AN OVERVIEW OF THE CYBER LAWS IN INDIA

INTRODUCTION

 “Cyber” is a prefix used to describe a person, thing, or idea as part of the computer and information age. Taken from kybernetes, the Greek word for “steersman” or “governor,” it was first used in cybernetics, a word coined by Norbert Wiener and his colleagues. The virtual world of internet is known as cyberspace and the laws governing this area are known as Cyber Laws and all the netizens of this space come under the ambit of these laws as it carries a kind of universal jurisdiction. 

Cyberlaw can also be described as that branch of law that deals with legal issues related to use of inter-networked information technology. In short, cyber law is the law governing computers and the internet. The growth of Electronic Commerce has propelled the need for vibrant and effective regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to the success of Electronic Commerce. All these regulatory mechanisms and legal infrastructures come within the domain of Cyberlaw.

Cyberlaw is important because it touches almost all aspects of transactions and activities on and involving the internet, World Wide Web and cyberspace. Every action and reaction in cyberspace has some legal and cyber legal perspectives. 

Cyberlaw encompasses laws relating to:-

  1. Cybercrimes  
  2. Electronic and digital signatures 
  3. Intellectual property  
  4. Data protection and privacy

WHY IS CYBER LAW THE NEED OF THE HOUR IN INDIA?

Firstly, India has an extremely detailed and well-defined legal system in place. Numerous laws have been enacted and implemented and the foremost amongst them is The Constitution of India. We have inter alia, amongst others, the Indian Penal Code, the Indian Evidence Act 1872, the Banker’s Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934, the Companies Act, and so on. 

However, the arrival of Internet signalled the beginning of the rise of new and complex legal issues. It may be pertinent to mention that all the existing laws in place in India were enacted way back keeping in mind the relevant political, social, economic, and cultural scenario of that relevant time. 

Nobody then could really visualize about the Internet. Despite the brilliant acumen of our master draftsmen, the requirements of cyberspace could hardly ever be anticipated. As such, the coming of the Internet led to the emergence of numerous ticklish legal issues and problems which necessitated the enactment of Cyber laws. 

Secondly, the existing laws of India, even with the most benevolent and liberal interpretation, could not be interpreted in the light of the emerging cyberspace, to include all aspects relating to different activities in cyberspace. In fact, the practical experience and the wisdom of judgment found that it shall not be without major perils and pitfalls, if the existing laws were to be interpreted in the scenario of emerging cyberspace, without enacting new cyber laws. Hence, the need for enactment of relevant cyber laws.

Thirdly, none of the existing laws gave any legal validity or sanction to the activities in Cyberspace. For example, the Net is used by a large majority of users for email. Yet till today, email is not “legal” in our country. There is no law in the country, which gives legal validity, and sanction to email. Courts and judiciary in our country have been reluctant to grant judicial recognition to the legality of email in the absence of any specific law having been enacted by the Parliament. 

As such the need has arisen for Cyberlaw. Fourthly, the Internet requires an enabling and supportive legal infrastructure in tune with the times. This legal infrastructure can only be given by the enactment of the relevant Cyber laws as the traditional laws have failed to grant the same. 

E-commerce, the biggest future of the Internet, can only be possible if necessary legal infrastructure compliments the same to enable its vibrant growth. All these and other varied considerations created a conducive atmosphere for the need for enacting relevant cyber laws in India. 

CYBERCRIME ON THE RISE

  1. As per the cybercrime data maintained by the National Crime Records Bureau (NCRB), a total of 217, 288, 420 and 966 Cyber Crime cases were registered under the Information Technology Act, 2000 during 2007, 2008, 2009 and 2010 respectively. 
  1. Also, a total of 328, 176, 276 and 356 cases were registered under Cyber Crime related Sections of Indian Penal Code (IPC) during 2007, 2008, 2009 and 2010 respectively. 
  1. A total of 154, 178, 288 and 799 persons were arrested under the Information Technology Act 2000 during 2007-2010. A total number of 429, 195, 263 and 294 persons were arrested under Cyber Crime related Sections of Indian Penal Code (IPC) during 2007-2010. 
  1. Crime head-wise and age-wise profile of the offenders arrested under Cyber Crimes (IPC) for the year 2011 reveals that offenders involved in 9 forgery cases were more in the age-group of 18-30 (46.5%) (129 out of 277). 50.4% of the persons arrested under Criminal Breach of Trust/Cyber Fraud offences were in the age group 30-45 years (65 out of 129).  
  1. Meanwhile, 9 out of 88 mega cities did not report any case of cybercrime i.e., neither under the IT Act nor under IPC Sections during the year 2011.  And 53 megacities have reported 858 cases under the IT Act and 200 cases under various sections of IPC. 
  1. There was an increase of 147.3% (from 347 cases in 2009 to 858 cases in 2011) in cases under IT Act as compared to the previous year (2010), and an increase of 33.3% (from 150 cases in 2010 to 200 cases in 2011) of cases registered under various sections of IPC.  Bangalore (117), Vishakhapatnam (107), Pune (83), Jaipur (76), Hyderabad (67) and Delhi (City) (50) have reported a high incidence of cases (500 out of 858 cases) registered under IT Act, accounting for more than half of the cases (58.3%) reported under the IT Act. 
  1. Delhi City has reported the highest incidence (49 out of 200) of cases reported under IPC sections accounting for 24.5% followed by Mumbai (25 or 12.5%). A major programme has been initiated on development of cyber forensics specifically cyber forensic tools, setting up of infrastructure for investigation and training of the users, particularly police and judicial officers in the use of this tool to collect and analyze the digital evidence and present them in Court. 
  2. Indian Computer Emergency Response Team (CERT-In) and Centre for Development of Advanced Computing (CDAC) are involved in providing basic and advanced training of Law Enforcement Agencies, Forensic labs and judiciary on the procedures and methodology of collecting, analyzing and presenting digital evidence.  
  1. Cyber forensic training lab has been set up at Training Academy of Central Bureau of Investigation (CBI) to impart basic and advanced training in Cyber Forensics and Investigation of Cyber Crimes to Police Officers associated with CBI.
  1.  In addition, Government has set up cyber forensic training and investigation labs in Kerala, Assam, Mizoram, Nagaland, Arunachal Pradesh, Tripura, Meghalaya, Manipur and Jammu & Kashmir. 
  1. In collaboration with Data Security Council of India (DSCI), NASSCOM, Cyber Forensic Labs have been set up at Mumbai, Bengaluru, Pune and Kolkata. DSCI has organized 112 training programmes on Cyber Crime Investigation and awareness and a total of 3680 Police officials, judiciary and Public prosecutors have been trained through these programmes. 
  1. Indian Computer Emergency Response Team (CERT-In) issues alerts, advisories and guidelines regarding cybersecurity threats and measures to be taken to prevent cyber incidents and enhance the security of Information Technology systems.

