Does DMCA pose a risk to Indian hosting companies also?

When a hosting company hosts user content, there is always a risk of the hosting company being charged for abetting the copyright infringement if any by the user. In India, intermediaries are subject to the “Due Diligence” requirement under Section 79 of ITA 2008 which inter-alia requires them to respond to a notice such as a “Take down notice” within 36 hours.

This “Act within 36 hours” does not mean that the hosting company needs to take down any content for which he has received a notice of objection from a member of public. It applies when a competent Court issues an order. There could be some doubt as to an action required when a notice comes directly from the police without a Court order. Normally the Police should respect the tradition of getting a Court order in case of either a suspected defamatory post or a copyright infringement. Neither the Police nor a complaining individual nor even the hosting company has the right to take a judgmental view about any content as to whether it is defamatory or infringing any copyright.  However, it would be necessary for the hosting company to reach out to the accused person who has posted a disputed content and initiate a “Show Cause” process followed by a mediation or arbitration before the next level of action is contemplated. In the meantime, a “Notice” may be displayed that the content is disputed so that visitors are informed and put on notice.

Obviously, copyright owners would not be satisfied with any half measures and would not only require a take down but also further action both civil and criminal on the person who infringed. As regards the hosting company, most copyright owners would be satisfied if a  quick action is taken to take down the offending content.

Under DMCA, four safe harbors have been provided for the service providers according to which the liability of the intermediary would be limited if certain precautions are observed. They are

a) Transitory digital network communications (eg:Network service providers who only transmit data)

b) System caching (eg: ISPs who cache content temporarily)

(c) Information residing on systems or networks at the direction of users

d) Information location tools (eg: Search Engines)

Each of the above have a set of particular conditions, all of which must be met to enjoy the protection of that safe harbor. Each safe harbor addresses a different aspect of potential copyright liability, and meeting the conditions of any one is sufficient to receive protection for the acts included in that safe harbor.

In order to address the concern of the copyright owners, Congress instituted a “Voluntary” notice and take down system so that the allegedly infringing material is removed quickly and then any infringement can be adjudicated in a copyright infringement suit. This system of “notice and take down” starts with a service provider designating an agent to receive notices by filing a form with the copyright office. Then copyright owners who believe that their works are available on a service provider’s system can send a notice to that service provider at the address available in an online database on the Copyright Office’s Web site.

Recently the copyright authorities have simplified the system by introducing an online facility to designate an agent and also reduced the fees for the registration.

Once a service provider wanting to avail itself of the safe harbors knows that its system has infringing material, that service provider must expeditiously remove or block access to the allegedly-infringing material. That knowledge can come from a proper notice from the copyright owner, or when the service provider is aware of facts or circumstances from which infringing activity is apparent. It is not necessary for a service provider to police its users, or guess that something may be an infringement.

In a case in which the notification that is provided to the service provider’s designated agent fails to provide the necessary knowledge, the service provider needs to promptly attempts to contact the person making the notification or takes other reasonable steps to assist in the receipt of notification that substantially complies with all the provisions.

Further, a service provider shall not be liable to any person for wrongful deletion of the content done in good faith when a proper notice has been received.

The service provider must notify the subscriber of any take down, and if the subscriber contests the take down, must restore the material within 14 business days. That provides the copyright owner time to file an infringement suit and get a temporary injunction ordering the continued removal of, or blockage of access to, the alleged infringing material.

There are some legal experts in USA suggesting that DMCA provisions need to be honoured by all service providers who may be serving content to US citizens. If this is true, then there will be need for affected Indian content providers to register their “DMCA agents” with the DMCA authorities.

Generally the provisions of DMCA also constitute the “Due Diligence” under Section 79 of ITA 2008. However, in the case of websites where the content is available to global audience, the risk of DMCA exercising its jurisdiction on Indian service providers is a cause of worry. There have been atleast two instances where DMCA has struck on people outside India. First was the case of a Russian programmer who was a project lead of a product infringing DMCA which was developed in Russia and distributed through a website in which the programmer was arrested while on a tour of USA. Second was a professor working in Japan who was extradited by the friendly Government to face the trial in USA. There is no reason to believe that such things would not recur in future also.

Hence the Indian copyright authorities need to ensure that DMCA is not applied to Indian conent providers bypassing the local laws.

For this purpose, it is necessary for the Indian Copyright Authorities to declare that “No action will be initiated against Indian constituents under any copyright law except through the Indian copyright authorities”.

Simultaneously the CERT IN should coordinate with the Indian Copyright Authorities in ensuring that those who follow ITA 2008 should not be harassed under the Copyright Act with “Take down notices” and “Penal action for not adhering to take down notices”.

This point had been made here several years back but the need for such “Indian Safe harbor” has not been addressed so far.

