SlideShare a Scribd company logo
1 of 8
BY SAURAV GUPTA
Page 1
Nitty Gritty Of Social Media Regulations
Social media has been defined and designed divergently by many authors and sources. Some of
the prominent, eminent and pre-eminent definitions and connotations given to the word SOCIAL
MEDIA are:
 “Social media are primarily Internet-based tools for sharing and discussing information
among human beings.” - Wikipedia
 “A category of sites that is based on user participation and user-generated content. They
include social networking sites like LinkedIn, Facebook, or My Space, social bookmarking
sites like Del.icio.us, social news sites like Digg or Simpy, and other sites that are centered
on user interaction.” - Lazworld
 “Online technologies and practices that people use to share opinions, insights, experiences,
and perspectives with each other.” - tvb.org
 “Social media are works of user-created video, audio, text or multimedia that are published
and shared in a social environment, such as a blog, wiki or video hosting site.” - Capilanou
 “An umbrella term that defines the various activities that integrate technology, social
interaction, and the construction of words and pictures.” - Anvil Media
 “Software tools that allow groups to generate content and engage in peer-to-peer
conversations and exchange of content (examples are YouTube, Flickr, Facebook, MySpace
etc).” - Bottle PR
 “Social Media is the collection of tools and online spaces available to help individuals and
businesses to accelerate their information and communication needs.” - Axel Schultze
Our day embarks and adieus with social media. GOOD MORNING FRIENDS is our official
onset of a day in facebook whereas GOOD NIGHT FRIENDS is our way of putting a stop to
our day in twitter. Be it sharing a glitch or expressing a glee on a solved hitch, be it a hilarity on
a new born baby or mourning with despair for the loss of close one, be it expressing a gratitude
or mutinying on loath, we ventilate all in social media. Social media is a hub for all emotional
array.
BY SAURAV GUPTA
Page 2
As the name suggests, “SOCIAL MEDIA”, it brings together many people of different genre.
Some users are erudite while some are amateurish. Social Media brings together inhabitants of
diverse nature and mindset. They say, if we are human, we have emotions. Behaviorism is a
guiding factor for any individual. The most precious and susceptible matter in this world is
SENTIMENT. A set of information may appear rapture for a particular set of coterie whereas;
the same may be a matter of melancholy for different set of coterie. With diverse multitude,
comes different sentiment. With diverse sentiments, comes different state of mind. With diverse
state of mind, begins anarchy. To curb this situation of disarray and to create a sense of
hegemony over the flamboyance expression of thoughts by proletariat representing varied
upbringings, Indian government came up with INFORMATION TECHNOLOGY
ACT,2000(NOW AMENDED 2008). India is a democratic country and freedom of expression of
thought is viable in this country. Information Technology Act restricts the freedom of expression
of thought in parlance to its operation in social media. The act is designed to curb the
flamboyance in expression of thought and to mandate adequate code of conduct while handling
social media.
Information Technology Act was primarily based on UNICITRAL model law on e-commerce.
Attempts were made in year 1998 for introducing law pertaining to information technology in
India but the Information Technology Act was passed only in June,2000. The Government of
India has brought major amendments to ITA-2000 in form of the Information Technology
Act,2008.ITAA 2008 (Information Technology Amendment Act,2008) as the new version of
Information Technology Act,2000 is often referred has provided additional focus on Information
Security. It has added several new sections on offences including Cyber Terrorism and Data
Protection. A set of Rules relating to Sensitive Personal Information and Reasonable Security
Practices (mentioned in section 43A of ITAA, 2008) was released in April 2011. Information
technology Act, 2000 extends to the whole of India and, save as otherwise provided in this Act, it
applies also to any offence or contravention there under committed outside India by any person.
Section 75 of ITA, Act to apply for offence or contraventions committed outside
India
(1) Subject to the provisions of sub-section (2), the provisions of this Act shall apply also to any
offence or contravention committed outside India by any person irrespective of his nationality.
(2) For the purposes of sub-section (1), this Act shall apply to an offence or contravention
committed outside India by any person if the act or conduct constituting the offence or
contravention involves a computer, computer system or computer network located in India.
FEW OFFENCES AND PENALTIES UNDER INFORMATION TECHNOLOGY ACT,
2000(Now amended 2008)
BY SAURAV GUPTA
Page 3
Section 65 of ITA deals with ‘Tampering with Computer Source Documents.’
Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly
causes another to conceal, destroy or alter any computer source code used for a computer,
computer programme, computer system or computer network, when the computer source code is
