Documente Academic
Documente Profesional
Documente Cultură
The term “contract “is defined in sec 2(h) of the Indian contract act ,1872 as AN AGREEMENT
ENFORCEABLE BY LAW IS A CONTRACT; thus for the formation of a contract there must
be –
1. An agreement, and
2. The agreement should be enforceable by law.
E-Contract is an aid to drafting and negotiating successful contracts for consumer and business e-
commerce and related services. It is designed to assist people in formulating and implementing
commercial contracts policies within e-businesses. It contains model contracts for the sale of
products and supply of digital products and services to both consumers and businesses.
There are two ways through which commercial contracts can be entered electronically.]
A common and popular method is through the exchange of electronic mail ‘e-mail’.
The other method of contracting is using the World Wide Web or ‘website’.
E-mail contract- A contract can be entered into and concluded following the exchange of a
number of e-mails between the parties. Here the e-mails serve the same purpose as normal
letters, had a contract been negotiated through letters written by both parties.
Contract through websites- There are many and varied kinds of E- Contracts but these three
are the elementary one, which we assent to or dissent to, in our everyday life. (16) Contracts
through websites are further into following kinds:
1. Shrink-wrap agreements
Shrink wrap contracts are usually a licensing agreement for software purchases. In the case of
shrink-wrap agreements, the terms and conditions for access to such software products shall be
enforced by the person buying it, with the initiation of the packaging of the software product.
Tightening-up agreements are simply the agreements that are accepted by users, for instance,
Nokia pc-suite, at time of installing the software on a CD-ROM. Sometimes, after loading the
product onto your computer, additional conditions may only be observed and then, if the buyer
disagrees, he has an opportunity to return the software product. The shrink-wrap Agreement
provides protection by exonerating the product manufacturer of any violation of copyright or
intellectual property rights as soon as the purchaser tears the product or the coverage for
accessing the product. However, the validity of shrink-wrap agreements does not exist in India
with a stable judgment or precedent.
Click-wrap contracts are web-based contracts that require the user’s consent or consent through
the “I Accept,” or “OK” button. The user must accept the terms of use of the particular software
with the clickwrap agreements. Users who disagree with the terms and conditions cannot use or
purchase the product after cancellation or refusal. Someone almost regularly observes web-wrap
agreements. The terms of use shall be set down before acceptance by the users. For instance,
online shopping agreement, etc.
3. Browse-wrap agreements
A browsing wrap agreement can be called an agreement which is to be binding on two or more
parties through the use of the website. In case of an agreement on browsing, an ordinary user of a
given Website is to accept the terms and conditions of use and other website policies for
continuous use. We usually witness such kinds of online contracts in our daily lives. Although
this online agreement is becoming common in all of our businesses, there is no precise judicial
precedent regarding its validity and enforceability. Other countries, such as courts in the USA,
have dealt with those online agreements and held that both Shrink-wrap Agreements and Click-
Wrap Agreements are enforceable as far as the general principles of the contract are not violated.
Other types of online agreements include contracts for employment, contractors, contracts for
consultants, sales and resale agreements, distributors, non-disclosure agreements, software
developer and licensing agreements and contracts for source-code escrow.
Employment Contracts
Consultant Agreements
The normal requirements of Indian Contracts Act of 1872 will apply on any consultant
agreement. But particularly in Information Technology industry where the infrastructure to
function is low and connectivity is very high consultancy with experience marketing and
business development and technology development is a very dominant mode of contract.
Non-Disclosure Agreements
As in every other contract, an electronic contract also requires the following necessary
requirements:
In many contacts (whether online or conventional) the offer is not made directly one-on-one. The
consumer ‘browses’ the available goods and services showed on the seller’s website and then
chooses what he would like to purchase. The offer is not made by website showing the items for
sale at a particular price. This is essentially an invitation to offer and hence is revocable at any
time up to the time of acceptance. The offer is made by the customer on introduction the
products in the virtual ‘basket’ or ‘shopping cart’ for payment.
As stated earlier, the acceptance is usually assumed by the business after the offer has been made
by the consumer in relation with the invitation to offer. An offer is revocable at any time until the
acceptance is made.
