Tomorrow is Digital Society Day of India: Let’s Resolve to Improve the Cyber Crime Complaint Management System in India

17th October is an important date for the Digital India. It was on this day in 2000, that India notified the Information Technology Act 2000 and brought for the first time, Legal Recognition for binary expressions or electronic documents.

As a result of this, just as Independent India came into being on August 15, 1947, a Judicially recognized “Digital Society of India” came into being from 17th October 2000. Prior to this an “Electronic Document” was not recognized in law. Hence whether it was a web page or an e-mail or a computer generated document, they had no validity as a legal evidence. Crimes done with electronic documents could not be proved under the normal laws. Business could not go to Court with their disputes based on electronic documents.

All this changed on 17th October 2000 when electronic documents or more specifically, binary expressions which the computer like devices could read and interpret became as valid as a “Paper” writings on which could be seen and interpreted by law. This legal recognition of electronic document along with legal recognition of authentication through digital signatures brought in the possibility of valid digital contracts into business transactions and gave a legal support to E Commerce.

Though there has been a further amendment to ITA 2000 in 2008, and one more is now under consideration, the fundamental change in the society could be ascribed to the ITA 2000 providing recognition to Electronic Document and authentication with which we have a “Digital Person”, “Digital Identity” and “Digital Transaction” that has the recognition in law.

Recognizing this important change in the society, Naavi has been advocating that this day namely the 17th October should be recognized and celebrated by India as the “Digital Society Day” and each of us should undertake such activities as would be beneficial to the Digital/Cyber Society of India.

Unfortunately, the Government is yet to recognize the importance of this day and hence we donot see any focussed activity to celebrate this day just as we celebrate other important days such as the “Privacy Day” etc. This itself indicates that we are yet to fully appreciate what a great change was brought to India on 17th October 2000. Today’s “Digital India” concept would not be a reality but for the laws that came into being on 17th October 2000.

We hope, if not this year, at least in the coming years, Government of India declares 17th October as the “Digital Society Day” and undertake special projects across law colleges and other academic institutions  that highlight the motto “Let’s Build a Responsible Cyber Society”.

Naavi.org has been highlighting different aspects of the Cyber Society for focus each year. Last year it was an year in which we said we need to fight Ransomware.

This year we dedicate ourselves to working for the “Improvement of the Cyber Crime Complaint Management System in India “.

Improving the Cyber Crime Complaint Management System recognizes that the present system where Cyber Crime victims lodge their complaints with the Police and wait for the resolution is not working well.

There is definitely the problem of “Awareness” of law both with the public, the Police or the Judiciary. This is being addressed by various institutions including the NPA and Judicial Academy. But awareness is not the whole problem.

However, beyond the creation of awareness, the next goal should be to check  how the knowledge and awareness converts into practical benefit to the society and how the Cyber Crime victims are responded to by the Police when they approach the Police Stations.

We should ask ourselves, whether it is only the lack of awareness which is causing a displeasure for the Cyber Crime victims or the “Reluctance” to handle the complaints that is increasingly becoming a cause of concern.

Naavi uses the Pentagon Model theory of Information Security Motivation in implementation of Information Security in organizations which includes five elements to be present simultaneously for Information Security practices to emerge in an organization. They are

a) Awareness: of Why, What and How

b) Acceptability: that it is required for self and society

c) Availability: of tools required to implement

d) Mandate: By law and internal policies

e) Inspiration: Created by specific programs

These five principles are like the five walls of a pentagon which should close properly for Information Security to be implemented.

The same principle also applies to the implementation of proper methods to improve the Cyber Crime Complaint Management System in our Law enforcement.

It is Naavi’s observation that we need to  improve this system of quick and effective response from the Cyber Crime Policing System if public are to be satisfied.

I urge academic institutions across the Country and the NGOs to undertake projects to identify the problems of Cyber Crime Victims in getting their disputes heard and resolved through as many activities as possible during the year so that we can move towards a better management of Cyber Crime complaints in the coming days.

