Categories
Blog

Freedom Of Press Vis-À-Vis Freedom Of Speech And Expression

– By Apoorva Mishra

The strength and importance of media in a democracy is well recognized. Article 19(1)(a) of the Indian Constitution, which gives freedom of speech and expression includes within its ambit also covers freedom of press. The existence of a free, independent and powerful media plays a very important role in the democracy, especially of a highly mixed society like India. Media is not only a medium to express once feelings, opinions and views, but it is also responsible and instrumental for building opinions and views on various topics of regional, national and international agenda. The pivotal role of the media is its ability to mobilize the thinking process of millions.

Freedom of press is not specifically mentioned in article 19(1) (a) of the Constitution and what is mentioned there is only freedom of speech and expression. In the Constituent Assembly Debates it was made clear by Dr. Ambedkar, Chairman of the Drafting Committee, that no special mention of the freedom of press was necessary at all as the press and an individual or a citizen were the same as far as their right of expression was concerned.[1]

The framers of the Indian constitution considered freedom of the press as an essential part of the freedom of speech and expression as guaranteed in Article 19 (1) (a) of the Constitution.

Democracy is the rule of the people. A system which has three strong pillars. But as Indian society today has become somewhat unstable on its 3 legs- the executive, the legislature and the judiciary. Therefore, the guarantee of Article 19 (1)(a) has given rise to a fourth pillar- “Media”. It plays the role of a watchdog of the functionaries of society and attempts to attend to the wrongs in our system, by bringing them to the knowledge of all, hoping for correction. It is indisputable that in many dimensions the unprecedented media revolution has resulted in great gains for the general public. Even the judicial wing of the state has benefited from the ethical and fearless journalism and taken suo motu cognizance of the matters in various cases after relying on their reports and news highlighting grave violations of human rights. In such circumstances the media plays a crucial role in not only mobilizing public opinion but bringing to light injustices which most likely would have gone unnoticed otherwise.[2]

However, there are always two sides to a coin. With this increased role and importance attached to the media, the need for its accountability and professionalism in reportage cannot be emphasized enough. In a civil society no right to freedom, howsoever invaluable it might be, can be considered absolute, unlimited, or unqualified in all circumstances. The freedom of the media, like any other freedom recognized under the constitution has to be exercised within reasonable boundaries. With great power comes great responsibility. Similarly, the freedom under Article 19(1) (a) is correlative with the duty not to violate any law.

Every institution is liable to be abused, and every liberty, if left unbridled, has the tendency to become a license which would lead to disorder and anarchy. This is the threshold on which we are standing today. Television channels in a bid to increase their TRP ratings are resorting to sensationalized journalism with a view to earn a competitive edge over the others. Sting operations have now become the order of the day. They are a part of the hectic pace at which the media is evolving, carrying with every sting as much promise as risk. However, technology has its limits. It cannot be denied that it is of practical importance that a precarious balance between the fundamental right to expression and the right to one’s privacy be maintained. The second practice which has become more of a daily occurrence now is that of Media trials. Something which was started to show to the public at large the truth about cases has now become a practice interfering dangerously with the justice delivery system. Both are tools frequented by the media. And both highlight the enormous need of what is called ‘responsible journalism’.[3]

Journalism brings awareness in the society about the democratic and social obligations. Journalists are watchdogs of the society. However, the media is not absolutely free to do whatever seems right to it. Law which regulates the conduct of the State, its institutions and citizens also regulates the media. Like any other profession, journalism is also bound by legal framework. Indian Constitution is the fountain head of laws regulating media in the country

 

[1] Basu, D.D., Law of the Press, Wadhwa Publishers (2002)

[2] Baskhi, P.M., (1985) Press Law: An Introduction, BTRFI Publications

[3]Divan, Madhavi Goradia. (2006) Facets of Media Law. Eastern Book Company Publishing Pvt. Ltd., Lucknow

Categories
Blog

Apple v. Samsung- A Case on Design Patents

On August 24, 2012, a jury on the Apple v. Samsung case returned a verdict in the long, legal battle over several Apple patents relating to Apple’s iPhone and iPad. The jury submitted a verdict awarding Apple 1.05 billion dollars as damages that must be compensated by Samsung.[1] This case brought these two incentives of patent protection in light of design patent protection.

