Computer System
Computer System
16. Cyber Stalking : Cyber stalking is a form of online harassment where an individual uses
the internet, social media, or other electronic means to repeatedly harass, threaten, or monitor
another person. It often involves persistent and unwanted attention, including sending threatening
or intimidating messages, monitoring someone's online activity without consent, spreading false
information, or using personal information to manipulate or control the victim. The anonymity
and accessibility of the internet can exacerbate the impact of cyber stalking, causing emotional
distress, fear for personal safety, and disruption of daily life for victims. Cyber stalkers may
exploit various online platforms to maintain contact or gather information about their victims,
violating their privacy and personal boundaries. Legal frameworks and measures to combat cyber
stalking vary by jurisdiction, but generally involve laws against harassment, stalking, and online
abuse. Prevention includes safeguarding personal information, using privacy settings on social
media, and promptly reporting incidents to law enforcement or online platforms for intervention
and support. Cyber stalking can manifest in various forms, each involving persistent and
unwanted behavior that causes distress or fear to the victim. Here are some common types of
cyber stalking:
1. Email or Messaging Harassment: Sending repeated, threatening, or abusive emails or
messages to the victim. This may include stalking through various online communication
channels such as email, social media platforms, instant messaging apps, or forums.
2. Social Media Stalking: Monitoring the victim's social media profiles, posts, and activities
without consent. This can involve continuously checking their updates, liking or
commenting on every post, or sending excessive messages despite the victim's lack of
response.
3. Online Impersonation: Creating fake profiles or accounts to impersonate the victim or to
harass them anonymously. This may include posting false information, spreading rumors,
or using the victim's identity to manipulate others.
4. Doxxing: Publishing the victim's personal information (such as home address, phone
number, or workplace) online without their consent. This can lead to physical harassment
or encourage others to target the victim.
5. Monitoring and Surveillance: Using spyware, tracking apps, or hacking techniques to
monitor the victim's online and offline activities. This invasive behavior violates the
victim's privacy and can lead to feelings of constant surveillance and fear.
6. Catfishing: Pretending to be someone else online to deceive or manipulate the victim
emotionally or psychologically. Catfishing can involve creating a fake identity to establish
a relationship with the victim under false pretenses.
7. Revenge Porn: Sharing intimate or sexually explicit images or videos of the victim
without their consent. This form of cyber stalking aims to humiliate, intimidate, or
blackmail the victim, often causing significant emotional and reputational harm.
8. Harassment through Online Forums or Communities: Engaging in harassing or
threatening behavior towards the victim within online communities, forums, or groups.
This can involve rallying others to participate in the harassment or spreading malicious
content about the victim.
Each type of cyber stalking is disruptive and can have serious consequences for the victim's
mental health, personal safety, and reputation. Recognizing these behaviors early and taking
appropriate steps to protect oneself, such as blocking the perpetrator, adjusting privacy settings,
and reporting incidents to law enforcement or online platforms, is crucial in combating cyber
stalking.
17. Electronic Contract: An electronic contract is a legally binding agreement formed and
executed electronically, using digital signatures or other electronic means of acceptance. It
follows the same legal principles as traditional contracts, including offer, acceptance,
consideration, and mutual intent to create legal relations. Electronic contracts facilitate business
transactions conducted online, such as e-commerce purchases, software licensing agreements, and
digital services contracts. They are governed by laws and regulations that recognize electronic
signatures and specify requirements for their validity and enforceability. Electronic contracts
streamline the contracting process, reduce paperwork, and enable parties to conduct business
efficiently across geographic boundaries. They support global trade and digital commerce while
ensuring legal certainty and protection for parties involved in electronic transactions.