Any suggestions and papers received in this regard for publications on Naavi.org is welcome.

Naavi

 






Posted in Cyber Law | Leave a comment

God Save India from Bitcoins

Today’s Times of India, Bangalore edition carries a full page Ad asking public to “Invest in Crypto Currency this festive season”

The publication is an advertorial feature under the name of Prafull Sawant with email ID response.mumbai@timesgroup.com.

The feature promotes Bitcoin as an “investible digital currency” and speaks of 300% appreciation, not likely to come down in value etc.

Though a mention has been made that RBI has cautioned user’s against the risks, the perception sought to be created by this ad is clearly to promote Crypto currencies and Bitcoin as an alternative to digital payment systems.

The Advertisement is unethical and the Advertisement Council of India should also look into it and take appropriate action.

In the meantime, it seems that the advertisers “ico.iworldonline.com” appear to have clearly dared Mr Narendra Modi, Amit Shah and Arun Jaitely speaking about elimination of Black money from India. Mr Modi and others should realize that we cannot allow promotion of Bitcoin and at the same breath talk of eliminating Black money.

Also note that the advertisement is coming from an “ico” umbrella. The domain has been registered by one “Alex Fedosseev, of , San Jose California” who maintains the site shown below.

This indicates that this advertiser is interested in promoting Initial Coin Offerings of other Crypto Currencies also.

The URL given in the advertisement also redirects to the following page.

This is a recipe for disaster as far as investors are concerned.

RBI and Finance Ministry cannot allow this promotion.

If therefore no action is taken immediately to stop this promotion, I would consider Mr Arun Jaiteley as Finance Minister and Mr Urjit Patel as RBI Governor personally liable for any losses that investors may suffer as a consequence of this advertisement.

I have separately sent e-mail notices to the concerned persons.

If Mr Modi cannot save India from Bitcoins, then we can only ask God to save India.

I wish other persons who genuinely are concerned with “Honest Tax payer’s Concerns” take this up further to those in the Government who seem to be deaf and dumb in this respect.

Naavi

Posted in Cyber Law | Leave a comment

Nabha Power Ltd Judgement and Implied Contracts

I invite reference to the  Report discussing the observations of the Supreme Court in the Civil Appeal No 179 of 2017, Nabha Power Limited  Vs  Punjab State Power Corporation Ltd.

The judgement has discussed several aspects of contracts which is very important for the community of web users and E Commerce to note. Naavi.org has discussed this on different occasions including the previous occasion when we discussed the Shapoorji Pallonji e-tender issue

In particular, there is a clear opinion on the “Express Terms of a Contract” and the “Implied Terms of a Contract” which are important in interpreting the online web contracts which have become ubiquitous.

The judgement refers to the principles to be considered when there is an express contract along with which the implied terms such as

  1. What the parties have expressed in the contract;
  2. An implied term is not to be added because the Court thinks it would have been reasonable to have inserted it in the contract.
  3. A term can only be implied if it is necessary in the business sense to give efficacy to the contract;

It was also observed that ” danger lies, however, in detaching the phrase “necessary to give business efficacy” from the basic process of construction of the instrument.”

Finally the  Supreme Court  arrived at a 5 condition test indicating when “Implied terms” may be taken note of over and above the “Express Terms” in a commercial contract. The five principles are,

  1. Interpretation should be reasonable and equitable
  2. Necessary to give business efficacy to the contract
  3. Meet the officious Bystander Test *
  4. Capable of clear expression
  5. Must not contradict any express terms of the contract

(Officacious Bystander Test: A suggested approach  to imagine a nosey, officious bystander walking past two contracting parties and asking them whether they would want to put some express term into the agreement. If the parties would instantly retort that such a term is “of course” already mutually part of the agreement then it is apt for implication)

However, The explicit terms of a contract are always the final word with regards to the intention of the parties. The multi-clause contract inter se the parties has, thus, to be understood and interpreted in a manner that any view, on a particular clause of the contract, should not do violence to another part of the contract.

