Categories
Blog

Development of Cybercrime Law in the United Kingdom

Development of cybercrime law in the United Kingdom

The enactment of computer crime specific legislation or cybercrime law in the United Kingdom can be attributed to a number of cases which highlighted the issue of absence of such legislation and the subsequent acquittal of individuals.

R v. Thompson

Firstly, in R v. Thompson,[1] the appellant in Kuwait, had fraudulently caused a bank to credit certain bank balances in England. The access was authorized, however, such access was used for an unlawful purpose. The Theft Act of 1968 was sought to be applied[2]. The primary issue was that of jurisdiction (Kuwait or England) as well as identifying the victim. The court held that for applying the Theft Act, the identification of a human victim is a prerequisite. However, in the present case, the computer system was deceived, rather than a human mind. This highlighted the inadequacy of the existing legal framework to deal with cases where computer was a victim of a crime, rather than a mere facilitator.

R v. Gold and Schifreen

Secondly, in R v. Gold and Schifreen,[3] certain individuals got access to the files contained in British Telecom Prestel Network by seeing the username and password entered by the authorized person, over his shoulders. The accused were charged under the Forgery and Counterfeiting Act of 1981. However, the court held that the accused cannot be prosecuted under the said Act as the use of recorded electronic information did not fall under the definition of ‘false instrument’[4]. Therefore, the act committed by the accused does not come under the ambit of the Forgery and Counterfeiting Act. The outcome of this case highlighted that new age crimes (cybercrimes) cannot be prosecuted under the traditional criminal laws.

Learn more about Cyber Laws with Enhelion’s Online Law firm certified Diploma Course on Cyber Law.

It is pertinent to note that there were a series of case laws wherein the court adopted a more liberal approach to include the new age crimes within the ambit of traditional laws. In Cox v. Riley,[5] the court held that ‘damage’ implies any injury impairing the value and usefulness. Such injury need not be apparent to the naked eyes. Therefore, deleting program from a computer-controlled machine, which renders it unusable, constitutes ‘damage’ under the Criminal Damages Act, 1971. A similar approach was adopted in R v. Whiteley[6].

The increasing instance of computer crimes, the failure of court to effectively prosecute individuals who committed computer crimes, and the significance of ensuring effective prosecution by broadening the scope of existing laws, had a combined effect which led to the enactment of the Computer Abuse Act of 1990[7] in the United Kingdom.

Originally, the 1990 Act brought within its ambit, three categories of offences-

  1. Unauthorized access to programs or data[8];
  2. Unauthorized access with further criminal intent[9] and
  3. Unauthorized modification of data[10].

In Ellis v. DPP,[11] section 1 of the Act was interpreted, and the court held that unauthorized access, even though in absence of damage, comes under the ambit of the 1990 Act.

Learn more about Cyber Laws with Enhelion’s Online Law firm certified Diploma Course on Cyber Law.

The 1990 Act addressed the issue of jurisdictional challenge in cases of computer crime by making it an offence to use a computer in the home country to commit a crime in another country and to commit a crime in the country from a computer in another country[12].

It is pertinent to note that the 1990 Act was not well equipped to deal with computer crimes per se in a comprehensive manner. The issue with respect to section 2 of the Act was highlighted in R v. Bedworth[13], wherein while proving intent, addiction was recognized as a defense. As a result, the Jury acquitted the accused.

Learn more about Cyber Laws with Enhelion’s Online Law firm certified Diploma Course on Cyber Law.

[1] R v. Thompson, (1984) 79 Cr App R 191.

[2] Theft Act, 1968, § 15.

[3] R v. Gold and Schifreen, CACD [1987] QB 1116.

[4] Forgery and Counterfeiting Act, 1981, s. 8(1)(d).

[5] Cox v. Riley, [1986] QBD.

[6] R v Whiteley, [1991] 93 CAR 25.

[7] Computer Abuse Act, 1990.

[8] Id., § 1.

[9] Supra note 18, § 3.

[10] Supra note 18, § 2.

[11] Ellis v. DPP, [2001] EWHC 362.

[12] Supra note 18, § 4.

[13] R v. Bedworth, 1991.

Categories
Blog

Development of Telecommunication Law in British India

The communications system forms the basis of the economic development of a country and plays a key role in every aspect of an individual’s life. The communications system in India has come a long way from the use of telegrams in the 1850s to the extensive use of the Internet in the present times. It is pertinent to note that the foundation of telecommunications in India was laid by the British East India Company (referred to as ‘EIC’ hereafter), and was later developed by the British Government, under the British Crown.

  • Development of Telegraph services under the British regime

Research in the field of telegraph started in India way back in 1833 when a 24-year-old assistant surgeon with the East India Company (EIC), Mr. William O’Shaughnessy, started experimenting with electricity.[1] In 1839, he set up a 13.5-mile-long demonstration telegraph system near Calcutta.[2] During the same time, Samuel F.B. Morse was developing his own demonstration system back in the United States.[3] However, O’Shaughnessy was completely unaware of this development, and therefore, used a different code which was indigenously developed. On successful experimentation, he published a pamphlet about his work, but he was unable to catch the attention of the EIC.

Learn more about Technology Law with Enhelion’s Online Law firm certified Master Course! 

The state of affairs changed in 1847 when Lord Dalhousie was appointed as the Governor-General of India.[4] He showed real interest in developing public works like roads, canals, railways, and postal services in India. He also envisioned the potential of the telegraph invented by O’Shaughnessy and authorized him to build a 30 miles long line near Calcutta. This was the first experimental electric telegraph line in India which started between Calcutta and Diamond Harbour in 1851[5]. The success of this electric telegraph line incentivized Lord Dalhousie to authorize O’Shaughnessy to build telegraph lines across India.[6]

O’Shaughnessy completed the work assigned to him by 1854, and as a result, Calcutta was linked to Agra, Bombay and Madras by the telegraph network.[7] From 1851 till 1854, the telegraph was strictly limited to use by the EIC. In April 1854, first telegram was sent from Mumbai to Pune and electronic telegraph facilities were made open to use by the public[8]. Taking these developments and the subsequent need for legislation to regulate the establishment and management of electronic telegraphs in India into consideration, the Electronic Telegraphs Act of 1854[9] was enacted. The 1854 Act provided exclusive right to establishing telegraph lines in India to the EIC, however, the Governor-General of India in Council was given the power to grant the license to any person or company to establish a line[10]. The Act further established a separate Electric Telegraph Department[11]. The Act penalized the laying down of telegraph lines in contravention of the provisions of the Act.[12] It also penalized the persons who willfully caused interruption to the transmission of signals[13].

Learn more about Technology Law with Enhelion’s Online Law firm certified Master Course! 

The development of the telegraph system continued and by 1856, 4000 miles of Indian telegraph system was established connecting Calcutta, Agra, Bombay, Peshawar, and Madras.[14] It is believed that the Indian telegraph service played an instrumental role in suppressing the 1857 sepoy mutiny.[15] It proved to be a critical military tool by rapidly providing a reliable system of information which was used by the EIC to mobilize its troops. Owing to the significance of the telegraph network in suppressing the 1857 revolt, a number of Indians tried to destroy the same as an act of vengeance.[16]

The 1857 sepoy mutiny led to a significant change in power in the Indian colony. The Electric Telegraph Act of 1854 was repealed, and the Telegraph Act of 1860[17] was enacted to reflect the shift of power from British EIC to the British Crown. The 1860 Act brought two significant changes to its predecessor. Firstly, it gave the exclusive power previously enjoyed by the EIC to the Governor-General of India in Council[18]. The Governor-General also retained its power to grant licenses to private individuals and companies for establishing the telegraph lines. Secondly, considering the attempts of Indians to destroy the telegraph network post-1857 revolt, the Act of 1860 increased the number of penalties for intruding into the signal room[19] and cutting the line[20].

Learn more about Technology Law with Enhelion’s Online Law firm certified Master Course! 

The developments in the telegraph system in India were accelerated once submarine cables were completed between India and Britain in 1870.

The next significant step in the evolution of communications services in India was the enactment of the Indian Telegraph Act of 1876[21], which repealed the 1854 Act[22]. The 1876 Act was applicable to the whole of British India as well as British subjects in the Princely States[23]. The Act is considered as the first comprehensive legislation regulating telegraph services in India. It defined the terms like ‘telegraph’, ‘telegraph officer’ and ‘message’[24]. ‘Telegraph’ was defined as an electric or magnetic telegraph[25]. Just like the 1854 Act, the Governor-General retained his power of exclusive privilege and the right to grant a license under the 1876 Act.[26] The Act further increased the penalties for causing destruction to the telegraph network. The most peculiar feature of the 1876 Act was the provision for the deployment of additional police in places where mischief to telegraphs was repeatedly committed[27]. In such a scenario, the inhabitants of such a place were required to bear the cost of such deployment[28].

Learn more about Technology Law with Enhelion’s Online Law firm certified Master Course! 

After the 1876 Act came into force, in 1880, two private telephone companies namely Oriental Telephone Company Ltd. and The Anglo-Indian Telephone Company Ltd. approached the Governor-General of India to propose establishing telephone exchanges in India.[29] They were denied permission on the ground that the introduction of telephones was a Government monopoly and hence the Government itself would commence the work.[30] However, in 1881, the decision was reversed and Oriental Telephone Company Ltd. was granted a license for opening telephone exchanges at Kolkata, Mumbai, Chennai and Ahmedabad. The telephone came to India a little later in 1882.[31]

In 1883, the telegraph services were combined with postal services.[32] In the meanwhile, a Bill proposing the repeal of the 1876 Act was tabled to the Council. The Bill suggested modification of the definition of ‘telegraph’ to be in consonance with the developments in Britain. It also suggested the creation of a new category of penalties. This led to the enactment of the Telegraph Act of 1885[33]. The Act broadened the definition of ‘telegraph’ to include “appliances and apparatus for transmitting or making telegraphic, telephonic or other communications by means of electricity, galvanism or magnetism”[34]. The Act also created a Telegraph Authority, which meant the Director-General of Telegraphs and included any officer empowered by him[35]. Just like its 1860 and 1876 predecessors, the Governor-General enjoyed the exclusive privilege and the right to grant a license under the 1885 Act as well. The Act further granted the power to Government to take possession of licensed telegraphs to intercept messages[36].