18. Electronic Record: An electronic record refers to any information generated, sent,
received, or stored electronically. It includes digital documents, emails, databases, and other
forms of electronic data created and maintained in digital formats. Electronic records are integral
to modern business operations, government services, and personal communications. They provide
a means of documenting and preserving information, facilitating efficient data management and
retrieval. Legal frameworks and regulations govern the creation, storage, and retention of
electronic records to ensure authenticity, integrity, and accessibility over time. Electronic records
support transparency, accountability, and compliance with regulatory requirements in various
industries, including healthcare, finance, and legal services. Advances in digital technologies and
data management systems continue to enhance the usability, security, and reliability of electronic
records in the digital age.
19. Internet: The internet is a global network of interconnected computers and devices that
enables communication, information sharing, and online activities worldwide. It consists of
millions of private, public, academic, business, and government networks linked together by a
broad array of electronic, wireless, and optical networking technologies. The internet facilitates
access to vast amounts of information, services, and resources, including websites, email, social
media platforms, and online applications. It supports collaboration, innovation, and economic
growth by connecting individuals, businesses, and communities across geographic boundaries.
The internet's decentralized structure and open standards promote freedom of expression, digital
inclusion, and global connectivity. However, challenges such as cybersecurity threats, digital
divides, and regulatory issues require ongoing attention to ensure the internet remains a secure,
accessible, and equitable resource for all users worldwide.
20. Cyber Cafe: A cyber cafe is a venue where individuals can access the internet and use
computer facilities for various purposes such as browsing the web, checking emails, gaming, and
online communications. Cyber cafes provide public access to internet-connected computers,
printers, and other peripherals, offering convenience for users who may not have access to
personal computers or internet connectivity at home or work. They serve as community hubs for
digital literacy, social interaction, and online activities, supporting education, entertainment, and
communication needs. Cyber cafes may also offer additional services such as photocopying,
scanning, and document printing to meet diverse user requirements. Despite declining popularity
in some regions due to the widespread availability of mobile devices and home internet
connections, cyber cafes continue to play a role in bridging digital divides and providing
affordable internet access in urban and rural areas.
21. Communication Device: A communication device refers to any hardware or equipment
used to transmit or receive data, information, or signals electronically. Examples include
smartphones, tablets, computers, modems, routers, satellite communication systems, and
wearable devices. Communication devices facilitate voice, video, and data communication over
various networks such as cellular, Wi-Fi, Bluetooth, and satellite systems. They enable
individuals and organizations to connect, collaborate, and exchange information locally and
globally. Communication devices support a wide range of applications including voice calls,
messaging, internet browsing, social media, video conferencing, and IoT connectivity. Advances
in communication technologies continue to drive innovation in device design, network
capabilities, and user experiences, enhancing connectivity, mobility, and accessibility in the
digital age.
22. Digital Signature: A digital signature is a cryptographic technique used to verify the
authenticity and integrity of digital messages or documents. It provides a way to ensure that the
sender of a message is who they claim to be and that the message or document has not been
altered or tampered with during transmission.Digital signatures use a mathematical algorithm to
generate two unique keys: a private key known only to the signer, and a public key that is
available to anyone. The private key is used to create the digital signature, which is appended to
the document or message. The public key is used by recipients to verify the signature. If the
signature is valid and matches the document, it confirms that the document originated from the
signer and has not been modified. Digital signatures are widely used in electronic transactions,
contracts, and communications where authenticity and data integrity are crucial. They provide a
higher level of security compared to traditional handwritten signatures and are legally recognized
in many countries under various electronic signature laws and regulations.
Private Key: Known only to the signer, used to create the digital signature.
Public Key: Available publicly and used to verify the digital signature.