required to be kept or maintained by law for the time being in force, shall be punishable with
imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with
both.
Explanation - For the purposes of this section, "Computer Source Code" means the listing of
programmes, Computer Commands, Design and layout and programme analysis of computer
resource in any form.
Section 66 A of ITA deals with Punishment for sending offensive messages through
communication service, etc.
Any person who sends, by means of a computer resource or a communication device,-
a) any information that is grossly offensive or has menacing character; or
b) any information which he knows to be false, but for the purpose of causing annoyance,
inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill
will, persistently makes by making use of such computer resource or a communication device,
c) any electronic mail or electronic mail message for the purpose of causing annoyance or
inconvenience or to deceive or to mislead the addressee or recipient about the origin of such
messages
shall be punishable with imprisonment for a term which may extend to two three years and with
fine.
Explanation: For the purposes of this section, terms "Electronic mail" and "Electronic Mail
Message" means a message or information created or transmitted or received on a computer,
computer system, computer resource or communication device including attachments in text,
image, audio, video and any other electronic record, which may be transmitted with the message.
Section 66 B of ITA deals with ‘Punishment for dishonestly receiving stolen computer
resource or communication device.’
Whoever dishonestly receives or retains any stolen computer resource or communication device
knowing or having reason to believe the same to be stolen computer resource or communication
device, shall be punished with imprisonment of either description for a term which may extend to
three years or with fine which may extend to rupees one lakh or with both.
Section 66C of ITA deals with ‘Punishment for identity theft.’
Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other
unique identification feature of any other person, shall be punished with imprisonment of either
description for a term which may extend to three years and shall also be liable to fine which may
extend to rupees one lakh.
Section 66D of ITA deals with ‘Punishment for cheating by personation by using
computer resource.’
BY SAURAV GUPTA
Page 4
Whoever, by means of any communication device or computer resource cheats by personation,
shall be punished with imprisonment of either description for a term which may extend to three
years and shall also be liable to fine which may extend to one lakh rupees.
Section 66E of ITA deals with ‘Punishment for violation of privacy.’
Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area
of any person without his or her consent, under circumstances violating the privacy of that
person, shall be punished with imprisonment which may extend to three years or with fine not
exceeding two lakh rupees, or with both
Explanation- For the purposes of this section—
(a) ―transmit‖ means to electronically send a visual image with the intent that it be viewed by a
person or persons;
(b) ―capture‖, with respect to an image, means to videotape, photograph, film or record by any
means;
(c) ―private area‖ means the naked or undergarment clad genitals, pubic area, buttocks or female
breast;
(d) ―publishes‖ means reproduction in the printed or electronic form and making it available for
public;
(e) ―under circumstances violating privacy‖ means circumstances in which a person can have a
reasonable expectation that—
(i) he or she could disrobe in privacy, without being concerned that an image of his private area
was being captured; or
(ii) any part of his or her private area would not be visible to the public, regardless of whether
that person is in a public or private place.
Section 66F Of ITA deals with ‘Punishment for cyber terrorism.’
(1) Whoever,-
(A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror
in the people or any section of the people by –
(i) denying or cause the denial of access to any person authorized to access computer resource; or
(ii) attempting to penetrate or access a computer resource without authorisation or exceeding
authorized access; or
(iii) introducing or causing to introduce any Computer Contaminant.
and by means of such conduct causes or is likely to cause death or injuries to persons or damage
to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption
of supplies or services essential to the life of the community or adversely affect the critical
information infrastructure specified under section 70, or
(B) knowingly or intentionally penetrates or accesses a computer resource without authorisation
or exceeding authorized access, and by means of such conduct obtains access to information,
data or computer database that is restricted for reasons of the security of the State or foreign
relations; or any restricted information, data or computer database, with reasons to believe that
such information, data or computer database so obtained may be used to cause or likely to cause
injury to the interests of the sovereignty and integrity of India, the security of the State, friendly
BY SAURAV GUPTA
Page 5