Learn more about Technology Law with Enhelion’s Online Law firm certified Master Course! 

In 1888, overseas communications were merged with the Director-General of the Indian Telegraph Department.[37]

The next significant development took place in 1902 when cable telegraphs were changed to wireless telegraphs.[38] Therefore, in 1902, the Indian telegraph services went wireless. Furthermore, in 1914, a big administrative change happened. The Postal Department and the Telegraph Department were amalgamated under a single Director-General by amending the definition of ‘telegraph authority under the 1885 Act[39].

The 1885 Act underwent a number of changes in the years 1914, 1930 and 1937. As per the amendment of section 4 in 1914, the Government was given the power to establish and maintain wireless telegraphs on ships within Indian territorial waters and telegraphs other than wireless telegraphs[40]. This provision was further amended in 1930 to include the use of wireless telegraphy on aircraft[41].

  • Development of Radio broadcasting services under the British regime

Respect to radio broadcasting, broadcasting was introduced as a private venture through radio clubs in Calcutta, Madras, Bombay and Lahore in 1923 and 1924.[42] In June 1923, the Radio Club of Bombay made the first-ever broadcast in India. In 1927, Calcutta Radio Club was established. During this time period, there was a daily broadcast of 2-3 hours of music and talks. However, most of these stations faced liquidation within three years of their establishment due to insufficient finances.[43]

The year 1927 also witnessed an agreement between the Government and a private company named Indian Broadcasting Company Ltd. (IBC).[44] This agreement led to the setting up of the Broadcasting Service which began broadcasting in 1927 on an experimental basis in Bombay and later in Calcutta. However, IBC faced liquidation within 3 years of its establishment.[45] The government acquired its assets and established the Indian Broadcasting Service under the Department of Labour and Industries.[46] Since then, broadcasting has remained under the control of the Government in India.

Learn more about Technology Law with Enhelion’s Online Law firm certified Master Course! 

Following the establishment of the Indian Broadcasting Service, in 1935, Lionel Fielden was appointed the first Controller of Broadcasting.[47] In the same year, a private radio station, Akashvani Mysore, was set up.[48] In 1936, a radio station was commissioned in Delhi.

The next significant step in the development of radio broadcasting services in India was the renaming of the Indian State Broadcasting Service as ‘All India Radio’, or AIR in June 1936.[49] A new signature tune was added to AIR. The Delhi radio station, established in the same year, became the nucleus of broadcasting at the national level. In 1937, AIR was brought under the Department of Communications and in 1941, under the Department of Information and Broadcasting. The Department of Information and Broadcasting was again changed to the Department of Information and Broadcasting (I&B) on 10th September 1946.[50]

Radio broadcasting underwent considerable developments during World War II. By 1939, the entire country was covered by short-wave service. Taking into account the outbreak of World War, the programme structure of radio underwent a change to meet wartime contingencies. News and political commentaries were introduced and special broadcasts were made for the people on the strategic north-eastern and north-western borders.

  • Regulation of Wireless Telegraphy in the British regime

Wireless telegraphy in India developed in line with the development of radio services. One of the major sources of revenue for the Indian State Broadcasting Service was revenue from the licence fee for working of wireless apparatus under the Indian Telegraph Act, 1885. Owing to the lack of legislation dealing with the unlicensed use of wireless apparatus, the Indian State Broadcasting Service faced substantial revenue losses. To deal with the unlawful possession of wireless telegraphy apparatus, the Indian Wireless Telegraphy Act of 1933[51] was enacted.

Learn more about Technology Law with Enhelion’s Online Law firm certified Master Course! 

The 1933 Act defined terms like ‘wireless communication’ and ‘wireless telegraphy apparatus.[52] The Act prohibited the possession of wireless telegraphy apparatus without a license under section 4. The telegraph authority under the Indian Telegraph Act of 1885 was given the power to issue licenses to possess wireless telegraphy apparatus under the Act[53]. The act of possession of wireless telegraphy apparatus without a license was made a punishable offence[54].

  • The relevance of Communication Laws enacted in the British regime after the coming into force of the Constitution of India in 1950

When India became independent, there were over 7000 telegraph offices and about 300 state-owned telephone services, across the country. Furthermore, there were 6 AIR stations at Delhi, Bombay, Calcutta, Madras, Lucknow and Tiruchirapalli, with 18 transmitters, among which six were on the medium wave and the remaining were on short wave.

The legal regime governing the telecommunications sector in India developed to a considerable extent after independence owing to technological changes, however, it is pertinent to note that the government decided to adopt certain key legislation relating to the telecommunications sector which was in force during the British regime. The most significant adoption was the exclusive privilege over the telegraph service and right to grant a license, enjoyed by the Government over the telecommunications sector in the British regime. This status was adopted in the Constitution of India by virtue of Entry 31 of List I in Schedule 7 which puts ‘posts and telegraphs, telephones, wireless, broadcasting, and other like forms of communications’ in the exclusive domain of the Union List[55]. The then Prime Minister of India, Jawaharlal Nehru, was also of the opinion that the telecommunication sector should be retained by the Central Government owing to its criticality to the development of India.

The Telegraph Act of 1885 was amended in the year 1948 to substitute the word ‘Provinces’ with ‘India’[56]. Although the definition of ‘telegraph’ has been amended in the subsequent years to ensure that technological development does not leave out certain services from being regulated by the state, however, the basic premise of the 1885 Act has remained intact over the years.

Learn more about Technology Law with Enhelion’s Online Law firm certified Master Course! 

The Wireless Telegraphy Act, 1933 too is still in existence and retains most of the provisions of the original Act.

With respect to radio broadcasting services, All India Radio is in existence even today, under the control of the Ministry of Information and Broadcasting.

Therefore, the British regime did not only help India in laying the infrastructural foundations of communications, it also helped to develop a legal regime governing the same. This legal regime is still operational, with certain amendments aimed at adopting the dynamic nature of technology.

Learn more about Technology Law with Enhelion’s Online Law firm certified Master Course! 

[1] John H. Lienhard, Indian Telegraph, https://www.uh.edu/engines/epi1380.htm (last visited Apr. 20 2021).

[2] Id.

[3] Indian telegraph Service, INDIAN PHILATELY, http://www.indianphilately.net/indiantelegraph.html (last visited Apr. 20 2021).

[4] Lienhard, Supra note 1.

[5] Development of posts and telegraph during the British rule, https://madhyapradesh.pscnotes.com/modern-history/development-of-posts-and-telegraph-during-the-british-rule/ (last visited Apr. 20 2021).

[6] Lienhard, Supra note 1.

[7] Supra note 3.

[8] Maninder Dabas, Today in 1854, first telegrpoh was sent in India, INDIA TIMES (Apr, 27, 2017, 4:15 PM), https://www.indiatimes.com/news/today-in-1854-first-telegram-was-sent-in-india-between-mumbai-and-pune-here-is-all-about-the-telegraph-service-that-ende.

[9] Electronic Telegraphs Act, 1854, available at https://www.wipo.int/edocs/lexdocs/laws/en/in/in116en.pdf.

[10] Id, § 1.

[11] Supra note 9, § 7.

[12] Supra note 9, § 2.

[13] Supra note 9, § 9.

[14] Lienhard, Supra note 1.

[15] Michael Mann, The deep digital divide: The telephone in British India, 35(1) HISTORICAL SOCIAL RESEARCH 188, 200 (2010).

[16] Id.

[17] Telegraph Act, 1860, available at https://www.wipo.int/edocs/lexdocs/laws/en/in/in117en.pdf.

[18] Id, § 2.

[19] Supra note 17, § 9.

[20] Supra note 17, § 10.

[21] Indian Telegraph Act, 1876, available at https://www.wipo.int/edocs/lexdocs/laws/en/in/in118en.pdf.

[22] Id, § 2.

[23] Supra note 21, § 1.

[24] Supra note 21, § 3.

[25] Id.

[26] Supra note 21, § 4.

[27] Supra note 21, § 16.

[28] Id.

[29] Gopika G G, Growth and development of telecom sector in India- An overview, 16(9) IOSR-JBM 25, 26 (2014).

[30] Id.

[31] Id.

[32] Id.

[33] Telegraph Act, 1885, available at https://www.wipo.int/edocs/lexdocs/laws/en/in/in119en.pdf.

[34] Id, § 3(1).

[35] Supra note 33, § 3(6).

[36] Supra note 33, § 5.

[37] Id.

[38] Gopika G G, Growth and development of telecom sector in India- An overview, 16(9) IOSR-JBM 25, 33 (2014).

[39] Supra note 33, § 3(6).

[40] Act 7 of 1914.

[41] Act 27 of 1930.

[42] Growth and development, PRASAR BHARTI, https://prasarbharati.gov.in/growth-development-air/ (last visited 20 Apr. 2021).

[43] Id.

[44] Alasdair Pinkerton, Radio and the Raj: Broadcasting in British India (1920-1940), 18(2) JOURNAL OF THE ROYAL ASIATIC SOCIETY 167, (2008).

[45] Id. at 175.

[46] Id.

[47] Id.

[48] Supra note 42.

[49] K.C. Archana, 80 years of AIR: Remembering the golden days of All India Radio, INDIA TODAY (June 8, 2016, 3:51 PM), https://www.indiatoday.in/fyi/story/80-years-of-air-remembering-the-golden-days-of-all-india-radio-12987-2016-06-08.

[50] Id.

[51] Indian Wireless Telegraphy Act, 1933, available at https://www.wipo.int/edocs/lexdocs/laws/en/in/in037en.pdf.

