Books on Indian History which You Must Read

Indian History has been the theme for many books. Whether its fiction or non-fiction, there are plenty of books which deserve to be on the list of must-read books written on the topic of history. These books give one a detailed understanding of India’s history.

Be it comprehensive historical books or fictional accounts of a historical incident, there are many options for you to choose from. If you are a person who loves both reading and history then the following 5 books are just the right choice for you.

The Argumentative Indian by Amartya Sen

Amartya Sen is an Indian Economist and writer who had won the Nobel Prize in 1998. This book is a collection of essays and it will help one understand the Indian polity. It focusses on the importance of public debate, argument and intellectual diversity in the Indian civilization of the past. Sen writes about his view on how and what will lead to the success of democracy in India.

India After Gandhi by Ramachandra Guha

Ramachandra Guha is an Indian writer and researcher whose areas of interest include society, politics and history. India After Gandhi is a book describing the journey of modern India, from post-independence from the British in 1947 until the 1990s. The book will provide one with a thorough understanding of India’s social and economic spheres. It covers the country’s political history over the later part of the 20th century.

The Last Mughal by William Dalrymple

William Dalrymple is a Scottish historian, writer, critic, art historian and curator. He has won several awards and prizes for his writings. The book is a comprehensive description of the time period when the Mughal empire started declining in India. It will be a treat for people who love reading history. It is about the last Mughal ruler, Bahadur Shah Zafar II, and it provides an account of 19th century India with the tale of the emergence of the British Raj. Another famous book by him is White Mughals which is his fifth major book, it tells the story of the love affair between James Achilles Kirkpatrick and Khair-un-Nissa Begum at the backdrop of nineteenth century Hyderabad.

The Discovery of India by Jawaharlal Nehru

Jawaharlal Nehru was India’s first prime minister and he wrote this from 1942 – 1946. This book was written by Nehru when he was imprisoned by the British. It is a tribute to the rich cultural heritage and legacy of the country. It provides an account of all major developments in the subcontinent from the period of Indus Valley Civilization to the last years of the British rule.

The Palace of Illusions by Chitra Banerjee Divakaruni

Chitra Banerjee Divakaruni is an award-winning writer, novelist and poet. The book is about the tale of the epic Mahabharata, written from the perspective of Draupadi (Panchaali). It tells the story of the woman who fights, endures a lot living in a patriarchal world. It is a historical fiction which traces the historical tale and the life of Panchaali.

AGATHA CHRISTIE : MURDER ON THE ORIENT EXPRESS

IT IS 12:35 AM AND I HAVE JUST WINDED UP WITH THIS BOOK TITLED “MURDER ON THE ORIENT EXPRESS” , A DETECTIVE NOVEL. AN ANALYTICAL EXPIRIENCE IT WAS , FELT LIKE I AM THE ONLY ONE GETTING THE CASE SOLVED. A WONDERFUL NOVEL IT IS ! , AUTHORED BY AGATHA CHRISTIE. IT WAS MY FIRST NOVEL OF CHRISTIE AND IMPACT HAD BEEN GREAT , STILL THERE. BEFORE READING HER NOVELS , I ASKED ABOUT THE FEEDBACK FROM FEW PEOPLE , IT WAS BETWEEN OK AND NICE , SOME SAID “WASTE OF TIME ” . I WAS INCREDIBLY SHOCKED BY THE REVIEWS , AS , LISTEN THE ” BEST DETECTIVE ” NOVEL BY THE BEST WRITERS . I DECIDED NOT TO LISTEN OTHERS , BUT , TO TRUST MY HEART , HAVING FEELING FOR IT WHILE READING AND MY LIPS READING THE WORDS . I ORDERED IT .

WOAH ! WHAT AN EXCITING COVER ! THE BOOK HAS , IT ALEARDY SEND ME CHILLS , ONLY AND ONLY “GOOSEBUMPS” !.I EXAMINED THE BOOK FULLY FROM ITS COVER TO COLOR , FONT TO ITS THICKNESS , ITS FRAGNANCE ,YES! I AM A BOOKWORM . AFTER DOING MY USUAL RITUALS , WHEN I READ THE BLURB , INTRIGUED ME , IT SAYS :

“THE MURDERER IS WITH US – ON THE TRAIN NOW…”

JUST AFTER MIDNIGHT , THE FAMOUS ORIENT EXPRESS IS STOPPED IN ITS TRACKS BY A SNOWDRIFT .A PASSENGER LIES DEAD IN HIS COMPARTMENT , STABBED DOZEN TIMES HIS DOOR LOCKED FROM THE INSIDE .

ISOLATED BY THE STORM AND WITH A KILLER IN THEIR MOIST , DETECTIVE HERCULE POIROT MUST IDENTIFY THE PRIME SUSPECTS FROMA SCORNFUL AND IMPATIENT ARRAY OF PASSENGERS – BEFORE THE MURDERER DECIDES TO STRIKE AGAIN…

DOES N’T IT READ HORRIFYING? , IS N’T IT FILL YOUR HEART AND MIND WITH THRILL ? , WELL , MINE DID ! . IT IS WRITTEN IN THREE PARTS – PART 1 THE FACTS , PART 2 THE EVIDENCES , PART 3 HERCULE POIROT SITS BACK AND THINKS . IT IS AN EASY TO READ NOVEL BUT REQURES ALERTNESS AS A DETECTIVE ONE IT IS . THE NOVEL STARTS OFF WITH THE TAURAS EXPRESS , WHERE ALMOST ALL THE CHARACTERS ARE INTRODUCED . BUT , THE MAINS ARE HERCULE POIROT , MR BOC AND DR.CONSTANTINE , PRETTY DIFFRENT NAMES . THEY ARE THE MAIN CHARACTERS , THE INCIDENT OCCURRED ON THE ORIENT EXPRESS WHICH WAS CHANGED BY ALL THE PASSENGERS SAME IN TAURAS EXPRESS . EVERYTHING WAS PRE-PLANNED , MR RATCHET WHO WAS MUDERED , HAS MUDERED HIS DAUGHTERS , AND WHAT FASCINATING TO ME IS , EACH OF THE PERSON PRESENT ON THE TRAUN IS CONNECTED TO HIM EITHER WAYS , DIRECTLY OR INDIRECTLY. EVEN HIS SCRETARY IS SUSPECTED MR MAC QUEEN . AFTER MIDNIGHT , MR RATCHET WAS MURDERED AND STABBED TWELVE TIMES WITH FEW IMPRESSIONS WITNESSED AROUND HIS BODY . WHILE I READING IT , I FELT LIKE THE THREE MAINS ARE SURROUNDED BY THE MUDERERS , COULD N’T GUESS WHETHER ITS IS TRUE OR NOT . THE BLOODED KNIFE FOUND IN THE BAG OF MRS HUBBARD AND SCARLET GOWN IN THE LUGGAGE OF POIROT HIMSELF WHO IS HANDLING THE CASE . THEESE ALL ADD UP TO THE EVIDENCES , WHEN INQUIRING WITH THE PASSENGERS , POIROT CAME TO KNOW ABOUT THE SCARLET GOWN WORE BY A WOMAN NEAR MR RATCHET’S COMPARTMENT AND WOMANISH VOICE OF MEN , AS, POTRAYED BY THE PASSENGERS . THE MURDERER IS IN THE TRAIN NOW BUT IS HIDDEN FROM THEM SMARTLY .

WHAT YOU GUYS THINK ? WHO IS THE MURDERER ? , STAB TWELVE TIMES ! , CAN IT BE ONE OR MORE ? , DOES POIROT KILLED HIM? OR MRS HUBBARD ? , TO KNOW MORE WHAT THE PASSENGERS HAS TO TELL AND HOW THE CASE GOES AHEAD .

YOU HAVE TO READ IT !

FULL ASSURANCE TO YOU ALL , GONNA HAVE CHILLER JOURNEY!

The Kite Runner – Book Review

Author – Khaled Hosseini

Language – English

Publisher – Riverhead Books

Publication Date – May 29, 2003

Country – United States

ISBN – 1-57322-245-3

The Kite Runner by Khaled Hosseini is a historical fiction which is set in Afghanistan and America at the times of the Soviet Afghan War. It is one of the most loved books by readers across the world. The Times describe the book as “Heart breaking”. It was a number one New York Times bestseller for over two years, with over seven million copies sold in the United States. It has also been made into a motion picture after being a bestselling novel.

The book is a beautiful and endearing tale of two friends, Amir and Hassan who grew up together in ”a peaceful but prejudiced Kabul”. They share a beautiful bond of friendship but the surrounding social prejudice intervenes in it. During their childhood years, they spend their days flying kites along the streets of Wazir Akbar Khan district. Amir occupies a special place in Hassan’s heart and he expresses his love for Amir in a few words, ”for you, a thousand times over”. These words happen to be the book’s most iconic lines. Hassan who was the servant’s son was a Hazara and suffered tremendous social and cultural discrimination for that. During a kite flying event, an incident changes their relationship forever. Eventually Hassan and his father move out of their house.

Their lives change dramatically when the Taliban arrives in Kabul and the Soviet Afghan War changes the entire atmosphere of the country. After 5 years, Amir and his father escape the country and move to America to start a new life. Amir continues to suffer with guilt for the past. It is after he grows up to be a successful writer that he receives a call from a familiar voice of the past and goes back to Kabul. The story takes a different turn at the end when Amir discovers the truth that his relationship with Hassan was deeper than he realised.

Born in Kabul, the author draws inspiration from his own life as well but the plot and characters of the book however are fictional. The characters of the book are beautifully woven and the story is unforgettable. Several conflicts within the plot makes the readers fall in love with the characters. The book created some controversy within Afghan readers as it portrayed Pashtuns as prejudiced towards Hazara people. The racial and religious extremism is deeply saddening and the violence is frightening. The kite has been portrayed as an important symbol which represents Amir’s guilt for his betrayal towards Hassan and thus he does not fly a kite after that incident until the very end.

The book encourages its readers to look at the world in a new way and provides a different perspective for a country which has long been stigmatized. The message conveyed by the book towards the ending offers some hope for its characters and also for war torn Afghanistan as well. The book is highly recommended and it is sure to make a lasting impression on readers.

B. R. Ambedkar

Bhimrao Ramji Ambedkar was an Indian economist, politician and social reformer. He was also known as Babasaheb Ambedkar. He campaigned against social discrimination against the lower castes or Dalits of the country. Completing his doctorate from Columbia University and The London School of Economics, he gained reputation as a scholar for his research in economics, law and political science. 

