cyber smearing

Upload: deven-rana

Post on 07-Jul-2018

234 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/18/2019 Cyber Smearing

    1/6

    Deven Rana A-10

    Accessibility, anonymity, privacy, seclusion of one's own space, and the interactive, responsive

    nature of communications on the internet, has made the users far less inhibited than before

    especially about the contents of their messages. There is no dearth of Soniya Gandhi!anmohan

    Singh "o#es and cartoons coming as your regular $aceboo# updates. The internet has made it far easier than ever before to disseminate defamatory statements to a worldwide audience with

    impunity. %ow, on the internet everyone can be a publisher as well as a victim of defamatory

     publication.

    A defamatory allegation need only be disclosed to one person for publication to be proved. Since

    a publication on internet can be circulated to literally countless number of people, every time an

    email is forwarded to another person or defamatory content is shared on $aceboo#, it is

     published again and again creating further cause of action. This has led to cyber space becoming

    a highly prone area for defamation and smearing. %o doubt a &ohn Doe always lur#s around in

    the cyber space. n this section of the assignment we will cover the various forms of (yber smearing, the legal provisions on cyber defamation and liabilities of internet service providers or 

    intermediaries in the light of some of the most landmar# "udgments on this issue.

    Forms of Cyber Smearing:

    (yber smear is essentially same as defamation, e)cept that the alleged defamatory material is

     posted on the nternet. Defamation may also be referred to as libel, slander, disparagement,

    defamation of character, etc.. Defamation in the nternet can be classified as libel in view of that

    material communicated on the nternet is published e.g. bulletin boards, emails, chat rooms etc.

    The tort of cyber smearing is considered to be the act of defaming, insulting, offending or 

    otherwise causing harm through false statements pertaining to an individual in cyberspace. This

    is commonly done through the nternet via websites, blogs, forums, emails and instant

    messaging, chat rooms and now in the social networ#ing sphere. Smearing law in general

    describes the tort as *the issuance of a false statement about another person, which causes that

     person to suffer harm+ -arson where libel is the written form and slander is spo#en. -ibel is

    typically the form addressed with cyber smearing because the nternet essentially receives the

    same protections as print and published media.

    The other elements applied to smearing include/

    • The unprivileged publication of the statement to a third party

  • 8/18/2019 Cyber Smearing

    2/6

    Deven Rana A-10

    • f the defamatory matter is of public concern, fault amounts at least to negligence on the

     part of the publisher 

    • 0erceivable damage to the plaintiff 

    Along with the core elements of smearing, the burden of proof is placed on the plaintiff in a case,

    damages are usually awarded monetarily and in the 1nited States, truth is an *absolute defense+

    1nder the common law, there are four main defenses to defamation. These are/ 2 "ustification3

    4 consent to the publication3 5 fair comment3 6 absolute and 7ualified privilege3 and 8

    innocent dissemination.

    (yber or online smearing is considered to be as, if not more harmful than smearing in the form

    of libel and slander in the bric# and mortar, physical world. n some cases, the effects of online

    smearing could be e)ponentially worse than an offline incident due to the global nature of the

    nternet and the fact that the statements can be accessed by virtually anyone. n addition to this,

    the issue of anonymity online raises even more concern when dealing with smearing because the

    author or origin of the statements may be very difficult to trace depending on the medium.

    (yber smear is still a developing area of cyber law, clear precedents have not yet been set. 9ne

    of the most important issues in cyber libel is whether S0s, operators of bulletin boards or 

    website owners are common carriers, distributors or publishers. Tension e)ists between the right

    to free speech and the legal duty to protect people being defamed because of the increasing ease

    and potential harm in the face of nternet publication.

    The ndian 0enal (ode defines Defamation as :;hoever, by words either spo#en or intended to

     be read, or by signs or by visible representations, ma#es or publishes any imputation concerningany person intending to harm, or #nowing or having reason to believe that such imputation will

    harm, the reputation of such person, is said, e)cept in the cases hereinafter e)pected, to defame

    that person:2. (yber Defamation, also #nown as nternet Defamation or 9nline Defamation, is

    defamation in the world of nternet and its users.

     (yber Defamation is amongst one of the various (yber (rimes that can ta#e place. (yber 

    crimes are neither bound by time nor by national boundaries i.e. a person sitting in one corner of 

    the world, can at any time easily cause damage to a person sitting in another corner of the world

    within a few minutes. (yber Defamation in (orporate ;orld can ta#e place in various forms for 

    e)ample a disgruntled employee of a (ompany may post some defamatory remar#s about the

    (ompany on a popular blog site or may send some slanderous email, defaming the company or 

    any of its important managerial personnel, to the clients of the company across the globe3 a

    competitor may divert the client and

  • 8/18/2019 Cyber Smearing

    3/6

    Deven Rana A-10

    (ompany in a very short span of time owning to a worldwide accessibility of internet and its

    ever increasing number of users.

    LAWS APPLICABLE IN INDIA IN CASES OF CYBE DEFA!A"ION

    n ndia (yber Defamation results in (ivil as well as (riminal proceedings against the accused.