IMPORTANT TERMS RELATED TO CYBER LAW AS PER INFORMATION TECHNOLOGY ACT,2000

  1. “Access” with its grammatical variations and cognate expressions means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. (Sec.2(1)(a) of IT Act, 2000) 
  1. “Addressee” means a person who is intended by the originator to receive the electronic record but does not include any intermediary. (Sec.2(1)(b) of IT Act, 2000.
  1. “Affixing Electronic Signature” with its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of Electronic Signature. (Sec.2(1)(d) of IT Act, 2000) 
  1. “Asymmetric Crypto System” means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature. (Sec.2(1)(f) of IT Act, 2000).
  1. “Certifying Authority” means a person who has been granted a license to issue an Electronic Signature Certificate under section 24. (Sec.2(1)(g) of IT Act, 2000) 
  1. “Communication Device” means Cell Phones, Personal Digital Assistants (Sic), or combination of both or any other device used to communicate, send or transmit any text, video, audio, or image. (Sec.2(1)(ha) of IT Act, 2000)
  1.  “Computer” means any electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network (Sec.2(1)(i) of IT Act, 2000)
  1.  “Computer Network” means the interconnection of one or more Computers or Computer systems or Communication device through- (i) the use of satellite, microwave, terrestrial line, wire, wireless or other communication media; and (ii) terminals or a complex consisting of two or more interconnected computers or communication device whether or not the interconnection is continuously maintained. (Sec.2(1)(j) of IT Act, 2000).
  1. “Computer Resource” means computer, communication device, computer system, computer network, data, computer database or software. (Sec.2(1)(k) of IT Act, 2000)
  1. “Computer System” means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files, which contain computer programmes, electronic instructions, input data, and output data, that performs logic, arithmetic, data storage and retrieval, communication control and other functions. (Sec.2(1)(l) of IT Act, 2000)
  1.  “Cybercafe” means any facility from where access to the Internet is offered by any person in the ordinary course of business to the members of the public. (Sec.2(1)(na) of IT Act, 2000) 
  1. “Cyber Security” means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. (Sec.2(1)(nb) of IT Act, 2000) (o)
  1. “Data” means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalized manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer. (Sec.2(1)(o) of IT Act, 2000)
  1. (p) “Digital Signature” means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3. (Sec.2(1)(p) of IT Act, 2000) 
  1. “Electronic Form” with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, microfilm, computer generated micro fiche or similar device. (Sec.2(1)(r) of IT Act, 2000) “Electronic Record” means data, record or data generated, image or sound stored, received or sent in an electronic form or microfilm or computer generated microfiche. (Sec.2(1)(t) of IT Act, 2000)
  1.  “Electronic signature” means authentication of any electronic record by a subscriber by means of the electronic technique specified in the second schedule and includes a digital signature. (Sec.2(1)(ta) of IT Act, 2000) 
  1. “Function”, in relation to a computer, includes logic, control, arithmetical process, deletion, storage and retrieval and communication or telecommunication from or within a computer. (Sec.2(1)(u) of IT Act, 2000) 
  1. “Information” includes data, message, text, images, sound, voice, codes, computer programmes, software and databases or microfilm or computer generated microfiche. (Sec.2(1)(v) of IT Act, 2000) 
  1. “Intermediary” with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web 14 hosting service providers, search engines, online payment sites, online-auction sites, online market places and cyber cafes. (Sec.2(1)(w) of IT Act, 2000) 
  1. “Key Pair”, in an asymmetric cryptosystem, means a private key and its mathematically related public key, which are so related that the public key can verify a digital signature created by the private key. (Sec.2(1)(x) of IT Act, 2000) 
  1. “Originator” means a person who sends, generates, stores or transmits any electronic message or causes any electronic message to be sent, generated, stored or transmitted to any other person but does not include an intermediary. (Sec.2(1)(za) of IT Act, 2000) 
  1. “Private Key” means the key of a key pair used to create a digital signature. (Sec.2(1)(zc) of IT Act, 2000)
  1.  “Public Key” means the key of a key pair used to verify a digital signature and listed in the Digital Signature Certificate. (Sec.2(1)(zd) of IT Act, 2000)
  1. “Secure System” means computer hardware, software, and procedure that -: (a) are reasonably secure from unauthorized access and misuse; (b) provide a reasonable level of reliability and correct operation; (c) are reasonably suited to performing the intended functions, and (d) adhere to generally accepted security procedures. (Sec.2(1)(ze) of IT Act, 2000)
  1.  “Subscriber” means a person in whose name the Electronic Signature Certificate is issued. (Sec.2(1)(zg) of IT Act, 2000)

ABOUT INFORMATION TECHNOLOGY ACT, 2000

Information Technology Act, 2000 is India’s mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format. This legislation has touched varied aspects pertaining to electronic authentication, digital (electronic) signatures, cyber crimes and liability of network service providers. 

The Preamble to the Act states that it aims at providing legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce”, which involve the use of alternatives to paper-based methods of communication and storage of information and aims at facilitating electronic filing of documents with the Government agencies. 

This Act was amended by Information Technology Amendment Bill, 2008 which was passed in Lok Sabha on 22nd December 2008 and in Rajya Sabha on 23rd December 2008. It received the assent of the President on 5th February 2009 and was notified with effect from 27/10/2009.

The IT Act of 2000 was developed to promote the IT industry, regulate eCommerce, facilitate e-governance and prevent cybercrime. The Act also sought to foster security practices within India that would serve the country in a global context. 

The Amendment was created to address issues that the original bill failed to cover and to accommodate further development of IT and related security concerns since the original law was passed. The IT Act, 2000 consists of 90 sections spread over 13 chapters [Sections 91, 92, 93 and 94 of the principal Act were omitted by the Information Technology (Amendment) Act 2008 and has 2 schedules.[ Schedules III and IV were omitted by the Information Technology (Amendment) Act 2008].

SALIENT FEATURES OF THE INFORMATION TECHNOLOGY ACT, 2000

  1. The term ‘digital signature’ has been replaced with ‘electronic signature’ to make the Act more technology-neutral. 
  1. A new section has been inserted to define ‘communication device’ to mean cell phones, personal digital assistance or combination of both or any other device used to communicate, send or transmit any text video, audio or image.
  2. A new section has been added to define cyber cafe as any facility from where the access to the internet is offered by any person in the ordinary course of business to the members of the public.
  1. A new section has been added to define cyber cafe as any facility from where the access to the internet is offered by any person in the ordinary course of business to the members of the public. 
  1. A new definition has been inserted for an intermediary. 
  1. A new section 10A has been inserted to the effect that contracts concluded electronically shall not be deemed to be unenforceable solely on the ground that electronic form or means was used.
  1. The damages of Rs. One Crore prescribed under section 43 of the earlier Act of 2000 for damage to computer, computer system etc. has been deleted and the relevant parts of the section have been substituted by the words, ‘he shall be liable to pay damages by way of compensation to the person so affected’. 
  1. A new section 43A has been inserted to protect sensitive personal data or information possessed, dealt or handled by a body corporate in a computer resource which such body corporate owns, controls or operates. 
  1. If such body corporate is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, it shall be liable to pay damages by way of compensation to the person so affected. 
  1. Sections 66A to 66F has been added to Section 66 prescribing punishment for offences such as obscene electronic message transmissions, identity theft, cheating by impersonation using computer resource, violation of privacy and cyber terrorism.
  1. Section 67 of the IT Act, 2000 has been amended to reduce the term of imprisonment for publishing or transmitting obscene material in electronic form to three years from five years and increase the fine thereof from Rs.100,000 to Rs. 500,000. Sections 67A to 67C have also been inserted. 
  1. While Sections 67A and B deal with penal provisions in respect of offences of publishing or transmitting of material containing sexually explicit act and child pornography in electronic form, Section 67C deals with the obligation of an intermediary to preserve and retain such information as may be specified for such duration and in such manner and format as the central government may prescribe.
  1. In view of the increasing threat of terrorism in the country, the new amendments include an amended section 69 giving power to the state to issue directions for interception or monitoring or decryption of any information through any computer resource. Further, sections 69A and B, two new sections, grant power to the state to issue directions for blocking for public access of any information through any computer resource and to authorize to monitor and collect traffic data or information through any computer resource for cybersecurity. 
  1.  Section 79 of the Act which exempted intermediaries has been modified to the effect that an intermediary shall not be liable for any third party information data or communication link made available or hosted by him if; (a) The function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hosted; (b) The intermediary does not initiate the transmission or select the receiver of the transmission and select or modify the information contained in the transmission; (c) The intermediary observes due diligence while discharging his duties. 

However, section 79 will not apply to an intermediary if the intermediary has conspired or abetted or aided or induced whether by threats or promise or otherwise in the commission of the unlawful act or upon receiving actual knowledge or on being notified that any information, data or communication link residing in or connected to a computer resource controlled by it is being used to commit an unlawful act, the intermediary fails to expeditiously remove or disable access to that material on that resource without vitiating the evidence in any manner.

A proviso has been added to Section 81 which states that the provisions of the Act shall have overriding effect. The proviso states that nothing contained in the Act shall restrict any person from exercising any right conferred under the Copyright Act, 1957.

OVERVIEW OF THE INFORMATION TECHNOLOGY ACT, 2000 

The Information Technology Act was enacted with a view to give a fillip to the growth of electronic-based transactions, to provide legal recognition for e-commerce and e-transactions, to

facilitate e-governance, to prevent computer-based crimes and ensure security practices and procedures in the context of the widest possible use of information technology worldwide. 

APPLICABILITY OF THE ACT 

The Act will apply to the whole of India unless otherwise mentioned. It applies also to any offence or contravention thereunder committed outside India by any person. 

The Act shall not apply to the following documents or transactions –  

  1. A negotiable instrument as defined in Sec.13 of the Negotiable Instruments Act, 1881; 
  1.  A power of attorney as defined in Sec.1A of the Powers of Attorney Act, 1882;  
  1. A trust as defined in Section 3 of the Indian Trusts Act, 1882;  
  1. A Will as defined in Sec.2(h) of the Indian Succession Act, 1925 including any other testamentary disposition by whatever name called; 
  1.  Any contract for the sale or conveyance of immovable property or any interest in such property. 

SCHEME OF THE ACT 

  1. Chapter – I – Preliminary 
  2. Chapter – II – Digital Signature and Electronic Signature (Sections 3 & 3A)
  3. Chapter – III – Electronic Governance (Sections 4 to 10A) 
  4. Chapter – IV – Attribution, Acknowledgement and Dispatch of Electronic Records (Sections 11 to 13) 
  5. Chapter – V – Secure electronic records and secure electronic signatures (Sections 14 to 16) 
  6. Chapter – VI – Regulation of Certifying Authorities (Sections 17 to 34) 
  7. Chapter – VII – Electronic Signature Certificates (Sections 35 to 39) 
  8. Chapter – VIII – Duties of Subscribers (Sections 40 to 42) 
  9. Chapter – IX – Penalties, Compensation and Adjudication (Sections 43 to 47) 
  10. Chapter X – The Cyber Appellate Tribunal (Sections 48 to 64) 
  11. Chapter XI – Offences (Sections 65 to 78) 
  12. Chapter XII – Intermediaries not to be liable in certain cases (Section 79) 
  13. Chapter XIIA – Examiner of Electronic Evidence (Section 79A) 
  14. Chapter XIII – Miscellaneous (Sections 80 to 90) 
  15. First Schedule – Documents or Transactions to which the Act shall not apply 
  16. Second Schedule – Electronic signature or Electronic authentication technique or procedure

IMPORTANT PROVISIONS OF THE ACT

A) Digital signature and Electronic signature:

Digital Signatures provide a viable solution for creating legally enforceable electronic records, closing the gap in going fully paperless by completely eliminating the need to print documents for signing. Digital signatures enable the replacement of slow and expensive paper-based approval processes with fast, low-cost, and fully digital ones. 