The Court went on to conclude

“We may, however, in the end, extend a word of caution. It should certainly not be an endeavour of commercial courts to look to implied terms of contract. In the current day and age, making of contracts is a matter of high technical expertise with legal brains from all sides involved in the process of drafting a contract. It is even preceded by opportunities of seeking clarifications and doubts so that the parties know what they are getting into.

Thus, normally a contract should be read as it reads, as per its express terms.

The implied terms is a concept,which is necessitated only when the Penta-test referred to aforesaid comes into play. There has to be a strict necessity for it. In the present case, we have really only read the contract in the manner it reads.”

In the above judgement there was an express contract and the dispute was on the interpretation of some of the terms of contract where the “implied” interpretations came to the discussion table.

In the web contracts, the problem is that most of us use an online disclosure of terms and get the party whom we want to bind in a contract to simply click a hyper link which says “I ACCEPT” or such other words which imply that the person is signing off on the contract as presented. However, in India, since electronic documents need to carry a Digital Signature or an e-Sign, the web based “Click Wrap Contract” cannot be considered as equivalent to an express contract signed by parties to the contract. However it can be considered as an “Implied Contract” since by the circumstances and action of parties a contract can be implied. However when there is a dispute, the contract on the web which is not equivalent to a written contract under our law becomes a standard form contract which can be challenged as “unconscionable” if the terms are unreasonable.

In the subject judgement, Supreme Court has clarified that it will give weightage to the express contract and not the implied contract when there is a valid “Express Contract”. When there is no valid “Express Contract” a question will arise as to how the Supreme Court would interpret the “Implied Contract”.

May be we have to wait for some future time when another Supreme Court order may clarify this but if the Court gives validity to an “Undigitally signed electronic document” as if it is a valid contractual document, then it would be violating the requirements of ITA 2000/8. Hence it will have to disregard the existence of the web contract altogether and take it as an “Implied Contract” where only the “Penta-Test” will be the barometer that would determine every clause of the contract which is trying to be enforced.

This is an interesting challenge which will have to be tackled by every e-commerce consumer.

It is here that CEAC-Evidence Drop Box concept may come to the assistance of the consumer.

Naavi

Posted in Cyber Law | Leave a comment

How to Relieve Cyber Police in India of needless burden and make them more focused

We all agree that use of Cyber space by Common people is on the increase and has reached a level where we are worried about the internet/Mobile addiction and its adverse impact on the society. Government itself is encouraging a higher use of Internet through the Digital India program. E Commerce is also developing into a business model that is pushing the Citizens into online shopping and mobile Banking in a big way.

This is therefore a fertile ground for Criminals to take to Cyber Criminal activities and the Cyber Crime industry to grow faster than any other genuine business.

This will be the biggest headache for the Governments both at the Central and State level and needs to be addressed at the earliest. Despite the higher Cyber Crime and Cyber Security risks, the future is  where the population will take up to Internet even more.

Hence we need to learn to live with Cyber Crimes and find solutions on how to shield ourselves to the extent possible.

When the Citizen of the country faces any crime situation, the first friend he looks out is the Police. Hence whenever any citizen faces a problem arising out of Cyber Space, he will approach the Police for a solution. Cyber Crime police therefore have become the most sought after police personnel by the public.

However, the number of Cyber Crime cases are so huge that the Cyber Crime Police everywhere feel that they are over burdened and unable to do justice to their job. The requirement of building adequate skills are being addressed by different agencies within the Government including National Police Academy, along with the assistance of NASSCOM, DSCI, CDAC etc. to the extent possible. But the requirements are so huge that there will always be need to do more in this respect.

Governments in Center and States have not yet considered “Cyber Space Policing” as some thing which should be in the domain of “National Policing Structure” and clinging on to the age old concept of “Policing is a State Subject”. For border less crimes like Cyber Crimes, Policing have to be integrated at the International level but we are struggling here with a need for coordination within India. Just as we have brought a federal management structure for GST, we need to bring a”Federal Cyber Crime Management Council” under the Home Ministry to address the requirements of the Cyber Crime Policing and ensure that there is a single Cyber Policing authority for the whole country.