DESIGN PATENT

Unlike utility patents, design patents only protect the ornamental design for an article of manufacture.[2] They do not cover structural or functional elements. In fact, design patents are invalid where the design is dictated by function.[3] Additionally, rather than having a series of written claims at the end of the patent, the figures and, at times, the description, are used to define a single claim to which the design patent is directed.[4]

The infringement analysis for design patents is similar to utility patents—the first step is construing the patented design. However, design patents protect only ornamental designs.

Second step is, ordinary observer test. Under that test, an ordinary observer compares the differences in the patented design and the accused product in view of the prior art to determine if they are substantially the same such as to deceive the ordinary observer into purchasing one believing it to be the other.[5]

THE APPLE V. SAMSUNG CASE

In regards to the Apple v. Samsung case, one of the patents in controversy, the D’677 patent, protects the design of the iPhone. First, the D’677 patent protects the surface design: which consists of a highly polished, reflective surface that covers over the entire front face of the phone, and is considered to be an article of manufacture. In addition, the D’677 patent applies to the shape or configuration of the phone’s reflective surface, which consists of a large rectangular display occupying most of the phone’s front face.[6]  The corners of the phone are rounded. The latter part could be considered the shape and configuration of the whole part of the phone. Therefore, design patent D’677 covers both aspects of a design patents.

Samsung claimed that, Apple’s D’677 patent was invalid because it was not patentable in light of the prior design in Japanese Patent No. 1,241,638.43 The court concluded that the ′638 design was sufficiently different from the D′677 patent, because it would not have been obvious to a designer to adopt certain features contained in the D’677 patent.[7] The jury found that none of Apple’s patents were invalid.

 

Infringement under Design Patent

An infringement of a design patent includes, “during the term of a patent for a design, without license of the owner, (1) applies the patented design, or any colourable imitation thereof, to any article of manufacture for the purpose of sale, or (2) sells or exposes for sale any article of manufacture to which such design or colourable limitation has been applied shall be liable to the owner to the extent of his total profit.[8] Infringement does not require absolute identity between the patented design and the accused design. The patentee must prove, however, that the accused design appropriates aspects or features in the patent design that distinguishes it from the prior art.[9]

In other words, in order for an infringement claim to be a valid infringement claim the infringer cannot include only a part of the patented design.[10] Instead, the infringer must incorporate the overall design. Furthermore, it must be the claimed elements of the design, not the commercial embodiment of the design.[11]

In the battle between Apple and Samsung, the jury found that Samsung’s smart phones had not passed the Ordinary Observer Test, and that a consumer would find no difference in the designs of Apple’s D’677 patent and Samsung’s smart phones. Therefore, the jury concluded that that Samsung’s smartphones had infringed on Apple’s D’677 patent

 

CONCLUSION

The case determines the power of patent holders to obtain protection, and how they can use it to maintain advantage over competitors. In essence, Samsung’s argument that Apple has now used the courts to shut down competitors that tried to advance upon functional designs that result in more competition and better products can be construed as a partially valid theory. The case does not directly impact any particular design patent law or overrule a prior decision but it speaks more to patents’ influence over the products the public uses every single day. In the current case, Apple has several utility and design patents in addition to other related causes of action. The fact that Apple can take rectangular corners and round corners and use it to stop a competitor from selling a smart phone that consumers around America use, demonstrates the potential power of such protection. This not only makes competitors reluctant to risk a negative reputation and money in extended litigation over a controversial design, but it can inhibit new start-ups to create competing designs in fear of litigation from Apple or any other large corporation with several thousands of patents and millions of dollars allocated just for litigation

 

[1] Apple, Inc. v. Samsung Electronics Co., Ltd., 678 F.3d 1314, 1317 (Fed. Cir. 2012)

[2] 35 U.S.C. § 171. See also OddzOn Prods. Inc. v. Just Toys Inc., 122 F.3d 1396, 1405 (Fed. Cir. 1997).

[3] OddzOn Prods. Inc. v. Just Toys Inc., 122 F.3d 1396, 1405 (Fed. Cir. 1997); Lee v. Dayton-Hudson Corp., 838 F.2d 1186, 1188 (Fed. Cir. 1988).

[4] Elmer v. ICC Fabricating, Inc., 67 F.3d 1571, 1577 (Fed. Cir. 1995).

[5]  Gorham Co. v. White, 81 U.S. 511, 528 (1871).

[6] Alan F., Jury Verdict Form from Apple v. Samsung Patent Trial Is Released, PHONE ARENA

http://www.phonearena.com/news/Jury-verdict-form-from-Apple-v.-Samsung-patent-trial-is-released_id33703.

