Information Technology Law: Lectured by Rushil Chandra, Asst. Prof. of Law at Symbiosis Law School, Nagpur
Information Technology Law: Lectured by Rushil Chandra, Asst. Prof. of Law at Symbiosis Law School, Nagpur
Technology Law
LECTURED BY RUSHIL CHANDRA, ASST. PROF. OF LAW AT SYMBIOSIS
LAW SCHOOL, NAGPUR.
Introduction
► Cyber space
► WWW
► Amendments
► IT Rules, 2011
► Intermediary Guidelines Rules, 2011
► Important Sections
► Case Laws
UNCITRAL Model Law and E-Commerce
► Uniform law for all the nations so as to make smooth electronic communications
with identical laws.
► E-Commerce through e-contracts
► Requirements as per Section 10A
► The requirements are the same as those mentioned in the Indian Contract Act for
any pen-and-paper contract
DCS and ESC
Controller of
CG (Central Certifying Deputy and Assistant
Government) Authorities Controllers
(CCA)
Digital Signatures
► The Information Technology Act, 2000 (IT Act) prescribes digital signatures as a
means of authentication of electronic records. A digital signature is basically a
way to ensure that an electronic document is authentic.
► A digital signature is an electronic form of a signature that can be used to
authenticate the identity of the sender of a message or the signer of a document,
and also ensure that the original content of the message or document that has been
sent is unchanged. Digital signatures are easily transportable and cannot be
imitated by someone else.
Digital Signatures provide the following
three features:-
Encryption Decryption
Encryption
Decryption
► User – RA – CA – User
► DSC Form can be downloaded from website of the Certifying Authority (“CA”)
► 2. For Class 3 certificate, the applicant has to submit the completed forms in person at the RA
(Registration Authority)
► 3. On successful processing by the RA, the Username and password are sent to applicant mailbox
in order for him/her to log onto CA website. The cryptographic device is handed over to the user
for storing the private key.
► 4. The applicant installs the device drivers for the device (for storing the private key) from CA
website. For example:- crypto token, smart card reader
► 5. User generates the key pair and uploads his Certificate Signing Request (CSR) request into
his/her account on the CA Website
► 6. CA generates the DSC after verification. The user downloads from his/her account on the CA
website.
Storage of the DSC
► It is recommended to store the private key on secure medium, for example, smart
cards / crypto tokens etc. The crypto token connects to the user computer through
the USB interface. For smart cards a compatible smartcard reader needs to be
installed on the user computer if not already present. The secure media available
for the storing the private key may vary per each Certifying Authority.
► The cost of the Digital Signature Certificate varies from CA to CA. The
Certificates are typically issued with one year to two year validity. These are
renewable on expiry of the period of initial issue. Further additional fees for
renewal may also be charged. The costs involved in procuring Digital Certificates
from NIC- CA are attached as a sample. The costs for the other CAs’ can be found
on their respective websites.
► The time taken by the Certifying Authorities to issue a DSC may vary from three
to ten days.
IPRs and Cyberspace
► A civil and criminal action may be instituted for injunction, actual damages
(including infringers profits), or statutory damages per infringement etc.
Moreover, with the amendments to Indian Copyright Act in 1994, even the
criminal penalties have been substantially increased. According to Section 63B,
there is a minimum jail term of 7 days up to 3 years and fines from Rs. 50,000/- to
Rs. 2,00,000/- for copyright infringement.
Software License
ii. does any act of importing or selling or otherwise distributing for commercial purposes
a registered layout-design or a semiconductor integrated circuit, incorporating such
registered layout-design or an article incorporating such a semiconductor integrated
circuit, containing such registered layout-design for the use of which such person is not
entitled under the Act.
► Any person who contravenes knowingly and willfully any of the provisions of the Act or falsely
represent a layout-design as registered, shall be punishable with imprisonment or with fine or with
both.
► According to Section 32 of the Act, the Central Government shall establish an Appellate Board to
be known as Layout-Design Appellate Board to exercise the jurisdiction, power and authority
conferred on it by or under this Act.
