Serving a Notice to VSNL on spam mail

When we receive spam mails we often wonder what we do with them. Many of these mails are “Phishing” Mails trying to drop a trojan into your computer for committing a more damaging fraud. If you donot notice, you may have to regret your ignorance later. But even when you identify the fraudulent mail, you get irritated because you feel helpless that you can do nothing other than deleting them.

An “Attempt to drop a trojan” is a cognizable offence under ITA 2000/8 and all of us as citizens of India who observe a “Cognizable offence” have a duty to report it to the law enforcement authorities.

In some of these cases, Phishing mails emanate from an ISP who can take steps to block such mails at least prospectively.

Hence there is a public service value in reporting such incidents. Naavi has created a facility/service for this purpose through where such public notices in cyber space can be published.

I give here an example of how such a service can be used.

I  received today an e-mail which was apparently from the VSNL team of TATA DOCOMO threatening shutting down of my account unless I do an Account validation for which an in-mail link was provided.

The header information contained an IP address indicating  that the e-mail had originated from Nigeria. However the e-mail ID was and hence the sender was a customer of VSNL.

I have therefore placed a Cyber Notice addressed to VSNL that one of their customers is indulging in such a criminal activity and demanding that the account be blocked. At this point of time, I am not confident that VSNL will respond.

(See the copy of the notice at

However, as a citizen of India I have done my duty to keep them informed and triggering the requirement of “Due Diligence” under ITA 2008. Legally, if no action is taken, some victim can hold VSNL and its executives responsible under Section 79 of ITA 2008.

Being a public notice this also keeps the police at various places informed so that they can take their action as they find it necessary.

At present, such public interest notices will be published by Cyber as a free public service.

The service has been started as a support to the legal requirements where by “Notices” often are released under Court proceedings in prominent print media. In the currrent generation, the purpose of such services would be served only if they are published in Cyber Space and are available for search engines to pick up. Just as many ideas of Naavi, this may also take time to get accepted by the community. But it is expected that in due course, will be an essential tool of every advocate who has to publish notices in support of any litigation.

I suppose it will be extensively used to defend against phishing and to give notices to ISPs who fail to take action against spammers and contribute to the proliferation of phishing frauds.

Comments are welcome.



Share Button
Print Friendly

Ease of Doing Business Ranking and Full Service ODR at

It is heartening to note that the World Bank has recently praised the Modi Government that the “Ease of Doing Business” in India has become better in the current year.  (See report from Hindu)

Yesterday, a meeting of the CFO forum in CII, Bangalore discussed the developments relevant to the Ease of Doing Business.

One of the aspects that came up for discussion was the “Mechanism for ADR” which was also a factor that affects the global ranking of India for the “Ease of Doing Business index.”

While the Modi Government tries to take further steps to improve the country’s rankings for the Ease of Doing Business, I would like to draw the attention of the powers be that development of a good ODR system as would be enabled by would help in India improving its rank significantly.

I suppose that the time for has arrived.

According to the ranking reportIndia improved its ranking from 134 to 130 with a DTF score of 54.68.

One of the key aspects of this scoring is “Enforcement of Contracts”. India ranked 178 in this parameter which was the same ranking last year. This and “Dealing with Construction Permits” at 184 dragged down the India ranking significantly. Considering that this year’s movement of ranking from 134 to 130 was aided by a movement of 29 ranks in Getting Electricity (99 to 70) and 9 ranks in Starting a Business (164 to 155), movement of a single parameter such as “Enforcing Contracts” from the low 178 to say around 150 could make a significant contribution to the improvement of the ranking.

One of the aspects that helps in Enforcement of Contracts is the efficiency of the Judicial Systems which is difficult. But it is possible that development of ADRs could help in improving the ranking in Enforcement of Contracts.

Hence just as special efforts are being made to improve the efficiency in “Starting Business” where the number of days required is presently 29 days and is expected to be brought down to less than 20 days, special efforts must be made to improve the ADR mechanism in India.

