Chapter IX of the GGWG 
		deals with Legal Issues. There are 18 key recommendations that the group 
		has made  and our comments are given below.
		These are preliminary 
		observations and are subject to be modified before submission to RBI. 
		Public may send their comments on this note if required.
		
			
				| 
				 Sl No  | 
				
				 Recommendation of the Group  | 
				
				 
				Comments  | 
			
			
				| 
				 1  | 
				
				 The Risk Management 
				Committee at the Board level needs to put in place processes to 
				ensure that legal risks arising from cyber laws are identified 
				and adequately addressed. It also needs to ensure that the 
				concerned functions are adequate staffed and the human resources 
				are trained sufficiently to carry out the above. The Operational 
				Risk Group need to incorporate legal risks as part of 
				operational risk framework and take steps to mitigate the risks 
				involved. The legal function within the bank needs to advise the 
				business groups on the legal issues arising out of use of 
				Information Technology.  | 
				
				 This is a 
				necessary step and needs to be endorsed in full  | 
			
			
				| 
				 2  | 
				
				 It is necessary that 
				banks have a robust system of keeping track of the transactions 
				of the nature referred to in PMLA and PMLR and report the same 
				within the prescribed period. Apart from the risk of penalty, 
				this involves reputational risk for such entities.  | 
				
				 A similar 
				provision is already in place under PMLA as well as the Cyber 
				Fraud reporting guideline but the implementation appears to be 
				lacking. In several instances of Phishing there is clear 
				indication of money laundering. However, Banks have not been 
				reporting such frauds. There is need to review the 
				implementation mechanism and also increase the penalties for 
				deviance. Individual officers responsible for deviance should be 
				identified and penalized.  | 
			
			
				| 
				 3  | 
				
				 A cheque in the 
				electronic form has been defined as "a mirror image" of a paper 
				cheque. The expression 'mirror image' is not appropriate. The 
				expression, "mirror image of" may be substituted by the 
				expression, "electronic graphic which looks like" or any other 
				expression that captures the intention adequately  | 
				
				 There are several 
				grey areas in law regarding “Cheques in Electronic Form”. These 
				cannot be corrected except by making some changes to the NI Act. 
				Since RBI has already implemented the truncated cheque system on 
				a pilot basis, there is no problem in introducing the “Cheque in 
				Electronic Form” also with appropriate devices. This requires a 
				separate technical discussion and is outside the current scope 
				of this comment. Suffice it to say that the law as it is can be 
				given effect to and the suggested change is not immediately 
				required and can be deferred.  | 
			
			
				| 
				 4  | 
				
				 The definition of a 
				cheque in electronic form contemplates digital signature with or 
				without biometric signature and asymmetric crypto system. Since 
				the definition was inserted in the year 2002, it is 
				understandable that it has captured only digital signature and 
				asymmetric crypto system dealt with under Section 3 of IT Act, 
				2000. Since IT Act,2000 has been amended in the year 2008 to 
				make provision for electronic signature also, suitable amendment 
				in this regard may be required in NI Act so that electronic 
				signature may be used on cheques in electronic form.  
				   | 
				
				 Extension of what 
				is applicable to Digital Signatures in NI Act to Electronic 
				Signatures is  required. However as of now there is no 
				“Electronic Signature” other than “Digital Signature” in place 
				and hence decision on this can be deferred.  | 
			
			
				| 
				 5  | 
				
				 There is uncertainty 
				with respect to the meaning of a crucial expression such as, 
				'intermediary" as per IT Act 2000 and as amended by IT Amendment 
				Act, 2008. As such, it is necessary, that clarity is brought 
				about by statutory amendment with respect to the meaning of the 
				expression 'intermediary' in so far as banks and financial 
				institutions are concerned.  | 
				
				 From times 
				immemorial Banker Customer relationship consisted of multiple 
				roles such as Debtor-Creditor, Agent-Principal, Bailor-Bailee, 
				Trustee-Beneficiary etc. Similarly Bankers will have the role as 
				“Intermediary” in certain respect and as “Data/Information 
				Owners” in certain other respects. The traditional relationship 
				such as Debtor-Creditor etc continues. 
				Hence there is no 
				“ambiguity” as regards the “Intermediary” definition in ITA 
				2008. The recommendation needs to be ignored.  | 
			
			
				| 
				 6  | 
				
				 A combined reading 
				of Section 2(p) and sub-sections (1) and (2) of Section 3 of IT 
				Act makes it clear that in terms of the Act an electronic record 
				may be authenticated by affixing 'digital signature' and if a 
				party wants to authenticate the electronic record by affixing 
				digital signature, the electronic method or procedure for 
				affixing digital signature shall be asymmetric crypto system and 
				hash function. While authentication of an electronic record by 
				affixing digital signature is optional, the procedure for 
				affixing digital signature, namely, use of asymmetric crypto 
				system and hash function, is mandatory.   | 
				
