SlideShare a Scribd company logo
1 of 4
 HYPERLINK 
http://www.neerajaarora.com/blatant-misuse-of-information-technology-act/
 Blatant misuse of Information Technology Act The blatant misuse of penal provision by the law enforcement agencies due to ignorance of law is not new. The same is true with technical legislations like Information Technology Act, 2000. As per the mandate of the IT Act, 2000, the offences under such Act has to be investigated by the police officer not below the rank of Deputy Superintendent of Police or Assistant Commissioner of Police where police commissioner-ate system is in force. Despite the investigation being given in the hands of superior officer, there have been instances where the IT Act, 2000 should have been invoked in crime situation, where it has been not been invoked and there are some cases where it has been invoked where it should not be. One such case was investigated by Delhi Police in which the provision of Section 67 Information Technology Act was wrongly added by misinterpreting the said section and subsequently the innocent person was arrested and sent to Tihar Jail for the offence which he never committed. Facts of the Case The complainant Avinash Bansal made a complaint at a local police station against Rohit who was a colleague of his wife, both of whom were working with a government department. The wordings of the complaint run as follows:- “Respected Sir, This is to bring to your most urgent notice that constant threats, firthy SMS messages, abusive telephone/Mobile calls are made by Rohit in connivance with his goonda friends/colleagues, one of them name Pramod. The content of SMS given from email id: rohit@rohitfriend.com at my mobile no. 98xxxxxxxx. 10/12/2004: Time (5:45 P.M to 6:00 P.M) Bloody wife or your fucking story? Stop calling my office & spitting foul words about me. You did it again today?  Yourself motherfucker? But instead, I am just warning you that KEEP AWAY FROM ME? HENCEFORTH? I don?t have any interest in your  If you do it again then you will be in deep shit? I hope this is clear to you? No more SMS or CALLS to me or to my office?  For a SMS like the one you sent me in the morning I would have replied? FUCK YOU & FUCK YOUR BELOVED WIFE? Arsehole? Go screw  It is prayed from police that I am constantly threatened, abused, physically assaulted by Rohit to fulfill his ill desire of marrying my wife Sunita. I am under constant pressure/threat/harassment by Rohit. Kindly strict action be taken against him to that he is not successful in fulfilling his mal intentions.” On the aforesaid complaint, initially a FIR was registered u/s 509/34 IPC and the investigation was taken by the local police. The local police arrested the accused Rohit and his friend Pramod and recorded the statement of the mother of the complainant who alleged to have received filthy messages about her on her son’s mobile no. 98xxxxxxxx which was found to be sent by Rohit and Pramod. The mobile phone detail of the complainant was also collected. During the investigation, the complainant Avinash Bansal made a submission to the local police for adding Section 67 IT Act, 2000, as the SMS he received on his mobile phone (which is an electronic medium) and read by his mother were filthy & obscene, and thus, Section 67 IT Act is applicable. The police in its wisdom (misinterpretation of IT Act) hastily added Section 67 IT Act, 2000 to the case without examining the issue in detail. However, subsequently the case was transferred to the Cyber Cell, EOW, Delhi Police. The Cyber Cell made a detailed investigation and examined the applicability of penal provisions including Section 67 IT Act which revealed that: The E-Mail address from which the obscene SMS was sent to the Mobile of the complainant was found in the name of Rohit, R/o xxxx, yyyy, New Delhi. The said E-Mail was found to be hosted from the server of M/s Rediff.Com India Ltd.  The mother of the complainant stated that her son Avinash Bansal & his wife Sunita have strained relations and a case of divorce is going on between them. She further stated that she checked the mobile phone of her son Avinash Bansal and found that the filthy messages about her were received on the mobile which was found to be sent by Rohit.  