In the early phases of his career, he was an economist, professor and lawyer. Towards the later phases, he was actively involved in campaigns for India’s independence. He published journals and advocated for political and social rights for Dalits. He made a significant contribution to the establishment of the state of India. He was the first Minister of Law and Justice of India and the chief architect of the Constitution of India. 

He had a Marathi family background and was from the town of Ambadawe in Ratnagiri district of modern-day Maharashtra. Ambedkar was born into a poor Mahar (Dalit caste), who were treated as untouchables and faced a lot of socio-economic discrimination. Although he attended school, Ambedkar and other untouchable children were segregated from the rest of the children and given little attention by teachers. They were not even allowed to sit inside the class. He had to sit on a gunny sack which he took home after school. When they needed to drink water, someone from a higher caste had to pour that water from a height as they were not allowed to touch the water vessel. It was usually the peon who did this for him and on days when the peon was not available, he had to go without water. He had later described this as “No peon, No water” in one of his writings.  

During British rule, Ambedkar’s effort for the political representation of the oppressed untouchables of India bore fruit in the 1920s. The colonial state was forced to include two members from among the Dalits in the Round Table Conference in 1930. This eventually led to the framing of the Government of India Act, 1935.   

From 1927, Ambedkar launched active movements against untouchability. He began public movements and marches to open up public drinking water resources for all. He led a satyagraha in Mahad to fight for the right of the untouchable community to draw water from the main water tank of the town. He also began a struggle for the right of Dalits to enter Hindu temples. In a conference in1927, Ambedkar publicly condemned the Hindu text Manusmriti (Laws of Manu), for ideologically justifying caste discrimination and “untouchability”. He ceremonially burned copies of the ancient text. On 25th December 1927, he led thousands of followers to burn copies of Manusmrti. Since then 25 December is celebrated as Manusmriti Dahan Din (Manusmriti Burning Day) by Ambedkarites and Dalits.  

In 1956, he converted to Buddhism, initiating mass conversions of Dalits which eventually led to the Dalit-Buddhist movement. 

A few days after completing his final manuscript ‘The Buddha and His Dhamma’, he died in his sleep on 6 December 1956 at his home in Delhi.  

Reading Habit

One of the many goals which we want to achieve in life, developing a reading habit should be one. It may seem tough at first but with time and practice, everyone can achieve it. While some have mastered it, others might be struggling to be consistent with it. Many of us have tried reading at some point of time and failed to keep at it consistently. This may happen for a number of reasons but none of them mean that we can’t start with it again and give it a try. One of the most common ways in which people start reading is starting with a list of “Good books to start reading with”. The internet is flooded with such lists and many people have shared their suggestions. A book which has some literary value, is easy and engaging is a great choice to start with.

According to many bloggers and writers the following list of books can help someone who has been trying to start reading for a long time. 

Photo by Leah Kelley on Pexels.com
  • The Kite Runner by Khaled Hosseini
  • Train to Pakistan by Khushwant Singh
  • The Diary of a Young Girl by Anne Frank
  • The Harry Potter Series by J.K Rowling
  • Becoming by Michelle Obama
  • The Alchemist by Paulo Coelho
Photo by cottonbro on Pexels.com

While it may work for some, others may not find it helpful. One of the common things which we fail to notice is the fact that most of us can’t bring ourselves to sit down with a book. This may be due to lack of time. In the middle of a busy day we fail to make time for reading. External factors like a proper surrounding can also be the reason for us getting distracted and impatient. So for people who can relate with these, a few suggestions can work.

Firstly, set a separate time for reading. Look at your schedule and take out a time which may be ideal for starting a new activity. Setting aside a specific time of the day for reading will help you focus more and be attentive.

Second, create a good reading atmosphere. Clean your surroundings and declutter everything around you. Attention depends a lot on external factors and an unkept background can often make you inattentive and disturbed.

Third, make a reading list. Write down all the books which you want to read next and keep ticking them off once you’re done. This will be like a to-do list and will motivate you to read. You can also take up reading challenges like ‘Ten books in a year’ or ‘One book a month’. Remember to start small and go one step at a time.

Fourth, start reading with a friend. Select a book and make plans to discuss with your friend once you complete it. You can also start talking about it among yourselves and discuss about what may happen next. This will definitely make you finish the book and also speed up your pace.

Fifth, be consistent. Make it a point to read every day. Even a small 15 minute would do. Once you skip a day it will become a habit and you’ll start repeating it. The same goes for the opposite. Once reading everyday becomes a habit you have developed the habit of reading quite well. So happy reading!

Believe

If you can’t do it atleast have a hope. Don’t get disappointed because that makes you go into deep depression. Take a moment to analyse yourself. Take a deep breath and have a moment to revise what gone wrong.

If you didn’t get what you want then definitely something more is waiting for you. You have to wait for the moment and be patient till then. You never know what’s next. If you know what’s gonna happen then life becomes so boring. Be brave enough to accept the failure. Success don’t teach you because failure make you think in all possible ways.

Believe in you and there will be some power deep inside which pushes you to do something that you never thought of doing. Believe while you live and make it worth.

Missing Rakhi from my sister

You never knew what you had untill you haven’t have it. I never knew that someday this day would come. I never felt sad because I was happy always. My sister never ever forget to sent Raksha Bandhan band to me. She either sent it or tied it. I never felt so sad for such things because she always sent it. But this time it was different. My sister tried her best to sent it to me but it was out of delivery or lately received. So she thought of making it to me whenever she was with me.

I had friends but very few. How could I make sisters when there exists no one whom I know. I never spoke to someone until they spoke. I never greeted someone till they do. So I have none to call me as a brother apart from my sister. That’s my fault to make my life stick to myself. Today is the only day my hand left with no rakhis. Everytime I don’t have to think about it because I had it. Almost all my friends had it even though they don’t have sisters. Everytime my sister used to tie rakhis to my friends but not now. This time it was quite opposite because my friends had it but not me. It might look like a silly thing to you, ofcourse it’s a silly thing to become sad of. Why do I feels sad ri Suh silly thing even after knowing it as a silly thing. Because ones emotions are unpredictable. We never know until it came.

I can’t stop looking at my friends rakhis because there are none on my hand. I know it’s hard to handle if you can’t get what you want. Sometimes it’s good to miss sister because it makes us think about her. Being same will always makes us bore so for a change now I am experiencing this too. I am so shy to share this writing even to my sister because there’s no way that I can make you feel the same way that I feel.

Happy Rakshabandhan to all the sisters who are reading this post because it’s the least that I could do

Real friends are fake

Every person is a friend until he wants something from you. I thought that real friends are rare but now realised that they never exist. I believed in friendship and was happy to have such friends until a day came. I never thought atleast it in a dream. I was happy being with them untill I became sad.

My friend’s friend became my friend until he became my enemy in an incident. May be I was wrong and may be I might deserve that. I thought of having a good relationship with them until a day then. No one ever tried to console me. They had their priorities until I left with none. I never cried in my under graduation but that pain of being ignored ny your true friends can’t be expressed. The pain of being ignored made me feel more than the pain that left after quarrelling.

There’s no need to share happy moments but it’s important to share your sadness with your friend. A friend should hold us in sadness. I felt alone at that moment and felt being ignored by them. I too tried to fake a friendship with them. But that never existed long. I am not like them. I feel the pain of my sorrow and as well as them. I don’t why I am feeling alone during friendship day. Till yesterday I was ok with what I feel. But all of sudden something happened to me because of my expectations on my friend. Friend never helps it’s we who hope a lot from him. Stop depending on them and start believing in yourself.

I feel like writing more and more because it’s the only thing with whom I can share my feelings. Last year this day was different. I completely believed in friendship. May be its due to my bitter experiences in life made me so. Hope someday someone make me feel what true friendship is. I don’t know why am I feeling like this that too this day. I never felt to cry while writing because I quit writing while I am about to cry. But this sorrow is making me to write more and more so as to minimise my sadness. I was always alone and felt as though I had got everything I needed untill then. Everyone will feel the same at some saturated point in your life. Friendship ends sooner or later. It’s you or the person on the other side had to leave a thread and make you fall like thug of war.

It’s not what I wrote it’s what I felt. So never try to have expectations because till yesterday bI was fine till I started thinking. If you wanna hold fake friendships then start being fake because no one gonna make you feel happy when you are sad. I am the victim of my own expectations.

It’s never late

Start something you haven’t started. Start everything you had stopped in the past. Try it again but never the same way. Beleive you can and you will definitely work it out.

Nothing will happen untill you try to make it happen. Don’t wait for miracle to happen. Nothing happens untill you start doing something. Be positive and have patience. Everything which has to happen will happen when it has to. Never ever stop learning because it stops you at that point itslef. Try to push yourself as far as possible because it’s when you know about yourself.

Starting to finish something isn’t something that could fetch you the success. Be constant and try to do variable things. Develop prerequisites that would help you in your work and start making it as a habit. That habit surely will improve your worth and you will see the results in no time. You don’t know when you have to use your skill. So develop it and keep on improving.

TYPES OF COMPANIES AS PER COMPANIES ACT, 2013

INTRODUCTION

The companies can be divided into different types based on parameters such as Size of company, a number of its members, Control of ownership, Liability to shareholders, need of capital from public & On the basis of the manner in which capital can be accessed. A company is popularly referred as a group of person coming together with resources in terms of capital, manpower, and skill for the common objective of making profits.

In old companies Act 1956 a company should have at least 2 persons as its member or shareholder. However, the companies Act 2013 introduced a new concept of One Person Company in India wherein only one Indian person who is a citizen of India can register a private limited company with some limitation, the different types of companies can be classified based on different parameters.

CLASSIFICATION OF THE COMPANIES


1. Classification on the basis of Incorporation: Companies may be Incorporated under the following
categories:

(a) Statutory Companies: These are constituted by a special Act of Parliament or State Legislature.
The provisions of the Companies Act, 2013 do not apply to them. Examples of these types of
companies are Reserve Bank of India, Life Insurance Corporation of India, etc.

(b) Registered Companies: The companies which are incorporated under the Companies Act, 2013
or under any previous company law and registered with the Registrar of Companies, fall under
this category.

2. Classification on the basis of Liability: Under this category there are three types of companies: –

(a) Unlimited Companies: In this type of company, the liability of members of the company is
unlimited, Section 2(92) of the Companies Act, 2013 provides that unlimited company means a
company not having any limit on the liability of its members, Such companies may or may not have
share capital. They may be either a public company or a private company. . The members is liable
to the company and to any other person.