23. Electronic Signature: An electronic signature is a broader term that encompasses any
electronic symbol, sound, or process attached to or logically associated with a record, which is
executed or adopted by a person with the intent to sign the record. Unlike digital signatures,
electronic signatures do not necessarily use cryptographic techniques for verification. Electronic
signatures can range from simple methods such as typing a name at the end of an email, clicking
an "I agree" button on a website, or using biometric authentication like fingerprint scans or voice
recognition. The primary function of an electronic signature is to indicate consent or approval in
electronic transactions and contracts. While electronic signatures may lack the cryptographic
security of digital signatures, they are widely accepted for routine transactions and
communications where verification requirements are less stringent. Many countries have enacted
laws and regulations recognizing the legal validity of electronic signatures, provided certain
conditions of consent and intent are met. Electronic signatures streamline document workflows,
reduce paperwork, and enable faster and more efficient business transactions in the digital age.
E-governance, short for electronic governance, refers to the use of information and
communication technologies (ICTs) by governments to improve the delivery of public services,
enhance efficiency, promote transparency, and strengthen citizen engagement. It encompasses the
integration of digital technologies into the processes of governance to facilitate better decision-
making, policy formulation, and service delivery.
1. Digital Services: Governments provide various services online, accessible through websites,
portals, and mobile apps. This includes applications for permits and licenses, payment of
taxes, accessing healthcare and education information, and more.
2. Transparency and Accountability: ICTs enable governments to disseminate information to
citizens more effectively, ensuring transparency in decision-making processes and budget
allocations. This fosters accountability as citizens can monitor government actions and
expenditures.
3. Citizen Participation: E-governance platforms encourage citizen engagement through
feedback mechanisms, public consultations, and online forums. This facilitates active
participation in governance, allowing citizens to voice opinions, contribute ideas, and
collaborate with authorities.
4. Efficiency and Cost Savings: By digitizing administrative processes and reducing
paperwork, e-governance improves operational efficiency within government agencies. It
minimizes bureaucratic delays, streamlines workflows, and optimizes resource utilization,
leading to cost savings and enhanced service delivery.
5. Data-driven Decision Making: Governments leverage data analytics and business
intelligence tools to analyze large datasets and derive insights for evidence-based
policymaking and planning.
6. Security and Privacy: Robust cyber security measures protect sensitive government data
and ensure the privacy of citizens' personal information shared through e-governance
platforms.
Freedom of expression on the internet means the right of individuals to freely express their
opinions, thoughts, ideas, and information online without censorship or undue restrictions. This
right is fundamental in democratic societies as it fosters public discourse, promotes diversity of
viewpoints, and enhances transparency.
In India, freedom of expression on the internet is enshrined under Article 19(1)(a) of the
Constitution, which guarantees the right to freedom of speech and expression. However, this
right is subject to reasonable restrictions on grounds such as sovereignty and integrity of India,
security of the State, friendly relations with foreign States, public order, decency or morality,
contempt of court, defamation, and incitement to an offence.
The internet has revolutionized the way people communicate and share information globally,
providing platforms for individuals to express themselves freely. Social media, blogs, forums,
and online news platforms play a crucial role in facilitating public debate and activism. Citizens
use these platforms to discuss political, social, and cultural issues, mobilize for causes, and hold
governments and institutions accountable.
In India, the Information Technology Act, 2000, and subsequent amendments govern aspects of
internet freedom, including provisions on intermediary liability, cybercrimes, and regulations for
content moderation. The government occasionally imposes restrictions on internet access or
content during periods of public unrest or security concerns, invoking laws like Section 144 of
the Criminal Procedure Code or ordering internet shutdowns under the Temporary Suspension of
Telecom Services (Public Emergency or Public Safety) Rules, 2017.
Challenges to internet freedom in India include concerns over censorship, surveillance, and the
regulation of online content. Instances of social media platforms being asked to remove content
deemed objectionable or inflammatory highlight ongoing debates about balancing freedom of
expression with the need to maintain public order and national security.
Efforts by civil society organizations, activists, and the judiciary are critical in advocating for
robust protections of internet freedom while upholding constitutional values. As technology
continues to evolve, ensuring a free and open internet in India requires continual dialogue,
legislative clarity, and adherence to constitutional principles of liberty and democracy.