Naavi

Posted in Cyber Law | Leave a comment

Challenges to reach the cashless society

One of my friends and a prominent Cyber Security specialist Dr Rakesh Goyal of Mumbai has released a valuable article on Challenges for digital India a copy of which is available here.

Dr Rakesh has brought out the many challenges that are before us and also provides some of the solutions he thinks should be considered.

The paper is an excellent read and needs further discussion at the Government level.

Today, I also went through a video received through WhatsApp about a Chaiwala educating the public on the need for a surgical operation to remove black money”. This video in Kannada with English subtitles captures the mood of the ordinary men on the street and underscores several truths which some of us may fail to notice. I wish viewers need to go through the video and capture at least the essence of the narration.

Coming back to Dr Rakesh’s paper, it is interesting to note that he compares the cost of digital transactions vs savings of the Government if we move towards cashless society and makes a case for Government bearing part of the transaction cost. This will be one “Subsidy” which will be progressive.

Obviously Dr Rakesh raises the need to focus on interoperability and cyber security. These are not only concerns but also tremendous opportunities which I am sure IT savvy people will harness. Though in India we have so far seen little effort to invest in security, this time we hope things will be different. May be Government subsidy scheme can also consider how to drive the incentives towards a secure platform vs an insecure platform.

User awareness is ofcourse a challenge which is being addressed now through advertisements in the TV and Radio and should continue with the schools and colleges. Perhaps the public have a role in this education also.

Dr Rakesh also speaks of the legal issues and the need to protect the consumers. He points out the absence of a proper Cyber Insurance scheme for protecting the consumers. Government has a ready solution for this which is only being held up by the IBA and influential bankers. RBI is presently under pressure not to operationalize the August 11 2016 circular on Limited Liability which is a good starting point for protecting the interest of the consumers. The undersigned is trying to push RBI into taking a decision but so far not been able to persuade Dr Urjit Patel in taking action. Hopefully some thing is brewing and may happen soon.

Discussing the solutions, Dr Rakesh has suggested many measures which require a serious thought.

Hopefully the Government will take note of some of these suggestions and try to act on the same without any further delay.

Naavi

Posted in Cyber Law | Leave a comment

Reporting of Incidents to CERT-IN

CERT-IN has today released some advertisements in news papers reiterating the rules that require mandatory reporting of cyber incidents. The circular makes a reference to the notification dated 16th January, 2014 titled  “Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Functions and Duties) Rules ,2013” (Copy available here) in which under Section 12(1)(a), it is stated that “Any individual, organization or corporate entity affected by cyber security incident may report the incident to CERT-IN” .

Types of cyber security incidents that need to be reported to CERT-In are

  1. Targeted scanning/robing of critical networks/systems
  2. Compromise of critical systems/information
  3. Unauthorized access of IT systems/data
  4. Defacement of website or intrusion into a wbsite and unauthorized changes such as insertion of malicious code,links to external websites etc.
  5. Malicious code attacks such as spreading of cirus/Trojan/Botnets/Spyware
  6. Attacks on servers such as Database, Mail and DNS and network devices such as Routers
  7. Identiy Theft, Spoofing and Phishing Attacks
  8. Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks
  9. Attacks on Critical infrastructure, SCADA Systems and Wireless networks
  10. Attacks on Applications such as E Governance, E Commerce etc.

To facilitate such reporting CERT-In was to maintain an Incident Response Help Desk on 24 hour basis on all days including holidays .

The system incident reporting form can be downloaded from here. 

Incidents may be reported by the victims.  But for Service providers, Data Centers and Body Corporates, reporting of Cyber Incidents as per list provided under this rule is Mandatory”. Reporting should be done within a “reasonable period”.

If one peruses the reporting format, it is clear that it is drafted with a trained CISO in mind Small Companies Ordinary individuals  may not be either capable of identifying “Cyber Incidents” nor reporting properly in the form in which it is indicated.

The report may be sent to the helpdesk whose contact details are given below.

E-Mail: incident@cert-in.org.in

Ph: +91 1800 11 4949

Fax: +91 1800 11 6969

Now that CERT-In has issued a public advertisement, it is essential for them to exempt “Individuals” and “Non Corporate entities” as well as “Corporate entities with a turnover less than a reasonable amount” from this mandatory reporting system.

Though this rule was in existence since 2014 and CERT-In has the quasi judicial powers to start prosecution proceedings leading to imprisonment of upto 1 year for non submission of information, neither CERT-In nor the public had taken this rule seriously. They therefore were mostly non-compliant.

