Wednesday, November 5, 2014

Cyber Pornography

Cyber Pornography

Adv. Rajas C. Pingle




This post has been divided into following parts:

  • Current Scenario in India & in other Developed Countries;
  • Advantages & Disadvantages of Pornography;
  • Practicality of banning Cyber Pornography in India & Role of an Intermediary;
  • Necessary amendments to Information Technology Act, 2000 for better Regulation, prosecution and conviction as far as Cyber Pornography Offences are concerned
  • Educating the Police on Cyber Pornography Offences for quality investigation and Problems & Solutions while Investigating the Cyber Pornography Offences; And
  • Awareness campaigns for educating Parents on Parental Control in curbing Cyber Pornography

Current Scenario in India & other Countries

In India Information Technology Act, 2000 deals with the issue of Cyber Pornography. Under the Act storing or private viewing of pornography is legal as it does not specifically restricts it. On the other hand transmitting or publishing the pornographic material is illegal, following are some sections of Information Technology Act, 2000 which prohibit cyber pornography with certain exceptions to Section 67 & 67A;

“Section 66A of the Information Technology Act, 2000 prohibits sending of offensive messages through communication service”

“Section 66E of the Information Technology Act, 2000 prohibits capturing, transmitting or publishing the image of a private area of a person without consent”

“Section 67 of the Information Technology Act, 2000 specifically prohibits, transmission or publication of obscene material in electronic form”  

“Section 67A of the Information Technology Act, 2000 prohibits transmission or publication of material containing sexually explicit act in electronic form”

“Section 67B of the Information Technology Act, 2000 prohibits storying, private viewing, transmission or publication of material containing child pornography in electronic form”.

Exception: Section 67 and section 67A does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form- 

(i)  the publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper, writing, drawing, painting, representation or figure is in the interest of science, literature, art, or learning or other objects of general concern; or
(ii)  which is kept or used bona fide for religious purposes.
As far as the above sections relating to Cyber Pornography are concerned, Section 67A and 67B are the only sections which are non-bailable as per Section 77B of the Act, whereas others are bailable. 

We also have Section 69A of the Information Technology Act, 2000 where Central Government or its officer appointed can issue directions to other Government Agencies and Intermediaries to block such information for public access if it is necessary or expedient so to do in the interest of sovereignty and integrity of India, defence of India, security of the State, friendly relations with foreign states or public order or for preventing incitement to the commission of any cognizable offence relating to above, now considering the topic of Cyber Pornography although blocking of Cyber Pornography is not explicitly mentioned in this section but it could be implied  the term Public Order in the above mentioned section would mean ‘Maintenance of Law’. Hence an inference can be drawn that Cyber Pornography can be blocked under the said provision.

On perusal of the above mentioned sections one could see there is a clear contradiction between Section 66E of the Information Technology Act, 2000 and other Pornography related sections as Section 66E prohibits capturing, transmitting or publishing the image of a private area of a person ‘without consent’ but the question arises here, is it allowed with consent?, whereas Section 67 and Section 67A of the Information Technology Act, 2000 prohibits the transmission and publication of obscene and sexually explicit material. 

In United States of America with the exception of child pornography, the legal status of accessing Internet pornography is still somewhat unsettled, though many individual states have indicated that the creation and distribution of adult films and photography are legally termed as an act of prostitution.

As of now in America Cyber Pornography is regulated and for the same the traditional method mentioned in the Landmark Judgement of Miller Vs State of California is used along with other legislations. The legality of pornography is determined by the Miller test, the test dictates that the opinion of the local community on a specific pornographic piece is most important in determining its legality. Thus, if a local community determines a pornographic work to meet its standard for obscenity then it is more likely to be banned. This means that a pornographic magazine that might be legal in California could be illegal in Alabama. This standard on pornographic legality is extremely difficult to uphold for the internet given that the internet contains ubiquitous amounts of pornography. It has been argued that if the Miller test were applied to the Internet then, in effect, the community standards for the most conservative community would become the standard for all U.S. based Web sites. The courts are currently examining this issue. 