The purpose of a digital signature is the same as that of a handwritten signature. Instead of using pen and paper, a digital signature uses digital keys (public-key cryptography). Like the pen and paper method, a digital signature attaches the identity of the signer to the document and records a binding commitment to the document. 

However, unlike a handwritten signature, it is considered impossible to forge a digital signature the way a written signature might be. In addition, the digital signature assures that any changes made to the data that has been signed cannot go undetected. 

Digital signatures are easily transportable, cannot be imitated by someone else and can be automatically time-stamped. A digital signature can be used with any kind of message, whether it is encrypted or plaintext. Thus Digital Signatures provide the following three features:-  

(i) Authentication– Digital signatures are used to authenticate the source of messages. The ownership of a digital signature key is bound to a specific user and thus a valid signature shows that the message was sent by that user.  Integrity – In many scenarios, the sender and receiver of a message need assurance that the message has not been altered during transmission. Digital Signatures provide this feature by using cryptographic message digest functions. 

(ii) Integrity– In many scenarios, the sender and receiver of a message need assurance that the message has not been altered during transmission. Digital Signatures provide this feature by using cryptographic message digest functions.

(iii) Non-Repudiation – Digital signatures ensure that the sender who has signed the information cannot at a later time deny having signed it. 

A handwritten signature scanned and digitally attached with a document does not qualify as a Digital Signature. An ink signature can be easily replicated from one document to another by copying the image manually or electronically. Digital Signatures cryptographically bind an electronic identity to an electronic document and the digital signature cannot be copied to another document. 

B) ELECTRONIC SIGNATURE

This has also been dealt with under Section 3A of the IT Act, 2000. A subscriber can authenticate any electronic record by such electronic signature or electronic authentication technique which is considered reliable and may be specified in the Second Schedule. 

Any electronic signature or electronic authentication technique will be considered reliable if- 

  1. The signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and of no other person; 
  1. The signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person; 
  1. Any alteration to the electronic signature made after affixing such signature is detectable;
  1. Any alteration to the information made after its authentication by electronic signature is detectable; and
  2. It fulfils such other conditions which may be prescribed. An electronic signature will be deemed to be a secure electronic signature if- 

(i) the signature creation data, at the time of affixing the signature, was under the exclusive control of signatory and no other person; and 

(ii) the signature creation data was stored and affixed in such exclusive manner as may be prescribed. (Sec.15) 

An Amendment to the IT Act in 2008 introduced the term electronic signatures. The implication of this Amendment is that it has helped to broaden the scope of the IT Act to include new techniques as and when technology becomes available for signing electronic records apart from Digital Signatures.

There are various other provisions of the IT Act which are important which are as follows:

  1. E-Governance
  2. Attribution, Acknowledgement and Dispatch of Electronic Records
  3. Certifying Authorities
  4. Controller of Certifying Authorities (CCA)
  5. Root Certifying Authority of India (RCAI)
  6. Certifying Authorities 

Under the IT Act the licensed Certifying Authorities (CAs) are – 

  1. Safescrypt
  2. NIC
  3. IDRBT
  4. TCS
  5. MTNL
  6. Customs and Central Excise
  7. (n)Code Solutions CA (GNFC)
  8. e-Mudhra

NOW LET’S COME TO THE POINT THAT “WHO CAN BECOME A CERTIFYING AUTHORITY”?

The following persons can apply for the grant of a licence to issue Digital Signature Certificates, namely:- 

(a) an individual, being a citizen of India and having a capital of five crores of rupees or more in his business or profession; 

(b) a company having– 

(i) paid-up capital of not less than five crores of rupees; and 

(ii) net worth of not less than fifty crores of rupees: No company in which the equity share capital held in aggregate by the Non-resident Indians, Foreign Institutional Investors, or foreign companies, exceeds forty-nine per cent of its capital, will be eligible for grant of licence.

(c) a firm having – (i) capital subscribed by all partners of not less than five crores of rupees; and (ii) net worth of not less than fifty crores of rupees. No firm, in which the capital held in aggregate by any Non-resident Indian, and foreign national, exceeds forty-nine per cent of its capital, will be eligible for grant of licence. 

(d) Central Government or a State Government or any of the Ministries or Departments, Agencies or Authorities of such Governments.

There are various other important provisions also that are to be kept in mind in relation to the certifying authority:-

  1. Submission of performance bond
  2. Submission of application:- Every application for a licensed Certifying Authority should be made to the Controller in the form given in Schedule I of the Information Technology (Certifying Authorities) Rules, 2000. Rule 10 of IT (Certifying Authorities) Rules, 2000 prescribes what all are the documents to be submitted along with the application.
  3. Issuance of licence 
  4. Security Guidelines for Certifying Authorities
  5. Commencement of Operation by Licensed Certifying Authorities
  6. Procedures to be followed by Certifying Authorities
  7. Audit of Certifying Authority
  8. Registration Authority (RA)

ELECTRONIC SIGNATURE CERTIFICATES

Provisions relating to Electronic/Digital signature certificates are covered in Chapter VII i.e. Secs.35 to 39 of the IT Act, 2000 and Rules 23 to 30 of the IT (Certifying Authorities) Rules, 2000 and IT (Certifying Authority) Regulations, 2001. A Digital Signature Certificate is an electronic document which uses a digital signature to bind together a public key with an identity — information such as the name of a person or an organization, their address, and so forth. Digital certificates are the digital equivalent (i.e. electronic format) of physical or paper certificates. Examples of physical certificates are driver’s licenses, passports or membership cards. 

Depending upon the requirement of assurance level and usage of Digital Signature Certificate, the following are the classes of Digital Signature Certificates:- 

1) Class -1 Certificate 

2) Class – 2 Certificate

3) Class – 3 Certificate

Different types of digital signature certificates that are issued:–

 1) Individual Digital Signature Certificates (Signing Certificates) 

2) Server Certificates

3) Encryption Certificates

Certificate Revocation

Digital Signature Certificates are issued with a planned lifetime, which is defined through a validity start date and an explicit expiration date. A certificate may be issued with a validity of up to two years. Once issued, a Certificate is valid until its expiration date. Under such circumstances, the issuing CA needs to revoke the certificate. In case a Digital Signature Certificate is compromised, one should immediately contact the respective CA to initiate revocation. The CA will then put the certificate in the Certificate Revocation List. 

Duties of Subscribers

“Subscriber” means a person in whose name the Electronic Signature Certificate is issued. Chapter VIII i.e. Secs.40 to 42 of the IT Act, 2000 deals with the duties of subscribers.

CASE LAWS

i) State of Tamil Nadu Vs Suhas Katti 

The Case of Suhas Katti is notable for the fact that the conviction was achieved successfully within a relatively quick time of 7 months from the filing of the FIR. Considering that similar cases have been pending in other states for a much longer time, the efficient handling of the case which happened to be the first case of the Chennai Cyber Crime Cell going to trial deserves a special mention. 

The case related to the posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim.

The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting. Based on a complaint made by the victim in February 2004, the Police traced the accused to Mumbai and arrested him within the next few days. The accused was a known family friend of the victim and was reportedly interested in marrying her.  

She, however, married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet. On 24-3-2004 Charge Sheet was filed u/s 67 of IT Act 2000, 469 and 509 IPC before The Hon’ble Addl. CMM Egmore by citing 18 witnesses and 34 documents and material objects. 

The same was taken on file in C.C.NO.4680/2004. On the prosecution side, 12 witnesses were examined and entire documents were marked as Exhibits. The Defence argued that the offending mails would have been given either by the ex-husband of the complainant or the complainant herself to implicate the accused as accused alleged to have turned down the request of the complainant to marry her. 

Further, the Defence counsel argued that some of the documentary evidence was not sustainable under Section 65B of the Indian Evidence Act. However, the court relied upon the expert witnesses and other evidence produced before it, including the witnesses of the Cyber Cafe owners and came to the conclusion that the crime was conclusively proved. Ld. 

Additional Chief Metropolitan Magistrate, Egmore, delivered the judgement on 5-11-04 as follows: ” The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1-year Simple imprisonment and to pay fine of Rs.500/- and for the offence, u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently.” This is considered as the first case convicted under Section 67 of the Information Technology Act 2000 in India. 

ii) Syed Asifuddin and Ors. V. The State of AP. & Anr., 2005CriLJ4314 

Tata Indicom employees were arrested for manipulation of the electronic 32-bit number (ESN) programmed into cell phones that were exclusively franchised to Reliance Infocomm. The court held that such manipulation amounted to tampering with computer source code as envisaged by section 65 of the Information Technology Act, 2000. 