One Country one Police” should be implemented at least in the Cyber Crime scenario.

We wish that Mr Rajanath Singh has the same acumen as Arun Jaitely to bring about this reform in the coming days.

In the current structure, Cyber Crime Police are working with a systemic disadvantage even to work within their current skill levels and hence it is becoming increasingly difficult for them to manage complaints from public.

Public will not be able to understand and even if so, appreciate the difficulties of Cyber Crime policing and increasingly feel that their complaints are not addressed by the Police.

At the same time Police will continuously feel justified in rejecting Cyber Crime complaints because they know that they have no time to look into every complaint.

When we take note that even in celebrity cases like Hrithik Roshan complaint against Kangana Ranaut, the progress is slow, one can wonder how badly equipped are the Police in handling the volumes.

While Supreme Court and Legal luminaries are more worried about issues like “Privacy”, no body seems to consider that

it is a Fundamental Right of a Citizen of a Country to get his complaints heard by the Police.

The sense of “Security” that a citizen is entitled to, comes from the feeling that if he is facing discomfort from  a wrongful action from another, he can run to the Police for help and help will be available immediately.

Are Cyber Crime Police today capable of providing such security?.. The answer is clear and resounding “No”. Cyber Crime police stations are overwhlemed with cases and jurisdictional police stations lack expertise  and hence complaints just end up as “Acknowledgements” and most of the time confined to dust bins without any investigation.

If this situation is not addressed, soon people will stop even approaching the Police and start approaching private hackers to take their revenge. Just as we have allowed “Naxalism” to grow in the physical society, we will be seeding “Cyber Naxalism”.

Ten years from now the same Cyber Crime Police will be fighting more of Cyber Naxalism than affording protection to genuine Netizens.

We therefore need to act in such a manner that the burden of Cyber Crime Police is brought down (even while efforts to increase the work force may continue). The Capacity building that DSCI is trying to do through setting up of Cyber Labs need to continue but will not be sufficient to meet the requirements of the society.

Public will therefore continue to feel that Cyber Crime police are incapable and uninterested.

I request all my friends in the Police to respond with suggestions on how we can relieve the Cyber Crime Police from such tasks that are today taking up most of their times but is not resulting in the satisfaction of the complainants.

It is in this context that in the previous article  on Social media abuse, Naavi.org  pointed out that the solution lies with the intermediaries like Google and ISPs to shed their practice of “Hiding the IP address” and “Requiring Police or Judicial intervention for revealing the identity of e-mail senders and domain name owners”.

We know that these ISPs are not keen on considering Citizen’s interests but are more concerned about the rights of Criminals. It is like our Human rights organizations who are more concerned about the victims of police atrocities but not when Police or Army are itself victims of Abuses.

We therefore suggest Supreme Court hearing the petition on Social Media Abuse should take action as suggested herein.  The Home Ministry and the IT Ministry should advise the Attorney General to request the Supreme Court to mandate some of the suggestions which I have tried to make here and in my earlier article on Social Media abuse.

What I have pointed out in this article which I would like to reiterate is that

  1. ISPs like Google should provide the “Originating IP Address” with all e-mails going out of their system. “Hiding IP Address by ISPs” should be considered as”Abetment to Spamming” and should be discontinued forthwith.
  2. The ISPs in India should introduce a mechanism where by any person who is a recipient of an electronic message can file an e-mail request with the ISP to seek information of the sender to the last level of name and address of the IP address owner. 
  3. Other network owners should also be compelled to introduce similar measures where by they should provide the information of the identity of the sender of a message when the request is made in a proper manner.

Any non cooperation in this respect should be recognized as an offence.

Presently, under Section 69B, the Secretary of IT at DeiTy has the powers to seek “Traffic Information” failing which there could be 3 years imprisonment to the Intermediary’s CEO and executives.

This power should not be reserved for handling only political requirements but should be extended to the members of the Public.

