Intermediary (ISP,Website Hosters,Facebook,Google,Banks,Stock Exchanges) Law in India
Who is an Intermediary in India ?
Ans: As per Section 2(1)(w) of the IT Act, 2000 (Indian Cyber Law) "Intermediary" with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web hosting service providers, search engines, online payment sites, online-auction sites, online market places and cyber cafes;
1. All Banks ,Insurance & Finance companies
2. All Stock Exchanges(NSE,BSE,MCX etc)
3. All ISP's(BSNL,MTNL,SIFY,Tikona etc)
4. All Telecom Companies(Airtel, Vodafone, Aircel, Reliance etc)
5. All Auction Sites(ebay.in,Quickr,mybid.in,Auto auction sites etc)
6. All ecommerce sites(flipkart,myntra,jabong,amazon etc)
7. All Payment gateways
8. Search Engines
9. cyber cafe(Any place where public surfing on internet is allowed)
10. to be interpreted an case to case basis
Responsibility of an Intermediary
(11) The intermediary shall
publish on its website the name of the Grievance Officer and his contact
details as well as mechanism by which users or any victim who suffers as a
result of access or usage of computer resource by any person in violation of
rule 3 can notify their complaints against such access or usage of computer
resource of the intermediary or other matters pertaining to the computer
resources made available by it. The Grievance Officer shall redress the complaints within one
month from the date of receipt of complaint.
Ans: As per Section 2(1)(w) of the IT Act, 2000 (Indian Cyber Law) "Intermediary" with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web hosting service providers, search engines, online payment sites, online-auction sites, online market places and cyber cafes;
1. All Banks ,Insurance & Finance companies
2. All Stock Exchanges(NSE,BSE,MCX etc)
3. All ISP's(BSNL,MTNL,SIFY,Tikona etc)
4. All Telecom Companies(Airtel, Vodafone, Aircel, Reliance etc)
5. All Auction Sites(ebay.in,Quickr,mybid.in,Auto auction sites etc)
6. All ecommerce sites(flipkart,myntra,jabong,amazon etc)
7. All Payment gateways
8. Search Engines
9. cyber cafe(Any place where public surfing on internet is allowed)
10. to be interpreted an case to case basis
Responsibility of an Intermediary
6.
The intermediary or person in-charge of computer resource
shall be responsible for the actions of
their employees also, and in case of
violation of the provision of the Act and rules made
there under pertaining to
maintenance of secrecy and confidentiality of Information or any
unauthorised monitoring or collection of traffic data or information, the intermediary or
person in-charge of computer
resource shall be liable for any action under the relevant provision
of the
laws for the time being in force.
(Under Clause 6 0f THE INFORMATION TECHNOLOGY
(PROCEDURE AND SAFEGUARD FOR MONITORING AND COLLECTING TRAFFIC DATA OR
INFORMATION) RULES, 2009
Intermediary to
ensure effective check in handling monitoring or collection of traffic data or
information.
The Intermediary or person in-charge of computer resources
shall put in place adequate and effective
internal checks to ensure that
unauthorised monitoring or collection of
traffic data or information does not take
place and extreme secrecy is
maintained and utmost care and precaution is taken in the matter of monitoring
or
collection of traffic data or information as it affects privacy of citizens
and also that this matter is handled only
by the designated officer of the
intermediary or person in-charge of computer resource.
Destruction of
records by Intermediary
(1) Every record, including electronic records pertaining
to such directions for monitoring or collection of traffic
data shall be
destroyed by the designated officer after the expiry of a period of nine months
from the receipt
of direction or creation of record, whichever is later, except
in a case where the traffic data or information is, or likely to be, required
for functional requirements.
(2) Save as otherwise required for the purpose of any
ongoing investigation, criminal complaint or legal
proceedings the intermediary
or the person in-charge of computer resource shall destroyed records
pertaining
to directions for monitoring or collection of information within a period of
six months of
discontinuance of the monitoring or collection of traffic data
and in doing so they shall maintain extreme secrecy.