relations with foreign States, public order, decency or morality, or in relation to contempt of
court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of
individuals or otherwise, commits the offence of cyber terrorism.
(2) Whoever commits or conspires to commit cyber terrorism shall be punishable with
imprisonment which may extend to imprisonment for life’.
Section67 of ITA dealswith ‘Punishmentforpublishingor transmitting obscene material in
electronicform.’
Whoever publishes or transmits or causes to be published in the electronic form, any material
which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave
and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or
hear the matter contained or embodied in it, shall be punished on first conviction with
imprisonment of either description for a term which may extend to two three years and with fine
which may extend to five lakh rupees and in the event of a second or subsequent conviction with
imprisonment of either description for a term which may extend to five years and also with fine
which may extend to ten lakh rupees.
Section 67 A of ITA deals with ‘Punishment for publishing or transmitting of material
containing sexually explicit act,etc. in electronic form.’
Whoever publishes or transmits or causes to be published or transmitted in the electronic form
any material which contains sexually explicit act or conduct shall be punished on first conviction
with imprisonment of either description for a term which may extend to five years and with fine
which may extend to ten lakh rupees and in the event of second or subsequent conviction with
imprisonment of either description for a term which may extend to seven years and also with fine
which may extend to ten lakh rupees.
Exception: This section and section 67 does not extend to any book, pamphlet, paper, writing,
drawing, painting, representation or figure in electronic form-
(i) the publication of which is proved to be justified as being for the public good on the ground
that such book, pamphlet, paper, writing, drawing, painting, representation or figure is in the
interest of science,literature,art,or learning or other objects of general concern; or
(ii) which is kept or used bona fide for religious purposes.
Section 67 B of ITA deals with ‘Punishment for publishing or transmitting of material
depicting children in sexually explicit act, etc. in electronic form.’
Whoever,-
(a) publishes or transmits or causes to be published or transmitted material in any electronic form
which depicts children engaged in sexually explicit act or conduct or
(b) creates text or digital images, collects, seeks, browses, downloads, advertises, promotes,
exchanges or distributes material in any electronic form depicting children in obscene or
indecent or sexually explicit manner or
(c) cultivates, entices or induces children to online relationship with one or more children for and
on sexually explicit act or in a manner that may offend a reasonable adult on the computer
resource or
(d) facilitates abusing children online or
BY SAURAV GUPTA
Page 6
(e) records in any electronic form own abuse or that of others pertaining to sexually explicit act
with children, shall be punished on first conviction with imprisonment of either description for a
term which may extend to five years and with a fine which may extend to ten lakh rupees and in
the event of second or subsequent conviction with imprisonment of either description for a term
which may extend to seven years and also with fine which may extend to ten lakh rupees:
Provided that the provisions of section 67, section 67A and this section does not extend to any
book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form-
(i) The publication of which is proved to be justified as being for the public good on the ground
that such book, pamphlet, paper writing, drawing, painting, representation or figure is in the
interest of science, literature, art or learning or other objects of general concern; or
(ii) which is kept or used for bonafide heritage or religious purposes
Explanation: For the purposes of this section, "children" means a person who has not completed
the age of 18 years.
Section 72 of ITA deals with ‘Breach of confidentiality and privacy.’
Save as otherwise provided in this Act or any other law for the time being in force, any person
who, in pursuant of any of the powers conferred under this Act, rules or regulations made there
under, has secured access to any electronic record, book, register, correspondence, information,
document or other material without the consent of the person concerned discloses such electronic
record, book, register, correspondence, information, document or other material to any other
person shall be punished with imprisonment for a term which may extend to two years, or with
fine which may extend to one lakh rupees, or with both.
Section 72 A of ITA deals with ‘Punishment for Disclosure of information in breach of
lawful contract.’
Save as otherwise provided in this Act or any other law for the time being in force, any person
including an intermediary who, while providing services under the terms of lawful contract, has
secured access to any material containing personal information about another person, with the
intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses,