To extend its scope,

Government should designate a number of persons all over India to act as “Nodal Officers” who can receive public requests and send properly structured requests to Intermediaries so that they may revel the information sought without affecting their commitment to Privacy.

Implementation of this suggestion  does not require any change of law or even the rules but a simple administrative instruction. Hence there should be no excuse in implementing this suggestion unless “Providing the Sense of Security to Netizen Citizens of India is not the priority of the Government of India”.

In the meantime  Mr T.K.Vishwanathan Committee on ITA 2008 amendment can also take note to declare that “Hiding identity of IP addresses which are used for misuse” is considered as an abetment to Spamming and punishable. The committee can suggest separate rules though I feel that the existing rules under Section 69B itself is sufficient to bring in this change.

The effect of this change would be that most Cyber Crime complaints will first land with these Nodal officers who can acknowledge the receipt of the complaint and forward it to the Police for their records to meet the CrPc requirements. These nodal agencies can issue “IP resolution Requests” to Google and other e-mail service providers as part of the law enforcement authorities. They can then send requests to the ISPs and obtain the details of the end user network. They can also send further request to the network owners to identify the ultimate user of the device from which the abusive mail was sent or a domain was registered.

This three step identification process will provide the identity of the perpetrator of the crime to the victim and he can there after take action either to formally approach the Police or a Court for Civil remedies.

In many cases the complainant may decide not to pursue the case or pursue it only for Civil remedies. The Police will therefore be out of such complaints.

As regards the procedure for requesting the Nodal officer, the key is that complaint should be allowed only by an identified complainant ..such as with Aadhaar ID and a digitally signed (or e-signed) request. As long as the complainant is declaring that “He is feeling that his Privacy or Security is being adversely affected by the act of the sender of the message”, there is no need for any other reason to refuse the request.

This should be handled like an RTI query through a web form (enabled for e-sign) and automatically acted upon so that IP resolution happens in real time.

There could be a general declaration that the complainant accepts that he shall be punishable if he fakes his identity or the reason for seeking the information.

I request that the Central Government takes this suggestion seriously and implement  some or all of the above suggestions to bring relief both to the Cyber Crime Police Stations and to the Public.

I also wish that organizations such as Center for Internet and Society or the media houses such as “Republic” should undertake a study on the “Satisfaction Level of Public in India on Cyber Crime Policing” in India and provide some feedback to the Government on whether Cyber Crime Policing could improve with such measures.

If “Digitization of India” is an election issue, “Efficient Cyber Crime handling” is also an election issue and hence the media houses need to flag this in their election surveys at least in the urban areas.

Any suggestions are welcome. I wish all right thinking persons should join this debate.

Naavi

 






Posted in Cyber Law | 2 Comments

Social Media Use for Abuse…root cause is Privacy and Anonymity..Solution is on hands..if we care..

Eminent lawyers of the country seem to have taken up a fight against Social Media for enabling “abusive content”.

According to the news reports, they are demanding that Supreme Court should consider “Regulation of Social Media”.

However, we need to point out that Supreme Court should not be diverted from the core issue into getting into regulating social media though this would make a good media copy.

Some time back when Supreme Court scrapped Section 66A of ITA 2000, Naavi.org was a lone dissenting voice stating in no unclear terms that Supreme Court was wrong.The advocates who are now crying hoarse against Social Media had words of great praise for scrapping of Section 66A. (Refer articles here).

Our opposition to Section 66A scrapping was that it was a wrong medicine for the problem which was the wrongful arrest of citizens for innocuous social media activities. The decision was faulty since Section 66A was not meant for addressing abusive posts on Twitter and Facebook but was wrongly blamed. As a result, Cyber Bullying, Cyber Stalking, Harassment through E-Mails, SMS, Spamming and Phishing all went  out of the regulation under Section 66A.

Under the guise of protecting the “Freedom of Speech”, the Supreme Court in this Shreya Singhal judgement gave a “License to Abuse”. What we are observing today has the origin in the perception that “Section 66A was scrapped by Supreme Court because social media abuse was considered as a part of the fundamental right to freedom of speech”.

