Let's Build a Responsible Cyber Society

Visit
www.ceac.in


Visit
www.arbitration.in

 

First Adjudication Application under ITA 2000 Filed in Chennai

Chennai had already marked its name in the history of Information Technology Act 2000 (ITA 2000) by being the first to get a conviction of a person in the Court of Law under a section of ITA 2000. Now Chennai again made a mark in ITA 2000 enforcement being the first of the southern states to register an application for adjudication under ITA 2000. Mr C Umasankar, an NRI customer of ICICI bank became the trend setter by filing a complaint in connection with an alleged contravention of Section 43 of the ITA 2000 by ICICI Bank and one of its customers. 

The adjudication procedure for dispute settlement is one of the laudable citizen friendly features of the Information Technology Act 2000 because it tries to put a time limit of 4 months under which the adjudicator is expected to give his award. The procedure is also relatively uncomplicated with a simple application form to be filed along with the required fee.

 The adjudication process as per Section 46 of ITA 2000 can be invoked for any contravention under Chapter IX of the Act. This includes contraventions under Section 43 such as Unauthorized “Access”,’Downloading”, “Causing Damage or Disruption” “ Causing Denial Of Access”, “Introducing Virus”, “Using a resource and charging it to another person” or ”Assisting in contravention”.

 Simultaneously, under Section 85, the process gets extended to Companies and its executives if there is lack of due diligence. 

ITA 2000 gives so much importance to this process that the Adjudicator has been given sole jurisdiction in all instances of contravention and no court can even grant an injunction for the proceedings. 

Presently the IT Secretaries of every State or Union Territory in India have been designated as Adjudicators for the respective states.  

Despite such overwhelming advantages, it is strange that it has taken 8 years since ITA 2000 became effective for the first adjudication application to be filed anywhere in South India. The only other known application was in Delhi. 

The lack of complaints does not indicate lack of eligible incidents since during this time several hundred complaints have been filed under ITA 2000 on criminal offences. Most Criminal offences such as hacking also results in contravention of ITA 2000 and hence there must have been several opportunities for adjudication application in states such as Karnataka where hundreds of Cyber Crime complaints have been filed.

 One of the reasons for the non utilization of the adjudication process could be lack of awareness of the provisions by the lawyers so that they can advise their clients appropriately.

 It is also necessary for the State Governments to provide suitable training to the staff at the IT Secretary’s office so that it can effectively double up as the “Adjudicator’s Office”. There is perhaps a need for the Governments to think of providing a separate secretarial set up to the IT Secretary to support his duties as an Adjudicator.

While effective action regarding “Creation of Awareness”, “Building of support infrastructure in the IT Secretary’s office” etc is required in all States, the undersigned specially urges the new Karnataka Government to take necessary initiatives to see that the Silicon City does not continue to lag behind the neighboring states when it comes to Cyber Law Enforcement.

 

Naavi

June 26, 2008

Related Article in Deccan Chronicle

An Earlier Note from Naavi.org:

Phishing is Hacking

The power of Indian Cyber Law is manifest in the definition of the Section 66 offence which covers a wide range of Computer and Internet Crimes. The recent concern of the Netizens is the "Phishing Attacks". Most of the time the attack ends up with a fraudulent withdrawal of money froma Bank account. In view of the end result we often see only the "Fraud Dimension" of the Phishing attack.These attacks consist of the following components.

1.Forging of e-mail headers

2.Spamming under the false name

3.Creation of pseudo websites/web page which appear similar to the better known Bank site

4. Using the stolen password for entering the real Bank system to withdraw money.

Under Section 66 of ITA 2000, these could be recognized as an offence not withstanding the offences that may be recognized under IPC. Victims would rather prefer action under ITA 2000 since it also simplifies the recovery of damages through adjudication proceedings... Naavi

 

 

Visit
www.Naavi.net

Visit
www.lookalikes.in