Due
diligence to be observed by intermediary in India
The intermediary shall observe following due diligence
while discharging his duties, namely : ―
(1) The intermediary shall publish the rules and
regulations, privacy policy and user agreement for access or usage of the
intermediary’s computer resource by any person.
(2) Such rules and regulations, terms and conditions or
user agreement shall inform the users of computer resource not to host,
display, upload, modify, publish, transmit, update or share any information
that —
(a) belongs to
another person and to which the user does not have any right to;
(b) is grossly
harmful, harassing, blasphemous, defamatory, obscene, pornographic,
pedophilic, libelous, invasive of
another's privacy, hateful, or racially, ethnically objectionable, disparaging,
relating or encouraging money laundering or gambling, or otherwise unlawful in
any manner whatever;
(c) harm minors in
any way;
(d) infringes any
patent, trademark, copyright or other proprietary rights;
(e) violates any
law for the time being in force;
(f) deceives or
misleads the addressee about the origin of such messages or communicates any
information which is grossly offensive or menacing in nature;
(g) impersonate
another person;
(h) contains
software viruses or any other computer code, files or programs designed to
interrupt, destroy or limit the functionality of any computer resource;
(i) threatens the
unity, integrity, defence, security or sovereignty of India , friendly
relations with foreign states, or or public order or causes incitement to the
commission of any cognisable offence or prevents investigation of any offence
or is insulting any other nation.
(3) The intermediary shall not knowingly host or publish
any information or shall not initiate the transmission, select the receiver of
transmission, and select or modify the information contained in the
transmission as specified in sub-rule (2):
Provided that the following actions by an intermediary
shall not amount to hosting, publishing, editing or storing of any such
information as specified in sub-rule (2) ―
(a) temporary
or transient or intermediate storage of information automatically within the
computer resource as an intrinsic feature of such computer resource, involving
no exercise of any human editorial control, for onward transmission or
communication to another computer resource;
(b) removal
of access to any information, data or communication link by an intermediary
after such information, data or communication link comes to the actual
knowledge of a person authorised by the intermediary pursuant to any order or
direction as per the provisions of the Act;
(4) The intermediary, on whose computer
system the information is stored or hosted or published, upon obtaining
knowledge by itself or been brought to actual knowledge by an affected person
in writing or through email signed with electronic signature about any such
information as mentioned in sub-rule (2) above, shall act within thirty six
hours and where applicable, work with user or owner of such information to
disable such information that is in contravention of sub-rule (2). Further the
intermediary shall preserve such information and associated records for at
least ninety days for investigation purposes.
(5) The Intermediary shall inform its
users that in case of non-compliance with rules and regulations, user agreement
and privacy policy for access or usage of intermediary computer resource, the
Intermediary has the right to immediately terminate the access or usage rights
of the users to the computer resource of Intermediary and remove non-compliant
information..
(6) The intermediary shall strictly
follow the provisions of the Act or any other laws for the time being in force.
(7) When
required by lawful order, the intermediary shall provide information or any
such assistance to Government Agencies who are lawfully authorised for
investigative, protective, cyber security activity. The information or any such
assistance shall be provided for the purpose of verification of identity, or
for prevention, detection, investigation, prosecution, cyber security incidents
and punishment of offences under any law for the time being in force, on a
request in writing stating clearly the purpose of seeking such information or
any such assistance.
(8) The intermediary shall take all
reasonable measures to secure its computer resource and information contained
therein following the reasonable security practices and procedures as
prescribed in the Information Technology (Reasonable security practices and
procedures and sensitive personal information) Rules, 2011.
(9) The intermediary shall report cyber
security incidents and also share cyber security incidents related information
with the Indian Computer Emergency Response Team.
(10) The intermediary shall not
knowingly deploy or install or modify the technical configuration of computer
resource or become party to any such act which may change or has the potential
to change the normal course of operation of the computer resource than what it
is supposed to perform thereby circumventing any law for the time being in
force:
Provided that the intermediary may develop, produce, distribute or
employ technological means for the sole purpose of performing the acts of
securing the computer resource and information contained therein.
Comments
Post a Comment