Professional Documents
Culture Documents
Submitted By:
SUMAIYA DALAL 68
RAHUL MAHABARE88
HIMSHREE SHELAR 105
PRASHANT SONI 108
DEEPAK SUPAL 109
ACKNOWLEDGEMENT
We express our sincere thanks to Professor Dhongare, for his constant encouragement
and support throughout our course, especially for the useful suggestions regarding
this report. He has been a perfect mentor and guide to give us immense
knowledge and understanding for the subject, Personnel Law and Management.
The project has not only given intense knowledge about the subject but also
taught us, its practical implications.
3
COMMONWEALTH GAMES:
GAMES OR SHAME?
CONTENTS
The opening and closing ceremonies were held at the Jawaharlal Nehru Stadium,
the main stadium of the event. It was the first time that the Commonwealth Games
were held in India and the second time it was held in Asia after Kuala Lumpur,
Malaysia in 1998. The official mascot of the Games was Shera and the official song of
the Games, "Jiyo Utho Bado Jeeto", was composed by celebrated Indian musician A.R.
Rahman.
Initially, several concerns and controversies surfaced before the start of the
Games. Despite these concerns, all member nations of the Commonwealth of Nations
participated in the event, except Fiji, which is suspended from the Commonwealth,
and Tokelau, which didn't send a team. A widely-praised opening ceremony helped
improve the image of the Games. The concerns raised during the buildup to the
Games proved largely unfounded as most events progressed smoothly.
The opening ceremony played a key role in improving the image of the Games.
As athletes arrived and competitions started, many earlier critics changed their view.
The Australian Sports Minister said that India could now aim for the Olympics, and the
President of the International Olympic Committee, Jacques Rogge, said that India had
made a good foundation for a future Olympics bid. As the Games concluded, many
observers remarked that they began on an apprehensive note, but were an
exceptional experience with a largely positive ending. Some observers accused
sections of the media of bias, unfair expectations, and negative reporting. The final
medal tally was led by Australia. The host nation India gave its strongest performance
yet to emerge second, while England placed third.
5
Scam Exposed:
6
India’s successful bid to host the 19th Commonwealth Games in October 2010
seems like the South Asian giant’s chance to showcase its growth and progress.
Additionally, coming on the heels of China’s triumph with the Beijing Olympics in
2008, anything less than a successful event would be an embarrassment for India.
However, preparations for the Commonwealth Games appear to have been blighted
by delays and allegations of corruption and inefficiency. Thus, what was supposed to
signify India’s arrival on the world stage now appears to typify the problems of
governance in India, in terms of both policy-making and implementation.
Unfortunately, preparations for the games have been riddled with delays in the
construction of event venues and related infrastructure. In September 2009, a
government report found that ‘work on 13 out of the 19 sports venues were behind
schedule’. At the same time, the Commonwealth Games Federation chief, Mike
Fennell, warned that India was behind schedule in its preparations. In a letter to the
Indian organizing committee, Fennel said that it was ‘reasonable to conclude that the
current situation posed a serious risk to the Commonwealth Games in 2010’. This
warning is said to have caused alarm among Indian ministers who regard the Delhi
Commonwealth Games as a “coming of age” party to herald the arrival of India as a
major power... its failure would be regarded as a national humiliation’.
7
While these warnings seem to have sped up construction, there still appear to
be delays in meeting deadlines. Reports indicate that at the end of May 2010, with
around four months to go, work on the Jawaharlal Nehru Stadium (the main stadium),
the swimming pool and other venues was still overdue. Other games-related
infrastructure, like roads, bridges and hotels were also behind time. Additionally, the
promise to generate surplus power by 2010 in readiness for the CWG has also fallen
by the wayside with daily power cuts in Delhi. Hence, for many national and
international observers, what was supposed to symbolize India’s triumphant
ascendance to the world stage has now come to epitomize the problems of
governance in India, in terms of both policy-making and implementation.
8
Another problem that has exacerbated matters and arguably also contributed to
the opportunities available for corruption is the lack of communication and
cooperation amongst the various committees and agencies involved in the
preparations for the games. As mentioned above, Delhi’s chief minister has often
found central government agencies like DDA, the police and the Municipal Corporation
of Delhi (MCD) uncooperative. This plays out on a more ‘micro’ level as well.
