Laws & Online abuse Flashcards
What are the already existing laws in IPC related to this?
criminalises speech that is obscene, defamatory, that insults the modesty of women and intrudes upon her privacy. It punishes anonymous criminal intimidation, it punishes voyeurism, it punishes digitally enabled stalking, hate speech, and even non-consensual sharing of sexual images online.
What is Information Technology Act of 2000?
- enacted to give legal sanction to electronic commerce and electronic transactions, to enable e-governance, and also to prevent cybercrime.
- Under this law, for any crime involving a computer or a network located in India, foreign nationals can also be charged.
The law prescribes penalties for various cybercrimes and fraud through digital/electronic format.
It also gives legal recognition to digital signatures.
The IT Act also amended certain provisions of the Indian Penal Code (IPC), the Banker’s Book Evidence Act, 1891, the Indian Evidence Act, 1872 and the Reserve Bank of India Act, 1934 to modify these laws to make them compliant with new digital technologies.
In the wake of the recent Indo-China border clash, the Government of India banned various Chinese apps under the Information Technology Act.
What are the obligations on intermediaries placed by IT act,2000?
they have to take down content on a request by the government or a court order. This obligation is actually very broadly worded — any information that is grossly
harmful, harassing, blasphemous, defamatory, obscene, pornographic, paedophilic, libellous, invasive of another’s privacy, hateful, or racially or ethnically objectionable, disparaging, etc
What is IT Act – 2008 Amendments?
The IT Act, 2000 was amended in 2008. This amendment introduced the controversial Section 66A into the Act.
Section 66A
Section 66A gave authorities the power to arrest anyone accused of posting content on social media that could be deemed ‘offensive’.
This amendment was passed in the Parliament without any debate.
As per the said section, a person could be convicted if proved on the charges of sending any ‘information that is grossly offensive or has menacing character’.
It also made it an offence to send any information that the sender knows to be false, but for the purpose of annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill-will, through a computer or electronic device.
The penalty prescribed for the above was up to three years’ imprisonment with fine.
Why was section 66A struck down?
The Supreme Court, however, in 2015, struck down this section of the IT Act saying it was unconstitutional as it violated Article 19(1)(a) of the Constitution. This was in the famous Shreya Singhal v Union of India case (2015).
-This was in the famous Shreya Singhal v Union of India case (2015).
What is section Section 69A of the IT Act.?
Section 69A empowers the authorities to intercept, monitor or decrypt any information generated, transmitted, received or stored in any computer resource if it is necessary or expedient to do so in the interest of the sovereignty or integrity of India, defense of India, the security of the State, friendly relations with foreign states or public order or for preventing incitement to the commission of any cognizable offence or for investigation of any offence.
It also empowers the government to block internet sites in the interests of the nation. The law also contained the procedural safeguards for blocking any site.
When parties opposed to the section stated that this section violated the right to privacy, the Supreme Court contended that national security is above individual privacy. The apex court upheld the constitutional validity of the section. Also read about privacy laws and India.
The recent banning of certain Chinese Apps was done citing provisions under Section 69A of the IT Act.
Note:- The Indian Telegraph Act, 1885 allows the government to tap phones. However, a 1996 SC judgement allows tapping of phones only during a ‘public emergency’. Section 69A does not impose any public emergency restriction for the government.
What is Information Technology Intermediary Guidelines (Amendment) Rules, 2018?
The Rules have been framed under Section 79 of the Information Technology Act. This section covers intermediary liability.
Section 79(2)(c) of the Act states that intermediaries must observe due diligence while discharging their duties, and also observe such other guidelines as prescribed by the Central Government.
Online Intermediaries:
An intermediary is a service that facilitates people to use the Internet, such as Internet Services Providers (ISPs), search engines and social media platforms.
There are two categories of intermediaries:
Conduits: Technical providers of internet access or transmission services.
Hosts: Providers of content services (online platforms, storage services).
Information Technology Intermediary Guidelines (Amendment) Rules were first released in 2011 and in 2018, the government made certain changes to those rules.
In 2018, there was a rise in the number of mob lynchings spurred by fake news & rumours and messages circulated on social media platforms like Whatsapp.
To curb this, the government proposed stringent changes to Section 79 of the IT Act.
What do the Rules say?
According to the 2018 Rules, social media intermediaries should publish rules and privacy policy to curb users from engaging in online material which is paedophilic, pornographic, hateful, racially and ethnically objectionable, invasive of privacy, etc.
The 2018 Rules further provide that whenever an order is issued by the government agencies seeking information or assistance concerning cybersecurity, then the intermediaries must provide them the same within 72 hours.
The Rules make it obligatory for online intermediaries to appoint a ‘Nodal person of Contact’ for 24X7 coordination with law enforcement agencies and officers to ensure compliance.
The intermediaries are also required to deploy such technologies based on automated tools and appropriate mechanisms for the purpose of identifying or removing or disabling access to unlawful information.
The changes will also require online platforms to break end-to-end encryption in order to ascertain the origin of messages.
Online Intermediaries are required to remove or disable access to unlawful content within 24 hours. They should also preserve such records for a minimum period of 180 days for the purpose of investigations.