It is therefore amusing that the same eminent lawyers and the Supreme Court as well as the conventional media are now converging on an attempt to gag the Social Media under some pretext.

If Supreme Court withdraws its Shreya Singhal judgement and reinstates Section 66A, it would be one of the best and easy solutions to reverse the perception.

It must be reiterated here that the arrests of innocent citizens under Section 66A which led to the decision  of scrapping the section was born out of a mis-interpretation of the Police that the section was applicable to “Publishing” in the social media such as FaceBook and the Twitter. The Courts at all levels failed to call the mistake and took to grandstanding as “Champions of Freedom of Speech” and scrapped the section.

Now it appears that the Eminent Jurists are again creating a situation that may lead to another bad decision as regards Social Media.

In the present instance, abuses on Social media can be addressed (in the absence of Section 66A) through relevant sections of IPC provided the electronic evidence is properly presented with Section 65B certification. Hence there is legal protection against misuse of the Social Media except for procedural issues that may require attention. If Section 66A is reinstated, situation would improve substantially.

However, the root problem of Social Media use for abuse is not that there is a freedom to publish anything including irresponsible content but the fact that it can be done “Anonymously”. The same eminent jurists and the Supreme Court are responsible for creating a false impression in the society that “Privacy is protected by hiding one’s identity in social media communications”.

Again, it is not the issue whether “Privacy” is an important fundamental right and needs to be protected or not… but whether the current manner in which we are protecting Privacy through enabling “Anonymity” is the right way to protect Privacy.

All Twitter and Facebook abuses as well as WhatsApp misuse can be stopped if in case of misuse the persons responsible can be identified easily and simply named and shamed. But we are not prepared to do it because we feel “Privacy” right is being curtailed by making the identity of Social Media users hard to get at except with an FIR or Court direction.

We track the location of users of Computers and Mobiles to the last meter to display restaurants around us or for hailing a cab, but we are not prepared to track the location of the social media abusers.

The Twitter and Facebook IDs are dependent on the e-mail IDs of the owners and its use pattern. Similarly, website IDs are dependent on domain name registrations which again are linked to e-mail IDs.

Hence behind most of the issues that we face today and call Cyber Crimes or Social Media abuses, there is a hidden e-mail ID. If Google happens to the biggest e-mail provider, then it is the reason for most of these crimes being encouraged and abetted by the false sense of Privacy protection that the society is now supporting.

I have recently raised a query with Google why it should not take the mandatory consent of the recipients of Gmail to automatically know the originating IP address of the sender. If as a part of the Gmail setting, I declare that all incoming emails should be accepted only if the originating IP address is revealed to the recipients, Google can put in a system where the senders would be notified that their email will be delivered to the destination address only if they permit revealing the originating IP address to the addressee.

This is a simple technical correction which the Supreme Court can mandate if they are really concerned about the social media abuse.

In a similar manner, the dynamic IP address of the ISP or the owner of a mobile  should also be automatically revealed at the request of a recipient of an e-mail or SMS or Call for which ISPs can put in a system where by the request is made by an identified citizen of India (say under his Aadhaar identity) and a declaration that he is in receipt of an e-mail or mobile communication from the person whose identity is being sought and a further assurance that if his request is on false grounds, he may be prosecuted for “Breach of Privacy under false pretensions”.

This is also a simple technical correction which the Supreme Court can mandate if they are really concerned about Social Media abuse.

I therefore call upon the honourable Chief Justice of India, Mr Dipak Sharma and responsible advocates mike Mr Harish Salve that they should consider these suggestions.

I request readers who re rightly connected, to pass on this request to Mr Harish Salve and Justice Dipak Mishra since they are unlikely to be otherwise informed about the “Solutions” and would be bogged down with the “Problems”.

Naavi






Posted in Cyber Law | Leave a comment

How to Avoid Shapoorji-Pallonji dilemma in e-tendering?