[52] Id. § 2.

[53] Supra note 51, § 5.

[54] Supra note 51, § 6.

[55] Constitution of India, 1950, Schedule VII, List I, Entry 31.

[56] Act 45 of 1948.

Categories
Blog

Development of Cybercrime Law in the European Union

At the European Union level, although the possibility of having a comprehensive legal framework dealing with cyber crimes was not a far stretched idea owing to the cooperation at the Union level, however, this idea was not considered until the late 1990s.

Taking into account the growing incidents of cyber crimes, their peculiar nature, and the essential element of international cooperation in this regard, a series of initiatives were taken at the EU level in the form of recommendations and Council conclusions. This was followed by the first legislative proposal by the Commission in early 1998 to deal with certain aspects of computer crimes, i.e. credit card frauds and forgery of non-cash means of payment. However, it was only in May 2001 that the Framework Decision on Combating Fraud and Counterfeiting of Non-Cash Means of Payment was adopted.[1]

Learn more about Technology Law with Enhelion’s Online Law firm certified Master Course! 

During the same time, the Council of Europe was taking a number of steps and engaging in negotiations, in collaboration with the G8 countries, USA, Canada, Japan, United Kingdom, Germany, France, Italy, and Russia, with respect to judicial cooperation in this field.  As a result, an agreement was reached in 1997 pertaining to an action plan to combat high-tech and computer-related crimes. One of the action plan’s initiatives is the 24/7 network of law enforcement contact points to combat cybercrime, which is now a part of the current legal framework at the EU level. This network furthers the objective of international cooperation, specifically with respect to the investigation of cybercrimes.

In October 1999, the G8 met again as a follow-up measure of the action plan. This follow-up concluded that the biggest roadblock in combating computer crimes is the identification and tracking of criminals in cyberspace. To overcome this roadblock, many principles were adopted to ensure transnational access to data, simplified mutual assistance, and general permission to access publicly available material in another state without express permission. These principles now form the basis of the current legal regime at the EU level[2].

Meanwhile, the European Committee on Crime Problems[3] (CDPC) decided to set up a committee of experts to deal with cyber-crime in November 1996. Subsequently, the Report submitted by Professor H.W.K. Kaspersen concluded that “it should be looked to another legal instrument with more engagement than a Recommendation, such as a Convention. Such a Convention should not only deal with criminal substantive law matters but also with criminal procedural questions as well as with international criminal law procedures and agreements”.[4]

Learn more about Technology Law with Enhelion’s Online Law firm certified Master Course! 

Taking into account the Report submitted to the CDPC, the Council of Europe was successful in formulating the Convention on Cybercrime[5], with an aim to bring minimum harmonization in the acts termed as ‘cybercrime’ in the Member States of the EU.

The Explanatory Report of the Cybercrime Convention highlights the changing nature of crimes and the subsequent need to develop a legal framework to prosecute such crimes exclusively. It states that-

The technological developments have given rise to unprecedented economic and social changes, but they also have a dark side: the emergence of new types of crime as well as the commission of traditional crimes by means of new technologies.[6] Criminals are increasingly located in places other than where their acts produce their effects. However, domestic laws are generally confined to a specific territory. Thus, solutions to the problems posed must be addressed by international law, necessitating the adoption of adequate international legal instruments”.[7]

The Convention on Cybercrime adopts a holistic approach in dealing with both substantive and procedural aspects[8] of cybercrimes at the EU level. Section 1 of Chapter II covers both criminalization provisions and other connected provisions in the area of computer or computer-related crime by defining nine offences (illegal access, illegal interception, data interference, system interference, misuse of devices, computer-related forgery, computer-related fraud, offences related to child pornography and offences related to copyright and neighbouring rights) grouped into four different categories (offences against the confidentiality, integrity and availability of computer data and systems, computer-related offences, content-related offences and offences related to copyright and neighbouring rights)[9]. It further deals with ancillary liability and sanctions[10].

Learn more about Technology Law with Enhelion’s Online Law firm certified Master Course! 

Furthermore, the Convention also contains provisions for traditional as well as computer crime-related mutual assistance and extradition.[11] It also provides for transborder access to stored computer data without mutual assistance, either with consent or without consent, in the case of publicly available data. It also provides for the setting up of a 24/7 network to ensure speedy assistance among the Parties.

Lastly, at the Union level, to address the issue of cooperation at, the Union level, the European Network and Information Security Agency (ENISA) was established in 2004. ENISA was given the responsibility to develop expertise to enhance cooperation between public and private sectors and provide assistance to the Commission and Member States of the EU in their dialogue with industry for the purpose of addressing security-related problems in hardware and software products. It was also required to promote risk assessment activities as well as interoperable risk management routines.[12]

Learn more about Technology Law with Enhelion’s Online Law firm certified Master Course! 

[1] EUR-Lex, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32001F0413 (last visited May 3, 2021).

[2] These principles can now also be found in the Cybercrime Convention.

[3] Decision CDPC/103/211196.

[4] Salaheddin J. Juneidi, Council of Europe Convention on Cyber Crime, IPICS (2002).

[5] The Cybercrime Convention.

[6] Explanatory Report to the Cybercrime Convention, part I(5).

[7] Explanatory Report to the Cybercrime Convention, part I(6).

[8] Supra note 29, chapter II, § 2.

[9] Supra note 29, chapter II, § 1.

[10] Supra note 29, chapter II, §1, title 5.

[11] Supra note 29, art. 25.

[12] ENISA, https://www.enisa.europa.eu/ (last visited May 6, 2021).

Categories
Blog

Rule Of Law in Globalising World

The concept of rule of law finds its origin in the rulings of Chief Justice Sir Edward Coke[1] wherein he emphasised the significance of the King being under the law. However, it was only later that A. V. Dicey in his book: Introduction to the study of the Law of the Constitution, 1885[2], tried developing the concept further. He identified three components of the rule of law[3]

  1. The supremacy of law
  2. Equality before law
  • Constitution as a result of ordinary law of the land (signifying the relevance of judge-made laws in England)

These components ensured that the rule of law acted as a constraint on the arbitrary exercise of power by the sovereign over its subjects. Therefore, his primary focus was on the way in which the law was made, applied, and enforced (process-focused approach), rather than the actual content of the law (end-focussed approach). This creates a lot of confusion with respect to the applicability of the rule of law. Modern democracies are founded on this principle, however, there are contrasting convictions about what ‘law’ is/should be.

Previously, the concept of rule of law was limited in its application to the sovereign territory of the state as the interactions were primarily intranational. However, over a period of time, with the advent of technology and the movement of people, goods and services across borders, such interaction became international, leading to cross-border disputes. Through the process of globalization, “political, economic, and technological changes have had globalizing ramifications that penetrate state borders in ways that transformed the core rule of law values in the international legal order and have created a shift away from the previously prevailing state-centric system.”[4]

With respect to the applicability of rule of law at the international level, globalisation has made the world one single market where individual and state entities interact with other individuals and entities on a daily basis. Therefore, such interaction cannot be left unchecked with respect to the foundation principle of the legal system i.e. the rule of law. Hence, there is a need to transpose the principle of rule of law, internationally, in light of the globalized world. The significance of rule of law at the international level in the era of globalisation has been pointed out a number of times[5].

However, this transposition is easier said than done. There are some inherent issues in applying the principle globally. Firstly, with respect to whether such a principle, which was originally developed to be applicable to the national legal system, can be applied to the international legal system, in the absence of a central sovereign authority. Secondly, if the answer to the first issue is affirmative, does such international application require a reconceptualization of the original concept of rule of law in order to adapt it to the legal issues arising at the international level. Thirdly, should the international rule of law be limited in its application with respect to the relationship of different sovereign nation-states, or should it also be applied to the relationship of different individuals who are subjects of such nation-states?

The first roadblock towards the applicability of the principle of rule of law in the globalised world today encompasses the fact that there is no common sovereign power in the international arena. There is United Nations, however, the international law establishing such an institution, is a soft law in itself. Besides, it is left to the discretion of the nation-states to decide whether they wish to be a part of the U.N. Since there is no common sovereign, it is often contented by scholars that the rule of law cannot meaningfully exist in the international arena.[6] This further entails the difficulty in ascertaining what constitutes “law” in the international context since there is no “one” sovereign, and no “one” law regulating the conduct of individual nation-states.

Secondly, the Dicean concept of rule of law highlights a very narrow and process-focused approach. Such a framework will not satisfy the end objective of rule of law at the international level, with respect to acting as a constraint against the gross violation of the fundamental human rights of the individuals by the sovereign states. Therefore, the rule of law, when transposed to the international level, should not only be process-oriented but also end-oriented.

However, the nation-states, in light of the growing interaction in the globalized world and the common aim to attain international peace and order, have taken the necessary steps to address these roadblocks in the applicability of the principle internationally[7]. Globalization has a significant contribution to the development of both domestic and international legal frameworks governing and regulating transnational transactions and activities. This has led to the development of international institutions tasked with the implementation of international law to secure peace, order and respect for basic human rights in the international community.

In today’s world, however, the significance of the rule of law stretches far beyond its application to traditional inter-state relations. The second aspect of the rule of law at the international level is the increasing attention of the international community on the impact of the international rule of law on individuals, with respect to the need to protect the inalienable human rights of the individuals. The international humanitarian law and human rights law has ensured that the basic human rights of the “individuals” are brought at the centre stage[8], and that every nation-state is obligated to protect them. These developments have placed legal constraints on the conduct of sovereign states in the international community and prescribed international standards which ensure that substantive aspects of justice are also catered to, at the global level.

However, this individual-focused approach to rule of law at the international level is being implemented at the domestic level, by making the domestic legal system in line with the international standards. In light of this, it is important to keep a check on the discretion provided to the national legal system regarding the substantive rules as rule of law cannot be considered effective in its true essence if the laws are unjust and oppressive.