► The Appellate Board shall consist of a Chairperson, Vice-Chairperson and other Members as
required. Subject to the other provisions of the Act, the Bench shall consist of a Judicial Member,
Technical Member and shall sit at such place as the Central Government may specify by notification
in the Official Gazette.
► a) receiving evidence;
► b) issuing commissions for examination of witnesses;
► c) requisitioning any public record; and
► d) any other matter which may be prescribed.
► The Intellectual Property Appellate Board established under Section 83 of the Trade Marks Act, 1999
shall exercise the jurisdiction, powers and authority conferred on the Appellate Board till the
establishment of the Appellate Board.
Offences, Penalties and Procedure
► According to Section 56 of the Act, any person who contravenes knowingly and
wilfully infringes a registered layout-design, shall be punishable with
imprisonment for a term up to 3 years or with a fine of a minium of Rs. 50,000 to
a maximum of Rs. 10 Lakh or with both.
► If any person makes any representaion with respect to a layout-design not being a
registered layout-design shall be punishable with imprisonment for a term up to 6
months or with a fime up to Rs. 50,000 or with both.
► According to Section 59 of the Act, any person who makes a false entry in the
register or a writing falsely purporting to be a copy of an entry in the register, or
produces or tenders, or causes to be produced or tendered, in evidence any such
writing, knowing the entry or wiring to be false, shall be punishable with
imprisonment for a term up to 2 years or with a fine or with both.
Liability of Intermediaries
✔ The individuals who maliciously monitor the online activity of their victims to
terrorize and/or acquire personal information. This form of cyber crime is
conducted through the use of social networking platforms and malware, which are
able to track an individual’s computer activity with very little detection.
✔ The motive of the stalkers can depend upon the kind of cyber crime being
committed but usually internet stalkers seek to acquire important information that
can be used for bribery, slander or both.
Phishing Scammers
✔ Phishers are cyber criminals who attempt to get hold of personal or sensitive information through
victims’ computers. This is often done via phishing websites that are designed to copycat
small-businesses, even big corporations (but phishers usually avoid that because it could attract a
very hefty law suit) or government websites.
✔ Unsuspecting users often fall pray to such activities by unknowingly providing personal information
including home addresses, bank account details, OTPs and even passwords.
✔ After obtaining this information they either commit online frauds, theft of finances, use the
information for themselves or sell it on the dark web.
Use of BitCoin on the Dark Web
► To purchase:
► Drugs
► Guns
► Other illegal goods and services on the dark web.
✔ Well-organized
✔ Politically inspired
✔ Cyber attacks in which the criminals attempt to steal/corrupt data within private
computer systems as well as government computer systems and networks
✔ Resulting in harm/legal injuries to nations, businesses, organizations and
individuals.
✔ The key point of difference between a regular cyber attack and an act of cyber
terrorism is that cyber terrorists are politically motivated as opposed to just
seeking financial gain.
Cyber Crime Techniques
► Botnet: Strategically developed network of bots which crawl the backend of the web to spread
malware with very little detection.
► Zombie Computer: A computer which is deliberately hacked by cyber criminals to gain access to
computer networks.
► Distributed Denial of Service (DDoS)-
With a DDoS attack, cyber criminals are not necessarily seeking to access data per se, rather are hoping
to disrupt or shut down a network via an overload of junk data.
Email Bombing and Subscription Bombing
► In internet usage, an email bomb is a form of internet abuse consisting of sending huge volumes
of emails to an address in an attempt to overflow the mailbox or to overwhelm the server where
the email address is hosted in a denial-of-service attack.
Data Diddling
► Data diddling is the unauthorized modification of data before or during entry into
the computer system and then changing it back after processing is done.
► Including forging or counterfeiting of documents used for data entry and
exchanging valid disks and tapes with modified replacements.
Salami Attacks
► The idea or objective behind making salami attacks is to steal finances by making
a change so small that every such transaction might go undetected.