We continue our academic debate on the recent case of Shapoorji Pallonji Vs MHADA  in which the company challenged the e-tender bidding process followed for the award of a major Rs 11000 contract  for reconstruction of BDD Chawls and successfully obtained a ruling that they should be allowed to participate in the bid, though there was a dispute as to whether the bid process was properly concluded or not.

We have already discussed the details in the earlier articles and from the available information it is reported that NIC had created the e-tender system which involved a process of uploading tender documents encrypted with the public key of the tender authority into the server and then clicking a button “Freeze Bid”. The petitioner in this case contended that they were able to successfully upload the document and they got “Successfully Uploaded” message on the screen. However, there after they logged out and the requirement of clicking the “Freeze Bid” button was not displayed. NIC confirmed that the freezing of the bid was not logged in the server and hence the process was not complete.

The reason that the button was not displayed could be due to any number of technical reasons either at the server end or at the user end or at the intermediary network services level. This was considered as a “Technical Glitch” and the Court agreed with the contention that technical glitches should not be allowed to prevent an otherwise valid bid to be taken into consideration.

At this time, I am not going into further debate on this issue and as I have mentioned several times, I donot have any specific vested interest in Ms Shapoorji Pallonji getting an entry into the bid or finally winning it etc. Hence the legal team of Shapoorji Pallonji which consists of some of my friends, need not get upset about what I am objecting to. I am only debating the possibility that if we admit that any unsuccessful e-commerce contracting party can raise non fulfillment of an online process due to claimed technical glitches as a defence to void the contractual requirements, it would create a bad precedent and makes life difficult for all e-commerce entities. I therefore feel if there was any other “Public Good” reasons which required the petition to have been allowed, it should have been allowed under those grounds rather than under the “Technical Glitches” reason.

However, I need to answer one of the points raised by a friend stating

” If you insist the onus of having clicked the freeze button should be on the end point  you are effectively saying all individuals must now have cameras behind them recording their actions. That is just not going to work. “

This is the Shapoorji Pallonji dilemma which is not unique to this case but to any transaction in which electronic documents are relied upon and transaction is considered evidentially important.

We must appreciate that at present, according to Indian law, “Click Wrap Contract” is not considered as a valid “Signed Contract”. Unless a contract is digitally signed by both the offeror and the acceptor, a valid digital contract like a written and signed contract cannot be completed.

The Income Tax department and MCA authorities have therefore adopted a process where at the stage of submitting a return, the entire document is captured in toto and a Digital Signature or e-Sign is applied on the web form and then sent to the receiver.

However, what most E Commerce parties are doing is to adopt the US practice of providing a button at the bottom of a contractual document saying “I Accept” or some other similar words. Some people add an affirmative action such as ticking the check box or having a captcha. Others ignore even this precaution.

In such cases, we consider the contract as a “Deemed Contract” where the contract is implied by circumstances evidenced by the meta data of the transactions but detailed terms of contract is considered as open to dispute as per the usual considerations of an “Unconscionable Contract” and “Standard Form Contract” for which several Supreme Court judgement have set the standards. All practicing advocates should know these cases and there is no need for me to repeat a reference here. I have used the references successfully in the adjudication case of S.Umashankar Vs ICICI Bank which is too old for many to remember, except for its historical importance.

It appears that the NIC tender process has also adopted this “Deemed Contract” principle at least to the process of submission of the tender documents….such as Log in with your registered log in ID and password, upload the documents, click the “Freeze Bid” button etc.

There is a dispute that NIC did not give proper instructions in this regard which is outside the  scope of my knowledge and I leave it to the NIC to confirm or deny beyond what they have already done in the affidavit before the Court which has been rejected.

Whether the process of tendering was completed or not is a “Sub Contract” to the tender process and it has to be analyzed in the “Deemed Contract Status”.

In a deemed contract, either party can dispute on the details and that is what has happened in this case. I suppose the Court has considered all angles and come to a proper decision and if not,  it is for the parties concerned to challenge it in a higher Court.