The Arbitration Act Amendment ordinance (The Proposed Arbitration Act Amendment Bill is pending  in the Rajyasabha) provides for fast track arbitration with a six month deadline.

ODR can significantly help in achieving this fast track objective when used alone or in combination with the existing ADR system.

If Government wants, it can add a “Double Fast Track” process with ODR and fix 3 months limit for arbitration. This will be such a unique step that, if brought in,  the ranking in “Contract Enforcement” may take a quantum upward jump pulling along the ranking for “Ease of Doing Business” also up by several notches.

While it may take some time for the existing Arbitration s to completely switch over to Full service ODR as suggested under, a combination of Physical and ODR may also be used with some of the initial hearings held online and argument related hearing held offline. This will also reduce the cost and time of the process.

I invite views on these suggestions.


Share Button
Print Friendly

Online Dispute Resolution.. The Solution is here.. use it..

Disputes are an inevitable reality in business. There is no business without disputes and hence one of the major business Governance issue is how to effectively manage a dispute resolution mechanism in a corporate environment.

Major disputes in a corporate environment are  between the management and the employees and between the Company and the Consumers.

With growing E Business concepts, consumers buy and sell online and hence when disputes arise, the first option for them is to seek the dispute resolution also online. Normally the dispute resolutions extend to a chain of e-mails extending over a period. Often the call centers which are better equipped to handle service issues are clogged with the complaints from irate customers.

Even in the employer-employee scenario, often employees who have left the organization and have a dispute to settle with their previous employers find it difficult to resolve differences over e-mails when they have moved out to a different location on a new assignment.

When disputes go out of hand they land up in Courts and everyone including the Courts themselves know that the legal process is very painful and better avoided. Hence ADR (Alternate Dispute Resolution Concepts) are gaining ground . Mediation and Arbitration are therefore becoming the preferred methods of dispute resolution which even the Civil Procedure Code is recommending in every civil dispute.

Having accepted the concept of ADR, there is still a need for ensuring that the cost of dispute resolution in terms of the time, effort and money spent by the disputing parties to be brought down.

Travelling from place to place to attend an arbitration meeting in a hotel, cost of hosting the meeting in a hotel, cost of stay of the participants and the arbitrators in comfortable accommodation are all issues that add cost to the ADR process beyond the professional fees payable to the Arbitrators and the advocates who represent the disputing parties.

To ease the pain of this physical ADR process, there is an urgent need for development of the ODR process namely the Online Dispute Resolution Process.

Now there is a solution on hand for the ODR process in the form of the re-launched by Naavi with some modifications from the earlier model.

The website  provides the details of the service. In its simple explanation, provides an online meeting place to conduct online Arbitration or Mediation, for a fee which is cheaper than renting a hotel conference room. Participants need not travel but connect through internet and conduct the transactions.

Additionally, is supported by which provides a soft copy of the proceedings recorded as a video under the presence of an observer who is the Registrar of the session and duly certified as required under Section 65B of Indian Evidence Act .

Thus the ODR sessions of are not only convenient and cost effective but also legally sound.

Kindly note that is not intended to a competing Arbitration Council to the existing systems. It is only a platform for individual Arbitrations and Mediations and can be used by the Arbitration Councils for the benefit of its members.

I invite Arbitration Councils to make use of this service for the general good of the community.

I request visitors to check out and give their feedback as to how it can be made more useful.

The service is just now launched in its new form and yet to be marketed. Any suggestions for marketing the service in India and outside are welcome.


Share Button
Print Friendly

The e-sign conundrum

(P.S:  This post tries to explain the “e-sign” system of authentication of an electronic document as per the provisions of Information Technology Act 2000 as amended in 2008 -ITA 2000/8, for the benefit of students and teachers of Cyber Law. 

