Baba Ramdev Vs Tech Giants..at Supreme Court

The decision of the Delhi High Court in the Baba Ramdev Vs Face Book/Twitter/Google case ordering global take down of defamatory content is likely to turn out to be a landmark judgement. Though the final word on the issue will  be written by the Supreme Court when it hears the appeal, the Supreme Court has been provided with a powerful challenge if it desires to maintain judicial comity with international Courts.

Very recently, in the GDPR case of CNIL Vs Google, (2019), the EU Court of Justice had reversed an earlier ruling for global takedown and ruled in favour of Google. In this case it was held that while exercising the “Right to Forget” of a French Data Subject, it is sufficient if the data is removed from the French site of Google Search and it is not necessary to remove it from other search engines. The Court in this instance held that each country search engines are different data groups and are meant for different audiences.

Long time back, the US courts also had come to similar conclusions in the Yahoo-Nazi memorabilia case.(2006)  In this case, the US Courts implied that a website with a country code extension of say .fr should be considered as a site meant for France. If the language of the website was French, it was clear that the target audience are French people where ever they are located.

In these cases as well as the earlier cases, the Courts determined the jurisdiction based on the “Intentions” of the content provider using “Interactive nature” of the websites, “Maintenance of contact address in a jurisdiction” , “Offering of goods and services to the people of a jurisdiction”, etc as parameters to determine the application of extra territorial jurisdiction.

However,  in the case of Dow Jones Vs Gutnick (2002) the Australian High Court held that “An Australian Citizen could maintain a defamation suit in a local Australian Court for allegedly libelous statements published in a website in USA”. It was held that “Jurisdiction was proper in the place in which the article was downloaded and read and the harm caused not where the server is located or where the publisher’s principal place of business is located”.

The Dow Jones Vs Gutnick established that jurisdiction to determine the defamation and go on trial exists in the place where the harm is felt by the victim.

This has become a standard rule today and has also been adopted in the Baba Ramdev case. Hence all defendants  have not opposed the trial and have in fact even agreed to their status as “Intermediary” under Indian law and also further agreed to implement the directions to a certain extent.

Enforcement Jurisdiction outside India

What the Delhi High Court has now embarked upon is the jurisdiction to force “Enforcement Jurisdiction” outside the territory of the victim/forum.

In the appeal, the Supreme Court may have no option but to uphold the judicial jurisdiction to try the case and provide relief to the victim of defamation from a foreign company, because the defendants have admitted their responsibility under Section 79(3) of ITA 2000 at least to the extent of exposure of the objectionable content to the Indian audience through “Geo Blocking”.

The point of contention however is the decision of the High Court ordering the global take down based on its interpretation that all the servers of the defendant companies are networked to share information and hence should be considered as a “Unified Computer Network System”. Under this consideration, “Removal of Content” is not complete unless it is removed in all places where it is stored and is accessible.

The Court has made a distinction only on “Data Uploaded from India” and “Data uploaded from outside India”. As regards data uploaded from India, the Court has ordered the global take down and as regards data uploaded from outside India, the Court has ordered “Blocking access”.

This argument of determining the enforcement jurisdiction based on the place from which the content was uploaded appears to be a new thought and could come in for deeper analysis in the Supreme Court.

The second point which is likely to be contested in the Supreme Court is whether Section 79 is applicable for offences where the cause of action is not ITA 2000 but other statutes like IPC.

It is our opinion that Section 79 does not restrict itself to offences within ITA 2000 but this could be argued.

Another point which the Court could have missed is that ITA 2000 under Section 13 has given a clear indication to determine the place from which a message has been sent as the “Place of usual residence”. Hence the applicability of ITA 2000 in respect of “Message Uploaded” depends on the usual place of residence of the uploader.

If however the “uploader” is anonymous, then the system from which the uploading has taken place may become relevant. It is open to the system owner to provide the identity of the uploader and establish with evidence that the person has a place of residence outside India and hence the upload location has to be determined accordingly. If the platform owner fails to establish the identity of the uploader, then the responsibility should rest with the owner of the system.

The “Attribution” under section 11 is clear that the responsibility for any computer which works automatically is attributed to the person who caused it to behave so…which is the platform owner.  This “attribution” aspect is relevant for platforms who may claim that the system is automatic, they donot interfere in the publication etc.

Since all platforms have admitted that they are “Intermediaries” and sought the protection under Section 79 claiming “Due Diligence”, the fact whether they are really intermediaries or not did not figure in the High Court judgment. It is possible that this may not come for discussion even in the Supreme Court.