Processes available for forming electronic contracts include
I. E-mail: Offers and acceptances can be exchanged entirely by e-mail, or can be collective with
paper documents, faxes, telephonic discussions etc.
II. Web Site Forms: The seller can offer goods or services (e.g. air tickets, software etc.) through
his website. The customer places an order by completing and communicating the order form
provided on the website. The goods may be actually delivered later (e.g. in case of clothes, music
CDs etc.) or be directly delivered electronically (e.g. e-tickets, software, mp3 etc.).
III. Online Agreements: Users may need to take an online agreement in order to be able to avail
of the services e.g. clicking on “I accept” while connecting software or clicking on “I agree”
while signing up for an email account.
Jurisdiction is a territory or sphere of activity within which a court or other institution’s legal
authority is extended. In the broader sense, it refers to the country or country whose legislation
applies during the period of interpretation of any contractual terms or in the event of a dispute.
The pace of execution of the contract normally determines this. A traditional contract shall be
concluded when contracting parties meet and execute the contract, usually at a predetermined
place and time, by placing the signatures on the document. This is not the case in e-contracts in
which the parties meet online and can be located at different places. Consequently, a strict
determination of the jurisdiction is lacking in the “place of execution”.
Probability of loss of data- The entity collecting data should have a privacy policy in place,
should always obtain consent from the provider of sensitive information and maintain reasonable
security practices and procedures. Unauthorized access to personal information and any misuse
of such personal information should be checked by the online goods/service providers.
Acts by computer programmes- It is a general principle of contract law that a party can be
bound by the acts of agents endowed with apparent authority to act on its behalf. An agent has
apparent authority if a party acts in such a way so as to make it reasonable for a third person to
believe that the agent is acting on its behalf. In the online world, a computer program may act as
an online agent, and a party will presumably be bound by offers and acceptances performed by a
computer or program acting on a party's behalf.
Interface with payment gateways- The IT Act has laid the foundation for strengthening
cyber security and data protection in India with introduction of section 43A that mandates body
corporate to implement "reasonable security practices" for protecting "sensitive personal
information".
Meeting of the minds of Parties: Consensus-ad-idem- Several issues arise whether a person
would be bound by the terms of a contract without reading it or without being able to negotiate
the terms, as is the case with standard form contracts where the customers are required to just
sign on the dotted lines. But then, the issue which needs to be addressed is that what would be
the terms of the contract and would the acceptance of the contract without even reading it be
classified as deemed acceptance?
Requirement as per The Indian Stamp Act-The Indian Stamp Act and different State
legislation mandate that documents in which rights are established or transferred must be
stamped. A document not properly stamped shall not be permitted as proof in a court of law, or
even a competent authority unless it was imposed (a fine of 10 times the amount of the required
stamping duty).However, documents cannot be stamped for an online contract until this date.
SPECIFIC EXCLUSIONS
In particular, the IT Act 2000 excludes from electronic transactions the following documents:
Negotiable Instruments
Power of Attorney
Trust Deed
Will
Sale Deed or Conveyance deed with respect to the immovable property of any documents
relating to any interest in an immovable property.
With the growing importance and value of e-contract in India and across the world, the different
stakeholders are continuously identifying and evaluating the nuances of legal outline relating to
it. The participation of different service providers in the transaction of e-contract, which includes
a payment gateway, the main website, the bank or card verification website, the security
authorization website and the final service provider which can also comprise the shipping agent
has made the E-contract business more complex. Therefore, the need for amendable it has
augmented. In India, till date there are no definite legislations or guidelines protecting the buyers
and sellers of goods and services over the electronic medium.
However, several laws acting in unification are trying to regulate the business transactions of E-
contract. They are as follows:
Like any other types of business, E-contract business also works on the basis of contracts. It is
therefore, structured by the Indian Contract Act, 1872. Any valid and legal E-contracts can be
designed, completed, and enforced as parties replace paper documents with electronic
parallels.[6] The contracts are move in between the service providers or sellers and buyers.
Earlier, there was no definite law to regulate the intermediaries such as verification service
providers and shipping service providers to safeguard that the product or service is actually
delivered. However, the government has recently acquainted the Information Technology
(Intermediaries Guidelines) Rules 2011.