[7] Supra note 1

[8] 35 U.S.C.A §289 (2010).

[9] Robert S. Katz, Infringement of Design Patents in the United States, 10 U.BALT.INTELL.PROP.L.J.117 (2002)

[10] ContessaFood Prods., Inc. v. Conagra, Inc., 282 F.3d 1370, 1378-79, 1382 (Fed. Cir. 2002).

[11] Payless Shoesource, Inc. v. Reebok Int’l, Ltd., 998 F.2d 985, 990 (Fed. Cir. 1993)

To learn more about IP Law in India, stay connected to our blog or head on to our Law Firm Certified Courses and learn from leading law firms in India. [Click Here] 

Categories
Blog

A Case Study on Bulun Bulun Case

The statement of claim alleges on the reduction to material form of a part of the ritual knowledge of the Ganalbingu people by the creation of the artistic work, the first applicant held the copyright subsisting in the artistic work as a fiduciary and/or alternatively on trust, for the second applicant and the people he represents.[1]

It is contended that these rights arise because second applicant and those he represents have the power under customary law to regulate and control the production and reproduction of the corpus of ritual knowledge.

It is contended that the customs and traditions regulating this use of the corpus of ritual knowledge places Mr Bulun Bulun as the author of the artistic work in the position of a fiduciary, and, moreover, make Mr Bulun Bulun a trustee for the artwork, either pursuant to some form of express trust, or pursuant to a constructive trust in favour of the Ganalbingu people.[2]

The right to control the production and reproduction of the corpus of ritual knowledge is said to arise by virtue of the strong ties which continue to exist between the Ganalbingu people and their land.

EQUITABLE RIGHTS

Equitable rights are rights created and enforced by the court where it would be unconscionable to permit the legal owner of property to keep the benefit of property to herself.[3] The Applicant argued that equitable rights were created in the artistic work given the nature of the artwork. Mr. George M represented those who have the power under customary law to regulate and control the production and reproduction of the corpus of ritual knowledge of the Ganalbingu people. It was argued that Mr. Bulun Bulun held the copyright subsisting in the artistic work on trust or alternatively as a fiduciary for Mr. George  and the Ganalbingu people.[4]

Was there an Express Trust?

The existence of an express trust depends on the intention of the creator. To express an intention to create trust, it is not necessary that there be any formal or technical words. Any apt expression of intention will suffice. The intention to create a trust must be manifested in some form or another.[5] Mr. Bulun Bulun did not hold either the artwork or the copyright in it in trust for the Ganalbingu people. The fact that Mr. Bulun Bulun was entitled in customary law to sell his work and retain the profits himself was seen by the judge to be inconsistent with there being an intention to create an express trust.

Was there a Fiduciary Duty?

Fiduciary refers to a relationship of one person to another, where the former is bound to exercise rights and powers in good faith for the benefit of the other. Unless expressly entitled, a court of equity will not allow a person in a fiduciary position to make a personal profit or to put himself in a position where her duty and her interest conflict. [6] In Fiduciary relationships, the Fiduciary agrees to act on behalf of another person in the exercise of power which shall affect him in legal or practical sense.

ISSUE

Whether or not Mr. Bulun Bulun owed a fiduciary duty to the Ganalbingu people in respect of his role as author and copyright owner of the artistic work?

APPLICATION AND ANALYSIS

  • The Court considered that a fiduciary relationship existed between the artist and the clan group and that the artist had a fiduciary duty towards his community. The artwork contained ritual knowledge that was of great importance to members of the Ganalbingu people.
  • The Court noted that while the artist was entitled to pursue the exploitation of the artwork for his own benefit, he was still required under customary obligation to refrain from taking any steps which might harm the communal interests of the clan in the artwork.
  • The right of the Ganalbingu clan, in the event of a breach of obligation by the fiduciary, is a right In personam to bring an action against the fiduciary to enforce the obligation. The court considered that Mr. Bulun Bulun had fulfilled this obligation by taking legal action against the infringers.[7]
  • The Court established that the author had taken necessary actions through bringing the case to the Court.
  • The Court dismissed the claims brought by Mr. George M due to the existence of fiduciary obligations owed by Mr. Bulun Bulun to the Ganalbingu people and fulfillment of these obligations.