According to Randhir Singh, secretary-general of the IOA, the chairmen of the 23
organizing committees ‘hardly ever meet’. He also said that the committees needed
to be run more ‘professionally’. Moreover, various complaints about discrepancies in
the work under the purview of agencies like the DDA, New Delhi Municipal
Corporation, MCD and the Central
10
Public Works Development has lead to the CVC to post vigilance officials at the
agencies to ‘double check’ procurement and other procedures. The organizing
committees have also been blighted by much in-fighting and lack of cooperation. In
one such incident, Goel, who claimed to have been expelled from the CWG Organizing
Committee, said the chairman of the committee, Suresh Kalmadi, was a ‘short-
tempered’, ‘autocratic’ and ‘arrogant’ man, and also accused him of ‘rampant
corruption’. On another occasion, a tussle between Kalmadi, who is also president of
the IAO and Union Minister of Youth Affairs and Sports, M. S. Gill over the tenure
duration of sports officials, also, arguably, distracted attention and effort away from
the CWG.
11
These delays and accusations also highlight the challenges faced by the central
government in implementing policy. Given the sometimes uneasy relations India has
had with China, their concurrent economic rise and the resultant competitiveness
between the two, India’s success in hosting the CWG is seen as a major foreign policy
goal, especially in light of China’s success with the Olympics. However, despite
assurances (and undoubted effort) by Prime Minister Manmohan Singh and the second
United Progressive Alliance (UPA-II) government, clearly, major projects are still behind
time. According to a Hindustan Times report, with around a 100 days left to the start
of the games, there are some areas of concern remain, including insufficient rooms to
house the visitors expected for the games; the completion of roads, flyovers and
bridges; and the completion of the parking facilities at the main stadium and other
venues. Only the Delhi Metro projects have been completed ahead of schedule.
Certainly, the challenges to and problems of governance in India are well
documented. And given that India has not hosted a major sporting event since 1982,
it is not surprising that it has had some ‘teething problems’. Also, as India is a
democracy with a robust press and civil society, it is not surprising that inter-agency
disagreements, allegations of corruption and other problems have played out publicly
in a fashion that may not be so apparent in other polities. However, in the midst of the
chaos surrounding the CWG, it appears that preparations have accelerated
significantly. As mentioned above, the metro projects were completed ahead of time.
Also, while the main stadium is still not ready, latest reports indicate that a ‘majority
of the stadia have been inaugurated’ and the new Terminal 3 at the Indira Gandhi
Airport is expected to be ready by 3 July 2010. Indeed, in early January 2010 there had
been fears that the revamped Major Dhyanchand National Stadium – which is also a
venue for the CWG – would not be ready for the Hockey World Cup held in February
2010.33 Despite these fears, the stadium was reopened, refurbishments completed,
just later that month. Hence, it would appear that the authorities in India have a steep
learning curve. Moreover, with all eyes on India, the central government certainly has
sufficient motivation to ensure the realization of all projects in time for the Games.
While it remains to be seen whether it will achieve this goal, the preparations (or lack
thereof) for the CWG highlight the systemic challenges India faces in terms of policy
implementation. The overlap in authority, the lack of communication and coordination
between agencies and the opportunities for corruption, and the subsequent
squandering of funds and incompetence are problems all major projects in India are
afflicted with. Nonetheless, since the government failed to complete all projects and
12
successfully host the CWG; it would be safe to say that India, like China, failed have
effectively announced its arrival on the world stage. The day after the conclusion of
the Games, the Indian Government announced the formation of a special investigation
committee to probe the allegations of corruption and mismanagement that had
marred the buildup to the Games.
A major scam hit the Commonwealth Games with allegations being made that a
substantial sum of money was transferred to a little known U.K. company from the
Games Organizing Committee (OC) about which the British government has raised
questions. Television channels reported that over £ 4.50 lakhs were transferred
through a British bank to the A M Films company, said to be a one man show and
which was also receiving £ 25,000 a month. ‘Times Now' quoted documents to show
that the entire deal came to light when the OC asked for a VAT refund of £ 14,000 in
March 2010 for the payments made to the British company. The channel quoted a
letter of the British Revenue and Customs Department to the Indian High Commission
stating that there was no written contract between the CWG and A M Films and that
no tendering procedure had been followed and there was no paper work regarding the
contract. The OC is reported to have made a payment of nearly £2.5 lakhs for video
equipment purchase while A M Films had claimed that it provided services of car hire,
makeshift toilets, barriers and electricity. In Delhi, Cabinet Secretary K.M.