In United kingdom, the possession of pornographic images for private use has never been an offence, however the sale or distribution of hardcore pornography through any channel was prohibited until the rules were relaxed in 2002. The UK citizens were always able to access pornography without breaking any laws except child pornography. 

In UK, pornography has been divided into three parts, softcore pornography, hardcore pornography and extreme pornography. Extreme pornography is illegal to even possess as on January 2009 and carries a three year imprisonment. Criminal Justice & Immigration Act, Sections 63 to 67 of the Act make it an offence to possess pornographic images that depict acts which threaten a person's life; acts which result in or are likely to result in serious injury to a person's anus, breasts or genitals; bestiality; or necrophilia. They also provide for the exclusion of classified films etc. and set out defences and the penalties for the offence

The UK Government has instructed ISPs to filter legal pornography and other adult subjects "by default". This would mean that anyone who wanted to view websites dealing with these sensitive subjects would have to choose to do so.  

In Australia, government has implemented rating based regulatory framework, criminal legislation in Australia prohibits production, dissemination and consumption of illegal pornography. It is illegal for internet content providers within Australia to 'broadcast' internet pornography classified as MA15+ to R18+ unless such internet pornography is subject to an age verification system or internet pornography which may be classified as X18+ to RC content that is not subject to an Australian Communications and Media Authority (ACMA) infringement notice through exceptions.  

Cyber pornography hosted outside Australia classified by the ACMA under the Classification Board legislation will be blocked if such Cyber pornography is deemed by the AMCA to be refused classification , or 'potentially' refused classification. Refused classification (RC) does include real child abuse internet pornography and bestiality internet pornography. Cyber pornography is prohibited in Australia if it falls within the ‘RC’ or ‘X18+’ classifications or, for content hosted in Australia that is not restricted by an adult verification procedure, if it falls within the ‘R18+’ classification.



Advantages & Disadvantages of Pornography

Advantages - 
  1. Exhaust Value - Pornography can help in relieving sexual tension and can relax human body and mind.
  2. Can be a short cure for long distance relationships - Pornography can be a short cure for long distance relationships, as these people can use the scenes to satisfy natural urges that they would otherwise look to people who use this urge as a tool to take advantage of desperate individuals who are married or in a committed relationship.
  3. Can help in reduction of sexual crimes - There there have been studies that link pornography to crime, there have similar studies that do not link pornography to crime. Therefore, there is no concrete proof of an increase of violence or sexual crimes caused by pornography. It is currently believed that the sexual tension release by watching pornography probably decreases crimes more than it increases crimes. 

Disadvantages -
  1. Unrealistic delusion - There are actors and actresses in the scene, because they display emotions of expectancy and euphoria, this is not necessarily true. This can lead to unrealistic expectations in real life and can end relationships.
  2. May end Marriages - This doesn't really come into a disadvantage, as it really depends upon the mind set of an individual, in some cases, as soon as your husband/wife views porn, chances are you’ll feel disrespected. Some spouses start feeling insecure, actually inadequate because of their partners. This may make a wedge in the marriage but as I said it really depends on the mindset of an individual. 
  3. Minor exploitation - If minors gain access to pornography, they immediately start thinking that this is what should be done and it changes the focus of life. Without proper education pornography can lead to unsocial behaviour causing a generation of confused and misinterpreting young class. The instances of people becoming pedophiles might also increase  
  4. Religion and Beliefs - Not all, but some religions believe that pornography is a type of adultery or unfaithfulness.



Practicality of banning Cyber Pornography & Role of an Intermediary in India

In India, we already have provisions for blocking of Cyber Pornography vide Section 69A and Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009 of the Information Technology Act, 2000 which lays down the procedure for actually blocking for access of information by public. According to me the procedure mentioned in the rules is a bit lengthy as one needs to write a complaint and send it to the concerned Nodal Officer appointed by the respective organisation and then if the concerned organisation is satisfied about the need to block the information, then only the Nodal Officer of the organisation will forward the same to designated officer appointed by the Central Government in this behalf, instead of going through all these hassles the Central Government can simply create a wing, where the cognisance of these complaints can be taken and acted upon immediately.