    Some the Acts and rules that deals with (yber Defamation are The ndian 0enal (ode, 2=>?, The

    nformation Technology Act, 4???, The (ode of (riminal 0rocedure, 2=@5 and The ndian

    vidence Act, 2B@4. The (harging Act for prevention of (yber (rimes in ndia is the

    nformation Technology Act, 4???. Section >>A of the nformation Technology Act, 4???

     provides punishment for online Defamation. Section >>A can be read as follows

    >A. 0unishment for sending offensive messages through communication service, etc..

    Any person who sends, by means of a computer resource or a communication device,

    a any information that is grossly offensive or has menacing character3 or 

    b any information which he #nows to be false, but for the purpose of causing annoyance,

    inconvenience, danger, obstruction, insult, in"ury, criminal intimidation, enmity, hatred, or ill

    will, persistently ma#es by ma#ing use of such computer resource or a communication device3

    c any electronic mail or electronic mail message for the purpose of causing annoyance or 

    inconvenience or to deceive or to mislead the addressee or recipient about the origin of such

    messages,

    shall be punishable with imprisonment for a term which may e)tend to tthree years and with fine.

    )planation/ $or the purposes of this section, terms :lectronic mail: and :lectronic !ail

    !essage: means a message or information created or transmitted or received on a computer,

    computer system, computer resource or communication device including attachments in te)t,

    image, audio, video and any other electronic record, which may be transmitted with the message.

    Section >8A and Section >8C of The ndian vidence Act, 2B@4 provides for Admissibility of 

    electronic records as evidence. Some of the sections of ndian 0enal (ode, 2=>? that deal with

    (yber defamation are Section 6==, 8?? and 8?5.

  • 8/18/2019 Cyber Smearing

    4/6

    Deven Rana A-10

    Se#$ion %%A of Informa$ion "e#&no'ogy A#$( )000

    n ndia, a person can be liable for defamation both under civil and criminal law. Section 6== of 

    the ndian 0enal (ode which deals with defamation when e)panded also covers the cases of 

    cyber defamation. owever, with the new amendment in the nformation Technology Act, 4???,

    ndia now has e)press provision on (yber Defamation.

    *Any person who sends, by means of a computer resource or a communication device,

    a Any information that is grossly offensive or has menacing character3 or 

    b Any information which he #nows to be false, but for the purpose of causing annoyance,

    inconvenience, danger, obstruction, insult, in"ury, criminal intimidation, enmity, hatred, or ill

    will, persistently ma#es by ma#ing use of such computer resource or a communication device,

    c Any electronic mail or electronic mail message for the purpose of causing annoyance or 

    inconvenience or to deceive or to mislead the addressee or recipient about the origin of such

    messages shall be punishable with imprisonment for a term which may e)tend to three years and

    with fine.+

    LIABILI"Y OF ISPS * IN"E!EDIAY IN INDIA

    Section @= of nformation Technology Act, 4???

    As per Section @= of the T Act, S0s are not liable for any third party information, data, or 

    communication lin# made available or hosted by them so long as

    2. Their function is limited to only providing access to communication system3

    4. They do not

    a nitiate transmission3

     b Select the receiver of the transmission, and

     c Select or modify the information contained in the transmission

  • 8/18/2019 Cyber Smearing

    5/6

    Deven Rana A-10

    5. They e)ercise due diligence in their duties and adhere to any guidelines which may be

     prescribed

    owever, S0s can be held liable in the following situations

    2. f they have conspired, abetted or induced in the unlawful act,

    4. f, they fail to e)peditiously remove or disable access to any information, data or 

    communication lin# upon receiving the #nowledge or on being notified by appropriate

    Government agency that such information, data or communication lin# is being used to

    commit unlawful act withoutinterfering with the evidence3 

    As a curious deviation from the position of law in commonwealth countries, the T Act, 4???

     bears a certain degree of similarity with the laws in the 1nited States in cases of cyber 

    defamation. Though the new amendment does not shift the burden of proof from defendant to

     plaintiff, it definitely ma#es it easier for the defendants to prove their innocence in the event they

    have acted bona fide and complied with the obligations under Section @= of the Act and Rule 5 of 

    the T Rules, 4?22. owever, although S0's are theoretically not liable for posting and

    transmitting defamatory information, they are nevertheless fre7uently "oined as defendants in

    defamation lawsuits because of their deeper poc#et. The 7uestion that ne)t comes up is the e)tent

    of involvement of S0s in publication of defamatory content. n this conte)t, it is important to

    understand and appreciate the difference between primary publisher and secondary publisher.

    The 1. E. Defamation Act 2==> defines a primary publisher as F *a person whose business is

    issuing material to the public and who issues the material in the course of that business and those

    who are only involved in processing, ma#ing copies, distributing or selling any electronic

    medium in which the statement is recorded are defined as secondary publishers.+ A secondary

     publisher can thus escape liability for handling third party defamatory material if it is able to

     prove that a it was merely acting as a conduit3 b it e)ercised due diligence and, c it was not

    aware of the defamatory nature of such material and immediately removed the content onceinformed or notified by appropriate Government agency. Therefore, S0s in certain cases may act

    as primary as well as secondary publishers. f the S0s e)ercise editorial control over messages

     posted on bulletin boards, use Coard -eaders to enforce the content guidelines or provide them

    with an emergency delete function to control content there is great li#elihood that they may end

    up being treated as a primary publisher 

  • 8/18/2019 Cyber Smearing

    6/6

    Deven Rana A-10