Reliance Infocomm launched a scheme under which a cell phone subscriber was given a digital handset worth Rs. 10,500/- as well as a service bundle for 3 years with an initial payment of Rs. 3350/- and monthly outflow of Rs. 600/-. The subscriber was also provided with a 1-year warranty and 3-year insurance on the handset. 

The condition was that the handset was technologically locked so that it would only work with the Reliance Infocomm services. If the customer wanted to leave Reliance services, he would have to pay some charges including the true price of the handset. Since the handset was of a high quality, the market response to the scheme was phenomenal. 

Unidentified persons contacted Reliance customers with an offer to change to a lower-priced Tata Indicom scheme. As part of the deal, their phone would be technologically “unlocked” so that the exclusive Reliance handsets could be used for the Tata Indicom service. 

Reliance officials came to know about this “unlocking” by Tata employees and lodged a First Information Report (FIR) under various provisions of the Indian Penal Code, Information Technology Act and the Copyright Act. 

The police then raided some offices of Tata Indicom in Andhra Pradesh and arrested a few Tata Tele Services Limited officials for reprogramming the Reliance handsets. These arrested persons approached the High Court requesting the court to quash the FIR on the grounds that their acts did not violate the said legal provisions. 

Some of the issues raised by the defence in the case were – It is always open for the subscriber to change from one service provider to the other service provider; The subscriber who wants to change from Tata Indicom always takes his handset, to other service providers to get service-connected and to give up Tata services; The handsets brought to Tata by Reliance subscribers are capable of accommodating two separate lines and can be activated on principal assignment mobile ( NAM 1 or NAM 2). 

The mere activation of NAM 1 or NAM 2 by Tata in relation to a handset brought to it by a Reliance subscriber does not amount to any crime; A telephone handset is neither a computer nor a computer system containing a computer programmed; there is no law in force which requires the maintenance of “computer source code”. Hence section 65 of the Information Technology Act does not apply. 

Following were the observations of the Court –  

As per section 2 of the Information Technology Act, any electronic, magnetic or optical device used for storage of information received through satellite, microwave or other communication media and the devices which are programmable and capable of retrieving any information by manipulations of electronic, magnetic or optical impulses is a computer which can be used as a computer system in a computer network. 

The instructions or programmed given to a computer in a language known to the computer are not seen by the users of the computer/consumers of computer functions. This is known as source code in computer parlance.  ESN and SID come within the definition of “computer source code” under section 65 of the Information Technology Act.  

When ESN is altered, the offence under Section 65 of Information Technology Act is attracted because every service provider has to maintain its own SID code and also give a customer-specific number to each instrument used to avail the services provided.

OTHER IMPORTANT CASE LAWS

  1. P.R. Transport Agency Vs. Union of India (UOI)
  2. SMC Pneumatics (India) Private Limited v. Jogesh Kwatra
  3. Ritu Kohli case
  4. Avnish Bajaj Vs. State (N.C.T.) of Delhi

WEBSITES REFERRED

  1. file:///C:/Users/admin1/Downloads/OVERVIEW_OF_CYBER_LAWS_IN_INDIA_Index.pdf
  2. https://www.academia.edu/29367292/OVERVIEW_OF_CYBER_LAWS_IN_INDIA_Index
  3. http://deity.gov.in/
  4. http://cybercellmumbai.gov.in/
  5. http://ncrb.gov.in/
  6. http://catindia.gov.in/Default.aspx
  7. http://www.cert-in.org.in/
  8. http://cca.gov.in/rw/pages/index.en.do
  9. http://safescrypt.com/
  10. http://www.nic.in/
  11. http://www.idrbtca.org.in/
  12. http://www.tcs-ca.tcs.co.in/
  13. http://www.mtnltrustline.com/
  14. https://www.thequoteunquote.com/quickdope/573/Cyber-Laws-in-India
  15. http://www.ncodesolutions.com/
  16. http://www.e-mudhra.com/

Sports Law in India

Introduction

Sports and games form an essential part of human resource development. Sports is very important for the development and excellence in the international events. Over the years a number of Nationals Sports Federations (NSFs) have come up for development of specific games/ sports disciplines.

One must actively support the sportsperson so that they can achieve their objectives and reach greater heights and also break records at the International Level tournaments like the Olympics. It has been the endeavor of the Government of India to lay down procedures for effective coordination among various agencies involved in the promotion of sports and extend required infrastructure, training and other facilities to the sportsperson for achieving excellence in the international events.

Over the years a number of Nationals Sports Federations (NSFs) have come up for development of specific games/ sports disciplines. The Government of India has been actively supporting these Federations in achieving their objectives.

Guidelines of 2001 laid down the following principles, which now stand subsumed in the National Sports Development Code of India(NSCI) 2011:

i. A clear role of dileanation between NSFs, SAI and the Government.

ii. Grouping of sport disciplines into priority, general and others for the purposes of determining the entitlement for
government assistance.

iii. Detailed guidelines for preparation of Long Term Development Plans (4-year cycle). Provision made for annual
sanction budgets of development plans.

iv. Binding tripartite agreements between NSFs, the Department and the SAI to be drawn up.

v. An emphasis on professionalizing and upgrading the administrative and financial management of Federations.

vi. An emphasis on systems to handle players‘ grievance.

vii. The appointment of registered chartered accountants to ensure maintenance of proper and transparent accounts.

viii. Recognition of the role of sports promoters, particularly in event management.

Recent Developments

Hon‘ble High Court of Delhi, in Civil Writ Petition No.7868 of 2005, in the matter of Indian Hockey Federation, while disposing off the matter vide Order dated 02.03.2010, categorically observed that the Government guidelines governing the NSFs are valid, binding and enforceable; and the tenure clause is not in violation of the International
Olympic Charter. The Hon‘ble Court also observed that the Government of India is fully competent to make regulations on NSFs and IOA. The Hon‘ble Delhi High Court further cited entry 10 and 13 of List I (Union List) which read as under:-

Entry 10: Foreign affairs, all matters which bring the Union into relation with any foreign country.
Entry 13: Participation in international conferences, associations
and other bodies and implementing of decisions made thereat.

Based on the above, the Hon‘ble Court observed that while an NSF has autonomy in the actual conduct of sports, Government recognition is necessary to represent the country. It further observed that international sporting events are an essential part of diplomatic relations of the nations, and several considerations like security concerns of players,apartheid, and perceived human rights violations have guided nations in decisions to participate or not to participate in sporting events in different countries.

Political and diplomatic clearances are, therefore, required by the Indian teams before participation in the international tournaments and forums. The Court pointed out that no State Government has the competence or the jurisdiction to undertake such exercise, which is the sole prerogative of the Union Government.

In another Public Interest Litigation No.195/2010 in the matter of Rahul Mehra Vs. Union of India and Others, the Hon‘ble Delhi High Court took a serious view on the mismanagement of the Sports Sector in the country and expressed deep concern at the inaction on the part of the Government in implementing and enforcing its own guidelines,particularly those relating to age and tenure.

The gist of important new initiatives taken by the Government is indicated hereunder. These have been suitably incorporated in the subsequent paragraphs of Guidelines by replacing the existing provisions and/or adding the new provisions. The new provisions supersede the earlier provisions in the 2001 Guidelines:

Gist of new initiatives taken by Government in the recent past:

1. Restoring the limits on duration of tenure of office bearers of Indian Olympic Association and all recognized National Sports Federations. (Annexure-XIII)


2. Guidelines for Good governance in the context of Basic Universal Principle of Good Governance of Olympic and
Sports Movement‖. (Annexure-XIV)


3. Annual recognition of National Sports Federations.(Annexure-XV)

4. Measures to combat fraud in age of players. (AnnexureXVI)


5. Prevention of sexual harassment of women in sports, etc.(Annexure-XVII)


6. Notifying IOA and NSFs as Public Authority under Right to Information Act. (Annexure –XVIII)


7. Drawal of advance calendar of sporting events both national and international. (Annexure-XIX)


8. National Anti-Doping Rules notified vide gazette notification no 21-4/2008-ID dated 5th February, 2010
(Annexure-XX)


9. Guidelines for efficient management of Coaching Camps, Selection of Coaches, Selection of Athletes, etc.
(Annexure-XXI)


10. Representation of Indian Nationals only, in National Teams (Annexure-XXII)

Objectives of Guidelines

The objective of these Guidelines are three fold:

1. Firstly to define the areas of responsibility of the various agencies involved in the promotion and development of sports.

2. Secondly, to identify NSFs eligible for coverage under these guidelines, to set priorities, and to detail the procedures to be followed by the Federations, to avail of Government sponsorship and assistance.

3. And Lastly, To state the conditions for eligibility to receive government recognition and grant.

WEBSITES REFERRED:

  1. https://yas.nic.in/sites/default/files/File918.compressed.pdf
  2. https://www.chaseyoursport.com/Tokyo-Olympics-2020/The-journey-of-India-at-the-Summer-Olympics/1435
  3. https://sportsauthorityofindia.nic.in/

Updated Guidelines here: Recommencement of Domestic air travel w.e.f. 25.05.2020 in India


The Ministry of Civil Aviation vide Order of even Number dated 21.05.2020 has issued general instructions and detailed guidelines and also Specific Operating Guidelines (SOP) for stakeholders, in connection with the recommencement of domestic air travel from 25th May, 2020.