(b) Companies limited by guarantee: Section 2(21) of the Companies Act, 2013 provides that
a company that has the liability of its members limited to such amount as the members may
respectively undertake, by the memorandum, to contribute to the assets of the company in the
event of its being wound-up, is known as a company limited by guarantee. The members of a
guarantee company are, in effect, placed in the position of guarantors of the company’s debts up
to the agreed amount. the members is liable to the company and to any other person.


(c) Companies limited by shares: A company that has the liability of its members limited by the liability
clause in the memorandum to the amount, if any, unpaid on the shares respectively held by them
is termed as a company limited by shares. Section 2(22) of the Companies Act, 2013 provides that
“company limited by shares” means a company having the liability of its members limited by the
memorandum to the amount, if any, unpaid on the shares respectively held by them.

For example,a shareholder who has paid Rs. 75 on a share of face value Rupees 100 can be called upon to pay
the balance of Rupees.25 only’. Companies limited by shares are by far the most common and it
may be either public or private.

3. Other Forms of Companies

(a) Section 8 Companies: a person or an association of persons proposed to be registered under this Act as a limited company and proved to the satisfaction of the Central Government that the company –

i. has in its objects the promotion of commerce, art, science, sports, education, research,
social welfare, religion, charity, protection of environment or any such other object;

ii. intends to apply its profits, if any, or other income in promoting its objects; and

iii. intends to prohibit the payment of any dividend to its members such person or association of person may be allowed to be registered as a limited company without addition to its name of the word “limited” or private limited by the Central government by issuing a license and by prescribing specified condition.

The association proposed to be registered under section 8 shall not be proposed to be an unlimited
company. However the same may be company limited by guarantee or a Company limited by
shares.


(b) Government Companies: As per section 2(45) of the Companies Act, 2013 the Government
company” means any company in which not less than fifty-one per cent of the paid-up share
capital is held by the Central Government, or by any State Government or Governments, or partly by the Central Government and partly by one or more State Governments, and includes a company which is a subsidiary company of such a Government company;

(c) Foreign Companies: As per section 2(42) of the Companies Act, 2013 the “foreign company”
means any company or body corporate incorporated outside India which,-

(a) has a place of business in India whether by itself or through an agent, physically or through
electronic mode; and

(b) conducts any business activity in India in any other manner.

(d) Holding and Subsidiary Companies; As per section 2(46) of the Companies Act, 2013 46)
the “holding company”, in relation to one or more other companies, means a company of which
such companies are subsidiary companies and the expression “company” includes any body
corporate.

As per section 2(87) of the Companies Act, 2013 “subsidiary company” or “subsidiary”, in relation
to any other company (that is to say the holding company), means a company in which the holding
company –

(i) controls the composition of the Board of Directors or

(ii) exercises or controls more than one-half of the 19[total voting power] either at its own or
together with one or more of its subsidiary companies:

Provided that such class or classes of holding companies as may be prescribed shall not have layers of subsidiaries beyond such numbers as may be prescribed.

Explanation.- For the purposes of this clause, –

(a) a company shall be deemed to be a subsidiary company of the holding company even if the
control referred to in sub-clause (i) or sub-clause (ii) is of another subsidiary company of the
holding company;


(b) the composition of a company’s Board of Directors shall be deemed to be controlled by
another company if that other company by exercise of some power exercisable by it at its
discretion can appoint or remove all or a majority of the directors.


(c) the expression “company” includes any body corporate.


(d) “layer” in relation to a holding company means its subsidiary or subsidiaries.

As per section 2(11) of the Companies Act, 2013, the “body corporate” or “corporation” includes a company incorporated outside India, but does not include –

(i) a co-operative society registered under any law relating to co-operative societies and

(ii) any other body corporate (not being a company as defined in this Act), which the Central
Government may, by notification, specify in this behalf.

(e) Associate Companies/ Joint Venture Company: As per section 2(6) of the Companies Act,
2013 the “associate company”, in relation to another company, means a company in which that
other company has a significant influence, but which is not a subsidiary company of the company
having such influence and includes a joint venture company.

Explanation.- For the purpose of this clause, –

(a) the expression “significant influence” means control of at least twenty per cent. of total voting
power, or control of or participation in business decisions under an agreement.

(b) the expression “joint venture” means a joint arrangement whereby the parties that have joint
control of the arrangement have rights to the net assets of the arrangement.

(f) Investment Companies: the term “investment company” includes a company whose principal
business is the acquisition of shares, debentures or other securities 13[and a company will be deemed to be principally engaged in the business of acquisition of shares, debentures or other securities, if its assets in the form of investment in shares, debentures or other securities constitute not less than fifty per cent. of its total assets, or if its income derived from investment business constitutes not less than fifty per cent. as a proportion of its gross income.

(g) Producer Companies: Producer Company means a body corporate having objects or activities
specified in section 581B of the Companies Act, 1956 and registered as Producer Company under
the Companies Act.

The objects of the Producer Company shall relate to all or any of the following matters, namely:

i. production, harvesting, procurement, grading, pooling, handling, marketing, selling, export of primary produce of the Members or import of goods or services for their benefit: Provided that the Producer Company may carry on any of the activities specified in this clause either by itself or through other institution ;

ii. processing including preserving, drying, distilling, brewing, vinting, canning and packaging of produce of its Members ;

iii. manufacture, sale or supply of machinery, equipment or consumables mainly to its Members.

iv. providing education on the mutual assistance principles to its Members and others.

v. rendering technical services, consultancy services, training, research and development and all other activities for the promotion of the interests of its Members.

vi. generation, transmission and distribution of power, revitalisation of land and water resources, their use, conservation and communications relatable to primary produce.

vii. insurance of producers or their primary produce.

viii. promoting techniques of mutuality and mutual assistance.

ix. welfare measures or facilities for the benefit of Members as may be decided by the Board.

x. any other activity, ancillary or incidental to any of the activities referred above or other activities which may promote the principles of mutuality and mutual assistance amongst the members in any other manner.

xi. financing of procurement, processing, marketing or other activities specified above which
include extending of credit facilities or any other financial services to its Members.

(h) Nidhi Companies: A nidhi company is a type of company in the Indian non-banking finance sector, recognized under section 406 of the Companies Act, 2013 their core business is borrowing and lending money between their members.

They are also known as Permanent Fund, Benefit Funds, Mutual Benefit Funds and Mutual Benefit Company. These companies are regulated under the Nidhi Rules, 2014 issued by the Ministry of Corporate affairs.

(i) Dormant Companies covered under Section 455 of the Companies Act. 2013 and includes a company which is formed and registered under the Act for a future project or to hold an asset or intellectual property and which has not been carrying on any business or operation, or has not made any significant accounting transaction during the last two financial years, or has not filed financial statements and annual returns during the last two financial years.

(j) Non-banking Financial Companies: A Non-Banking Financial Company (NBFC) is a company
registered under the Companies Act, 1956 / 2013 engaged in the business of loans and advances,
acquisition of shares/stocks/bonds/debentures/securities issued by Government or local authority
or other marketable securities of a like nature, leasing, hire-purchase, insurance business, chit
business but does not include any institution whose principal business is that of agriculture
activity, industrial activity, purchase or sale of any goods (other than securities) or providing any
services and sale/purchase/construction of immovable property.

A non-banking institution which is a company and has principal business of receiving deposits under any scheme or arrangement in one lump sum or in installments by way of contributions or in any other manner, is also a non-
banking financial company.

(k) Listed Company: “listed company” means a company which has any of its securities listed on
any recognised stock exchange.

WEBSITES REFERRED

  1. https://www.icsi.edu/media/webmodules/CompanyLaw_BOOK.pdf
  2. https://www.setindiabiz.com/learning/types-of-company-companies-act-2013/
  3. https://pt.slideshare.net/JismyJames2/type-of-companies-58160826/13

APPLICATION UNDER SECTION 14 FOR CONVERSION OF PUBLIC COMPANY INTO PRIVATE COMPANY AS PER THE COMPANIES ACT, 2013

Application under section 14 for conversion of public company into private company.

(1) An application under the second proviso to sub-section (1) of section 14 for the conversion of a public
company into a private company, shall, within sixty days from the date of passing of special resolution, be filed
with Regional Director in e-Form No. RD-l along with the fee as provided in the Companies (Registration Offices
and Fees) Rules, 2014 and shall be accompanied by the following documents, namely:-

(a) a draft copy of Memorandum of Association and Articles of Association , with proposed alterations
including the alterations pursuant to sub-section (68) of section 2 of the Act;

(b) a copy of the minutes of the general meeting at which the special resolution authorising such alteration
was passed together with details of votes cast in favour and or against with names of dissenters;

(c) a copy of Board resolution or Power of Attorney dated not earlier than thirty days, as the case may be,
authorising to file application for such conversion;

(d) declaration by a key managerial personnel that pursuant to the provisions of sub-section (68) of section
2 of the Act , the company limits the number of its members to two hundred and also stating that no
deposit has been accepted by the company in violation of the Act and rules made thereunder;

(e) declaration by a key managerial personnel that there has been no non-compliance of sections 73 to
76A, 777 , 178,185,186 and 188 of the Act and rules made thereunder;

(f) declaration by a key managerial personnel that no resolution is pending to be filed in terms of sub-
section (3) of section 779 and also stating that the company was never listed in any of the Regional

Stock Exchanges and if was so listed, all necessary procedures were complied with in full for complete
delisting of the shares in accordance with the applicable rules and regulations laid down by Securities Exchange Board of India: Provided that in case of such companies where no key managerial personnel
is required to be appointed, the aforesaid declarations shall be filed any of the director.

(2) Every application filed under sub-rule (1) shall set out the following particulars, namely:-

(a) the date of the Board meeting at which the proposal for alteration of Memorandum and Articles was
approved;

(b) the date of the general meeting at which the proposed alteration was approved;

(c) reason for conversion into a private company, effect of such conversion on shareholders, creditors,
debenture holders, deposit holders and other related parties;

(d) details of any conversion made within last five years and outcome thereof along with copy of order;

(e) details as to whether the company is registered under section 8.