This is also an addendum to the e-Books published by Naavi such as Cyber Laws for Engineers”, “Cyber Crimes and ITA 2008” and “Cyber Laws for Everyone”.

I would like to however add a caveat that Naavi considers that some of the provisions of e-Sign are not completely compliant to the parent law namely ITA 2000/8 and hence can be questioned for its legality. I have brought this to the attention of CCA and sought clarifications but have failed to receive any response.

It looks strange that I have to raise Cyber Law related questions on CCA which itself is a statutory authority to frame the laws of digital signature. It is perhaps like Carrying Coal to Newcastle!. But when the law makers themselves seem to be faltering in law compliance, it is difficult not to voice the opinion even if it is futile. 

These academic discussions about the legality apart, students of Cyber Law may kindly note that even if it is a bad law, the law related to e-sign is a reality and they may take cognizance of the same for academic purpose.

It may take several years before a Cyber Law understanding Supreme Court Judge will emerge in India who will try to provide necessary legal guidance to the Government on how to properly interpret the law as in the books.

In the meantime, some Judges may even uphold the law as made by the Government and ignore the inconsistencies with the ITA 2000/8.

Hence students who write examinations in Cyber Law and teachers who teach Cyber Laws may teach what the Government has proposed which is contained here in… Naavi)

When Information Technology Act 2000 (ITA 2000) was drafted as “Draft E-Commerce Act 1998”, by the then Union Commerce Ministry, the draft was focussed on providing legal recognition to Electronic Commerce Transactions.

Hence the Act was drafted keeping in view the need to provide legal recognition to Electronic Documents and a method of authentication of electronic documents.

The very first draft of the “Draft E Commerce Act 1998” drew heavily on the then present laws of Malaysia and Singapore besides adopting the E-Contract related provisions in the UNCITRAL Model Act 1996. (The developments have been traced by Naavi here).

This “Draft E Commerce Act 1998” was an excellent provision and the next replacement draft in the form of “Information Technology Bill 1999” which later became the “Information Technology Act 2000” (ITA 2000) was not as good as the draft of the Commerce department. Nevertheless it is the law of the land which became effective from 17th October 2000. This was further amended with effect from 27th October 2009 which we call as the ITA 2008.

ITA 2000 adopted a form of authentication which was called “Digital Signature” based on the PKI system. This  used Hashing of a document and its encryption with the use of the Private key of an individual created in an Asymmetric Crypto System as the system of authentication of an electronic document recognized as equivalent to a physical signature.

After the digital signature system was adopted in law as the only form of authentication of an electronic document, several voices were raised that authentication system in ITA 2000 was digital signature technology dependent  and is not “Technology neutral”.  It is interesting to observe that the original draft in the “Draft E Commerce Act 1998” was completely technology neutral as it stated:


8. Electronic Signatures. Except as provided in Section 4, where any rule of law requires that a record bear a signature, or provides for certain consequences if a record is not signed, an electronic signature satisfies that rule of law if:

(a) a method is used to identify the originator and to indicate the originator’s approval of the information contained in the electronic record; and

(b) that method is as reliable as was appropriate for the purpose for which the electronic record was generated or communicated, in light of all of the circumstances, including any relevant agreements among the parties involved.

The cry of technologists for the system of authentication to be “Technology neutral” was addressed in the amendments of 2008 when new enabling provisions were introduced to enable alternative technologies to the PKI system adopted by Digital Signatures. The system of approved authentication was termed as “Electronic Signature” and the PKI based digital signature was declared as one of the types of Electronic Signatures and continued to be the sole system then recognized.

Though an alternate electronic signature technology that could be used either as a replacement of or as a modification of the digital signature system was possible since 27th October 2009, it was not until 2015 that an alternate system came into reckoning in the form of “e-sign”.

This discussion is on this new system which has been notified as an “Electronic Signature” in the Second Schedule of the ITA 2008 (the version of ITA 2000 after incorporating the amendments of 2008) and recommended to be used in the “Digi-Locker” system of the Government of India and also the e-KYC system using Aadhar which is likely to be used extensively in the coming days in many critical electronic commerce activities.