without the consent of the person concerned, or in breach of a lawful contract, such material to
any other person shall be punished with imprisonment for a term which may extend to three
years, or with a fine which may extend to five lakh rupees, or with both.
Now comes the question as to, whom to approach with our grievances? What if a person falls
aggrieved of human rights in context of social media? Here is your answer,
 CONTROLLERS AND OTHER OFFICERS.
(1) The Central Government may, by notification in the Official Gazette, appoint a Controller of
Certifying Authorities for the purposes of this Act and may also by the same or subsequent
notification appoint such number of Deputy Controllers and Assistant Controllers, other officers
and employees as it deems fit.
BY SAURAV GUPTA
Page 7
(2) The Controller shall discharge his functions under this Act subject to the general control and
directions of the Central Government.
(3) The Deputy Controllers and Assistant Controllers shall perform the functions assigned to
them by the Controller under the general superintendence and control of the Controller.
(4) The qualifications, experience and terms and conditions of service of Controller, Deputy
Controllers and Assistant Controllers other officers and employees shall be such as may be
prescribed by the Central Government.
(5) The Head Office and Branch Office of the Office of the Controller shall be at such places as
the Central Government may specify, and these may be established at such places as the Central
Government may think fit.
(6) There shall be a seal of the Office of the Controller.
 CYBER APPELLATE TRIBUNAL.
Cyber Appellate Tribunal has been established under the Information Technology Act under the
aegis of Controller of Certifying Authorities (C.C.A.). The first and the only Cyber Appellate
Tribunal in the country has been established by the Central Government in accordance with the
provisions contained under Section 48(1) of the Information Technology Act, 2000.
The Cyber Appellate Tribunal has, for the purposes of discharging its functions under the I.T.
Act, the same powers as are vested in a civil court under the Code of Civil Procedure, 1908.
However, the procedure laid down by the Code of Civil Procedure, 1908 applies but at the same
time the Tribunal is guided by the principles of natural justice.
The Cyber Appellate Tribunal has powers to regulate its own procedure including the place at
which it has its sittings. Every proceeding before the Cyber Appellate Tribunal shall be deemed
to be a judicial proceeding within the meaning of sections 193 and 228, and for the purposes of
section 196 of the Indian Penal Code and the Cyber Appellate Tribunal shall be deemed to be a
civil court for the purposes of section 195 and Chapter XXVI of the Code of Criminal Procedure,
1973.
 Indian Computer Emergency Response Team (ICERT)
CERT-In (the Indian Computer Emergency Response Team) is a government-mandated
information technology (IT) security organization. The purpose of CERT-In is to respond to
computer security incidents, report on vulnerabilities and promote effective IT security practices
throughout the country.
CERT-In was created by the Indian Department of Information Technology in 2004 and operates
under the auspices of that department. According to the provisions of the Information
Technology Amendment Act 2008, CERT-In is responsible for overseeing administration of the
Act.
BY SAURAV GUPTA
Page 8
The institutional structure of internet censorship and filtering has centred on the Indian Computer
Emergency Response Team (ICERT), a department of the Ministry of Communication and
Information Technology that serves as a nodal agency for accepting and reviewing requests from
a designated pool of government officials to block access to specific websites
CERT organizations throughout the world are independent entities, although there may be
coordinated activites among groups. The first CERT group was formed in the United States at
Carnegie Mellon University.
Human behaviorism plays a vital role when dealing with social media. One must be aware of the
fact that any exchange of sentence, phrase, word and letter on the rostrum of social media is a
STATEMENT. Our activities, in a platform like social media connote our thought process and
our psychology. Irony is that there is nothing called personal on the podium of social media. One
should possess a strong command over own senses and consciousness while dealing with social
media. Like every atom, element, proton, neutron, electron, thing, substance etc etc etc social
media is also a boon and a bane for mankind. It has its personal pros and cons and it is up to the
end user really as to what it wants to derive from the same and how. Any self presentation,
proclamation, representation, embodiment or effigies made in the parlance and ambit of social
media must be in accordance with ITA framed by the governing body. It’s all PDA in social
media. Before you think further, beyond and ahead, PDA is an abbreviation for Public Display of
Activities. BEWARE, BE RESPONSIBLE AND RAISE YOUR VOICE.
References:
police.pondicherry.gov.in/Information%20Technology%20Act%202000...
www.indexoncensorship.org/tag/india/
www.archive.india.gov.in/allimpfrms/alldocs/16484.pdfS