(3) There shall be attached to the application, a list of creditors, debenture holders, drawn up to the latest
practicable date preceding the date of filing of application by not more than thirty days, setting forth the following
details, namely:-

(a) the names and address of every creditor and debenture holder of the company;

(b) the nature and respective amounts due to them in respect of debts, claims or liabilities;

(c) in respect of any contingent or unascertained debt, the value, so far as can be justly estimated of
such debt: Provided that the company shall file an affidavit, signed by the Company Secretary of the
company, if any, and not less than two directors of the company, one of whom shall be managing
director, where there is one, to the effect that they have made a full enquiry into affairs of the company
and, having done so, have formed an opinion that the list of creditors and debenture holders is correct,
and that the estimated value as given in the list of the debts or claims payable on contingency or not
ascertained are proper estimates of the values of such debts and claims that there are no other debts,
or claims against, the company to their knowledge.

(4) A duly authenticated copy of the list of creditors and debenture holders shall be kept at the registered office
of the company and any person desirous of inspecting the same may, at any time during the ordinary hours of
business, inspect, and take extracts from the same on payment of ten rupees per page to the company.

(5) The company shall, at least twenty-one days before the date of filing of the application

(a) advertise in the Form No.INC.25A, in a vernacular newspaper in the principal vernacular language in
the district and in English language in an English newspaper, widely circulated in the State in which the
registered office of the company is situated;

(b) serve, by registered post with acknowledgement due, individual notice on each debenture holder and
creditor of the company; and

(c) serve, by registered post with acknowledgement due, a notice to the Regional Director and Registrar
and to the regulatory body, if the company is regulated under any law for the time being in force

(6)(a) Where no objection has been received from any person in response to the advertisement or notice
referred to in sub-rule (5) and the application is complete in all respects, the same may be put up
for orders without hearing and the concerned Regional Director shall pass an order approving the
application within thirty days from the date of receipt of the application.

(b) Where the Regional Director on examining the application finds it necessary to call for further information or finds such application to be defective or incomplete in any respect, he shall within thirty days from the date of receipt of the application, give intimation of such information called for or defects or incompleteness, on the last intimated e-mail address of the person or the company, which has filed such application, directing the person or the company to furnish such information, to rectify defects or incompleteness and to re-submit such application within a period of fifteen days in e-Form No. RD-GNL-5:

Provided that maximum of two re-submissions shall be allowed

(c) In cases where such further information called for has not been provided or the defects or incompleteness has not been rectified to the satisfaction of the Regional Director within the period allowed under sub-rule (6), the Regional Director shall reject the application with reasons within thirty days from the date of filing application or within thirty days from the date of last re-submission made. as the case may be.

(d) Where no order for approval or re-submission or rejection has been explicitly made by the Regional
Director within the stipulated period of thirty days, it shall be deemed that the application stands
approved and an approval order shall be automatically issued to the applicant.

(9) (i) Where an objection has been received or Regional Director on examining the application has
specific objection under the provisions of Act, the same shall be recorded in writing and the
Regional Director shall hold a hearing or hearings within a period thirty days as required and direct
the company to file an affidavit to record the consensus reached at the hearing, upon executing
which, the Regional Director shall pass an order either approving or rejecting the application
along with reasons within thirty days from the date of hearing, failing which it shall be deemed
that application has been approved and approval order shall be automatically issued to the applicant.

(ii) In case where no consensus is received for conversion within sixty days of filing the application while
hearing or otherwise, the Regional Director shall reject the application within stipulated period of sixty
days: Provided that the conversion shall not be allowed if any inquiry, inspection or investigation has been initiated against the company or any prosecution is pending against the company under the Act.

(10) On completion of such inquiry inspection or investigation as a consequence of which no prosecution is
envisaged or no prosecution is pending, conversion shall be allowed.

(11) The order conveyed by the Regional Director shall be filed by the company with the Registrar in Form
No. lNC-28 within fifteen days from the date of receipt of approval along with fee as provided in the Companies
(Registration Offices and Fees) Rules, 2014.

WEBSITES REFERRED

  1. https://www.icsi.edu/media/webmodules/CompanyLaw_BOOK.pdf
  2. https://corpbiz.io/learning/conversion-of-public-company-into-private-company/

APPOINTMENT OF AN INDEPENDENT DIRECTOR AS PER COMPANIES ACT, 2013

APPOINTMENT OF AN INDEPENDENT DIRECTOR

(1) Appointment process of independent directors shall be independent of the company management; while
selecting independent directors the Board shall ensure that there is appropriate balance of skills, experience and
knowledge in the Board so as to enable the Board to discharge its functions and duties effectively. Independent
director may be selected from Databank.

(2) The appointment of independent director(s) of the company shall be approved by the company at the meeting of the shareholders.

(3) The explanatory statement attached to the notice of the meeting for approving the appointment of independent
director shall include a statement that in the opinion of the Board, the independent director proposed to be
appointed fulfils the conditions specified in the Act and the rules made thereunder and that the proposed
director is independent of the management. It shall also indicate the justification for choosing the appointee for
appointment as Independent Director.

(4) The appointment of independent directors shall be formalized through a letter of appointment, which shall
set out:

(a) The term of appointment;

(b) The expectation of the Board from the appointed director; the Board-level committee(s) in which the
director is expected to serve and its tasks;

(c) The fiduciary duties that come with such an appointment along with accompanying liabilities;

(d) Provision for Directors and Officers (D and O) insurance, if any;

(e) The Code of Business Ethics that the company expects its directors and employees to follow;

(f) The list of actions that a director should not do while functioning as such in the company; and

(g) The remuneration, mentioning periodic fees, reimbursement of expenses for participation in the Boards
and other meetings and profit related commission, if any.

(5) The terms and conditions of appointment of independent directors shall be open for inspection at the
registered office of the company by any member during normal business hours.

(6) The terms and conditions of appointment of independent directors shall also be posted on the company’s website.

(7) He shall be hold office for a term of upto 5 consecutive years of a company. [Section 149(10)]

RE-APPOINTMENT OF AN INDEPENDENT DIRECTOR


The re-appointment of independent director shall be on the basis of report of performance evaluation. (

Schedule IV – Code for Independent Directors)

Section 149(11) provides that the Independent Director shall be eligible for re-appointment on passing of special
resolution. He shall not hold office for more than 2 consecutive terms, but such independent director shall be
eligible for appointment after the expiration of 3 years of ceasing to become an independent director.
However, he shall not, during the said period of 3 years, be appointed in or be associated with the company in
any other capacity, either directly or indirectly.

WEBSITES REFERRED:

  1. https://www.icsi.edu/media/webmodules/CompanyLaw_BOOK.pdf
  2. https://www.google.com/searchq=APPOINTMENT+OF+AN+INDEPENDENT+DIRECTOR+AS+PER+COMPANIES+ACT,+2013&rlz=1C1CHBD_enIN782IN782&sxsrf=ALeKk033IFv0NzCFGJ5AL7UnCZYiZ_d_vw:1596123895785&source=lnms&tbm=isch&sa=X&ved=2ahUKEwjMkM3uqPXqAhXwwzgGHWEzDwsQ_AUoAnoECA4QBA&cshid=1596123906519070&biw=1366&bih=625#imgrc=6zU_vEPmOh6scM

COVID-19 AND THE INDIAN AVIATION INDUSTRY

AN INTRODUCTION

Covid-19 crisis has severely impacted almost all industries but disruptions in the airline industry is so profound and it has manifold implications that it is assumed to be greater than the combined crises of 9/11 terror attack in the US and the 2008 global financial crisis combined to put together.

The Government of India (acting through DGCA) (“GoI”) has vide its (i) order dated March 23, 2020, passed under Section 88(1) of the Aircraft Act, 1934; and (ii) orders dated March 26, 2020, and April 14, 2020, directed inter alia all aircraft operators to suspend the operations of all the domestic flights and all scheduled international commercial passenger services until May 3, 2020. 

The forward air travel bookings are far outweighed by the cancellations due to which the air travel demand is in its all-time low and drying up in ways that are unprecedented with no semblance of normalcy on the horizon.

CURRENT SCENARIO DUE TO COVID-19

For an industry which is already in stress, the Covid-19 pandemic has only accelerated the process of a bankruptcy filing by several companies (like Virgin Australia and Air Mauritius). 

Those airline companies which are still in business have also suffered huge losses and misfortunes as the novel coronavirus-forced lockdowns due to which the airlines had to keep their fleets at bay and grounded. 

As per the market sources, apart from the pay cut, several airline companies from the likes of Indigo, Go Airlines etc in India have also taken other cost-cutting measures including furloughs.

Due to the turbulence caused by the outbreak of Covid-19 virus, the airline industry must focus on the horizon as there is always a silver lining in these tough times so that it can successfully navigate a wide array of challenges (including legal, financial and operational) which are likely to surface once the pandemic is behind us. 

Future flight plan post the COVID-19 pandemic for the airlines will be influenced to a great extent by factors such as avoiding the countries that have been the virus epicentres and gauging government responses on the type and duration of travel restrictions and the conditions under which they might be relaxed.

Governments across the globe may likely consider imposing specific restrictions/limitations which is akin to the security measures put in place after terrorism events for inbound and outbound passengers.

RESTRICTIONS/ LIMITATIONS

  1. Health screenings or certificates form prescribed by the medical practitioners before the boarding is a must. In the Post-COVID era, megatrends such as the dramatic rise in remote working, government or organisation-imposed limitations/restrictions on air travel, greater reliance on locally-oriented supply chains as well as avoiding non-essential travels will impact the recovery demand in the aviation industry and may lead to a major overhaul in the management and operation of the airline industry. 
  1. To fly safely through this turbulent time, it is of utmost importance that the airline companies launch a crisis management team or as its being coined by some in the industry – “Plan Ahead Team”. This Plan Ahead Team will be responsible for collecting forward-looking intelligence and provide a Post Covid-19 flight plan to guide and accelerate decision making. 

CHALLENGES/ CONSIDERATIONS

Following are some of the challenges/considerations which airline companies in India may consider while formulating their Post Covid-19 flight plan.

  1. Third-party contractor agreements/Hedging arrangement for jet fuel prices: 

To determine the optimal size and dimensions of their networks and fleet, this will hold the key to the survival of airline companies. These companies may have to revamp their strategies vis-à-vis the air travel restrictions imposed by the governments to identify routes that are most likely to recover basis demand, regulatory and market structure scenarios. 

The determination of routes that are most likely to recover will determine which fleet/route to recommission. For the routes that could not be recommissioned or are partially commissioned post-COVID-19 and withdrawal of lockdown orders, the airline companies may have to renegotiate/re-assess the legal risk that may arise according to their contracts with third-party contractors engaged for inter alia refuelling; catering; runway/taxiway construction and repair; aircraft maintenance and overhaul; crew training; and flight dispatch.