► In information security, a salami attack is a series of minor attacks that once
taken together result in a larger attack .
► Usual targets are customers of various financial institutions.
Logic Bombs
► a set of instructions secretly incorporated into a program so that if a particular condition is
satisfied they will be carried out, usually with harmful effects.
► These programs are created to do something illegal when a certain event is carried out (contingent
to the happening of an event) – dormant viruses that become active only after a particular date
(like the Chernobyl Virus)
► The Chernobyl virus is a computer virus with a potentially devastating payload that destroys all
computer data when an infected file is executed.
► Since many files are executed during computer use, the virus is able to spread quickly and infect those
files.
► The Chernobyl virus is most notably recognized as the first virus known to have the power to damage
computer hardware. The activated viral strain attempts to erase the hard drive and overwrite the
system's BIOS as well.
► The Chernobyl virus was actually a variant of a parent virus known as CIH, the initials for the alleged
author of the virus, Chen Ing-Hau, a computer engineering student in Taiwan.
► CIH is sometimes referred to as a "space filler virus," referring to its ability to clandestinely take up
file space on computers and prevent antivirus software from running.
► It was named after the famous Chernobyl nuclear disaster that occurred in the Soviet Union on April
26, 1986.
Types of Malware
Spyware
✔ collects user activity data without their knowledge
► A rootkit is a type of malware designed to give hackers access to and control over a
target device. Although most rootkits affect the software and the operating system,
some can also infect a computer’s hardware and firmware. Rootkits are adept at
concealing their presence, but while they remain hidden, they are active.
► Once they gain unauthorized access to computers, rootkits enable cybercriminals to
steal personal data and financial information, install malware or use computers as part
of a botnet to circulate spam and participate in DDoS (distributed denial of service)
attacks, etc.
► A rootkit is software used by cybercriminals to gain control over a target computer or
network. Rootkits can sometimes appear as a single piece of software but are often
made up of a collection of tools that allow hackers administrator-level control over the
target device.
Worms
✔ A computer worm is a malware that replicates itself in order to spread to other computers. It
often uses a computer network to spread itself, relying on security failures on the target
computer to access it.
✔ It will use the infected machine as a host to scan and infect other computers. When these new
worm-invaded computers are controlled, the worm will continue to scan and infect other
computers using these computers as hosts, and this behaviour will continue. Computer worms
use recursive methods to copy themselves without host programs and distribute themselves
based on exploiting the advantages of exponential growth, thus controlling and infecting more
and more computers in a short time. Worms almost always cause at least some harm to the
network, even if only by consuming bandwidth, whereas viruses almost always corrupt or
modify files on a targeted computer.
Virus vs Worm
► The primary difference between a virus and a worm is that viruses must
be triggered by the activation of their host (host file);
► whereas worms are stand-alone malicious programs that can
self-replicate and propagate independently as soon as they have
breached the system. Worms do not require activation—or any human
intervention—to execute or spread their code.
► (Source – Kaspersky.com)
How do Worms function?
► In contrast, worms don't require the activation of their host file.
Once a worm has entered your system, usually via a network
connection or as a downloaded file, it can then run,
self-replicate and propagate without a triggering event. A worm
makes multiple copies of itself which then spread across the
network or through an internet connection. These copies will
infect any inadequately protected computers and servers that
connect—via the network or internet—to the originally infected
device. Because each subsequent copy of a worm repeats this
process of self-replication, execution and propagation,
worm-based infections spread rapidly across computer
networks and the internet at large.
How do Viruses function?
A ransomware attack was carried out on 21st June in the most responsible organization – Water
Resources Department in Goa, India. This organization is responsible for flood monitoring systems
across all over the regions of Goa. These ransomware attackers have demanded to pay cryptocurrency
for the data to be released.
Ransomware Attack in Oct 2022 - Tata
Power:
India’s largest integrated power company – Tata Power, faced ransomware attacks on
14th Oct, 2022. These attacks impacted their IT infrastructure and system. They have
immediately taken steps to restore or retrieve the systems.