The actual scope of the security provided under these regulations would only be known after
judicial interpretation of the provisions. However, now it has been explained that even foreign
intermediaries delivered to provide service can be sued in India.
The payment gateways which footing a very important position as the primary processor of the
payment for the merchants were brought into the legal framework after proclamation of the
Payment and settlement Systems Act, 2007 (PSS Act, 2007). The PSS Act, 2007 as well as the
Payment and Settlement System Regulations, 2008 made under the Act came into effect from
August 12, 2008.[9] Further, the Reserve Bank of India, issued additional guidelines initiating all
such gateways and payments processors to register under the said act.
The authority of the transactions of E-contract is established under the Information Technology
Act, 2000 (IT Act, 2000). It explains the reasonable mode of acceptance of the offer. IT Act,
2000 also rules the revocation of offer and acceptance.[10] However, definite provisions that
regulate E-contract transactions conducted over the internet, mobile phones, etc. are vague. With
numerous cross border transactions also being conducted over the internet, specific law guarding
the Indian customers and Indian businesses are essential and Indian laws are gravely insufficient
on this issue.
(b) by a person who had the authority to act on behalf of the originator in respect of that
electronic record; or
(1) Where the originator has not agreed with the addressee that the acknowledgment of receipt of
electronic record be given in a particular form or by a particular method, an acknowledgment
may be given by—
(b) any conduct of the addressee, sufficient to indicate to the originator that the electronic
record has been received.
(2) Where the originator has stipulated that the electronic record shall be binding only on receipt
of an acknowledgment of such electronic record by him, then unless acknowledgment has been
so received, the electronic record shall be deemed to have been never sent by the originator.
(3) Where the originator has not stipulated that the electronic record shall be binding only on
receipt of such acknowledgment, and the acknowledgment has not been received by the
originator within the time specified or agreed or, if no time has been specified or agreed to within
a reasonable time, then the originator may give notice to the addressee stating that no
acknowledgment has been received by him and specifying a reasonable time by which the
acknowledgment must be received by him and if no acknowledgment is received within the
aforesaid time limit he may after giving notice to the addressee, treat the electronic record as
though it has never been sent.
Section (13) Time and place of dispatch and receipt of electronic record.-
(1) Save as otherwise agreed to between the originator and the addressee, the dispatch of an
electronic record occurs when it enters a computer resource outside the control of the originator.
(2) Save as otherwise agreed between the originator and the addressee, the time of receipt of an
electronic record shall be determined as follows, namely :—
(a) if the addressee has designated a computer resource for the purpose of receiving
electronic records,—
(i) Receipt occurs at the time when the electronic, record enters the designated
Computer resource; or
(ii) If the electronic record is sent to a computer resource of the addressee that is
not the designated computer resource, receipt occurs at the time when the
electronic record is retrieved by the addressee;
(b) If the addressee has not designated a computer resource along with specified timings,
if any, receipt occurs when the electronic record enters the computer resource of the
addressee.
(3) Save as otherwise agreed to between the originator and the addressee, an electronic record is
deemed to be dispatched at the place where the originator has his place of business, and is
deemed to be received at the place where the addressee has his place of business.
(4) The provisions of sub-section (2) shall apply notwithstanding that the place where the
computer resource is located may be different from the place where the electronic record is
deemed to have been received under sub-section (3).
(a) If the originator or the addressee has more than one place of business, the principal
place of business, shall be the place of business;
(b) If the originator or the addressee does not have a place of business, his usual place of
residence shall be deemed to be the place of business;
(c) “usual place of residence”, in relation to a body corporate, means the place where it is
registered.
UNICITRAL MODEL AND E COMMERCE
The Model Law was adopted in 1996 to facilitate the use of modern e- means of communication
and storage of information, such as electronic data interchange (EDI), electronic mail and
telecopy. Its main objective was to bring uniformity in national laws relating to e-commerce. It
has granted legal recognitions to data message and digital signature. It has encouraged national
legislators to adopt a set of internationally acceptable rules for validity of electronic commerce
by providing equal treatment to paper-based and electronic information. Significantly, such equal
treatment is essential for enabling the use of paperless communication, thus fostering efficiency
in international trade.