Further, airline companies must also consider revisiting/re-negotiating their existing contracts for hedging the jet fuel prices. Most of the airline are locked into contracts for hedging the jet fuel prices. There has been a steep drop and the prices of jet fuel is at an all-time low due to the upshot of the current crisis. 

Accordingly, the airline companies will have to pay their higher hedged amount for jet fuel, creating hedging loses. In this context, the existing provisions of these contracts become relevant to determine the leverage of discussions from a legal rights perspective.

  1. Financing Arrangements

Given that the airline companies have suspended all their business, it would be imperative to ascertain if defaults would get triggered under the various financing agreements entered by the airline companies. 

Where an event of default is only triggered upon a ‘voluntary’ suspension of business, it may be argued that such temporary cessation of business due to the virus outbreak is a direct consequence of the government regulations and therefore it is outside the purview and scope of such provision. 

Further, it would be relevant to check if an event of default is qualified by a requirement that a suspension of business has a “material adverse effect” on the borrower’s ability to perform its contractual obligations. 

If there is a significant impact on the borrower’s ability to pay, this will likely satisfy the test of ‘material adverse effect. Additionally, it is expected that post-COVID-19 and lifting of the lockdown orders, for reasons including financial and operational difficulties, the airline companies may not be able to commence operations in all the sectors or may not be in a position to recommission their entire fleet.

Given the aforesaid, it would be relevant for the airline companies to review an event of default provision relating to ‘cessation of business’ in their financing agreements. 

Cessation of Business would typically include events where a company ‘threatens’ to suspend or cease to carry on its business and therefore, one may argue that such temporary closures post Covid-19 and/or lifting of lockdown orders, would constitute a ‘cessation’ of business. It would be prudent for airline companies to review their facility agreements when contemplating Covid-19 related measures and consider the impact of such measures may have on their financing arrangements. These tests can be carried out during the period of lockdown, such that the provisions can be re-considered by the parties. 

  1. Aircraft Lease Agreements

The airline companies may have to revisit/review their aircraft lease agreements. The airline companies may consider approaching the lessors for seeking concessions concerning the lease obligations including ‘rental holiday’ on account of liquidity crunch consequent to fall in ticket receipts post Covid-19. 

While the lessors may be entitled to decline requests for concessions on lease obligations, the commercial reality may well be that lessors will have to assess whether supporting an airline in some way may improve their financial health in the aftermath of the crisis or whether such benevolence will only delay the end of a business that was struggling in any case. 

It may be worthwhile to consider that the relief package/concessions which an airline company may seek from the lessors may include inter alia a standstill for an agreed period with an agreed repayment schedule to recapture the unpaid rents, forbearance on event of default at a cost.

  1. Governmental Support: Globally, the market structure for the airline industry is set to witness a major revamp. This change will be significantly influenced by government responses to the crisis and types and levels of support extended to the airline industry. 

In the absence of specific announcements/ relief measures, the airline companies in India may consider approaching the Ministry of Civil Aviation and/or the GoI for relaxation/waiver concerning various fees/licenses including airport charges, AAI and Private Airport Operators’ space rentals and infrastructure charges which are to be paid by them. 

This waiver may specifically be sought concerning air spaces/sectors, which the airline companies suspect will not be recommissioned or sectors where the travel demand likely to rebound slowly.

  1.  Resolution/Restructuring: Globally there are several airline companies which have filed for bankruptcy. Per CAPA-Centre of Aviation, most world airlines would be bankrupt by the end of May. In this context, the Ministry of Finance (“MoF”) has on March 24, 2020, indicated that if Covid-19 crisis continues beyond April 30, 2020, it may consider suspending Section 7, 9 and 10 of the Insolvency and Bankruptcy Code, 2016 for six months to stop companies from being forced into insolvency proceedings in such force majeure causes of default under the commercial agreements (e.g. financing agreements, lease agreements). 
  1. Import Duties and Trade barriers: Government of India is considering putting in place several trade restrictions/embargo on the import of goods from China.

CONCLUSION

As COVID -19 continues to spread across the globe, the challenges triggered by it are numerous and unprecedented. As COVID -19 continues to spread across the globe, the challenges triggered by it are numerous and unprecedented. The Indian tourism and hospitality industry is severely affected by the outbreak of COVID-19. 

Once the COVID-19 crisis is contained, the GoI may inter alia consider developing an appropriate messaging/advertising campaign (similar to ‘Incredible India’ tourism campaign) to provide the necessary impetus to the recovery of the aviation industry post-COVID-19.

WEBSITES REFERRED

  1. Covid-19: Flight Plan for Indian Aviation Industry by Subhojit Sadhu & Shrey Srivastava on May 6, 2020, 

Available at: https://corporate.cyrilamarchandblogs.com/2020/05/covid-19-flight-plan-for-indian-aviation-industry/

  1. The Government of India had vide its circular dated April 14, 2020, has decided that all scheduled international commercial passenger services shall remain closed until May 3, 2020. Additionally, a collated list of the Global and regional Government measures related to Covid-19

Available at:

https://www.iata.org/en/programs/safety/health/diseases/government-measures-related-to-coronavirus/

  1. Post 9/11, it is customary to have long lines at the airport and extensive security checks. The enhanced security measures are being monitored and implemented by the Transportation Security Administration (TSA). The TSA was created as a direct result of the 9/11 attacks

Available at: https://www.insider.com/world-changed-after-september-11-2018-9#2-airport-security-has-gotten-a-lot-stricter-2 and https://www.dhs.gov/preventing-terrorism-and-enhancing-security

4. https:/www.facebook.com/MoCAIndia/photos/corona-alert-if-you-feel-sick-on-a-flight-while-travelling-seek-mask-and-self-re/2988706404501675/

AN OVERVIEW OF THE CYBER LAWS IN INDIA

INTRODUCTION

 “Cyber” is a prefix used to describe a person, thing, or idea as part of the computer and information age. Taken from kybernetes, the Greek word for “steersman” or “governor,” it was first used in cybernetics, a word coined by Norbert Wiener and his colleagues. The virtual world of internet is known as cyberspace and the laws governing this area are known as Cyber Laws and all the netizens of this space come under the ambit of these laws as it carries a kind of universal jurisdiction. 

Cyberlaw can also be described as that branch of law that deals with legal issues related to use of inter-networked information technology. In short, cyber law is the law governing computers and the internet. The growth of Electronic Commerce has propelled the need for vibrant and effective regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to the success of Electronic Commerce. All these regulatory mechanisms and legal infrastructures come within the domain of Cyberlaw.

Cyberlaw is important because it touches almost all aspects of transactions and activities on and involving the internet, World Wide Web and cyberspace. Every action and reaction in cyberspace has some legal and cyber legal perspectives. 

Cyberlaw encompasses laws relating to:-

  1. Cybercrimes  
  2. Electronic and digital signatures 
  3. Intellectual property  
  4. Data protection and privacy

WHY IS CYBER LAW THE NEED OF THE HOUR IN INDIA?

Firstly, India has an extremely detailed and well-defined legal system in place. Numerous laws have been enacted and implemented and the foremost amongst them is The Constitution of India. We have inter alia, amongst others, the Indian Penal Code, the Indian Evidence Act 1872, the Banker’s Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934, the Companies Act, and so on. 

However, the arrival of Internet signalled the beginning of the rise of new and complex legal issues. It may be pertinent to mention that all the existing laws in place in India were enacted way back keeping in mind the relevant political, social, economic, and cultural scenario of that relevant time. 

Nobody then could really visualize about the Internet. Despite the brilliant acumen of our master draftsmen, the requirements of cyberspace could hardly ever be anticipated. As such, the coming of the Internet led to the emergence of numerous ticklish legal issues and problems which necessitated the enactment of Cyber laws. 

Secondly, the existing laws of India, even with the most benevolent and liberal interpretation, could not be interpreted in the light of the emerging cyberspace, to include all aspects relating to different activities in cyberspace. In fact, the practical experience and the wisdom of judgment found that it shall not be without major perils and pitfalls, if the existing laws were to be interpreted in the scenario of emerging cyberspace, without enacting new cyber laws. Hence, the need for enactment of relevant cyber laws.

Thirdly, none of the existing laws gave any legal validity or sanction to the activities in Cyberspace. For example, the Net is used by a large majority of users for email. Yet till today, email is not “legal” in our country. There is no law in the country, which gives legal validity, and sanction to email. Courts and judiciary in our country have been reluctant to grant judicial recognition to the legality of email in the absence of any specific law having been enacted by the Parliament. 

As such the need has arisen for Cyberlaw. Fourthly, the Internet requires an enabling and supportive legal infrastructure in tune with the times. This legal infrastructure can only be given by the enactment of the relevant Cyber laws as the traditional laws have failed to grant the same. 

E-commerce, the biggest future of the Internet, can only be possible if necessary legal infrastructure compliments the same to enable its vibrant growth. All these and other varied considerations created a conducive atmosphere for the need for enacting relevant cyber laws in India. 