 

[1] LTJ, http://lawtimesjournal.in/rule-of-law/ (last visited Feb. 1, 2021).

[2] A V DICEY, INTRODUCTION TO THE STUDY OF THE LAW OF THE CONSTITUTION (1885).

[3] Id.

[4] Ruti G. Teitel, Humanity’s Law: Rule of Law for the New Global Politics, 35 CORNELL INT’L L.J. 355, 357 (2002).

[5] The Rio +20 Conference on Sustainable Development Outcome Document, 2012; UN Millennium Development Goals etc.

[6] Charles Sampford, Reconceiving the Rule of Law for a Globalizing World, GLOBALISATION AND THE RULE OF LAW 9, 10 (2005).

[7] UDHR, ICCPR, ICESCR, Convention against Terrorism, Human Trafficking etc.

[8] United Nations Human Rights Committee, the International Criminal Tribunals (ICTY, ICTR), and the International Criminal Court (ICC) etc.

Categories
Blog

Role of Flag States under United Nations Convention on the Law of the Sea (UNCLOS)

By: Shubham Bhalla 

INTRODUCTION

 The development of flag states started in 1000 BC. The Egyptians used them for the first time for identity purposes. The usage of flag advancement increases in the Stone Ages for identification and in middle age, it has been used as a symbol of the nation. The Law of the Sea Convention explains the duties of Flag States on a large scale in comparison to previous conventions. In Public International Law, it is concerned within the maxim used in the North Sea Continental Shelf cases, Opinio Juris et necessitatis, refers to the psychological element representing the State that acts as they are fulfilling a legal Requirement which is obligatory for them. It also represents the establishment of an International Custom which has been sought for recognition earlier among other states, in the condition of taking certain practices obligatory.[1]

Learn more about  Maritime Laws with Enhelion’s Online Law firm certified Diploma course by Scriboard Advocates and Legal Consultants!

In the early 19th Century, the ‘Lotus case’ revealed the essential for creating a new customary rule of International Law i.e Opinio Juris. In this case, it has been seen that even if the state has no jurisdiction in exercising their power over crimes committed on High Seas in respect to the Flag States then the French Government had no proof for the act, which had legal obligation over. This case has been criticized majorly for allowance of all those things which is not forbidden under International Law. Later, it has been overruled through the Geneva Convention on Law of Sea, 1958 by application of Article 11 of the convention, stated as ‘No criminal or disciplinary proceedings, except before the judicial/administrative authorities of either the flag State or of the State of which they are citizens, can be initiated against the persons responsible for the collision’.[2]

The practice of State establishes the coastal state in exercising its jurisdiction beyond the territorial jurisdiction by taking control of foreign vessels, to prevent the threat and enforce their rule of law. The example of North Sea Continental Shelf Cases is classical here which speaks about the provision of universal jurisdiction concerning the crimes of piracy. In today’s phenomenon, States are not free to see the resources of the sea, it is due to the “conservation and Co-operation” under Modern International Law. It is all related to the requirement of new legal order which combined as the balance of interests, between exploitation and conservation of the sea Law, from free seas to clean seas and from the peaceful uses and Strategic considerations to the balance between the Coastal Interests and Flag Interests.

The freedom of Sea well explained by the Jurist Lauterpacht, “Freedom of the seas’ true purpose is to ensure freedom of navigation, unhampered by exclusive claims of the seas’ true purpose is to ensure freedom of navigation, unhampered by exclusive claims of individual States, and freedom of utilization of the sea resources to a degree to which they can be equitably utilized by all”.[3]

WHAT IS ‘FLAG STATE’?

The state will be called “Flag State” where the Ship has been registered in that particular Country. It is deemed to be a Home Country for a Ship. The Flag state has the overall responsibility to ensure that the ship or vessels flying its flag in compliance with the International Treaties, Conventions, Regulations, and other Laws applicable. Here, the inspection is carried out within the issue of certificate every time, which is based on National regulations and ratified by that Flag State. So, Safety is measured by the authority. It is a planned perspective as there is the issuance of certificate after every inspection. The flag State does not maintain any threat matrix as compared to Port State under Public International Law. [4]

In the case of Naim Molvan v. Attorney General for Palestine[5], the court held that the ship sailing without the flag of any state has no right of freedom of navigation. This case put a legal regime of a vessel on the seas. The flag helps in settling the responsibility where Rights should be applicable concerning that particular vessel. The flag gets its recognition with the codification of the usage under the High seas convention and ultimately under the United Nations Convention on Law of the Sea (UNCLOS) 1982.

ROLE OF FLAG STATE 

  • ARTICLE 94- DUTIES OF FLAG STATES

Every State shall efficiently execute its power in administrative, technical, and social matters over ships flying its flag. Law of the sea convention prescribes in the second Para of Article 94, a duty of the flag State to maintain regular checks upon the seaworthiness of ships, to maintain a register of the vessel, to take measures to ensure safety at sea concerning the construction, equipment, and seaworthiness of the vessel.

To ensure that crews are qualified, to hold inquiries into shipping casualties, to effectively exercise jurisdiction and control over their Ships, the manning of ships, and labour conditions, etc.

Article 94(1) the matters on which the flag State is to exercise its duties is made precise, that is jurisdiction and control over administrative, technical, and social events. This provision, also present under the 1958 High seas convention, was added to strengthen the concept of concerning the nationality of a vessel by indicating matters over which the flag State should exercise its jurisdiction. The United Nations Convention on Conditions for Registration of Ships 1986 amplifies the objective set out.

Article 1 – It prescribes that the flag State is to apply the provisions of that convention to ensure or, as the case may be, strengthening between a State and ships, fly its flag and, to operate effectively. Its jurisdiction and control over such ships concerning identification and accountability of ship owners and operators as well as concerning administrative, technical, economic, and social events.

The reference there to economic matters has no direct counterpart in Article 94, but that has mentioned the comprehensive character of the obligations imposed on flag States generally throughout the UNCLOS, this slight widening of the purpose served by registration and of the duties of the flag State is compatible with the UNCLOS.

Learn more about  Maritime Laws with Enhelion’s Online Law firm certified Diploma course by Scriboard Advocates and Legal Consultants!

  • ARTICLE 94(2) – REGISTER AND ASSUME JURISDICTION:

Flag states are required to keep a record of ships flying their flag & to allow jurisdiction under its internal laws over each vessel, its masters as well as crew in administrative, technical, and social matters concerning the ship. For this, the requirement is that the register should contain the names of the vessel and in particular, nothing further requirements were mentioned within this provision.

Article 11 of UNCLOS, on the other hand, sets out in considerable detail the information that should be in a record of a vessel.

  • ARTICLE 94(3) – CONSTRUCTION, EQUIPMENT, AND SEAWORTHINESS OF SHIPS

(b) Crew of ships, labour requirements, and the Coaching of crews taking into account the suitable international instruments;

(c) Utilisation of signals, the maintenance of communications, and the prevention of collisions.[6]

  1. Each vessel before registration is surveyed by a qualified surveyor of ships and should have proper navigational equipment as are appropriate for the safe navigation of the ship. International Maritime Organization is a very specialized agency of the United Nations which is liable for actions to promote the safety and security of international shipping and to prevent marine pollution from ships.
  2. Every vessel has a head which is a master and officers who have proper qualifications and various crew members who have proper qualifications for their work as engineers etc. Safety of Life at Sea (SOLAS), 1974 commands a universal responsibility on flag States to ensure, for the safety of life at sea, the appropriate manning of the ship.

Learn more about  Maritime Laws with Enhelion’s Online Law firm certified Diploma course by Scriboard Advocates and Legal Consultants!

Standard of Training, Certification, and watchkeeping of Seafarers (STCW) 1978, as amended, contains a comprehensive set of international regulations concerning training and certification of personnel. This Convention establishes minimum requirements for training, qualifications, and seagoing service for masters and officers and certain categories of ratings, such as those forming part of a navigational watch or engine-room watch on, Oil Tanker, LPG, etc.

  1. To ensure safety at high seas means of communications are vital for accident prevention and safety. To exercise its jurisdiction the flag states must take necessary measures regarding the use of signals and maintenance of communications and prevention of collision. The Act for the prevention of collisions at sea is found in International Regulations for Preventing Collisions at Sea 1972.

Learn more about  Maritime Laws with Enhelion’s Online Law firm certified Diploma course by Scriboard Advocates and Legal Consultants!

Rules on signals: Under Safety of Life at sea (1974) all vessels are required to carry radio installations.[7]

  • ARTICLE 94(5) – CONFORMITY WITH INTERNATIONAL REGULATIONS;

Similarly, with regards to article 94(3) and (4), subsection 5 stresses that flag state is required to conform to “generally accepted” international regulations, procedures, and practices and to take any steps which may be necessary to secure their observation. Internationally accepted regulations and practices are dictated by practical necessity. While each state remains free to apply its legal requirements as regards safety, there would be chaos if these requirements widely varied or were incompatible. This provision is questionable to a range because the law and procedures to be adopted are not defined. It also does not give guidance as to what legislation could be classified as “generally accepted”. Thus one could go ahead to understand it to mean rules and standards established through competent international organizations or general diplomatic conferences to bridge the reluctance of states to impose strict safety legislation due to competition in the industry. So, a nation might be compelled to standards it did not specifically adopt. Examples of particular rules, procedures, and standards include Safety of life at sea (SOLAS), The International Convention for the Prevention of Pollution from Ships (MARPOL), etc. Flag states by this article, are under obligation to take any steps necessary to ensure observance of generally accepted international regulations and procedures. Including those related to safety, marine pollution, and the maintenance of radio communication.

  • ARTICLE 94(6) UPON RECEIVING A REPORT FLAG STATE SHALL INVESTIGATE THE MATTER.

In this article, the country has the right to use its power if the flag state has not exercised proper jurisdiction and control concerning a ship flying its flag, to report its facts to flag states. Upon receiving the report the flag state is to investigate the matter and will take remedial steps if necessary. This article calls for good faith on the part of flag states; it also re-emphasises the exclusive jurisdiction of flag states over vessels flying their flag on the high sea.