More Related Content

What's hot

What's hot (11)

MIS Project Group 14
MIS   Project Group 14MIS   Project Group 14
MIS Project Group 14
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
cyber law
cyber law cyber law
cyber law
 
Publication in the International Journal Sangeetha
Publication in the International Journal SangeethaPublication in the International Journal Sangeetha
Publication in the International Journal Sangeetha
 
ICT Cybe laws
ICT Cybe lawsICT Cybe laws
ICT Cybe laws
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Cyber
CyberCyber
Cyber
 
Cyber law
Cyber lawCyber law
Cyber law
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
Electronic contracts
Electronic contractsElectronic contracts
Electronic contracts
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 

Viewers also liked

dharmendra resume.docx.docx copy
dharmendra resume.docx.docx copydharmendra resume.docx.docx copy
dharmendra resume.docx.docx copyDharmen Kumar
 
SCARED OF INVESTING KNOW YOUR RIGHTS! YOU ARE PROTECTED BY SAURAV GUPTA
SCARED OF INVESTING KNOW YOUR RIGHTS! YOU ARE PROTECTED BY SAURAV GUPTASCARED OF INVESTING KNOW YOUR RIGHTS! YOU ARE PROTECTED BY SAURAV GUPTA
SCARED OF INVESTING KNOW YOUR RIGHTS! YOU ARE PROTECTED BY SAURAV GUPTASaurav Gupta
 
LINKSpring2011
LINKSpring2011LINKSpring2011
LINKSpring2011Tao Yan
 
Oplæg på Testing Tuesday den 7. juni
Oplæg på Testing Tuesday den 7. juniOplæg på Testing Tuesday den 7. juni
Oplæg på Testing Tuesday den 7. juniMorten Bjerg Gregersen
 
Question 4 of evaluation
Question 4 of evaluationQuestion 4 of evaluation
Question 4 of evaluationklaudiaolivia17
 
Library Display Revised
Library Display RevisedLibrary Display Revised
Library Display RevisedNahua Guilloz
 
Mensagem do prefeito geraldo julio ao legislatvo 2016
Mensagem do prefeito geraldo julio ao legislatvo 2016Mensagem do prefeito geraldo julio ao legislatvo 2016
Mensagem do prefeito geraldo julio ao legislatvo 2016Anna Tiago
 
Aria-DefinitiveGuide-ebook-2016
Aria-DefinitiveGuide-ebook-2016Aria-DefinitiveGuide-ebook-2016
Aria-DefinitiveGuide-ebook-2016Marie Martin
 
Reilly Studios Retail Design 1
Reilly Studios Retail Design 1Reilly Studios Retail Design 1
Reilly Studios Retail Design 1Ron Reilly
 

Viewers also liked (9)

dharmendra resume.docx.docx copy
dharmendra resume.docx.docx copydharmendra resume.docx.docx copy
dharmendra resume.docx.docx copy
 
SCARED OF INVESTING KNOW YOUR RIGHTS! YOU ARE PROTECTED BY SAURAV GUPTA
SCARED OF INVESTING KNOW YOUR RIGHTS! YOU ARE PROTECTED BY SAURAV GUPTASCARED OF INVESTING KNOW YOUR RIGHTS! YOU ARE PROTECTED BY SAURAV GUPTA
SCARED OF INVESTING KNOW YOUR RIGHTS! YOU ARE PROTECTED BY SAURAV GUPTA
 
LINKSpring2011
LINKSpring2011LINKSpring2011
LINKSpring2011
 
Oplæg på Testing Tuesday den 7. juni
Oplæg på Testing Tuesday den 7. juniOplæg på Testing Tuesday den 7. juni
Oplæg på Testing Tuesday den 7. juni
 
Question 4 of evaluation
Question 4 of evaluationQuestion 4 of evaluation
Question 4 of evaluation
 
Library Display Revised
Library Display RevisedLibrary Display Revised
Library Display Revised
 
Mensagem do prefeito geraldo julio ao legislatvo 2016
Mensagem do prefeito geraldo julio ao legislatvo 2016Mensagem do prefeito geraldo julio ao legislatvo 2016
Mensagem do prefeito geraldo julio ao legislatvo 2016
 
Aria-DefinitiveGuide-ebook-2016
Aria-DefinitiveGuide-ebook-2016Aria-DefinitiveGuide-ebook-2016
Aria-DefinitiveGuide-ebook-2016
 
Reilly Studios Retail Design 1
Reilly Studios Retail Design 1Reilly Studios Retail Design 1
Reilly Studios Retail Design 1
 

Similar to Nitty Gritty of Social Media Regulations BY SAURAV GUPTA

Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Ranjita Naik
 
Muz cyber law assignment
Muz cyber law assignmentMuz cyber law assignment
Muz cyber law assignmentRubina Shaikh
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentRajshekar786
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshRabita Rejwana
 
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Adwiteeya Agrawal
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000PrakharPrasoon
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesPadmaja Naidu
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 

Similar to Nitty Gritty of Social Media Regulations BY SAURAV GUPTA (20)

Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
 
Muz cyber law assignment
Muz cyber law assignmentMuz cyber law assignment
Muz cyber law assignment
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Cyber Law.pptx
Cyber Law.pptxCyber Law.pptx
Cyber Law.pptx
 
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &cases
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Digital Ethics Charter From Innovatori
Digital Ethics Charter From InnovatoriDigital Ethics Charter From Innovatori
Digital Ethics Charter From Innovatori
 
Shilpa
ShilpaShilpa
Shilpa
 

Nitty Gritty of Social Media Regulations BY SAURAV GUPTA

  • 1. BY SAURAV GUPTA Page 1 Nitty Gritty Of Social Media Regulations Social media has been defined and designed divergently by many authors and sources. Some of the prominent, eminent and pre-eminent definitions and connotations given to the word SOCIAL MEDIA are:  “Social media are primarily Internet-based tools for sharing and discussing information among human beings.” - Wikipedia  “A category of sites that is based on user participation and user-generated content. They include social networking sites like LinkedIn, Facebook, or My Space, social bookmarking sites like Del.icio.us, social news sites like Digg or Simpy, and other sites that are centered on user interaction.” - Lazworld  “Online technologies and practices that people use to share opinions, insights, experiences, and perspectives with each other.” - tvb.org  “Social media are works of user-created video, audio, text or multimedia that are published and shared in a social environment, such as a blog, wiki or video hosting site.” - Capilanou  “An umbrella term that defines the various activities that integrate technology, social interaction, and the construction of words and pictures.” - Anvil Media  “Software tools that allow groups to generate content and engage in peer-to-peer conversations and exchange of content (examples are YouTube, Flickr, Facebook, MySpace etc).” - Bottle PR  “Social Media is the collection of tools and online spaces available to help individuals and businesses to accelerate their information and communication needs.” - Axel Schultze Our day embarks and adieus with social media. GOOD MORNING FRIENDS is our official onset of a day in facebook whereas GOOD NIGHT FRIENDS is our way of putting a stop to our day in twitter. Be it sharing a glitch or expressing a glee on a solved hitch, be it a hilarity on a new born baby or mourning with despair for the loss of close one, be it expressing a gratitude or mutinying on loath, we ventilate all in social media. Social media is a hub for all emotional array.
  • 2. BY SAURAV GUPTA Page 2 As the name suggests, “SOCIAL MEDIA”, it brings together many people of different genre. Some users are erudite while some are amateurish. Social Media brings together inhabitants of diverse nature and mindset. They say, if we are human, we have emotions. Behaviorism is a guiding factor for any individual. The most precious and susceptible matter in this world is SENTIMENT. A set of information may appear rapture for a particular set of coterie whereas; the same may be a matter of melancholy for different set of coterie. With diverse multitude, comes different sentiment. With diverse sentiments, comes different state of mind. With diverse state of mind, begins anarchy. To curb this situation of disarray and to create a sense of hegemony over the flamboyance expression of thoughts by proletariat representing varied upbringings, Indian government came up with INFORMATION TECHNOLOGY ACT,2000(NOW AMENDED 2008). India is a democratic country and freedom of expression of thought is viable in this country. Information Technology Act restricts the freedom of expression of thought in parlance to its operation in social media. The act is designed to curb the flamboyance in expression of thought and to mandate adequate code of conduct while handling social media. Information Technology Act was primarily based on UNICITRAL model law on e-commerce. Attempts were made in year 1998 for introducing law pertaining to information technology in India but the Information Technology Act was passed only in June,2000. The Government of India has brought major amendments to ITA-2000 in form of the Information Technology Act,2008.ITAA 2008 (Information Technology Amendment Act,2008) as the new version of Information Technology Act,2000 is often referred has provided additional focus on Information Security. It has added several new sections on offences including Cyber Terrorism and Data Protection. A set of Rules relating to Sensitive Personal Information and Reasonable Security Practices (mentioned in section 43A of ITAA, 2008) was released in April 2011. Information technology Act, 2000 extends to the whole of India and, save as otherwise provided in this Act, it applies also to any offence or contravention there under committed outside India by any person. Section 75 of ITA, Act to apply for offence or contraventions committed outside India (1) Subject to the provisions of sub-section (2), the provisions of this Act shall apply also to any offence or contravention committed outside India by any person irrespective of his nationality. (2) For the purposes of sub-section (1), this Act shall apply to an offence or contravention committed outside India by any person if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India. FEW OFFENCES AND PENALTIES UNDER INFORMATION TECHNOLOGY ACT, 2000(Now amended 2008)