Since every platform analyses the profile of the users and determines what page has to be served to them or at least recommended to them, it is impossible to consider that any of these entities namely Face Book or Twitter or Google are actually entitled to the safe harbor provision of Section 79 which requires that these entities  shall not

a) Initiate the transmission

b) select the receiver of the transmission and

c) Select or modify the information contained in the transmission.

All of them may fail the test of the third condition above which is mandatory for invoking Section 79.

If these platforms are not considered eligible for Section 79 protection, then shall be guilty of “Defamation” irrespective of whether they remove the content now or not.In the Duffy Vs Google, the Australian Supreme Court made the following interesting observations.

“..the concept of “passive medium” was apt to mislead because the nature of electronic media is that it is pre-programmed to fulfill a purpose….”

“Google participated in the publication of the paragraphs about Dr Duffy produced by its search engine because it intended its search engine to do what it programmed it to do”

“Google’s search results are published when a person making a search sees them on the screen … It is Google which designs the programme which authors the words of the snippet paragraph. Google’s conduct is the substantial cause of the display of the search result on the screen”

“Google was liable for the republication of the Ripoff Report pages to which it provided hyperlinks.  This was because Google’s facilitation of the reading of these pages was both  substantial and proximate” 

If a similar view is taken in India, it would become irrelevant whether the Companies agree to remove the content or not. They will be directly liable to pay compensation to Baba Ramdev.

Probably Mr Ramdev’s counsel cannot raise this issue at the appeal stage but another third party intervener may raise this issue and contend that these platforms Face Book, Twitter and Google do not satisfy the requirements of Section 79 and hence should not be provided the protection under the section. In that case, the argument on removal of the content becomes secondary.

How Does the Court enforce its decision?

It is all fine to say that ITA 2000/8 has extra territorial jurisdiction under Section 75 and the Court has also recognized the personal jurisdiction based on the Victim’s right to invoke the Indian Courts etc.

Now that the Court has passed the order for removal of content, the next question that would arise is what would the victim do if the respondents don’t honour the directions of the Court.

It is possible that the Supreme Court may be obliging and grant a stay. If not, it is most likely that these platforms will do nothing to implement the directions of the High Court and will contend that the matter is sub-judice.

The High Court order therefore failed to recognize the need to impose a penalty if the respondents don’t follow the orders of the Court.

Such a direction was provided in the Yahoo -Nazi Memorabilia case by a French Court which ordered payment of a fine for every day of delay in implementing the content removal directions.

If the Court had ordered similar per-diem penalty and also indicated that failure to make the payment would lead to other consequences such as blocking the service in India, then the order would have had teeth.

Now this will be another order which is appreciated by academicians but has no immediate utility for the victim. We hope that when the Supreme Court admits the appeal, it  directs the appellants to agree to implement the High Court order forthwith or agree to pay some compensation for any delay before the appeal is admitted.

(This is for academic debate. Comments and counter views are welcome. I invite some of my students to take up a deeper analysis)

Naavi

Reference Articles

Baba Ramdev Vs FaceBook-High Court judgement

Google Vs CNIL-bbc.com

Dow Jones Vs Gutnick-judgement

Dow Jones Vs Gutnick..an analysis

Dow Jones Vs Gutnick implications

Is Google a Publisher?..Australian Case Duffy Vs Google

Posted in Cyber Law | Tagged , , , , | Leave a comment

Early Bird Pricing of Rs 6000/-  for the Course is set to end on 3rd November

Early Bird Pricing of Rs 6000/-  for the Course is set to end on 3rd November 2019. 

Watch out for more details on Cyber Law College 

Posted in Cyber Law | Leave a comment

A Profound judgement comes from Delhi High Court

The judgement  by the Delhi High Court in the Baba Ramdev Defamation case delivered on October 23, 2019 against Face Book, Google, and Twitter is a very matured and erudite interpretation of some of the provisions of Information Technology Act 2000 (ITA 2000). It will have a long term implication on the way “Intermediary Liability” is interpreted and international jurisdiction is applied in Internet related cases.

Credit is due to the counsel Mr Darpan Wadhwa and his team for bringing out some very powerful arguments as well as the honourable Justice Pratibha M Singh, for appreciating the arguments and delivering a bold and path breaking order.

The order challenges the interpretations that are derived from some of the recent international judgments such as CNIL Vs Google and will definitely be challenged in the Supreme Court for a more detailed argument and establishment of certain principles that will uphold the judicial maturity of Indian Courts.