As per Para. 1(j)(v) of Annexure-II to Order dated 21.05.2020, the passengers have to give a declaration to the effect that they have not tested COVID-19 positive in last two months.

Also it has decided that with regards to the evolving COVID-19 situation in various places where new cases that have been cured which are to be found in large numbers, a need has been felt to update this provision to avoid
hardships in the matter of air travel to the persons cured/recovered from COVID-19.

The Ministry of Civil Aviation has accordingly decided to update the above provision with a clause which is as follows
:- “I/we have not tested COVID-19 positive in the last three weeks (COVID-19 recovered persons fulfilling this condition will be allowed to travel upon showing a COVID-19 recovered/discharged certificate from any institution dealing with COVID-19 subjects).

WEBSITES REFERRED:

  1. https://www.civilaviation.gov.in/sites/default/files/MoCA_OM_dated_29_06_2020.pdf
  2. https://www.123rf.com/photo_68627236_stock-vector-airplane-and-iconic-building-over-india-country-map-with-flag-colors-over-blue-background-vector-ill.html

SPITTING IN INDIA: A PUBLIC NUISANCE

 INTRODUCTION

As you are aware that Smoking/spitting tobacco is also a major public health hazard which contributes to the spreading of communicable diseases like Tuberculosis, Swine Flu, Avian Flu and Pireumonia disease. As India combats the novel coronavirus and ensures the safety of every citizen, the government is making stringent laws to help control the spread of COVID-19 pandemic.

On that note and in view of this there are new laws that can come into force as a bane to many Pan Masala lovers. The national directive on lockdown conditions issued by the Home Ministry on Wednesday, April 15 states that the violators will be punished. It states that “Spitting in public spaces shall be punishable with a fine. There should be a strict ban on the sale of liquor, gutka, tobacco etc.” 

RELEVANT PROVISIONS APPLICABLE

Following are the sections under the Indian Penal Code, 1860:-

  1. Section 268 : Public nuisance:- a person is guilty of a public nuisance who does any act or is guilty of an illegal omission which causes any common injury, danger or annoyance to the public or to the people in general who dwell or occupy property in the vicinity, or which must necessarily cause injury, obstruction, danger, or annoyance to persons who may have occasion to use any public right.
  1. Section 269:- Negligent act likely to spread infection of disease danger­ous to life:—Whoever unlawfully or negligently does any act which is, and which he knows or has reason to believe to be, likely to spread the infection of any disease dangerous to life, shall be punished with imprisonment of either description for a term which may extend to six months, or with fine, or with both.
  1. Section 278 :- Making atmosphere noxious to health:—Whoever voluntarily vitiates the atmosphere in any place so as to make it noxious to the health of persons in general dwelling or carrying on business in the neighbourhood or passing along a public way, shall be punished with fine which may extend to five hundred rupees.

WHAT’S IN IT?

The Union Ministry has made public spitting an offence under the Disaster Management Act. With a daily rise of novel coronavirus, the patients around the country and the State Governments are ensuring strict laws. On that note, Himachal Pradesh police have issued a law for people who spit in public will now be charged with attempt to murder.

The reason for this measure that not only Himachal Pradesh but various states around the country are banning spitting because of its scientific reasons. Medical professionals state that droplets expelled in the air by infected patients via coughing or sneezing are the common means of transmission of the virus. As such, spitting is more dangerous as it can carry the pathogen to a longer distance than even coughing or sneezing could. 

CONCLUSION

Other states in India have their own take when it comes to public spitting. In states like Uttar Pradesh, pan masala products are banned to discourage spitting. Other states including Bihar, Telangana, Haryana, and Assam, have banned smokeless tobacco products and public spitting. Furthermore, the Brihanmumbai Municipal Corporation imposed ₹1000 fine on anyone caught spitting in public. So everyone, do be careful and refrain from spitting in public.  

BOOKS REFERRED

  1.  Pillai’s, P S A Criminal Law Lexis Nexis 13th edition 2017 p. 537

WEBSITES REFERRED

  1. https://curlytales.com/you-can-now-be-charged-with-attempt-to-murder-if-you-spit-in-public-places/#:~:text=The%20national%20directive%20on%20lockdown,%2C%20gutka%2C%20tobacco%20etc.%E2%80%9D
  2. http://pbhealth.gov.in/6e.pdf
  3. https://www.ijlmh.com/wp-content/uploads/2019/04/Law-Relating-to-Public-Nuisance-in-India.pdf
  4. https://indiankanoon.org/doc/734195/#:~:text=%E2%80%94Whoever%20unlawfully%20or%20negligently%20does,with%20fine%2C%20or%20with%20both
  5. https://indiankanoon.org/doc/209076/
  6. https://indiankanoon.org/doc/1368265/#:~:text=278.,extend%20to%20five%20hundred%20rupees.
  7. https://www.dreamstime.com/no-spitting-sign-white-background-illustration-no-spitting-sign-illustration-isolated-white-warning-sign-red-circle-image137114866

N.E.O.N

N is ‘N’OBLE

E is ‘E’NERGY

O is ‘O’BEDIENT

N is ‘N’IFTY

  • “N” OBLE, Law is a ‘Noble’ Profession as its purpose is to conserve and preserve the moral sanctity that binds the society and it protects and upholds the law, this is depicted in Article 14 as per the Constitution of India, the State shall not deny to any person equality before law or the equal protection of the laws within the territory of India.
  • “E” NERGY, we are full of ‘Energy’ and ‘zeal’ due to Lawyers providing legal aid to all as “Justice delayed is Justice denied”.
  • “O” BEDIENT, as Lawyers  we appear in Hon’ble Court in person at certain place, time and aid the person who seeks justice when the  summons, notice, order, or proclamation proceeding issued from any public servant who is  legally competent to the same as stated  under Section 174 of Indian Penal Code.
  • “N” IFTY meaning Skilful. An Advocate is effective and good in proffering legal assistance, apart from being an avid Listener and an effective communicator.

Books Referred:-

  1. Universal Law Publications :- The Constitution of India by P.M. Bakshi,  15th edition
  2. “Professional Bare Act”:- Indian Penal Code

Websites Referred:-

  1. https://www.lexico.com/en/definition/nifty
  2. https://www.legistify.com/indianpenalcode/details/ipc-section-174-non-attendance-in-obedience-to-an-order-from-public-servant/
  3. https://pib.gov.in/newsite/mbErel.aspx?relid=118011
  4. https://www.hiclipart.com/free-transparent-background-png-clipart-pvuct

TRUTH AND HONESTY: TWO SIDES OF THE SAME COIN

As the saying goes by “Honesty is the best policy”. The power of truth can be known from the fact that nobody, not even the greatest liar in the world, has the courage to say that he is telling a lie or that truth is not good. A man who tells a lie is like a criminal who has committed murder and is pleading not guilty even though all the facts, circumstances and evidences point towards the criminal. And the thing which a criminal pleads guilty for a crime which the hardened criminal is pleading not guilty yet it is that criminal who has committed the murder, one must always be truthful and honest no matter how henious the crime is and also avoid lying and being dishonest.

And when the truth is known, that person is terribly upset and highly afraid. An ordinary criminal may be afraid of fine, imprisonment or other punishment. But if the liar i.e the criminal happens to be a well-known popular figure, that person may be afraid of losing his popularity or reputation. In this respect, truth also becomes an acid test for our inner strength or bravery.

Many people may not be afraid of losing their life with a bullet but there must be few who have the courage to face the bullet of truth. A truly brave person sticks to the truth in all the circumstances. But many succumb to pressure or fear of torture or death like a criminal might. Joan of Arc, a young girl of eighteen, who refused to bow before the church and the government and embraced death by being burnt but she stuck to what she believed to be the truth.

WEBSITES REFERRED

  1. https://www.shareyouressays.com/english-essays/342-words-short-essay-on-the-value-of-truth/3031
  2. https://www.123rf.com/clipart-vector/honesty.html?sti=lj06uh9mvspsnqs4rk|
  3. https://www.dreamstime.com/stock-images-truth-not-lies-board-shows-honesty-image25845894

Importance of feedback in the recruitment process

A couple of years back I was shortlisted for a well-known, reputed multinational organization and I had to appear for their recruitment drive. I had to report there at about 8:30 AM and the recruitment process consisted of GD followed a couple of rounds of interview. After clearing the GD and the first interview round, I appeared for the last round of interview. It was a managerial and HR round and mostly consisted of questions about me. I answered whatever they asked me and I could understand from their non-verbal expressions, that they were quite satisfied with my answers. I came out of my interview, getting a feeling of being shortlisted. But to my utter surprise, I was rejected. I left the building, thinking about where I went wrong considering the fact that I gave my best out there and they also seemed to be impressed by me. I was puzzled and confused and I really hoped at that time, that they should have told me after my rejection where I went wrong and where I can improve.