E-contracts, or electronic contracts, represent legally binding agreements entered into via
electronic means, without the necessity of physical signatures on paper. In India, the legal
framework governing e-contracts is primarily guided by the Information Technology Act, 2000
(IT Act) and its subsequent amendments.
E-Contract Characteristics:
1. Formation: E-contracts are formed when an offer is made and accepted electronically.
This can include clicking "I agree" on a website, exchanging emails, or filling out online
forms.
2. Legality: Under the IT Act, e-contracts are considered legally valid and enforceable,
provided they fulfill certain conditions outlined in Section 10A. These conditions include
the consent of parties to the contract and ensuring the integrity and authenticity of the
electronic record.
3. Authentication: Authentication methods for e-contracts may include digital signatures or
other electronic signatures that comply with the IT Act and related rules. These signatures
help verify the identity of parties and ensure the integrity of the contract.
4. Admissibility as Evidence: E-contracts and electronic records are admissible as evidence
in court proceedings under Section 65B of the Indian Evidence Act, provided they meet
the requirements for authentication specified in the IT Act.
5. Consumer Protection: The Consumer Protection Act, 2019 also recognizes e-commerce
transactions and includes provisions to protect consumer rights in online contracts, such as
mandatory disclosures, dispute resolution mechanisms, and safeguards against unfair trade
practices.
Electronic contracts, also known as e-contracts or digital contracts, are agreements formed and
executed electronically without the use of traditional paper documents. Here are the types of
electronic contracts commonly recognized:
Each type of electronic contract may be subject to different legal standards and requirements
depending on the jurisdiction and the nature of the transaction. As electronic commerce continues
to grow, understanding these types of contracts is crucial for businesses and individuals engaging
in online transactions and digital interactions.
1. Information Technology Act, 2000: The IT Act provides the legal foundation for e-
commerce and e-contracts in India. It recognizes electronic records and digital signatures
as legally equivalent to paper documents and handwritten signatures.
2. Section 10A : This section was introduced by the Information Technology (Amendment)
Act, 2008. It explicitly recognizes the validity of contracts formed through electronic
means. Section 10A states that where any law requires information to be in writing or in
the form of a document, and such requirement is fulfilled by an electronic record, then
such requirement is deemed to have been satisfied.
3. Rules and Guidelines: The IT (Intermediaries Guidelines) Rules, 2021 and other related
regulations prescribe norms for electronic contracts, liability of intermediaries (platforms
facilitating contracts), and data protection obligations.
4. Case Law: Indian courts have upheld the validity of e-contracts in various judgments,
reinforcing the legal enforceability of agreements entered into electronically, provided all
legal requirements are met.
Case Overview: The Supreme Court of India examined the validity of an arbitration
agreement formed through exchange of emails. The dispute centered around whether a
valid contract existed based on email exchanges and whether the arbitration clause was
enforceable.
Outcome: The Supreme Court upheld the validity of the arbitration clause, emphasizing
that emails exchanged between parties can form a valid contract and constitute sufficient
written evidence under the Indian Contract Act.
Case Overview: The Bombay High Court dealt with issues regarding the enforceability of
clickwrap agreements in the context of online transactions. The case involved disputes
over terms of service and payment obligations arising from a software development
agreement.
Outcome: The Court recognized clickwrap agreements as valid and enforceable,
highlighting the importance of user consent and clear display of terms and conditions in
online transactions.
Case Overview: The Supreme Court examined whether an agreement for the sale of
goods, concluded through exchange of emails, constituted a valid contract. The dispute
centered around the acceptance of terms and conditions through email correspondence.
Outcome: The Supreme Court affirmed that a contract formed through exchange of emails
can be legally binding, emphasizing the intention of the parties to be bound by the terms
agreed upon through electronic communication.
