End Sem Notes - E-Comm
End Sem Notes - E-Comm
General Disclaimer:
● These notes have been prepared based on my revision method.
● Points are explained in brief and are based on the materials I have.
● The color scheme in the notes are as follows:
○ Class notes (based on classes of Amrisha Maam and other materials gathered by
me) are in BLACK
○ I have also majorly relied on notes from Deepti Maam’s slides and those would be
in RED
○ Additional points from Karnika Seth would be in BLUE
● DO NOTE THAT THESE ARE NOT EXHAUSTIVE NOTES.
For any doubts and clarity or if you think I would have missed out on a topic please do let me
know!
1
DEFINITION, THEORY AND CONTEXT OF E-COMMERCE
● electronic commerce includes any form of economic activity conducted via electronic
connections.
● The bandwidth of an “electronic commerce” spans from electronic markets to electronic
hierarchies and also incorporates electronically supported entrepreneurial networks and
cooperative arrangements (electronic networks).
● Delineating among differing forms of electronic markets becomes even more difficult, as:
○ Organizational boundaries change or disappear and, as market coordination forms,
may also find a place within organizations themselves.
○ Value-added chains change, and value-added activities are newly distributed.
○ Customers become part of the value-added chain, and private citizens become
entrepreneurs on their own.
● Electronic data interchange (EDI) and electronic mail, for example, are central business
tools underlying the operation of electronic commerce.
○ Its a value added service
○ impossible to trade over EDI without a contractual agreement..
● The Internet is the universal dial-tone for conducting business.
● Electronic commerce should be perceived as ‘markets’ → Information is an essential
ingredient for the functioning of any market and is exchanged frequently between buyer
and seller
● Effects of IT in E-Commerce -
○ Vital for optimal performance -- augments the firm’ s capability to coordinate
business transactions within the firm, but also among firms such as between
buyers and suppliers.
○ The communication effect -- Advances in information technology allow for
more information to be communicated in the same unit of time, thus reducing
transaction costs
○ The electronic integration effect -- A tighter electronic linkage between buyer
and seller is enabled
○ The electronic brokerage effect -- An electronic marketplace where buyers and
sellers come together to compare offerings
○ The electronic strategic networking effect -- Information technology (including
networks) enables the design and deliberate strategic deployment of linkages and
networks among cooperating firms intended to achieve joint, strategic goals to
gain competitive advantage
● The resulting new organizational forms indicate an ongoing transformation of value
chains due to technological change
● Disintermediation -- Disintermediation is the displacement or elimination of market
intermediaries, enabling direct trade with buyers and consumers without agents.
Electronic markets allow firms to reach very large customer groups at very low costs
● Electronic commerce denotes the seamless application of information and
communication technology from its point of origin to its endpoint along the entire
value chain of business processes conducted electronically and designed to enable
the accomplishment of a business goal. These processes may be partial or complete
and may encompass business-to-business as well as business-to-consumer and
consumer-to-business transactions.
2
● Interactivity tends to be high in most electronic commerce settings. It appears also that
the higher the degree of interactivity, the more perfected the electronic market might be.
Four essential features in order to ensure their acceptance:
○ (1) The device or service must replace a process that is inefficient, costly or
boring,
○ (2) consumers must not be asked to choose between competing technologies,
○ (3) consumers must not feel a “tracked” or that privacy is threatened, and
○ (4) consumers must perceive that the use of the service (and information
technology) is relatively easy and user-friendly.
● Theoretical/Conceptual Approaches to Electronic Commerce
○ Transaction Cost Theory
■ Transaction costs may be viewed as the economic equivalent of friction in
a physical system -- if transaction costs are high, no or little economic
activity is likely to occur.
● Search costs -- the cost of searching for products, sellers, and
buyers
● Contracting costs -- the cost of setting up and carrying out the
contract
● Monitoring costs -- the cost ensuring that the terms of the
contract have been met
● Adaptation costs -- the cost incurred in making changes during
the life of the contract
○ Marketing
■ Three main foci of orientation within the marketing effort are identified:
customer orientation, product orientation, and profit orientation.
■ The basic challenge faced by a firm, then, is to identify needs and provide
linkages between the firm and its customers.
■ Electronic commerce can provide a direct linkage, an electronic marketing
and information channel, between these target customers and the firm.
■ The term liquid marketing suggests itself as a suitable and appropriate
descriptor of this evolving setting.
■ Moreover, the concept of liquid marketing is enabled by the Internet’s use
and while being interactive with those individuals within the target group.
■ Future electronic commerce marketing strategies may demand that we
attempt to bring in the buyers and hook them to products and services
offered such that it is very difficult for customers to leave or switch,
resulting in competitive advantage.
○ Diffusion
■ Social process by which an innovation is communicated through certain
channels over time among members of a social system.
■ Resembles the task at hand in the electronic commerce setting; that is, a
task or transaction needs to be communicated to a set of firms or
customers (members of a social system) within a market or an industry.
■ Electronic messaging via the Internet comes close to this ideal, that is,
using a cost effective one-to-many medium while still reaching specific,
targeted individuals, assuming a critical mass of users of this medium.
3
○ Information retrieval
■ Firms tend to be overwhelmed with information stored in central
databases, as well as dispersed documents (e.g., correspondence) in
various places throughout the organization.
■ In electronic dissemination, it is obvious that the users can readily retrieve
information once the information is stored on the system.
■ Many databases are available within firms that could be accessed through
the Internet.
○ Strategic Networking
■ The deliberate design and deployment of networks enabling new
organizational forms, includes all four of the preceding topics, without
which networking could not take place.
■ Strategic networks as a distinct organizational form, that is, as being
separate from other organizational forms: hierarchy, market, and clan.
■ we can label networks strategic networks, as they reflect connotations of
long-term, rational importance, being proactive, selectivity, complexity,
intention and coherence.
● Definitions of E-Commerce:
○ Refers to various online commercial activities focussing on commodity exchanges
by electronic means, by companies, factories, etc
○ ISO defines it as it is the general term for exchange of information among
enterprise and between enterprise and customers.
○ Intel → Ecommerce = electronic market + electronic trade + electronic service
○ IBM → Information technology + web + business
○ HP → Ecommerce is to accomplish the commercial business by electronic means.
Advantages Disadvantages
4
9. Deep discounts. 11. Violation of Intellectual property.
10. High reciprocity to consumer trends. 12. Quality issues.
5
○ Art.9: specifies that the data messages cannot be denied admissibility in the court
of law solely on the basis that the information is in the form of a data message.
Thus, evidentiary value has been granted to data messages.
○ Art.10: retention of information in the form of data messages subject to the
accessibility, accuracy and originality of format and identity of origin
○ Art.11: the formation of a valid contract was made possible through the means of
data messages → Offer and acceptance of offer, when communicated in the form
of data messages, cannot be denied legal validity and enforceability
○ Art.12: Acknowledgement in the form of receipt of data messages has also been
granted legal validity.
○ Art.13: The data message is attributed to the originator if it is sent by him or by a
person authorised by him
○ Article 14 provides that the receipt of the data message and its acknowledgement
can also be agreed upon by the parties beforehand.
○ Art.15: The transaction ensues when the information goes out of control of the
sender. The place of dispatch is the place of business and the time is when the
acceptance enters the system of the addressee.
● Interpretation by domestic courts:
○ Khoury v. Tomlinson is a landmark case decided by the Texas Court of Appeal.
The facts of this case are such that an agreement was entered via e-mail which
was not signed but only the name of the originator appeared in the ‘from’ section.
Referring to the principles in Article 7 of the Model Law, the court found
sufficient evidence that the name in the ‘from’ section establishes the identity of
the sender.
○ Martha Helena Pilonieta v Gabriel Humberto Pulido Casas is a case dealt with
by the Supreme Court of Justice of Columbia. The court found that the electronic
message by a spouse was not relevant on the ground of evidential thresholds.
● Conclusion:
○ Factors leading to the formation of the model law: heterogeneity in electronic
contracts, lack of legal enforcement, threats to international trade
○ Objectives secured by MLEC:
■ Validation and recognition of contracts formed through electronic means
■ Validating originality and retention of documents in electronic form
■ Validity of electronic signature for legal and commercial purposes
■ Admissibility of electronic evidence in courts and arbitration proceedings
6
● Sec.10A: contracts cant be deemed to be unenforceable merely on the grounds that
electronic means have been used for the same purpose.
● Chapter IV: attribution, acknowledgement and dispatch of e-records
● Chapter V: secure electronic records and secure electronic signatures
● Chapter VI and VII: legal framework and infrastructure to support an efficient
e-commerce regime
● Chapter VIII: Duties of subscribers pertaining to private and public keys
● Chapter XII: Intermediary liability
Art. 5 provides for legal recognition of data No such provision exists in the IT Act
message that states that such data messages
shall not be denied validity, legality or
enforceability on sole grounds that it is a data
message.
Art. 5 bis. Any information shall not be No such provision exists in the IT Act
denied validity, legality or enforceability on
the sole grounds that it is not contained in the
data message but is merely referred to in the
data message.
Art. 6 where law requires information to be in Under section 5 of the IT Act, provides for
writing, a data message if the information legal recognition of electronic records where
contained therein is accessible so as to be if law requires any information to be in
usable for subsequent reference is deemed to writing, typewritten or printed form, then it is
have met the requirement. It applies when deemed to be satisfied if it is rendered or
there is an obligation or law has consequences made available in the electronic form or is
for not being in writing. usable for a subsequent reference.
Art. 8 provides for signatures which states Chapter II of the IT Act under section 3, deals
that when law requires the signature of a with electronic signature where it is
person, it is met in relation to a data message authentication is given effect by use of crypto
if a method is used to identify and indicate his currency and hash function and a pair of
approval; the method is reliable for which the public and private keys are used that
data was generated. It applies when there is an constitute a functioning pair. Further section
7
obligation or law has consequences for not 3A provides that the subscriber may
being in writing. authenticate an electronic record if it is
reliable and as specified under the II
Schedule. Subsection (2) provides for what is
considered reliable and under subsection (3)
and (4) about Government prescribing
procedures for authentication and the manner
of publishing the notification prescribing it.
Art. 9 provides for the admissibility of digital No such provision exists in the IT Act
evidence and states that it shall not be denied
admissibility on the sole ground it is a data
message or best evidence that a person
adducing it could reasonably obtain. While
giving weight to digital evidence, regard shall
be given to the manner it was generated,
stored, communicated and the reliability of
such data in the form of integrity.
Art. 10 provides for the retention of data Section 7 provides for retention of electronic
messages, wherein it states the conditions that record and the provisions of this section are
should be met while retaining it. similar to the clauses provided under Art. 10
of UNCITRAL.
Art. 11 deals with the formation and validity Section 10 A provides for validity of contracts
of contracts where it states that an offer and formed by electronic means wherein, the
acceptance must be expressed over data validity of a proposal, acceptance, formation,
messages. The said contract shall not be revocation are not considered invalid on the
denied validity on the sole ground that data sole ground that it was done so using
messages were used for the purpose of electronic form or other such means.
formation.
Art. 12 provides for recognition by parties of There are no direct provisions similar to Art.
data messages wherein, a declaration of will 12, however Chapter IV provides for
or other such statements shall not be denied attribution of electronic records to the
validity on the sole grounds that it is in the originator, receiver and time and place of such
form of data message. dispatch and its subsequent receipt under
sections 11-13 of the Act.
8
UNIT 2: E-CONTRACTS
INTRODUCTION
● Essentials of a contract
○ Section 10 ICA
■ Offer and Acceptance
■ Lawful consideration
■ Lawful object
■ Free and informed consent
■ Intention to create a legal partnership
■ Parties must be competent to contract
■ Agreement must be able to be performed
● Legal aspects of e-contracts
○ IT Act -
■ Sec 2(t)- E-records
■ Sec 2 ( r) - Electronic form
■ Sec 4- Recognition to e-records
■ Sec 10A- Recognition of e-contracts
○ Section 4 and Section 10A IT Act 2000:
■ Legal enforceability to the conventional means and methods of execution
of a contract
■ Fulfillment of online requirements through electronic medium
■ Exceptions:
● Negotiable instruments
● Power of attorney
● Will/testament
● Trusts
● Conveyance or sale of immovable property
● E-contracts under the Indian evidence act
○ Evidence under section 3 of the act includes ‘electronic records’
○ Case: NCT of Delhi v. Mohd Afzal; Harpal singh vs. St of Punjab -- legal
validity of electronic evidence; qualifications applicable under s.65B of the Act
■ Mhd Afzal case - the person challenging evidence has the onus to prove
the same
● E-contracts under Indian Stamp Act 1899
○ For the purposes of this legislations, states have amended their respective stamp
laws to include electronic record as “instruments”creating rights, duties, and
liabilities
○ Electronic signatures -- State amendments incorporated.
○ Electronic records are easier to trace
● For e-contracting usually, a website is used or an online contact is formed by e-mail
exchange between the parties.
● Article 11 of UNCITRAL MLEC grants recognition to the validity and enforceability of
Clickwrap licenses.
9
● Sec.10A IT Act, confers legal recognition to electronically formed contracts
CONTRACTUAL ISSUES
● Agreement:
10
○ Offers may be made directly or through a mass email or through a web page. → a
mass email or advertisement on a web page may be either an offer or an
invitation to make an offer.
○ Conclusion of contract → If any advertisement over the web or any
communication over the internet (automatic or otherwise) is construed as an offer,
and if that offer is unconditionally accepted, the contract is concluded. On the
contrary, if the advertisement is construed as an invitation to make an offer, it only
invites users to make an offer for the advertised product or service.
○ As such, web advertisements will be an invitation to offer unless it clearly
indicates the web advertiser intends to be bound upon the acceptance.
○ IT Act and MLEC → states that unless otherwise agreed by the parties, an offer
and the acceptance of an offer may be expressed by means of ‘electronic records’.
● Offers:
○ Under the Information Technology Act, 2000 the offer is made, unless otherwise
agreed between the originator and the addressee, at the time when the electronic
record enters any information system designated by the addressee for the
purpose or, if no system is designated for the purpose, when the electronic record
enters the information system of the addressee or, if an information system has
been designated, but the electronic record is sent to some other information
system, when the addressee retrieves such electronic record.
● Agreement:
○ Section 4 of Indian Contract Act 1872 → acceptance is complete as against the
offeror, when it is put in the course of transmission; the communication of
acceptance is complete as against the offeree, when it reaches the knowledge of
offeror.
○ E-commerce has 4 ways of conveying acceptance:
■ By sending an email message of acceptance.
■ By delivery online of electronic or digital product/service
■ By delivery of physical product.
■ Or by any other act or conduct indicating acceptance of the offer.
○ Section 12 of IT Act -- Revocation of offer: provides that the acceptance is
binding on the offeree when the acceptance is out of his control, and binding
on the offeror when he receives the acceptance. (thus is different from the
position under the ICA).
● Revocation:
○ IT Act -- states that the offeror is bound by an acceptance when he is in
receipt of it.
○ Therefore, if a revocation of the offer enters the information system of the
offeree before the offeror is in receipt of the acceptance, the revocation is
binding on the offeree and no valid acceptance can be made.
○ The Information Technology Act, 2000 and the UNCITRAL Model Law differ
from the Indian Contract Act, 1872 and state that an acceptance becomes binding
on the offeree the moment the acceptance enters an information system outside
the offeree’s control.
● Conclusion of contract:
11
○ In Entores, (Entores Ltd. v. Miles Far East Corporation [1955] 2 Q.B. 327, 332.)
it was held that in the case of oral communication or communication by telex or
over the telephone, acceptance is communicated when it is actually received by
the offeror, and therefore the contract is deemed to be placed where it is received;
this view was accepted by the Supreme Court of India.(Bhagwandas v/s
Ghirdharilal & Co [1966] 1 S.C.R. 656.)
○ The Information Technology Act, 2000 provides that the dispatch of an electronic
record occurs when it enters an information system outside the control of the
person who sent the record, unless otherwise agreed.
○ The time for receipt of an electronic record is determined by the time when the
electronic record enters the computer resource designated by the addressee or, if
the electronic record is sent to a computer resource not designated by the
addressee, it occurs at the time when the addressee retrieves the electronic record.