The undersigned has brought to the attention of the CCA (Controller of Certifying Authorities) certain doubts about the compliance of the proposed system to Information Technology Act 2000/8 but has not been able to get a reply. Let’s ignore these objections for the time being and see what is the new law of e-sign.

On 28th January 2015,  Government of India through its gazette notification number G.S.R. 61(E), published the rules called “Electronic Signatures or Electronic Authentication Technique and Procedure Rules 2015” to come into force immediately.

These rules added the following into the Second Schedule of Information Technology Act 2000 (21 of 2000).

(P.S: This version of ITA 2000 is the 2008 version of the Act in which the earlier Schedules numbered as First, Second, Third and Fourth Schedules were replaced with a set of new schedules numbered as First and Second Schedule.)

Sl No Description Procedure
1 e-authentication technique using Aadhaar e-KYC services Authentication of an electronic record by e-authentication Technique which shall be done by-

(a) the applicable use of e-authentication, hash, and asymmetric crypto system techniques, leading to issuance of Digital Signature Certificate by Certifying Authority

(b) a trusted third party service by subscriber’s key pair-generation, storing of key pairs on hardware security module and creation of digital signature provided that the trusted third party shall be offered by the certifying authority. The trusted third party shall send application form and certificate signing request to the Certifying Authority for issuing a Digital Signature Certificate to the subscriber.

(c) Issuance of Digital Signature Certificate by Certifying Authority shall be based on e-authentication, particulars specified in Form C of Schedule IV of the Information Technology (Certifying Authorities) Rules, 2000, digitally signed verified information from Aadhaar e-KYC services and electronic consent of Digital Signature Certificate applicant.

(d) The manner and requirements for e-authentication shall be as issued by the Controller from time to time.

(e) The security procedure for creating the subscriber’s key pair shall be in accordance with the e-authentication guidelines issued by the Controller.

(f) The standards referred to in rule 6 of the Information Technology (Certifying Authorities) Rules, 2000 shall be complied with, in so far as they relate to the certification function of public key of Digital Signature Certificate applicant.

(g) The manner in which information is authenticated by means of digital signature shall comply with the standards specified in rule 6 of the Information Technology (Certifying Authorities) Rules, 2000 in so far as they relate to the creation, storage and transmission of Digital Signature Certificate.”


The key aspects of this notification are :

  1. This notification was issued in order to provide acceptance of the Aadhar E-KYC services.
  2. The issuance of Digital Certificate was by a Certifying authority but based on the e-authentication of the application form of the subscriber using the e-KYC services of Aadhar
  3. The e-KYC process included “Digital Signature of the Aadhar authorities” but only an “E-Consent” of the subscriber.
    In other words, the subscriber application did not carry the authentication as required by ITA 2000/8 but the UIDAI sending the KYC information such as the name, address, e-mail address etc as contained in the subscriber’s  application form with UIDAI’s digital signature.
  4. The request for digital signature certificate will be received by the Certifying authority from a “Trusted Third Party” who generates the key pair in a “hardware security module”. (It is understood that the trusted third party should be a Registration Authority appointed by the Certifying Authority)
  5. Further detailed instruction to be issued by the Controller from time to time.
  6. CCA issued the more detailed instructions on the use of the e-sign process in its e-authentication guidelines issued on 24th June 2015.

In this entire process, the Certifying Authority is receiving a “Request for issue of digital certificate” from its own agent namely the Regisration authority. (e-Sign Service Provider).

In the normal digital signature certificate issue process, the agent would be responsible for doing the KYC process. In the e-sign process, the agent is using a verification of the subscriber information from the UIDAI authorities under their digital signature.