Innovative IT Solutions Pvt. Ltd. v. Allied Digital Services Pvt. Ltd. (2016):
Case Overview: The Delhi High Court dealt with the validity of electronic signatures and
their acceptance in forming contracts. The case involved disputes over non-payment for
services rendered under a service agreement.
Outcome: The Court recognized electronic signatures as valid under the IT Act and
upheld the enforceability of contracts formed through electronic means, emphasizing
compliance with procedural requirements under the law.
In conclusion, while e-contracts offer convenience and efficiency in modern commerce, their
enforceability in India hinges on compliance with the IT Act and related regulations. As digital
transactions continue to grow, ongoing legal developments and technological advancements will
shape the future of e-contracts in India's legal landscape.
The duties of a subscriber upon acceptance of a Digital Signature Certificate (DSC) are generally
similar to those for an electronic signature certificate (ESC) but may have specific nuances due to
the cryptographic nature and higher security standards associated with digital signatures. Here’s
how they compare:
1. Secure Use of Private Key: Similar to ESC, a subscriber of a DSC must securely store
and use the private key associated with the certificate. The private key is used to create digital
signatures, which provide stronger authentication and integrity assurances compared to electronic
signatures.
2. Compliance with Legal Requirements: Both ESC and DSC subscribers must comply
with legal requirements related to the use of digital signatures as specified in the Information
Technology Act, rules, and regulations. However, DSCs typically involve more stringent
compliance measures due to the cryptographic protocols involved.
3. Accuracy of Information: Subscribers of both ESC and DSC must provide accurate and
truthful information during the application process. This includes verifying their identity and
providing necessary documentation to the Certifying Authority.
4. Revocation and Renewal: Subscribers are responsible for promptly notifying the
Certifying Authority in case of any compromise or suspected compromise of the private key.
Renewal or updating of the DSC may also be required periodically to maintain its validity.
5. Usage Compliance: Both ESC and DSC subscribers should use the certificates only for
lawful purposes and in accordance with the terms and conditions specified by the Certifying
Authority.
6. Non-Repudiation: By accepting a DSC, the subscriber acknowledges that digital
signatures created using the certificate are legally binding and provide strong non-repudiation,
ensuring that the signer cannot deny having signed a document or transaction.
Overall, while the fundamental duties are similar between ESC and DSC subscribers, DSCs
involve additional responsibilities related to cryptographic security measures and compliance
with higher standards for digital signatures. These differences reflect the enhanced security and
legal validity that DSCs provide compared to electronic signatures.
Information Technology (IT) has profoundly impacted the landscape of protecting Intellectual
Property Rights (IPRs), offering both advancements and challenges across various domains.
Here’s a comprehensive discussion on its impact:
Advancements:
Challenges:
Impact on IP Strategy:
Case Laws
Issue: The case revolved around copyright infringement claims concerning the
unauthorized distribution of music and videos on social media platforms.
Outcome: The Delhi High Court granted interim injunctions against Super Cassettes
Industries Ltd. (T-Series) for uploading copyrighted content on MySpace without proper
authorization. This case underscored the responsibilities of online platforms in preventing
copyright infringement and protecting IP rights.
Issue: This case addressed the legality of photocopying academic course packs and
copyright infringement in educational institutions.
Outcome: The Delhi High Court ruled in favor of Rameshwari Photocopy Services,
permitting the photocopying of academic materials for educational purposes under fair
dealing provisions. It highlighted the balance between copyright protection and access to
educational resources in the digital age.
Background: This case involved disputes over Standard Essential Patents (SEPs) owned
by Motorola, which are crucial for implementing industry standards in technology
products, including mobile devices and telecommunications equipment.
Legal Issues: Microsoft challenged Motorola's licensing terms for SEPs, arguing they
were not fair, reasonable, and non-discriminatory (FRAND), as required by commitments
made to standards-setting organizations (SSOs).