■ Alternatively, if no computer resource has been designated, then receipt
occurs when the electronic record enters the ‘computer resource of the
addressee’.
● The electronic records are deemed to have been dispatched at the place the originator of
the message has his principal place of business and received at the place where the
addressee has his principal place of business.
● Section 4 of the Information Technology Act, 2000, which states that where a law
requires information to be written or to be presented in writing, or provides for certain
consequences if it is not, an electronic record satisfies that rule if the information
contained therein is accessible so as to be usable for subsequent reference.
● Article 5 of the UNCITRAL Model Law states that where the law requires information
to be in writing, that requirement is met by a data message if the information contained
therein is accessible so as to be usable for subsequent reference.
● Digital Signatures and Encryption:
○ Cryptography uses sophisticated mathematical algorithms, particularly a
technology known as ‘asymmetric cryptography’.
○ Cryptography can be differentiated between the following:
■ use of cryptography for confidentiality of a message; and
■ use of cryptography in digital signature.
○ The most popular and useful method of encryption for general messaging is
public key cryptography;
○ One key is used for encryption and the other corresponding key is used for
decryption.
○ Under IT Act encryption is regulated by the DoT.
■ As at the time of writing, permission is required from the DoT to send
encrypted messages.
○ Section 2(p) read with Section 3 of the Information Technology Act, 2000
establishes that a signature could be sent using public key cryptography. In order
to link the identity of the sender with the signature, it is necessary to attach a
digital certificate, which is issued by so-called CAs.
○ Section 15 provides that a digital signature is a ‘secure digital signature’ if it can
be verified using a security procedure applied by the parties concerned.
12
TYPES OF E-CONTRACTS:
Shrink-wrap
● These contracts are considered to be license agreements which are ‘enforceable’ the
moment the user begins using the product. This implies that the acceptance by the user
begins with the usage of the product/service. These contracts/agreements are widely used
by programmers and organisations due to the reason that they are ‘unsigned permit
understandings’ - viz. the user acknowledges the terms and conditions once the
link/‘package’ has been opened(accessed).
● Boilerplate contracts -- usage of product is deemed acceptance.
● Are enforceable unless their terms are objectionable on the grounds applicable to
contracts in general.
● UCC - Uniform Commercial Code - has to be followed
● Case: ProCD vs. Zedidenberg
○ “By opening this package you are consenting to be bound by its license
agreement. If you do not agree to all of the terms of this agreement, return the
unopened product to the place of purchase for full refund” -- was on the cover.
○ District Court: held that licenses are ineffectual as their terms do not appear on
the outside of the package.-- terms inside the package are a ‘secret’ at time of
purchase.
○ Held: no contract was formed by the parties until the buyer accepted the sellers
terms by electing to keep the contract
○ The UCC permits parties to structure their relationstions so that the buyer has a
chance to make a final decision after a detailed review. The customer inspected
the package, tried out the software, learned of the license and did not reject the
goods, which the customer could if the license was unsatisfactory. Thus buyer
had accepted and was bound to abide by the license.
Click-wrap
● These contracts are primarily found in softwares that requires any form of installation
onto the user’s device. Its also known as a “click-through” agreement.
● The contracts lack a ‘bargaining power’ which means that there can be no form of
negotiation between the parties - the user either has to accept to use the program or he/she
would be unable to use the same if they reject the terms or conditions.
● Are often used in downloading software and contain provisions to protect the IPR
contained therein by restraining the licensee from selling the copy of the software.
● Case: Feldman vs Google
○ FACTS: Defendant, Google, Inc. sought to have plaintiff’s amended complaint
dismissed and/or transferred on the ground of improper venue. Defendant
13
contended that plaintiff agreed to Santa Clara County, California as the proper
venue for all actions between them by clicking on an internet “clickwrap”
agreement which contained a forum selection clause. Plaintiff, on the other hand
argued that there was no meeting of the minds and that the “clickwrap” agreement
is a contract of adhesion which by its terms is unconscionable.
○ CONCLUSION: The court applied federal law to determine the validity of the
forum selection clause based on case law that requires federal law to be applied in
diversity actions. The clickwrap agreement was enforceable as there was
reasonable notice of and mutual assent to the agreement and the agreement
described with sufficient definiteness a practicable process by which price
was determined. The agreement was not procedurally unconscionable where the
advertiser was a sophisticated purchaser, he was not pressured to agree, he was
capable of understanding the agreement's terms, and he consented to the terms.
The agreement was not substantively unconscionable as the forum selection
clause did not shock the conscience, and the 60-day limitations period afforded
sufficient time to identify, investigate, and report billing errors.
○ RATIO: A clickwrap agreement appears on an internet webpage and
requires that a user consent to any terms or conditions by clicking on a
dialog box on the screen in order to proceed with the internet transaction.
Even though they are electronic, clickwrap agreements are considered to be
writings because they are printable and storable.
● Hotmail Corp v Van $ Money Pie Inc 1998
○ Hotmail sued its customers for sending spam mails as if the mails were sent from
Hotmail accounts. According to Hotmail such actions clearly violated the express
clause of services agreement entered into by the customers at the time of opening
an email account.
○ The court held that customers had violated the terms of contract signed with
Hotmail and held that the Clickwrap agreement to be enforceable in a court of law
● Comb v PayPal Inc 2002
○ The court held that PayPal’s Clickwrap Agreement was excessively one-sided and
was highly unconscionable.
Browse-wrap
● Ticketmaster Corp v Tickets.com Inc 2000 → browsewrap terms do not require an
express consent of the user and its terms are generally accessible through a hyperlink
● These contracts are implicitly present in the webpages, which implies that they cover the
aspects of access to or use of online materials available on a website or any other page
that permits downloads.
● The user has to agree to the terms and conditions of the particular website in order to
access the contents of the website.
14
● These agreements can be either hidden or can be bought to the notice of the user.
● Majority of the times, the website would include a statement that explains as to how the
user’s continued use of the site would imply agreement.
● Covers the access to or use of material available on websites or downloadable products --
person can access only if he agrees to the terms and conditions of the web-page
● Commonly used by websites -- includes a notice on the screen which states that by using
the website, the user automatically assents to the terms and conditions.
● Is a type of standard form contract
● Case: Specht vs. Netscape:
○ Facts: Netscape is a internet browser provider -- offers softwares such as
Communicator and SmartDownload -- Specht (Plaintiff) alleged that these
programs when downloaded collectively allowed eavesdropping of the customers
use -- Def argued that Plaintiffs agreed to the terms of license which allowed
eavesdropping, further any dispute is to be resolved by means of arbitration --
Plaintiff before downloading had to ‘click’ on several agreements.
○ Issues: Validity of contract if the internet browser webpage does not alert the user
of the existence of the license terms of software and does not require users to
manifestly and clearly agree to the terms and conditions.
○ Defendants had stated that Plaintiff had used reasonable prudence to ensure that
the license was apparent
○ Held:
■ If there is no adequate alert on the webpage about the existence of the
terms and conditions and does not manifestly require the user to clearly
agree, then not bound by terms of the license contract.
■ There is an exception when the written terms do not appear in the contract
and the terms are then not made apparent to the signer; if so, a contract is
not formed since there would be manifest agreement between the parties.
● In the case of Brett Long vs. Provide Commerce inc, the california Appellate court laid
down that the essential ingredients which shall constitute a browse wrap agreement and
which might support in proving the validity of such contract is absence of actual notice.
● PDC Laboratories v Hach Co 2009
○ Court upheld enforceability of Browsewrap Agreement observing that the terms
were sufficiently visible and hyperlink in blue was clearly conspicuous.
METHODS OF E-CONTRACTING
● Electronic Agents-EDI, AI, smart contracts
○ A software program or an electronic device that acts as a tool and carries out tasks
on behalf of the originator or person using it
○ Refer to Can Computers make Contracts?
○ Legal Status of Electronic Agents:
15
■ EDI
■ Inter-process of communication of business information in a standardized
electronic form
■ Used in trade transactions
■ Contract between two computers (Electronic agents)
○ International Conventions:
■ Art. 12 UN Convention on use of Electronic Communication in
International Contracts 2005
● Recognizes formation of contracts through automated message
systems
■ Sec 14 Uniform Electronic Transaction Act, 1999 US
● Defines electronic agents and provides for rules applicable to
automated response systems
■ Art. 9 E-Commerce Directive of European Parliament 2000
● Treatment of contracts
○ Section 11 IT Act 2000
● Emails
● Through Websites
○ Shrink Wrap Agreements
○ Click Wrap Agreements
○ Browse Wrap Agreements
16
○ 4. If the addressee has not designated a computer resource along with specified
timings, if any, receipt occurs when the electronic record enters the computer
resource of the addressee.
● However, the above rules do not tell us anything more than when dispatch and receipt of
electronic records takes place. Therefore, in order to understand the rules relating to
electronic contract formation, the principles of the Indian Contract Act will have to apply
in this context. Section 4 of the Contract Act lays down the following rules regarding
communications of offers and acceptances:
○ 1. The communication of a proposal is complete when it comes to the knowledge
of the person to whom it is made.
○ 2. The communication of an acceptance is complete, — as against the proposer,
when it is put in a course of transmission to him, so as to be out of the power of
the acceptor; as against the acceptor, when it comes to the knowledge of the
proposer.
○ 3. The communication of a revocation is complete as against the person who
makes it, when it is put into a course of transmission to the person to whom it is
made, so as to be out of the power of the person who makes it; as against the
person to whom it is made, when it comes to his knowledge.
○ 4. A combined application of Section 4 of the Contract Act and Section 13 of the
Information Technology Act would reveal the following law for contract
formation in the case of electronic contracts in the event that nothing contrary has
been agreed to between the parties in their contract:
■ a) The communication of an offer becomes complete at the time when the
electronic offer enters any information system designated by the offeree
for the purpose, or, if no system is designated for the purpose, when the
electronic offer enters the information system of the offeree, or, if any
information system has been designated, but the electronic offer is sent to
some other information system, when the offeree retrieves such electronic
record.
■ b) The communication of an acceptance is complete — as against the
offeror when the electronic acceptance is dispatched such that it enters a
computer resource outside the control of the acceptor.
■ c) As against the acceptor, the communication of acceptance would be
complete when the electronic acceptance enters any information system
designated by the offer or for the purpose, or, if no system is designated
for the purpose, when the acceptance enters the information system of the
offer or, or, if any information system has been designated, but the
electronic record is sent to some other information system, when the offer
or retrieves such electronic acceptance.
■ d) The communication of revocation (of an offer or acceptance) is
complete as against the person who makes it when the electronic record is
dispatched such that it enters a computer resource outside the control of
the person making such offer or acceptance.
■ e) As against the person to whom it is made, such revocation is complete
when it comes to his knowledge i.e. Rule (2), (3) or (4) of Section 13
enunciated above would apply.
17
● A binding contract would take place once the acceptor dispatches the electronic record
such that it enters a computer resource outside the control of the acceptor.
● However, the above proposition may not hold well in all types of electronic contracts.
The Supreme Court in Bhagwandas v. Girdharlal, following the English decision in
Entores Ltd. v. Miles Far East Corpn, has held that Section 4 of the Contract Act is only
applicable in cases of non-instantaneous forms of communication and would not apply
when instantaneous forms of communication are used. The Court observed that the
draftsman of the Contract Act did not contemplate the use of instantaneous means of
communications. Hence, where proposal and acceptance are made by instantaneous
means of communications like the telephone, telex etc., the postal rule does not apply and
the contract is made where the acceptance is received. Therefore, the default rules
elucidated above may have relevance only in non-instantaneous forms of contract
formation.
18
○ The Plaintiffs (Entores) were an English Company and the Defendants (Miles Far
East Co) were an American corporation with agents in various locations,
including Amsterdam. An offer and acceptance in relation to a contract for
Japanese cathodes was made between the companies in London and Amsterdam.
Specificially:
■ the Plaintiffs (in London) sent an offer by telex to the Defendants (in
Amsterdam).
■ the Defendants (in Amsterdam) sent an acceptance by telex to the
Plaintiffs (in London)
○ The issue was when the contract entered into force, as this would determine
whether Dutch or English law would apply to the contract. Specifically, the Court
was required to determine whether the postal rule (providing that acceptance
occurs when and where the letter is sent) applied to telex communications.
○ The court held the postal rule does not apply to instantaneous forms of
communication. As a result, in the case of instantaneous communications
(including by telex) acceptance occurs when and where received. The rule in
relation to instantaneous communications is encapsulated in this passage by
Lord Justice Denning:
■ My conclusion is that the rule about instantaneous communications
between the parties is different from the rule about the post. The contract
is only complete when the acceptance is received by the offeror; and the
contract is made at the place where the acceptance is received.
■ When a contract is made by post it is clear law throughout the common
law countries that the acceptance is complete as soon as the letter is put
into the post box, and that is the place where the contract is made. But
there is no clear rule about contracts made by telephone or by Telex.
Communications by these means are virtually instantaneous and stand on a
different footing.
● Case: Brinkibon Ltd. vs. Stahag Stahl (Receipt Rule) -
○ The offeror, Brinkibon (London, England) wanted to sue the offeree, Stahag
(Vienna, Austria) for breach of contract. Acceptance of Brinkibon’s offer had
been by way of telex from London to Austria. Which jurisdiction’s law applied?
○ The answer to this question depended on whether the postal rule applied - if it did
the contract would have been concluded in England and English law would apply;
if it did not apply then the contract would have been concluded where the
acceptance was received – Vienna.
○ The postal rule does not apply to direct/instant forms of communication
(including telex) – as telex was used here the postal rule did not apply and the
contract was formed in Vienna - Austrian law applied.
○ Even though with telex the message may not be received by the intended recipient
immediately (there may be agents or other third parties who receive the messages
to be passed on to the intended recipient) a telex that goes directly from the
offeree’s business to the offeror’s business (unlike a telegram which employs the
use of a post office) should be treated as if it were an instantaneous
communication. If a telex is sent to an office acceptance occurs when the telex
19
reaches the place of business, not when it actually gets to the person to whom it is
addressed.
○ However, although the postal rule does not apply to instantaneous forms of
communication, there is no 'universal rule' with each case needing to be
decided by reference to the intention of the parties.
○ [Lord Wilberforce] Since 1955 the use of Telex communication has been greatly
expanded, and there are many variants on it. The senders and recipients may not
be the principals to the contemplated contract. They may be servants or agents
with limited authority. The message may not reach, or be intended to reach, the
designated recipient immediately: messages may be sent out of office hours, or at
night, with the intention, or on the assumption that they will be read at a later
time. There may be some error or default at the recipient’s end which prevents
receipt at the time contemplated and believed in by the sender. The message may
have been sent and/or received through machines operated by third persons. And
many other variants may occur. No universal rule can cover all such cases; they
must be resolved by reference to the intentions of the parties, by sound business
practice and in some cases by a judgement where the risks should lie.
● Case: Bhagwandas Case (Receipt Rule) -- Telephone agreements
○ Plaintiff offered to get certain goods supplied at Ahmedabad to defendants who
accepted the offer at Khamgaon. On defendants’ failure to supply requisite goods,
the plaintiff sued them at Ahmedabad. Dispute arose as to where the contract was
formed- at Khamgaon where acceptance was given by defendants or at
Ahmedabad where acceptance was received by plaintiffs.
○ An agreement does not result from mere intent to accept the offer: Acceptance
must be by some external manifestation (either by speech, writing, conduct in
further negotiations, or any other overt act) accompanied by its communication to
the offeror (Brogden v. Metropoliton Rly Co.) unless expressly waived by him or
impliedly by the course of negotiation to the contrary (Carlill v. Carbolic Smoke
Ball).
○ Entores v. Miles: An offer was made from London by telex to a party in Holland
and was duly accepted through telex; the question arose as to which court had
jurisdiction to try the dispute between the parties. Denning L.J. observed that in
case of instantaneous communications between the parties, i.e. where parties are
in each other’s presence or though separated in space are in direct communication
with each other as for example by telephone or telex, contract is complete when
the acceptance of offer is duly received by the offeror and the contract is formed
where such acceptance is received.
