Upload
divya-gupta
View
219
Download
0
Embed Size (px)
Citation preview
8/4/2019 Conventional Crimes Through Computer
1/3
CONVENTIONAL CRIMES THROUGH COMPUTER
CYBER DEFAMATION
The law of defamation is designed to protect the reputation of an injured party by giving him the
right to sue for damages. Cyber defamation in this context would imply defamation by anything
which can be read, seen or heard with the help of computers. Since the internet has been described
as having some or all the charecteristics of a newspaper, a television station, a magazine, a
telephone system, an electronic library and a publishing house1, there are certain differences
between online and offline attempt of defamation which makes online defamation more effective.
Quantitatively, the number of people a comment defamaing a person might reach is gigantic and
hence would effect the reputation of the defamed person much more than would an ordinary
publication. Qualitatively such defaming messages can be posted in specific new groups so as to
have more effective negative impact on the reputation of the person being defamed2
Corporate cybersmear is a false and disparaging rumour about a company, its management or its
stock that is posted on the internet. This kind of criminal activity has been a concern specially in
stock market and financial sectors where knowledge and information are the key factors for business
men. Persons indulging in corporate cybersmear include disgruntled employees or insiders, ex
employees3, envious ex colleagues, imposters4, competitors5, Creditors6 and even those seeking a
forum when they are denied employment or former shareholders.7
Cyber defamation is covered under section 499 of the Indian Penal Code (IPC) read with section 4 of
the IT Act. Section 499 of the IPC inter alia provides that any one by words intended to be read
publishes any imputation concerning any person intending to harm, or knowing or having reason to
believe that such imputation will harm the reputation of such person is said , subject to exceptions
provided in the section itself, to defame that person. No specific mention has been made with
1Siver K,Good Samaritans in cyber space, 23 Rutgers Comp and tech LJ 1 , 3 (1997)
2Anne Fitzgerald, Going Digital 298 (2
ndedition 2000)
3Individuals made anonymous posts on an online-board, falsely claiming that a company and its CEO were
engaged in fraud and that the CEOs wife was having an affair. On investigation, the aliases used by the posters
wre identified. One was the husband of the disgruntled employee, and the other was an ex-employee4
The California Department of Corporations (Internet Complianceand enforcement), a regulator of securities
trading, won an August 200 settlement ordering Victor Idrovo to post a retraction (under the new alias ofretraction) of earlier posts to the yahoo message board. Under the original alias, Frankgmancuso, Idrovo
attempted to manipulate the price of Metro Goldwyn Mayer, Inc., (MGM) stock when he posed as an
insider/former executive of MGM. He was also fined $4500.5
For 18 months, Steven Cade (CEO of a rival golf club company, La Jolla club) used 27 aliases to post 163
messages on the yahoo message boards that wre critical of Callaway golf Company. During this same period,
Cade bought, sold and even shorted shares of Callaway Stock, As part of a settlement, Cade posted an apology
on Yahoo.6
False and defamatory statements made Amazon Natural Treasures, Inc. led to a stock price decline from an
April 1997, 52 week high of $3.56 per share to approximatelt 12 % per share. The low stock price led to de
listing from the OTCBB to pink sheets. It transpired that the statements were madeby the owner of Demante
and Associates, A new York public relations firm, who claimed that a public agency was suing Amazon for
about $7000 still owed her for work completed.7 SmartPros at:http://www.smartpros.com/x37013.xmlfor more examples and information on corporate
cyber smear
http://www.smartpros.com/x37013.xmlhttp://www.smartpros.com/x37013.xmlhttp://www.smartpros.com/x37013.xmlhttp://www.smartpros.com/x37013.xml8/4/2019 Conventional Crimes Through Computer
2/3
regard to any electronic publication in the section. Section 4 of the IT Act gives legal recognition to
electronic records. It provides that if the law requires any information or any other matter in writing
or type written or printed form, ssuch requirement would be deemed to have been satisfied if such
information is rendered or made available in electronic form and accessible so as to be usable as a
subsequent reference. Keeping in mind the legal fiction created by the Section 4 of the IT Act, If any
defamatory information is posted on the internet either through emails or chat rooms, or chat
boards, such posting would be covered under the Section 499 requirement of publication and
would amount to cyber defamation.