The Information Technology Act, 2000 does not provide specific wording for blocking of Cyber Pornography for public access, one has to interpret Section 69A of the Information Technology Act, 2000 in such a way so as to include Cyber Pornography into the definition of ‘Public Order’ to put check on Cyber Pornography, where Courts in India have already interpreted Public Order as ‘Maintenance of Law’.

Where completely removing pornographic websites will not be a feasible idea, as most of these pornographic websites have their servers outside India, in the Countries where Cyber Pornography is loosely regulated or completely legal, however these pornographic websites can either be completely blocked or regulated by new framework for Cyber Pornography altogether. Service providers as Intermediaries play a very important role as far as enforcement of the present law or future regulatory framework is concerned. Section 79 of the Information Technology Act, 2000 exempts liability of an Intermediary in certain scenarios, however as far as Cyber Pornography offences are concerned, Rule 3(4) of Information Technology (Intermediaries guidelines) Rules, 2011 will be applicable; 

“The intermediary, on whose computer system the information is stored or hosted or published, upon obtaining knowledge by itself or been brought to actual knowledge by an affected person in writing or through email signed with electronic signature about any such information as mentioned in sub-rule (2) above, shall act within thirty six hours and where applicable, work with user or owner of such information to disable such information that is in contravention of sub-rule (2). Further the intermediary shall preserve such information and associated records for at least ninety days for investigation purposes”

On the other hand, if at all we consider complete blocking of every pornographic website at ISP level by putting network filters, one of the downsides would be, everything would be blocked even the good literature or the websites including government websites providing sex education and health education as sometimes the filters provided by ISPs would not recognise the difference between violent pornographic website and a website providing education or good literature.   

The other challenge is blocking or taking down the offensive/objectionable content which is there on the website which do not have servers in India, these organisation don't really comply with the Indian Laws, so obviously Law Enforcement Authorities would have to request these organisation to take down the content and these organisation if they deem fit would do so, taking their own sweet time. The solution would be bringing these organisations within the ambit of Indian Laws by compelling them to establish their servers in India.  



Necessary Amendments to Information Technology Act, 2000

As we all know, Information Technology Act was introduced in the year 2000 and it was the first technology legislation in India and in the year 2008 the Act was amended and it turned out to be a Scenario Changer! Also Information Technology Rules, 2011 defined ‘Sensitive Personal Data’ & ‘Reasonable Security Practices’, which are remarkable welcome changes but nevertheless the current Act still lacks in many areas.

The Cyber Pornography Offences are mainly defined in sections,66A 66E, 67, 67A and 67B, as already discussed above. All other Pornography related offences are bailable as per Section 77B of the Information Technology Act, 2000 the only exceptions being Section 67A & section 67B. This is the main reason why the offenders are committing pornography related offences and still have the audacity to repeat it, as they are entitled to bail as of right and not to mention the long trial period. These sections of the Act should be made non-bailable so as to strike fear into the minds of these offenders, this would definitely reduce the crime rate to some extent. 

Section 66A prohibits sending of offensive messages though communication service, but does not define the word ‘offensive’, the same should be clearly defined to avoid the misuse of this section.  

Section 67 which prohibits transmission or publication of obscene material in electronic form desperately needs an amendment as the word ‘Obscene’ is not specifically defined but nevertheless it gives out a partial definition which is, “any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it” but at the same time the Apex court bench of Justices K.S. Radhakrishnan and A.K. Sikri upheld the appeal in Sportsworld case in 2014 and ruled that a picture or article can be deemed obscene only if it is lascivious, appeals to prurient interests and tends to deprave and corrupt those likely to read, see or hear it.