○ Adams v. Lindsell: An offer was made by defendants by post to sell certain
goods. Though, the acceptance was duly posted by plaintiff but, it reached
defendants nearly after a week when latter had already sold the goods to a third
party. Court ruled that ‘when parties aren’t in each other’s presence and
communicate long distance either by post or telegram, both parties get bound by
contract as and when the acceptor puts the letter of acceptance in the course of
transmission to offeror so as to be out of his power to recall’ (postal rule).
○ But in India, according to S.4 of ICA, application of Postal Rule results that
acceptor is bound only when the acceptance “comes to the knowledge of the
20
proposer” while proposer becomes bound much before when letter was “put
in course of transmission to him as to be out of the power of acceptor to
recall”. “S.4 doesn’t imply that the contract is formed qua the proposer at
one place and qua the acceptor at another place”. The gap of time between
posting of acceptance and its coming into knowledge of proposer can be utilised
by acceptor in revoking his acceptance by speedier communication which will
overtake the acceptance (S.5 of ICA)
○ The postal rule came into existence in Adams case for two prominent reasons:
■ The rule was based on commercial expediency/empirical grounds: for if
the defendants were not bound by their offer till the acceptance by the
plaintiffs is not received by them, then the plaintiffs ought not to be bound
till after they had received the notification that the defendants had received
their acceptance and had assented to it; and so it might go on ad infinitum.
■ Secondly, if the contract is not finally concluded till the intimation of the
acceptance by the promisee to the promisor, then there may be instances
that the promisor will deny the receiving of any acceptance even though
he may have received it. This may lead to instances of fraud and also
delay in commercial transactions. Further, the satisfactory evidence of
posting a letter is generally available as against of its having been
received.
○ The conversation over telephone is analogous to the conversation when the
parties are in presence of each other, wherein, the negotiations are concluded
by instantaneous speech and therefore communication of the acceptance
becomes a necessary part of the contract and the exception to the rule on
grounds of commercial inexpediency is inapplicable.
○ Further, in case of correspondence by post or telegram, a third agency
intervenes which is responsible for effective transmission of letters at every
instance, however, in case of telephonic conversation, once the connection has
been established, there is no need of any third agency to transmit the
correspondence between the parties.
21
● The decision of the Supreme Court in Bhagwandas Goverdhandas Kedia v. M/s.
Girdharilal Parshottamdas & Co. (1965) (hereinafter referred to as the “Bhagwandas
case”) has judicially engrafted an exception to the plain language of Section 4— the
majority opinion has constricted the application of the Postal Rule to acceptances
communicated via, post or telegraph, alone; and has validated the application of the
‘Receipt Rule’ to acceptances communicated via instantaneous modes of communication.
This ratio of the Bhagwandas case is now settled law in India.
● It becomes pertinent to do a critical analysis of the reasoning of the majority in the
Bhagwandas case. The majority opinion in the Bhagwandas case seems to suffer from
some limitations because, it— (i) most importantly, reaches a conclusion which does
violence to the plain statutory language of, Section 4 of the Contract Act; (ii) makes an
unwarranted distinction between, instantaneous and non-instantaneous, modes of
communication; and (iii) fails to appreciate that the justification underlying the Postal
Rule is applicable to modes of instantaneous communication too.
● Section 4 Indian Contract Act
○ Issues - Conclusion of offer and acceptance.
○ Execution of paper based contract vs. online communication
● Principles concluded
○ General rule is rule of receipt (not the postal rule)
○ Postal Rule is exception and applies where there is delay between sending and
receiving acceptance (Brinkibon case)
○ Instantaneous modes of communications is when offeree will be able to tell that
his attempt to communicate acceptance has failed.
22
● Cases of Default:
○ General principles under ICA
○ When the offeree knows or ought to have known that his mail has not been
received
○ When the offeree does not have actual or constructive knowledge of
communication
○ When the offeror is not at fault but the problem lies in his sphere of control.
● When can communication be considered to be completed???
○ S.12 IT Act -- when there is acknowledgement of receipt
■ Elucidates the receipt rule and provides that when the originator has not
specified that an acknowledgement of receipt is required in a particular
format or method, an acknowledgement can be given through any
communication by the addressee (automated or otherwise) or by any
conduct of the addressee that reasonably indicates to the sender of a
message that the electronic record has been received
○ When received during business hours
○ S.13 IT Act -- depending on the time and place of despatch.
■ The dispatch of electronic records occurs when it enters a computer
outside the control of the originator
■ In case the addressee has not designated any computer resource, receipt
occurs when the electronic record enters computer resource of the
addressee.
● Section 11 IT ACT: Attribution
○ An electronic record is attributed to the originator if it was sent by the originator
himself or by a person duly authorised by the originator or by an information
system programmed by the originator to send a message automatically.
● Conduct of parties - intention to enter into a legal relationship by means of external
manifestation - is the key principle
23
○ Exceptions: taxation; betting, gaming or lotteries; data protection; the activities of
a public notary; the representation of a client before courts;
○ Provide more stability, flexibility to stakeholders to attract investment.
● Key Provisions:
○ Article 2 : Definitions
■ 2(a): Information society service
■ 2(b): Service Provider
■ 2(d): Recipient of Service
■ 2(f): Commercial Communication
■ 2(h): Coordinated Field
○ Article 3: Internal Market Clause:
■ “Member States may not, for reasons falling within the coordinated field,
restrict the freedom to provide information society services from another
Member State”
■ Derogations possible under strict conditions, e.g: measures necessary for
public policy, protection of public health, public security, protection
consumers proportionality test.
■ Article 3 does not apply to intellectual property rights, consumers
contracts, freedom of parties to choose the applicable law
○ Article 4: Prohibition of Prior Authorization
■ Members States shall ensure that the taking up and pursuit of the activity
of an information society service provider may not be made subject to
prior authorization or any other measure having equivalent effect“.
○ Article 5: General Information to be provided.
■ Member state shall ensure additional information shall be provided by the
service provider other than requirements established by community law.
Such as:
■ The name of the service provider, the geographic address at which the
service provider is established, the details of the service provider,
including his electronic mail address, which allow him to be contacted
rapidly and communicated with in a with in a direct and effective manner
○ Article 6: Information to be Provided
■ Other than the information provided by the community law, member states
shall comply with the following condition:
■ Commercial communication must be clearly identifiable;
■ On whose behalf Commercial Communication is made,;
■ Promotional offer such as discounts, premium, a gifts should be clearly
identifiable and condition to qualify them shall also be easily accessible
○ Article 7 : Unsolicited Commercial Communication:
■ It means any message through telecommunication service transmitted for
the purpose of transmitting information.
■ Unsolicited Commercial Communication -- Spam offers from Paytm,
Bookmyshow etc.
○ Article 9: Member State to ensure that their legal system allows contracts by
electronic means.
24
■ To ensure that it does not create any obstacles to e- contract nor its illegal
or affects its validity.
■ Exception:
● Contract that create or transfer rights in real estate
● contracts requiring by law the involvement of courts, public
authorities or professions exercising public authority;
● contracts of suretyship granted and on collateral securities
furnished by persons acting for purposes outside their trade,
business or profession;
● contracts governed by family law or by the law of succession.
○ Article 12: Mere conduit
■ Service providers, whose role solely consists in the transmission of
information originating from third parties and the provision of access
through a communication network, cannot be held liable for third party
illegal content if they:
■ Do not initiate the transmission
■ Do not select the receiver of the transmission and
■ Do not select or modify the information transmitted Automatic,
intermediate and transient storage of information which takes place during
the transmission of the information in order to carry out the transmission,
are covered by the exemption of liability
○ Article 13: Caching
■ Service providers cannot be held liable for third party illegal content when
providing caching facilities provided they:
● do not modify the information,
● comply with conditions on access to information and with rules on
the updating of the information,
● do not interfere with lawful use of technology to obtain data on the
use of the information,
● expeditiously act to remove the access to the information stored
when informed that the information has been removed from the
network, when access to it has been disabled or when a responsible
authority has ordered the removal.
○ Article 14: Hosting
■ Service providers who store information supplied by and at the request of
a recipient of the service are not liable if: They do not have actual
knowledge of illegal activity or information and as regards claims for
damages and are not aware of the facts or circumstances from which the
illegal activity or information is apparent; or
■ The provider, upon obtaining such knowledge or awareness, acts
expeditiously to remove or disable access to the information
○ Article 15: Prohibition of a general monitoring obligation
■ Member State shall not impose a monitoring obligation on providers,
when providing the services covered by Articles 12, 13 and 14, to monitor
the information which they transmit or store
● A general obligation actively to seek facts or circumstances indicating illegal activity
25
○ Case: McFadden v. Sony Music
■ Whether there is an obligation over network access providers to monitor
information that is transmitted over the network?
● Section 2(w) Intermediary: with respect to any particular electronic records, means any
person who on behalf of another person receives, stores or transmits that record or
provides any service with respect to that record and includes telecom service providers,
network service providers, internet service providers, web-hosting service providers,
search engines, online payment sites, online-auction sites, online-market places and cyber
cafes;
● Section 2(b)- addressee excludes intermediary
● Section 2 (za)- originator excludes intermediary
● Section 67(c)- obligation of an intermediary to retain information as prescribes by the
government; violation amounts to fine and imprisonment
● Section 69- data interception or monitoring by government or an authorized agency;
intermediaries are expected to co-operate; failure to do so amounts to imprisonment and
fine
● Section 69A- authorized blocking of sensitive information from public access; failure to
do so amounts to imprisonment and fine
● Section 69B- An intermediary is obligated to provide technical assistance to the
government or an authorized agency in collection of traffic data-
○ Explanation (ii)- any data identifying or purporting to identify any person,
computer system or computer network or location to or from which the
communication is or may be transmitted and includes communications origin,
destination, route, time, data, size, duration or type of underlying service and any
other information.
● Section 70B: Co-operating with the Indian Computer Emergency Response Team in
managing cyber security:
○ collection, analysis and dissemination of information on cyber incidents;
○ forecast and alerts of cyber security incidents;
○ emergency measures for handling cyber security incidents;
○ co-ordination of cyber incidents response activities;
○ issue guidelines, advisories, vulnerability notes and white papers relating to
information security practices, procedures, prevention, response and reporting of
cyber incidents;
○ such other functions relating to cyber security as may be prescribed.
● Sections 71-75: Punishment for various offences; includes intermediaries; applicable
to persons outside India
● Safe Harbour Exemptions:
○ Section 79-
■ An intermediary not liable for third party information, data, or
communication link made available or hosted by them (third party);
26
■ An intermediary not liable if its responsibility is limited to merely
providing a communication system for the transmission of information;
■ An intermediary is not liable if it has exercised due diligence; (Shreya
Singhal vs. UOI 2015)
○ Exceptions to the protection:
■ aiding, abetment or instigation of an unlawful act;
■ Failure on the intermediary’s part to co-operate with the government with
respect to information transmitted through their communication system
and used for unlawful purposes;
● Case: Amway India Enterprises Pvt. Ltd. and Ors. vs. 1MG Technologies Pvt. Ltd. and
Ors. (2018)
○ Amway claimed that their goods could not be sold without a direct contract --
many e-commerce platforms sold the products without authorisation -- use of
trademark on e-commerce sites amounted to trademark passing off hence a breach
of trademark guidelines -- 1MG argued that they are intermediaries and are
entitled to safe harbour -- Plaintiff had issued notices despite that infringement
continued -- are the defs liable???? Intermediaries were actively involved in
assisting the sale (Del HC Single bench).....division bench reversed the order + no
distinction between active and passive intermediaries and safe harbour would
apply based on s.79(2)ITAct.
○ the Delhi High Court held:
■ Intermediaries must abide by their own terms and conditions/policies or
risk losing protection under Section 79 of the Information Technology
Act, 2000.
■ E-Commerce platforms may be held liable for tortious interference by
allowing sellers to operate on the platform upon receipt of actual
knowledge that sale by such sellers is in breach of third party agreements.
■ Owner of a trademark can object to unauthorized resale of products
bearing their registered trademark in cases of impairment of the products.
“Impairment” may include change in warranties, return policies, selling
prices of the product.
● Rights of a manufacturer; direct involvement of an intermediary
● Case: Kent RO Systems Ltd. & Anr. v. Amit Kotak & Ors. (2016) -
○ In the case of Kent RO Systems Ltd. & Anr. v. Amit Kotak & Ors.2 (“Kent RO
Systems Case”), the question before the Delhi HC was whether once a complaint
has been lodged by a complainant with the e-commerce platform service provider
relating to allegedly infringing goods displayed by certain seller(s) on the
platform, whether the e-commerce platform had an obligation to continuously
verify whether goods subsequently displayed by the same sellers that may
infringe the intellectual property rights of the complainant. The Delhi HC held
that question of an intellectual property right infringement is more often than not
a technical question, and intermediaries are not equipped and not required to
27
screen all goods / information hosted on its platform for infringement of the rights
of persons who have made complaints in the past relating to infringement.
○ Kent RO Case -- product listing alleged by Kent that their IPR under designs act
were infringed by merchant Amit Kotak -- sought an injunction to restraint from
selling goods on ebay -- ebay should've been liable as well as they had informed
ebay about infringement and removal -- ebay took immediate action but there was
a problem that certain standards had to be observed even if they do not have
active knowledge, so they said that their liability extends not only to effective
action, but to proactive action as well to preempt any infringement though the
channelisation -- Question that arose that if ecommerce platform had a role to
actively clarify upon the goods -- DelHC held that standards to determine the
rights is a legal question and must be determined by the courts and the
intermediaries are not equipped nor are required to screen the goods hosted on
their platform -- ebay was not held to be responsible
● Case: Christian Louboutin SAS vs Nakul Bajaj & Ors. (2019) -
○ products on ecommerce platform bearing trademark were not authorised nor were
genuine products -- held in favour of plaintiff and observed that ecommerce
portals are responsible to ensure genuineness of products
● Case: Swami Ramdev & Anr. vs. Facebook, Inc. & Ors. (2019) -
○ The Delhi High Court issued an injunction against Facebook, Google, YouTube
and Twitter (Defendants) and other online intermediaries, directing them to
globally take down a list of URLs from their platforms which were allegedly
defamatory to the Plaintiffs.
○ The case was brought by yoga guru Swami Ramdev in relation to an alleged
defamatory video and related content posted and disseminated on the Defendants’
platforms. The impugned content summarized the contents of a book which had
been found to be defamatory by another court.
○ After a detailed analysis of the law on intermediary liability in India under the
Information Technology Act, 2000 and the Information Technology Rules, 2011,
the Court held that the intermediaries were obliged to take down and block all
such illegal content and videos which had been uploaded from I.P. addresses
within India, on a global basis.
○ Further, for illegal content which was uploaded outside the Indian territory, the
Court directed geo-blocking access and disabling viewership of such content from
within India.
28
UNIT 3: E-SIGNATURES AND DIGITAL
SIGNATURES
29
ELECTRONIC SIGNATURE - INTRODUCTION
● uses a technology that binds the signature to the signer’s identity and the time it was
signed.
● An electronic signature could be a process attached, electronic symbol or sound to a
message, contract or document which can be used to get consent or approval on
electronic documents or forms. Electronic signatures are a substitute for handwritten
signatures in practically each personal or business process
30
■ the generated signature can be linked only to the signatory and to no other
person;
■ only the signatory had access to and control over the document at the time
of signing;
■ any alteration to the signature or the information made after the signature
is affixed is detectable; and
■ the essentials of a valid contract under the Indian Contract Act, 1872, such
as offer, acceptance and intention to create legal relationship, capability of
the parties, consideration etc., are met.
It can be created by using various available It uses public key cryptography system to sign
technologies like attaching a picture of your up for a particular message which requires a
signature pair of keys (private key for encryption and
public key for decryption) computed by hash
functions
It can be in the form of a name typed at the It involves the usage of cryptographic system
end of an email, a digital version of a of constructing the signature with a two-way
handwritten signature in form of an protection system
attachment, a code or even a finger print
It is less authentic as compared to the digital It has more authenticity as compared to the
signature electronic signature
It is verified through the sender's identity It has a certificate based digital verification
Does not require any kind of signing To get digital signatures on the document, the
certificate signer must have the digital signing certificate
from an issuing Certifying Agency
31
Symmetric Key and Asymmetric Key Encryption
● Symmetric Key Encryption:
○ Encryption is a process to change the form of any message in order to protect it
from reading by anyone. In Symmetric-key encryption the message is encrypted
by using a key and the same key is used to decrypt the message which makes it
easy to use but less secure. It also requires a safe method to transfer the key from
one party to another.
