Is Spyware Recognized as an offence in ITA-2000 ?
We often wonder if ITA-2000 is strong enough to address the
emerging issues in Cyber Crimes. There are frequent demands that the ITA-2000
needs to be amended since it cannot recognize some of the offences that are
becoming serious issues now.
One such doubt being raised is the incidence of
"Spyware" and "Adware" which reside in the computer of an user and send
out information to an outside destination. Some times the information sent out
may be a "Tracking" information which is not designed to be harmful. In the
extreme the spyware may be a "Key Logger" which steals the passwords.
It is stated that many companies in USA have started using
Spyware as a means of advertising.
In this connection it is necessary for us to examine
critically the two relevant sections of ITA-2000 namely Section 43 and Section
66 which are reproduced here for ready reference.
Section 43 of ITA-2000:
If any person without
permission of the owner or any other person who is in charge of a computer,
computer system or computer network -
(a) |
accesses or secures access to such computer, computer
system or computer network. |
(b) |
downloads, copies or extracts any data, computer data
base or information from such computer, computer system or computer network
including information or data held or stored in any removable storage
medium; |
(c) |
introduces or causes to be introduced any
computer
contaminant or computer virus into any computer, computer system or
computer network; |
(d) |
damages or causes to be damaged any computer, computer
system or computer network, data, computer data base or any other
programmes residing in such computer, computer system or computer network; |
(e) |
disrupts or causes disruption of any computer, computer
system or computer network; |
(f) |
denies or causes the denial of access to any person
authorised to access any computer, computer system or computer network by
any means; |
(g) |
provides any assistance to any person to facilitate
access to a computer, computer system or computer network in contravention
of the provisions of this Act, rules or regulations made thereunder, |
(h) |
charges the services availed of by a person to the
account of another person by tampering with or manipulating any computer,
computer system, or computer network, |
he shall be liable to pay damages by way of compensation
not exceeding one crore rupees to the person so affected. |
|
Explanation - for the purposes of this section -
(i) |
"Computer Contaminant" means
any set of computer
instructions that are designed - |
|
(a) |
to modify, destroy, record,
transmit data or programme residing within a computer, computer system or computer
network; or |
(b) |
by any means to usurp the normal operation of the
computer, computer system, or computer network; |
|
(ii) |
"Computer Database" means a representation of
information, knowledge, facts, concepts or instructions in text,
image, audio, video that are being prepared or have been prepared in a
formalised manner or have been produced by a computer, computer system
or computer network and are intended for use in a computer, computer
system or computer network; |
(iii) |
"Computer Virus" means any computer instruction,
information, data or programme that destroys, damages, degrades or
adversely affects the performance of a computer resource or attaches
itself to another computer resource and operates when a programme,
data or instruction is executed or some other event takes place in
that computer resource; |
(iv) |
"Damage" means to destroy, alter, delete, add, modify
or re-arrange any computer resource by any means. |
|
Section 66 of ITA 2000:
|
|
(1) |
|
Whoever with the intent to cause or
knowing that he is
likely to cause wrongful loss or damage to the public or any person,
destroys or deletes or alters any information residing in a computer
resource or diminishes its value or utility or affects it injuriously by any
means, commits hacking. |
|
|
|
(2) |
|
Whoever commits hacking shall be punished with
imprisonment up to three years, or with fine which may extend up to two lakh
rupees, or with both.
|
For whatever reasons these sections have been drafted with a
certain amount of vagueness which is coming in handy now when new types of
crimes are being observed.
From the above sections it is clear that a "Spyware" is a
"Computer Contaminant" and the spyware owner "access" the system resource
whether or not he creates any damage.
Similarly, "Affecting any information residing inside a computer
resource injuriously" is an offence recognized in Section 66.
Hence Spyware is recognized as an offence for criminal liability
and as a contravention for civil liability.
Additionally, because of Section 75, the offence will be
recognized even against a foreign company or individual involved in introducing
the spyware or benefiting from the spyware in the form of product advertising.
In those countries where the definition of crimes are too
specific, there may be difficulty in fitting a new offence under the existing
provisions. But ITA-2000 is flexible enough to permit inclusion of such
offences.
This is one of the resilient features of ITA-2000.
It is strongly advised that Indian Companies should refrain
from using Spyware advertising. Only those programmes which take specific
permission or a call from the owner of the computer before accessing the
computer resource are legal and can be used for any advertising purpose.
Naavi
May 06, 2005