Outcome: The U.S. courts, including the U.S. Court of Appeals for the Ninth Circuit,
examined issues of patent misuse and compliance with FRAND commitments. The case
influenced global standards for SEP licensing and highlighted the complexities of patent
enforcement in the digital age.
Background: Star India, a leading broadcaster, filed a case against Prasar Bharati, the
national public broadcaster in India, for copyright infringement related to the unauthorized
retransmission of its television channels.
Legal Issues: The case addressed the retransmission of television content without
authorization, implicating copyright laws and broadcasting rights.
Outcome: The Delhi High Court ruled in favor of Star India, emphasizing its exclusive
broadcasting rights and issuing orders to Prasar Bharati to cease the unauthorized
retransmission. The case underscored the protection of broadcasting rights and copyright
enforcement in the digital era.
Background: Moser Baer India, a manufacturer of optical storage media, filed a case
against Panasonic India for patent infringement related to DVD technology.
Legal Issues: The case involved allegations of Panasonic using patented DVD technology
without authorization, highlighting patent enforcement challenges in the digital
marketplace.
Outcome: The Delhi High Court's decision emphasized the need for robust intellectual
property protections and addressed the infringement of patented technologies in digital
products. It set precedents for patent enforcement and combating counterfeit goods in
India's technology sector.
Background: This landmark case challenged the constitutionality of Section 66A of the
Information Technology Act, 2000, which dealt with online speech and expression.
Legal Issues: The case raised concerns over freedom of speech and expression online,
arguing that Section 66A was vague and prone to misuse.
Outcome: The Supreme Court of India struck down Section 66A, declaring it
unconstitutional and affirming the fundamental rights of citizens in digital
communications. The decision had significant implications for internet regulation and the
protection of civil liberties in India.
6. Capitol Records, LLC v. ReDigi Inc., USA
Background: The case involved the resale of digital music files by ReDigi, raising
questions about the application of copyright law in the digital resale market.
Legal Issues: It examined issues of digital rights management (DRM) and the first-sale
doctrine, which allows the resale of legally purchased goods.
Outcome: The U.S. Court of Appeals addressed the legality of ReDigi's business model
and its compliance with copyright law, influencing discussions on digital ownership and
resale rights in the digital age.
Cybercrime refers to any criminal activity that involves a computer, networked device, or a
network. It can broadly be defined as illegal activities conducted through the use of information
and communication technologies (ICT). Cybercrime encompasses a wide range of unlawful acts
that are committed or facilitated through computers or the internet. Here are some key aspects and
characteristics of cybercrime:
1. Digital Environment: Cybercrimes are committed in the digital realm, using computers,
networks, and the internet. This includes any illegal activities that involve the
manipulation, disruption, or unauthorized access to digital data or systems.
2. Diverse Forms: Cybercrime encompasses various types of criminal activities, such as
hacking, phishing, malware distribution, online fraud, identity theft, cyberbullying, online
scams, and more. The methods and techniques used by cybercriminals are constantly
evolving with advancements in technology.
3. Global Reach: One of the defining features of cybercrime is its global reach. Perpetrators
can operate from anywhere in the world, targeting victims and organizations regardless of
geographical location. This international dimension presents challenges for law
enforcement and regulatory bodies in terms of jurisdiction and cooperation.
4. Financial Motivation: Many cybercrimes are financially motivated, aiming to steal
money or valuable information from individuals, businesses, or governments. However,
cybercrime can also be driven by other motives, such as political activism, espionage, or
personal vendettas.
5. Impact: Cybercrime can have significant economic, social, and personal impacts. It can
result in financial losses, damage to reputation, loss of sensitive information, disruption of
services, psychological harm, and legal consequences for victims.
6. Legality: Cybercrime is illegal under various national and international laws. Countries
have enacted legislation and regulations to address cyber threats, protect digital
infrastructure, and prosecute cybercriminals.