It is commendable to note that The MLEC was the first legislative text which adopted the
fundamental principles of non-discrimination, technological neutrality and functional
equivalence. In order to ensure that a document would not be denied legal effect, validity or
enforceability solely on the grounds that it is in electronic form it has laid down the principle of
non-discrimination. The principle of technological neutrality involves the adoption of provisions
that are neutral with respect to technology used. The principle of functional equivalence makes
electronic communications equivalent to paper-based communications.
This Law has been divided into two parts i.e., part I dealing with E-Commerce in General
consisting of 3 Chapters and part II consisting of Chapter 1 only. Significantly, Part I has
provided for the establishment of a functional equivalent for paper-based concepts such as
"writing", "signature" and "original".
First feature of this law is "electronic equivalence". Significantly, the Model Law does
not directly consider electronic communications valid but it provides that information or
documents will not be denied legal effect or enforceability solely because they are in
electronic format. Therefore, it conferred validity on e transaction indirectly.
For achieving electronic equivalence, the model law provides various rules specifying
conditions which must be fulfilled for an electronic communication to constitute a legally
valid substitute for a conventional and paper-based communication. It provides that a
legal requirement to provide information or a document sent "in writing" is satisfied by
its electronic equivalent if it is in a form that can be subsequently accessed and used by
the recipient.
Further, under the law electronic documents are treated as "original" documents if there is
a reliable assurance as to the integrity of the information and that the information is
capable of being displayed to the person to whom it is to be presented. Further, the
information must be complete and remain unaltered, apart from the addition of any
endorsement and any change that arises in the normal course of communication, storage
and display. However, the question of reliability is to be determined in the light of all the
circumstances, including the purpose for which the document was created.
It confers the validity on e-evidence as it provides that evidentiary rules do not deny the
admissibility of an electronic communication solely on the grounds that it is in electronic
form.
Significantly, the law lays down the conditions for data retention. It provides that the
message must be retained in the format in which it was generated and any information
indicating origin, destination, date and time of the message is retained. Another important
condition for retention is that the information contained with the electronic message must
be accessible so as to be usable for subsequent reference.
This Model Law was approved by the UNCITRAL and came into force in 2001. It’s main
objective was to grant legal recognition to e-signature and to bring uniformity in national
laws relating to e-signature. It consists of two Parts i.e., Part I consisting of 12 articles
and Part II, Guide for enactment of the MLES.
Model Law applies where electronic signatures are used in the commercial activities.
However, it does not override any rule of law intended for the protection of consumers.
Important features of this Model Law are:
Significantly, the Model Law grants legal recognition to E-Signature as it provides that
where the law requires a signature of a person, then that requirement is met in relation to
a data message if an electronic signature is used provided that the signature is as reliable
as was appropriate for the purpose for which the data message was generated or
communicated. The reliability is determined in the light of all the circumstances,
including any relevant agreement.
It defines electronic signature as "data in electronic form in, affixed to, or logically
associated with, a data message, which may be used to identify the signatory in relation
to the data message and indicate the signatory's approval of the information contained in
the data message." Significantly, two parties involved in data message are: Signatory i.e.
a person that holds signature creation data and acts either on its own behalf or on behalf
of the person it represents and relying party who may act on the basis of certificate or an
electronic signature.
Further, an electronic signature is reliable provided it meets following four conditions:
the signature creation data are linked solely to the signatory; the signature creation data
was under the sole control of the signatory; any alteration of the electronic signature,
made after signing, is detectable; and where the purpose of the signature is to provide
assurance as to the integrity of the underlying information, any alteration of that
information must be detectable.
It imposes duty on the signatories to use reasonable care to avoid unauthorized use of
their electronic signature. Therefore, where they become aware that the security of their
electronic signature has been compromised, they must notify any person that might be
affected without delay
Intellectual property rights are the legal rights that cover the privileges given to
individuals who are the owners and inventors of a work, and have created something
with their intellectual creativity. Individuals related to areas such as literature, music,
invention, etc., can be granted such rights, which can then be used in the business
practices by them.