Chandrashekhar has conveyed concern over the charges as well as delay in
preparations to the OC of the mega sporting event in October 2010. Mr.
Chandrashekhar held a review meeting in 2010. It was attended by secretaries of
agencies concerned, including officials of the OC, and Ministries of Youth and Sports,
Urban Development, and Tourism. His remarks come close on the heels of the Central
Vigilance Commission asking its officers to re-examine all the tenders and
procurement process related to the projects. Enforcement Directorate sources in Delhi
said the agency was probing the issue. The company was involved in the
arrangements for the Queen's Baton Relay when it started its journey from London
with a function outside the Buckingham Palace. Late in the night, the OC refuted the
allegations about financial irregularities with relation to the launch of the QBR in
London on October 29 2009. The British authorities have sought to know details of
how A M Films which supplied cars for rentals was involved in supply of video
equipment and providing consultancy for costume designing.
13
A) Financial costs
Azim Premji, founder of Wipro Technologies, remarked that India faced several
socio-economic challenges and "to instead spend on a grand sporting spectacle
sounds like we [India] have got our priorities wrong." Miloon Kothari, a leading Indian
expert on socio-economic development, remarked that the 2010 Commonwealth
Games will create "a negative financial legacy for the country" and asked "when one
in three Indians lives below the poverty line and 40% of the hungry live in India, when
46% of India's children and 55% of women are malnourished, does spending billions of
dollars on a 12-day sports event build national pride or is it a matter of national
shame?" One of the outspoken critics of the Games is Mani Shankar Aiyar, former
Indian Minister for Youth Affairs and Sports. In April 2007, Aiyar commented that the
Games are "irrelevant to the common man" and criticized the Indian government for
sanctioning billions of dollars for the Games even though India requires massive
investment in social development programs. In July 2010, he remarked that he would
be "unhappy if the Commonwealth Games are successful".
There has been a boom in the number of young girls, mostly from impoverished
parts of India, coming to Delhi after being offered jobs by disguised criminals, only to
be taken prisoner and forced into sex slavery. The number of victims is believed to be
in the hundreds. Many brothels have been running English courses for sex workers
and upgrading their facilities in anticipation of a business upturn during the games.
Overseas prostitutes are also expected to come as tourists and ply their trade. One
anti-trafficking NGO has claimed that there are reports of 40,000 women being
brought in from northeastern India alone. A spokesperson said that recruits from that
part of India were favoured because of their lighter skin. It has been reported that
over 3,000 bar girls in Mumbai have stopped going to work; this has been blamed on
an exodus to Delhi for the Commonwealth Games.
African countries have complained that they are getting second-class treatment
from the Games organizers, in spite of them offering India a hand in the preparation of
the Games. They have alleged that accommodation given to them was inferior
compared to the accommodation provided to the Australian and New Zealand teams.
They went on to state that India was complaining about being victims of racial bias in
the reporting of the Games; while simultaneously perpetrating the same kind of
racism against the African countries.
CONTENTS
2. Definitions Page 16
8. Offences Page 36
The Information Technology Act, 2000 seeks to achieve the following objects:
4. To foster use and acceptance of electronic records and digital Signatures in the
Government offices and its agencies
5. To prevent the possible misuse arising out of transactions and oilier dealings
concluded over the electronic medium.
7. To deal with civil and criminal liabilities arising out of contravention of the
provisions of the law.
8. To provide for necessary changes in the various provisions, which deal with offences
relating to documents and paper-based transactions.
9. To facilitate electronic fund transfers between the financial institutions and banks.
10.To give legal sanctity for books of account maintained in the electronic form by the
banks.
e. Any contract for the sale or conveyance of immovable property or any interest in
such property
Definitions:
20
computer system or computer network, and may be in any form (including computer
printouts magnetic or optical storage media, punched cards, punched tapes) or
stored Internally in the memory of the computer.
Key pair: In an asymmetric crypto system, ‘key pair’ means a private key and its
mathematically-related public key, which are so related that the public key can verify
a digital signature created by the private key. [Sec. 2(l)(x)].