The Hive Group Started leaking data
that it claimed to have stolen from
TATA Power
Ransomware Attack in Nov 2022 - All India
Institute of Medical Service or AIIMS:
India’s leading public medical institute -- All India Institute of Medical Service or
AIIMS, experienced a cyber-attack on 23rd November. This attack affects hundreds
of patients and doctors accessing primary healthcare services, including discharge,
billing, and patient admission system.
Telangana and AP Power Utilities Hacked
\
A malicious software attacked the power utility systems of Telangana and Andhra Pradesh
last year where all the servers went down until the glitch was rectified. Since the computer
systems of Telangana and Andhra Pradesh power utilities were interlinked, the virus attack
quickly spread, taking down all the systems.
UHBVN Ransomware Attack
► Uttar Haryana Bijli Vitran Nigam was hit by a ransomware attack where the
hackers gained access to the computer systems of the power company and stole the
billing data of customers. The attackers demanded Rs.1 crore or $10 million in
return for giving back the data.
► UHBVN which was monitoring electricity billings of nine districts of the state
(Panchkula, Ambala, Kurukshetra, Karnal, Panipat, Yamunanagar, Sonepat, Kaithal
and Rohtak) came under cyber attack at 12.17 AM after midnight on March 21 and
thus the billing data of thousands of consumers had been hacked as the IT wing of
the nigam was target.
► On March 22, when the head office of UHBVN in Panchkula opened, a message
was flashed on computer screens in which the hacker demanded Rs One crore in
form of bitcoins from the state government in order to retrieve the data.
WannaCry – May 2017
► WannaCry is a ransomware cryptoworm, which targeted computers running the Microsoft
Windows operating system by encrypting (locking) data and demanding ransom payments
in the Bitcoin cryptocurrency.
► India was the third worst-hit nation by WannaCry ransomware, affecting more than 2 lakh
computer systems. During the first wave of attacks, this ransomware attack had hit banks in
India including few enterprises in Tamil Nadu and Gujarat. The ransomware majorly
affected the US healthcare system and a well-known French car manufacturing firm
(Renault).
► Affected a total of around 150 countries and around 23,00,000 computers world wide.
► This was the biggest ransomware attack in history.
► First case: around 7:44 UTC, South East Asia around 12th of May, 2017
► By 12:39 UTC, 74% of all Asia’s ISPs were affected.
► By 15:28 UTC, 65% of Latin American ISPs
► Millions of dollars lost – businesses shut down
Case Study on WannaCry – a ransomware
cryptoworm
► Victims included –
❖ Small to medium sized businesses
❖ Large enterprises, the private sector, the public sector
❖ Railways
❖ Healthcare
❖ Banks
❖ Malls
❖ Ministries
❖ Police
❖ Energy companies
❖ ISPs
❖ All targets were computer systems running on Windows OS.
Stealing of [ Eternal Blue – by shadow
brokers ] contributed to the attack
► It was propagated by using EternalBlue, an exploit developed by the United
States National Security Agency (NSA) for Windows systems.
► EternalBlue was stolen and leaked by a group called The Shadow Brokers a
month prior to the attack.
► While Microsoft had released patches previously to close the exploit, much
of WannaCry's spread was from organizations that had not applied these, or
were using older Windows systems that were past their end-of-life. These
patches were imperative to organizations' cyber security but many were not
implemented due to ignorance of their importance. Some have claimed a
need for 24/7 operation, aversion to risking having formerly working
applications breaking because of patch changes, lack of personnel or time
to install them, or other reasons.
► The cryptoworm kept spreading until it was stopped by Marcus Hutchins –
cybersecurity expert in Kryptos Logic.
What was the exploit??
► Server Message Block Version 1 – SMBv1 – a network communication
protocol – to allow one Windows systems to connect with another Windows
system over a computer network for sharing files and printers over LAN.