CYBERCRIME ON THE RISE

  1. As per the cybercrime data maintained by the National Crime Records Bureau (NCRB), a total of 217, 288, 420 and 966 Cyber Crime cases were registered under the Information Technology Act, 2000 during 2007, 2008, 2009 and 2010 respectively. 
  1. Also, a total of 328, 176, 276 and 356 cases were registered under Cyber Crime related Sections of Indian Penal Code (IPC) during 2007, 2008, 2009 and 2010 respectively. 
  1. A total of 154, 178, 288 and 799 persons were arrested under the Information Technology Act 2000 during 2007-2010. A total number of 429, 195, 263 and 294 persons were arrested under Cyber Crime related Sections of Indian Penal Code (IPC) during 2007-2010. 
  1. Crime head-wise and age-wise profile of the offenders arrested under Cyber Crimes (IPC) for the year 2011 reveals that offenders involved in 9 forgery cases were more in the age-group of 18-30 (46.5%) (129 out of 277). 50.4% of the persons arrested under Criminal Breach of Trust/Cyber Fraud offences were in the age group 30-45 years (65 out of 129).  
  1. Meanwhile, 9 out of 88 mega cities did not report any case of cybercrime i.e., neither under the IT Act nor under IPC Sections during the year 2011.  And 53 megacities have reported 858 cases under the IT Act and 200 cases under various sections of IPC. 
  1. There was an increase of 147.3% (from 347 cases in 2009 to 858 cases in 2011) in cases under IT Act as compared to the previous year (2010), and an increase of 33.3% (from 150 cases in 2010 to 200 cases in 2011) of cases registered under various sections of IPC.  Bangalore (117), Vishakhapatnam (107), Pune (83), Jaipur (76), Hyderabad (67) and Delhi (City) (50) have reported a high incidence of cases (500 out of 858 cases) registered under IT Act, accounting for more than half of the cases (58.3%) reported under the IT Act. 
  1. Delhi City has reported the highest incidence (49 out of 200) of cases reported under IPC sections accounting for 24.5% followed by Mumbai (25 or 12.5%). A major programme has been initiated on development of cyber forensics specifically cyber forensic tools, setting up of infrastructure for investigation and training of the users, particularly police and judicial officers in the use of this tool to collect and analyze the digital evidence and present them in Court. 
  2. Indian Computer Emergency Response Team (CERT-In) and Centre for Development of Advanced Computing (CDAC) are involved in providing basic and advanced training of Law Enforcement Agencies, Forensic labs and judiciary on the procedures and methodology of collecting, analyzing and presenting digital evidence.  
  1. Cyber forensic training lab has been set up at Training Academy of Central Bureau of Investigation (CBI) to impart basic and advanced training in Cyber Forensics and Investigation of Cyber Crimes to Police Officers associated with CBI.
  1.  In addition, Government has set up cyber forensic training and investigation labs in Kerala, Assam, Mizoram, Nagaland, Arunachal Pradesh, Tripura, Meghalaya, Manipur and Jammu & Kashmir. 
  1. In collaboration with Data Security Council of India (DSCI), NASSCOM, Cyber Forensic Labs have been set up at Mumbai, Bengaluru, Pune and Kolkata. DSCI has organized 112 training programmes on Cyber Crime Investigation and awareness and a total of 3680 Police officials, judiciary and Public prosecutors have been trained through these programmes. 
  1. Indian Computer Emergency Response Team (CERT-In) issues alerts, advisories and guidelines regarding cybersecurity threats and measures to be taken to prevent cyber incidents and enhance the security of Information Technology systems.

IMPORTANT TERMS RELATED TO CYBER LAW AS PER INFORMATION TECHNOLOGY ACT,2000

  1. “Access” with its grammatical variations and cognate expressions means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. (Sec.2(1)(a) of IT Act, 2000) 
  1. “Addressee” means a person who is intended by the originator to receive the electronic record but does not include any intermediary. (Sec.2(1)(b) of IT Act, 2000.
  1. “Affixing Electronic Signature” with its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of Electronic Signature. (Sec.2(1)(d) of IT Act, 2000) 
  1. “Asymmetric Crypto System” means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature. (Sec.2(1)(f) of IT Act, 2000).
  1. “Certifying Authority” means a person who has been granted a license to issue an Electronic Signature Certificate under section 24. (Sec.2(1)(g) of IT Act, 2000) 
  1. “Communication Device” means Cell Phones, Personal Digital Assistants (Sic), or combination of both or any other device used to communicate, send or transmit any text, video, audio, or image. (Sec.2(1)(ha) of IT Act, 2000)
  1.  “Computer” means any electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network (Sec.2(1)(i) of IT Act, 2000)
  1.  “Computer Network” means the interconnection of one or more Computers or Computer systems or Communication device through- (i) the use of satellite, microwave, terrestrial line, wire, wireless or other communication media; and (ii) terminals or a complex consisting of two or more interconnected computers or communication device whether or not the interconnection is continuously maintained. (Sec.2(1)(j) of IT Act, 2000).
  1. “Computer Resource” means computer, communication device, computer system, computer network, data, computer database or software. (Sec.2(1)(k) of IT Act, 2000)
  1. “Computer System” means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files, which contain computer programmes, electronic instructions, input data, and output data, that performs logic, arithmetic, data storage and retrieval, communication control and other functions. (Sec.2(1)(l) of IT Act, 2000)
  1.  “Cybercafe” means any facility from where access to the Internet is offered by any person in the ordinary course of business to the members of the public. (Sec.2(1)(na) of IT Act, 2000) 
  1. “Cyber Security” means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. (Sec.2(1)(nb) of IT Act, 2000) (o)
  1. “Data” means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalized manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer. (Sec.2(1)(o) of IT Act, 2000)
  1. (p) “Digital Signature” means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3. (Sec.2(1)(p) of IT Act, 2000) 
  1. “Electronic Form” with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, microfilm, computer generated micro fiche or similar device. (Sec.2(1)(r) of IT Act, 2000) “Electronic Record” means data, record or data generated, image or sound stored, received or sent in an electronic form or microfilm or computer generated microfiche. (Sec.2(1)(t) of IT Act, 2000)
  1.  “Electronic signature” means authentication of any electronic record by a subscriber by means of the electronic technique specified in the second schedule and includes a digital signature. (Sec.2(1)(ta) of IT Act, 2000) 
  1. “Function”, in relation to a computer, includes logic, control, arithmetical process, deletion, storage and retrieval and communication or telecommunication from or within a computer. (Sec.2(1)(u) of IT Act, 2000) 
  1. “Information” includes data, message, text, images, sound, voice, codes, computer programmes, software and databases or microfilm or computer generated microfiche. (Sec.2(1)(v) of IT Act, 2000) 
  1. “Intermediary” with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web 14 hosting service providers, search engines, online payment sites, online-auction sites, online market places and cyber cafes. (Sec.2(1)(w) of IT Act, 2000) 
  1. “Key Pair”, in an asymmetric cryptosystem, means a private key and its mathematically related public key, which are so related that the public key can verify a digital signature created by the private key. (Sec.2(1)(x) of IT Act, 2000) 
  1. “Originator” means a person who sends, generates, stores or transmits any electronic message or causes any electronic message to be sent, generated, stored or transmitted to any other person but does not include an intermediary. (Sec.2(1)(za) of IT Act, 2000) 
  1. “Private Key” means the key of a key pair used to create a digital signature. (Sec.2(1)(zc) of IT Act, 2000)
  1.  “Public Key” means the key of a key pair used to verify a digital signature and listed in the Digital Signature Certificate. (Sec.2(1)(zd) of IT Act, 2000)
  1. “Secure System” means computer hardware, software, and procedure that -: (a) are reasonably secure from unauthorized access and misuse; (b) provide a reasonable level of reliability and correct operation; (c) are reasonably suited to performing the intended functions, and (d) adhere to generally accepted security procedures. (Sec.2(1)(ze) of IT Act, 2000)
  1.  “Subscriber” means a person in whose name the Electronic Signature Certificate is issued. (Sec.2(1)(zg) of IT Act, 2000)

ABOUT INFORMATION TECHNOLOGY ACT, 2000

Information Technology Act, 2000 is India’s mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format. This legislation has touched varied aspects pertaining to electronic authentication, digital (electronic) signatures, cyber crimes and liability of network service providers. 

The Preamble to the Act states that it aims at providing legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce”, which involve the use of alternatives to paper-based methods of communication and storage of information and aims at facilitating electronic filing of documents with the Government agencies. 

This Act was amended by Information Technology Amendment Bill, 2008 which was passed in Lok Sabha on 22nd December 2008 and in Rajya Sabha on 23rd December 2008. It received the assent of the President on 5th February 2009 and was notified with effect from 27/10/2009.

The IT Act of 2000 was developed to promote the IT industry, regulate eCommerce, facilitate e-governance and prevent cybercrime. The Act also sought to foster security practices within India that would serve the country in a global context. 

The Amendment was created to address issues that the original bill failed to cover and to accommodate further development of IT and related security concerns since the original law was passed. The IT Act, 2000 consists of 90 sections spread over 13 chapters [Sections 91, 92, 93 and 94 of the principal Act were omitted by the Information Technology (Amendment) Act 2008 and has 2 schedules.[ Schedules III and IV were omitted by the Information Technology (Amendment) Act 2008].

SALIENT FEATURES OF THE INFORMATION TECHNOLOGY ACT, 2000

  1. The term ‘digital signature’ has been replaced with ‘electronic signature’ to make the Act more technology-neutral. 
  1. A new section has been inserted to define ‘communication device’ to mean cell phones, personal digital assistance or combination of both or any other device used to communicate, send or transmit any text video, audio or image.
  2. A new section has been added to define cyber cafe as any facility from where the access to the internet is offered by any person in the ordinary course of business to the members of the public.
  1. A new section has been added to define cyber cafe as any facility from where the access to the internet is offered by any person in the ordinary course of business to the members of the public. 
  1. A new definition has been inserted for an intermediary. 
  1. A new section 10A has been inserted to the effect that contracts concluded electronically shall not be deemed to be unenforceable solely on the ground that electronic form or means was used.
  1. The damages of Rs. One Crore prescribed under section 43 of the earlier Act of 2000 for damage to computer, computer system etc. has been deleted and the relevant parts of the section have been substituted by the words, ‘he shall be liable to pay damages by way of compensation to the person so affected’. 
  1. A new section 43A has been inserted to protect sensitive personal data or information possessed, dealt or handled by a body corporate in a computer resource which such body corporate owns, controls or operates. 
  1. If such body corporate is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, it shall be liable to pay damages by way of compensation to the person so affected. 
  1. Sections 66A to 66F has been added to Section 66 prescribing punishment for offences such as obscene electronic message transmissions, identity theft, cheating by impersonation using computer resource, violation of privacy and cyber terrorism.
  1. Section 67 of the IT Act, 2000 has been amended to reduce the term of imprisonment for publishing or transmitting obscene material in electronic form to three years from five years and increase the fine thereof from Rs.100,000 to Rs. 500,000. Sections 67A to 67C have also been inserted. 
  1. While Sections 67A and B deal with penal provisions in respect of offences of publishing or transmitting of material containing sexually explicit act and child pornography in electronic form, Section 67C deals with the obligation of an intermediary to preserve and retain such information as may be specified for such duration and in such manner and format as the central government may prescribe.
  1. In view of the increasing threat of terrorism in the country, the new amendments include an amended section 69 giving power to the state to issue directions for interception or monitoring or decryption of any information through any computer resource. Further, sections 69A and B, two new sections, grant power to the state to issue directions for blocking for public access of any information through any computer resource and to authorize to monitor and collect traffic data or information through any computer resource for cybersecurity. 
  1.  Section 79 of the Act which exempted intermediaries has been modified to the effect that an intermediary shall not be liable for any third party information data or communication link made available or hosted by him if; (a) The function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hosted; (b) The intermediary does not initiate the transmission or select the receiver of the transmission and select or modify the information contained in the transmission; (c) The intermediary observes due diligence while discharging his duties. 