Private key: It means the key of a key pair used to create a digital signature.
[Sec. 2(l)(zc)].
Public key: It means the key of a key pair used to verify a digital signature and
listed in the Digital Signature Certificate. [Sec. 2(l)(zd)J.
Digital Signature:
Second, the identity of the person affixing the digital signature is authenticated
through the use of a private key which attaches itself to the message digest and
which can be verified by any person who has the public key corresponding to such
private key.
This will enable any person to verify whether the electronic record is retained
intact or has been tampered with. Any subscriber may authenticate an electronic
record by affixing his digital signature. The authentication of the electronic record
shall be effected by the use of asymmetric crypto system and hash function which
envelop and transform the initial electronic record into another electronic record. Any
person by the use of a public key of the subscriber can verify the electronic record.
The private key and the public key are unique to the subscriber and constitute a
functioning key pair.
Electronic Governance:
25
Where any law provides that information or any other matter shall be in writing
or in the typewritten or printed form, then such requirement shall be deemed to have
been satisfied if such information or matter is—
Where any law provides that information or any other matter shall be
authenticated by affixing the signature or any document shall be signed or bear the
signature of any person then, such requirement shall be deemed to have been
satisfied, if such information or matter is authenticated by means of digital signature
affixed in such manner as may be prescribed by the Central Government.
Where any law provides for (a) the filling of any form, application or any other
document (b) the issue or grant of any licence, permit, sanction or approval (c) the
receipt or payment of money in a particular manner, such requirement shall be
deemed to have been satisfied if such filling, issue, grant, receipt or payment, as the
case may be, is effected by means of such electronic form as may be prescribed by
the appropriate government.
(b) the electronic record is retained in the format in which it was originally generated,
sent or received or in a format which can be demonstrated to represent accurately
the information originally generated, sent or received;
26
(c) the details which will facilitate the identification of the origin, destination, date and
time of despatch or receipt of such electronic record are available in the electronic
record.
Any rule, regulation; order, bye-law, notification or any other matter shall be
published in the Official Gazette or Electronic Gazette, if it is so required by law and
the date of publication shall be deemed to be the date of the Gazette in which it was
first published.
(b) the manner and format in which the digital signature shall be affixed,
(c) the manner or procedure which facilitates identification of the person affixing the
digital signature;
(e) any other matter which is necessary to give legal effect fo digital
signatures.
(b) by a person who had the authority to act on behalf of the originator in respect of
that electronic record; or
Where the originator has not agreed with the addressee that the
acknowledgement of receipt of electronic record be given in a particular form or by a
particular method, an acknowledgement may be given by:
(b) any conduct of the addressee, sufficient to indicate to the originator that the
electronic record has been received.
Where the originator has stipulated that the electronic record shall be binding
only on receipt of an acknowledgement, then if acknowledgement has not been so
received the electronic record shall be deemed to have not been sent by the
originator. Where the originator has not stipulated, such acknowledgement, and the
acknowledgement has not been received, then the originator may give notice to the
addressee specifying a reasonable time by which the acknowledgement must be
received. If no acknowledgement is received within the aforesaid time he may after
giving notice to the addressee, treat the electronic record as though it has never been
sent.
(1) The despatch of an electronic record occurs when it enters a computer resource
outside the control of the originator.
(a) if the addressee has designated a computer resource for the purpose of receiving
electronic records,
(i) receipt occurs at the time when the electronic record enters the designated
computer resource, or
(ii) if the electronic record is sent to a computer resource of the addressee that is not
the designated computer resource, receipt occurs at the time when the electronic
record is retrieved by the addressee;
(b) if the addressee has not designated a computer resource along with specified
timings, receipt occurs when the electronic record enters the computing resource
of the addressee.
(3) An electronic record is deemed to be despatched from the place of business of the
originator. The electronic record is deemed to be received at the place where the
addressee has his place of business.
If the originator or the addressee has more than one place of business the
principal place of business, shall be the place of business, if the originator or the
addressee does not, have a place of business, his usual place of residence shall be
deemed to be the place of business;
28
(c) created in a manner or using a means under the exclusive control of the subscriber
(d) linked to the electronic record to which it relates in such a manner that if the
electronic record was altered the digital signature would be invalidated.