  • Article 94 (7) Inquiry into every marine casualty or incident of navigation on high seas

Few flag states are consistent in investigating casualties involving ships properly registered under their flag. They also make reports which show that they are working in the field for collecting the reason for which these casualties are happening. The Marine Accident Investigation Branch is very productive and a good example compared to other organizations. This article applies to the incidents which cause casualties like loss of life or very serious injuries to nationals of different states, damages to ships, or the marine environment. In this Flag state and other states who have a dispute will cooperate and conduct such inquiry. SIMO plays a very vital role in uniting other states for smooth conducting of such inquiries and the betterment of their mutual interest.

Learn more about  Maritime Laws with Enhelion’s Online Law firm certified Diploma course by Scriboard Advocates and Legal Consultants!

INDIAN SCENARIO IN RESPECT TO THE CASE, The Italian Republic v. The Republic of India[8] (Enrica Lexie Incident)

In this case, two Italian mariners working under Vessel Protection Detachment (VPD) posted on Enrica Lexie, an Italian commercial vessel, shot two Indian Fishermen mistaking them to be pirates in contiguous waters (20.5 nautical miles off the coast of Kerala). Thereafter, the Indian navy and coastguards detained the two Italian marines.

The Permanent Court of Arbitration (hereinafter referred to as PCA) held that Italy was guilty of violating India’s freedom and right of navigation under the United Nations Convention for the Law of the Sea (UNCLOS) Article 87 (1) (a) and 90. India and Italy had concurrent jurisdiction over the incident and a valid legal basis to institute criminal proceedings against the mariners; however, their immunity as state officials acts as an exception to the jurisdiction. The mariners will now be tried in Italy and given a sentence according to their domestic laws.

COMMENTS:

While delivering the judgment, the PCA did not acknowledge the presence of natural rights of a person which cannot be violated in furtherance of official duty. Furthermore, the case has established a dangerous precedent where it will be difficult for India to protect its innocent unarmed citizens from such acts done without provocation in the future.

[1] Dr. Ashok k. Jain, PUBLIC INTERNATIONAL LAW & HUMAN RIGHTS [LAW OF PEACE], (Third Edition 2010).

 

[2] S.S. Lotus Case (1927) PCIJ, Series A No. 10.

[3] SUPRA NOTE 1.

[4] Dr. ASHOK K. JAIN, PUBLIC INTERNATIONAL LAW & HUMAN RIGHTS [LAW OF PEACE], Third Edition 2010.

[5] 81 Ll L Rep 277.

[6] Mafia.org. (2020). Article 94. Duties of the flag State. [online] Available at: https://maifa.org/resolution/resolutions/UNCLOS%2094.htm [Accessed 15 Dec. 2020].

 

[7] Nordquist, Volume III, United Nations Convention on the Law of the Sea, a Commentary at 149.

[8] (2013) 4 SCC 721.

Learn more about  Maritime Laws with Enhelion’s Online Law firm certified Diploma course by Scriboard Advocates and Legal Consultants!

Categories
Blog

Digital Forensics and Law Enforcement

By: Prabha Devi Ganesan

INTRODUCTION

Digital Forensics is also defined as the science of identifying, preserving, analyzing and reporting of any evidence stored in the digital media like computer, network, server and mobile device. The documents of the evidence which are collected from the storage media computer system or any digital device can be used as evidence in the court. Before performing a forensic investigation a digital forensic examiner must understand various concepts in forensic.

People who can involve at the time of investigation are

  1. First responder
  2. Forensic investigators
  3. Court expert witness
  4. Law enforcement personnel

Process of Digital Forensics

  1. Identification -The first process of digital forensic is that what kind of evidence is present and also identifying the format and finding out where it is stored in the computer or mobile device.
  2. Preservation – It means that all the data is isolated, preserved and secured from using the digital device.
  3. Analysis – Based on the evidence found the fragments of data are reconstructed and the conclusion is being drawn as a conclusion. It also tells that how was it taken place.
  4. Reporting – It is like reconstructing all the crime scene and reviewing it with proper photograph, sketching and mapping the crime scene
  5. Presentation – This is the last process and all the above process are being summarized in this process and explained and put to a conclusion. The terms should be written in a abstracted terminologies

Learn more about Digital Forensics with Enhelion’s Online  certified course certified by Obsidian!

Principles of digital evidence can be gathered digitally from the messages that are sent via phone, email internal history, computer files, images and instant messages. It can also be from the sources like desktop computers, laptops, mobile devices and cloud.

Main objectives

It helps to find the identity of the suspect or the culprit. Reconstructing the procedures at the crime scene may help to ensure that digital evidence which is obtained is not being altered or corrupted. It also helps to identify the evidence at short period of time and also gives overview of any malicious activity involved. It also helps to find the motive behind the crime scene. Process of computer forensic report gives a complete documentation on the investigation process. All the evidence is preserved by following chain of custody.

In case of confiscating a computer, expert forensic examiner must be called. The expert is called to ensure that any criminal actions doesn’t get lost or damaged if the computer is switched off. Pictures of the data that is currently being displayed on the screen and when the computer system is taken into custody when the server system is off because when the server system is off, the data saved can be damaged or disrupted from the services provided to the customers. As soon as the mobile is being confiscated it must be switched off and battery must be removed it is to make sure that the recent call information and cell tower remains unchanged. Once if it is off we shouldn’t turn it on because it may change the information on the device. A remote command can be sent without the knowledge of the investigator if the attacker gets to know about the mobile device is on. The mobile must be kept off because there are many other chances where it can be switch on easily. All the evidence which is collected is kept in FARADAY BAGS or other materials used when isolating a mobile device.  We should turn on flight mode. Turn off WIFI. Turn off Bluetooth. NFC or other communications system must be off. To prevent static electricity it can be kept in a material where there is no passage of electric current like paper bag, paper made out if cardboard and any envelope made up of paper.

Learn more about Digital Forensics with Enhelion’s Online  certified course certified by Obsidian!

LAW ENFORCEMENT

Computer based evidence have common in court proceedings and also it consists of many important information for computer for intelligence than the law enforcement. There is much enforcement of techniques that law enforcement is not being known. Digital forensics is involved in the commercial organizations   in case of any disputes regarding the employment, wrong or fraud investigation and intellectual property theft bankruptcy etc.

CASE LAW 1:  (CREDIT CARD FRAUD)

STATE OF TAMILNADU VS THE MANAGER OF BPO ORGANIZATIONS (BUSINESS PROCESS OUTSOURCING)

FACTS OF CASE: The manager with the fraud control unit of BPO filed a complaint stating that two of his employees has conspired with the credit card holder and manipulated the credit card limit and as a result they cheated the company of INR 0.72 million. After the investigation they have seized six mobile phones, imported wrist watches, jewelers, credit cards and leather accessories all worth of INR0.3 million and cash INR 25000. They also informed the company of the security lapses in their software so that cases like this could not be repeated in the future. This case has won the second runner-up position for India Cyber Cop Award for its investigating. It was also stated that the case was remarkable by the investigating team of the business process and its use in collecting digital evidence.

CASE LAW 2: (BLACKMAILING)

STATE OF MAHARASTRA VS THE NRI (NON-RESIDENT INDIAN)

FACTS OF THE CASE: the accused was a NRI was working in Dubai she posed to a young girl living in Kolkata to enter into Han email correspondence. The accused started corresponding with the complainant using different email IDs with different female names which made the complainant believe that he was corresponding with different girls. Later on the accused asked for money and gifts and also sexual favors from the girls whom he was corresponding with. The accused started blackmailing the complainant referring to the email exchanges and she was made to believe that one of the girl committed suicide and sent fake copies of high court of Calcutta he also paid the bribe for the officials who supposedly investigating and compensate the family. This case won the first runner-up position India Cyber Cop Award for its investigating

Coming to the network forensics it involves HEX CODES AND ASCII CODES

ASCII CODES – AMERICAN STANDARD CODE FOR INFORMATION INETRCHANGE

When we take forensics it is also important to know about the number system fundamental. It is for the understanding the machine. There are 4 types they are binary, octal, decimal and hexadecimal

Binary number

Base -2

Symbols- (1-0)

Octal number

Base – 8

Digits – (0-7)

Decimal number

Base -10

Standard number is always 10

Hexadecimal number

Base – 16

Digits – (0-9)

Characters – A to f

OFFSET – It indicates the distance between the starting or beginning of the object and a given element or point with the same object.

FILE SYSTEM FORENSICS

The Identification, collection and analysis of digital evidence from different types of storage media is known as FILE SYSTEM FORENSICS. There are many concepts that relates to the file system

 

Firstly,

Hard disk – data can be hidden on the maintenance track or it can be protected or preserved in a protected area on the hard disk which is also known as evidence collection tool

File allocation table (FAT) and Master File table (MFT) in New Technology File System (NTFS) are to keep a track of files present in the storage media

Deleted files are removed from the file system table even though it looks like it has been deleted from the hard disk and looks like it doesn’t appear in the hard disk anymore and the clusters which are being deleted allows the other files to save or store data. There are different ways to recover the data using certain techniques we can use hex format   when we are using hex format we should start from the starting or beginning and end of the file. We should copy it in a text file. After saving it in a text file it has to be saved in an appropriate file extension.

PARTITION TABLE

It is the Master boot record. It enables a computer system to know how the hard drive is being organized particular partition are being erased but still it is being stored in the hard drive.

 

SLACK SPACE

The data is hidden in a random data is called ram slack found left over at the end of the volume. If the data are being deleted and if the clusters are not being stored it can be used in to store the data, and also the data which is deleted can be restored. It is mainly to hide the data in the storage media in a computer.

Learn more about Digital Forensics with Enhelion’s Online  certified course certified by Obsidian!