CONCLUSION

The case switched from classical copyright dispute to the consideration of the indigenous communal rights. This case has become very famous in the field of indigenous traditional knowledge since the Court implied in its reasoning that communal right in artwork should be recognized. Moreover, it assumed that Australian legal system would permit for indigenous clan to bring an action to protect the artwork under other circumstances. On the whole, this case provides us with the following main observations. First, the recognition of communal ownership in indigenous artwork is supposed to be an adequate means of protection for indigenous interests. Second, the Court concluded that communal ownership in artwork cannot be recognized under existing copyright law.

[1] Bulun Bulun v R & T Textiles Pty Ltd. (1998) 41 IPR 513

[2] Australian Law Reports, John Bulun Bulun & Anor v R & T Textiles Pty Ltd(von Doussa J.), 157 ALR 193; available at http://www.utexas.edu/law/journals/tlr/sources/Issue%2090.1/Walker/Walker.fn075.Bulun%20v%20R%20and%20T%20Textiles.pdf

[3] Reproduced in Colin Golvan, ‘Aboriginal art and copyright: The case for Johnny Bulun Bulun’, in

European Intellectual Property Review, Vol 10, 1989, pp. 347–354

 

[4] Sally McCausland, “Protecting Communal Interests in Indigenous Artworks after the Bulun Bulun Case”, Indigenous Law Bulletin, July 1999

[5] Michael Hall, “Case Note: Bulun Bulun v R & T Textiles”, Vol 16, No 3 Copyright Reporter,November 1998.

[6] Nicholas Blackmore, “The Search for a Culturally Sensitive Approach to Legal Protection of Aboriginal Art”, (October 1999) 17 (2) Copyright Reporter.

[7] V. J. Vann “Copyright by way of fiduciary obligation – finding a way to protect Aboriginal art works” Media & Arts Law Review (2000) March p. 13

To learn more about IP Law in India, stay connected to our blog or head on to our Law Firm Certified Courses and learn from leading law firms in India. [Click Here] 

Categories
Blog

Jurisdiction in Cyberspace

Relevancy of physical location, in Jurisdiction and Governance

The Information Technology Act has provided a legal framework for smooth conduct of e-commerce facilitating and regulating electronic commerce however the problem of jurisdiction of this new arena is extremely complex especially with the expansion of trade and commerce.

Technology reduces and frequently eliminates the need for physical contact in the creation of legally noteworthy relationships between parties or between an actor and the state acting as regulator.  The legal system then is bound to decide what relationship is necessary between the forums and whether either of the conduct is occurring outside the forum or the parties.  It is the relationship between a party and a forum, not necessarily a physical connection between the forum and the conduct of that party that is critical and whether such a tie is sufficient to enable the forum to emphasize individual and prescriptive jurisdiction depends on an analysis of additional factors?

As e-commerce becomes an increasingly important segment of the global economy, with the growth and expansion of technology, Jurisdiction and governance of the web world becomes tougher.

Where services are performed, a security offered for sale, or a trademark infringed became the significant to both personal and prescriptive jurisdictional inquiries- as long as such an act occurred within the state’s boundaries, its declaration of both personal and prescriptive jurisdiction was proper and enforceable.  Activities continue to remain relevant as long as they occur in “real” space, the place of such occurrences.

Not all assertions of jurisdiction were based on this kind of conduct-based inquiry.

For example, states continued to affirm jurisdiction over their citizens with respect to claims that arise outside of the state and to regulate conduct that occurs elsewhere which is proposed to and does cause considerable effects in the state.  Nonetheless, a concern with where relevant acts took place is vital to many, if not most, decisions.  In some contexts, some countries have already implicitly documented this in the detailed context of electronic commerce.  Australia’s Electronic Transactions Act 1999 (Cth) presents default rules for the place of dispatch and receipt of electronic communications (including the place of an offer or acceptance of a contract) based on the party’s place of business or ordinary residence.

Acquiring jurisdiction over an individual who is not resident of India if a foreign country is the sight of the crime and the criminal is not even an Indian citizen, merely because a computer or a computer system in India has been utilised in some way or other linked with the crime. However if software/hardware in India is damaged by a hacker based in a foreign country, there can be no disagreement about India’s right to reach him and make him/her responsible and accountable for the crime committed in India alone. Contravention of any provisions of the Act is a matter of adjudication for compensation purposes by the adjudicating officer and for criminal action by the court.  The Information Technology Act, 2000 apart from India, has extra-territorial jurisdiction to cover any offence or contravention committed outside India by any person.