“A picture of a nude/semi-nude woman… cannot per se be called obscene…. Only those sex-related materials which have a tendency of ‘exciting lustful thoughts’ can be held to be obscene, but the obscenity has to be judged from the point of view of an average person, by applying contemporary community standard(s),” the court said.

“Applying the community tolerance test, we are not prepared to say such a photograph is suggestive of depraved minds and designed to excite sexual passion… which would depend upon the particular posture and background,” 

The Apex Court in this case has applied the same test of Community Standards as mentioned in the case of Miller Vs. State of California, USA. This issue should obviously be examined further for clarity in the section.

There is an obvious contradiction between Section 66E and other pornography related sections, Section 66E prohibits capturing, transmitting or publishing the image of a private area of a person without consent but if it is done with consent then it is allowed, whereas Section 67 and Section 67A of the Information Technology Act, 2000 prohibits the transmission and publication of obscene and sexually explicit material. The words “transmitting or publishing” should be removed by amendment to resolve this issue. 

In India storing or private viewing of pornography is legal as the Information Technology Act, 2000 does not specifically restricts it, according to me Cyber Pornography should be divided into three parts namely Softcore Pornography, Hardcore Pornography and Extreme Pornography, by defining and adding these types it would be easier to regulate and restrict pornography in general. By amending the Cyber Pornography sections Government can include and prohibit even storing or private viewing of Hardcore and Extreme Pornography. 

As per Rule 3(4) of the Information Technology (Intermediaries guidelines) Rules, 2011 the intermediary shall preserve such information and associated records for at least ninety days for investigation purposes. The stipulated period of preserving the information should be increased from ninety days to one hundred and eighty days, so that the Law Enforcement Agencies could obtain the data even at a later stage in cases which are filed after 90 days.


Educating the Police on Cyber Pornography Offences for quality investigation and problems & solutions while investigating the Cyber Pornography Offences.

The first step towards curbing Cyber Pornography is, getting highest conviction rate, the ultimate effect of this would strike fear in the mind of the offender and as per jurisprudence will have deterrent effect on the offender. This will only happen if the evidence gathered by the investigating agencies is appreciated in the Court of Law. Currently the Defence Lawyers are taking advantage of lack of knowledge as far as evidence gathering in Cyber Pornography Offences is concerned. Courses should be organised at the State level by inviting Cyber Experts, this will ensure quality of investigation and evidence gathering in Cyber Offences in general.

While investigating Cyber Pornography Offences, sometimes the necessary information is required from the Intermediary to forward the investigation, but as some of these intermediaries consider themselves outside the ambit of Indian Laws, getting information from is tiresome process. In some cases, even after providing a Court Order to get the necessary information for investigation, some of the intermediaries don’t provide the information. The solution for this is, these intermediaries should be told to install their servers in India to route the internet traffic from India through these servers, this will ensure their liability under Indian Laws and specifically under Information Technology Act, 2000 and would also speed up the investigation process.       



Awareness Campaigns for Educating Parents on Parental Control to curb Cyber Pornography


 It is known fact, that children/minors are most prone to Cyber Pornography as we have entered into twenty first century and everyone has a Computer at their home. Indian Government should start running campaigns for educating parents on parental control, which can be helpful in curbing Cyber Pornography at its grass root level. Parental Control software or Antivirus which has inbuilt Parental Control should be made available by the Government officially, so that it is easily downloaded and subsequently installed on every computer.


Adv. Rajas C Pingle

[Cyber Law & Cyber Security Expert]

Disclaimer: This does not constitute a legal opinion and would not create Attorney-Client relationship. This article is only for information and awareness purpose and merely a possible interpretation of the law.

Website - www.netlawgic.com


Facebook - https://www.facebook.com/pages/Cyber-Crime-Awareness/246665595391183?sk=timeline

Image http://image.yaymicro.com/rz_512x512/3/d78/stop-sign-with-adult-content-warnings-3d78792.jpg

Image copyrights are with the respective owner.

