Let's Build a Responsible Cyber Society

Visit
www.ceac.in


Visit
www.arbitration.in

 

Powers of State Governments Redefined by ITA 2008
 

With the passage of ITA 2008 (Amended ITA 2000), the role of State Governments in Cyber regulations has undergone a significant change.

The Section 90 of the Act which  empowers State Government to make “Rules” for the purpose of implementing the provisions of the Act assumes new meaning under ITA 2008.

In ITA 2000, the section referred to powers required to be exercised under section 6 which was in relation to e-Governance requirements such as filing of forms, granting of licenses, receipt of money etc. There were not many other powers conferred on the State Government.  Hence it could be interpreted that the powers of the State Government were intended to be used only for giving effect to Section 6 and perhaps sections relating to the powers of the Police.

Under ITA 2008, no change has been made to Section 90. However, the words “..without prejudice to the generality of the foregoing power..” used in Section 90 (2) assumes a greater meaning now since ITA 2008 envisages a lot more responsibilities and powers to State Governments under the amended provisions.

It is now no longer easy to restrict this section to only “Section 6” as it appeared appropriate in the earlier version. Now there are several more sections of ITA 2008 where State Government needs to exercise its powers.

One of the other sections under ITA 2008 which necessitates exercise of power by State Government is section 6A regarding delivery of services by service providers.

The provisions of Section 7A regarding audit of e-documents also apply to the State Governments and hence rules need to be framed for this purpose also.

Section 10 is another section under which rules are to be notified for use of digital signatures or other approved forms of electronic signatures if any.

Section 43 A which defines the liability of body corporates regarding handling of sensitive personal information makes a reference to “reasonable security practices and procedures specified in any law for the time being in force”. Since the definition of “law” includes state laws and ordinances, it is possible for State Governments to define reasonable security practices for any class of users such as “Cyber Cafes”, “Hotels”, “Educational Institutions” or even “Households”.

As regards the “Cyber Café Regulations”, there is however a conflict in section 67 (C) where the Central Government alone has been vested with the powers to preserve and retain information in a particular manner and format for a specified duration. Presently some of the State regulations on Cyber Cafes already specify such information and hence the State Governments need to review the present notifications and modify them in accordance with the ITA 2008.

More importantly, sections 69, 69 A and 69 B provide powers to State Governments along with the Central Government to
 

a) Appoint an officer or agency of the Government specially authorized to to intercept, monitor, decrypt, block access to any content , collect traffic data or information generated, transmitted, received or stored in any computer resource.
b) to notify procedures and safeguards for exercising the powers as indicated in the above paragraph
c) Define the term “traffic data”

It is of course possible for the State Government to consider declaring any officer of the Police department as an officer for the purpose of these sections. However, since the Act has at different places mentioned the powers of the Police where relevant and has used the words “any officer” in Section 69 and “any agency of the Government” in sections 69 A and 69 B, it is perhaps the intention of the legislature not to vest the powers under Sections 69, 69A and 69 B with the Police either at the State level or with CBI or that National Investigating Agency at the Central level.

The State Government has to therefore determine and notify which officer or agency would be entrusted with the onerous responsibilities envisaged under these three sections and the procedures, safeguards etc to be associated with such appointment.

Further, under the modified Section 70, the appropriate Government can declare any “facility of critical information infrastructure” as a “protected system”. The State Government has to frame rules and procedures to identify such systems, authorize appropriate persons in writing, how they are to be accessed etc.

Under Section 78 of ITA 2008, now Inspectors will be authorized to investigate cases falling under the Act, instead of the DSPs as per ITA 2000. State Governments which had presently set up Cyber Crime Police Stations with statewide jurisdiction need to review the system and consider if they need to declare more number of police stations as “Cyber Crime Police Stations” especially since the number of offences falling under ITA 2008 shall be far more than in the case of ITA 2000.

Under Section 79 A, the Central Government may designate any department, body or agency of the Central or State Government as “Examiner of Electronic Evidence”. The State Government may have to therefore identify and recommend which state level agency can be notified for this purpose.

State Governments will therefore be exercising far more powers under the ITA 2008 than what was envisaged under ITA 2000. The powers also need to be accompanied by several definitions, procedures, safeguards, appointment of agencies etc.

In order to effectively formulate a strategy for the State Governments, they need to constitute an advisory body of experts which may be called the "Cyber Law Advisory Group" so that detailed action plan can be drawn up.

 

Naavi

January 15, 2009

Other Articles on ITA 2008

Visit
www.Naavi.net

Visit
www.lookalikes.in