desktop computer.
• Without the circuit board, cell phone
instrument cannot function. When a Reliance
customer opts for its services, the MIN and SID
are programmed into the handset. If someone
manipulates and alters ESN, handsets which are
exclusively used by them become usable by
other service providers like TATA Indicom. Held,
a cell phone is a computer as envisaged under
the Information Technology Act. ESN and SID
come within the definition of “computer source
code” under section 65 of the Information
Technology Act.
• When ESN is altered, the offence under Section 65
of Information Technology Act is attracted
because every service provider has to maintain its
own SID code and also give a customer specific
number to each instrument used to avail the
services provided. Whether a cell phone operator
is maintaining computer source code, is a matter
of evidence. In Section 65 of Information
Technology Act the disjunctive word "or" is used
in between the two phrases "when the computer
source code is required to be kept" or
"maintained by law for the time being in force”
• Hacking with Computer System: As per Sec 66
(1), whoever with the intent to cause or
knowing that he is likely to cause wrongful loss
or damage to the public or any person
destroys or deletes or alters
any information residing in a computer
resource or diminishes its value or utility or
affects it injuriously by any means, commits
hacking, shall be punished with imprisonment
up to three years, or with fine, which may
extend upto two lakh rupees, or with both
• Compounding of Offences:- According to 77A
of the Information Technology (Amendment)
Act, 2008, a court of competent jurisdiction
may compound offences, other than offences
for which the punishment for life or
imprisonment for a term exceeding three
years has been provided, under this Act.
Provided that the court shall not compound
such offence where the accused is, by reason
of his previous conviction, liable to either
enhanced punishment or to a punishment of a
different kind
• Offences with Three Years Imprisonment to
Be Bailable: As per sec 77B, notwithstanding
anything contained in the Code of Criminal
Procedure, 1973, the offence punishable with
imprisonment of three years and above shall
be cognizable and the offence punishable with
imprisonment of three years shall be bailable

You might also like