While prescribing rules for the security procedure, the Central Government shall
have regard to commercial circumstances prevailing at the time when the procedure
was used, including:
(b) the level of sophistication of the parties with reference to their technological
capacity-
(f) the procedures in general use for similar types of transactions or communications.
29
Certifying Authority is a person who has been granted a licence to issue a digital
signature. The certifying authorities are under the supervision of Controller of
Certifying Authorities including Deputy Controllers and Assistant Controllers.
(1) The Central Government may, by notification in the Official Gazette appoint a
Controller of Certifying Authorities and such number of Deputy Controllers and
Assistant Controllers as it deems fit.
(2) The Controller shall discharge his functions subject to the general control and
directions of the Central Government while the Deputy Controllers and Assistant
Controllers shall perform the functions assigned to them by the Controller.
(3) The Controller may, in writing, authorise the Deputy Controller, Assistant Controller
or any officer to exercise any of his powers (Sec. 27)
(4) There shall be a seal of the Office of the Controller (Sec. 17 (b)J.
specifying the conditions subject to which the Certifying Authorities shall conduct their
business;
30
specifying the contents of written, printed or visual materials and advertisements that
may be distributed or used in respect of a Digital Signature Certificate and the
public key
specifying the form and content of a Digital Signature Certificate and the key;
specifying the form and manner in which accounts shall be maintained by the
Certifying Authorities;
specifying the terms and conditions subject to which auditors may be appointed and
the remuneration to be paid to them;
specifying the manner in which the certifying Authorities shall conduct their dealings
with the subscribers;
resolving any conflict of interests between the Certifying Authorities and the
subscribers;
(b) provide a reasonable level of reliability in its services which are reasonably suited
to the performance of intended functions,
(c) adhere to security procedures to ensure that the secrecy and privacy of the digital
signatures are assured;
The controller may with the previous approval of the Central Government, and
by notification in the Official Gazette, recognize any Foreign Certifying Authority as a
Certifying Authority for the purposes of this Act Where any such Certifying Authority is
recognized, the Digital Signature Certificate issued by such Certifying Authority shall
be valid for the purposes of this Act.
31
Any person can make an application, to the Controller, for a licence to issue
Digital Signature Certificates. No licence shall be issued to such applicants unless the
applicants fulfill such requirements with respect to qualification expertise, manpower,
financial resources and other infrastructure facilities, which are necessary to issue
Digital Signature Certificates as may be prescribed by the Central Government. A
licence granted under this section shall:
(a) be valid for such period as may be prescribed by the Central Government;
(c) be subject to such terms and conditions as may be specified by the regulations.
(1) Every application for the issue of a licence shall be in such form as maybe
prescribed by the Central Government
(i) The controller may revoke the licence, if he is satisfied after making such
inquiry, as he may think fit, that a Certifying Authority has,
32
(a) made an incorrect or false statement in the application for the issue or renewal of
the licence.
(b) failed to comply with the terms and conditions subject to which the licence was
granted;
(d) contravened any provisions of this Act, rule, regulation or order made there under.
However, no licence shall be revoked unless the Certifying Authority has been given a
reasonable opportunity of showing cause against the proposed revocation.
(ii) The controller may, if he has reasonable cause tc believe that there is any
ground for revoking a licence, by order suspend such licence pending the completion
of any inquiry ordered by him; However no licence shall be suspended for a period
exceeding ten days unless the Certifying Authority has been given a reasonable
opportunity of showing cause against the proposed suspension.
(iii) No Certifying Authority whose licence has been suspended shall issue any
Digital Signature Certificate during such suspension.
Every Certifying Authority shall display its licence at a conspicuous place of the
premises in which it carries on its business.
Disclosure
(a) its Digital Signature Certificate which contains the public, key corresponding to the
private key used by that Certifying Authority to digitally sign another Digital
Signature Certificate
(c) any other fact that materially and adversely affects the reliability of a Digital
Signature Certificate.
Any person may make an application to the Certifying Authority for the issue of
a Digital Signature Certificate in such form as may be prescribed. Every such
application shall be accompanied. by such fee (not exceeding twenty-five thousand
rupees) as may be prescribed by the Central Government, to be paid to the Certifying
Authority. However, different fees may be prescribed for different classes of
applicants.