7. Prevention and Mitigation: Preventing and combating cybercrime requires a multi-
faceted approach involving cybersecurity measures (e.g., strong passwords, encryption),
awareness and education programs, law enforcement efforts, international cooperation, and
industry collaboration.
Cyber jurisprudence refers to the legal principles, rules, and precedents that govern issues related
to cyberspace, internet activities, and digital technologies. It encompasses the evolving body of
law that addresses legal challenges and implications arising from the use of computers, networks,
and online platforms. Key aspects of cyber jurisprudence include:
India has developed a comprehensive set of laws and regulations to address various aspects of
cyber jurisprudence, including:
1. Information Technology Act, 2000 (IT Act): This is the primary legislation governing
electronic commerce, digital signatures, cybersecurity, and data protection in India. It
provides legal recognition to electronic records and establishes penalties for cybercrimes
such as hacking, identity theft, and cyber fraud.
2. Amendments to the IT Act: Over the years, the IT Act has been amended to address
emerging cyber threats and technological advancements. These amendments have
expanded the scope of cyber offenses and enhanced cybersecurity measures.
3. Rules and Regulations: The Government of India has formulated rules and regulations
under the IT Act to enforce provisions related to data protection (Information Technology
(Reasonable Security Practices and Procedures and Sensitive Personal Data or
Information) Rules, 2011), electronic signatures, and intermediary liability (Information
Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021).
4. Cybercrime Investigation: The IT Act empowers law enforcement agencies to
investigate cybercrimes and provides procedures for gathering electronic evidence,
conducting forensic analysis, and prosecuting offenders in digital crimes.
5. Data Protection: India is in the process of implementing a comprehensive data protection
framework, the Personal Data Protection Bill, 2019, which aims to regulate the processing
of personal data and establish rights and obligations for entities handling personal data.
6. Judicial Precedents: Indian courts have played a significant role in interpreting cyber
laws and establishing precedents in cases related to cybercrimes, data privacy, electronic
contracts, and freedom of expression online.
7. Cybersecurity Initiatives: The Government of India has launched various cybersecurity
initiatives and programs to strengthen cybersecurity infrastructure, promote cybersecurity
awareness, and mitigate cyber threats.
Internationally, the approach to computer-related patents varies, but generally, patents for
software and computer-implemented inventions face scrutiny due to their potential impact on
innovation, competition, and access to technology. Key points include:
1. United States: The U.S. allows patents for software and computer-implemented
inventions under certain conditions, emphasizing that the invention must provide a
technical solution to a technical problem.
2. European Union: The EU Patent Convention (EPC) excludes "programs for computers"
as such from patentability but allows patents for computer-implemented inventions if they
have a technical effect or solve a technical problem.
3. Japan: Japan permits patents for software and business methods that involve technical
innovations and provide technical effects.
4. China: China grants patents for software and computer-related inventions but requires
technical solutions and practical applications.
5. World Intellectual Property Organization (WIPO): WIPO promotes international
harmonization of patent laws but recognizes the challenges in patenting software and
computer-related inventions due to differing national approaches.
1. Patent Act, 1970: Initially, India did not grant patents for software or algorithms under the
Patent Act, 1970.
2. Amendment in 2002: The Patent Act was amended in 2002 to allow patents for computer-
related inventions that demonstrate technical advancement and economic significance.
However, pure software per se remains excluded from patentability.
3. Guidelines: The Indian Patent Office issues guidelines to clarify the patentability criteria
for computer-related inventions, emphasizing technical effects and practical applications.
4. Judicial Interpretation: Indian courts have played a role in interpreting the scope of
patentability for software and computer-related inventions, often focusing on whether the
invention involves technical innovation beyond mere algorithmic methods.
5. Challenges and Debate: There is ongoing debate in India regarding the scope and limits
of patentability for software and computer-implemented inventions, balancing innovation
with concerns about monopolistic practices and access to technology.