The creator/inventor gets exclusive rights against any misuse or use of work without
his/her prior information. However, the rights are granted for a limited period of time to
maintain equilibrium.
The following list of activities which are covered by the intellectual property rights are
laid down by the World Intellectual Property Organization (WIPO) −
Industrial designs
Scientific discoveries
Protection against unfair competition
Literary, artistic, and scientific works
Inventions in all fields of human endeavor
Performances of performing artists, phonograms, and broadcasts
Trademarks, service marks, commercial names, and designations
All other rights resulting from intellectual activity in the industrial, scientific,
literary, or artistic fields
Intellectual Property Rights can be further classified into the following categories −
Copyright
Patent
Patent
Trade Secrets, etc.
Advantages of Intellectual Property Rights
To protect the intellectual property rights in the Indian territory, India has defined the formation
of constitutional, administrative and jurisdictive outline whether they imply the copyright,
patent, trademark, industrial designs, or any other parts of the intellectual property rights.
Back in the year 1999, the government passed an important legislation based on international
practices to safeguard the intellectual property rights. Let us have a glimpse of the same −
The Patents (Amendment) Act, 1999, facilitates the establishment of the mail box
system for filing patents. It offers exclusive marketing rights for a time period of five
years.
The Trade Marks Bill, 1999, replaced the Trade and Merchandise Marks Act, 1958
The Copyright (Amendment) Act, 1999, was signed by the President of India.
The sui generis legislation was approved and named as the Geographical Indications of
Goods (Registration and Protection) Bill, 1999.
The Industrial Designs Bill, 1999, replaced the Designs Act, 1911.
The Patents (Second Amendment) Bill, 1999, for further amending the Patents Act of
1970 in compliance with the TRIPS.
Every new invention in the field of technology experiences a variety of threats. Internet is one
such threat, which has captured the physical marketplace and have converted it into a virtual
marketplace.
To safeguard the business interest, it is vital to create an effective property management and
protection mechanism keeping in mind the considerable amount of business and commerce
taking place in the Cyber Space.
Today it is critical for every business to develop an effective and collaborative IP management
mechanism and protection strategy. The ever-looming threats in the cybernetic world can thus
be monitored and confined.
Various approaches and legislations have been designed by the law-makers to up the ante in
delivering a secure configuration against such cyber-threats. However it is the duty of the
intellectual property right (IPR) owner to invalidate and reduce such mala fide acts of criminals
by taking proactive measures.
COPYRIGHT LAW UNDER CYBER
1.Cyber squatting
Various types of domain names disputes come for consideration before the courts all over
world. One of the most serious kinds of disputes has been about ‘Cybersquatting’ which
involves the use of a domain name by a person with neither registration nor any inherent rights
to the name. Trademarks and domain names being similar have been exploited by some people
who register trademarks of others as domain names and sell those domain names back to the
trademarks owners or third parties at a high profit. This is known as ‘cybersquatting’ which
means some person sitting on the property of another person. The practice of ‘cybersquatting’ is
abusive whereby one entity registers a domain name that includes the name or the trademarks of
another. This practice shows the importance of the role played by domain names in establishing
online identity.
2.Meta tags
Meta tag is an element of web pages that is also known as Meta elements. Meta tags provide
information about page descriptions, key words and other relevant data. Originally, Meta tags
were used in search engines to define what the page was about when the internet was in the
early stages, Meta tags were used to help the place web pages in the correct categories.
3.Software Piracy
It is also covered under sections of Indian Copyright Act. This is the illegal use of software by
copying and distributing them among organizations, groups etc for business personal use.
INTERNATIONAL PRESPECTIVE
The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or the
Budapest Convention, is the first international treaty seeking to address Internet and computer
crime (cybercrime)by harmonizing national laws, improving investigative techniques, and
increasing cooperation among nations. It was drawn up by the Council of Europe in Strasbourg,
France, with the active participation of the Council of Europe's observer states Canada, Japan,
Philippines, South Africa and the United States.