FREE SPACE

The space which is being created are being obtained after the deletion of the file which is been deleted from the original partition is called free space

FAKED BAD CLUSTERS

The data can also be stored in cluster that are named as bad and master file table which is names as badclus contains the information about the bad clusters present in NTFS file system. Size of file system is equivalent to the size of the volume. It is used to hide the size of the data stored on volume by a suspect

FAT 32 – 1996

It is mainly used in DOS and windows operating system before windows XP. 32 in the FAT32 represent the 32 bit number to depict cluster value. It accommodates 2^32. Newer hard drive don’t use FAT32

It gives a idea about where a particular file is stored it is also considered to be very simple when compared to NTFS file system.

NTFS

It’s a newer file system than FAT32

It is being used in Window NT & 2006

It has 512 byte record called boot record

It is used to read the information regarding the partition present on the file system and other relevant information that is used by the operating system to load properly

CONCLUSION

Digital forensic examination of electronic system has end up in a great success in the analysis of cyber and computer assisted crime and also it has equivalent importance on the appropriate incident management capabilities to handle misuse of systems.

Learn more about Digital Forensics with Enhelion’s Online  certified course certified by Obsidian!

Categories
Blog

Laws relating to Private Equity in the Construction Industry

By: Ananyaa Jha

Introduction

The capital investment in a business plays a major role in determining its long-term sustainability and success and there are various sources available, one of which is private equity, which has gained momentum since the past two decades in India, especially owning to the boom of the IT sector. At present the private equity (PE) firms are showing tremendous growth, the funds are distributed evenly across different sectors to mitigate the risk-factor. PE is a capital form of investment in a company that is not listed or traded publicly.

The paper discusses the law governing private equity in India along with how does a PE investment work. It also throws light upon the increasing demand for last-mile funding in construction industry and how private equity can come to the rescue.

Private Equity & its’ Importance?

The term private equity refers to capital investment in an entity that isn’t publicly traded. It’s an interest or ownership in a company that isn’t publicly listed. Private Equity investment can be made in a public company with the objective of making them private and delisting them from the stock exchange platform. Private Equity investors gain equity in return for the capital they invest in the company. Private Equity investors are generally institutional investors (such as banks, hedge funds, pension funds etc.) or individuals having a high net worth, or private equity firms comprising of accredited investors.[1]

Private Equity is different than venture capital as the latter is a funding provided to start-ups or entities which are in the nascent stages which showcase a lucrative growth in the long run, whereas private equity is more commonly invested in mature businesses that have already been established but are unable to generate profits due to poor performance & lack of efficiency, and are in-turn failing.  Private Equities play an active role in the functioning of an entity in order to improve the performance and help steer the company in the direction of increased revenues so that upon selling the investment and exiting from the entity, a generous amount of profit can be earned.[2]

Learn more about Private Equity Law in India with Enhelion’s Online Law firm certified course certified by ANB Legal Advocates and Solicitors!

PE is a crucial form of investment as along with providing the required liquidity in a project, it stimulates entrepreneurship & increases shareholders value, in turn promoting job creation and fuelling economic growth. PE leans towards the riskier side of an investment scale as there is high likelihood of a company failing to perform. It involves a high level of long-term risk in order to yield high returns. Various strategies of PE investment include but is not limited to- growth equity funds, leveraged buyouts, venture capital investments, certain real estate investment amongst others.

Construction Industry & Private Equity

Construction industry and private equity have joined hands for the past many years, coming together to fund significant development projects worldwide. In the absence of PE firms, a lot of real estate development projects wouldn’t see the light of day or wouldn’t have reached the finish line. In this industry, the PE firms make available the required funds to help a project start and finish. These firms have a major role to play in the development of real estate.

Development of the real estate in any country is a costly affair, sometimes requiring the support of foreign investors too. The entire project can cost upwards of 10 to 100 crores. In majority, the development firms fall short of the necessary amount to fund the project in its entirety. This is where PE firms come into the picture. Usually, a banking institution will cover a hefty amount of the costs yet it leaves approximately 20-35% to be funded by the developers, which could still be a large amount, unable to be funded by the developers on their own, they may require additional help funding their project, bringing in private equity.[3]

If a PE firm chooses to invest in a real estate development project, they will have a major role to play in the process of decision-making. Basically, the PE firm/investor are regarded as either a majority or a part-owner of the property in which they are investing, owing to the large scale of investment in the project, they get entitled to a considerable scale of ownership of said project, which entitles them to have substantial influence in all the decisions to be made. They will provide their input throughout the construction process. The construction firm, in all becomes indebted to the PE firm.

Learn more about Private Equity Law in India with Enhelion’s Online Law firm certified course certified by ANB Legal Advocates and Solicitors!

The year 2020 has witnessed a drop in PE investments because of the novel coronavirus disease’s outbreak (COVID-19 pandemic). The chance of specific sectors like healthcare, technology, e-commerce among a few others currently bringing about investment opportunities exists[4].

The real estate industry has taken a major hit due to the ongoing COVID-19 pandemic and the end of first quarter (March) has shown the sector to reach an all-time low. Commercial as well as residential sectors have been hit severely.[5] The already ailing residential sector in terms of poor demand is witnessing a hard time to launch any new projects or to even finish the ongoing projects due to shortage of labour and continuous construction stoppage.[6]

The slowdown in the sector will remain even post COVID-19 crisis and as lockdowns relaxation continues nationwide, since the construction sector is faced with a critical working capital crisis which holds utmost importance to restart the business & sustain it successfully. Many have their hopes pinned on intervention by the government to help recover the loss created by the pandemic. However, private equity can prove to be of aid in this current scenario.

The regulatory framework revolving around PE funds in India

In India, commonly the PE funds are established as trusts & in accordance with SEBI (Alternative Investment Funds) Regulations, 2012, are registered as an alternative investment fund (AIF). Although, only a company, trust and limited liability partnership are available to be used as the legal vehicle for the PE funds. Companies Act, 2013 provides for PE funds to be established as companies but this method is not used much due to the lax compliance required in comparison to trust structures and in addition, the unclear precedents for fund-raising. According to the Limited Liability Partnership (LLP) Act, 2008, the alternative investment funds can be instituted as LLPs, however, the LLPs use for PE funds is quite rare.[7] The regulatory framework:

  1. SEBI (AIF) Regulations, 2012

SEBI via notification dated May 21, 2012, repealed & replaced 1996 Venture Capital Funds Regulations of SEBI with the Alternative Investment Funds Regulations of 2012, The AIF Regulations were intended to provide for unregulated funds & extends its principles in this regard along with increasing stability and accountability of the market. There are 3 categories along which these AIFs are spread. Category II categorizes such AIFs which don’t come under the ambit of Category I & III. According to regulations, PE funds get registered as Category II. The purpose of preparing these regulations was to create a standard structure in order to govern private set of funds & investment vehicles to improve the channelizing of the funds.

SEBI has recently issued a circular that introduces various notable changes to the legal framework that currently exists. To strengthen the disclosures required, SEBI directed compulsory Performance Benchmarking along with standardizing PPM, that’s the prime document for disclosing all the relevant information to the potential investors, & Annual Audits for the alternative investment funds. On 1st March, 2020, all these changes have been enforced.

  1. The Companies Act, 2013

The Companies Act, 2013 brought with it a required overhaul for companies’ governance in India. The Act of 2013 brought major changes by placing regulatory responsibility, accountability & heavy compliance policies on private companies. Private companies take the ‘private placement’ route to raise capital as they aren’t permitted to offer securities to the general public & raise capital, so they have to take a different approach, wherein the securities are issued to only a selected no. of private individuals. Section 42 of the Act governs the ‘private placement’ process and all such private companies have to comply with the provisions contained in the section. The Section plainly states an invitation or an offer can’t be made to over 200[8] individuals, excluding the securities that are offered under ESOP[9] & the Qualified Institutional Buyers, but such immense rules in respect of PE funds are inapt because regulating the investments that are done through PE funds do not necessitate large compliances because the securities aren’t offered to the public. [10]

Learn more about Private Equity Law in India with Enhelion’s Online Law firm certified course certified by ANB Legal Advocates and Solicitors!

The working of PE Investment

Elucidated below is a guideline which the investors/firms need to follow when they invest in private equity of an entity:

  • Raising Capital & Share-Purchase: The Private Equity investment process starts with chalking out an acquisition plan, & ways in which capital for it could be raised, that encompasses decisions based on different kinds of financing used for raising capital, etc, along with conducting due diligence. As soon as the acquisition deal closes, the management duties of the firm that’s been acquired becomes the responsibility of PE investors.
  • The Acquired Company’s Restructuring: The subsequent move is restructuring of the firm required to increase its productivity by managing the company through improving operations & reducing costs. It covers a wide range of crucial decisions about the operations, the expansion, the profitability, the strategy to be adopted, along with the company’s growth model. The involvement level will be directly proportional to the size of their investment.[11]
  • Selling/Exiting the Company: Generally, the end mission of PE firms is putting the company on sale/exiting at a sizeable profit, which usually takes place after around 3 to 7 successful years after initial investment, although the number of years may vary depending on specific strategic circumstances. After the acquired company begins profiting, & continues to show consistent growth, it is the right time to sell it as there exists high probability of the promoters gaining enormous profits from the sale of the entity. The PE investors get their share of the profits and enjoy a good return.

The demand for last-mile funding in Construction Industry

PE firms have been on the look out to take advantage out of the increasing need of last-mile funding by the construction/real-estate developers because of the on-going stagnation in the residential sector which has worsened due to the liquidity crisis that is existent in the country. Many of the PE investors are keeping an eye for offering capital out of existing funds for construction projects which are in the final or late stage & also establishing platforms in order to finance such real estate projects. [12]

After Real Estate (Regulations & Development) Act (RERA) was implemented in 2017, the developers since then have focused on completing the construction projects & so the demand for funding capital in the late-stages has soared. The banks unwillingness to refinance loan in addition to the liquidity crisis in the financial market has elevated the demand for PE funds because a substantial number of late-stage projects are unable to finish due to lack of capital.