The request for digital signature is however triggered by the aadhar holder who wants to avail some online service where there is a need for digital signature. It could be a digi-locker service or a banking service. Then that service provider would send a request for digital signature issue online to the Certifying authority through its designated registration agency which is capable of issuing online digital certificates.

This request from the e-sign user agency may come in the form of an API integration of its own service with the e-sign issue service.  i.e. Let’s say Mr X requests a Bank Y to withdraw some money from his account. Bank Y wants the request to be digitally signed and wants to use the e-sign system. It then contracts with a Certifying Authority for issue of e-sign certificates.  The Certifying authority requests a Registration Authority to manage the application processing. The registration authority will develop an API to be used by the Bank to deliver its service.

Let’s now look at the process in the light of a use case where a customer of an online Bank is using a withdrawal service from the Bank supported by an e-sign.

When the customer  Mr X completes the form for withdrawal of money from the Bank, simultaneous to the completion of the online withdrawal form, a request for e-sign certificate is generated with the particulars of the customer of the Bank already available.

This is sent by the Bank to the registration authority and then on to the Certifying authority.

When the registration authority sends the application form to the certifying authority, it sends the application along with a public key generated from the pair of keys randomly generated by its HSM (hardware security module).

The private key  generated in the process remains in the HSM and the public key comes back as a e-sign digital certificate.

The bank withdrawal form will be signed with the e-sign in the name of the subscriber but by the use of the private key pulled from the HSM in the control of the Registration Authority. The Bank based on this e-sign digital signature request acts on the withdrawal form and dispenses the amount.

In the above process, it must be recognized that e-Sign digital signature process is rendered subordinate to the Aadhar system.  For example,  the authentication of the subscriber is done with reference to the records about the subscriber held by the UIDAI. The request for this records is generated by the API upon the subscriber providing either his biometric details or through the use of OTP.

The UIDAI system checks the biometric or the OTP and then confirms the information that is available in the e-Sign application form as correct or not. If it says Mr X is Mr X and his address and e-mail address matches the UIDAI records, then the e-Sign process will issue the digital certificate in that person’s name. If the e-mail address is not available with the UIDAI or is a shared e-mail address, the Aadhar authentication is done with reference to such un available or shared e-mail address.

Since the e-KYC system can be used even with an OTP, the system will send a PIN to a mobile number given by the subscriber Mr X in his service application form and if it is received back, will assume that Mr X is what he claims to be.

If the mobile number available in the Aadhar registration is a shared mobile, then the OTP authentication is done with reference to the shared mobile. Also the authenticity based on the mobile means that the KYC of the mobile  operator becomes the reference point for the KYC under the e-KYC system of Aadhar which in turn becomes the reference point for the e-Sign subscriber identification.

While the above records the way the e-sign system is supposed to work, let’s now look at how e-Sign compares to the normal digital signature in terms of the “Non Repudiable Nature”.

The “Non Repudiable” nature of the digital signature as recognized under ITA 2000 was a result of two factors

  1. The Private Key is always under the control of the subscriber. It is generated in the system of the subscriber during the application process and never leaves the system. In the case of “Secured Digital Signature”, it is produced in the Cryptographic USB device and remains trapped there. Only the public key moves out and comes back in the form of a digital certificate and can be exported from the device.
  2. The technology of the Asymmetric encryption system and the hash algorithm ensures that the “Hash Value of a document encrypted with the private key of the person” is unique both to the person and to the content of the document and hence accepted as a “Non Repudiable Authentication” of the person for the document.

In the e-Sign system, the private key is not entirely under the control of the subscriber. It is generated in the HSM owned and operated by an agent of the Certifying Authority and hence it is compromised ab-initio. It can be misused by an authorized  employee of the e-Sign Service Provider.

Since under the proposed guideline, the e-Sign private key is a one time key and is destroyed within 30 minutes, once the transaction is completed, there is no way of verifying the signature after 30 minutes except with reference to the meta information associated with the transaction without the private key. The non verifiability of the e-Sign signature after 30 minutes and the generation and storing of the private key in the HSM makes e-Sign “Repudiable”. It is therefore to be considered as inferior to digital signature from the point of view of legal validity.

