Horje
History of Cyber Law in India

The genesis of cyber law in India can be traced to the year 2000, with the enactment of the Information Technology Act 2000 (IT Act), which was pioneering legislation to deal with legal aspects connected with the internet and electronic business. This Act governed issues to do with electronic transactions, digital signatures, and cyber crimes and was India’s first approach towards the adoption of a complete cyber law regime.

The IT Act was also amended later in 2008 in order to effectively cope with new challenges and the launch of new technologies. The amendments brought into focus new sections concerning data protection, cyber terrorism, and increased penalties for cybercrimes. Also, the formation of the Cyber Appellate Tribunal and the National Cyber Security Policy in fiscal 2013 added to the skeleton of the Indian legal framework. Over the past decade, the cyber law scenario in India has become stable with the introduction of the Personal Data Protection Bill to offer stronger and more desirable data protection.

Scope of Extent of The Information Technology Act, 2000:

  • Legal Recognition of Electronic Records and Signatures: The measures the IT Act has undertaken for electronic governance in India include legal recognition of electronic documents, digital signatures, and electronic records as legally valid as their analogues. This makes electronic transactions and communication possible.
  • Regulation of Cybercrimes: It spells out and prescribes several cybercrimes, such as hacking, identity theft, cyberterrorism, and others. These offenses are defined by the Act, along with the procedures to be followed in the conduct of investigations and the hearing of offenders.
  • E-Governance: The IT Act encourages e-governance since it allows the filing of documents, contracts, and payments electronically, thus reducing bureaucratic and tedious processes in governments.
  • Certifying Authorities: It makes provisions for the certification of Certifying Authorities (CAs), who will issue digital certificates that will guarantee a secure electronic transaction.
  • Cyber Appellate Tribunal: The Act also prescribes the formation of a Cyber Appellate Tribunal, given the responsibility for hearing disputes and appeals regarding cybertein matters and the IT Act.

SECTION 66A AND SHREYA SINGHAL (Brief the case)

  • Section 66A: Section 67 of the Information Technology Act, 2000, made the sending of ‘offensive’ or’menacing’ messages through any computer resource for communication, including social media, a criminal offense attracting up to three years’ imprisonment and a fine. The Act was condemned for overly general language, which the public considered an intrusion on freedom of speech.
  • Shreya Singhal v. Union of India: In this landmark case, the petitioner, Shreya Singhal, filed a petition for quashing Section 66A of the IT Act, stating that Section 66A violated fundamental rights under the Constitution of India, especially the right to freedom of speech and expression under Article 19(1)(a).
  • Supreme Court Judgment (2015): The section was overruled by the Supreme Court of India on grounds of unconstitutionality. Due to the vagueness of the provisions of the section, its reach was found to be excessive, and it was vulnerable to abuse and unlawful application. The challenge made to Section 66A was for the reason that it unduly fettered the tenderness, which is a constitutional right, of free speech.
  • Impact: One of the favorable judgments with respect to freedom of speech online was the elimination of Section 66A. It stressed the fact that the current laws underestimate the threats connected with security and the importance of protecting basic rights. It also insisted that there should be new laws that will allow us to protect society better with the help of more precise definitions of cyber threats.

What was Section 66 A IT Act, 2000?

Section 66A of the Information Technology Act, 2000, was a provision that has been formulated and aimed at dealing with and penalizing matters relating to the sending of ‘objectionable’ messages through computers. Here are the key aspects of Section 66A:

  • Offensive Communication: It outlawed the use of any information through any electricity matters labeled as “offensive,” “menacing,” or “false” with the aim of inconveniencing, harming, or causing annoyance.
  • Scope: The section discussed was regarding different kinds of electronic media, such as emails, text messages, and postings on social media. Originally, it was for matters concerning cybullying, sexual harassment, and other forms of misconduct through the use of the Internet.
  • Punishment: The penalties under Section 66A arrest were imprisonment for a term up to three years and/or a fine.
  • Criticism: The criticism of Section 66A was on account of the imprecise and vast language of the section. Some people claimed that it was easily abused, and hence the constitutional guarantee of freedom of speech and expression could be violated. This was due to the fact that offenses such as ‘offensive’ or’menacing’ had no clear definition, and mainly due to the infringement on constitutional rights.
  • Legal Challenge: This provision was much debated in a highly significant case, namely Shreya Singhal v. Union of India (2015). Thus, the ability of Section 66A was declared unconstitutional by the Supreme Court of India because it violates the fundamental right of the Indian constitution incorporated under Article 19(1)(a), the right to freedom of speech and expression.

What did the Supreme Court decide?

The case that had a major impact involving Section 66A of the Information Technology Act, 2000, is Shreya Singhal v. Union of India (2015). The Court’s key decisions were:

  • Unconstitutionality: This Section 66A was struck down by the Supreme Court as unconstitutional. The Court was also of the opinion that the provision was overly broad and its language was too vague, hence likely to be abused and, in equal measure, enforced in an arbitrary manner.
  • Violation of Free Speech: It stated that the right to freedom of speech and expression under the Indian Constitution was compromised due to the presence of Section 66A. Concerning the number of individuals that fall under the provision, it was considered to be broad, and thus the restrictions thereon on free speech were not proportionate or reasonable in any democratic society.
  • Need for Clearer Laws: As usual, the ruling upheld the need to work hard to pass laws that address real dangers to society while at the same time not violating some of the constitutional rights. The Court said that it does not dispute the legislative activities and aims to prevent cybercrimes and other forms of harassment, but the provision of the law must be jurisprudence and contain no vagueness hypothetically infringing the right to free expression.

History of Cyber Law in India – FAQs

What prior law was Section 66A of the IT Act, 2000?

Earlier, Section 66A of the IT Act made it a punishable offense to send an ‘offensive’ or’menacing’ message through the electronic media with possible punishment up to three years’ imprisonment, along with a fine.

What reason was Section 66A taken to court?

Section 66A was criticized for its vagueness, which caused criticism for misuse of the section and suppression of freedom of speech.

How has the Supreme Court left 66A for the IT Act?

India’s Supreme Court has struck down Section 66A as an infringement on the right to freedom of speech, as this section was broad in its language and, per definition, unlawful.

The above-discussed decision of the Supreme Court had what effects?

The former resulted in the elimination of Section 66A and upholding free speech, but it underlined the necessity of a better definition in the context of cybercrime legislation.

What is the implication of the ruling on speech freedom in cyberspace in India?

The ruling guarantees that laws setting out what can or cannot be said online must be clear, not worrisome, and sufficiently sufficient to wipe out misuse and uphold rights and liberties with respect to legitimate cyber threats.




Reffered: https://www.geeksforgeeks.org


Commerce

Related
What is Joint custody? What is Joint custody?
Property Insurance [US] Property Insurance [US]
Payroll Deductions Payroll Deductions
Key Steps to Building a Career in Management Consulting in the US Key Steps to Building a Career in Management Consulting in the US
Porter and Lawler Model of Motivation Porter and Lawler Model of Motivation

Type:
Geek
Category:
Coding
Sub Category:
Tutorial
Uploaded by:
Admin
Views:
24