○ There is only a single key known to both the sender and the receiver. Under this
system, the secret key or the private key is known to the sender and the legitimate
user. This secret key is used for both encryption and decryption of the message.
○ The only drawback of this symmetric encryption is that as the number of pairs of
users increases, it becomes difficult to keep track of the secret keys used.
● Asymmetric Key Encryption:
○ Asymmetric Key Encryption is based on public and private key encryption
technique. It uses two different key to encrypt and decrypt the message. It is more
secure than symmetric key encryption technique but is much slower
○ Can only be decrypted using a publicly available key known as the ‘Public Key’
provided by the sender. The procedure has been under Section 2(1)(f) of the
Information Technology Act, 2000. Under this system, there is a pair of keys, a
private key known only to the sender and a public key known only to the
receivers.
○ The message is encrypted by the private key of the sender, on the contrary,
decryption can be done by anyone who is having the public key. It depicts the
authenticity of the sender. It is also known as the ‘principle of irreversibility’ ie.
the public key of the sender is known to many users, but they do not have access
to the private key of the sender which bars them from forging the digital
signature.
32
○ Security of crypto systems is dependent on the management of the private keys.
○ Cryptographic schemes are rarely compromised through weaknesses in their
design. They are often compromised through poor key management
○ There are some important aspects of key management which are as follows −
■ Cryptographic keys are nothing but special pieces of data. Key
management refers to the secure administration of cryptographic keys.
● Key Management for Public Key
○ Two specific requirements:
■ Secrecy of private keys. → Throughout the key lifecycle, secret keys
must remain secret from all parties except those who are owner and are
authorized to use them
■ Assurance of public keys. → In public key cryptography, the public keys
are in open domain and seen as public pieces of data. By default there are
no assurances of whether a public key is correct, with whom it can be
associated, or what it can be used for. Thus key management of public
keys needs to focus much more explicitly on assurance of purpose of
public keys
● Components of PKI
○ PK Certificate (Digital certificate)
■ Examples -- SSL certificate from Christ
○ Private key tokens
● Certification authority
○ Function s of CA -- generation of keys (private and public keys), issues Dc, signs
DC, publish the certificates for users to be able to find them, can even revoke the
certificate as well.
● Registration authority
○ Presence is subjected to a use of a third party registration --
● Certificate management system.
● Publication of certificates -- online directory or to actually send it to those people who the
CA thinks might be entitled to the persons.
● Issuance of certificates can be done either through private or public channels, but is done
after due diligence by the CA.
● PKI Process:
○ Step 1: Subscriber applies to Certifying Authority for Digital Signature
Certificate.
○ Step 2: Certifying Authority verifies identity of subscriber and issues Digital
Signature Certificate.
○ Step 3: Certifying Authority forwards Digital Signature Certificate to Repository
maintained by the Controller.
○ Step 4: Subscriber digitally signs electronic message with private key to ensure
Sender Authenticity, Message Integrity and Non-Repudiation and sends to
Relying Party.
○ Step 5: Relying party receives message, verify Digital Signature with Subscriber‖s
Public Key, and goes to Repository to check status and validity of Subscriber‖s
Certificate.
33
○ Step 6: Repository does the status check on subscriber‖s certificate and inform
back to the Relying Party.
34
■ It can delegate its powers to the office of the Deputy Controller, Assistant
Controller or any other office
■ It can investigate any contravention of the provisions of the IT Act or
rules/regulations under it
■ Investigative powers are similar to the powers of an ITC under Section
116 of the Income Tax Act 1961
○ Section 20 - Controller to act as a repository
■ The Controller will act as a repository of all digital signature certificates
under this Act.
■ The Controller will –
● Make use of secure hardware, software, and also procedures.
● Observe the standards that the Central Government prescribes to
ensure the secrecy and also the security of the digital signatures.
■ The Controller will maintain a computerized database of all public keys.
Further, he must ensure that the public keys and the database are available
to any member of the public.
○ Section 21 - License to issue DSC:
■ (1) Subject to the provisions of sub-section (2), any person can apply to
the Controller for a license to issue digital signature certificates.
■ (2) A Controller can issue a license under sub-section (1) only if the
applicant fulfills all the requirements. The Central Government specifies
requirements with respect to qualification, expertise, manpower, financial
resources, and also infrastructure facilities for the issuance of digital
signature certificates.
■ (3) A license granted under this section is –
● (a) Valid for the period that the Central Government specifies
● (b) Not transferable or inheritable
● (c) Subject to the terms and conditions that the regulations specify
○ Section 22 - Application for License:
■ (1) Every application for issue of a license shall be in such form as may be
prescribed by the Central Government.
■ (2) Every application for issue of a license shall be accompanied by-
● (a) A certification practice statement;
● (b) a statement including the procedures with respect to
identification of the applicant;
● (c) payment of such fees, not exceeding twenty-five thousand
rupees as may be prescribed by the Central Government;
● (d) such other documents, as may be prescribed by the Central
Government.
○ Section 23 - Renewal of License:
■ An application for renewal of a license shall be-
● (a) in such form;
● (b) accompanied by such fees, not exceeding five thousand rupees,
as may be prescribed by the Central Government and shall be
made not less than forty-five days before the date of expiry of the
period of validity of the license.
35
○ Section 24 - Procedure for grant or rejection of license
■ The Controller may, on receipt of an application under sub-section (1) of
section 21, after considering the documents accompanying the application
and such other factors, as he deems fit, grant the license or reject the
application
■ Provided that no application shall be rejected under this section unless the
applicant has been given a reasonable opportunity of presenting his case.
○ Section 25 - Suspension of License
■ If CA fails to maintain acceptable standards
■ If CA fails to follow terms and conditions
■ If CA contravenes any provisions of IT Act
■ If CA makes any false statement in relation to the issue or renewal of
license issued by CCA
■ No CA whose license has been suspended shall issue any ESC (Electronic
Signature Certificate i.e. Digital Signature Certificate) during such
suspension.
○ Section 28 - power to investigate contraventions
■ The Controller or any other Officer that he authorizes will investigate any
contravention of the provisions, rules or regulations of the Act.
■ The Controller or any other Officer that he authorizes will also exercise
the powers conferred on Income-tax authorities under Chapter XIII of the
Income Tax Act, 1961. Also, the exercise of powers will be limited
according to the Act.
○ Duties of CA
■ To follow procedures regarding security systems - Section 31
● To ensure privacy of subscribers
■ To ensure compliance with the Act
■ To display license - Section 32
■ To surrender its license on suspension or revocation - Section 33
■ To disclose its Electronic Signature Certificate and any relevant
certification practice statement - Section 34
36
● Public key listed in the ESC can be used to verify a digital signature affixed by the
private key
● The subscriber’s public key and private key constitute a functioning key pair- pk(public)
can be used to verify a request created by pk(private)
● Accuracy of the information contained in the ESC
● The CA has no knowledge of inclusion of any information on the ESC which would
affect the “trust” of a subscriber
● Suspension and Revocation of ESC:
○ Section 37: Suspension
■ Request of suspension can be file by either a subscriber or an authorised
person
■ ESC should be suspended in public interest
○ Section 38: Revocation
■ On the request of the subscriber or an authorised person
■ Death of the subscriber
■ Dissolution of a firm or winding up of a company that is the subscriber
■ Inaccuracy of a material fact
○ Requirements not met
○ Reliability of the ESC was affected by a compromise in the private key or security
system
○ Insolvency of a subscriber; if a subscriber ceases to exist
○ The IT Act mandates the publication of revocation under Sections 37 or 38, in the
repository carrying other details of such an ESC.
37
UNIT 4 - PAYMENT ISSUES IN E-COMMERCE
INTRODUCTION
Payment System:
● Regulated by the PSS Act 2007
● Defined under s.2(1)(i) of the PSS Act
● Parties Involved in E-Commerce Transaction
○ Payer - customer
○ Payee - Merchant
○ Issuing bank - customer’s bank
○ Acquiring bank - merchant’s bank
● Players involved in Electronic Payment Systems
○ Payment Processors
○ Intermediaries
○ Technology providers
38
PAYMENT SETTLEMENT SYSTEMS ACT 2007
● regulation and supervision of payment methods in India.
● provide a legal basis for “netting” and “settlement finality”.
● The two regulations made under the Act through RBI are Board for Regulation and
Supervision of Payment and Settlement Systems Regulations, 2008 and the Payment
and Settlement Systems Regulations, 2008.
● It deals with matters relating to the form of application to authorize commencing/
carrying on a payment system and grant of authorization.
● It prescribes payment instructions and determines the standard of payment systems.
Definitions
● Settlement
○ It means the settlement of payment instructions. It also includes the settlement of
securities, foreign exchange, derivatives, or other transactions involving payment
obligations. It can be either on a net basis or on a gross basis.
● Sec 2(1)(i) - Payment System
○ “payment system” means a system that enables payment to be effected between a
payer and a beneficiary, involving clearing, payment or settlement service or all of
them, but does not include a stock exchange;
○ Explanation.- For the purposes of this clause, “payment system” includes the
systems enabling credit card operations, debit card operations, smart card
operations, money transfer operations or similar operations;
● Sec 2(1)(c) - Electronic Fund Transfer
○ any transfer of funds which is initiated by a person by way of instruction,
authorisation or order to a bank to debit or credit an account maintained with that
bank through electronic means and includes
■ point of sale transfers;
■ automated teller machine transactions,
■ direct deposits or withdrawal of funds,
■ transfers initiated by telephone, internet and, card payment
39
● Foreign entities are allowed to operate the payment system in India. To commence a
payment system in India, it is necessary to obtain license or approval from the RBI,
irrespective of being a domestic or foreign entity.
40
○ NEFT
■ a more secure system was introduced for facilitating one-to-one funds
transfer requirements of individuals / corporates.
■ Available across a longer time window, the NEFT system provides for
batch settlements at hourly intervals, thus enabling near real-time transfer
of funds.
■ Certain other unique features viz. accepting cash for originating
transactions, initiating transfer requests without any minimum or
maximum amount limitations, facilitating one-way transfers to Nepal,
receiving confirmation of the date / time of credit to the account of the
beneficiaries, etc., are available in the system.
● Real Time Gross Settlement (RTGS)- interbank
○ RTGS is a funds transfer systems where transfer of money takes place from one
bank to another on a "real time" and on "gross" basis.
○ Settlement in "real time" means payment transaction is not subjected to any
waiting period.
○ "Gross settlement" means the transaction is settled on one to one basis without
bunching or netting with any other transaction.
○ Once processed, payments are final and irrevocable.
○ This was introduced in in 2004 and settles all inter-bank payments and customer
transactions above Rs. 2 Lakh
● Immediate Payment Services (IMPS)- Axis cash to mobile service
○ IMPS stands for Immediate Payment Service in Indian banking system
terminologies. It is a money transfer mechanism made available by the apex bank
of the country, the Reserve Bank of India and the National Payments Corporation
of India (NPCI). Initiated in 2010 by the NPCI with the help of a pilot project
with 4 major banks, IMPS has now grown to 150+ banks.
○ The major feature of IMPS is that it is available at all times for usage. It transfers
funds instantly and is a great banking platform in case of emergencies. The
transaction charges of this platform are also very nominal and the transfer limit is
also considerable, approximately Rupees 2 lakhs per day. Moreover, IMPS is
available on mobile too which makes it super-convenient.
○ National Electronic Fund Transfer (NEFT) and RTGS (Real-time gross
settlement) transfer mechanisms are only available during their business hours.
Moreover, NEFT and RTGS are not available on bank off-days and holidays.
However, IMPS scores a point in this regard as it is available 24 x 7.
○ National Payments Corporation of India (NPCI) is responsible for managing the
IMPS fund transfer mechanism. This mechanism is regulated by the Reserve
Bank of India. One can define IMPS as an immediate, inter-bank real-time fund
transfer mechanism enabled through electronic means.
41
○ Objectives of IMPS
■ To enable bank customers to use mobile instruments as a channel for
accessing their banks accounts and remit funds
■ Making payment simpler just with the mobile number of the beneficiary
■ To sub-serve the goal of Reserve Bank of India (RBI) in electronification
of retail payments
■ To facilitate mobile payment systems already introduced in India with the
Reserve Bank of India Mobile Payment Guidelines 2008 to be
inter-operable across banks and mobile operators in a safe and secured
manner
■ To build the foundation for a full range of mobile based Banking services.
● Pre-paid Payment Systems
○ Pre-paid instruments are payment instruments that facilitate purchase of goods
and services against the value stored on these instruments.
○ The value stored on such instruments represents the value paid for by the holders
by cash, by debit to a bank account, or by credit card.
○ The pre-paid payment instruments can be issued in the form of smart cards,
magnetic stripe cards, internet accounts, internet wallets, mobile accounts, mobile
wallets, paper vouchers, etc.
○ The use of pre-paid payment instruments for cross border transactions has not
been permitted, except for the payment instruments approved under FEMA.
● Mobile Banking System
○ Reserve Bank brought out a set of operating guidelines on mobile banking for
banks in October 2008.
○ The guidelines focus on systems for security and inter-bank transfer arrangements
through Reserve Bank's authorized systems.
○ On the technology front the objective is to enable the development of
inter-operable standards so as to facilitate funds transfer from one account to any
other account in the same or any other bank on a real time basis irrespective of the
mobile network a customer has subscribed to.
● ATMs / Point of Sale (POS) Terminals / Online Transaction
42
● NPCI is expected to bring greater efficiency by way of uniformity and standardization in
retail payments and expanding and extending the reach of both existing and innovative
payment products for greater customer convenience.
● UPI Transfers
Unified Payments Interface (UPI) is a system that powers multiple bank accounts into a
single mobile application (of any participating bank), merging several banking features, seamless
fund routing & merchant payments into one hood. It also caters to the “Peer to Peer” collect
request which can be scheduled and paid as per requirement and convenience.
With the above context in mind, NPCI conducted a pilot launch with 21 member banks.
The pilot launch was on 11th April 2016 by Dr. Raghuram G Rajan, Governor, RBI at Mumbai.
Banks have started to upload their UPI enabled Apps on Google Play store from 25th August,
2016 onwards. It is unique because of the following reasons:
● Immediate money transfer through mobile device round the clock 24*7 and 365 days.
● Single mobile application for accessing different bank accounts.
● Single Click 2 Factor Authentication – Aligned with the Regulatory guidelines, yet
provides for a very strong feature of seamless single click payment.
● Virtual address of the customer for Pull & Push provides for incremental security with the
customer not required to enter the details such as Card no, Account number; IFSC etc.
● Bill Sharing with friends.
● Best answer to Cash on Delivery hassle, running to an ATM or rendering exact amount.
● Merchant Payment with Single Application or In-App Payments.
● Utility Bill Payments, Over the Counter Payments, Barcode (Scan and Pay) based
payments.
● Donations, Collections, Disbursements Scalable.
● Raising Complaint from Mobile App directly
43
RBI NOTIFICATIONS ON PAYMENT ISSUES
● Directions for Opening and Operating of Accounts and Settlement of Payments for
Electronic Payment Transactions Involving Intermediaries 2009
○ To safeguard the interests of the customers and to ensure that the payments made
by them using Electronic/Online Payment modes are duly accounted for by the
Intermediaries receiving such payments and remitted to the accounts of the
merchants who have supplied goods and services.
○ It requires a separate bank account to be opened for the purpose of such payment
transactions in the nature of an internal account which is not maintained or
operated by intermediaries and prescribes other conditions for settlement of
accounts and related aspects.
