Powers of State Governments Redefined by ITA 2008
With the passage of ITA 2008 (Amended ITA
2000), the role of State Governments in Cyber regulations has undergone a
significant change.
The Section 90 of
the Act which empowers State Government to make “Rules” for the purpose of
implementing the provisions of the Act assumes new meaning under ITA 2008.
In ITA 2000, the
section referred to powers required to be exercised under section 6 which
was in relation to e-Governance requirements such as filing of forms,
granting of licenses, receipt of money etc. There were not many other
powers conferred on the State Government. Hence it could be interpreted
that the powers of the State Government were intended to be used only for
giving effect to Section 6 and perhaps sections relating to the powers of
the Police.
Under ITA 2008, no change has been made to Section 90. However, the words
“..without prejudice to the generality of the foregoing power..” used in
Section 90 (2) assumes a greater meaning now since ITA 2008 envisages a lot
more responsibilities and powers to State Governments under the amended
provisions.
It is now no longer easy to restrict this section to only “Section 6” as it
appeared appropriate in the earlier version. Now there are several more
sections of ITA 2008 where State Government needs to exercise its powers.
One of the other sections under ITA 2008 which necessitates exercise of
power by State Government is section 6A regarding delivery of services by
service providers.
The provisions of
Section 7A regarding audit of e-documents also apply to the State
Governments and hence rules need to be framed for this purpose also.
Section 10 is another section under which rules are to be notified for use
of digital signatures or other approved forms of electronic signatures if
any.
Section 43 A which defines the liability of body corporates regarding
handling of sensitive personal information makes a reference to “reasonable
security practices and procedures specified in any law for the time being
in force”. Since the definition of “law” includes state laws and
ordinances, it is possible for State Governments to define reasonable
security practices for any class of users such as “Cyber Cafes”, “Hotels”,
“Educational Institutions” or even “Households”.
As regards the “Cyber Café Regulations”, there is however a conflict in
section 67 (C) where the Central Government alone has been vested with the
powers to preserve and retain information in a particular manner and format
for a specified duration. Presently some of the State regulations on Cyber
Cafes already specify such information and hence the State Governments need
to review the present notifications and modify them in accordance with the
ITA 2008.
More importantly, sections 69, 69 A and 69 B provide powers to State
Governments along with the Central Government to
a) Appoint an
officer or agency of the Government specially authorized to to intercept,
monitor, decrypt, block access to any content , collect traffic data or
information generated, transmitted, received or stored in any computer
resource.
b) to notify procedures and safeguards for exercising the powers as
indicated in the above paragraph
c) Define the term “traffic data”
It is of course
possible for the State Government to consider declaring any officer of the
Police department as an officer for the purpose of these sections. However,
since the Act has at different places mentioned the powers of the Police
where relevant and has used the words “any officer” in Section 69 and “any
agency of the Government” in sections 69 A and 69 B, it is perhaps the
intention of the legislature not to vest the powers under Sections 69, 69A
and 69 B with the Police either at the State level or with CBI or that
National Investigating Agency at the Central level.
The State Government has to therefore determine and notify which officer or
agency would be entrusted with the onerous responsibilities envisaged under
these three sections and the procedures, safeguards etc to be associated
with such appointment.
Further, under the modified Section 70, the appropriate Government can
declare any “facility of critical information infrastructure” as a
“protected system”. The State Government has to frame rules and procedures
to identify such systems, authorize appropriate persons in writing, how
they are to be accessed etc.
Under Section 78 of ITA 2008, now Inspectors will be authorized to
investigate cases falling under the Act, instead of the DSPs as per ITA
2000. State Governments which had presently set up Cyber Crime Police
Stations with statewide jurisdiction need to review the system and consider
if they need to declare more number of police stations as “Cyber Crime
Police Stations” especially since the number of offences falling under ITA
2008 shall be far more than in the case of ITA 2000.
Under Section 79 A, the Central Government may designate any department,
body or agency of the Central or State Government as “Examiner of
Electronic Evidence”. The State Government may have to therefore identify
and recommend which state level agency can be notified for this purpose.
State Governments will therefore be exercising far more powers under the
ITA 2008 than what was envisaged under ITA 2000. The powers also need to be
accompanied by several definitions, procedures, safeguards, appointment of
agencies etc.
In order to
effectively formulate a strategy for the State Governments, they need to
constitute an advisory body of experts which may be called the "Cyber Law
Advisory Group" so that detailed action plan can be drawn up.
Naavi
January 15, 2009
Other Articles on ITA 2008