				 The group seems 
				to lack full clarity on this issue. ITA 2000/8 does not say 
				whether signature for an electronic document is mandatory or 
				optional. It only states that there is a method of 
				authentication that is equivalent to “Signature”. If any other 
				law requires a signature, and it has to be given effect to in 
				electronic form, then only digital signature becomes mandatory. 
				If an electronic document is not digitally signed and if the law 
				accepts oral or unsigned documents then the users of electronic 
				documents can leave the document un-digitally signed. What 
				cannot be done is “Not affixing digital signature to an 
				electronic document and trying to provide legal sanctity to such 
				a document as equivalent to a signed paper document”. 
				If therefore a 
				“Cheque” requires “Signature” in paper form, it requires 
				“Digital Signature” in digital form. If any material instruction 
				from a customer has to be acted upon and in the paper based 
				banking it would have required a signature, such an electronic 
				document requires digital signature (or an approved electronic 
				signature if there is any). 
				RBI should not 
				try to re-draft age old Banking laws just to accommodate the 
				commercial convenience of a few Bankers. This will be 
				ultra-vires the objectives of RBI as a “Regulator of the Banking 
				Systems in India”.  | 
			
			
				| 
				 7  | 
				
				 The question that 
				arises for consideration is whether a party may be bound by the 
				transactions entered into through electronic means (whether 
				through ATMs, Internet or otherwise) though the electronic 
				records in question are not authenticated by using 
				digital/electronic signature. On a reading of Section 65B (1) of 
				Indian Evidence Act, it is clear that electronic records may be 
				proved in courts even though they are not authenticated by using 
				digital or electronic signature if the conditions mentioned 
				therein are satisfied. The difficulty in proving the various 
				conditions set forth in sub- sections (2) and (3) of section 65B 
				of Indian Evidence Act is ameliorated to a great extent by 
				sub-section (4) thereof under which the certificate of a person 
				occupying a responsible official position in relation to the 
				operation of the relevant device or the management of the 
				relevant activities (whichever is appropriate) shall be evidence 
				of any matter stated in the certificate.  | 
				
				 This is another 
				indication that the group has not clearly understood the ITA 
				2008.  Section 65B is not meant to substitute digital signatures 
				for authentication of electronic document. It is a forensic 
				support to make electronic documents admissible in law. There is 
				similarity in Sec 65B provisions and the provisions of the 
				Banker’s Book Evidence Act regarding presentation of evidence. 
				Just because it is admissible to provide a certified copy of an 
				electronic document as an evidence, it is not possible to use it 
				in replacement of signature. It will be like saying that since a 
				third party affidavit is an admissible document for a certain 
				fact, public can present an affidavit stating that so and so 
				order the Bank to make payment of such an such amount to such 
				and such person, get it notarized and present it as a “Cheque”. 
				This 
				recommendation should be ignored.  | 
			
			
				| 
				 8  | 
				
				 Government should 
				specify sufficient number of agencies under section 79A of the 
				Indian Evidence Act to assist courts in arriving at a decision 
				on the evidentiary value of electronic records irrespective of 
				whether digital or electronic signature is affixed or not.
				  | 
				
				 This 
				recommendation should be ignored because of what is stated 
				above. It betrays an erroneous reading of the provisions of ITA 
				2008 by the group.  | 
			
			
				| 
				 9  | 
				
				 Financial 
				transactions such as, operation of bank accounts and credit card
				 
				operations are being 
				carried on by banks in a big way by using cards, pin numbers and 
				passwords, etc. Banks are using many security features to 
				prevent frauds to the extent possible. The proposed 'two factor 
				authentication method' (2F method) is also a step in the same 
				direction. It may not be ideal and practically feasible to 
				insist on using a particular technology for all retail 
				transactions of the customers with their banks.   | 
				
				 The group has not 
				understood the basics of digital signature which is a 
				combination of data confirmation and entity identification.
				 