► The vulnerability exists because the SMB version 1 (SMBv1) server in
various versions of Microsoft Windows mishandles specially crafted
packets from remote attackers, allowing them to remotely execute code on
the target computer. [Remote (Arbitrary) Code Execution - RCE]
► The NSA did not alert Microsoft about the vulnerabilities, and held on to it
for more than five years before the breach forced its hand.
► The agency then warned Microsoft after learning about EternalBlue's
possible theft, allowing the company to prepare a software patch issued in
March 2017.
► Many Windows users had not installed the patches when, two months later
on May 12, 2017, the WannaCry ransomware attack used the EternalBlue
vulnerability to spread itself.
The exploits leaked by Shadow Brokers
included:
► EternalBlue
► EternalChampion
► EternalRomance
► All the above were developed by NSA and stolen and leaked by SB.
Read about : NotPetya and BadRabbit
Change in the definition of Hacking
► “Hacking” has been removed from S. 66 by the IT(Amendment) Act,
2008.
► Post amendment – Hacking = S. 43(i) r/w S. 66
► S.43(a) – Unauthorized access
► S.43(b)- data theft
► S.43(c)- Introduction of virus
► S.43(d)-damage to computer resource
► S.43(e)- disruption of computer, system or network
► S.43(f)- Denial of Service attacks (DDoS)
► S.43(j)-intention to cause damage – even though intention specific but
a civil offence
S.43(i) + S.43(j) : inserted after
amendment
► Liability – Damages
► Even though intention is a criteria but its not a crime
► Upper Limit on the compensation – not to exceed 1 Cr. – has been removed now
► It departed from the Hicklin test in laying down the obscenity test. The
court held that in assessing the obscenity test, the judge should put himself
in the position of a reader of each age group into whose hands the book is
likely to fall and should try to appreciate what kind of possible effect the
book is likely to have on the readers’ minds.
Aveek Sarkar v. State of West Bengal
• A German magazine named “STERN” having worldwide circulation published an article with a picture of
Boris Becker, a world renowned Tennis player, posing nude with his black fiancée named Barbara Feltus,
a film actress, which was photographed by her father. The article states of an interview where both Boris
Becker and Barbaba Feltus spoke freely about their engagement, their lives and future plans and the
message they wanted to convey to the people at large through that photograph. Article picturizes Boris
Becker as a strident protester of the pernicious practice of “Apartheid”. It was stated that the purpose of
the photograph was also to signify that love trimphs over hatred.
• “Sports World”, a widely circulated magazine published in India reproduced the article and the
photograph as cover story in its Issue 15 dated 05.05.1993 with the caption “Posing nude dropping out of
tournaments, battling Racism in Germany. Boris Becker explains his recent approach to life” – Boris
Becker Unmasked.
• Anandabazar Patrika, a newspaper having wide circulation in Kolkata, also published in the second page
of the newspaper the above-mentioned photograph as well as the article on 06.05.1993, as appeared in the
Sports World.
• A lawyer practicing at Alipore Judge’s Court, Kolkata, claimed to be a regular reader of Sports World as
well as Anandabazar Patrika filed a complaint under Section 292 of the Indian Penal Code against the
Appellants.
Allegations:
1. The Nude photograph that appeared in the Anandbazar Patrika, as well
as in The Sports World would corrupt young minds, both Children and
youth of this Country and is against the cultural and Moral values of
our society.
2. It is against the dignity and honour of the Indian womanhood and is in
violation of Section 4 of the Indecent Representation of
Women(Prohibition)Act,1986.
3. It was intentionally done by both the accused i.e. Ananda Bazar
Patrika and Sports World for sale of their papers and magazines
published, printed and publicly exhibited and circulated.
4. Since the photograph gives a sexual titillation and its impact is moral
degradation and would also encourage the people commit sexual
commit sexual offences.
