Let's Build a Responsible Cyber Society


Financial Fraud and Cyber Crimes
.

 

In today's economic world where all financial transactions are computer based, it is no surprise that most financial frauds in India also attract  Section 66 of ITA-2000. One such case is the case of financial fraud that is reported to have occurred in Chennai in which a center manager of NIIT Franchisee allegedly defrauded to the extent of Rs 26 lakhs her employer.

This case attracts academic interest because it not only demonstrates the link between ITA-2000 and financial frauds in an electronic system but also because it has the potential to test the liability under Section 43 of the beneficiary company in which the alleged fraudulent employee and one of her associates is a director.

The reason why financial frauds attract Section 66 of ITA-2000 is because though we recognize the section as defining the offence of "Hacking", the section covers far more than what traditionally "Hacking" has been associated with.

Let us take a look at the section first:

Section 66 of ITA 2000:

 

    (1)  

Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person, destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hacking.

 
    (2)  

Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
 

The most important aspect of this section is that the offence here is recognized whenever information residing inside a computer gets affected injuriously through any means when the person responsible  knew that his action could cause such an effect.

The section does not make it mandatory for "Intention" to cause harm to be present. "knowledge" is enough.

The section does not make it mandatory that the access should be there to the information to cause damage. "Any Means" means that irrespective of how the "Deletion/Damage/Alteration" or "injurious effect" or "diminishing in utility or value" occurs, the section can be invoked.

"Fraud" is generally considered as "Posing Untruth" as "Truth" by a person knowingly and for financial gain. If therefore a fraud has taken place in  an electronic account system, it means that "Posing Untruth" as "Truth" must have happened through electronic information.  This cannot but be considered as "Affecting the information injuriously or diminishing its value". The value of information residing inside a computer comes from its reliability and its synchronization with some business happenings. If the information is rendered unreliable by desynchronizing the real information from the information residing inside the computer, then we can conclude that the value has been diminished.

Let us take an example of a Banking scenario.

Mr A has a Banking account (maintained in the form of an electronic ledger) in which there is a balance of Rs 20000/-. There is a credit of RS 5000/- and debit of Rs 4000/- to be posted to the account. If these entries are posted, then the electronic information which consists of the present balance, a credit of Rs 5000/- with relevant particulars and a debit of Rs 4000/- with relevant particulars together represents the information residing inside the computer. The full value of the information is when all these material details are properly recorded. If somebody deliberately omits either of the entries credit or debit or otherwise changes the amounts etc, ultimately the value of the information is diminished. It can be noted that the "Value of the information gets diminished even when the balance amount is increased". It cannot be argued that since the balance in the account increased, there was no harm to the customer. (This may be relevant to some extent when damages are claimed under Sec 43 but not for determining the section 66 offence)

Hence there can essentially be no fraud in an electronic accounting system without first reducing its value or committing a section 66-ITA-2000 offence.

The key questions to be asked for determining Section 66 offence is

a) Is there an information residing inside a computer?

b) Has its utility been reduced?

c) Was the person causing such reduction "Knowing that he is likely to cause that effect"?

If answers to these are "yes" than section 66offence  has happened. It is then to be determined if the secondary offence is cheating, defamation, extortion, or any other crime under IPC or any other statute.

Just as "Forgery" and "Cheating" can be concurrently applied in an all IPC crime, Section 66 of ITA-2000 and Section 420 of IPC can be applied concurrently.

(Views are Welcome)

Naavi

May 12, 2005

 

Related Articles:

In Hindu of 12th May 2005 :

In Hindu again

At naavi.org



For Structured Online Courses in Cyber laws, Visit Cyber Law College.com

 

Back To Naavi.org