I hope that the Supreme Court bench which will consider the appeal will be able to show the same kind of vision and technical understanding that the Delhi High Court has shown in this case and uphold some of the principles that this judgement has justified.

The judgement requires a more detailed analysis and comment which we shall do in due course.

Naavi

 

Posted in Cyber Law | Leave a comment

IAB publishes a CCPA compliance framework for public comments

The IAB (Interactive Advertising Bureau) which has a membership comprising of more than 650 leading media companies, brands and technology firms having a stake in Digital Marketing has come up with a framework for compliance with CCPA and released it for public comments.

The framework is open for public comments till 5th of November.  The framework is intended to be used by those publishers who “Sell” personal information and the “Technology Companies that  use the sold personal information”.

In the digital marketing world there are “Publishers” who publish advertisements on website and some who use other means such as E Mail marketing to publish advertisements. The product marketing  companies place their “Advertisements” in appropriate publishing channels.

Some of the publishers may occasionally use the services of intermediaries who identify target audience to whom a message can be advertised. These intermediaries collect personal data by their own means and then filter them into different categories and make it available to other publishers. There is a “Profiling” activity involved in this process which falls under the different data protection regulations.

The publishers may also be benign publishers who donot use “Targeted Advertising” on their platforms and therefore donot have responsibility for the profiling. In such cases the publishers may be simply be “Advertising Platforms”. In Indian law they will be legally “Intermediaries under Section 79 of ITA 2000”.

The difference between the “Target identifier” , “Publisher” and “Advertising platform” depends on the extent of control they exercise on the collection and processing of personal data.

For example, naavi.org is a platform on which Google Ads is the publisher, Amazon may be the advertiser. The dividing line between the Publisher and the Platform is thin. But since Naavi.org does not decide on what ads are to be presented and Google Ads is the Ad serving company taking that decision, Naavi.org becomes only a platform that lends part of its space to the Google Advertising.

The Google Ad network may sell advertising space from its clients on a Real time bidding (RTB) under which advertising inventory is bought and sold on per impression basis via progammatic instantaneous auction. The algorithm used for such advertising may incorporate profiling of a visitor to a website as well as use of AI. The platform may not have much knowledge of how the ads are chosen except to prohibit certain types of contents.

The IAB framework provides guidelines for the publisher and the advertising company on how to handle the personal data.

The “Framework” envisages that any company that engages in or supports an RTB transaction may sign the “IAB Limited Service Provider Agreement”.

The framework participants includes

a) Owners of publisher digital properties ((e.g., publishers of web pages and retailers with advertising on their sites or apps, that, in each case a California consumer (a “Consumer”) visits)

b) Downstream Framework participants(e.g., Supply side platforms or SSPs, Demand side platforms or DSPs, ad servers, and agencies)

c) Owners of Advertiser Digital properties (e.g., brand entities that also
operate/publish a web page)

d) Downstream Framework participants who receive personal information about a consumer that originates from the advertiser digital property.

The framework applies to RTB transactions involving the “Sale” of Personal Information only when all the participants in a transaction are “Framework Participants”. The digital property can however opt out of the framework. However, when the Digital Property utilizes the Framework, it will be contractually required to send the bid request and accompanying personal information only to other Downstream Framework Participants. Additionally, when a Downstream Framework Participant receives the bid request from the Digital Property, it will be contractually required to confirm that its counter parties are Framework Participants by using the Signatory Identification Solution and pass the bid request and personal information only to Framework Participants.

The guidelines cover the information to be provided to the individuals who allow their personal data to be sold through an Opt-in process, the display of “Donot Sell” button and how to handle the “Donot Sell Requests” of a person who has earlier provided a consent for selling. The framework suggests that the “Service Contracts” between the Publisher and the advertiser has to accommodate the change in consent.

Digital properties who send the signals for RTB to a participant cannot onward sell the personal information without an “Explicit Consent”. The digital property must include a “California Explicit Notice” link near te “Donot Sell” link. A sample “Explicit Notice” is also provided in the guideline.

Under CCPA, When a Consumer opts out,  it does not bar the collection of personal information or the delivery of a personalized ad but, rather, bars a “sale” of personal information related to the delivery of a personalized ad. Hence the downstream framework participants become “Limited Service Providers” on behalf of the digital properties.

The guidelines also provide technical frameworks to be used in the specified cases.

