Let's Build a Responsible Cyber Society


.

Is Spyware Recognized as an offence in ITA-2000 ?

We often wonder if ITA-2000 is strong enough to address the emerging issues in Cyber Crimes. There are frequent demands that the ITA-2000 needs to be amended since it cannot recognize some of the offences that are becoming serious issues now.

One such doubt being raised is the incidence of "Spyware" and  "Adware" which reside in the computer of an user and send out information to an outside destination. Some times the information sent out may be a "Tracking" information which is not designed to be harmful. In the extreme the spyware may be a "Key Logger" which steals the passwords.

It is stated that many companies in USA have started using Spyware as a means of advertising.

In this connection it is necessary for us to examine critically the two relevant sections of ITA-2000 namely Section 43 and Section 66 which are reproduced here for ready reference.

Section 43 of ITA-2000:

If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network -  

(a)

accesses or secures access to such computer, computer system or computer network.

(b)

downloads, copies or extracts any data, computer data base or information  from such computer, computer system or computer network including information  or data held or stored in any removable storage medium;

(c)

 introduces or causes to be introduced any computer contaminant or computer  virus into any computer, computer system or computer network;

(d)

damages or causes to be damaged any computer, computer system or computer  network, data, computer data base or any other programmes residing in such  computer, computer system or computer network;

(e)

disrupts or causes disruption of any computer, computer system or computer  network;

(f)

denies or causes the denial of access to any person authorised to access  any computer, computer system or computer network by any means;

(g)

provides any assistance to any person to facilitate access to a computer,  computer system or computer network in contravention of the provisions of this  Act, rules or regulations made thereunder,

(h)

charges the services availed of by a person to the account of another  person by tampering with or manipulating any computer, computer system, or   computer network,

 

he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected.

 


Explanation - for the purposes of this section -
 

(i)

"Computer Contaminant" means any set of computer instructions that are  designed -

 

(a)

to modify, destroy, record, transmit data or programme residing within a  computer, computer system or computer network; or

(b)

by any means to usurp the normal operation of the computer, computer  system, or computer network;

(ii)

"Computer Database" means a representation of information, knowledge,   facts, concepts or instructions in text, image, audio, video that are being  prepared or have been prepared in a formalised manner or have been produced by   a computer, computer system or computer network and are intended for use in a   computer, computer system or computer network;

(iii)

"Computer Virus" means any computer instruction, information, data or   programme that destroys, damages, degrades or adversely affects the performance  of a computer resource or attaches itself to another computer resource and   operates when a programme, data or instruction is executed or some other event   takes place in that computer resource;

(iv)

"Damage" means to destroy, alter, delete, add, modify or re-arrange any  computer resource by any means.

Section 66 of ITA 2000:

 

    (1)  

Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person, destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hacking.

 
    (2)  

Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
 

For whatever reasons these sections have been drafted with a certain amount of vagueness which is coming in handy now when new types of crimes are being observed.

From the above sections it is clear that a "Spyware" is a "Computer Contaminant" and the spyware owner "access" the system resource whether or not he creates any damage.

Similarly, "Affecting any information residing inside a computer resource injuriously" is an offence recognized in Section 66.

Hence Spyware is recognized as an offence for criminal liability and as a contravention for civil liability.

Additionally, because of Section 75, the offence will be recognized even against a foreign company or individual involved in introducing the spyware or benefiting from the spyware in the form of product advertising.

In those countries where the definition of crimes are too specific, there may be difficulty in fitting a new offence under the existing provisions. But ITA-2000 is flexible enough to permit inclusion of such offences.

This is one of the resilient features of ITA-2000.

It is strongly advised that Indian Companies should refrain from using Spyware advertising. Only those programmes which take specific permission or a call from the owner of the computer before accessing the computer resource are legal and can be used for any advertising purpose.

Naavi

May 06, 2005



For Structured Online Courses in Cyber laws, Visit Cyber Law College.com

 

Back To Naavi.org