				2F 
				authentication is a shade ahead of password based authentication 
				but cannot replace the characteristics of a digital signature. 
				If an appropriate 
				2F system is created which satisfies the requirements of Section 
				3A of the ITA 2008, there is no problem in getting it approved 
				as provided in ITA 2008 as one of the new electronic signature 
				method of authentication.  
				Present systems 
				are only adding a mobile based PIN or an RSA token generated 
				random key as the second factor. It is nothing but a double 
				password system and cannot satisfy the legal requirements of a 
				signature. 
				This is a 
				suggestion which is ultra vires the ITA 2000/8. RBI does not 
				have the legal right to validate what is not permitted in law. 
				The suggestion is therefore untenable and has to be summarily 
				rejected. 
				
				If recommended, RBI would create a situation where Banks will be 
				acting illegally under the sanction of RBI. RBI will therefore 
				be legally liable for violations of law.  | 
			
			
				| 
				 10  | 
				
				 As a short term 
				measure it is recommended that Rules may be framed by the 
				Central Government under Section 5 of the Act, to the effect 
				that, with respect to internet or e- banking transactions, 2F 
				method or any other technique of authentication provided by 
				banks and used by the customers shall be valid and binding with 
				respect to such transactions, though 'digital signature' or 
				'electronic signature' is not affixed.  
				   | 
			
			
				| 
				 11  | 
				
				 ISP license 
				restricts the level of encryption for individuals, groups or 
				organizations to a key length of only 40 bits in symmetric key 
				algorithms or equivalents. RBI has stipulated SSL / 128 bit 
				encryption as minimum level of security. SEBI has stipulated 
				64/128 bit encryption for Internet Based Trading and Services. 
				Information Technology (Certifying Authorities) Rules, 2000 
				requires 'internationally proven encryption techniques' to be 
				used for storing passwords. An Encryption Committee constituted 
				by the Central Government under Section 84A of the IT Act, 2000 
				is in the process of formulating Rules with respect to 
				encryption. Allowance for higher encryption strength may be 
				allowed for banks based on recommendations of RBI  | 
				
				 ISP guideline is 
				a direction to ISPs for inter-ISP transactions. It need not be 
				considered as restricting the data encryption which is either 
				before or after transmission of data through an ISP. There 
				should be no difficulty in Banks adopting higher strength 
				encryption if required.  | 
			
			
				| 
				 12  | 
				
				 Section 43A of IT 
				Act deals with the aspect of compensation for failure to protect 
				data. The Central Government has not prescribed the term 
				"sensitive personal data," nor has it prescribed a "standard and 
				reasonable security practice". Until these prescriptions are 
				made, data is afforded security and protection only as may be 
				specified in an agreement between the parties or as may be 
				specified in any law  | 
				
				 The points 12, 
				13, 14 contain only observations which donot require any action 
				from RBI.   
				Point number 15 
				is an erroneous statement since Section 84C of ITA 2008 provides 
				for punishment for “Attempt” to commit an offence. It is 
				surprising that the committee could make such a blatant error. 
				The real 
				intention of the elaborate presentation of points 12 to 15 is 
				betrayed by the recommendation number 16 which suggests that it 
				is necessary to provide “Protection to Banks against any 
				fraudulent or negligent act of customer”. 
				At present any 
				fraudulent act of a customer does not require any separate 
				legislation to protect the Bank. In such cases the customer is a 
				fraudster and should be punished and is being punished. 
				It is necessary 
				to analyze this recommendation along with the presence of a 
				reference to the case of S. Umashankar Vs ICICI Bank where the 
				Bank was held liable to pay compensation to the victim customer 
				in which the status of the case is falsely depicted. 
				It is clear from 
				the circumstances that there is an attempt by one of the 
				participating banks to suggest a new law that exempts it from 
				the liabilities contemplated under ITA 2008. 
				If RBI makes such 
				a suggestion, it would be a fraud on the public and may be 
				opposed as a matter of principle in the appropriate judicial 
				forum. 
				Phishing losses 
				are a matter of serious concern to Bank customers and in most 
				cases there will be one fraudulent customer of the bank cheating 
				another genuine victim of Phishing making use of the insecure 
				information systems and policies used by the Bank. There could 
				be instances where Bank employees are hands in glove with 
				fraudulent customer particularly in opening of accounts with no 
				KYC and complete violation of PMLA provisions. 
				In case Banks are 
				exempted from liability in Phishing as is suggested by the 
				group, it will be a free license to criminal gangs to rob money 
				in the bank belonging to a number of innocent customers. 
				The 
				recommendation should be dismissed since it is an attempt to 
				help criminal customers at the cost of genuine customers.  | 
			