There is an ongoing dispute between the complainant and the alleged person Rohit. The complainant has earlier filed number of complaints against the alleged person Rohit. There has been a compromise signed between the alleged person Rohit & the complainant which reveals that there has been heated exchange of abusive SMS & calls between the alleged Rohit & the complainant. In the compromise dated 18/12/2004 signed by both the parties, the alleged person has stated in the said compromise letter that “I should not be troubled with SMS and calls to me or to my office.  The content of the SMS allegedly send by Rohit were restructured which reads as follows:  “For a SMS like the one you sent me in the morning I would have replied? FUCK YOU & FUCK YOUR BELOVED WIFE? Arsehole? Go screw Yourself motherfucker? But instead, I am just warning you that KEEP AWAY FROM ME? HENCEFORTH? I don?t have any interest in your Bloody wife or your fucking story? Stop calling my office & spitting foul words about me. You did it again today! If you do it again then you will be in deep shit? I hope this is clear to you? No more SMS or CALLS to me or to my office?” Thus, the contents itself indicates that the said message was sent by the Rohit in response to the message sent by complainant. However, the message send by the complainant could not be collected because the same was not preserved by Rohit. However, the mobile detail of complainant reflects the sending of SMS by him to Rohit. Legal Proposition No offence is made out The aforesaid sequence of the case clearly reveals that it is the animosity between two persons and the complaint has been filed by the complainant to settle his personal grudge against his old foe. Not only there has been blatant misuse of Section 67 IT Act but also the offence u/s 509 IPC is not made out either. Section 506 IPC There is an ongoing dispute between the complainant and Rohit and both have filed a number of complaints against each other.  The complainant in his complaint has himself stated that filthy SMS has been addressed to him.  The wording of the aforesaid SMS sent by Rohit reveals that the SMS is abusive and is sent in rage to the complainant in response to the SMS sent by the complainant to the alleged person.  Both the complainant and the alleged person are males and the SMS was sent by the alleged person with sole intention to offend the complainant. Though, the mother of the complainant has stated that she has read the message but the content, circumstances and the investigation reveals that the message was not intended for her. Thus, there is no intention of the Rohit to outrage the modesty of any female member of the family of the complainant and thus, section 509 IPC is not made out.  Section 67 Information Technology Act, 2000: As per the provision of the Section 67 IT Act, 2000 any information transmitted or published thru electronic form is obscene if:  It is lascivious or appeals to the prurient interest or If its effect is such as to tend to deprave and corrupt persons who are likely, to read, see or hear the matter contained or embodied in it. The wordings of the SMS are offending and abusive towards the complainant and by no stretch of imagination can be said to be obscene.  The message was given by the male person of adult age to other male person of the adult age and the wordings of the message of the SMS can at most be said to be offending and abusive sent by the complainant as an outrageous act with the sole intention to offend or hurt the complainant but the wordings of the SMS can hardly cause the feeling of lust or any kind of sexual reflections. Therefore, Section 67 of the IT Act, 2000 is also not attracted in the present case.  Thereafter, the cyber cell has cancelled the case and filed the cancellation report in the court which is pending adjudication. There is utmost need to make educate and train the police officers at the local police stations with respect to the applicability of the provision of Information Technology Act, 2000 to the crime situation. There should be at least one trained officer at the local police station who should be specifically trained & qualified in cyber crime investigation and the IT Law. Further, the officers at the cyber crime investigation cells should be drawn from qualified IT Professionals and special training sessions should be organized for them to keep them update about the ever changing scenario of the cyber crime situation. Note:  The name of the complainant and the accused persons have been changed for the sake of privacy. Neeraj Aarora (Advocate)
Blatant misuse of Information Technology Act
Blatant misuse of Information Technology Act
Blatant misuse of Information Technology Act