● RBI Circular on Payment System Providers and System Participants, 2011
● RBI Master Circular on Plastic Money 2015
● RBI Notification on unauthorized transactions, 2017
● RBI Notifications on Payment Aggregators and Payment Gateways, 2019
● RBI Notification on E-mandates for Card Not Present Transactions, 2019
● RBI Master Direction on Digital Payment Security Control, 2021
CHARGEBACK AGREEMENTS
● Chargeback means reversal
● Also known as friendly fraud
● A buyer protection measure
● The customer keeps the goods/products purchased online from the eCommerce shop but
still asks for a refund stating purchase never made or payment being made twice or item
was never received
● Chargebacks can result from unintentional mistakes or even from malicious intentions
● The chargeback resolution process involves 3 parties
○ The customer
○ The merchant
○ The issuing bank
● A person commits chargeback fraud by authorising a credit/debit card transaction,
receiving the product or service and later filing a false chargeback request to get the item
for free
● Common chargeback frauds suffered by e-commerce merchants include
○ The purchased product or service received is claimed to be undelivered
○ The original transaction authorised is claimed to be unauthorized
○ The genuine product or service received is claimed to be faulty or deficient
44
● Chargeback not only affects the revenusem but also the reputation and goodwill of the
damaged immensely
● Possible and typical chargeback reasons:
○ consumer was not satisfied with the received goods or services:
○ the ordered goods were not delivered or the service was not provided to the
consumer
○ the received goods were not the ones the consumer ordered, differed from the
description, or the description did not provide significant information
○ consumer returned the goods but did not receive a money refund from the
merchant
○ clerical mistake:
○ consumer was accidentally billed twice (duplicated transaction)
○ the card was charged for a different amount
○ fraudulent transaction:
○ transactions were performed by an unauthorized person (e.g. the card data was
stolen)
○ the cardholder does not recognize a specific transaction on their card statement
● Chargeback process
○ The card holder contacts their issuing bank and requests a chargeback.
○ The issuing bank begins the chargeback procedure and contacts the acquiring
bank.
○ The acquiring bank informs the merchant about the chargeback request and asks
them to take a stand in a specific time period (e.g. 7 days).
○ The merchant either accepts the chargeback or objects it and provides
documentations that proves them right.
○ If the merchant accepts the chargeback, doesn't respond in the said time period or
objects the chargeback, but cannot provide proper documentation, they have to
return the funds and pay the appropriate fees.
○ The acquiring bank informs the issuing bank about the merchant position and
provides appropriate documentation (that, for example, proves the merchant is in
the right).
○ The issuing bank informs the card holder about the result. If the merchant was in
the right, the funds are not returned.
45
● Safe, reliable and convenient to conduct transactions and business
● Advantages
○ Simplified accounting
○ Improved efficiency
○ Reduced administrative costs
○ Improved security
CASES
● State Bank of India v Dr. Subhash Chander March, 2016 NCDRC
○ bank was liable for fraudulent ATM withdrawals
● Mercantile Credit v Dinesh (1998) DEL
○ The card issuing company was held liable for its deficiency in service if any entity
which was a party to the crdity card arrangement refused to accept the credit card.
● Central Bank of India vs Mohinder Singh (2000) Punj
○ The complainant had booked for an insurance of lost or stolen credit card with a
protection to the extent of Rs.50k. The credit card was lost and due intimation was
sent to the bank. It was ruled that the bank was not liable to charge upto
Rs.50,000
● American Express Bank ltd. V Girdhari Jewellers Pvt. Ltd. (2006) Del
○ The case involved the issue of UTP. The customer had used a credit card to pay
for jewellery and the card was fake. The court held that since the shop keeper
could not have known that the card was fake, the pertiner cannot avail the full
recourse clause in the agreement
● Anupama Purohit vs Makemytrip.com (2007) Delhi DCRF
○ Case dealt with Unfair trade practice by the defendant
○ In this case, an online service provider despite receiving an advance payment
failed to book one double bedroom for a consumer although it had granted
confirmation of booking. The defendant debited twice the amount of the
complaint by using his credit card details and password which was used to make
an online payment.
● National Association of Software and Service Companies vs Ajay Sood (2005) Del-
○ Concept of phishing as cyber crime and liable for injunction and damages
● Umashankar Sivasubramanian vs ICICI bank (2008)
○ Case of phishing- bank held liable for not securing its internet banking system in
such a manner that a customer would recognize a mail from the bank
E-MONEY
● Means prepaid money that is stored in an electronic format and used to pay for goods and
services online.
46
● It includes prepaid online account, smart cards, e-wallets, virtual currencies such as
bitcoins
● E-money is usually implemented by use of cryptography.
● Liability of e-money can be observed based on the provisions of IT Act. Sec42 states that
any subscriber of e-signatures (which are used in e-money) will be liable till he has
informed the certifying authority that the private key used for transactions has been
compromised.
● E-money that is quite similar to real cash (fiat money) shall be covered under the RBI Act
1934.
● Academicians argue that putting a restriction on the right to issue e-cash to banks would
not favour e-commerce activity and may lead to a decrease in its online usage.
47
● Long life of Plastic Currency Notes: The proposed plastic currency notes will have the
life of five years as against one-year life of paper currency notes.
● Check on Black Money: It is possible to trace the financial transactions done through
cards. Developing a culture of plastic money will make it easy for the government to
trace black suspected black money sources.
● Supports Growth of E-commerce: The use of cards has supported the growth of
e-commerce. Growth of e-commerce enhances cost-effectiveness and alternative channels
to improve economic growth.
● Power of Purchasing: Debit or Credit cards made it easier to buy things. Now we do not
have any need to carry money in a large amount. Plastic money is accepted at any time
and everywhere.
● Time-Saving: one can purchase anything from any place through a credit card or debit
card without spending money on fare or cash transaction. You have to provide your card
details to seller store or corporations and settle your order. It saves time in the transaction
by debit and credit card.
● Safety: In case, if an individual loses the cards, then he/she may contact the bank or
financial institution, which provide the cards. The financial institution or bank will block
the account and no-one can draw a single penny without your permission.
48
UNIT 5: CONSUMER PROTECTION
REMOTENESS OF DAMAGE
● Hadley v Baxendale
○ A defendant will be liable for damages that may reasonably be supposed to have
been in the contemplation of the parties arising in the normal course of events.
○ Where special circumstances are communicated, a defendant will be liable for
damages that may have been reasonably contemplated by the parties acquainted
with that special knowledge.
● Question: X a user of an online service ONS clicked on “I agree” twice before running
the application on his system. Eventually, he is charged a hefty amount from his credit
card without getting any prior information on it. X sues ONS for fraud. Is the claim
legally sustainable?
○ Rudder vs. Microsoft (1999)
■ Rudder was the user of Microsoft internet services
■ Clicked on “I Agree” before running the application
■ The legality of click-wrap agreement
■ The validity of forum non conveniens
● Caspi vs. MSN (1999)
○ Fine prints in contracts
● Tata Chemicals vs. Skypack Couriers (2001)
49
○ Health, safety and security concerns
○ Age related restrictions, etc.
○ Transparency of information pertaining to transactions and associated costs
○ Payment methods
○ Privacy policy
○ Rights of clients
○ Dispute resolution, etc.
● Easy to use payment methods:
○ Effective security measures
○ Minimum levels of consumer protection vis-à-vis e-payments
○ Minimum liability of consumer on case of default of payment
● SS. 5 and 7 of Payment Settlement System Act 2007- RBI guidelines; applicable to
e-transactions
50
guarantee that the goods listed were of genuine, which is the role of the actual
seller.”
51
○ Restrains the intentional interception of any electronic communication or the
procurement of any other person to do so.
○ Proscribes the intentional and unauthorized causing of damage to a protected
computer resulting from knowingly causing the transmission of a program,
information, code, or command. (respectively)
○ Settlement
■ Better explained privacy policy
■ User awareness campaign
■ Imparting options which give a user the choice to install or decline the
installation of invasive computer programs
● LIC vs. Consumer Education and Research Centre
○ LIC policy meant only for government and semi-government employees, reputed
commercial firms
○ Violation of constitutional rights and objectives
○ LIC- agent of state- must realise the objective of social welfare- subject to judicial
review
52
○ The term 'product seller' is defined to include a person who is involved in placing
the product for a commercial purpose and as such would include e-commerce
platforms as well.
● Spice jet Ltd V. Ranju Aery 2017
○ The question before the Supreme Court was; consumer who enters online
contract, whether consumer protection Act, is applicable to him ?
● Difference between CPA 1986 and CPA 2019
1986 2019
PECUNIARY District forum (upto 20 lacs) State District forum (upto 1 crore)State
JURISDICTION commission (from 20 lacs to 1 commission (from 1 crore to 10
crore)National commission (from crore)National commission (from
1 crore and above) 10 crore and above)
APPEAL Earlier 30 days period for appeal Now it is 45 days (Section 41)Now
against the order of District forum 50% of award amount
(Section 15)Earlier 50% or 25,000
whichever is less is to be
deposited
UNFAIR TERMS No such provision Section 49(2) and 59(2) of the new
AND act gives power to the State
CONDITIONS Commission and NCDRC
respectively to declare any terms
of contract, which is unfair to any
consumer, to be null and void
● Rights of Consumer under s.2(9)
○ The right to be protected against the marketing of goods, products or services
which are hazardous to life and property:
53
○ The right to be informed about the quality, potency, purity, standard and price of
goods, products or services, as the case may be so as to protect the consumer
against the unfair trade practices
○ The right to be assured, wherever possible access to a variety of goods, products
or services at competitive prices;
○ The right to be heard and to be assured that consumers' interests will receive due
consideration at appropriate fora;
○ The right to seek redressal against unfair practice or restrictive trade practices or
unscrupulous exploitations of consumers; and
○ The right to consumer awareness
● Example Question
○ One Ms. A purchases Aloe Green Tea face scrub from one e-commerce site, the
instruction for use or any special warning was not mentioned on the product nor
in the e-commerce website. A got some allergy after using the product. And the
allergy caused her mental agony.
○ Questions:
■ Whether Ms. A is considered as consumer under this Act?
■ Whether she is liable to get action under product liability?
○ Answer:
■ Yes, she is consumer under this Act, under Section 2(7). “buying goods
and hearing service includes offline or online transaction though electronic
means or by teleshopping or direct selling or multi-level marketing.
■ Section 2(22) defines harm in relation to a product labiality, includes;
● Personal injury , illness or death
● Mental agony or emotional distress attendant to personal injury or
illness or damage to the property.
■ Under section 85 liability of product service provider;
■ Under section 85(b)-there was an act of omission or commission or
negligence or conscious withholding any information which caused harm,
or
■ Section 85(c)- the service provider did not issue adequate instructions or
warnings to prevent any harm;
Cases
● Deficiency in services availed online
○ Anupama Purohit vs Makemy trip.com
■ Case dealt with Unfair trade practice by the defendant
■ In this case, an online service provider despite receiving an advance
payment failed to book one double bedroom for a consumer although it
had granted confirmation of booking. The defendant debited twice the
54
amount of the complaint by using his credit card details and password
which was used to make an online payment.
○ Spice Jet vs Ranju Aery, 2017
■ The National Commission observed that the Kolkata airport was
operational and no other flights were affected. SpiceJet’s only defence was
that the cancellation was due to technical and operational reasons, but no
details or explanation were given → hence held to be deficiency in
service.
■ In an internet booking, the contract is concluded when the booking is
accepted by sending the e-ticket which is received at the terminal from
which the booking was done. Since Ranju had done the booking from
Chandigarh, part of the cause of action had arisen in Chandigarh, so the
consumer forum at Chandigarh was entitled to adjudicate the dispute
regardless of the travel sector which was between Kolkata and New Delhi.
■ CH: consumer to initiate legal proceedings at the place from which the
booking was done online, which would usually be the place where he
resides.
● False Advertisements
○ People vs Lipsitz
■ The complaint alleged that the defendant had engaged in fraudulent and
deceptive trade practices on the Internet by using and mis-using e-mail
under various assumed names to sell magazine subscriptions that never
arrived or were only delivered for a portion of the paid subscription
period.
■ In this case, a New York court held that the defendant was subject to
personal jurisdiction and liable for violating New York consumer
protection laws, even though the defendant conducted its magazine
subscription business globally over the Internet.
■ Fraudulent business scheme involving spam emails held to violate New
York State consumer protection laws
○ Minnesota vs Granite Gate Resorts
● Horlicks Ltd. v. Zydus Wellness Products Ltd., 2020 SCC OnLine Del 873
○ The High Court passed an interim order restraining Zydus from telecasting its
advertisement comparing Complan to Horlicks on the grounds that the same was
misleading and disparaging. The Court relied on various judgments on misleading
advertisements, disparagement and law governing publication of advertisements
on television
● Dabur (India) Ltd. v. Colortek (Meghalaya) (P) Ltd., 2010 SCC OnLine Del 391
○ The protection of Article 19(1)(a) of the Constitution is available. However, if an
advertisement extends beyond the grey areas and becomes a false, misleading,
55
unfair or deceptive advertisement, it would certainly not have the benefit of any
protection.
56
○ maintain fair trade practice and not to get involved in any kind of unfair
trade practice which includes misrepresenting himself as a consumer and posting
fake reviews about a product.
○ They cannot deny their duty to take goods back while offering goods through
market place entity and cannot withdraw or discontinue services purchased or
agreed to be purchased.
○ The duty to reimburse the consideration paid by the consumers is also cast upon
the seller, if the goods or services are deficient or defective or of different quality
as compared to what was shown in images or are delivered late from the
scheduled time. However, the seller is not responsible if the late delivery is due to
unavoidable causes.
○ Seller should make a written contract with the concerned marketplace
e-commerce entity to undertake or solicit such sale or offer.
○ It is mandatory for a seller to appoint a grievance officer for consumer
grievance redressal and to make sure that the said officer acknowledges the
receipt of any consumer complaint within forty-eight hours and redresses the
complaint within one month from the date of receipt of the complaint.
○ Seller is required to ensure that the advertisement about characteristics,
access and usage conditions of the goods and services are correct and
consistent with the actual product.
○ Seller is also under an obligation to maintain transparency with the respective
e-commerce entity by providing it its legal name, principal geographic address of
its headquarters and all branches, the name and details of its website, its e-mail
address, customer care contact details such as fax, landline, and mobile numbers
and where applicable along with its GSTIN and PAN details.
○ Seller is prohibited for manipulating prices as he is now liable to provide the
e-commerce entity on its platform or website
○ Seller is required to disclose all the relevant information which is required by
the consumer to decide on purchasing a product.
● Liability of e-commerce entity - Rule 5
○ Required to provide information to consumers, relating to return, refund,
exchange, warranty and guarantee, delivery and shipment, modes of payment,
grievance redressal mechanism, payment methods, security of payment methods,
charge-back options and country of origin.
○ Acknowledge the receipt of any consumer complaint within 48 hours and redress
the complaint within one month from the date of receipt. They will also have to
appoint a grievance officer for consumer grievance redressal.
○ Sellers cannot refuse to take back goods or withdraw services or refuse refunds,if
such goods or services are defective, deficient, delivered late, or if they do not
meet the description on the platform.
57
○ The rules also prohibit the e-commerce companies from manipulating the price of
the goods or services to gain unreasonable profit through unjustified prices.
58
UNIT 6: IPR ISSUES IN E-COMMERCE
INTRODUCTION:
● Main concerns:
○ Trademark violations: Cyber Squatting, Framing, Linking, Meta Tagging
○ Copyright violations: Framing, Linking, Deep Linking
■ Exception: Fair Use Principle
○ Patents: Business Model Patents
● Cyber Squatting: refers to the unauthorized registration and use of Internet domain
names that are identical or similar to trademarks, service marks, company names, or
personal names.
● Framing: Framing is a method of splitting one window into two or more screens. A web
page can be inserted into a frame, and that portion of the screen will remain static as a
user moves through other web pages.
● Linking: "Linking" allows a Web site user to visit another location on the Internet. By
simply clicking on a "live" word or image in one Web page, the user can view another
Web page elsewhere in the world, or simply elsewhere on the same server as the original
page.
● Deep Linking: In the most simple interpretation, a deep link is any link that directs a
user past the home page of a website or app to content inside of it.
○ For example the URL fb:// may open the Facebook app, but
fb://profile/33138223345 opens Wikipedia's profile in the Facebook app.
● Meta Tags: are tags that have no visible effect on the Web page. Instead, they exist in the
source code for a Web page to assist search engines in ascertaining the content of the
page. Problems arise when companies include in their own Web sites meta tags
containing the names or descriptions of other companies.