			
				| 
				 13  | 
				
				 Apart from affording 
				protection to personal data ("sensitive personal data'- 43A), 
				The IT Act, 2000 also prescribes civil and criminal liabilities 
				(Section 43 and Section 66 respectively) to any person who 
				without the permission of the owner or any other person who is 
				in charge of a computer, computer system etc., inter alia, 
				downloads, copies or extracts any data or damages or causes to 
				be damaged any computer data base etc. In this context Section 
				72 and 72A of the amended IT Act, 2000 are also of relevance. 
				Section 72 of the Act prescribes the punishment if any person 
				who, in pursuance of the powers conferred under the IT Act, 
				2000, has secured access to any electronic record, information 
				etc and without the consent of the person concerned discloses 
				such information to any other person then he shall be punished 
				with imprisonment upto two years or with fine upto one lakh or 
				with both. Section 72A on the other hand provides the punishment 
				for disclosure by any person, including an intermediary, in 
				breach of lawful contract. The purview of Section 72A is wider 
				than section 72 and extends to disclosure of personal 
				information of a person (without consent) while providing 
				services under a lawful contract and not merely disclosure of 
				information obtained by virtue of 'powers granted under IT Act, 
				2000'.  | 
			
			
				| 
				 14  | 
				
				 The IT Act, 2000 as 
				amended, exposes the banks to both civil and criminal liability. 
				The civil liability could consist of exposure to pay damages by 
				way of compensation upto Rs 5 crore under the amended 
				Information Technology Act before the Adjudicating Officer and 
				beyond   Rs five crore in a court of competent jurisdiction.
				 
				There could also be 
				exposure to criminal liability to the top management of the 
				banks given the provisions of Chapter XI of the amended 
				Information Technology Act. Further, various computer related 
				offences are enumerated in the various provisions.   | 
			
			
				| 
				 15  | 
				
				 Of late there have 
				been many instances of 'phishing' in the banking industry 
				whereby posing a major threat to customers availing internet 
				banking facilities. Though Section 66D of the amended IT Act 
				could broadly be said to cover the offence of phishing, attempt 
				to commit the act of phishing is not made punishable. It is 
				suggested that there is a need to specifically provide for 
				punishment for attempt to phish as well in order to deter 
				persons from attempting it.  | 
			
			
				| 
				 16  | 
				
				  It is necessary to 
				balance the interests of customers and that of banks and provide 
				protection to banks against any fraudulent or negligent act of 
				customer. It is not appropriate to leave such an important issue 
				to be dealt with in documentation. Appropriate statutory 
				provision needs to be enacted in this regard.   | 
			
			
				| 
				 17  | 
				
				 Whether Section 43A 
				read with Section 72 and 72A of the IT Act, 2000 presently 
				address the issue of data protection adequately or they need to 
				be duly supplemented by long-term provisions which can help 
				facilitate effective and efficient protection and preservation 
				of data would depend on the prescriptions of the Central 
				Government. Various suggestions have been offered in this report 
				to address issues in this regard.  | 
				
				 This is an 
				observation which appears to have been inserted only to divert 
				the attention of the public from the fraudulent suggestion made 
				in the earlier paragraphs. 
				
				Even now Banks do follow the principle of secrecy regarding 
				customer information. Such secrecy is breached only in the 
				instance of police inquiry or judicial orders. 
				 
				
				Effect of 43A etc could affect Banks giving away customer 
				details to their insurance partners  and provide a remedy 
				to the victim.  | 
			
			
				| 
				 18  | 
				
				 In India though 
				there is no specific legislation which deals only with 
				'electronic fund transfer' and which is consumer protection 
				driven, certain concerns have been dealt with in the Payment and 
				Settlement Systems Act, Rules, Regulations, directions etc 
				issued there under as well as the provisions of general law. 
				However, it may be apposite to have some provisions similar to 
				those in EFT Act which exempts the bank from liability in the 
				event of fraud by the customer or a technical failure etc (for 
				example, provisions dealing with 'unauthorized electronic fund 
				transfers' and consumers liability for unauthorized transfers).  | 
				
				 RBI must 
				recognize that it is a “Regulator” of the Banking system in the 
				interest of the economy and the citizens of India. RBI is not a 
				“Promoter of Banks”.  
				There is therefore no  need to 
				suggest introduction of provisions that exempt Banks from liabilities which 
				arise because of the general law of the land. 
				If a similar 
				approach is taken by other regulators and each industry 
				sector attempts to protect its members, then SEBI can protect 
				share brokers from online frauds, TRAI can protect telecom 
				operators from telecom frauds. Ultimately the suffering 
				customers will be left to fight it out with the fraudulent 
				customers while the establishments will keep making commercial 
				gains at the cost of public. 
				If an attempt is 
				made by RBI to introduce or recommend any provisions that 
				provides immunity to Bankers against the liabilities they face 
				in laws such as ITA 2008 or IPC, RBI will be open to the charge 
				of acting against its constitutional obligations and the 
				officials responsible for such recommendations could be open to 
				be charged with malicious intentions.  | 
			