All I wanted at that time was feedback. Feedback would have clearly responded to my questions of   rejection and would have left me – less confused. Essentially feedback is considered to be the last and the most crucial step in the entire recruitment process. But sadly, many companies fail to provide a reason of their doings, let alone a plausible one. Companies should understand that when candidates are signing up for them, they should at least respect our decision by providing a platform where we can share our thoughts easily. In the recent times, feedback is considered to be a crucial step and a recruitment process is considered to be incomplete without this step.

Why feedback is considered to be a very important step is due to these reasons:

  1. Feedback ensures the transparency of the recruitment process of an organization. It remove the fuzziness involved in the process of selection.
  2. Candidates better understand what went wrong in the process and it makes them stronger when they appear for the next drive.
  3. Feedback, if solicited from the candidates, help the recruiters to understand any loopholes in the recruitment process and it also provides an avenue for the recruiters to improve themselves.
  4. Ensures transparency of the company which can promote the employer branding and can also be a tool or a source of great competitive advantage.
  5. Word of mouth is a tool which can make or break an organization. As in the case of mine, if feedback was provided, even though I did not get selected, I would have definitely spread the good word for that company.

The process which most company fails to understand is very simple. Our industry thrives on feedback and to get a very first-hand experience of how any program appeals to the mass, one should definitely implement the feedback step in each and every process. From a candidate’s perspective, I can say that it is not feasible to get selected in every company, but if I am giving sometime for one company, I might as well know what went wrong for me to be rejected from that company.

As for companies, they should understand – Respect works in both ways.

Source – Self

How to leave with respect when laid off

Abdul Kalaam once said – “Love your job but NEVER fall in love with your company”.

Desperate times calls for desperate measures. At least that’s what some of the reputed, well known and no-so-known companies have done in the recent times, owing to the pandemic. Many a companies are trying to cope with the lashes of COVID-19 by cutting costs, eliminating positions and retrenching people. Positions that were once considered to be very crucial to the functioning of the business were just scraped off from the hierarchy and employees occupying those positions were handed a ‘good-bye’ note.

But there is a stark difference in how some of the companies decided to do so. In some companies, the CEO was very transparent in explaining why there is a necessity to lay off people and they felt extremely sorry while doing so. They wrote long, meaningful mails and they at least tried to empathise with the laid off employees. And then there are other companies who’s CEOs just mailed a short message conveying that they are being laid off without any note of sorry or explanation, forget about transparency. But whatever be the mode or the reason of laying off, we as employees should understand that it is best for business and instead of leaving on a bad note, we should make sure to leave with respect and on a good note.

There is no doubt that we might be feeling very smitten inside, but we should not let that feeling empower us to destroy everything that we have accumulated over the years. Now, one must be wondering how to do so amidst such emotional times. I would like to suggest a few ways by which one can leave on a good note even when things might have not worked in their way. Some of those suggestions are:

  1. Try to not dwell on the negative emotions. At the time of lay off, one might feel very low about it, but try not to feed into the negative emotions. Instead of that, one should think about one’ achievements, successes and milestones at the company. Think about what was your best contribution and what worked for you and try to harvest on that.
  2. Try to work out a plan to handover your work. Since one is working remotely, one must be very methodical and careful while handing over very confidential information such as clients’ list project reports and other such documents so that others’ can plan out the work. It is very okay to feel about withholding information, but one should not do so because one should understand that it is not the end of one’s career.
  3. Draft a proper good bye mail. Draft a short and clear mail, intended to one’s colleagues, friends and other people in one’s office network. Make sure to include your contact details – mostly phone number and personal mail id so that people can stay in touch with you. Also one should not forget to give a note of thanks to everyone, in spite of all differences. Such a habit will definitely help one in one’s career while searching for other jobs.
  4. Try to build and amend bridges at the time of leaving. One should talk to the close colleagues, confidantes and the network of peers and mentors, so that they can assist to find a new job in this landscape.

These are the very few steps one should take to ensure that even though things did not quite work out well for you, there is always a way to make things better at some other place.

‘Networking is the key to one’s success.’

Source – Self

Success

In today’s world everyone wants to be successful but what is a success. The perspective of success varies from person to person. For the record, the people before us have a different view on success and the person after us will have a different view on success. Moreover, people compare different people performance to evaluate their success. But success is not something that you can copy from others. You have to make your own path to achieving success. In modern-day, people are obsessed with success because of the glamour and lifestyle of successful people.

What formulates a person successful?

There are many ways in the world to be successful. But most people think of celebrities, artist, politicians, and businessmen whenever they heard the word success. Moreover, they think doing what they will make you successful but that not the case. They forget the most basic thing that makes a person successful that is their hard work, dedication, and the desire to achieve their dream. More importantly, they what they like to do not what that others told them to do. Successful people do what they like to do also they do what they feel correct for their business. If you look in the dictionary for the meaning of the word success then you will find that it means the achievement of one’s goal or aim. So, basically, anyone can achieve success by simply achieving their aim or goal.

What is the harm of success?

We all knew that we can’t achieve something without sacrificing something. Success also demands various things from you. But these sacrifices will not go in vain if you achieve your goal.

Certainly, many people achieve professional success but in doing so they fail in achieving mental, social and physical success. The tension of lacking behind in other things pulls them apart.

Also, there are cases where people became so obsessed with success that the people around them start to feel uncomfortable around them. In some cases, they have gone mad. Apart from that, people also get depressed if they can’t achieve success like others. So, we can say that there is much harm to success.

Success and hard work

It may sound unfit to some peoples but success depends a lot of hard work. Without it, you can’t become successful. Hard work does not mean that you do laborious work or the work that make you sweat. Hard work means having a healthy body, strong mind, willpower and positive attitude towards things. And for all those things you need energy. So, be attentive to your body and soul. Besides, do not just work on your program, push your limit, take charge of other things, improve your skills and most importantly keep learning. Apart from that, be with positive peoples, develop positive habits, and do exercise not only for the body but also for your mind.

To sum it up, we can say that success is like a seed that needs a balanced proportion of all the elements of life. And no one can achieve success in a day they have to go through and face different conditions in life for being successful. Above all, success is the feeling of fulfillment that you feel when you achieve your goal.

TOP 9 Small Business & Start-Up Ideas for 2020 (ONLINE FROM HOME)

Today, we’re going to talk about TOP business ideas for 2020. They are not going to be those obvious ideas that you can think of yourself like starting a restaurant or a car wash; we are going to talk about ideas based on recent trends, recent growing markets.

How To Start A Business

A very important rule! If you decide to start your own business, your motivation shouldn’t be because someone said: “It’s going to be a great business!”. Your perfect business idea should consist of the following things: it should be something you like doing and it should be something you are really good at.

1. Coworking Space

Remote workers are spurring on a new revolution for white-collar professionals, as many roles traditionally set in the office space transition to working via the web. Since loneliness is an all-too-common affliction for remote workers and working from a coffee shop isn’t always the quietest choice, the appeal of shared coworking spaces grows each year.

2. Posture Corrector

Nowadays, people constantly hunch over their phones and laptops, it’s no surprise that there’s been a rise in back and neck pain. The keyword “posture corrector” gets about 74,000 monthly searches proving to be a great startup idea for new entrepreneurs.

3. Fitness Tech

Apps related to diet and fitness account for 3.31% of all app on the Apple Store. People are constantly on the move. Making it possible for consumers to fit daily workouts conveniently into their crazy schedules closes another barrier to a healthy lifestyle.

4. Men’s Cosmetics

Men’s cosmetics industry is worth approximately $3.4 billion. One of the most popular niche products targeting men is beard oil, a part of the male grooming industry that makes approximately $6 billion in annual sales. Approximately 39% of American men have beards.

5. Food truck

Food trucks represent all the benefits of a restaurant but without the initial investment of a brick and mortar business space. Only 10-20% of food trucks fail, whereas the failure rate for new restaurants can be as high as 90%.

6. Healthy Fast Food

Think about why people flock to their favorite fast-food chains. The price, speed, and convenience offer consumers a quick way to eat on the go and on a budget. With high demand and low competition, healthy fast food makes a great business idea for 2020.

7. Reusable Bags

As people become more conscious of the waste they produce in their homes, some are starting to use reusable bags to lower the amount of plastic waste. Business ideas centered around preserving the environment can help you build a socially conscious brand.

8. Smart Apparel

With smart apparel’s surging growth rates, this niched industry is looking to net over $4 billion by 2024. This subsector is still so new, making it fresh for innovative ideas from budding entrepreneur techies.

9.Travel Consulting

If traveling is your passion and you are always updated about things like best airplane ticket options and hotel deals, then you fit the bill. You can start by helping your family and friends, securing the best travel deals and selling rewards flights.

Hope these ideas are useful to young budding minds out there looking forward to being Entrepreneurs of tomorrow!

7 Online Business Anyone Can Start (No Scam No Investment)

Earning money has always been associated with and restricted to traditional ‘offline’ route. With the Internet taking over a large part of our lives, more people are looking to ways to earn money online to increase their financial inflows.