Thursday, October 9, 2014

Data Theft/Unauthorized Copying of Data - Legal Remedy

Data Theft/Unauthorized Copying of Data - Legal Remedy


What is data theft/Unauthorized Copying of Data ?

Data theft/Unauthorized copying of data in simple term means accessing and stealing/copying computer based confidential information with intention to cause wrongful loss to the owner of the confidential information and wrongful gain to the perpetrator.
Data theft is an increasing problem for Individual computer users as well as big corporate firms.

What are the common modes of data theft/Unauthorized Copying of Data?

  1. USB (Pen) Drives & Memory cards - These are the easiest and cheapest option according to these perpetrators and are very easy to hide. The memory cards are now coming in 256GB and 512 GB variants, so it has become even more easy to move large amount of data.
  2. Portable Hard Drives - These are also one of the popular mediums for the obvious reasons 'Large Storage Capacity'.
  3. CD/DVD - This medium was popular back in the days but has become obsolete now.
  4. Email - Some perpetrators simply use email to transfer files from their official account to personal account or home computer, they move the data slowly over the period of time to avoid detection by IT department for sending large amount of data. These perpetrators send these emails to their private accounts on the pretext of 'working from home'.
  5. Web-Mail - Some web-mail interfaces provide larger file attachments than the conventional email service providers.
  6. Printing - Some perpetrator would not leave any electronic evidence behind, they simply take prints of the key documents and steal the same in hard copies.
  7. Remote Access - This can either be used in the way of unauthorized access (Hacking) or authorized access, as some organisation provide remote access to their employees so that they can work from their home computers, this also makes tracing the data difficult for law enforcement agencies or private investigators.

What can be stolen/copied?

Everything stored in an organisation has some potential value, some of the targets for data thieves are as follows:
  1. Customer contact & Financial data such as credit card and debit card information;
  2. source codes & Algorithms;
  3. marketing information such as Plans, Contact list & media files;
  4. network credentials such as passwords & Certificates;
  5. proprietary process descriptions and operating methodologies;
  6. personnel records and private employee data;
  7. legal data concerning ongoing or planned litigation or contract actions;
  8. other user’s private documents stored on company computers; and
  9. company strategic data, including the communications of managerial and executive staff.

What is the legal remedy for data theft/Unauthorized Copying of Data?

In India the first technology legislation came into being in the year 2000, that is 'Information Technology Act'. The Act did not provide for sufficient protection or solutions in data theft/unauthorized copying of data scenarios in those days, as the compensation bracket was limited, only in the year 2008 the amended Information Technology Act came into force with one of the important amendments as far as Section 43 and compensation awarded under the section is concerned, the compensation limit was removed.
Section 43 - Penalty and Compensation for damage to computer, computer system, etc.
Now the Complainant can approach the Adjudicating officer (Who is an IT Secretary of each state) appointed under Section 46 of the Information Technology Act, 2000 (As amended in the year 2008). The respective Adjudicating officer is competent to handle the claim up to Rs. 5 Crore and if the claim amount is exceeding Rs. 5 Crore the Complainant will have to approach the Competent Court.
The Adjudicating Officer is the quickest remedy available to the Complainant, as according to Information Technology Act the Adjudicating Officer has to pass the final order within the period of 6 months from the date of filing of the Complaint.

Website - www.netlawgic.com


Facebook - https://www.facebook.com/pages/Cyber-Crime-Awareness/246665595391183?sk=timeline

Adv. Rajas C Pingle

(Cyber Law & Cyber Security Expert)

Disclaimer: This does not constitute a legal opinion and would not create Attorney-Client relationship. This article is only for information and awareness purpose and merely a possible interpretation of the law.

Image - http://www.tradesecretslaw.com/articles/unfair-competition/

Image copyrights are with the respective owner.

Tuesday, October 7, 2014

Privacy Wars 2.0



Privacy Wars 2.0










As we enter the new era of mobile technology innovations, the key players (Apple & Google Inc.) have decided to take their user's privacy to a completely different level altogether.