To learn more about Cyber Law in India, stay connected to our blog or head on to our Law Firm Certified Courses and learn from leading law firms in India. [Click Here]

Categories
Blog

Right To Publicity- an Analysis

Right To Publicity- An Analysis

India does not have any legislative provision protecting an individual’s right of publicity. This right has for the most part been enforced in India under the common law tort of passing off, to establish which it is necessary to show that the disputed mark possessed goodwill and reputation.

Section 2(1)(m) of the Trade Marks Act that defines ‘marks’ includes names within its ambit – the Act does not make any specific provision for Publicity or Personality Rights. Indian courts have so far had little occasion to answer and debate over the issue of publicity or personality rights, it is likely that discussions based on different fundamentals of the Right to Publicity will pave the way for its legal recognition. To show ‘reputation’, the enforcement of this right would, in most cases, unconsciously be dependent on commercial exploitation of the plaintiff’s mark – effectively justifying why all individuals may not be protectable under the tort of passing off.

The right to publicity forming a segment of the right of privacy was first recognized in India by the Supreme Court in R RajaGopal v. State of Tamil Nadu, where it was stated by the Court “the first aspect of this right must be said to have been violated where, for example, a person’s name or likeness is used, without his consent”.

Indian judicial analysis of right to publicity is at a embryonic stage, several questions are yet to be attend to by the courts. The ambiguousness and partisanship of the definition of the term “celebrity” itself, and the difficulty to determine what factors would lead to a conclusive determination of who falls within the ambit of a “famous or well-known person”. Secondly, it is not known as to whether this right continue to exist post death in India, and whether it is capable of being transferred before death? In United States of America, the states of California and South Carolina, both are acquainted with post mortem rights to publicity however California imposes a durational limit of 70 years after the person’s death

In ICC Development (International) vs. Arvee Enterprises and Anr – the court held

“The right of publicity has evolved from the right of privacy and can inhere only in an individual or in any indicia of an individual’s personality like his name, personality trait, signature, voice, etc. An individual may acquire the right of publicity by virtue of his association with an event, sport, movie, etc. However, that right does not inhere in the event in question, that made the individual famous, nor in the corporation that has brought about the organization of the event…”

 

Liability for infringement of the Right of publicity depended on proving the existence of two factors, stated the Delhi HC in Titan Industries Ltd. vs M/S Ramkumar Jewellers :

“Validity: The plaintiff owns an enforceable right in the identity or persona of a human being.

Identifiability: The Celebrity must be identifiable from defendant’s unauthorized use. Infringement of right of publicity requires no proof of falsity, confusion, or deception, especially when the celebrity is identifiable. The right of publicity extends beyond the traditional limits of false advertising laws”.

 Publicity rights issue has still not been deeply explored by the Indian Courts leading to ambiguity and uncertainty of the contents of it and its enforcement in concurrence with the Indian Laws.

Categories
Blog

Misappropriation Of Trade Secrets- Legal Consequences

E-commerce; legal steps taken against the misuse of this online media

The problem of jurisdiction in cyberspace is extremely complex especially with the expansion of trade and commerce in the new media. One has to examine section key models and concepts that are necessary constituents of the issue and perhaps contrast them against an overview of methods and solutions.  The Information Technology Act has provided a legal framework for smooth conduct of e-commerce facilitating and regulating electronic commerce.  It has tackled the following legal issues associated with e-commerce:

(a) Requirement of writing, as an obligation

(b) Prerequisite of a document;

(c) Requirement of a signature; and

(d) Requirement of legal acceptance of electronic messages, data, records and documents to be admitted as evidence in a court of law.

The main purpose of the Act is provision of legal identification for transactions carried out by means of electronic data interchange and trade carried out in the electronic media, commonly referred to as e-commerce, which involve usage of alternatives to paper-based methods of communication and records information to assist electronic filing of documents with the Government bureaus. Under the Act, the Central Government has the power to prescribe the security procedure in relation to electronic records and Digital Signatures, the ‘Apex Authority’ is to manage the Digital Signature system which aims at promoting the growth of E- Commerce and E- Governance. The Central Government may employ a Controller of Certifying Authority [CCA] who shall exercise supervision over the activities of Certifying Authorities.  Certifying Authority refers to a person who has been provided with a license to issue a Digital Signature Certificate all of which as mentioned above is done to regulate E-commerce.

Offences made compoundable to secure E- commerce include:

Section 72: If an individual is found in possession of some confidential information like electronic record, book, register, correspondence and he is found broadcasting and disclosing it to any third party without the permission and consent of the individual so concerned, then he shall be punished with imprisonment for a term which may be up to two years, or a fine which may extend to One Lakh rupees, or with both.