However, now there may be an increased attention of the industry on correcting the situation….thanks to de-monetization and consequent promotion of digital payments followed by a realization of the increased risks…

Naavi

Posted in Cyber Law | Leave a comment

Election Commission can draw lessons from Privacy Protection Principles for resolving black money issue

The Indian Election Commission has been suggesting that the Government should initiate measures to ensure that funding of election parties is properly accounted so that black money transactions are reduced. The present Government of Mr Modi has also shown a greater resolve than earlier Governments to tackle the issue of election funding. It is therefore time to find a proper solution to ensure that black money does not get generated in the election process.

For this issue there are two requirements that the EC and Government should address. First the artificial restriction on election expenses can be removed. Let political parties spend money as long as they account for it. Unaccounted cash expenses can be reduced to some negligible amount less than the current expenditure limits as a drive towards cash less election spending. At the same time the spending limits through digital payments which can be traced and accounted can be completely removed.

Having provided the freedom to spend the resistance of political parties to account the donations received can be reduced. Then the Government can reduce the unaccounted cash donations to some ridiculously low level of say Rs 100/-. Anything above Rs 100 has to be through digital payment system so that it is accounted. No more should an option be created for donations in cash upto Rs 20000/-.

However, the excuse for anonymous donations based on possible retribution by political opponents still remains to be tackled. Here we can adopt the time tested principles of “Privacy Protection” through de-identification of information for which ready tools are already available.

The essence of this election funding system is a “De-identification Portal for Election Funding” which runs like the “Anonymizer” as both a mobile App as well as a desktop tool. Any person who wants to contribute will open the app and will be allocated a transaction ID. The server issuing transaction ID does not know what is the amount of contribution but only maintains a mapping of the transaction ID to the Aadhar ID of the contributor or his finger print for aadhaar invocation.  The app will then connect to the payment gateway and complete the payment against the transaction ID. The Transaction ID server and the Payment gateway will both report the transaction to the tax authorities which alone will have the real identity of the contributor and the contribution. This is of course inevitable if we want to eliminate black money.

The de-identifcation transaction server can be maintained by the Election Commission or the IT auhorities. Private agencies may also be allowed to maintain such servers on a distributed service model so that the transaction IDs are handled randomly by different servers defusing the identification possibilities. There are more robust anonymization strategies through “Multi-split ID Management for anonymization” which Naavi has discussed earlier, to completely eliminate any private agency coming to know the real identity of the contributor so that there is no reason to fear any retribution.

If therefore there is a political will to eliminate black money in election process without the obnoxious suggestions such as “Public Funding” etc, here is a solution. Let the Election Commission and Mr Modi both consider this and adopt if they have the resolve.

Naavi

Posted in Cyber Law | Leave a comment

Cyber Appellate Tribunal to re-emerge as TDSAT

Five years after the Cyber Appellate Tribunal (CyAT) became dysfunctional because the earlier Chair Person retired, it is now reported that the Government may merge CyAT with TDSAT (Telecom Disputes Settlement and Appellate Tribunal).(View Report here)

According to the Government they are looking at rationalizing the tribunals and this move is keeping with that principle.

The move is at first glance to be welcomed from the point of view of reviving the dead CyAT. However, the TDSAT has so far been involved in high profile multi crore cases where as the CyAT normally handles small ticket cases in comparison. The difference in the culture of the two organizations needs to be taken note of before such a move is attempted.

Also, since CyAT is part of the ITA 2000, there will be a major amendment that would be required at ITA 2000 level and the merger cannot be a simple administrative note.

It appears that unable to find a Chair person and irked by the CAG report questioning the idle expenditure, Government has give an off the cuff answer without considring the pros and cons and more particularly how it may affect the interest of the cyber crime victims.

The TDSAT does not appear to be the forum which cyber crime victims will be comfortable with. From the Adjudicator to the TDSAT it would be a jump similar to going from a district court to supreme court. Victims would find the expense and procedures of TDSAT overwhelming.

I would urge the Government to drop the idea.

We may wait and see how the things develop.

Naavi

Posted in Cyber Law | Leave a comment

WhatsApp Admin not liable for member’s posting..Delhi High Court

For some time it has been a hot discussion whether a WhatsApp admin should be held liable for the contents posted by a member.  In several places, police have launched action against WhatsApp admins in such cases. It is however heartening to note that the Delhi High Court has in a recent decision has held that the Admin should not be held liable.

(See the report here)

In Ashish Bhalla Vs Suresh Chawdhary & Others [CS(OS) no 188/2016, IA No 4901/2016,IA 8988/2016, IA 9554/2016) the High Court of New Delhi has observed “…to make the administrator of an online platform liable for defamation would be like making the manufacturer of the newsprint on which defamatory statements are published liable for defamation”.

The case has been dismissed also for other reasons. But Netizens and WhatsApp admins should be happy with the remarks recorded in the judgement.

Naavi

 

Posted in Cyber Law | Leave a comment