Held:
1. The contemporary morals and national standards of 2014 must be looked into and not the standard of a group of
susceptible or sensitive persons. Hicklin test postulated that a publication has to be judged for obscenity based on
isolated passages of a work considered out of context and judged by their apparent influence on most susceptible
readers, such as children or weak-minded adults.
2. Hicklin test was not regarded as the correct test to be applied to determine “what is obscenity”. Section 292 of the
Indian Penal Code uses the expression ‘lascivious and prurient interests’ or its effect. They applied the “community
standard test” rather than “Hicklin test” to determine what is “obscenity”. A bare reading of Sub-section (1) of
Section 292, makes clear that a picture or article shall be deemed to be obscene (i) if it is lascivious; (ii) it appeals
to the prurient interest, and (iii) it tends to deprave and corrupt persons who are likely to read, see or hear the
matter, alleged to be obscene.
3. A picture of a nude/semi-nude woman cannot be called as obscene unless it has the tendency to arouse feeling or
revealing an overt sexual desire. Only those sex-related materials which have a tendency of “exciting lustful
thoughts” can be held to be obscene, but obscenity has to be judged from the point of view of an average person, by
applying contemporary community standards.
4. The message, the photograph wants to convey is that the colour of skin matters little and love champions over
colour. Picture promotes love affair, leading to a marriage, between a white-skinned man and a black skinned
woman.
Hence under Section 292 they found that no offence has been committed and thus the photograph was not considered to
be as obscene and they set aside the criminal proceedings against the appellant.
Held further:
► The attack was estimated to have affected more than 300,000 computers across
150 countries, with total damages ranging from hundreds of millions to billions
of dollars. At the time, security experts believed from preliminary evaluation of
the worm that the attack originated from North Korea or agencies working for the
country. This was confirmed in December 2017, when the United
States and United Kingdom formally asserted that North Korea was behind the
attack.
Demands – the ransom amount?
► $300 worth of BitCoins (why BitCoins? Because the holder of the
BitCoin would remain anonymous – complete privacy – though the
wallet can be traced but still the owner would be difficult to trace
without extensive forensic analysis).
► Which was later hiked to $600 worth of BitCoins.
► Files were recoverable if the payment were to be made within 7 days
from the infection however they stated that they would recover and
provide the deleted files to the users who were “so poor that they could
not pay even after 6 months”. – just to humiliate the users.
Prep for Interviews
► The Information Technology Act of 2000 governs various issues relating to the
internet, maintenance of website and e-commerce. It is the Information
Technology Act, that criminalizes and provides civil damages for hacking,
infusion of virus, unauthorized copying, tampering, etc., In 2008, the Act was
further extended to criminalize additional activity such as sending of offensive
content, theft of computer resources, identity theft, cheating by impersonation,
cyber terrorism, transmitting of obscene content and child pornography.
► Lets us now look at the rules concerning website privacy policy and privacy rules
in India
Privacy Policy
► The latest amendments to the Information Technology Act introduced basic privacy and
data protection provisions. The privacy law in India now requires businesses and
websites to apply due care while collecting and dealing with sensitive personal data or
information.
► A civil provision is now available, prescribing damages for an entity that is negligent in
using “reasonable security practices and procedures” while handling “sensitive personal
data or information”, resulting in wrongful loss or wrongful gain to any person. Further,
criminal punishment is also provided for persons who:
• Disclose sensitive personal information without the consent of the person or in breach of
the relevant contract, with the intention of, or knowing that the disclosure would cause
wrongful loss or gain.
► Although some provisions under the IT Act aims at regulating the processing of personal
data in cyberspace, the primary focus of the IT Act has been on providing information
security regulations for the protection of personal and sensitive data in cyberspace.
The SPDI Rules
• The Bill will apply to the processing of digital personal data within India where such data
is collected online, or collected offline and is digitized. It will also apply to such
processing outside India, if it is for offering goods or services or profiling individuals in
India.
• Personal data may be processed only for a lawful purpose for which an individual has
given consent. Consent may be deemed in certain cases.