Section 72A: If any person while given that, he/she is providing services under the terms of the contract, has secured access to any material containing personal information about another person, with the intention to cause wrongful loss or wrongful gain released the information, without the person’s consent or in breach of a lawful contract, shall be punished with imprisonment for a term which may extend to two years or with fine which may extend to five lakh rupees or with both.

 

Under the Act, Section 43(A) is concerned with handling of sensitive personal data or information with reasonable security practices and procedures. This section has been so inserted to protect sensitive personal data or information possessed, dealt or handled by a body corporate in a computer resource which such body corporate [Company] owns, controls or operates. If such body corporate is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, it shall be liable to pay damages by way of compensation to the individual so affected.

Computer related offences under Section 66 has been amended as mentioned above, now if an offence is committed fraudulently with malicious intent then punishment is for a term which may extend to two years or a fine which may extend to Rs 5 lakhs or with both.

To learn more about Cyber Law in India, stay connected to our blog or head on to our Certificate Course and learn from leading law firms in India.

https://www.enhelion.com/product/certificate-programme-in-intellectual-property-law-and-management/

Categories
Blog

Defamation in Cyberspace

In the era of the Cyber World, the Internet provides Individuals an equal opportunity to access data/ information; and with the high usage of technology, misuse of the cyberspace amplified. As the uses and applications of the technology develop, understanding of the technology grows.

With the growth in the extensive usage of social media, cyberspace has provided Individuals around the globe a wide platform to express their views. But should this electronic media be an arena to disrepute anyone?

ELEMENTS OF DEFAMATION

  • Plaintiff to prove publication of the defamatory statement, and that it refers to the Plaintiff
  • Prove that the Statement is defamatory
  • The said statement must be false and untrue and must be made with malicious intent

 

However if the statement is true and is made in Good faith and in Public interest, it fails from being a defamatory statement.

The Indian Penal Code solely talks of defamation.

Section 499 IPC: Whoever, by words either spoken or intended to be read, or by signs or by visible representations, makes or publishes any imputation concerning any person intending to harm, or knowing or having reason to believe that such imputation will harm, the reputation of such person, is said, except in the cases hereinafter expected, to defame that person. Explanation 2.— It may amount to defamation to make an imputation concerning a company or an association or collection of persons as such.

Section 500 lays down the punishment in such cases:

Whoever defames another shall be punished with simple imprisonment for a term, which may extend to two years, or with fine, or with both.

Can a company be held responsible for its employees’ actions? The test that determines this is whether the actions were suited to the benefits of the company, the employee would be held vicariously liable if he were promoting his own interests. India is not yet a signatory to the Council of Europe’s Convention on Cyber Crime, formulated by the EU, globally; around 43 nations have signed this treaty addressing the issues of cross-border terrorism.

Asia’s first cyber Defamation case was filed in India, in the case of SMC Numatics Ltd. v. Jogesh Kwatra. Defamatory e-mails were said to be sent by the defendant to the top management of SMC Numatics, who has, since been retrained from communicating with the Plaintiff. This order of the Delhi High Court holds extensive significance since it was the first time an Indian Court recognised the issue of Cyber defamation, and took action against it.

Section 66A of the IT Act, 2000: If any person sends by means of a computer resource or a communication any content which is grossly offensive or has a menacing character or which is not true but is sent to create nuisance, annoyance, criminal intimidation, hatred or ill will etc shall be imprisoned for an imprisonment term which may be up to two years combined with a fine. This section has been struck down; however a few other sections have been amended and added to curb issues relating to Cyber Defamation.

Section 68(A) has been proposed for providing modes and methods for encryption for secure use of the electronic medium. This principle has been proposed for safer usage of the electronic medium. Section 69, has been amended to take care of the concerns of the Ministry of Home Affairs regarding the safety, sovereignty and integrity of India and further preventing stimulation to the commission of any cognizable offence. This provision relates to the authority/power to issue instructions for interception or monitoring or decryption of any information through any computer resource, which stands rightfully amended.

Section 67 of the Act is amended to diminish the term of imprisonment for publishing or transmitting obscene material in electronic form to three years from five years and there is an increase in the fine thereof from Indian Rupees 100,000 (approximately USD 2000) to Indian Rupees 500,000 (approximately USD 10,000). A series of new sections have been inserted as Sections 67 A to 67C. While Sections 67 A and B insert penal provisions with respect of offenses of publishing or broadcasting of material containing sexually explicit act and child pornography in electronic form, section 67C deals with the obligation of an intermediary to preserve and retain such information as may be specified for such duration and in such manner and format as the central government may prescribe.