In conclusion, while international frameworks and national laws differ in their approaches to
computer-related patents, the challenge remains to balance incentivizing innovation with ensuring
fair competition and accessibility to technological advancements.
Fraud:
Introduction: Cyber fraud involves the use of deception or deceitful practices carried out
through electronic means. This can include various types of scams such as phishing, online
financial fraud, identity theft, or fraudulent transactions conducted over the internet.
Law: In India, cyber fraud is addressed under Section 66D of the Information Technology
Act, 2000 (IT Act). This section specifically deals with cheating by personation using
computer resource or communication device. It criminalizes acts where a person
dishonestly uses another person's identity electronically to deceive someone for financial
gain or to cause damage to another person. The offense is punishable with imprisonment
for a term which may extend to three years and shall also be liable to fine.
Hacking:
Trespass:
Defamation:
Introduction: Cyber defamation refers to the act of publishing or disseminating false and
defamatory statements about an individual, entity, or group through digital platforms such
as social media, websites, or online forums.
Law: Defamation laws in India are primarily governed by Sections 499 and 500 of the
Indian Penal Code (IPC). These sections criminalize defamation and provide for penalties
including imprisonment and fines. While Section 66A of the IT Act previously covered
offensive messages through communication services, it was struck down by the Supreme
Court of India in 2015 on grounds of being unconstitutional due to its broad and vague
language.
Stalking:
Spam:
Introduction: Spam refers to unsolicited and bulk messages sent through electronic
communication channels, often for commercial purposes such as advertising products or
services. Spamming can overwhelm recipients, consume network resources, and violate
privacy.
Law: Section 66B of the IT Act deals with sending unsolicited electronic messages in
bulk. It aims to curb spamming activities and provides for penalties including
imprisonment and fines. The section prohibits sending spam messages that are misleading,
fraudulent, or involve phishing attempts to deceive recipients.
What is Censorship
In India, censorship has been a subject of legal scrutiny and debate, especially concerning
freedom of speech and expression guaranteed by the Constitution. Landmark cases like Ranjit D.
Udeshi vs. State of Maharashtra and Shreya Singhal vs. Union of India have shaped the legal
landscape by establishing principles that balance the need for censorship with the protection of
fundamental rights. The evolution of digital communication has also posed new challenges,
prompting ongoing discussions on regulating online content while upholding democratic
principles and individual liberties.
Internationally, the concept of free speech on the internet is grounded in various human rights
frameworks and legal instruments that emphasize the importance of protecting individuals' rights
to freedom of expression, information, and assembly in the digital age. Here's an overview of the
international position on free speech on the internet:
The Information Technology (IT) Act, 2000 is a comprehensive legislation in India that addresses
various aspects of electronic commerce, electronic governance, cybersecurity, and digital
transactions. It defines offenses, penalties, and adjudication mechanisms concerning these areas.
Here's an overview:
1. Adjudication Officers:
o The IT Act provides for the appointment of adjudicating officers by the Central
Government or State Government who adjudicate penalties for contraventions of
certain provisions of the Act.
2. Appellate Tribunal (Cyber Appellate Tribunal - CAT):
o CAT was established to hear appeals against the orders of adjudicating officers under
the IT Act. However, CAT has been defunct since 2017, and appeals now go directly to
the respective High Courts.
3. Penalties and Compensations:
o The Act outlines penalties for contraventions of its provisions, which may include fines
and imprisonment depending on the severity of the offense.
o It also provides for compensation to be paid to persons affected by contraventions of
the Act.
4. Powers of Law Enforcement Agencies:
o Law enforcement agencies such as police have powers to investigate cybercrime
offenses under the IT Act, subject to legal procedures and safeguards.
The IT Act, 2000, has been amended over the years to address emerging cybersecurity challenges
and align with international best practices. It aims to provide legal recognition for electronic
transactions, facilitate electronic filing of documents with the government agencies, and deter
cybercrimes through stringent penalties and enforcement mechanisms.