(The above mentioned definitions and explanations can be better understood from:
https://cyber.harvard.edu/property00/metatags/main.html )
COPYRIGHTS:
● Covers works such as:
○ Literary, Artistic, Cinematographic work, Computer programs- literary,
○ Web sites- unique design then artistic, literary, trade dress
○ Musical work, Motion pictures, Sound Recordings
● Main sections:
○ S.13 - Protected works
59
○ S.13 - Meaning of Copyright
○ S.51 - Meaning of infringement
○ S.52 - Fair use Principle
○ S.65A - Protection by anti-circumvention measures
○ S.65B - Exceptions
● Copyright (Amendment) Act 2012
○ Grant of Compulsory Licenses
○ Grant of Statutory Licenses
○ Administration of Copyright Societies
○ Fair Use Provisions
○ Access to copyrighted works by the Disabled
○ Relinquishment of copyright
● K C Bokadia vs Dinesh Chandra (1999) MP
○ Registration not mandatory for protection under copyright Act
● Dhiraj Dharamdas v M/S Sonal Infosystems Pvt. Ltd. 2012 (Bom)
○ Registration under Sec 44 mandatory for remedy for infringement under Sec 51 of
Copyright Act, 1957
● Civil remedies to copyright infringement s are provided in chapter XII of Copyright Act,
1957 granting injunction and damages for copyright infringement;
● Criminal liability provisions are provided in chapter XII of Copyright Act, 1957 wherein
abetment of infringement is also unlawful and punishable with imprisonment of up to
three years and a fine up to Rs. 2 Lacs
60
■ Sec 17 (c) – who is the author of database- employer unless otherwise
agreed
○ Sec 14 (b) in the case of a computer programme,-
■ to do any of the acts specified in clause (a)
■ to sell or give on commercial rental or offer for sale or for commercial
rental any copy of the computer programme:
● Provided that such commercial rental
○ Does not apply in respect of computer programmes where the programme itself is
not the essential object of the rental.”
○ Information Technology Act, 2000
■ Sec 2 (1) (k) "computer resource" means computer, computer system,
computer network, data, computer data base or software
■ Sec 2 (1) (o) - “data”
● Technology enabled new ways of Copyright infringement
● Reproduction, Storage and Distribution
● Fair use Principle
○ USA - wider || India - narrow
○ USA Fair Use principles:
■ Purpose
■ Nature of Work
■ Amount of Work Used
■ Effect on the market and value of the work
● Liability of Intermediaries
Computer Software
● Copyright Act, 1957 grants protection to original expression and computer software is
granted protection as a copyright unless it leads to a technical effect and is not a computer
program per se;
● The computer software which has a technical effect is patentable under India Patent Act,
1970.
● Tata Consultancy Services v. State of Andhra Pradesh
○ A computer software is intellectual property, whether it is conveyed in diskettes,
floppy, magnetic tapes or CD ROMs, whether canned (Shrink-wrapped) or
uncanned (customized), whether it comes as part of computer or independently ,
whether it is branded or unbranded, tangible or intangible; is a commodity
capable of being transmitted, transferred, delivered, stored , processed , etc. and
therefore as a 'good' liable to sale tax.
61
○ The court stated that, 'it would become goods provided it has the attributes thereof
having regards to (a) its ability; (b) capable of being bought and sold; and (c)
capable of being transmitted, transferred, delivered, stored and possessed.
○ If a software whether customized or non-customized satisfies these attributes, the
same would be goods.
Computer Program
● Sec 14 (b) in the case of a computer program,-
○ to do any of the acts specified in clause 14 (a) (exclusive right over a category of
work)
○ to sell or give on commercial rental or offer for sale or for commercial rental any
copy of the computer program:
○ Provided that such commercial rental does not apply in respect of computer
programs where the program itself is not the essential object of the rental.
● Exemptions
○ Reverse engineering for building another product
■ Sega Enterprises v Accolade Inc. (1992) 9th Circuit
● the purpose and character of the use;
● the nature of the copyrighted work;
● the amount and substantiality of the portion used in relation to the
copyrighted work as a whole; and
● the effect of the use upon the market for the copyrighted work.
○ Indian law
■ Sections 52(1)(aa) to (ad) of the act lay down the mandated exceptions
with respect to computer programmes or software
○ Article 6 of the EU directive on the legal protection of computer programs
(1991)
■ deals with “decompilation” and limits the exception only to the “parts of
the original program” which are necessary in order to achieve
interoperability; not applicable in India
Protection of Database
● WIPO Copyright Treaty 1996
○ A. 5: Collection of independent works, data or other materials, arranged in a
systematic or methodical way and capable of being individually accessed by
electronic or other means
● Copyrights Act, 1957
○ Sec 2(o): database is literary work
○ Sec 17 (c): who is the author of database- employer unless otherwise agreed
62
● Information Technology Act, 2000
○ Sec 2 (1) (k): "computer resource" means computer, computer system, computer
network, data, computer data base or software
○ Sec 2 (1) (o): data―data means a representation of information, knowledge, facts,
concepts or instructions which are being prepared or have been prepared in a
formalised manner, and is intended to be processed, is being processed or has
been processed in a computer system or computer network, and may be in any
form (including computer printouts magnetic or optical storage media, punched
cards, punched tapes) or stored internally in the memory of the computer
● Originality in Database
○ V Govindan vs E M Gopalakrishna ( AIR 1955 Mad 319):
■ “common source” places the onus on the defendant to prove that they
actually went to the common source from where they borrowed,
employing their own skill, labour and brains and that they did not merely
copy.
○ Burlington Homeshopping vs Rajnish Chibber (1995) DEL:
■ Compilation is also literary work as considerable amount of time, money
and effort is spent on putting together a compilation
● Eastern Book Company vs D. B. Modak 2004
○ Unless the work has been prepared by own labour skill and there is originality and
creativity in its generation it will not have copyright
○ Compilation may not have anything original in it but it is the whole work that
should be original
○ Final work must be distinguishable from previous works
● Database and E-Commerce:
○ Burlington Home Shopping vs Rajnish Chibber (1995)
■ “Compilation of mailing addresses of customers is copyright protected as
there is devotion of work, time and resources in creating that compilation”
○ Principle relevant for e-commerce websites as well as law firms
○ Diljeet Titus vs Alfred 2006 Delhi High Court
■ Right over the client list and contact details
Infringement of Copyright
● Section 51 of the Copyright Act 1957- Infringement
● Section 52- Exceptions
● Direct Infringement- Infringement consists of the unauthorized exercise of one of the
exclusive rights of the copyright holder ;
● Contributory Infringement- participating in an activity that constitutes a copyright breach
with the knowledge of such breach
● Vicarious infringement- knowledge; control; financial benefits
63
Technology enabled copyright infringement:
● Linking- Providing a link on the website
○ In-line Linking- Enables a web page to summon different elements from diverse
pages or servers to create a new web page
○ Deep- Linking- placing a link on your site that leads to a particular page within
another site (i.e., other than its homepage)
○ Shetland Times vs Wills (1997) - Scottish law
○ Ticketmaster Corp. vs Tickets.com(2000) - US law
○ Intellectual Reserve, Inc. v. Utah Lighthouse Ministry, Inc, 75 F. Supp. 2d 1290
(D. Utah 1999)
■ A website posted infringing copies of a church's copyrighted handbook at
its site.
■ The website was ordered to remove the handbook but subsequently
provided links to other sites that contained infringing copies of the
handbook.
■ These links were different from traditional hyperlinks, because the website
knew and encouraged the use of the links to obtain unauthorized copies.
■ The linking activity constituted contributory copyright infringement
■ It is not a violation of copyright law to create a hyperlink, but it is a
violation of the law to create a link that contributes to unauthorized
copying of a copyrighted work if the linking party knew or had reason
to know of the unauthorized copying and encouraged it.
● Framing
○ Occurs when one Web site incorporates another site’s web pages into a browser
window with the first site’s own content
○ A frame is an independently controllable window on a web site through which
pages from another web site can be viewed;
○ The Washington Post Co. v. Total News (1997)
■ Total News used framing technology to hyperlink Washington post, CNN,
USA Today Etc
■ The Washington Post, CNN, and several other news companies sued a
website, Total News, which framed their news content. Under the terms of
a settlement agreement, Total News agreed to stop framing and agreed to
use text-only links.
■ "Framing" is the process of allowing a user to view the contents of one
website while it is framed by information from another site, similar to the
"picture-in-picture" feature.
■ Framing may trigger a dispute under copyright and trademark law
theories, because a framed site arguably alters the appearance of the
64
content and creates the impression that its owner endorses or voluntarily
chooses to associate with the framer.
● In-Lining
○ Perfect 10, Inc. vs. Amazon.com, Inc. (2007)
■ In-lined links to full sized reproductions are not automatically excused as
a fair use. The federal appeals court, in this case, permitted the use in-lined
links for thumbnail reproductions.
■ "In-lining" is the process of displaying a graphic file on one website that
originates at another. For example, in-lining occurs if a user at site A can,
without leaving site A, view a "cartoon of the day" featured on site B.
Fair Use:
● Users of copyrighted materials have affirmative access to protected materials and their
fair use rights are duly protected and enforced.
● Broadened the scope of statutory and compulsory licensing provisions provided in the
1957 Act
● Empowered broadcasting organisations to broadcast any prior published literary, musical
work and sound recording by just giving a prior notice to the copyright owner and paying
royalty at the rates prescribed by the Copyright Board as laid down in Section 31D of the
Amendment Act.
● Neither any positive confirmation from the copyright owner is required nor do they have
any say in determining royalty rates, making it almost an unqualified right for the
broadcasters
● India - The Delhi University Photocopy case
● Fair use in United States - Los Angeles Times vs Free Republic
● Fair Use in the Internet
○ Kelly vs Arriba- Thumbnail image as fair use
○ Perfect 10 vs Google- thumbnail as fair use
● Authors Guild v Google (2015)- snippets of copyrighted books
○ Plaintiffs, who are authors of published books under copyright, sued Google, Inc.
(Google), the defendant, for copyright infringement in the United States District
Court for the Southern District of New York.
○ Through its Library Project and its Google Books project, acting without
permission of rights holders, Google has made digital copies of tens of millions of
books, including Plaintiffs' that were submitted to it for that purpose by major
libraries.
○ Google has scanned the digital copies and established a publicly available search
function – this was alleged to constitute infringement of Plaintiffs' copyrights.
Plaintiffs sought injunctive and declaratory relief as well as damages.
65
○ Google defended on the ground that its actions constitute "fair use," which, under
17 U.S.C. § 107, is "not an infringement." The district court agreed; thus, the
plaintiffs appealed.
○ The first fair use factor's inquiry is whether and to what extent the new work
supersedes and is transformative.
○ While recognizing that a transformative use is not absolutely necessary for a
finding of fair use, the goal of copyright, to promote science and the arts, is
generally furthered by the creation of transformative works and that such works
thus lie at the heart of the fair use doctrine's guarantee.
○ A transformative use is one that communicates something new and different from
the original or expands its utility, thus serving copyright's overall objective of
contributing to public knowledge.
● USA:
○ Clause 52(1)(w) provides that the making of a three dimensional object from a
two dimensional work, such as a technical drawing for industrial application of
any purely functional part of a useful device shall not constitute infringement.
This provision should help reverse engineering of mechanical devices.
○ Clause 52(zc) has been introduced to provide that importation of literary or
artistic works such as labels, company logos or promotional or explanatory
material that is incidental to products or goods being imported shall not constitute
infringement.
○ Clause 52 (zb) protects the reproduction of protected work in a format that is
accessible by persons with disability
○ Clause 52 (1)(a) Explanation- The storing of any work in any electronic medium
for the purposes mentioned in this clause, including the incidental storage of any
computer programme which is not itself an infringing copy for the said purposes,
shall not constitute infringement of copyright.
○ Clause 52 (b)- the transient or incidental storage of a work or performance purely
in the technical process of electronic transmission or communication to the public.
○ Clause 52 (c)- transient and incidental storage of a work or performance for the
purposes of providing electronic links, access or integration, where the right
holder has not expressly prohibited such links, access or integration, shall not
constitute infringement.
○ Clause 52 (n)- storage of a digital copy of a work if the library possesses a
non-digital version of it.
Intermediary Liability:
● Sec 2 (w) of IT Act, 2000- Definition of Intermediaries
● Sec.79- Safe harbour for Intermediaries
● IT (Intermediaries Guidelines ) Rules 2011
66
● My Space vs Super Cassettes, 2016
● A&M Recordings vs Napster, 2001
● Direct Infringement- does not require intent or any particular state of mind
● Contributory
○ Liability for participation in the infringement will be established where the
defendant, “with knowledge of the infringing activity, induces, causes or
materially contributes to the infringing conduct of another."
○ A&M Recordings vs Napster, 2001
■ This was a landmark intellectual property case in which the United States
Court of Appeals for the Ninth Circuit affirmed the ruling of the United
States District Court for the Northern District of California, holding that
defendant, peer-to-peer (P2P) file sharing service Napster, could be held
liable for contributory infringement and vicarious infringement of the
plaintiffs' copyrights. This was the first major case to address the
application of copyright laws to peer-to-peer file-sharing.
● Vicarious Liability
○ A defendant is liable for vicarious liability for the actions of a primary infringer
where the defendant
■ has the right and ability to control the infringer's acts and
■ receives a direct financial benefit from the infringement.
○ Intermediaries providing incentives for posting
67
○ But, these new technological systems, and the DMCA provisions making it a
crime to bypass them, undermine individuals ability to make "fair use" of digital
information, and essentially replace the negotiation of the terms of use for those
products with unilateral terms dictated by copyright owners
● Anti Circumvention Mesaures
○ 65A. Protection of Technological Measures
■ (1) Any person who circumvents an effective technological measure
applied for the purpose of protecting any of the rights conferred by this
Act, with the intention of infringing such rights, shall be punishable with
imprisonment which may extend to two years and shall also be liable to
fine.
○ Exceptions
■ Alter the technology for purposes not prohibited by the Act
■ Conducting encryption research through legally obtained encrypted copy
■ Testing security of the computer system with the authorization of the
owner
■ During the course of identification of surveillance of users
■ National Security
○ Section 65B - Protection of Rights Management Information Any person, who
knowingly
■ removes or alters any rights management information without authority, or
■ distributes, imports for distribution, broadcasts or communicates to the
public, without authority, copies of any work, or performance knowing
that electronic rights management information has been removed or
altered without authority, shall be punishable with imprisonment which
may extend to two years and shall also be liable to fine
68
■ do not unreasonably prejudice the legitimate interests of the author.
TRADEMARKS:
● For domain name disputes, such as typosquatting and cybersquatting the proceedings are
initiated where country code top level domain (ccTLD) is registered.
● The Uniform Domain Name Dispute Resolution Policy adopted by ICANN offers
expedited administrative proceedings for trademark holders to contest "abusive
registrations of domain names". In India the same is provided by IN Dispute Resolution
Policy (INDRP) formulated by the .IN Registry.
● Function of Trademarks: Identification, Source, Quality, Advertising
● Trademark Infringement:
○ TM owner has the right to use the mark or assign others to use the mark
○ Unauthorized use of the TM amounts to infringement
○ Use of deceptively/identically similar mark is an infringement
○ Registered TM -the registered user may take action against infringement- Sec 29
○ Unregistered TM - the common law remedy of passing off is maintainable- Sec
27
○ Remedy- Sec 103, 104 and 135- TM Act, 1999
● Section 29 TMA 1999
○ A registered trade-mark is infringed by a person who, not being a registered
proprietor or a person using by way of permitted use, uses in the course of trade,
○ a mark which is identical with, or deceptively similar to,
○ the trade-mark in relation to goods or services in respect of which the trade-mark
is registered
○ and in such a manner as to render the use of the mark likely to be taken as being
used as a trade-mark.
69
○ India- National Centre for Software Technology runs the Indian Domain
Registration Service
Cybersquatting
● The registering, or using a domain name ,with mala fide intent to make profit, belonging
to someone else.
● The cyber squatter then offers to sell the domain to the person or company who owns a
trademark contained within the name at an inflated price.