More Related Content

More from Neeraj Aarora

SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesSHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesNeeraj Aarora
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examinerNeeraj Aarora
 
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj Aarora
 
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_studentsNeeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_studentsNeeraj Aarora
 
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patentsNeeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patentsNeeraj Aarora
 
Neeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic auditNeeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic auditNeeraj Aarora
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj Aarora
 
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj Aarora
 
Current trends in cyber crime scenario
Current trends in cyber crime scenarioCurrent trends in cyber crime scenario
Current trends in cyber crime scenarioNeeraj Aarora
 
State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...Neeraj Aarora
 
DOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYDOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYNeeraj Aarora
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessNeeraj Aarora
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
 

More from Neeraj Aarora (14)

SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesSHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
 
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence act
 
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_studentsNeeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_students
 
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patentsNeeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
 
Neeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic auditNeeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic audit
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
 
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
 
Current trends in cyber crime scenario
Current trends in cyber crime scenarioCurrent trends in cyber crime scenario
Current trends in cyber crime scenario
 
Blowing the whistle
Blowing the whistleBlowing the whistle
Blowing the whistle
 
State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...
 
DOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYDOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITY
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert Witness
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 

Recently uploaded

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 

Recently uploaded (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Blatant misuse of Information Technology Act

  • 1. HYPERLINK http://www.neerajaarora.com/blatant-misuse-of-information-technology-act/ Blatant misuse of Information Technology Act The blatant misuse of penal provision by the law enforcement agencies due to ignorance of law is not new. The same is true with technical legislations like Information Technology Act, 2000. As per the mandate of the IT Act, 2000, the offences under such Act has to be investigated by the police officer not below the rank of Deputy Superintendent of Police or Assistant Commissioner of Police where police commissioner-ate system is in force. Despite the investigation being given in the hands of superior officer, there have been instances where the IT Act, 2000 should have been invoked in crime situation, where it has been not been invoked and there are some cases where it has been invoked where it should not be. One such case was investigated by Delhi Police in which the provision of Section 67 Information Technology Act was wrongly added by misinterpreting the said section and subsequently the innocent person was arrested and sent to Tihar Jail for the offence which he never committed. Facts of the Case The complainant Avinash Bansal made a complaint at a local police station against Rohit who was a colleague of his wife, both of whom were working with a government department. The wordings of the complaint run as follows:- “Respected Sir, This is to bring to your most urgent notice that constant threats, firthy SMS messages, abusive telephone/Mobile calls are made by Rohit in connivance with his goonda friends/colleagues, one of them name Pramod. The content of SMS given from email id: rohit@rohitfriend.com at my mobile no. 98xxxxxxxx. 10/12/2004: Time (5:45 P.M to 6:00 P.M) Bloody wife or your fucking story? Stop calling my office & spitting foul words about me. You did it again today? Yourself motherfucker? But instead, I am just warning you that KEEP AWAY FROM ME? HENCEFORTH? I don?t have any interest in your If you do it again then you will be in deep shit? I hope this is clear to you? No more SMS or CALLS to me or to my office? For a SMS like the one you sent me in the morning I would have replied? FUCK YOU & FUCK YOUR BELOVED WIFE? Arsehole? Go screw It is prayed from police that I am constantly threatened, abused, physically assaulted by Rohit to fulfill his ill desire of marrying my wife Sunita. I am under constant pressure/threat/harassment by Rohit. Kindly strict action be taken against him to that he is not successful in fulfilling his mal intentions.” On the aforesaid complaint, initially a FIR was registered u/s 509/34 IPC and the investigation was taken by the local police. The local police arrested the accused Rohit and his friend Pramod and recorded the statement of the mother of the complainant who alleged to have received filthy messages about her on her son’s mobile no. 98xxxxxxxx which was found to be sent by Rohit and Pramod. The mobile phone detail of the complainant was also collected. During the investigation, the