Given the scenario, influx of last-mile capital funding coming in to complete projects is very positively transformative for all the concerned stakeholders. The benefit of last-mile funding is that comparatively it’s a less risky approach as these projects have the necessary approvals, the construction has begun & to some extent have started bringing about sales, so all of this helps to mitigate the risk involved, which provides better chances of reward & hence, investors interests piques.

The PE firms’ interest in the real estate sector is growing at the same time when the government is taking initiative to revive the sector. The government in 2019 announced the establishment of a Rs 25,000 crore AIF in respect of last-mile funding to get the stalled residential projects back on track, because sales have been on the declining scale since 2014, except a marginal rise in the year 2016, but the demonetisation decision by the government & goods and services tax (GST) implementation worsened the situation in 2017 & since the recovery in the sector is moving very slowly.

Conclusion

Private Equity and the construction sector haven’t always connected as the PE investors have by & large steered clear of the construction industry owing to a great deal of inherent risks, like the business having a cyclic nature, professional management, succession planning along with the unrealised expectations in respect of financial requirements of the construction business, i.e., bonding, & the owners of construction companies have been apprehensive of outside investors. However, that perception is changing as PE investors will bring not just financial aid but act as a strategic partner, unlike the other sources of capital & work with the business & make a sustainable model by keeping a long-term vision, thereby maximizing value. The PE firms will bring in deep understanding of the construction industry & help the companies grow by investing not just capital but an array of other valuable requirements for the company to grow.[13]

[1] https://www.investopedia.com/articles/financial-careers/09/private-equity.asp, (Last Visited at 9:00 AM on 6th November, 2020).

[2] https://www.investopedia.com/ask/answers/020415/what-difference-between-private-equity-and-venture-capital.asp#:~:text=Private%20equity%20is%20capital%20invested,potential%20for%20long%2Dterm%20growth., (Last Visited at 10:00 AM on 6th November, 2020).

[3] https://workwithfocus.com/news/private-equitys-role-in-real-estate-development-construction/, Last Visited at 5 PM on 6th November, 2020.

[4] Rukmini Rao, “Coronavirus: E-commerce, SaaS and healthcare to attract more PE funding, says report”, Business Today, May 14, 2020, available at https://www.businesstoday.in/current/corporate/coronavirus-e-commerce-saas-and-healthcare-to-attract-more-pe-funding-says-report/story/403823.html (last visited at 2 PM on 6th November, 2002).

[5] Knight Frank India Survey.

[6] Kailash Babar, “Covid-19 impact: Real estate sentiments hit lowest level”, The Economic Times, April 16, 2020, available at https://economictimes.indiatimes.com/wealth/real-estate/covid-19-impact-real-estate-sentiments-hit-lowest-level/articleshow/75175857.cms?from=mdr (last visited at 7 PM on 6th November, 2020).

[7] Pratish Kumar, Sumitava Basu and Divya Dhage, “Private Equity in India: market and regulatory overview”, available at https://uk.practicallaw.thomsonreuters.com/8-504-2425?transitionType=Default&contextData=(sc.Default)&firstPage=true, (last visited at 11:00 AM on 6th November, 2020).

[8]  Rule 14 of the Companies (Prospectus and Allotment of Securities) Rules, 2014.

[9] Employee Stock Option Plan

[10] B&B Associates, “Private Equity in India: Evolution and Legal Overview”, July 31, 2020, available at: https://bnblegal.com/article/private-equity-in-india-evolution-and-legal-overview/, (last visited at 9:00 PM on 8th November, 2020).

[11] https://corporatefinanceinstitute.com/resources/careers/companies/equity-firm/, last visited at 11:00 AM on 8th November, 2020.

[12] Bidya Sapam, “Private equity firms sense big opportunity in last-mile real estate funding”, December 3, 2019, available at: https://www.livemint.com/industry/infrastructure/private-equity-firms-sense-big-opportunity-in-last-mile-real-estate-funding-11575311313757.html, (Last Visited at 10 AM on 9th November, 2020).

[13] https://www.cohnreznick.com/insights/private-equity-builds-bridges-construction-industry#:~:text=Private%20equity%20brings%20a%20lot,a%20company%20needs%20to%20grow., last visited at 11:30 AM on 10th November, 2020.

Learn more about Private Equity Law in India with Enhelion’s Online Law firm certified course certified by ANB Legal Advocates and Solicitors!

Categories
Blog

What is the difference between IPC and CrPC?

What is the difference between IPC[1] and CrPC[2]?

According to the National Crime Records Bureau, in 2018, India registered more than 50 lakh criminal cases. It is vital for the citizens of any country to know the laws and understand the differences between their applications. The maxim: Ignorantia Juris Non-excusat (Ignorance of the law is not an excuse) is embedded in the Indian Penal Code. Ignorance of Law or lack of knowledge does not stand as a defence in the court of law. India, as a country has more than 1200 laws in existence. However, crimes in India are regulated by:

  1. Indian Penal Code, 1862
  2. Criminal Procedure Code, 1973
  3. Indian Evidence Act, 1872

 

The criminal justice system in India is divided into two parts:

  1. First Part: Substantive Criminal Laws

These laws provide for the punishments for the offenders by the extent of the crime committed.

 

  1. Second Part: Procedural Law

This law provides a process for establishing the offenders’ guilt and imposing the punishment prescribed under the substantive criminal laws.

  • The Indian Penal Code, 1862

The Code is the country’s primary criminal Code and was drafted during the British Raj in the year 1850 and was presented to the then Legislative Council in the year 1856. It came into force on 01st January 1862.

The Code covers various offences (divided into multiple categories) and the related punishments for the said crimes. For instance, Crimes against the body (Murder, kidnapping, Culpable homicide, etc.), Crimes against property (theft, dacoity, etc.), Economic crimes (Cheating and Counterfeiting) and various other crimes.

  • Criminal Procedure Code, 1973

The Code is the procedural law which provides a detailed procedure for punishments under the penal laws. It thereby enforces and administers the Indian Penal Code and various other substantive criminal laws. The Parliament enacted the Code on 25th January 1974 to consolidate and amend the law relating to Criminal Procedure.

The Criminal Procedure Code is read along with the Indian Penal Code, 1862 and the Indian Evidence Act, 1872. There often exists a state of perplexity concerning the difference between the Indian Penal Code, 1862 and the Criminal Procedure Code, 1973. Let us now look at the differences between the two legislations.

 

Difference between the Indian Penal Code, 1862 and Criminal Procedure Code, 1973

  1. The Indian Penal Code is a substantive law[3], whereas the Criminal Procedure Code is procedural law.[4]
  2. The Indian Penal Code states various crimes and classifies them into multiple categories. The Code also prescribes the penalties and the punishment for the respective offences. On the other hand, the Criminal Procedure Code defines the procedure that the police take to investigate any violation after having committed any crime mentioned under the penal laws.
  3. The Indian Penal Code aims to provide a primary penal code in the country for giving punishment to the wrongdoers. On the other hand, the Criminal Procedure Code’s main motive is to provide for binding procedures that must be enacted during the administration of a criminal trial.
  4. The Criminal Procedure Code, 1973 provides for the courts and Magistrate’s powers, while the Indian Penal Code does not.

Let us now take an example to understand the difference between the legislations better.

Izzie to kill Mathew enters his house and murders him by hitting him with a hammer and slitting his throat. Section 300 of the Indian Penal Code, 1860 defines ‘Murder.’ And Section 302 of the Code prescribes the punishment for the said crime. The section specifies that any person who commits the act will be punished with death or life imprisonment.

How will Izzie be punished for the crime committed?

Murder is a non-bailable and cognizable offence. The Criminal Procedure Code, 1973 thus specifies a procedure to be followed to determine the offender’s guilt, whether or not bail will be granted, evidence to be taken into account, trial, investigation and impose the individual penalty.

CONCLUSION

The three primary legislation governing criminal law in India: Indian Penal Code, Code of Criminal Procedure and the Indian Evidence Act continue to play an essential role in the courts of law for the effective execution and justice administration. Due to the rise in crimes and criminals, it becomes vital for all citizens to learn the country’s primary criminal laws’ fundamental differences.

[1]The full form of IPC is Indian Penal Code

[2] The full form of CrPC is Criminal Procedure Code

[3] Substantive laws refer to those laws that define individuals’ rights and duties and the respective punishment and organizations.

[4] Procedural Laws include those rules that govern the process of determining individuals and organizations’ duties and rights.

 

 

Categories
Blog

Star India Private Limited v. Leo Burnett

– By Apoorva Mishra

The plaintiffs entered into an Agreement dated 9th April, 2000 with Balaji Telefilms Pvt. Ltd., in order to create, compose and produce 262 episodes of a television serial entitled “KYUNKI SAAS BHI KABHI BAHU THI”.  Since then Balaji has produced episodes of the serial and their services were engaged by way of contract of service and as such the plaintiffs are the first copyright owners under Section 17 of the Copyright Act. Balaji has devised the original artistic work depicting inter alia the logo and the title in a peculiar stylized font and containing as its essential features the words “KYUN KI SAAS BHI KABHI BAHU THI” and as per the agreement plaintiffs have become the owner of the said artistic work. The serial had acquired immense goodwill and reputation so much so that the public associate the said serial with plaintiffs and plaintiffs alone. Plaintiffs started endorsing the serial and the characters in form of products and services for a fee. In February 2002, the defendants came up with the commercial for a consumer product “TIDE DETERGENT” telecasting it with a title, “KYONKI BAHU BHI KABHI SAAS BANEGI” and characters of a grandmother, mother-in-law and daughter-in-law, similar to the characters of J.D., Savita, Tulsi as in the serial of the plaintiff. The plaintiffs contended that there has been an infringement of copyright because an average viewer will have an impression that the plaintiffs are endorsing the defendant’s product and there is a connection between plaintiffs in the said serial and the defendants and their product. It is contended that the defendants are not entitled to do so without obtaining the prior consent and/or the permission from the plaintiffs and they have misrepresented the public at large and on account of this plaintiffs have suffered loss due to continuous act of infringement of copyright and passing off of the copy to the defendants.  The matter was brought before the Hon’ble Bombay High Court raising several issues:

First, Have the defendants by making the commercial film, violated and/or infringed the plaintiffs’ copyright in the T.V. serial “KYUN KI SAAS BHI KABHI BAHU THI”?