DIGITAL FORGERY
Forgery is creation of a document which one knows is not genuine and yet projects the same as if it
is genuine. Generally it is used more in terms of affixing somebody elses signature on a document.
Digital forgery implies making use of digital technology to forge a document. Desktop publishing
systems, color lase and inkjet printers, color copiers, and image scanners enable crooks to make
fakes with relative ease of cheques, cuurencies, passports, visas, birth certificates, ID Cards etc..
Section 91 of the IT Act (read with second schedule) amended the provisions of IPC in relation to
forgery would include electronic records as well. Section 29A has been inserted in the Indian Penal
Code to provide for a definition of electronic record. The Words electronic record will have the same
meaning which has been assigned to it in section 2(1)(t) of the IT Act.
Section 464..........................................................................................................................
Explanation 3 to section 464 has also been inserted which for the purposes of this section provides
for the expression affixing digitital signature to have the same meaning as assigned to it in section
2 (1)(d)8
of the IT Act.
Section 463 of the IPC, after amendment defines forgery, in relation to electronic records, as making
of any false electronic record or part thereof with intent to cause damage or injury to the public or
any to person or to support any claim or title, or to cause any person to part with property, or to
enter into any expressed or implied contract, or with intent to commit fraud or that fraud may be
committed. Section 466 9(forgery of record of court or of public register, etc.) . Section 468 10(for
purpose of cheating) , section 46911, (forgery for purpose of harming reputation), section 47012,
(forged document or electronic record), section 47113, (using a genuine forged document), section
474,14( having possession of document described in section 466 or 467, knowing it to be forged and
intending it to use as genuine) and section 476 15(counterfeiting device or mark used for
authenticating documents other than those described in section 467 or possessing counterfeit
8Section 2(1)(d)- affixing digital signature, with its grammatical variations and cognate expressions means
adoption of any methodology or procedure by a person for the purposeof authenticating an electronic record
by means of digital signature.9
10
11
12
13
1415
8/4/2019 Conventional Crimes Through Computer
3/3
marked material) have also been suitably amended to include electronic records. It may however be
noticed that section 467 which pertains to forgery of valuable security, will, etc. has not been
amended for the reason that section 1 (4 ) bars the applicability of the IT Act to certain documents
including will, trust, power-of-attorney, contract for sale or conveyance of immovable property etc.
Therefore digital Forgery and offences related to it are now covered under the IPC pursuant to the
amendments made by the IT Act.
CYBER PORNOGRAPHY
Cyber pornography refers to stimulating sexual or other erotic activity over the internet.16 This
would include pornographic Websites, pornographic magazines produced using computers to
publish and print the material and the Internet to download and transmit pornographic pictures,
photos writings etc. In recent times , there have been innumerable instances of promotion of
pornography through the use of com. Information Technology has made it much easier to create and
distribute pornographic materials through the internet, such materials can be transmitted all over
the world in a matter os seconds. The geographical restrictions which prevented to certain extent
foreign publications to enter into the local territories have disappeared.
The reasons for rise in cyber pornography have been many and varied. Primary among them is the
ease with which one can access pornographic material online and its anonymity. Individuals can
easily view pornographic images day and night in the privacy of their own home. The internet has
decreased the hurdle of shame that comes with purchasing pornographic materials and the
embarrassment of being caught with it. However what has been the most disturbing is the increase
in child pornography. Child pornography is different from other pornography and consequently
receives more stringent legal treatment. It is distinguished as an issue of child abuse-in its
production and/or in the way it is used by pedophiles to desensitise their victims. The growth of the
internet has provided child pornographers with a distribution vehichle which is perceived to be
relatively anonymous.
The issue of cyber pornography has been dealt with in section 67 of the IT Act where publishing of
any information which is obscene in electronic form has been made an offence. The section provides
that any material which is published or transmitted or caused to be published
16E-bhasin Internet service at : http//www.ebhasin.com/bonline/pro_faqs.htm
http://www.ebhasin.com/bonline/pro_faqs.htmhttp://www.ebhasin.com/bonline/pro_faqs.htmhttp://www.ebhasin.com/bonline/pro_faqs.htmhttp://www.ebhasin.com/bonline/pro_faqs.htm