complainant Avinash Bansal made a submission to the local police for adding Section 67 IT Act, 2000, as the SMS he received on his mobile phone (which is an electronic medium) and read by his mother were filthy & obscene, and thus, Section 67 IT Act is applicable. The police in its wisdom (misinterpretation of IT Act) hastily added Section 67 IT Act, 2000 to the case without examining the issue in detail. However, subsequently the case was transferred to the Cyber Cell, EOW, Delhi Police. The Cyber Cell made a detailed investigation and examined the applicability of penal provisions including Section 67 IT Act which revealed that: The E-Mail address from which the obscene SMS was sent to the Mobile of the complainant was found in the name of Rohit, R/o xxxx, yyyy, New Delhi. The said E-Mail was found to be hosted from the server of M/s Rediff.Com India Ltd. The mother of the complainant stated that her son Avinash Bansal & his wife Sunita have strained relations and a case of divorce is going on between them. She further stated that she checked the mobile phone of her son Avinash Bansal and found that the filthy messages about her were received on the mobile which was found to be sent by Rohit. There is an ongoing dispute between the complainant and the alleged person Rohit. The complainant has earlier filed number of complaints against the alleged person Rohit. There has been a compromise signed between the alleged person Rohit & the complainant which reveals that there has been heated exchange of abusive SMS & calls between the alleged Rohit & the complainant. In the compromise dated 18/12/2004 signed by both the parties, the alleged person has stated in the said compromise letter that “I should not be troubled with SMS and calls to me or to my office. The content of the SMS allegedly send by Rohit were restructured which reads as follows: “For a SMS like the one you sent me in the morning I would have replied? FUCK YOU & FUCK YOUR BELOVED WIFE? Arsehole? Go screw Yourself motherfucker? But instead, I am just warning you that KEEP AWAY FROM ME? HENCEFORTH? I don?t have any interest in your Bloody wife or your fucking story? Stop calling my office & spitting foul words about me. You did it again today! If you do it again then you will be in deep shit? I hope this is clear to you? No more SMS or CALLS to me or to my office?” Thus, the contents itself indicates that the said message was sent by the Rohit in response to the message sent by complainant. However, the message send by the complainant could not be collected because the same was not preserved by Rohit. However, the mobile detail of complainant reflects the sending of SMS by him to Rohit. Legal Proposition No offence is made out The aforesaid sequence of the case clearly reveals that it is the animosity between two persons and the complaint has been filed by the complainant to settle his personal grudge against his old foe. Not only there has been blatant misuse of Section 67 IT Act but also the offence u/s 509 IPC is not made out either. Section 506 IPC There is an ongoing dispute between the complainant and Rohit and both have filed a number of complaints against each other. The complainant in his complaint has himself stated that filthy SMS has been addressed to him. The wording of the aforesaid SMS sent by Rohit reveals that the SMS is abusive and is sent in rage to the complainant in response to the SMS sent by the complainant to the alleged person. Both the complainant and the alleged person are males and the SMS was sent by the alleged person with sole intention to offend the complainant. Though, the mother of the complainant has stated that she has read the message but the content, circumstances and the investigation reveals that the message was not intended for her. Thus, there is no intention of the Rohit to outrage the modesty of any female member of the family of the complainant and thus, section 509 IPC is not made out. Section 67 Information Technology Act, 2000: As per the provision of the Section 67 IT Act, 2000 any information transmitted or published thru electronic form is obscene if: It is lascivious or appeals to the prurient interest or If its effect is such as to tend to deprave and corrupt persons who are likely, to read, see or hear the matter contained or embodied in it. The wordings of the SMS are offending and abusive towards the complainant and by no stretch of imagination can be said to be obscene. The message was given by the male person of adult age to other male person of the adult age and the wordings of the message of the SMS can at most be said to be offending and abusive sent by the complainant as an outrageous act with the sole intention to offend or hurt the complainant but the wordings of the SMS can hardly cause the feeling of lust or any kind of sexual reflections. Therefore, Section 67 of the IT Act, 2000 is also not attracted in the present case. Thereafter, the cyber cell has cancelled the case and filed the cancellation report in the court which is pending adjudication. There is utmost need to make educate and train the police officers at the local police stations with respect to the applicability of the provision of Information Technology Act, 2000 to the crime situation. There should be at least one trained officer at the local police station who should be specifically trained & qualified in cyber crime investigation and the IT Law. Further, the officers at the cyber crime investigation cells should be drawn from qualified IT Professionals and special training sessions should be organized for them to keep them update about the ever changing scenario of the cyber crime situation. Note: The name of the complainant and the accused persons have been changed for the sake of privacy. Neeraj Aarora (Advocate)