Apple and Google are trying to implement new privacy policies, which will make the data stored on the users phones inaccessible by others (Including these tech giants) except the user itself. The issue is part of a long-running debate over whether tech gadgets should have privacy-protecting encryption which makes it difficult/nearly impossible for law enforcement to access in time-sensitive investigations.

What concerns me here is, while the law enforcement agencies investigate a particular offence which involves these respective mobile phones, it is going to be extremely difficult to decrypt the information in time which will help to solve the time sensitive crime and not to mention the hassles while fulfilling the conditions and proving the evidence under section 65(b) of the Indian Evidence Act.

The companies here will be putting law enforcement agencies in a very tight spot as in any case where the mobile phone plays an important part, but at the same time the perpetrator will enjoy the power to store and exploit the data beyond the reach of Law 

Adv. Rajas C Pingle 

(Cyber Law & Cyber Security Expert)

Disclaimer: This does not constitute a legal opinion and would not create Attorney-Client relationship. This article is only for information and awareness purpose and merely a possible interpretation of the law. Image copyrights are with the respective owner.

Saturday, October 4, 2014

Sextortion - The new internet devil



'Sextortion' - The new internet devil



  • What is sextortion?

A form of sexual exploitation that employs non-physical forms of coercion by threatening to release sexual images or information to extort monetary or sexual favors from the victim.

  • Modus Operandi

1) The scammers persuade the dater to send sexually explicit photos. Once they get the photos, the scammers identify themselves as law enforcement, telling the dater they sent the pictures to a minor.

They then tell the person to pay up in order to avoid arrest.

The scammers are not only identifying themselves as law enforcement, they are also using actual names of officers.

“These people are being contacted by Detective Don Peterson and it isn’t me,” Peterson told the paper.

More than 100 people have paid between $500 to $1,500 to try to avoid arrest.

2) The groups is to create online accounts of females and post pictures of attractive ladies to draw clients. They would then post pornographic images and entice their victims to have video chats with them, usually with lewd content and conversation.

Once they obtain the incriminating videos, the groups would threaten to send the video chats to the victim's friends or relatives unless they send money.

The victims are allegedly forced to send $500 to $2,000 – or P20,000 to P90,000 – through Western Union in exchange for the removal of the online video chat.

How to prevent sextortion?

  • Talk about sextortion

Sextortion thrives on silence; spread knowledge. Talk to two people and ask them to spread the word to two more. Keep the chain going.

  • Spread the word

Without a name – SEXTORTION – it is difficult to lift an abuse out of the realm of bad things we know happen and passively accept as the way of the world, and into the realm of things we will no longer tolerate and actively seek to change.

  • Learn more about sextortion

Once you become aware of sextortion, you see how pervasive it is. Gather and share information about sextortion.

  • Examine your existing legal framework

Assess the adequacy of your country’s legal framework for prosecuting sextortion.

1) Section 66E of Information Technology Act

  • Violation of Privacy - Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person

2) Section 67 of Information Technology Act

  • Punishment for publishing or transmitting obscene material in electronic form

3) Section 67A of Information Technology Act

  • Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form

Interpol investigation

An INTERPOL-coordinated operation targeting organized crime networks behind ‘sextortion’ cases around the world has resulted in the arrest of 58 individuals, including three men linked to the group which harassed Scottish teenager Daniel Perry.

Perry, a 17-year-old victim of an online blackmail attempt, died after jumping off the Forth Road Bridge near Edinburgh in July last year.

In the first operation of its kind, information shared between the INTERPOL Digital Crime Centre (IDCC), Hong Kong Police Force, Singapore Police Force and the Philippines National Police (PNP) Anti-Cybercrime Group led to the identification of between 190 and 195 individuals working for organized crime groups operating out of the Philippines.

Disclaimer: This does not constitute a legal opinion and would not create Attorney-Client relationship. This article is only for information and awareness purpose and merely a possible interpretation of the law. Image copyrights are with the respective owner.