Photo by Andrea Piacquadio on Pexels.com

However, you should be careful of the platform that you opt for. While there are numerous ways to earn money online, some of these might be fake, thus taking you for a ride. Also, do not expect to earn a huge amount quickly when using online avenues.

1- TEESPRING

Teespring is a free platform that lets you create and sell over 50 kinds of products with no upfront cost or risk. We handle everything, from printing to shipping to customer service. Teespring is for everyone—from entrepreneurs looking to start their own online business, to Creators wanting to offer awesome merch to their fans, to charities looking for a hassle-free way to raise funds, and everyone in between.

Use Teespring tools like stores, promotion codes, buyer messaging, and more to maximize your sales! We can even list your products within the most powerful global marketplaces like Amazon, eBay, and more through Teespring’s Boosted Network.

How do I make money using Teespring?

You choose the selling price and profit for all of your products. When a product sells you get to keep the profit. For example, the base cost of a t-shirt is $10 and your selling price is $24; when you sell a shirt you will earn $14. Once the orders are processed your profit will be available for withdrawal in the Payouts section of your Teespring account. Don’t forget the more you sell the more profit you can earn per product per month.

2- Merch by Amazon

Basically, if you have 100 t-shirts in your account, you could expect to make about … This is a conservative estimate, about $150 a month. If you have 1,000 t-shirts in your account, you can expect to make maybe $1,500 a month. If you have 8,000 t-shirts in your account, you could expect to make about $12,000 a month.

Merch by Amazon is a very cool startup type program by Amazon. It is a pod program where you can sell tshirts, sweatshirts and hoodies in USA. Anyone can participate as long as you have payoneer. For Indians, there is a 15% tax on earnings. (No wonder taxation is theft as we have to pay tax on those earnings in India as well. But then IRS are a bunch of thieves)

3- REDBUBBLE

The designers earn royalties from the sale of their creations. They receive a percentage of the profit and the rest of the funds account for the fee paid to Redbubble and the manufacture of the merchandise. The site then handles the inventory and shipping transactions on your behalf.

The designers earn royalties from the sale of their creations. They receive a percentage of the profit and the rest of the funds account for the fee paid to Redbubble and the manufacture of the merchandise. The site then handles the inventory and shipping transactions on your behalf

4- UDEMY

One of the best features of selling classes on Udemy is the fact that it can become an excellent source of passive income. Once you create and post a course, it can earn you money for a long time without additional work. It just might take more work to market your course to potential students.

For example if a student purchases your course using an Instructor Coupon code, either from promotions to your own audience (e.g., your email list or YouTube subscribers) you can make 97% revenue share. Alternatively if the course is sold via an Affiliate, the split is 50% affiliate, 25% Instructor and 25% Udemy.

5- AFFILIATED MARKETING

Affiliate marketing is one of the oldest marketing practice which gains affiliates a commission in the case of sale based on the affiliate’s recommendation. It is one of the cheapest and easiest ways of marketing as you don’t need to create and sell a product. Just one thing you need to do is to enable a linked connection between buyer and seller and take your commission when the sale is made.

As you see, affiliate marketing is a passive income source. It is highly competitive it is true but still it may be so easy to make money online with affiliate marketing. To be successful, you need to learn what works and what doesn’t while promoting your products.

There are many affiliate marketing works. So, you need to be patient. You can feed your website with qualified content to get high ranking positions and raise awareness, attend affiliate marketing events, seminars or webinars and join a discussion forum or online communities to meet new people. All make a great contribution to develop you. Naturally after these contributions you will be more passionate to make money from affiliate programs. If you are patient enough you will make money with affiliate programs. 

6- YOUTUBE AFFILIATED MARKETING

You can make money on YouTube by doing affiliate marketing, which is including links to products you review and use in your videos that will track a purchase. If someone makes a purchase using your affiliate link, you receive a small commission for the sale.

Another thing about affiliate marketing is the payout percentages as well as how these people track your viewers who are clicking on these links. Every time someone clicks on one of your special tracking affiliate links, a little cookie is put onto that person’s computer to track what they purchase. The best part about the cookies is that if you link to a specific product, they don’t have to purchase that product. Anything they purchase on that website, you get commissions for. So they could click over with your affiliate link and that cookie and decide not to purchase that, but purchase a whole bunch of other things, and you get paid commission off it.

7- EBATES REFERRALS

You can still make money without a blog! In fact, you can make some major coin with the Rakuten Referral Program simply by inviting friends and family, using your social media networks to the fullest – including Pinterest – and even promoting in neighborhood groups and forums.

Have friends and family share your link. If you are saving for something special, and they feel like they can be a part of it, they will likely glady share the opportunity with their followers.

Of course, using the strategies above won’t hurt either. Pay special attention to numbers 3 through 5 and remember – have fun with it, but own it!

Shift in the workplace legal structure

COVID-19 has completely revolutionized the workplace by pushing most of the organizations and the businesses to quickly switch from ‘office model’ to ‘work-from-home’ model. While working under the roof of an office, there existed legislations and legal framework to monitor the behaviour, but those existing policies need to be adjusted so as to incorporate the WFH scenario.

Some key areas where the legal framework needs to be adjusted are:

  1.  Women working at night. Previously as per the Shops and Establishment Act of each state, women employees were prohibited to work during some specified hours at night or they have to arrange for transport services along with escort to make sure that they reach their home safely. So employers had to face compliance issue with regard to women employees. But now since most female employees have moved to WFH, so the employers are free from such compliance issues and at the same time, the floor is open for the employers to look out for those women population who could not previously access the jobs due to geographical and other constraints.
  2. Change in compensation structure. Previously many allowances such as conveyance allowance, meal allowance or food coupons were given out to employees as a part of hardship allowance. But this might not be attractive now considering the WFH scenario. Instead, employers should provide other allowances such as internet reimbursement, ergonomic allowances, IT expenses etc.
  3. Sexual harassment at the new workplace. POSH Act was passed in the year 2013 for the prevention of sexual misconduct at office. But now as the workplace has changed, new forms of misconduct such as repeated phone calls at inappropriate and ungodly hours, forcing to switch on videos, playfully passing lewd remarks and over-discussion of work are creeping up with time. Considering the face that the boundary between work and home has become blurred, POSH needs to incorporate some new rules to prevent such misconduct.
  4. Overtime work. Just a few months back, employers used to measure productivity by checking the entry and exit times of an employee. They used to do so by either swiping their cards or by biometric screening. So if an associate is doing overtime work, usually it was thought that the person is very hardworking. But now the associates are working from home, so performance should now be measured depending on the outcome of the employees rather than on the time spent on doing the work.
  5. Security and compliance threats. SEZ does not have guidelines for WFH facility but STPI has it. As per them, it is necessary for the employees to work on Virtual Private Network. So employees should spend on securing a robust and private WiFi so that that IT security is not compromised on the local system and confidentiality is maintained.
  6. Modification of labour laws like maternity benefits and compensation laws. Previously associates can claim compensation from the employers if any accident occurs at the workplace, but now with the WFH arrangement, the existing compensation laws need to be modified so as to arrange for any compensation if any accident occurs at home.

Our workplace dynamics have completely changed and to enable smooth transition, employers also need to look into the existing legal structure so that eventually the employees does not feel to be disadvantaged. Our home is the new workplace and so laws have to be adjusted taking our ‘home-office’ into consideration.

Source – Self

Steps to finding the Right Career for You

While it will likely change over time, focusing on a certain career path can help inform your decisions about your professional growth as you gain skills and experience. It’s important to reflect on your interests, skills and career goals as you make certain life choices such as which school to apply for, which entry-level job is right for you, whether to get a post-graduate degree or specialized certification and more.

In this article, I will focus on how to identify your key skills and interests, match those qualities to a potential job field and start a career.

1- WRITE DOWN CAREER GOALS

Before selecting a career, start with self-reflection by asking and answering certain questions. Active reflection helps narrows your choices into something more specific.

Consider asking yourself:

  • What do I want from my career?
  • What are my core values?
  • What activities do I most enjoy, professionally or in my free time?
  • What are my interests?
  • What are my strengths and aptitudes? Soft skills? Hard skills?
  • Do I want to specialize in certain technical skills or take on management roles?

Once you answer questions like these (and any others that are important to you), you can better research potential careers paths. It’s also important to revisit your career goals as you grow personally and professionally to ensure your goals remain achievable and aligned with your interests.

2- Set one short term & one long term goal

Once you have narrowed down your options, consider establishing milestones for your career. Research where other people in your field are at five or ten years into their career, and make note of the job titles they have. Decide what title or advancements you want to have at these future points. Then research what you can do to reach those goals. You may need to undergo training programs, take on specific responsibilities or hold prerequisite positions.

By establishing career goals five or ten years in the future, you can plan based on what progress you should expect every year. Schedule time regularly to reflect on your career and goals.

3- Identify your Personality Type

A personality type is a set of personality traits that can be grouped together. There are multiple methods for discovering your personality type, many of which focus on your responses to different situations. Different personality types may naturally gravitate toward different interests and develop different strengths, including careers.