  • 3. BY SAURAV GUPTA Page 3 Section 65 of ITA deals with ‘Tampering with Computer Source Documents.’ Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. Explanation - For the purposes of this section, "Computer Source Code" means the listing of programmes, Computer Commands, Design and layout and programme analysis of computer resource in any form. Section 66 A of ITA deals with Punishment for sending offensive messages through communication service, etc. Any person who sends, by means of a computer resource or a communication device,- a) any information that is grossly offensive or has menacing character; or b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device, c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages shall be punishable with imprisonment for a term which may extend to two three years and with fine. Explanation: For the purposes of this section, terms "Electronic mail" and "Electronic Mail Message" means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, image, audio, video and any other electronic record, which may be transmitted with the message. Section 66 B of ITA deals with ‘Punishment for dishonestly receiving stolen computer resource or communication device.’ Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both. Section 66C of ITA deals with ‘Punishment for identity theft.’ Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh. Section 66D of ITA deals with ‘Punishment for cheating by personation by using computer resource.’
  • 4. BY SAURAV GUPTA Page 4 Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees. Section 66E of ITA deals with ‘Punishment for violation of privacy.’ Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both Explanation- For the purposes of this section— (a) ―transmit‖ means to electronically send a visual image with the intent that it be viewed by a person or persons; (b) ―capture‖, with respect to an image, means to videotape, photograph, film or record by any means; (c) ―private area‖ means the naked or undergarment clad genitals, pubic area, buttocks or female breast; (d) ―publishes‖ means reproduction in the printed or electronic form and making it available for public; (e) ―under circumstances violating privacy‖ means circumstances in which a person can have a reasonable expectation that— (i) he or she could disrobe in privacy, without being concerned that an image of his private area was being captured; or (ii) any part of his or her private area would not be visible to the public, regardless of whether that person is in a public or private place. Section 66F Of ITA deals with ‘Punishment for cyber terrorism.’ (1) Whoever,- (A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people by – (i) denying or cause the denial of access to any person authorized to access computer resource; or (ii) attempting to penetrate or access a computer resource without authorisation or exceeding authorized access; or (iii) introducing or causing to introduce any Computer Contaminant. and by means of such conduct causes or is likely to cause death or injuries to persons or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or adversely affect the critical information infrastructure specified under section 70, or (B) knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorized access, and by means of such conduct obtains access to information, data or computer database that is restricted for reasons of the security of the State or foreign relations; or any restricted information, data or computer database, with reasons to believe that such information, data or computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly
  • 5. BY SAURAV GUPTA Page 5 relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise, commits the offence of cyber terrorism. (2) Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life’. Section67 of ITA dealswith ‘Punishmentforpublishingor transmitting obscene material in electronicform.’ Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to two three years and with fine which may extend to five lakh rupees and in the event of a second or subsequent conviction with imprisonment of either description for a term which may extend to five years and also with fine which may extend to ten lakh rupees. Section 67 A of ITA deals with ‘Punishment for publishing or transmitting of material containing sexually explicit act,etc. in electronic form.’ Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees. Exception: This section and section 67 does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form- (i) the publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper, writing, drawing, painting, representation or figure is in the interest of science,literature,art,or learning or other objects of general concern; or (ii) which is kept or used bona fide for religious purposes. Section 67 B of ITA deals with ‘Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form.’ Whoever,- (a) publishes or transmits or causes to be published or transmitted material in any electronic form which depicts children engaged in sexually explicit act or conduct or (b) creates text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting children in obscene or indecent or sexually explicit manner or (c) cultivates, entices or induces children to online relationship with one or more children for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource or (d) facilitates abusing children online or