However, can this process of “Uncertain Deemed Contracts” driving e-commerce transactions and the high value e-tendering systems be allowed to prevail? or should we have a solution? is a matter of concern for “Non Practicing Blog Writers” who are more concerned about the “System” rather than an individual litigant. Practicing advocates argue for one party today and another party the other day while “Non Practicing Blog Writers” have to be accountable for their views to the public and justify change of opinion with reasoning if required.

The Undersigned has anticipated this type of problems several years ago when he launched the services of ceac.in (Those who are unaware, can go through it once again).

Under CEAC service “Certification of a Web Page” now also upgraded as “CEAC-Evidence Drop Box”, it has been suggested that whenever people take critical decisions based on a web document, it is prudent to record the document and get it certified under Section 65B of IEA.

I have submitted many such documents in the case of web based copyright infringements, defamation, matrimonial cases etc. Very recently, there was a demand from a customer who had lost all his accounting records stored on a server in USA which was attacked by a ransomware to show case the evidence that his records were destroyed by the ransomware and the same was provided by CEAC.

Unfortunately many may not  know the existence of such services and I donot have the habit of advertising the same as often as I should perhaps do. Hence people may not know either that such trusted third party services have been available since 2002 nor that the requirements can be fulfilled if not with CEAC, with others.

The CEAC-EDB service is specially designed for requirements which Shapoorji Pallonji persons encountered when they were preparing to submit their documents for a huge contract in the last minutes where there was no time left for alternate submission if the technology had failed.

The idea here is that since there is no time to invite an expert Section 65B certifier to record the process in his presence, and also that it has to be done from the premises of the user and in his computer, the user foregoes the need to involve a trusted third party for recording the observation but does the next best thing of “Archiving” the process with a trusted third party at a time no dispute has arisen so that it can be produced as evidence that the process was completed in a certain manner and there was a technical glitch which appeared as a “Error Statement on the screen” or simply by “Nothing appearing on the screen”.

I am sure that some of the informed readers will suddenly jump to other debate of Section 65B certification but we can keep that discussion for a different time.

I recently submitted one Section 65B certified statement of “Certified E Mail Delivery” to a respondent at the instance of a petitioner so that the Court could proceed with the hearing ex-parte since the respondent was not cooperating in the litigation. Similarly, the “Archival of a user end electronic activity” would be certified as to the “Archival”. It is open to the defendant to raise any argument that the archived document itself was fabricated and the archival cannot save the defense. But the onus of proof will be on the defendant that the document is in fact fabricated. The “Archival” will prove the good faith of the user in recording a process before he was aware that it could land in a dispute and Courts may consider it as better than trying to approach the m without any documentary evidence.

In the Shapoorji Pallonji case, a screen shot was reportedly produced but I am not sure if it was Section 65B certified. Also the point of dispute is more on what happenned after the screen showed “Successfully Uploaded”. Did it go blank? Or was the system shut off immediately without waiting for the next screen to appear? etc. This was not clearly established except through the statement of the petitioner. Had they properly recorded the entire process including a few seconds after the uploading of the documents, a better evidence would have been available. The dispute arose only after the bid was rejected by the committee and had the documents been archived earlier with  a trusted third party, the evidence would have been stronger.

I agree that in this case,  Court was not that strict but if objection had been raised by other bidders, or MHADA had not agreed to accommodate the estranged bidder, Court would have been perhaps stricter. It is better for parties engaged in high value bidding not to take the risk that Court will be always considerate to them to accept the “Technical Glitch” excuse and condone any failure of the tendering process.

Hope this clarifies what I think about “Should we always carry a Camera..”?

Naavi

Also See: 

The e-tendering issues in Maharashtra.. “Uploading” is not the same as “submitting” the tender  

The Pandora’s box of Technical Glitches opened……2: MHDA and NIC need to take not

 The Pandora’s box of Technical Glitches opened….The e-tender judgement in Maharashtra…1

Posted in Cyber Law | Leave a comment