In practical terms this means that the e-Sign is not a legally acceptable authentication like a digital signature. It is only another form of the mobile number based OTP authentication and is only camouflaged as a legally valid digital authentication.

Unless there is a major modification of law, it is not possible to equate the e-Sign with digital signature and all the statutory authorities including the CCA are parties to this mis-representation of e-Sign as a legal equivalent of digital signature.

However, since CCA has endorsed the system, we can consider e-Sign as a “Second Class Digital Signature” some thing similar to an “Implied Digital Signature”. It is open to the Courts of the future to decide what value is to be ascribed to evidence digitally signed with e-Sign.


Share Button
Print Friendly

Section 65B of Indian Evidence Act on Electronic Evidence Explained


Of late, Section 65B of Indian Evidence Act is under focus in the Judicial and Law Enforcement circles. In this context, Naavi has put across his views on the section and how it needs to be understood in the above video available on You Tube.

The main points that Naavi makes here are

a) Section 65B (as well as 65A) of Indian Evidence Act refer to the special provisions of the Act in respect of Electronic Documents. Though Section 65 is referring to “Secondary” documents in paper form, there is no such distinction made as to the electronic document.

b) There is no need to distinguish Primary and Secondary and all documents need to be interpreted by a human being which takes the form of a Section 65B certificate.

c) A “Hard disk” which may contain an electronic document also cannot be considered the “Primary Document” since it is only a “Container” and the real Electronic document is an expression in binary language which cannot be read by a human being and needs to be interpreted with the assistance of a binary reading device (Computer + operating system +Application)

d) Section 65B explains the conditions under which an electronic document can be considered as “Admissible” in a Court as a “Document” and it needs to be suitably confirmed for the Court to accept the document, which is often termed as “Section 65B certificate or Statement”

e) Section 65B refers to a process of producing a “Computer Output” of the electronic document which is the evidence to be admitted and such computer output can be either in the form of a “Print Out” or a “Copy”.

f) There is a “Process” by which the electronic document becomes the “Computer output” and Section 65B identifies this as the subject activity which needs to be conduct by a person having lawful control over the computer producing such output and that during the period of such production, the Computer should be working properly etc.

g) The focus of Section 65B is the activity of conversion of the electronic document residing inside a system which can be seen by an observer into a “Computer Output”.

h) The other clarifications contained in the Section 65B such as that the the Computer Output could be produced by a combination of computers, acting in succession etc as relating to dynamic creation of an electronic document from a data base and routing it through multiple devices onto a final visible form in the computer of the observer and thereafter its porting into a Printer.

i) Considering these interpretations, the Section 65B certification is a “matter of fact” certification to the effect that “What I saw is what I reproduced as a computer output faithfully” and this can be done by any person who is observing an electronic document in his computer and wants it to be produced as an evidence. It is not necessary that a document from yahoo website has to be certified only by a Yahoo server administrator. Similarly, a statement of account downloaded from an ICICI bank website need not be certified only by the ICICI Bank manager but by any person who can lawfully access the document in electronic form.

j) There is also an important distinction that “Content Owner” is different from “Content Viewer” and Section 65B is meant to be produced by a content viewer. On the other hand the content owner in respect of say a Bank statement is the official Bank manager and he can provide a print out as the owner of the content who understands the content and is considered as an “Expert” in the domain. Any body else who views the document provides a Section 65B certificate that  the print out (or a soft copy) is a faithful reproduction.

It is very important that the legal fraternity and the Judiciary interprets the section properly. Any interpretation that only a “Server Administrator” can provide a certificate under Section 65B is considered incorrect. The server administrator can however provide the certificate but it is not mandatory. The Section 65B certifier is like a photographer who captures a photograph of an event and confirms the process of taking the photograph though he may not be aware of who is there in the picture and what they are doing. It is left to other “Experts” to interpret the “Content” and impute meaning as only a subject matter expert can do.

