Let's Build a Responsible Cyber Society

Visit
www.ceac.in


Visit
www.arbitration.in

 

New Cyber Security Infrastructure unveiled by Information Technology Act 2000 Amendment

[P.S: Comments made here in are the first reactions based on the Bill. Further developments in the form of rules and notifications are awaited.. Naavi ]

The unveiling of the amendments  which has transformed ITA 2000, the landmark cyber legislation in India which was first enacted with effect from October 17, 2000, ( the new version of the Act is herein referred to as ITA 2008) has provided a new focus on Information Security in India.

So far, Information Security Experts have been speaking on "Cyber Law Compliance" as a part of "Techno Legal Information Security" and advising Companies to formulate an appropriate plan of action to comply with cyber laws as a part of the IS practice. Now this association of Cyber Law into the Information Security domain has gained additional importance due to some amendments that have been made to ITA 2000.

The amended Act is making a sincere effort to bring in a complete information security infrastructure into the industry.

Definition:

The first observation that we can make in this regard is a new legal definition that has been given to the term "Cyber Security" under the newly inserted section 2( nb) which states as under.

Section 2 (nb) (Inserted Vide ITAA 2008)

"Cyber Security" means protecting information, equipment, devices, computer, computer resource, communication device and information stored threin from unauthorized access, use, disclosure, disruption, modification or destruction.

The term incorporates both the physical security of devices as well as the information stored there in. It covers "Protection from unauthorised access, use, disclosure, disruption, modification and destruction"

To support the development of the Cyber Security infrastructure, the amendments also focus on

a) Defining penalties for violation

b) Defining appropriate level of compensation

b) Setting up an authority for implementation

Penalties for Violation

In defining the penalties for violation, we may specially note that a new offence has been defined which recognizes the need to specially penalize the "Theft" of computer or other communication devices.

Under the newly added Section 66B, the receiver of a stolen computer resource may be liable for punishment.

The section reads:

Sec 66B: Punishment for dishonestly receiving stolen computer resource or communication device (Inserted Vide ITA 2008)

Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both

Under this section, receiving a stolen Computer, or a Mobile or even a CD, or an e-mail containing stolen information may be punishable with 3 years of imprisonment. The offence would be cognizable and compoundable. For being liable, the person should receive the information "Dishonestly" and should be aware that it is "Stolen".

With this section, Police may to book all Mobile theft or laptop theft cases under this section. So far we were trying to convince the Police that any theft of Computer device would be "Diminishing the value of information residing there in" and therefore should be booked under Section 66. Now it may be easy to convince the Police.

Along with the change made to Section 78 and 80 of the ITA 2000 bringing down the level of investigation to the Inspectors from DSPs, the number of Complaints which need to be registered under "Cyber Crimes" will now increase many folds and the Police need to work over time to get trained in the handling of Cyber Crimes.

Additionally, Section 43 read with other changes increase the possibility of compensation from a maximum of RS 1 crore to even beyond RS 5 crores. Though the fast track "Adjudication" is restricted to cases where the compensation is upto RS 5 crores, there is no upper limit on the compensation to be claimed.

The newly added Section 43 (j) tries to expand the cases where compensation can be claimed to cases of a person without the permission of the owner of a computer, computer resource

"steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage,"

In this section, "Computer Source code" means  "the listing of programmes, computer commands, design and layout and programme analysis of computer resource in any form". This again makes it easy for Police to understand how to treat a complaint from a software company about stolen data.

The penalty for stolen data does not end with the perpetrator of the offence as far as the victim is concerned. The provisions on "Data Protection" extend the liability for lack of Cyber Security to the Companies too.

Under the newly introduced Section 43A,

Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected.

It may be noted that there is no upper limit to the liability under this section.

In understanding the responsibilities under this section, the term "Reasonable Security Practices" becomes vital.

As per the explanation to the section,

"reasonable security practices and procedures" means security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.

Additionally, Under Section 72 A, there is a provision for Criminal prosecution for breach of information security. This section states,

Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such  material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to five lakh rupees, or with both.

Note again that this offence is cognizable.

Further under Section 85, the Company as well as its Directors or Officers in charge of business "shall be" held guilty of the offence is committed "by the Company".

Thus the "Vicarious Liability" on the Companies for "Data Protection" has been hardened.

Under Section 67 C, a further responsibility has been cast on "Intermediaries" (Which now includes body corporates" to retain information for a certain time to be specified by the Central Government. The section reads

(1) Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.

(2) Any intermediary who intentionally or knowingly contravenes the provisions of sub section (1) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.

This is an important provision that will pull up ISPs, MSPs and others who today shirk from the responsibility of preserving information which would serve as evidence in case of Cyber offences. (Duration for which information has to be preserved need to be prescribed in the rules and notifications)

As a part of the need to monitor Cyber Security, under Section 69 B,

(1) The Central Government may, to enhance Cyber Security and for identification, analysis and prevention of any intrusion or spread of computer contaminant in the country, by notification in the official Gazette, authorize any agency of the Government to monitor and collect traffic data or information generated, transmitted, received or stored in any computer resource.

(2) The Intermediary or any person in-charge of the Computer resource shall when called upon by the agency which has been authorised  under sub-section (1), provide technical assistance and extend all facilities to such agency to enable online access or to secure and provide online access to the computer resource generating , transmitting, receiving or storing such traffic data or information.

(3) The procedure and safeguards for monitoring and collecting traffic data or information, shall be such as may be prescribed.

(4) Any intermediary who intentionally or knowingly contravenes the provisions of sub-section (2) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.

Explanation: For the purposes of this section,

(i) "Computer Contaminant" shall have the meaning assigned to it in section 43

(ii) "traffic data" means any data identifying or purporting to identify any person, computer system or computer network or location to or from which the communication is or may be transmitted and includes communications origin, destination, route, time, date, size, duration or type of underlying service or any other information.

Implementation Mechanism

Apart from throwing open registration and investigation of Cyber Crimes to Inspector level, at the national level, a new "Nodal Agency" comes into being for implementation of Cyber Security.

Under Section 70 (B) (4),

The Indian Computer Emergency Response Team shall serve as the national agency for performing the following functions in the area of Cyber Security,-

(a) collection, analysis and dissemination of information on cyber incidents

(b) forecast and alerts of cyber security incidents

(c) emergency measures for handling cyber security incidents

(d)  Coordination of cyber incidents response activities

(e) issue guidelines, advisories, vulnerability notes and white papers relating to information security practices, procedures, prevention, response and reporting of cyber incidents

(f) such other functions relating to cyber security as may be prescribed

Under Section 70 (B) (6), 

For carrying out the provisions of sub-section (4), the agency referred to in sub-section (1) may call for information and give direction to the service providers, intermediaries, data centers, body corporate and any other person

Under Section 70 (B) (7)

Any service provider, intermediaries, data centers, body corporate or person who fails to provide the information called for or comply with the direction under sub-section (6) , shall be punishable with imprisonment for a term which may extend to one year or with fine which may extend to one lakh rupees or with both.

The cumulative effect of the above provisions of ITA 2008 is to create a new Cyber Security Implementation infrastructure in India and is considered a highly positive development in the industry.

The next steps to be watched are of course how the provisions would be actually implemented through appropriate rules and regulations.

Naavi

December 27, 2008

Other Articles on ITA 2008

Visit
www.Naavi.net

Visit
www.lookalikes.in