Different tests list common career choices for each personality type. If you take a variety of tests and one or two careers appear across multiple tests, that specific career is likely worth researching.

4- Did you enjoy your previous job/internship?

Your job satisfaction in previous roles can also help guide your career choices. Identify trends in your previous positions, such as focusing on a specific technical skill. Also, review your job history to identify positions that you felt fulfilled in.

5- Educate yourself with the Job requirements – skills, knowledge, interests,etc

Many jobs have specific education requirements for applicants and new hires, such as obtaining a high school diploma, completing a bachelor’s degree program or having a master’s degree. Some positions also require applicants to have their degrees in a specific field related to the position.

Review the education requirements for jobs you are interested in, and apply for jobs that accept your current level of education or research additionally degrees or certifications you may need.

6- Work on gaining expertise in the skills you already possess

Make a list of your current skills, certifications and areas of expertise. Also ask for feedback about your technical, interpersonal and people management skills from coworkers and colleagues. This evaluation can help you find careers that match what you are best at.

7- If you can choose your interest as your career,what will it be?

Depending on your personality, you may have interests that lend themselves to different careers. Examine your hobbies, past volunteer experiences and interests to identify activities or fields you enjoy. While this information is outside of a professional context, creating a list of activities you like can help you focus a career search. For example, you may enjoy a career in cybersecurity if you enjoy logic puzzles, or you may enjoy a traveling sales role if you like meeting new people.

Use this knowledge to apply for short-term positions or volunteer opportunities to explore new career options. This first-hand experience allows you to test your suitability for a career. If you are currently in school or have a job, consider taking a course or certification program that is required for a field that interests you. This experience can help you determine if the career’s skills and content are something you enjoy.

8- Consider your salary needs

Depending on your lifestyle, you may require a certain salary. Find average salaries by job title, company and location on salaries. This can be a good starting point for determining how much money you may have when first starting out, as well as your earning potential after you’ve gained a certain amount of time and experience. While salary certainly does not equal an engaging, satisfying job, it is an important factor to consider when mapping out your career path.

Succession Planning

One of the hardest task of an HR manager in any organization is talent management. It is the process of identifying the existing talent in the organization and then assessing the talent needs, followed by talent acquisition, talent engagement and finally by talent retention. The hardest part of this is not the process of talent acquisition or engagement, but rather it is the supply of talent itself. Most of the business and operating managers are of the notion that there exist an ample amount of talent in the labour market and that talent identification or acquisition would be easy. But the bitter truth is that, talent with the specific skill set and qualities is in scarce quantity in the talent market and thus the talent acquisition strategies should be very streamlined and well-defined so as not to lose out on the desired candidates. But on top of all this, one very important way that should be followed by each and every organization is Succession Planning.

Succession Planning is the process of identification and development of new leaders, usually at the executive level, with the intention to replace the old leaders when they die, retire or they leave the organization abruptly. This is a practice which is followed so that the existing capable leaders develop themselves so that they can assume the positions of the higher authorities as and when that become vacant. Succession planning is extremely important in an organization because of multiple reasons:

  1. Talent resource with the desired skill set is very scarce in the labour market.
  2. If an executive leaves the organization abruptly, there would be no qualified candidate to become the successor of the vacant position.
  3. Even if a candidate is selected to fill the vacant position, there would be loss in terms of acquisition costs, loss of productivity and hence un-productive costs and then the cost of upskilling among the few direct costs.

Considering the fact that talent is scarce in this unpredictable talent market, it is important for every organization to take strategic decisions as to how to implement the succession planning. It is a way by which an organization can plan for the future in case of uncertain events.

Now, while planning on how to conduct succession planning, an organization can follow a few steps. Some of the steps are:

  1.  At first, try to understand that how the organizational structure is going to be affected if some executive at the key position abruptly leaves the organization. And then while charting out the organizational hierarchy structure, identify the employees who play a critical role in the organization.
  2. Try to identify which are the key positions in your organization which if left vacant even for a single day will create a he dent in your organization.
  3. Scanning the organizational hierarchy, try to identify the top and the bottom players, by looking at their performance records, their career growth and majorly by discussing with their managers.
  4. For any single key position, always try to keep more than one option open.
  5. One of the most crucial step is to communicate who is selected and what is the purpose of selection. This communication should be done to both the new selects as well as the key position holders.
  6. After selection of the individuals, provide them the required training so as to make them ready to occupy the upper positions as and when required.

These is the backbone of succession planning which should be followed by every organization so that the entire organizational structure does not crumble down for a key member leaving the organization.

Source: https://www.insperity.com/blog/5-ways-your-org-chart-can-kick-start-your-succession-plan/

How to Become Rich Faster than Others (Practical Steps)

Everybody wants to become RICH one day.

Still, how is it that some people have all the answers? How do the rich keeping getting richer while the poor keep getting poorer? Is the game actually rigged against us? Are we, in fact, doomed to live ordinary lives, merely controlled by our hedonistic desires and pleasures, forced to succumb to our animalistic urges, never able to actually get ahead in life, let alone get rich? Or, is there some solution? A way out, if you will? 

How to Become a Millionaire and Get Rich the Right Way

Clearly, these are questions posed by the masses. But not everyone can pull it off. What separates those who seem to have all the answers from those that are constantly jumping from one ship to the next, never able to truly find their gravy train? Well, the answers are far simpler than most would imagine. 

Don’t spend more money than you make.

 Not many people follow this advice. Many are focused on spending as much as possible. Whether it’s to revel in the perception of being more well-off than they actually are, or some other purpose, this is the truth across much of the developed world. 

Keep a Diary of your Expenses.

Benjamin Franklin once said, “Beware of little expenses. A small leak will sink a great ship.”

As easy as it might seem to ignore the little stuff, so to speak, the more you sweat the details, the better off you’ll be. Cancel that gym membership you haven’t used in six months. Eliminate that costly cable television plan. Stop buying expensive lattes and eating out when you know you can’t afford to do it. Download an app or purchase a small notebook and track every expense no matter how small or how big. 

Quit all the Bad Habits- drinking, smoking, gambling, etc.

Bad habits hold us back from achieving many kinds of goals. They stop us from losing weight, making more money, saving, investing and everything in between. The only way you can actually get ahead in life is to decimate those bad habits. You need to quit the bad habits before they lead you down a deathly spiral. 

It’s hard to achieve something that takes so much of your energy, such as getting rich, without eliminating your bad habits first. I’m not just talking about poor financial habits; I’m also talking about any other habit that eats away at you, physically, emotionally or mentally. 

Save 20 % of your Income every Month.

In order to get rich, you need to save at least 20 percent of your income off the top. Everyone has heard this before, but how many people actually follow this advice? 

The term “pay yourself first” holds major weight here. While some don’t find the importance in this, others realize that this not only provides a rainy-day fund in case of emergencies, but also moment-of-the-opportunity cash. When the right opportunity comes by, you need cash to seize it. If you don’t have the cash, you just missed the proverbial boat. 

Pay-Off your Debts.

When you’re debt-free from the bad debt (not the good debt like mortgages for investment properties and loans to grow you business, for example), take that money and put it towards your savings. The trick is not to go spending cash and splurging on a vacation or a new car once you’re debt-free. Stay focused. 

Don’t Rent but Own your House.

No matter what it takes, even if you have to downgrade your living situation, you should do what it takes to purchase a home. Sit down with a mortgage broker and assess your situation. Set some goals and create a plan of action.

Even if you don’t have enough money saved for a down payment right now, figure out what it’s going to take to buy your home. We’re not talking about your dream home here. However, over time, the money spent on your mortgage is far better invested than money spent paying rent. 

Invest, but only after Researching the hell out of it.

Many people invest for the sake of it. If you don’t have proper knowledge about the plans your investment offers then you might never really grow your money in it. The better you know an industry or niche, the more likely you’ll be able to spot ideas that could possibly create massive amounts of income for you in the future. No one else is going to do this for you. And when you do invest in something that you know, be sure to track it vehemently.

Multiple source of income but not mainstream.

Anyone who’s serious about getting rich needs to build multiple streams of passive income. Passive income is incredibly important when it comes to amassing wealth. Simply put, you to need to generate your income on autopilot if you want to create a considerable net worth. 

There are a number of passive income generating ideas that you could implement. Some of the most popular involve real estate and dividend income for those that can afford the often high-cost barrier of entry into those fields. Others opt for generating passive income by starting a blog, creating digital products such as e-books or courses, and even creating online tutorials, just to name a few examples.

Time Value of Money.

We all have the same amount of time in this world. You don’t have more than the next person and that person doesn’t have more time than another. No matter if they’re a powerful politician, a business magnate or a famous athlete, they don’t have more time than you do. Time is life’s greatest equalizer. 

It all depends on how you utilize your time. Every second is precious. Become lazy or procrastinate and lose your dream of being rich.

Rome was not built in a day.

Daily goal setting provides milestones on your way to your bigger goals. Break the big goal down to achievable daily goals that won’t seem so overwhelming. For example, if you want a $10 million dollar net worth in the next five or 10 years, figure out what it’s going to take on a daily basis to move closer to that goal.