However, section 79 will not apply to an intermediary if the intermediary has conspired or abetted or aided or induced whether by threats or promise or otherwise in the commission of the unlawful act or upon receiving actual knowledge or on being notified that any information, data or communication link residing in or connected to a computer resource controlled by it is being used to commit an unlawful act, the intermediary fails to expeditiously remove or disable access to that material on that resource without vitiating the evidence in any manner.

A proviso has been added to Section 81 which states that the provisions of the Act shall have overriding effect. The proviso states that nothing contained in the Act shall restrict any person from exercising any right conferred under the Copyright Act, 1957.

OVERVIEW OF THE INFORMATION TECHNOLOGY ACT, 2000 

The Information Technology Act was enacted with a view to give a fillip to the growth of electronic-based transactions, to provide legal recognition for e-commerce and e-transactions, to

facilitate e-governance, to prevent computer-based crimes and ensure security practices and procedures in the context of the widest possible use of information technology worldwide. 

APPLICABILITY OF THE ACT 

The Act will apply to the whole of India unless otherwise mentioned. It applies also to any offence or contravention thereunder committed outside India by any person. 

The Act shall not apply to the following documents or transactions –  

  1. A negotiable instrument as defined in Sec.13 of the Negotiable Instruments Act, 1881; 
  1.  A power of attorney as defined in Sec.1A of the Powers of Attorney Act, 1882;  
  1. A trust as defined in Section 3 of the Indian Trusts Act, 1882;  
  1. A Will as defined in Sec.2(h) of the Indian Succession Act, 1925 including any other testamentary disposition by whatever name called; 
  1.  Any contract for the sale or conveyance of immovable property or any interest in such property. 

SCHEME OF THE ACT 

  1. Chapter – I – Preliminary 
  2. Chapter – II – Digital Signature and Electronic Signature (Sections 3 & 3A)
  3. Chapter – III – Electronic Governance (Sections 4 to 10A) 
  4. Chapter – IV – Attribution, Acknowledgement and Dispatch of Electronic Records (Sections 11 to 13) 
  5. Chapter – V – Secure electronic records and secure electronic signatures (Sections 14 to 16) 
  6. Chapter – VI – Regulation of Certifying Authorities (Sections 17 to 34) 
  7. Chapter – VII – Electronic Signature Certificates (Sections 35 to 39) 
  8. Chapter – VIII – Duties of Subscribers (Sections 40 to 42) 
  9. Chapter – IX – Penalties, Compensation and Adjudication (Sections 43 to 47) 
  10. Chapter X – The Cyber Appellate Tribunal (Sections 48 to 64) 
  11. Chapter XI – Offences (Sections 65 to 78) 
  12. Chapter XII – Intermediaries not to be liable in certain cases (Section 79) 
  13. Chapter XIIA – Examiner of Electronic Evidence (Section 79A) 
  14. Chapter XIII – Miscellaneous (Sections 80 to 90) 
  15. First Schedule – Documents or Transactions to which the Act shall not apply 
  16. Second Schedule – Electronic signature or Electronic authentication technique or procedure

IMPORTANT PROVISIONS OF THE ACT

A) Digital signature and Electronic signature:

Digital Signatures provide a viable solution for creating legally enforceable electronic records, closing the gap in going fully paperless by completely eliminating the need to print documents for signing. Digital signatures enable the replacement of slow and expensive paper-based approval processes with fast, low-cost, and fully digital ones. 

The purpose of a digital signature is the same as that of a handwritten signature. Instead of using pen and paper, a digital signature uses digital keys (public-key cryptography). Like the pen and paper method, a digital signature attaches the identity of the signer to the document and records a binding commitment to the document. 

However, unlike a handwritten signature, it is considered impossible to forge a digital signature the way a written signature might be. In addition, the digital signature assures that any changes made to the data that has been signed cannot go undetected. 

Digital signatures are easily transportable, cannot be imitated by someone else and can be automatically time-stamped. A digital signature can be used with any kind of message, whether it is encrypted or plaintext. Thus Digital Signatures provide the following three features:-  

(i) Authentication– Digital signatures are used to authenticate the source of messages. The ownership of a digital signature key is bound to a specific user and thus a valid signature shows that the message was sent by that user.  Integrity – In many scenarios, the sender and receiver of a message need assurance that the message has not been altered during transmission. Digital Signatures provide this feature by using cryptographic message digest functions. 

(ii) Integrity– In many scenarios, the sender and receiver of a message need assurance that the message has not been altered during transmission. Digital Signatures provide this feature by using cryptographic message digest functions.

(iii) Non-Repudiation – Digital signatures ensure that the sender who has signed the information cannot at a later time deny having signed it. 

A handwritten signature scanned and digitally attached with a document does not qualify as a Digital Signature. An ink signature can be easily replicated from one document to another by copying the image manually or electronically. Digital Signatures cryptographically bind an electronic identity to an electronic document and the digital signature cannot be copied to another document. 

B) ELECTRONIC SIGNATURE

This has also been dealt with under Section 3A of the IT Act, 2000. A subscriber can authenticate any electronic record by such electronic signature or electronic authentication technique which is considered reliable and may be specified in the Second Schedule. 

Any electronic signature or electronic authentication technique will be considered reliable if- 

  1. The signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and of no other person; 
  1. The signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person; 
  1. Any alteration to the electronic signature made after affixing such signature is detectable;
  1. Any alteration to the information made after its authentication by electronic signature is detectable; and
  2. It fulfils such other conditions which may be prescribed. An electronic signature will be deemed to be a secure electronic signature if- 

(i) the signature creation data, at the time of affixing the signature, was under the exclusive control of signatory and no other person; and 

(ii) the signature creation data was stored and affixed in such exclusive manner as may be prescribed. (Sec.15) 

An Amendment to the IT Act in 2008 introduced the term electronic signatures. The implication of this Amendment is that it has helped to broaden the scope of the IT Act to include new techniques as and when technology becomes available for signing electronic records apart from Digital Signatures.

There are various other provisions of the IT Act which are important which are as follows:

  1. E-Governance
  2. Attribution, Acknowledgement and Dispatch of Electronic Records
  3. Certifying Authorities
  4. Controller of Certifying Authorities (CCA)
  5. Root Certifying Authority of India (RCAI)
  6. Certifying Authorities 

Under the IT Act the licensed Certifying Authorities (CAs) are – 

  1. Safescrypt
  2. NIC
  3. IDRBT
  4. TCS
  5. MTNL
  6. Customs and Central Excise
  7. (n)Code Solutions CA (GNFC)
  8. e-Mudhra

NOW LET’S COME TO THE POINT THAT “WHO CAN BECOME A CERTIFYING AUTHORITY”?

The following persons can apply for the grant of a licence to issue Digital Signature Certificates, namely:- 

(a) an individual, being a citizen of India and having a capital of five crores of rupees or more in his business or profession; 

(b) a company having– 

(i) paid-up capital of not less than five crores of rupees; and 

(ii) net worth of not less than fifty crores of rupees: No company in which the equity share capital held in aggregate by the Non-resident Indians, Foreign Institutional Investors, or foreign companies, exceeds forty-nine per cent of its capital, will be eligible for grant of licence.

(c) a firm having – (i) capital subscribed by all partners of not less than five crores of rupees; and (ii) net worth of not less than fifty crores of rupees. No firm, in which the capital held in aggregate by any Non-resident Indian, and foreign national, exceeds forty-nine per cent of its capital, will be eligible for grant of licence. 

(d) Central Government or a State Government or any of the Ministries or Departments, Agencies or Authorities of such Governments.

There are various other important provisions also that are to be kept in mind in relation to the certifying authority:-

  1. Submission of performance bond
  2. Submission of application:- Every application for a licensed Certifying Authority should be made to the Controller in the form given in Schedule I of the Information Technology (Certifying Authorities) Rules, 2000. Rule 10 of IT (Certifying Authorities) Rules, 2000 prescribes what all are the documents to be submitted along with the application.
  3. Issuance of licence 
  4. Security Guidelines for Certifying Authorities
  5. Commencement of Operation by Licensed Certifying Authorities
  6. Procedures to be followed by Certifying Authorities
  7. Audit of Certifying Authority
  8. Registration Authority (RA)

ELECTRONIC SIGNATURE CERTIFICATES

Provisions relating to Electronic/Digital signature certificates are covered in Chapter VII i.e. Secs.35 to 39 of the IT Act, 2000 and Rules 23 to 30 of the IT (Certifying Authorities) Rules, 2000 and IT (Certifying Authority) Regulations, 2001. A Digital Signature Certificate is an electronic document which uses a digital signature to bind together a public key with an identity — information such as the name of a person or an organization, their address, and so forth. Digital certificates are the digital equivalent (i.e. electronic format) of physical or paper certificates. Examples of physical certificates are driver’s licenses, passports or membership cards. 

Depending upon the requirement of assurance level and usage of Digital Signature Certificate, the following are the classes of Digital Signature Certificates:- 

1) Class -1 Certificate 

2) Class – 2 Certificate

3) Class – 3 Certificate

Different types of digital signature certificates that are issued:–

 1) Individual Digital Signature Certificates (Signing Certificates) 

2) Server Certificates

3) Encryption Certificates

Certificate Revocation

Digital Signature Certificates are issued with a planned lifetime, which is defined through a validity start date and an explicit expiration date. A certificate may be issued with a validity of up to two years. Once issued, a Certificate is valid until its expiration date. Under such circumstances, the issuing CA needs to revoke the certificate. In case a Digital Signature Certificate is compromised, one should immediately contact the respective CA to initiate revocation. The CA will then put the certificate in the Certificate Revocation List. 

Duties of Subscribers

“Subscriber” means a person in whose name the Electronic Signature Certificate is issued. Chapter VIII i.e. Secs.40 to 42 of the IT Act, 2000 deals with the duties of subscribers.

CASE LAWS

i) State of Tamil Nadu Vs Suhas Katti 

The Case of Suhas Katti is notable for the fact that the conviction was achieved successfully within a relatively quick time of 7 months from the filing of the FIR. Considering that similar cases have been pending in other states for a much longer time, the efficient handling of the case which happened to be the first case of the Chennai Cyber Crime Cell going to trial deserves a special mention. 

The case related to the posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim.

The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting. Based on a complaint made by the victim in February 2004, the Police traced the accused to Mumbai and arrested him within the next few days. The accused was a known family friend of the victim and was reportedly interested in marrying her.  