● Cyber squatters ask for prices far more than that at which they purchased it.
● Other forms - Typosquatting, Pagejacking
○ Typo-squatting- URL hijacking,- radif.com, amazin.com
○ Pagejacking- contents of a well-known TM posted on another page- usually for
phishing activities
● Pitman vs Nominet (1997) EWHC
○ Two organizations held business names with "Pitman" in them and wanted to use
the domain name pitman.co.uk
○ The court held that, given that both parties had a prima facie right to use "Pitman"
in their business name, the first to register had the better interest in the domain
name.
○ On its own this case was an open invitation to domain name squatters.
● Marks and Spencer PLC v. One in a Million, 1998
○ Website name pirates
○ One in a Million were dealers in Internet domain names, specializing in
registering names identical or similar to the names of well-known companies
without their consent. Domain names including Marks & Spencer, Sainsbury’s,
Virgin, British Telecommunications and Ladbroke Group were registered by the
appellants who wrote to the various companies whose name or mark featured in
particular domain names, offering them for sale.
○ Passing off - Anybody seeing or hearing the name connects it with the business of
Marks & Spencer. So, if a person taps on his keyboard the domain name
marksandspencer.co.uk, and sees the name One in a Million Ltd, it could clearly
create a false representation constituting the common law tort passing off.
○ When a domain name is registered by another person which is deceptively similar
to a famous tm, likelihood of confusion and unfair competition may be assumed
○ Malafide intention of defendants in selling the DN at a higher price to the TM
owners which amounts to bad faith registration
○ The domain names were registered to take advantage of the distinctive character
and reputation of the marks. That is unfair and detrimental to the business
○ The mere sale of a domain name, which is confusingly similar to a registered
trademark, represents an infringement.
70
● Cybersquatting in India:
○ Remedies under the Law
○ If the mark is unregistered – passing off
○ If a registered Mark - passing off and fine/imprisonment/ confiscation/ destruction
/all as per Sec 103-105 of Trademarks Act, 1999
○ Satyam Infoway vs Sifynet solutions (2004) SC
■ First Case in SC for Domain name protection
■ Domain name is not just for communication.
■ Domain Name has all the features of a TM
■ No law for IPR in domain names so court applied the common law
principle of Passing off to hold infringement of TM
○ Arun Jaitley vs Network Solutions (2011) Del
■ Dual functions,
● The domain name does not merely remain as an address but rather
performs the function of a trade mark as the prospective customers
or other known persons visit the webpage and are able to
immediately connect with the source and identify the same with
the particular company or the individual.
○ establishing identity in the virtual world of internet.
● Domain names are protected under the law of passing off with a
personal name being no exception.
■ That the entitlement to use one’s own name stands on a higher footing
than the entitlement to use the trade mark.
■ Right to use ones own name is a personal right as against the right to use a
trade mark which is merely a commercial right.
■ Held: Trademark violation by passing off
○ Maruti Udyog v Maruti Software Pvt Ltd 2000
■ Respondent- marutionline.com- regd. With Network Solutions, Inc. (NSI)
■ Complainant- regd. Maruti under multiple, business-specific domains
■ The domain name was registered in bad faith as there was no evidence to
suggest that the respondent intended to use the domain name for legitimate
purposes.
■ Mere registration of a company under the Companies Act does not afford
any right and/or entitle the holder of the certificate of incorporation to
succeed in an action for passing off.
○ Yahoo v Akash Arora
■ This is one of the earliest and significant cyber squatting case in India. In
this case, internet search engine Yahoo (plaintiff) filed a case against a
cyber-squatter (Akash Arora & Anr.) for using the domain name
www.yahooindia.com.
71
■ The cyber-squatter was pretending to be an extension of Yahoo in India
and was offering directory services with information specific to India. The
Delhi High Court granted an injunction against the cyber-squatter and held
that trademark law applies with equal force on the Internet like the
physical world
○ Mr. Arun Jaitley vs. Network Solutions Pvt. Ltd. (2011)
■ This was the case of abusive online registration of trademarks in India.
The plaintiff (Mr. Arun Jaitley) is a prominent public figure and current
Finance Minister of India.
■ In 2011, he was the leader of opposition in Rajya Sabha and was the
member of Parliament for last 10 years. The cyber-squatter (Network
Solutions Pvt. Ltd.) registered the domain www.arunjaitley.com.
■ The plaintiff tried to buy the domain name from the cyber-squatter but the
cyber-squatter tried to sell at an exorbitant cost. Delhi High court held that
the cyber-squatter guilty for this abusive registration of domain name of a
prominent public figure and directed the domain name to be transferred to
the plaintiff. The court also held that plaintiff is also entitled to legal costs.
from the cyber-squatter.
○ Rediff Communication Ltd. vs. Cyberbooth & Anr. (1999)
■ In this case, cyber-squatter (Cyberbooth & Anr.) has registered the domain
name as www.radiff.com, which was similar to plaintiff’s domain name
(www.rediff.com).
■ Bombay High Court observed that domain names is a valuable corporate
asset, as it facilitates communication with a customer base. The court
stated that the similarity in website names can confuse the public,
particularly new customers.
○ Tata Sons vs Manu Kosuri- 2001
■ Another high-profile case involves the Tata Group, a multinational
conglomerate. The defendant registered a series of domain names
incorporating the well-known trademark “TATA”.
■ The Court, in delivering judgement, referred to Rediff Communication
Limited v Cyberbooth and Yahoo Inc. v Akash Arora & Anr., both
mentioned above, and held that internet domain names are not merely
internet addresses but are in fact corporate assets that are extremely
important and valuable and as such, are entitled for protection equivalent
to that afforded to registered trademarks.
○ Titan Industries vs Tanishq (2000)
■ Tata’s Tanishq jewellery vs. Tan-ishq, a beauty product line
■ Confusing similarity
72
■ To obtain relief under the ICANN Uniform Domain Name Dispute
Resolution Policy, Paragraph 4(a) of the Policy requires the complainant
to prove each of the following:
● that the domain name registered by the respondent is identical or
confusingly similar to a trademark or service mark in which the
complainant has rights; and
● that the respondent has no rights or legitimate interest in the
domain name; and
● that the domain name has been registered and used in bad faith.
■ Right/legitimate interest
● before any notice of this dispute, respondent used, or demonstrably
prepared to use, the domain name or a name corresponding to the
domain name in connection with a bona fide offering of goods or
services;
● respondent has been commonly known by the domain name, even
if no trademark or service mark rights have been acquired; or
● respondent is making a legitimate non commercial or fair use of
the domain name, without intent for commercial gain to
misleadingly divert customers or to tarnish the trademark at issue
■ Bad faith Registration
● Respondent registered and intends to use the name in good faith
for a body care business, without any intent to trade on
Complainant's good will
● There is no indication that Respondent registered the Domain
Name with the intent of selling it for profit.
● There is no evidence to contradict the Respondents assertion that it
registered the Domain Name for the purpose of engaging in a body
care business.
● Cybersquatting in US:
○ Anti- Cybersquatting Consumer Protection Act, 1999
○ Prohibits the act of registering , trafficking in or using a domain name that is
identical or confusingly similar to a mark or dilutive of a famous mark with bad
faith intent to profit.
○ Electronics Boutique vs. John Zuccarini (2000)
■ Electronic Boutique- retailer in video games & computer software
■ Registered websites – electronicsboutique.com & ebworld.com
■ Zuccarini- electronicboutique, electronicbotique.com, ebwold.com &
ebworl.com
■ Held, Zuccarini liable under ACPA
73
Meta Tags:
● Text coding hidden from normal view
● Located in a specially designated portion of the HTML code which generates the Web
page
● Web page designers use this hidden HTML code to designate keywords which are
communicated to search engine software
● Uses of trademarks in ways which cause search engines to improperly associate Web
pages with those trademarks have created allegations of intellectual property violations
● Deliberate use of another's trademark in the source code to throw up a web page in a
search conducted by a user for that company's goods or services
● Playboy Enterprises, Inc. v Calvin Designer Label and others, 1997, US Dist. Court
○ Playboy Inc. filed a suit before Dist. Court for preliminary injunction – Registered
Trademarks, PLAYMATE and PLAYBOY.
○ That Calvin used the said words as part of their Domain Names and embedded in
meta-tags of their websites- www.playboyxxx.com and www.playmatelive.com
○ nominative use (a type of fair use for discussing the product itself) is permitted.
○ Only so much of the mark may be used as is reasonably necessary for
identification (e.g. the words may be reasonably used but not the specific font or
logo)
○ Plaintiff pleaded- initial interest confusion
○ Observations:
■ the terms “Playboy” and “Playmate” in the metatags of the website;
■ the phrase “Playmate of the Year 1981” on the masthead of the website;
■ the phrases “Playboy Playmate of the Year 1981” and “Playmate of the
Year 1981” on various banner ads, which may be transferred to other
websites; and
■ the repeated use of the abbreviation “PMOY ′81” as the watermark on the
pages of the website
● Playboy Enterprises vs Welles, 1981
○ nominative use (a type of fair use for discussing the product itself) is permitted.
○ Only so much of the mark may be used as is reasonably necessary for
identification (e.g. the words may be reasonably used but not the specific font or
logo)
○ Plaintiff pleaded- initial interest confusion
74
■ Unfair competition
■ Dilution of trademark
■ Held: just case of passing off.
■ Defendants had repeatedly used the trademarks in a machine readable
code on its internet web pages in order to redirect all individuals and
internet search engines
75
● All the website content in the form of written material, photographs, graphics, music and
videos are protected under Copyrights.
● Databases can be protected by copyright or by sui generis database laws.
● Business Names, Logos, Product names, domain names and other signs posted on the
website are covered under Trademarks.
● Computer generated Graphic Symbols, displays, graphic user interfaces (GUIs) &
even webpages are protected under Industrial Design Law.
● Hidden Aspect of a website like (confidential graphics, source code, object code,
algorithms, algorithms, programs or other technical descriptions, data flow charts, logic
flow charts, user manuals, data structures and database contents) are protected under
Trade Law Secrets.
PATENTS
● The innate technological nature and infrastructure of e-commerce relying on computer
technologies, both hardware and software, highlights the prominence and significance of
patent system in e-business.
● Undeniably the rapid technological growth in this arena is the outcome of incentives,
provided by the patents to the researchers and innovators.
● The business intelli similar gentsia is however divided on the patenting of business
methods.
● While the proponents of the system believe that patenting leads to knowledge sharing and
offers distinctive advantage to businesses, the same practice is suspected to adversely
affect competition. It is contended that companies may exploit the system to obtain
patents for business methods that are not new and already exist in non-cyberspace.
● Nevertheless, patents have been granted to inventions pertaining to financial services,
electronic sales and advertising methods and business methods, including business
methods consisting of processes to be performed on the Internet, and telephone exchange
and billing methods.
Categories of Works
76
○ First case where business methods were considered patentable subject matter
○ Financial Services Software is Patentable
○ It must produce a “useful, concrete and tangible result.”
○ Signature Financial had obtained a patent on a "Hub and Spoke" method of
running mutual funds
○ In this method, several mutual funds (or "spokes") pool their investment assets
into a single investment portfolio (the "hub").
○ Software then determines the value of each fund based upon a percentage
ownership of each of the assets in the hub portfolio.
○ This information is tracked on a daily basis and is used to track fund share pricing
and tax accountability.
○ State Street Bank asked the court to declare this invention to be un-patentable as a
mere mathematical algorithm or as a business method
○ Held, anything that is “concrete, useful , produces values (tangible result)” in
real world is patentable
Software patents
● patents on software
● Gottschalk V Benson ( 1972)
○ held computer programs do not constitute a patentable process; abstract; vague;
unpredictable
● Diamond V Diehr (1981)
○ if the invention as a whole meets the requirements of patentability—that is, it
involves "transforming or reducing an article to a different state or thing"—it is
patent-eligible, even if it includes a software component.
● Amazon.com v Barnesandnoble.com (1999)
○ Amazon’s one click shopping
Position in EU
● According to European Patent Convention
○ Article 52 deals about patentable invention,
■ any "schemes, rules and methods for performing mental acts, playing
games or doing business, and programs for computers;" are not Patentable.
77
● Business methods are available if a process by software is concretely realized by using
hardware resources. Not "a human", but "a computer" needs to be a subject for the
operation in each step of the business method.
Position in India
● According to Indian Patent Act Sec 3, which deals with inventions which are considered
not patentable, any "mathematical method or business method or a computer program or
algorithms are not patentable".
● However, they are patentable if a new method solves a "technical" problem and an
apparatus/system is developed from it.
● Business Method Patent in India
○ Google Ads in e-mail newsletters
■ Ads based on contents published in newsletters
○ Method for determining ad spot value
■ Ads based on the requirement of the business. Eg. Nike, winzip, bookclub
● Software Patents in India
○ Software per se cannot be patented in India
○ Ericcson vs Intex 2015 (Del)
■ Anything that brings a level of technical application to the software and
therefore means that the software is not merely software, i.e. not merely
restricted to being an abstract list of commands for the computer, but gives
it a visible technical consequence, counts as a ‘technical
contribution/effect’.
TRADE SECRETS
● According to Article 39.2 of the TRIPS there are three criteria that have to be taken into
consideration;
○ The information is not, as a body or in the precise configuration and assembly of
its components, generally known among or readily accessible to persons that
normally deal with the kind of information in question;
○ The information has actual or potential commercial value because it is secret;
○ The person lawfully in control of the information has taken reasonable steps under
the circumstances to keep it a secret.
● USA : Connection with national Security- Economic Espionage Act, 1996
○ US vs Liew- Trade secret of the whitening of the cream inside Oreo
○ US vs Hanjuan Jin- Trade Secrets of Motorola
○ Exemptions- independent invention, accidental disclosure, reverse engineering
(Uniform Trade Secrets Act 1979)
78
UNIT 7 : TAXATION AND E-COMMERCE
Introduction:
● Types of Taxes:
○ Direct Tax (Income Tax) - Basis of payment is the income
○ Indirect Tax (GST, Customs) - Basis of payment is the use of resources to provide
the goods and services.
● Method of Taxation:
○ TDS - Tax deducted by the payer making the payment to the payee (eg: salary,
rent, professional fee)
○ TCS - Tax collected by the seller while selling the product to the buyer (eg: GST)
● Taxation Issues in E-Commerce:
○ Substantial amount of State revenue which is generated through direct and
indirect taxes is lost when Internet transaction remain untaxed because:
■ Permanent Establishment is often not present for e-commerce
sites/providers
■ Nature of products bought and sold- e goods/ intangible goods
79
■ Office of dependent agents contracting on behalf of business entity is
Permanent Establishment (PE)
■ Factory /office- PE only if it carries out business, ancillary work offices
not covered
■ Office of independent agents not PE
● Purposeful availment
● Fixed assets
● Targeting criteria
80
○ Galileo International and Amadeus Global Travel v Deputy CIT (2008) Del
■ Held: Non- resident companies providing computerized reservation
system are liable to be taxed in India as they receive booking fees from
Indian residents, thereby having a virtual PE
● No Permanent Establishment without servers
○ ITO vs Rights Florists Ltd. (ITT ) 2013
■ Held that payments to websites like Google and Yahoo! for online
advertisements were not liable to be taxed in India
■ The tribunal held that the websites could not be construed as permanent
establishments or as taxable presence of foreign enterprises owned and
maintained in India.
■ The web servers are located outside of India, no permanent-establishment
risk to India exists
81
TAXATION OF E-GOODS
● Only Tangible goods subject to tax
● TCS vs State of AP (2005)
○ Branded software which comprise of IPR become tangible when stored in
physical media
● CIT vs Oracle Softwares Ltd (2010)
○ Manufacturing is a process that makes articles fit for use and duplicating activity
which makes a CD fit for use is a manufacturing activity
● Scope of E-Goods:
○ Definition of Goods in India
■ Art. 366 (13) – Constitution of India
■ Sale of Goods Act, 1930- movable property except actionable claims,
money
■ Central excise and salt Tax Act, 1944- anything which can be bought and
sold
○ E-goods- goods which are bought and sold online. It is delivered onlines eg.