		
		It is recommended that 
		RBI should not take any action that is aimed at protecting the banks 
		against the interests of genuine customers who are being exposed to 
		technology risks because Banks have been using untested technology and 
		restricting their security efforts to what is "Commercially viable". 
		Some of the recommendations appear to be motivated by an intention to 
		provide uncalled for legal immunity to erring Bankers causing loss to 
		public and such recommendations should be recognized and rejected.
		Digital Signature as a 
		means of authentication of an electronic document is the law of the land.  With the 
		amendments in ITA 2008 there is a possibility of variants of "Electronic 
		Signature" coming into place. RBI cannot therefore take any stand to 
		endorse 2F authentication as even a temporary substitute measure.
		Vicarious liabilities to 
		officials of Banks for lack of "Due Diligence" is also part of the 
		common law and RBI cannot interefere in the operation of law through its 
		administrative guidelines.  
		The S.R Mittal Group had 
		made the correct suggestion that Banks should bear legal risk for not 
		using the legally approved form of authentication and obtain insurance to cover 
		the losses arising out of hacking etc crimes. 
		The need for insurance should be 
		further extended even to losses arising out of failure of technology. 
		Such insurance should be 
		at the cost of the Bank and not at the cost of the customer. In certain 
		cases in Credit Card business, Banks are asking Customers to obtain 
		insurance against encashment of lost credit cards. Banks should avoid 
		passing on costs of such insurance to the customers. 
		The only 
		instance where a customer should take the liability is when he himself 
		is part of the fraud. It is open to the Banks to charge any of their 
		Phishing victims as fraudsters if they so desire and try to prove it in 
		the Court of law and also face defamation charges if their charge is not 
		founded on sound reasons.
		RBI should mandate that 
		the annual report of every bank should contain a paragraph where the 
		directors report on the Legal Compliance measures taken by the Bank in 
		their Electronic Banking divisions.
		RBI should conduct a 
		special investigations of Banks particularly in Mumbai, Pune and Delhi 
		from where frequent instances of Phishing beneficiaries opening accounts with Banks in total disregard of KYC norms 
		are occuring. According to 
		Police intelligence reports there are organized gangs of criminals 
		operating in these places who hire hackers to steal Bank customer's 
		passwords and organize Phishing attacks. There have even been instances 
		where a gang appears to have organized a Phishing attack so that one of 
		their debtors could get a huge amount through Phishing and then hand it 
		over to them. Many of these fraudster's accounts have been maintained 
		for years and repeatedly used for encashing fraud benefits  when 
		the recent Phishing cases were filed without the Bank discovering the 
		fraudulent use. There have been many instances 
		where zero balance accounts received a few lakhs of rupees in internet 
		transfer during the midnight and the person withdrew the amount in the 
		morning through cash at the counters. Such instances have to be 
		interpreted as a collusion of the bank employees and cannot be dismissed 
		as mere negligence.
		RBI should also review 
		the banking software being used and the Risk Analysis capabilities of 
		such software so that IT Companies donot get away supplying non cyber 
		law compliant software with inadequate security.
		Banks are often driving 
		their phishing customers to file police complaints and take their own 
		action against ultimate beneficiaries. Though RBI has issued clear 
		directions to the Banks to file police complaints whenever frauds take 
		place, Banks have not been doing so. Banks should be penalized if they 
		push customers to file their own private complaints for frauds that 
		occur within the Bank unless the customer wants to file the Police 
		complaint against the Bank officials.
		Top management in most 
		Banks are ignorant of the provisions of ITA 2008 and all Directors of 
		the Banks including the Chairman and Executive Directors should be 
		suitably educated by RBI. It is reasonable to expect that the heads of 
		Banks which want to do digital banking must be aware of the laws of 
		Digital Banking. Before appointing any person as Chairman or Executive 
		Director of a Bank, RBI should take care that his or her knowledge of 
		Digital Banking laws is adequate to meet the responsibilities.
		RBI cannot be oblivious 
		to such instances and has to work out a suitable fraud management structure along with 
		the Police to double check the credentials of the customers in Banks and 
		make Banks liable for violation of KYC both at the time of opening of 
		the account as well as monitoring suspicious transactions in the 
		accounts any time later.