She, however, married another person. This marriage later ended in divorce and the accused started contacting her once again. On her reluctance to marry him, the accused took up the harassment through the Internet. On 24-3-2004 Charge Sheet was filed u/s 67 of IT Act 2000, 469 and 509 IPC before The Hon’ble Addl. CMM Egmore by citing 18 witnesses and 34 documents and material objects. 

The same was taken on file in C.C.NO.4680/2004. On the prosecution side, 12 witnesses were examined and entire documents were marked as Exhibits. The Defence argued that the offending mails would have been given either by the ex-husband of the complainant or the complainant herself to implicate the accused as accused alleged to have turned down the request of the complainant to marry her. 

Further, the Defence counsel argued that some of the documentary evidence was not sustainable under Section 65B of the Indian Evidence Act. However, the court relied upon the expert witnesses and other evidence produced before it, including the witnesses of the Cyber Cafe owners and came to the conclusion that the crime was conclusively proved. Ld. 

Additional Chief Metropolitan Magistrate, Egmore, delivered the judgement on 5-11-04 as follows: ” The accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence u/s 509 IPC sentenced to undergo 1-year Simple imprisonment and to pay fine of Rs.500/- and for the offence, u/s 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/- All sentences to run concurrently.” This is considered as the first case convicted under Section 67 of the Information Technology Act 2000 in India. 

ii) Syed Asifuddin and Ors. V. The State of AP. & Anr., 2005CriLJ4314 

Tata Indicom employees were arrested for manipulation of the electronic 32-bit number (ESN) programmed into cell phones that were exclusively franchised to Reliance Infocomm. The court held that such manipulation amounted to tampering with computer source code as envisaged by section 65 of the Information Technology Act, 2000. 

Reliance Infocomm launched a scheme under which a cell phone subscriber was given a digital handset worth Rs. 10,500/- as well as a service bundle for 3 years with an initial payment of Rs. 3350/- and monthly outflow of Rs. 600/-. The subscriber was also provided with a 1-year warranty and 3-year insurance on the handset. 

The condition was that the handset was technologically locked so that it would only work with the Reliance Infocomm services. If the customer wanted to leave Reliance services, he would have to pay some charges including the true price of the handset. Since the handset was of a high quality, the market response to the scheme was phenomenal. 

Unidentified persons contacted Reliance customers with an offer to change to a lower-priced Tata Indicom scheme. As part of the deal, their phone would be technologically “unlocked” so that the exclusive Reliance handsets could be used for the Tata Indicom service. 

Reliance officials came to know about this “unlocking” by Tata employees and lodged a First Information Report (FIR) under various provisions of the Indian Penal Code, Information Technology Act and the Copyright Act. 

The police then raided some offices of Tata Indicom in Andhra Pradesh and arrested a few Tata Tele Services Limited officials for reprogramming the Reliance handsets. These arrested persons approached the High Court requesting the court to quash the FIR on the grounds that their acts did not violate the said legal provisions. 

Some of the issues raised by the defence in the case were – It is always open for the subscriber to change from one service provider to the other service provider; The subscriber who wants to change from Tata Indicom always takes his handset, to other service providers to get service-connected and to give up Tata services; The handsets brought to Tata by Reliance subscribers are capable of accommodating two separate lines and can be activated on principal assignment mobile ( NAM 1 or NAM 2). 

The mere activation of NAM 1 or NAM 2 by Tata in relation to a handset brought to it by a Reliance subscriber does not amount to any crime; A telephone handset is neither a computer nor a computer system containing a computer programmed; there is no law in force which requires the maintenance of “computer source code”. Hence section 65 of the Information Technology Act does not apply. 

Following were the observations of the Court –  

As per section 2 of the Information Technology Act, any electronic, magnetic or optical device used for storage of information received through satellite, microwave or other communication media and the devices which are programmable and capable of retrieving any information by manipulations of electronic, magnetic or optical impulses is a computer which can be used as a computer system in a computer network. 

The instructions or programmed given to a computer in a language known to the computer are not seen by the users of the computer/consumers of computer functions. This is known as source code in computer parlance.  ESN and SID come within the definition of “computer source code” under section 65 of the Information Technology Act.  

When ESN is altered, the offence under Section 65 of Information Technology Act is attracted because every service provider has to maintain its own SID code and also give a customer-specific number to each instrument used to avail the services provided.

OTHER IMPORTANT CASE LAWS

  1. P.R. Transport Agency Vs. Union of India (UOI)
  2. SMC Pneumatics (India) Private Limited v. Jogesh Kwatra
  3. Ritu Kohli case
  4. Avnish Bajaj Vs. State (N.C.T.) of Delhi

WEBSITES REFERRED

  1. file:///C:/Users/admin1/Downloads/OVERVIEW_OF_CYBER_LAWS_IN_INDIA_Index.pdf
  2. https://www.academia.edu/29367292/OVERVIEW_OF_CYBER_LAWS_IN_INDIA_Index
  3. http://deity.gov.in/
  4. http://cybercellmumbai.gov.in/
  5. http://ncrb.gov.in/
  6. http://catindia.gov.in/Default.aspx
  7. http://www.cert-in.org.in/
  8. http://cca.gov.in/rw/pages/index.en.do
  9. http://safescrypt.com/
  10. http://www.nic.in/
  11. http://www.idrbtca.org.in/
  12. http://www.tcs-ca.tcs.co.in/
  13. http://www.mtnltrustline.com/
  14. https://www.thequoteunquote.com/quickdope/573/Cyber-Laws-in-India
  15. http://www.ncodesolutions.com/
  16. http://www.e-mudhra.com/

Sports Law in India

Introduction

Sports and games form an essential part of human resource development. Sports is very important for the development and excellence in the international events. Over the years a number of Nationals Sports Federations (NSFs) have come up for development of specific games/ sports disciplines.

One must actively support the sportsperson so that they can achieve their objectives and reach greater heights and also break records at the International Level tournaments like the Olympics. It has been the endeavor of the Government of India to lay down procedures for effective coordination among various agencies involved in the promotion of sports and extend required infrastructure, training and other facilities to the sportsperson for achieving excellence in the international events.

Over the years a number of Nationals Sports Federations (NSFs) have come up for development of specific games/ sports disciplines. The Government of India has been actively supporting these Federations in achieving their objectives.

Guidelines of 2001 laid down the following principles, which now stand subsumed in the National Sports Development Code of India(NSCI) 2011:

i. A clear role of dileanation between NSFs, SAI and the Government.

ii. Grouping of sport disciplines into priority, general and others for the purposes of determining the entitlement for
government assistance.

iii. Detailed guidelines for preparation of Long Term Development Plans (4-year cycle). Provision made for annual
sanction budgets of development plans.

iv. Binding tripartite agreements between NSFs, the Department and the SAI to be drawn up.

v. An emphasis on professionalizing and upgrading the administrative and financial management of Federations.

vi. An emphasis on systems to handle players‘ grievance.

vii. The appointment of registered chartered accountants to ensure maintenance of proper and transparent accounts.

viii. Recognition of the role of sports promoters, particularly in event management.

Recent Developments

Hon‘ble High Court of Delhi, in Civil Writ Petition No.7868 of 2005, in the matter of Indian Hockey Federation, while disposing off the matter vide Order dated 02.03.2010, categorically observed that the Government guidelines governing the NSFs are valid, binding and enforceable; and the tenure clause is not in violation of the International
Olympic Charter. The Hon‘ble Court also observed that the Government of India is fully competent to make regulations on NSFs and IOA. The Hon‘ble Delhi High Court further cited entry 10 and 13 of List I (Union List) which read as under:-

Entry 10: Foreign affairs, all matters which bring the Union into relation with any foreign country.
Entry 13: Participation in international conferences, associations
and other bodies and implementing of decisions made thereat.

Based on the above, the Hon‘ble Court observed that while an NSF has autonomy in the actual conduct of sports, Government recognition is necessary to represent the country. It further observed that international sporting events are an essential part of diplomatic relations of the nations, and several considerations like security concerns of players,apartheid, and perceived human rights violations have guided nations in decisions to participate or not to participate in sporting events in different countries.

Political and diplomatic clearances are, therefore, required by the Indian teams before participation in the international tournaments and forums. The Court pointed out that no State Government has the competence or the jurisdiction to undertake such exercise, which is the sole prerogative of the Union Government.

In another Public Interest Litigation No.195/2010 in the matter of Rahul Mehra Vs. Union of India and Others, the Hon‘ble Delhi High Court took a serious view on the mismanagement of the Sports Sector in the country and expressed deep concern at the inaction on the part of the Government in implementing and enforcing its own guidelines,particularly those relating to age and tenure.

The gist of important new initiatives taken by the Government is indicated hereunder. These have been suitably incorporated in the subsequent paragraphs of Guidelines by replacing the existing provisions and/or adding the new provisions. The new provisions supersede the earlier provisions in the 2001 Guidelines:

Gist of new initiatives taken by Government in the recent past:

1. Restoring the limits on duration of tenure of office bearers of Indian Olympic Association and all recognized National Sports Federations. (Annexure-XIII)


2. Guidelines for Good governance in the context of Basic Universal Principle of Good Governance of Olympic and
Sports Movement‖. (Annexure-XIV)


3. Annual recognition of National Sports Federations.(Annexure-XV)

4. Measures to combat fraud in age of players. (AnnexureXVI)


5. Prevention of sexual harassment of women in sports, etc.(Annexure-XVII)


6. Notifying IOA and NSFs as Public Authority under Right to Information Act. (Annexure –XVIII)


7. Drawal of advance calendar of sporting events both national and international. (Annexure-XIX)


8. National Anti-Doping Rules notified vide gazette notification no 21-4/2008-ID dated 5th February, 2010
(Annexure-XX)


9. Guidelines for efficient management of Coaching Camps, Selection of Coaches, Selection of Athletes, etc.
(Annexure-XXI)


10. Representation of Indian Nationals only, in National Teams (Annexure-XXII)

Objectives of Guidelines

The objective of these Guidelines are three fold:

1. Firstly to define the areas of responsibility of the various agencies involved in the promotion and development of sports.

2. Secondly, to identify NSFs eligible for coverage under these guidelines, to set priorities, and to detail the procedures to be followed by the Federations, to avail of Government sponsorship and assistance.

3. And Lastly, To state the conditions for eligibility to receive government recognition and grant.

WEBSITES REFERRED:

  1. https://yas.nic.in/sites/default/files/File918.compressed.pdf
  2. https://www.chaseyoursport.com/Tokyo-Olympics-2020/The-journey-of-India-at-the-Summer-Olympics/1435
  3. https://sportsauthorityofindia.nic.in/