The undersigned has been running the Cyber Evidence Archival Center ( since 2002 and has produced evidence under Section 65B certification in many legal proceedings. The first case in which an accused was convicted under the provisions of ITA2000 namely the State of Tamil Nadu Vs Suhas Katti happened in 2004 and in that case, the undersigned had produced a print copy of an electronic document which was then present in yahoo server with the appropriate certification. It was accepted and the accused was convicted.

In that case, the undersigned was also examined an “Expert” since as a part of the certification, he had also interpreted the IP address visible in the document as belonging to a specific ISP in Mumbai etc.

The current interest in the Section 65B has come because of the Supreme Court making a mention recently about the need for such certification whenever an electronic document is produced as evidence.

It is however felt that it is necessary for all the Courts to have proper understanding of the Section since otherwise mistakes can occur in acceptance or rejection of electronic documents in Courts.

The embedded video in YouTube contains the above discussion.

I welcome any counter views for debate.


(For a Copy of Section 65B of Indian Evidence Act, s or Browse through Schedule 2 (in the left menu) of ITA 2000 available here: 


Share Button
Print Friendly

Hidden Profits Banks are making in Failed Card settlements

When a customer uses a debit card online, the card payment is authenticated by a system of payment gateways and money transferred from the card issuing Bank to the Merchant so that the Merchant can release the service. Normally the authentication happens instantly and the customer can avail the service without any delay.

However, there could be occasions when the authentication process encounters technical problems such as lack of connectivity and the authentication may fail. In some cases, the bank account is not debited and the Merchant also has received the payment and hence the customer may re-try the payment and complete it.

Occasionally the amount gets debited from the Bank account but the Merchant reports non receipt of money. In one of the recent instances the undersigned encountered, the merchant even issued an invoice confirming the completion of the transaction but when the subject service did not come through and I raised a query,  indicated that the authentication had failed.

This could mean that the Merchant is lying in which case it is a question of fraud.

It is also possible that the authentication was first confirmed and then reversed by the agency responsible for authentication. This could be a correction of a mistake or a result of a bug. The responsibility however lies with the Card issuing Bank.

If the authentication is through in the first instance and the Merchant releases the service it becomes a dispute between the Merchant and the Card issuing Bank. If the service is not delivered, the customer has a double jeopardy. He loses the execution of the service and if it is a time sensitive transaction, he may suffer a real and substantial loss. Additionally,  the customer would have to fight for refund with the Bank.

In the recent transaction which the undersigned encountered, though the Merchant who had issued an invoice confirmed after a delay of about a day that the transaction had failed, the Bank has refused to provide the charge back instantly.

They have suggested that the charge back may take upto 36 days.

As a customer, this means that I will be denied of the service and the money for 36 days. If so, the question arises about who enjoys the money during this interim period.

We all know that Banks work under an opportunity cost of about 3% per month and it therefore enjoys the wrongful gain of 3% per month until the amount is reversed back into the account of the customer. Since we can expect that there could be lakhs of failed transaction at any point of time it appears that a substantial amount of money of umpteen customers lie with the Bank as “Unsettled” amounts. Though the individual amounts may be small, collectively it may be substantial.

 If the Card is a Credit Card and the customer is not vigilant, the amount would be debited to the account and interest charged there on in the usual course of accounting. If it is a debit card, it will deny the customer of interest for say upto a month on the SB account when the amount is debited even for a day.

I have therefore requested the RBI to clarify their own views on how such float monies are accounted for by the Banks.

I have also asked RBI to let me know an estimate of such float but it is possible that RBI may not have such data.

I have also asked for clarification from the Card issuing Bank and the Merchant who are yet to respond.

I request visitors to let me know if they have come across similar experiences.


Share Button
Print Friendly