(a) the applicant holds the private key corresponding, to the public key to be listed in
the Digital Signature Certificate;
(b) the applicant holds a private key, which is capable of creating a digital signature,
(c) the public key to be listed in the certificate can be used to verify a digital signature
affixed by the private key held by the applicant; However, no application shall be
rejected unless the applicant has been given a reasonable opportunity of showing
cause against the proposed rejection.
(a) it has complied with the provisions of this Act and the rules and regulations made
there under;
34
(b) it has published the Digital Signature Certificate or made it available to such
person relying on it and the subscriber has accepted it.
(c) the subscriber holds the private key corresponding to the public key, listed in the
Digital Signature Certificate;
(d) the subscriber’s public key and private key constitute a functioning key pair,
(e) the information contained in the Digital Signature Certificate is accurate, and true.
The Certifying Authority which has issued a Digital Signature Certificate may
suspend such Certificate:
on receipt of a request to that effect from the subscriber or any person authorized by
him.
A digital Certificate shall not be suspended for a period exceeding fifteen days unless
the subscriber has been given an opportunity of being heard in this matter.
a material fact represented in the Digital Signature Certificate is false or has been
concealed; a requirement for issuance of the Digital Signature Certificate was not
satisfied; the Certifying Authority’s private key or security system was
compromised in a manner materially affecting the Digital Signature Certificate’s
reliability; the subscriber has been declared insolvent or dead or where a
subscriber is a firm or a company, which has been dissolved, wound up or
otherwise ceased to exist.
35
A Digital Signature Certificate shall not be revoked unless the subscriber has
been given an opportunity of being heard in the matter. The Certifying authority shall
communicate, the revocation to the subscriber. Where a Digital Signature Certificate is
suspended or revoked, the Certifying Authority shall publish a notice of such
suspension or revocation [Sec. 39].
36
Duties Of Subscribers:
Where the public key of any Digital Signature Certificate corresponds to the
private key of that subscriber which is to be listed in the Digital Signature Certificate
has been accepted by the subscriber, then the subscriber shall generate the key pair
by applying the security procedure [Sec. 40]. While accepting a Digital Signature
Certificate, a subscriber shall publish or authorise the publication of a Digital
Signature Certificate. By accepting a Digital Signature Certificate the subscriber
certifies to all who reasonably rely on the information contained in the Digital
Signature Certificate that:
the subscriber holds the private key corresponding to the public key listed in the
Digital Signature Certificate and is entitled to hold the same
all representations made by the subscriber to the Certifying Authority and all material
relevant to the information contained in the Digital Signature Certificate are true;
all information in the Digital Signature Certificate that is within the knowledge of the
subscriber is true [Sec. 41(2)].
Every subscriber shall exercise reasonable care to retain control of the private
key corresponding to the public key and take all steps to prevent its disclosure to a
person not authorized to affix the Digital Signature of the subscriber. If the key has
been compromised, then the subscriber shall communicate the same without any
delay to the Certifying Authority [Sec. 42]
37
If any person without permission of the owner or any other person who is in
charge of a computer, computer system or computer network:
denies or causes the denial of access to any person authorised to access any
computer or computer system or computer network by any means;
If any person who is required under this Act or any rule or regulations made
there under to-
38
File any return or furnish any information, books or other documents, within the
time specified therefore in the regulations fails to file return or furnish the same within
the time specified therefore in the regulations, he shall be liable to a penalty not
exceeding five thousand rupees for everyday during which such failure continues;
Maintain books of account or records fail to maintain the same, he shall be liable
to a penalty not exceeding ten thousand rupees for every day during which the failure
continues.
Whoever contravenes any rules or regulations made under this Act, for the
contravention of which no penalty has been separately provided, shall be liable to pay
a compensation not exceeding twenty five thousand rupees to the person affected by
such contravention.
The adjudicating officer if on inquiry, satisfied that the person has committed
the contravention, he may impose such penalty or award such compensation as he
thinks fit
Provided that such sum shall not, in any case, exceed the maximum amount of
the penalty which may be imposed under this Act for the contravention so
compounded
Nothing in above shall apply to a person who commits the same or similar
contravention within a period of three years from the date on which the, first
contravention, committed by him, was compounded.