• Data fiduciaries will be obligated to maintain the accuracy of data, keep data secure, and
delete data once its purpose has been met.
• The Bill grants certain rights to individuals including the right to obtain information, seek
correction and erasure, and grievance redressal.
• The central government may exempt government agencies from the application
of provisions of the Bill in the interest of specified grounds such as security of the state,
public order, and prevention of offences.
• The central government will establish the Data Protection Board of India to adjudicate
non-compliance with the provisions of the Bill.
• Exemptions to data processing by the State on grounds such as national
security may lead to data collection, processing and retention beyond what
is necessary. This may violate the fundamental right to privacy.
• The Bill accords differential treatment on consent and storage limitation to
private and government entities performing the same commercial function
such as providing banking or telecom services. This may violate the right
to equality of the private sector service providers.
• The central government will prescribe the composition, and manner and
terms of appointments to the Data Protection Board of India. This raises a
question about the independent functioning of the Board.
• The Bill does not grant the right to data portability and the right to be
forgotten to the data principal.
• The Bill requires all data fiduciaries to obtain verifiable consent from the
legal guardian before processing the personal data of a child. To comply
with this provision, every data fiduciary will have to verify the age of
everyone signing up for its services. This may have adverse implications
for anonymity in the digital space.
DIA, 2023
► Adjudicating User Harm against revenge porn, cyber-flashing, dark web,
women and children, defamation, cyber-bullying, doxing, salami slicing,
etc.
► Age-gating by regulating addictive tech and protect minors’ data, safety
and privacy of children on social media platforms, gaming and betting
apps; Mandatory ‘do not track’ requirement to avoid children as data
subjects for ad targeting, etc.
► Digital user rights including Right to be forgotten, Right to secured
electronic means, Right to redressal, Right to digital inheritance, Right
against discrimination, Rights against automated decision-making, etc.
► Discretionary moderation of fake news by social media platforms should
be critically examined and regulated under the Constitutional Rights of
freedom of speech & expression.
► Definition and Regulation of hi-risk AI systems through legal,
institutional quality testing framework to examine regulatory models,
algorithmic accountability, zero-day threat & vulnerability
assessment, examine AI based ad-targeting, content moderation etc.
► Privacy invasive devices such as spy camera glasses, wearable tech
should be mandated under stringent regulation before market entry
with strict KYC requirements for retail sales with appropriate criminal
sanctions.
► Secure Cyberspace by empowering agencies like CERT for cyber
resilience; strengthening the penalty framework for non-compliance,
advisories on the information & data security practices, etc.
► Content Monetisation Rules for platform-generated and
user-generated content
Content Moderation
► Judicial Evidence
► Non-Judicial Evidence
► Character Evidence
Judicial Evidence
► Example: a confession made by the accused in the presence of some other person
would be termed as a non-judicial evidence
► The evidence that throws light upon the character or the personality traits of a
person.
► Section 54 IEA: in criminal proceedings the fact that accused person had a bad
character is irrelevant unless evidence has been given that he has a good character,
in which case it becomes relevant.
► Therefore it does not apply when the “bad character of an accused” is itself the
fact in itself.
Sub-categories
► Direct evidence
► Indirect or circumstantial evidence
► Primary evidence
► Secondary evidence
► Oral evidence
► Documentary evidence
► Hearsay evidence
► Real evidence
Direct Evidence
► Example: the finger prints obtained from a crime scene which are matching those
of the suspect
Secondary Evidence
► Which is substitutionary proof and not the best evidence to prove a fact.
► Example: An employee gives oral evidence as witness to prove that his colleague
has discussed with him his plans of committing data theft at the office on a
particular date.
Documentary Evidence
► A certificate
► Shall have to be produced which identifies the e-record
► & gives particulars of the device involved in the production of the
record.
► Their differences
► Criticism of Tomaso Bruno case (per incurium)
► Shafi Mohammed v. State of H.P. - misinterpretation of the provision as the court held
that the provision was purely procedural in nature.