Softwares, e-books etc.
● Twentieth Century Finance Corporation Limited v State of Maharashtra (2000)
○ Where place of sale has not been agreed or determined through legal rules of a
statute, the place of sale will be the place where property in the goods passes to
the buyer
○ Destination based rule- places of consumption- is not applied
82
UNIT 8: JURISDICTIONAL ISSUES IN
E-COMMERCE
INTRODUCTION:
● Meaning
○ Official power to make legal decisions and judgements
○ Categories of Jurisdiction
■ Subject matter
■ Personal
■ Pecuniary
● Prerequisite for enforceable judgement of a Forum State:
○ Jurisdiction to Prescribe- apply a law on particular category of persons
■ Sec 1(2), 75 of IT Act, 2000
○ Jurisdiction to Adjudicate- Decide a dispute concerning a person/thing
○ Jurisdiction to Enforce- Enforce the judgment
■ Sec 13 CPC, Sec 44A CPC
● Theories:
○ Subjective Territoriality
■ Particular Act/ conduct committed within the boundaries of the State
■ Territory Specific
■ No extra-territorial application
■ Yahoo Inc case- banning of French Nazi Propaganda in France only
● LICRA vs Yahoo Inc and Yahoo France (2000)
○ Can mere accessibility of a website from a Forum State
suffice to exercise jurisdiction?
○ French Court assumed jurisdiction over Yahoo US which
had no physical presence in France for auction of Nazi
Memorabilia on its auction site
○ Held yahoo liable only in Yahoo France website-
interactivity
■ where a State asserts its jurisdiction over matters commencing in its
territory, even though the final event may have occurred elsewhere.
■ In this sense jurisdiction is certainly territorial; it cannot be exercised by a
State outside its territory except by virtue of a permissive rule derived
from international custom or from a convention.
○ Objective Territoriality
83
■ where a State exercises its jurisdiction over all activities that are
completed within its territory, even though some element constituting the
crime or civil wrong took place elsewhere.
■ Also Known as Effect Jurisdiction
■ Act outside the territory but effect in the Forum State
■ Effect could be direct or indirect
■ Sec 177, 178 and 179 Cr. PC
■ United States vs Thomas (1996)
● Facts: Posting of obscene content on an online bulletin board
which could be viewed only on subscription
● Held : Court has jurisdiction by applying effect test
● The Effect of the defendant’s criminal conduct reached the Western
Districts and that district was suitable for accurate fact finding
■ Playboy Enterprises, Inc. v Chuckleberry Publishing, Inc. (1996)
● Facts: Defendant operated website in Italy and offered viewership
to Customers in US
● Violated the Trademark of Plaintiff in US
● Held: US could Block access to website in US alone
● Landmark decision for cross border jurisdictional dispute on the
internet
○ Nationality
■ Defendant is a national of the Forum State
■ Sec 1 (2) and 75 of IT Act, 2000
■ Sec 3 and 4 of IPC
■ It is for each State to determine under its own law who are its nationals.
■ Any question as to whether a person possesses the nationality of a
particular State shall be determined in accordance with the law of that
State.
■ Under the garb of nationality principle, a State may exercise jurisdiction
over its own nationals irrespective of the place where the relevant acts
occurred.
■ A State may even assume extra-territorial jurisdiction.
○ Protective Principle
■ Action Taken by Forum State to secure its National Integrity
■ Hacking, money laundering etc
■ Defendant could be another person or State
■ US vs Rodriguez (1960)- False statements made in immigration
documents
■ A State relies upon this principle when its national security or a matter of
public interest is in issue.
84
■ A state has a right to protect itself from acts of international conspiracies
and terrorism, during trafficking, etc.
○ Passive Nationality
■ Based on the complainants nationality
■ Usually used with active nationality
■ Defendant should also fall within the jurisdiction
■ It extends the nationality principle to apply to any crime committed
against a national of a State, wherever that national may be.
■ It in a way provides that the citizen of one country, when he visits another
country, takes with him for his “protection” the law of his own country
and subjects those, with whom he comes into contact, to the operation of
that law.
○ Universality
■ Also know as Universal Interest Jurisdiction
■ Jurisdiction assumed by any State to prosecute an offender for acts which
are known universally by International Law as heinous crimes.
■ Cyber Crime Convention 2001- cyber criminals can be prosecuted by any
country.
■ A State has jurisdiction to define and prescribe punishment for certain
offences recognized by the community of nations as of universal concern.
It includes acts of terrorism, hijacking of aircraft, genocide, war crimes
etc.
■ A state may assert its universal jurisdiction irrespective of who committed
the act and where it occurred.
■ The perspective is broader as it was deemed necessary to uphold
international legal order by enabling any State to exercise jurisdiction in
respect of offences, which are destructive of that order.
85
■ Minimum Contacts means physical contacts or presence within Forum
State
○ Burger King Corp v Rudzewicz (1985)
■ Three Criteria for Minimum Contacts Test
● Purposeful availment of privilege of transacting business within
the Forum State
● Cause of Action arisen from the defendants activities within the
Forum State
● Exercise of jurisdiction is fair and reasonable
○ Non-resident should have continuous and systematic contact- Targeted Contact
○ Asahi Metal Industry Company Ltd. V Superior Court California (1987)
■ If defendant is aware that through his business his product may be
transferred into Forum State , it will not satisfy purposeful availment
unless he has advertised or solicited business in the Forum State
■ Awareness of business connections with a state does not establish a legal
connection;
■ Long-arm statute cannot defy the traditional notions of fairplay and
substantial justice
■ Grounds of reasonableness:
● defendant’s burden
● Forum state’s interest
● Plaintiff’s interest
● Judicial system’s interest in efficient resolution of controversies
● Furtherance of social policies
○ For the Internet:
■ CompuServe Incorporation v Patterson (1996)
● Plaintiff in Ohio, defendant in Texas
● Minimum Contact Test will apply with equal force in disputes
involving internet transactions
● Applying the Three criteria for Minimum Contact Test
○ The defendant must have purposefully availed himself of
the privilege of acting in the state
○ The legal action must have arisen from defendant's
activities there
○ The acts of the defendant or consequences of his actions
must have a sufficiently substantial connection to the state
● Effect Test
○ Calder v Jones (1984) {California v Florida}
■ In Calder, a California resident in the entertainment business sued the
National Enquirer, located in Florida, for libel based on an allegedly
86
defamatory article published by the magazine. While the article was
written and edited in Florida, the Court found that personal jurisdiction
was properly established in California because of the effects of the
defendants' conduct in that state. As the article concerned a California
resident with a career in California and relied on California sources, the
Court found the defendants' "intentional, and allegedly tortious, actions
were expressly aimed at California."
■ Applied the effect test
● Purposeful direction :
○ Intentional action
○ Expressly aimed at the forum State
○ Knowledge that the injury would be felt in the forum State
○ Panavision International v Toeppen (1998)
■ Simply registering someone else's trademark as a domain name and
posting a website on the Internet is not sufficient to subject a party
domiciled in one state to jurisdiction in another.
■ Whether the defendant's conduct had an effect in the forum state (an
effects test) would also be seen
● Sliding Scale Test
○ Test decides the level of contact of the defendant to decide jurisdiction
○ Provides a scale- level of interaction and commercial nature of the exchange of
information
○ Passive website- no personal jurisdiction
○ Intermediary websites- may have jurisdiction
○ Active websites- jurisdiction exists
○ Zippo Manufacturer v Zippo.com (1997) - ZIPPO TEST
■ Infringement of Trademark ‘Zippo’ in Pennsylvania
■ Held: there was active purposeful contacts with the Forum State as Zippo
Dot contracted with local service providers and with residents of
Pennsylvania who were its customers
■ Personal jurisdiction proportional to the nature and quality of online
commercial activity conducted.
■ A passive webpage is insufficient to establish personal jurisdiction, but an
interactive site through which a defendant conducts business with forum
residents, such as Zippo Dot Com's, is sufficient to establish personal
jurisdiction.
○ Resuscitation Technology Inc v Continental Healthcare Corporation (1997)-
Joint Venture in Indiana
■ If only one or two emails regarding few products then no interaction by
applying Zippo test
87
○ Bensusan Restaurant Corporation v King (1996)- Blue Note Jazz Club (NY vs
Missouri)
■ Only Information website so no contact
○ UEJF and LICRA vs Yahoo Inc and Yahoo France (2000)
■ Can mere accessibility of a website from a Forum State suffice to exercise
jurisdiction?
■ French Court assumed jurisdiction over Yahoo US which had no physical
presence in France for auction of Nazi Memorabilia on its auction site
■ Held yahoo liable only in Yahoo France website- interactivity
● Targeting Approach Test
○ Where the website targets a particular jurisdiction
○ People vs World Interactive gambling (1999)
■ A licensed gambling website in Antigua had customers in NY;
■ Gambling is illegal in NY; fictitious address outside NY from a resident of
NY
■ Website targeted residents of New York for illegal gambling
○ Cybersell Inc vs Cybersell Inc and others (1997) (9th circuit)
■ In this case Cybersell Florida was alleged to have infringed the mark of
Cybersell Arizona which advertised for commercial services over the
Internet.
■ Cybersell, Florida conducted no commercial activity over the Internet in
Arizona and did nothing to encourage people in Arizona to access its site
and there is no evidence that any part of its business was sought to be
achieved in Arizona.
■ There must be something more to demonstrate that the defendant directed
his activity towards the forum state.
● EU Approach-
○ Brussels Regulation 2002- that deals with principles of jurisdiction, recognition
and enforcement of judgements in civil and criminal matters. Further the liability
is based on domicile and area of residence, and this is irrespective of the
nationality of the offender
○ Rome Convention 1980- This lays down the aspect of how contractual
relationships establish liability and jurisdiction of cyber disputes and incase there
is not mention about the same, then the cases are to be adjudicated based on the
closely connected state/party principle.
JURISDICTION IN INDIA
● Based on the US model majorly.
● Sec.1 of the IT Act- deals with prescriptive jurisdiction along with following the
88
● universality principle.
● There is territorial and extra territorial jurisdiction that it applicable as well.
● S1. and S.75 are interrelated- this deals with the intermediary liability
● Sec 20 CPC- place of business/residence of D, where cause of action arose
(wholly/partly)
● Rajasthan High Court Advocates’ Association v Union of India (2001 SC)- cause of
action
● Other principles include- Long arm Statute rule, effect test, sliding scale test
● Major drawbacks are that India is not a signatory to the Budapest convention,
● along with lacking extradition provisions.
● Personal Jurisdiction in India
○ Principle of autonomy- parties free to decide
○ Jurisdiction in more than one court- Parties free to choose
○ Conflict of jurisdiction- plaintiff decides based on convenience unless excluded
by law, violation of due process of law or against public policy
● Principle of autonomy- parties free to decide
○ British India Steam Navigation v Shanmugha (1990)SC
■ The jurisdiction of the court may be decided upon the parties themselves
on the basis of various connecting factors
■ Parties should be bound by the jurisdiction clause to which they have
agreed unless there is some strong reason to the contrary.
○ NTPC v Singer Company (1992) SC
■ Indian Company contracted with foreign company
■ As per terms, laws of India and jurisdiction of courts in Delhi
■ Held dispute to be decided by courts in Delhi alone
■ The place where the contract was made, the form and object of the
contract, the place of performance, the place of residence or business of
the parties, reference to the courts having jurisdiction and such other links
are examined by the courts to determine the system of law with which
the transaction has its closest and most real connection.
● Modi Entertainment Network v WSG Cricket Ltd (2003)
○ In case where no jurisdiction exists, the parties cannot confer jurisdiction by
expressly choosing a court of a different jurisdiction
○ Connection between parties, selected forum for dispute resolution and clause must
be reasonable
● Provisions of law governing jurisdiction in India:
○ Sec 134 of Tm Act, 1999- place of residence/ work of plaintiff
○ Sec 1(2) read with Sec 75 Information Technology Act, 2000
○ Sec 20 CPC- place of business/residence of D, where cause of action arose
(wholly/partly)
89
○ Rajasthan High Court Advocates’ Association v Union of India (2001 SC)-
cause of action
● Zippo Test in India:
○ Casio India Company Limited v Ashita Tele Systems Private Limited (2003)
■ Accessing of website attracts territorial jurisdiction
■ Defendant operating from Bombay; registered domain name
casioindia.com
■ Held: the Delhi court had jurisdiction
○ India TV, Independent News Service Pvt. Ltd v India Broadcasting Live, LLC
(2007)
■ Application of Zippo test
■ When website allows subscription to access information – interactive to
attract jurisdiction
■ The defendant operating from Arizona had registered the domain name
www.indiatvlive.com
■ Held: Delhi court had no jurisdiction
○ The defendant must purposefully avail himself of acting in the forum state or
causing a consequence in the forum state
○ The cause of action must arise from the defendants activities there
○ The acts of the defendant or consequences caused by the defendant must have a
substantial enough connection with the forum to make exercise of jurisdiction
over the defendant reasonable.
○ Renaissance Hotel Holdings Inc. v B. Vihaya Sai (2009)
■ Online booking from Delhi for a Hotel in Bangalore which violated Tm of
a hospitality company in US
■ Held: No jurisdiction with Delhi Courts as room bookings are made in US
or Bangalore
● Target Test in India:
○ Banayan Tree Holdings (Pvt.) Ltd v Murali Krishnan Reddy (2009)
■ Held: In passing off and infringement case where defendant is out of State
and no long arm statute exists, the plaintiff will be required to prove …
Targeting of customers in the forum State
■ Mere hosting of an interactive website without targeting will not suffice
■ A mere hosting of a website accessible in the forum state, or a posting of
an advertisement or a passive website that does not result in a commercial
transaction with a viewer in the forum state, cannot give rise to a cause of
action and therefore the court does not have jurisdiction.
■ Clarified the disparity that had arisen from the two judgements before.
90
■ “A passive website, with no intention to specifically target audiences
outside the State where the host of the website is located, cannot vest the
forum court with jurisdiction. ”
■ “It is not enough merely to show that the website hosted by the Defendant
is an interactive one. It would have to be shown that the nature of the
activity indulged in by the Defendant by the use of the website was with
an intention to conclude a commercial transaction with the website user.”
○ Super Cassettes Industries Ltd v Myspace Inc 2011
■ Sec 62 of Indian Copyright Act, 1957
■ Suit to be filed at the place where the plaintiff carries on business/ works
for gain
■ Sec 20 CPC also applicable
■ Downloading- in India so cause of action in India
■ Uploading- transfer of work without the authority of P in India
■ Banayan Tree case not applicable as Cr infringement are governed by
special law.
○ WWE Inc vs Reshma Collections (2014)
■ Case for infringement of Trademarks and Copyrights
■ A in US, R in Mumbai
■ Whether Delhi courts have jurisdiction
■ Held: Programs screened in Delhi too, sale transaction concluded in Delhi
so plaintiff carries on business in Delhi
CLICKWRAP AGREEMENTS
● No cases in India regarding jurisdictional issue in click-wrap agreements
● Indian Contract Act applies unless:
○ Contrary to Sec-23 – public policy
● Burdensome to plaintiff- cases for small claims
● Test for Enforcement
○ Bremen v Zapata (1970)
■ Two kinds of clauses
● Reference might be to a particular court in a jurisdiction agreed
upon by the parties
● Clause might refer to a specific kind of dispute resolution process
○ If there is an express selection, this choice will be respected so long as it is made
bona fide, i.e. the subjective intention prevails unless the purpose is to:
■ evade the operation of some mandatory provisions of a relevant law,
■ there was an element of fraud or duress or undue influence involved in the
signing of the contract, or
91
■ there was some other evidence of mala fides
○ There are many reasons why parties may select a forum
■ the forum has established significant expertise in the relevant areas of law,
e.g. shipping, charter parties, carriage by air, etc.;
■ the standard of judicial decision making may be high:
■ there may be no corruption or other outside influence to affect the fairness
of the judgments;
■ the procedures may be efficient and minimize losses arising through any
delay in arriving at a judgment;
■ all the major witnesses may be resident within the jurisdiction making the
forum convenient
92
■ Art. 5 – B to C transaction clauses cannot take away rights and protection
of the consumer under the law of their residential State.
93