Offences:
Whoever with the intent, to cause or knowing that he is likely to cause wrongful
loss, or damage to the public or any person destroys or deletes or alters any
information residing in a computer resource or diminishes its value or utility or affects
it injuriously by any means, commits hacking. Whoever commits hacking shall be
punished with Imprisonment up to three years or with fine which may extend upto two
lakh rupees or with both.
Any computer, computer system, floppies, compact disks, tape drives or any
other accessories related thereto, in respect of which any provision of this Act, rules,
or orders made there under has been contravened, shall be liable to confiscation.
Case Study:
Orkut, the online portal, owned by Google finds itself at the centre of debate. A
nineteen-year-old student has been accused of making a fake account of a girl. Can
we prevent the misuse of this technology by not posting our numbers and pictures?
Abhishek never imagined that the prank he played on his classmate would land him in
jail. Abhishek, a management student and still in his teens, was arrested by the Thane
police following a girl’s complaint about tarnishing her image in the public forum -
Orkut. The report after being published in Mumbai Mirror has created a stir among the
Orkutians and opened up a whole new box of debate.
45
The incident
Abhishek had created a fake account in the name of the girl with her mobile number
posted on the profile. The profile has been sketched in such a way that it draws lewd
comments from many who visit her profile. The Thane Cyber Cell tracked down
Abhishek from the false e-mail id that he made to open up the account.
The question
In this case, the girl has not posted her picture or mobile number in the fake profile. A
brief search in the Orkut profile will reveal many such profiles with pictures of
beautiful girls. My guess is that many of these girls are not even aware of the fact that
their profile exists. These are created by some other people. I will term this as “rape of
the image”. Now the question is “Can we really prevent this rape?”
The debate
The Mumbai Mirror’s report on the issue came with tips to the Orkut users. Police Sub-
Inspector Ravindra Chauhan has been quoted as saying, “Orkut users should not put
up their photographs on the site. They should not reveal personal information in their
profile. Also no cellphone numbers or identity should be mentioned in the scrap book,
as it is open to all.” But whether this really can be a way out, is debatable. “What
about the hundreds of CVs I send to the unknown agencies everyday? They even
contain my mobile number”, says Aditi, a DU student and a hardcore Orkut addict.
She does have a point.
The truth is that in today’s world mobile numbers are far from being personal
information. The proof lies in the numerous sales calls that we receive from credit card
agents. On the issue of the photograph, Aditi says, “When Orkut gives an opportunity
to show your face to the whole world, then why not?” When asked about the risks
involved, she replied, “Who cares?” But everyone is not as carefree as Aditi. A brief
search in Orkut once more will reveal profiles that have pictures of film stars, flowers,
animals, sceneries and not the face of the owner. “I will never put my picture on Orkut
profile,” says Mansi, whose profile in Orkut carries the picture of Aishwarya Rai. “It’s
not safe, anybody and everybody can save it on their computer and can misuse it.”
But here again the question lies - can we really prevent it? What happens to the
hundreds of passport photographs we send with the application forms all our life? Any
of them can be scanned and put up without our notice. Are we sure that all copies of
46
the digital pictures taken at our local photography shop are deleted after we leave? “I
don’t know, but there is no harm in being careful,” says Mansi.
So perhaps even in this age of globalisation and technical advancements we will hold
ourselves from showing our face to the entire world for we never know who is
misusing it in what way. And as the lawmakers say “We cannot do anything, until a
complaint is lodged”.
47
Bibliography:
• http://www.naavi.org/importantlaws/itbill2000/preamble.htm
• http://en.wikipedia.org/wiki/Cyber_Crime
• http://www.expresscomputeronline.com/20020826/cover.shtml
• http://www.expresscomputeronline.com/20040426/coverstory01.shtml
• http://www.expresscomputeronline.com/20040705/newsanalysis01.sht
ml
• http://sify.com/finance/fullstory.php?id=14344751
• http://www.indiaforensic.com/cyberlotto.htm
• http://www.cyberlawclinic.org/cyberlaw.htm
• http://www.cio.in/govern/viewArticle/ARTICLEID=2766
• http://www.timesnow.tv/Cyber_crime_in_schools/articleshow/1885261.c
ms
• http://www.bpoindia.org/research/cyber-crime-asia.shtml
• http://www.dnaindia.com/report.asp?NewsID=6411
• http://www.cidap.gov.in/cybercrimes.aspx