Today appreciation of the need for legislation and what is required in terms of its structure and content has changed

To learn more about Cyber Law in India, stay connected to our blog or head on to our Certificate Course and learn from leading law firms in India.

https://www.enhelion.com/product/certificate-programme-in-internet-law-and-policy/

 

Categories
Blog

3D Internet Law- Virtual Property

Insight into the concept of 3D Internet

 

3D Internet, also known as virtual worlds, being a powerful new way to reach consumers, business customers, co-workers, partners and students; connecting and combines the immediacy of television, the versatile content of the web and the relationship building strengths of social networking sites. The 3D internet as virtual property is used to transform a technique and allow for it to be overridden in a derivative group. The implementation of a virtual property can be changed by an overriding element in the said derived class. Unlike the passive experience of television, the 3D internet has proved to be inherently interactive and engaging. 3D Internet is the next age bracket after the current 2D web.

3D Internet will rely on the same basic technology and components as that of a traditional browser, and it will interact with the same search engines and servers. Aside from the use of 3D computer graphics the important difference lies in a much more social experience compared to the two dimensional Internet of today.

NEED, FOR 3D INTERNET?

One of the often heard arguments against the 3D Internet is in the form of the question “why do we need it?” For most of its users the Internet is a familiar, comfortable medium where we communicate with each other, get our news, shop, pay our bills, and more. However, if we stop and think about the nature of the Internet for a moment we realize that it is nothing but a virtual cyberspace where people and organizations interact with each other and exchange information. Once this fact is well understood, the question can be turned on its head and becomes “why do we restrict ourselves to 2D pages and hyperlinks for all these activities?” Navigating hierarchical data structures is often cumbersome for large data sets. Unfortunately, the Electronic Web as we know is organized as a flat abstract mesh of interconnected hierarchical documents. A typical 2D website is an extremely abstract entity and consists of nothing but a bunch of documents and pictures. Within the website, at every level of the interaction, the developers have to provide the user immediate navigational help. Otherwise, the user would get lost sooner or later. Since this is a very abstract environment, there is no straightforward way of providing a navigation scheme which would be immediately recognizable to human beings. The situation is not any better when traveling between websites.

Popular forms of live entertainment could also be placed into the 3D Internet. Many sports allow the users to watch or participate in many popular activities. Though the technology and components used for 3D internet are same as used in traditional internet also it interacts with the same servers and search engines. But being more social 3D internet is different from conventional 2D internet. The wonderful thing about 3D internet is that participants learn as much from each other as from talking to any official source of information. 3D internet search is also as advanced as it opens a vast array of possibilities when it comes to search and browse data. Through 3D internet multi users can read the same documents. You connect organically with other people that share your interests and access the same service as other use.

To learn more about Cyber Law in India, stay connected to our blog or head on to our Diploma Course and learn from leading law firms in India.

https://www.enhelion.com/product/certificate-programme-in-internet-law-and-policy/

Categories
Blog

Section 66A Information Technology Act, 2000

Free speech and the Internet; analysing Section 66A IT,2000

Conventional legal structures have had great difficulty in keeping pace with the brisk growth of the Internet and its impact throughout the world.  The Internet has tested the limits of regulation, Governments across the world eagerly seem accept the conception that cyberspace can’t be governed. This perception stands miscalculated, underestimating the power governments and businesses posses to change the way things work. Multiple international organisations are currently working on projects that are probable to radically influence the course of domestic bylaws and regulations in areas pertinent to electronic world. This International work must not only assist the Indian set up to the nations’ competitive advantage, but also keep India in compliance with international norms, ensuring that the economic, social and cultural benefits of new technology are maximised. As soon as you enter the virtual world, you leave footprints that are traceable, now the question that arises is- when does communication over the Internet mete out or threaten to impose adequate damage on its recipient that it ceases to be protected by the Freedom of Speech bar set out in the Indian Constitution?

66A OF THE INFORMATION AND TECHNOLOGY ACT, 2000

Section 66A of the IT Act, 2000: If any person sends by means of a computer resource or a communication any content which is grossly offensive or has a menacing character or which is not true but is sent to create nuisance, annoyance, criminal intimidation, hatred or ill will etc shall be imprisoned for an imprisonment term which may be up to two years combined with a fine.