  • 6. BY SAURAV GUPTA Page 6 (e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with a fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees: Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form- (i) The publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper writing, drawing, painting, representation or figure is in the interest of science, literature, art or learning or other objects of general concern; or (ii) which is kept or used for bonafide heritage or religious purposes Explanation: For the purposes of this section, "children" means a person who has not completed the age of 18 years. Section 72 of ITA deals with ‘Breach of confidentiality and privacy.’ Save as otherwise provided in this Act or any other law for the time being in force, any person who, in pursuant of any of the powers conferred under this Act, rules or regulations made there under, has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned discloses such electronic record, book, register, correspondence, information, document or other material to any other person shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both. Section 72 A of ITA deals with ‘Punishment for Disclosure of information in breach of lawful contract.’ Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to five lakh rupees, or with both. Now comes the question as to, whom to approach with our grievances? What if a person falls aggrieved of human rights in context of social media? Here is your answer,  CONTROLLERS AND OTHER OFFICERS. (1) The Central Government may, by notification in the Official Gazette, appoint a Controller of Certifying Authorities for the purposes of this Act and may also by the same or subsequent notification appoint such number of Deputy Controllers and Assistant Controllers, other officers and employees as it deems fit.
  • 7. BY SAURAV GUPTA Page 7 (2) The Controller shall discharge his functions under this Act subject to the general control and directions of the Central Government. (3) The Deputy Controllers and Assistant Controllers shall perform the functions assigned to them by the Controller under the general superintendence and control of the Controller. (4) The qualifications, experience and terms and conditions of service of Controller, Deputy Controllers and Assistant Controllers other officers and employees shall be such as may be prescribed by the Central Government. (5) The Head Office and Branch Office of the Office of the Controller shall be at such places as the Central Government may specify, and these may be established at such places as the Central Government may think fit. (6) There shall be a seal of the Office of the Controller.  CYBER APPELLATE TRIBUNAL. Cyber Appellate Tribunal has been established under the Information Technology Act under the aegis of Controller of Certifying Authorities (C.C.A.). The first and the only Cyber Appellate Tribunal in the country has been established by the Central Government in accordance with the provisions contained under Section 48(1) of the Information Technology Act, 2000. The Cyber Appellate Tribunal has, for the purposes of discharging its functions under the I.T. Act, the same powers as are vested in a civil court under the Code of Civil Procedure, 1908. However, the procedure laid down by the Code of Civil Procedure, 1908 applies but at the same time the Tribunal is guided by the principles of natural justice. The Cyber Appellate Tribunal has powers to regulate its own procedure including the place at which it has its sittings. Every proceeding before the Cyber Appellate Tribunal shall be deemed to be a judicial proceeding within the meaning of sections 193 and 228, and for the purposes of section 196 of the Indian Penal Code and the Cyber Appellate Tribunal shall be deemed to be a civil court for the purposes of section 195 and Chapter XXVI of the Code of Criminal Procedure, 1973.  Indian Computer Emergency Response Team (ICERT) CERT-In (the Indian Computer Emergency Response Team) is a government-mandated information technology (IT) security organization. The purpose of CERT-In is to respond to computer security incidents, report on vulnerabilities and promote effective IT security practices throughout the country. CERT-In was created by the Indian Department of Information Technology in 2004 and operates under the auspices of that department. According to the provisions of the Information Technology Amendment Act 2008, CERT-In is responsible for overseeing administration of the Act.
  • 8. BY SAURAV GUPTA Page 8 The institutional structure of internet censorship and filtering has centred on the Indian Computer Emergency Response Team (ICERT), a department of the Ministry of Communication and Information Technology that serves as a nodal agency for accepting and reviewing requests from a designated pool of government officials to block access to specific websites CERT organizations throughout the world are independent entities, although there may be coordinated activites among groups. The first CERT group was formed in the United States at Carnegie Mellon University. Human behaviorism plays a vital role when dealing with social media. One must be aware of the fact that any exchange of sentence, phrase, word and letter on the rostrum of social media is a STATEMENT. Our activities, in a platform like social media connote our thought process and our psychology. Irony is that there is nothing called personal on the podium of social media. One should possess a strong command over own senses and consciousness while dealing with social media. Like every atom, element, proton, neutron, electron, thing, substance etc etc etc social media is also a boon and a bane for mankind. It has its personal pros and cons and it is up to the end user really as to what it wants to derive from the same and how. Any self presentation, proclamation, representation, embodiment or effigies made in the parlance and ambit of social media must be in accordance with ITA framed by the governing body. It’s all PDA in social media. Before you think further, beyond and ahead, PDA is an abbreviation for Public Display of Activities. BEWARE, BE RESPONSIBLE AND RAISE YOUR VOICE. References: police.pondicherry.gov.in/Information%20Technology%20Act%202000... www.indexoncensorship.org/tag/india/ www.archive.india.gov.in/allimpfrms/alldocs/16484.pdfS