The Convention and its Explanatory Report was adopted by the Committee of Ministers of the
Council of Europe at its 109th Session on 8 November 2001. It was opened for signature in
Budapest, on 23 November 2001 and it entered into force on 1 July 2004. As of September 2019,
64 states have ratified the convention, while a further four states had signed the convention but
not ratified it.
Since it entered into force, important countries like Brazil and India have declined to adopt the
Convention on the grounds that they did not participate in its drafting. Russia opposes the
Convention, stating that adoption would violate Russian sovereignty, and has usually refused to
cooperate in law enforcement investigations relating to cybercrime. It is the first multilateral
legally binding instrument to regulate cybercrime. Since 2018, India has been reconsidering its
stand on the Convention after a surge in cybercrime, though concerns about sharing data with
foreign agencies remain.
Objectives
The Convention is the first international treaty on crimes committed via the Internet and other
computer networks, dealing particularly with infringements of copyright, computer-related fraud,
child pornography, hate crimes, and violations of network security.[8] It also contains a series of
powers and procedures such as the search of computer networks and lawful interception.
Its main objective, set out in the preamble, is to pursue a common criminal policy aimed at the
protection of society against cybercrime, especially by adopting appropriate legislation and
fostering international cooperation.
Harmonizing the domestic criminal substantive law elements of offences and connected
provisions in the area of cyber-crime
Providing for domestic criminal procedural law powers necessary for the investigation
and prosecution of such offences as well as other offences committed by means of a
computer system or evidence in relation to which is in electronic form
Setting up a fast and effective regime of international cooperation
The following offences are defined by the Convention: illegal access, illegal interception, data
interference, system interference, misuse of devices, computer-related forgery, computer-related
fraud, offences related to child pornography, and offences related to copyright and neighboring
rights.
It also sets out such procedural law issues as expedited preservation of stored data, expedited
preservation and partial disclosure of traffic data, production order, search and seizure of
computer data, real-time collection of traffic data, and interception of content data. In addition,
the Convention contains a provision on a specific type of transborder access to stored computer
data which does not require mutual assistance (with consent or where publicly available) and
provides for the setting up of a 24/7 network for ensuring speedy assistance among the Signatory
Parties.
Further, as conditions and safeguards, the Convention requires the provision for adequate
protection of human rights and liberties, including rights arising pursuant to obligations under
European Convention on Human Rights, International Covenant on Civil and Political Rights,
and other applicable international human rights instruments, and shall incorporate the principle
of proportionality.
The Budapest Convention broadly attempts to cover crimes of illegal access, interference and
interception of data and system networks, and the criminal misuse of devices. Additionally,
offences perpetrated by means of computer systems such as computer-related fraud, production,
distribution and transmission of child pornography and copyright offences are addressed by
provisions of the Convention.
The substantive offences under the Convention can broadly be classified into “(1) offences
against the confidentiality, integrity and availability of computer data and systems; (2) computer-
related offences; (3) content-related offences; and (4) criminal copyright infringement.”
The Additional Protocol makes the act of using computer networks to publish xenophobic and
racist propaganda, a punishable offence. However, the full range of cyber crimes are not covered
under the Budapest Convention. These include cybercrimes such as identity theft, sexual
grooming of children and unsolicited spam and emails
PROVISIONS OF THE CONVENTION
The treaty functions on a mutual information sharing and formal assistance model in order to
facilitate better law enforcement and lays down procedure to seek and receive such assistance.
Article 23 of the Convention outlines the general principles under which international
cooperation can be sought, as follows:
The Parties shall co-operate with each other, in accordance with the provisions of this chapter,
and through the application of relevant international instruments on international cooperation in
criminal matters, arrangements agreed on the basis of uniform or reciprocal legislation, and
domestic laws, to the widest extent possible for the purposes of investigations or proceedings
concerning criminal offences related to computer systems and data, or for the collection of
evidence in electronic form of a criminal offence.”
It is clear then that assistance facilitated by the Convention relies on pre-existing cooperative
agreements between the parties. Thus, as also stated in Article 39 of the Convention, the
provisions only serve to supplement multilateral and bilateral treaties already effective between
parties. In addition, mutual legal assistance (MLA) between parties where no such mutual
arrangements exists, can be facilitated through procedures laid down under Article 27.