The court in the Singhal Case struck down in its entirety, Section 66A of the IT Act, 2000 being violative of Article 19(1)(a) and not saved under Article 19(2). The Preamble of the Constitution of India also articulates of liberty of thought, expression, belief, faith and worship stating that India is a sovereign democratic republic. Nonetheless it is needless to state that when it comes to democracy, liberty of thought and expression is of paramount and chief implication under the constitutional scheme. Nonetheless the Supreme Court in striking down Section 66A has left the nation affirmative, oppressive censorship law that this country has ever witnessed. It has further introduced imperative procedural safeguards to the blocking rules and to the intermediary liability; it has made the provisions more speech protective than they were earlier.  “It is clear that Section 66A, arbitrarily, excessively and disproportionately invades the right of free speech and upsets the balance between such right and the reasonable restrictions that may be imposed on such right,” the court said, in its ruling, addition to which it stated that the law “was cast so widely that virtually any opinion on any subject would be covered by it, as any serious opinion dissenting with the mores of the day would be caught within its net.”

The Supreme Court has rightly upheld “Thought control is a copyright of totalitarianism, and we have no claim to it. It is the function of the Government to keep the citizen falling into error; We could justify any censorship only when the censors are better shielded against error than the censored.”

To learn more about Cyber Law in India, stay connected to our blog or head on to our Diploma Course and learn from leading law firms in India.

https://www.enhelion.com/product/certificate-programme-in-internet-law-and-policy/

Categories
Blog

Digital Signatures And Electronic Governance

Where submission of information is demanded in writing or in the type written or printed form, it is now sufficient and in compliance of law, if the same is sent in an electronic form.  Further, if any statute seeks and provides for affixation of signature in any deed, the same can be done by means of Digital Signature. Similarly, the filing of any form, submission or any other documents with the Administrative Authorities and issue or grant of any license, permit, approval and any receipt acknowledging payment can be performed by the Government offices by the usage of electronic form. Retention of documents, data or information as provided in any regulation, can be done by maintaining electronic records.  The Act, however, affirms that no Ministry or Department of Central Government or the State Government or any Authority established under any law can insist and claim upon acceptance of document only in the form of electronic record.

Under the Act, the Central Government has the power/ authority to stipulate the course of action in relation to electronic records and Digital Signatures securing the Online media, considering the character of the transaction, the level of sophistication of the Parties with reference to their technological aptitude and capacity, the volume/size of transactions and the procedures in general used for similar types of transactions or communications.

DIGITAL SIGNATURE

Any individual may make an application to the Certifying Authority requesting the issue of Digital Signature Certificate. The Certifying Authority while issuing such certificate shall certify that it has complied with the provisions of the Act.  The Certifying Authority has to ensure that the subscriber (i.e., a person in whose name the Digital Signature Certificate is issued) holds the private key corresponding to the public key listed in the Digital Signature Certificate and such public and private keys constitute a functioning key pair. The Certifying Authority has the power to suspend or revoke Digital Signature Certificate

If any person without the acquiescence of the title-holder, accesses the owner’s computer, computer system or computer net-work or downloads copies or any extract or introduces any computer virus or damages computer, computer system or computer net work data etc. He/she shall be liable to pay damage by way of compensation not exceeding Rupees One Crore to the person so affected.   In order to facilitate governance and adjudication, the Central Government may appoint any officer, not below the rank of Director to the Government of India or any equivalent officer of any State Government, to be an Adjudicating Officer. The Adjudicating Officer while trying out cases of the above mentioned nature shall consider the amount of gain of unfair advantage or the amount of loss that may be suffered by a person. The aforesaid provisions were not incorporated in the Information Technology Act, 2000 instead were suggested by the Select Committee of Parliament.

Under the Act, the Central Government has the power to prescribe the security procedure in relation to electronic records and Digital Signatures, the ‘Apex Authority’ is to manage the Digital Signature system which aims at promoting the growth of E- Commerce and E- Governance. The Central Government may employ a Controller of Certifying Authority [CCA] who shall exercise supervision over the activities of Certifying Authorities.  Certifying Authority refers to a person who has been provided with a license to issue a Digital Signature Certificate all of which as mentioned above is done to regulate E-commerce.

To learn more about Cyber Law in India, stay connected to our blog or head on to our Diploma Course and learn from leading law firms in India.  https://www.enhelion.com/product/diploma-in-cyber-laws/