The court ruled that anything which is not a substantial copy of the film shall not be held liable for copyright infringement. Therefore, defendants by making the commercial film have not violated and/or infringed the plaintiffs’ copyright.

The court has rightly dealt with the above issue, for the second film to infringe the copyright of the first film it has to be the exact copy of that film which is not the case here. The plaintiff’s film is a work of 262 episodes whereas defendant’s advertisement is a work of 30 seconds in which only for 8 to 10 seconds the characters appear as a prelude to the tide detergent. The major and substantial part consists of tide detergent. Nothing is common between the two scripts. The defendants have put in their own independent skill and labour in making of the advertisement whole sole purpose is to promote the Tide detergent. The models are same in both the film. These models are professional and free to contract. There cannot be, therefore, any act which would amount to infringement by using the same models. Even if the idea is borrowed there, can be no copyright in the idea.

Second, Have the plaintiffs’ proved the defendants have infringed the plaintiffs’ artistic work?

The court denying the contentions of the plaintiffs coined the term Originality. Originality merely means effort expanded or that it involves skill, labour and judgment in its creation. Under Section 17 of the Copyright Act, the Author of a work is the owner of the copyright therein. The defendants have contended that the logo consisting of the two hands is a symbol in common use and in the public domain and open to anyone to use. The holding hands well known form of representing the handing over of something from one to another and are a commonly used symbol and they denied on the fact that the plaintiffs have put any skill, labour or some sort of judgement in its creation but has merely taken the lettering style from a source easily available in public domain. Hence, there is no originality, therefore no copyright.

Third, Have the plaintiff’s proved that the defendants are guilty of passing off their reputation and goodwill in the T.V. serial?

The court held that the defendants are not guilty of passing off as they do not satisfy the essentials of passing off per se. Plaintiffs’ serial is shown on Star Plus Channel which is not owned by the plaintiffs. Goodwill does not accrue to the plaintiffs. The plaintiffs have no goodwill or reputation. It is the case of the plaintiffs that their serial/film is associated exclusively with the Star Plus Channel by the public and public is well aware that it can be seen only on Star Plus. Also, the T.V. commercial will not cause any harm to the plaintiffs’ serial or their reputation because the field which the plaintiffs’ serial occupies as a film/soap opera is different from the field of defendants’ commercial that of an advertisement of detergent Tide. Even the activity area is also not in common, therefore there is no misrepresentation.

On the facts of this case, there is no fictional character involved like ‘Superman’, ‘Shaktiman’ Teletubbies’. In the serial there are ordinary people in common life who plays the role of some character or the other. At least from the material on record there is nothing special in any, of the characters of which it can be said that they have gained any public recognition for itself with an independent life outside the serial. This, the plaintiffs have failed to establish. It is also not a case of one film against another film and further the defendants are not merchandising any character from the serial by means of their T.V. commercial. There should be in actual character merchandising and not mere potential of character merchandising.

The court, after analysis the entire case, rightly pronounced the judgement in favour the defendants. The defendants are just promoting their consumer product “Tide” via a T.V. commercial which in no way is connected. The field of activity of the plaintiff and defendant are totally different. No likelihood of damage has been caused to the plaintiff. The characters of which the plaintiff claims to be copied are simple general roles of our Indian society and the defendants are simply targeting the audiences of India who will relate easily to these household roles and nothing special that the plaintiffs have done with these characters for which they claim a copyright on them. This isn’t a case of misrepresentation or fraud and no real damage has been caused. No prudent person will confuse the advertisement with plaintiffs’ serial. Moreover, for character merchandising the plaintiffs should prove that the public would look at the character and consider it to represent the plaintiffs or to consider the product in relation in which it is used as has been made with the plaintiffs’ approval. But the plaintiffs have failed to establish this. In my opinion, the defendants have rightly pleaded that they are a major consumer goods Company, well known in their own right and their products including Tide have their own reputation amongst the public; Tide will be associated with the defendants and not with the plaintiffs.

To learn more about Cyber Law in India, stay connected to our blog or head on to our Law Firm Certified Courses and learn from leading law firms in India. [Click Here]

Categories
Blog

Compulsory Licensing of Patents

– By Apoorva Mishra

Compulsory licensing is an involuntary licensing where the licensor is unwilling to grant the license to the willing licensee, but this entire agreement of compulsory licensing is enforced by the state, by which the licensor has to transfer the rightful authorization of the patent to the licensee, against all his wishes. Government is basically the protector and acts as a guardian for the public at large. Therefore, for the benefit of nation, it has the right to grant the patent and next moment take away the patent and patentee’s monopoly over it. The requirements of the society at large supersedes against the rights of the patent holder to answer the pressing public requirements. Following situations may attract compulsory licensing where IP holder:

  • Charges unfair and discriminatory prices; or
  • Limits production of goods and services; or
  • Restricts technical or scientific development of goods and services; or
  • Desecrates consumer welfare.

Internationally, compulsory licensing has been supported saying that it helps in catering to the needs of the public at large and development of developing and underdeveloped countries. Compulsory Licensing has been mandated by several agreements like WIPO (World Intellectual Property Organization), Paris Convention for the promotion of industrial property. TRIPS has envisaged several conditions for issuance of compulsory licensing:

  1. The person or company should apply for licensing after 3 years to the grant of patent.
  2. Before applying for compulsory licensing, the person or company should make an attempt for voluntary licensing.
  3. The person or company then should apply to the board for compulsory licensing if the proposed user has made efforts to obtain authorization from the right holder on reasonable commercial terms and conditions and that such efforts have not been successful within a reasonable period of time.

In India, we have seen a growth of many foreign companies reason being they hold knowledge and they rule the terms.  Therefore, there exists a chance that these companies can abuse their positions. Compulsory licensing of IPRs in cases of such abuses would be an apt remedy that will deter these companies from abusing their dominant positions. Keeping in mind Indian conditions compulsory licensing will spur growth and development in Indian industrial sectors. Keeping in mind the size of Indian market the incentive for innovation will not erode to the extent that might deter companies from entering in to innovative endeavours as courts have granted reasonable royalties in cases where compulsory licensing has been awarded. Compulsory licensing will make the products more accessible to public and it will be beneficial for public welfare.

The developing and the under developed countries are not much concerned about protection of patent laws as much as developed countries are because they don’t have resources to spend on development of costly mechanism to ensure protection of patents.

There are few reasons behind this:

  • by allowing piracy, developing and underdeveloped countries can ensure availability of needed goods and services to their citizens at affordable prices
  • The local industries which produce counterfeit goods employee thousands of workers and therefore reduce unemployment.
  • In order to advance in science and technology, they need maximum access to intellectual property of advanced nations.

More than 80% patents in developing and underdeveloped countries are owned by citizens of technologically advanced countries. Consequently, their governments are not willing to spend huge amounts in developing effective administrative mechanism to enforce IPRs of citizens of advanced states.

The Government will, however, pay royalty to the patent holder for using his patent without his permission, but this will in turn discourage the patent holder from making any further inventions or innovations. The discouraged Research & Development shall lead to deteriorating economic growth. The developing or under-developed countries shall refrain from investing in R & D, indirectly affecting the economy, and will settle for generic goods. This might increase the risk of goods turning into inferior quality. Ultimately, as a result of weak intellectual property regime, a country becomes less competitive, and brain drain is an obvious result.

Compulsory licensing becomes inevitable to deal with the situations of “patent suppression”. By incorporating an effective mechanism of compulsory licensing, governments of developing countries may pressurize the patent holders to work the patent to maximum national advantage. The threat of non-voluntary licensing may be helpful in negotiating a reasonable price of the needed drug acceptable to both the patent owner and the government. Compulsory licensing might be necessary in situations where its refusal may prevent utilization of another important invention which can be significant for technological advancement or economic growth.

Compulsory licensing ensures that a good number of producers or manufacturers are there to cater to the needs of society; it spurs competition and consumer welfare. Those who argue against it saying that it leads to erosion in incentive for innovation forget that a right is always accompanied by a corresponding duty, and failure to perform that duty might have its implications in law.

The abuse of patents is a very likely to occur where the patentee has its rights protected under Patent laws. The patent holder has monopoly rights but they are more likely to abuse. The patent holders are often tempted to indulge in to anti-competitive practices and they try to extend their monopoly into areas where they do not have rights protected by IPRs. Software companies like Microsoft, several pharmaceutical companies, as discussed above, are protected under the patent laws and most of the time they are the sole manufacturer. So this gives them an opportunity where they can dictate their terms over the entire market which might lead to exploitation of others right in the market. In such a scenario, compulsory licensing comes into play, which acts as a remedy to abuse of patents, where government intervention leads to increase in the versatility of the market leading to a monopolistic market rather than a monopoly, the consumers have a choice and the product will be easily available, where the opponents have argued that compulsory licensing will lead to discouragement for innovations, but this also true that this will lead to a heated competition, which will in return lead to a peer pressure over the patent holder to work more over his product, get distributers, improve his research and product and make it available to the public at large. This will lead to an increase in the economy. There are reasonable apprehensions that FDI may dry up if compulsory licensing is granted as a remedy, to that essential facility doctrine must be adopted, so that only what is essential and necessary should prevail.

To learn more about Cyber Law in India, stay connected to our blog or head on to our Law Firm Certified Courses and learn from leading law firms in India. [Click Here]