In a way, it appears that IAB is trying to set up some industry standards applicable to the participants of the framework.

The reaction of the industry needs to be watched.

Naavi

Posted in Cyber Law | Leave a comment

10000 years = 200 seconds in Sycamore Processor

Google has claimed a breakthrough in Quantum Computing and has stated that they have successfully tested a 54-Qubit processor named Sycamore that has processed the number of computations that takes the fastest known classical computer about 10000 years to process in just 200 seconds.

Refer here: Quantum Supremacy using programmable superconducting processor

The research team at AI Quantum has built a programmable high fidelity “Quantum Logic Gates” which performed the computations.

The Sycamore processor comprised of a two dimensional grid where each qubit was connected to 4 other qubits.

According to the scientists the Sycamore quantum computer is fully programmable and can run general purpose quantum algorithms. According to them, this breakthrough has created the first widely useful quantum algorithm for computer science applications with “Certifiable quantum randomness”.

Going forward the scientists will be trying to find valuable applications in quantum computing. The processors will also be made available for further academic research for development of appropriate algorithms, design new materials, new catalysts, more effective medicines etc.

Though Quantum Computing based on the principles of Physics is still Greek and Latin for most, it appears that the days of Quantum Computing at least in scientific research is nearer.

Naavi

Posted in Cyber Law | Leave a comment

Forged and Scanned document under Section 65B

An interesting hypothetical case was referred to me today on the acceptability of the Section 65B certificate and its impact when a person forges a document, scans it and presents a section 65B certified print copy of the scanned document for admission in a Court.

The query is that ” If the original is not required to be presented”, then the forged document becomes admissible and it becomes difficult to prove the forgery. Therefore does it put the person who is disputing the forged document in a difficult position in law because of Section 65B?

The query is interesting. I am presenting my views on the query and be happy to receive other views.

The answer to the query requires application of both Section 65B interpretation as well as appreciation of paper evidence. Hence it is complicated.

In a practical situation, the presenter of the Section 65B certified Computer output (Presenter) may present the computer output in paper form or in electronic form. If it is in electronic form and in good resolution, the image can be viewed by the signature verifier and a view can be taken just as we verify an ink signature on paper though some of the parameters of verification such as the ink absorption on paper, overlapping, pressure may become little difficult on the scanned image. But parameters like “angle”, “Size”, “Strokes” “The dashes and dots” etc are visible even in the scanned image. A good signature verifier can take a reasonably accurate view of the forgery.

However if the image is of low resolution or it is presented in a print form with unclear printing, then verification is as challenging as when we have a thumb print on paper with smudges.

Normally, a signature verifier refuses to provide a positive opinion unless the image is clear enough and this will apply to a “Verifier of an image of a signature in electronic form on a scanned document”.

It is necessary for us to appreciate that admissibility of electronic document based on the Section 65B certificate is a matter which is different from admitting the signature of a person in the document which is scanned.

In the case of a paper document, if a person produces a forged paper, the signatory is not objecting to the content per-se but only to the signature. It is quite possible that he may say, I am aware that this document was given to me for signature but I refused to sign. Hence “Admission of the document” as evidence does not automatically admit the “Signature within”.

When a signed document is presented by one party and it is challenged as a “Forgery”, it is the responsibility of the presenter to produce additional evidence including the handwriting expert’s opinion to prove the signature. Similarly, in the case of the Section 65B certified document also, though the document as a whole is admitted as evidence at the request of the presenter if the Section 65B certificate is satisfactory, the Court may still expect the presenter to prove that the  signature as it appears is that of the person to whom he is attributing it to. This means that the onus of getting a handwriting expert to confirm the signature lies with the presenter.

If the document is unclear, the handwriting expert may refuse to give a conclusive proof. If he gives a negative report and the document is section 65B certified by a person who is not a “Trusted third party”, then the certifier needs to have a credibility of his own as otherwise he may be charged for perjury by the Court.

A professional Section 65B certifier will not certify a doubtful document and take this risk and a professional handwriting expert will not take the risk of a positive identification based on unclear document.

Hence Section 65B certificate alone though makes the document admissible for trial does not guarantee the “Genuineness” to be taken as established.

The Supreme Court in the Basheer judgement was very clear in making a distinction between “Admissibility” and “Genuineness” and it comes in handy to protect the honest person in the above case whose signature is forged as alleged.

Hence Section 65B does not in any way create an adverse impact in the situation.

Naavi

Posted in Cyber Law | Leave a comment