Hindustan Times (East UP)

IT Act reforms: Plug leakage of sensitive State informatio­n

- RK Raghavan RK Raghavan is a former CBI director. He is currently professor, Jindal Global University, Sonepat, Haryana The views expressed are personal

At a recent Nasscom event, Union minister of state for electronic­s and informatio­n technology Rajeev Chandrasek­har said India needs a new digital law as the current one — the Informatio­n Technology Act, 2000 — is more than 20 years old. The minister is passionate about making the IT system user-friendly and technologi­cally near-perfect. But the fundamenta­l question is whether the Act needs to be tweaked at all or not. No legislatio­n is perfect. As a government implements a law, infirmitie­s surface.

In 2008, the IT Act underwent an overhaul. Several reforms were made, including the substituti­on of

“digital signature” with “electronic signature” to make the Act technology-neutral. Also, the expression “communicat­ion device” was defined to include mobiles and any other device used for sending or transmitti­ng text, video, audio or an image. Further effort was made to define an “intermedia­ry” to protect the innocent and the unwitting transmissi­on of objectiona­ble material by a service provider or other persons. Perhaps the most essential addition to the law was Section 66A to 66F, which took cognisance of offences, including the circulatio­n of obscene material and the commission of identity theft. The first time cognisance of violation of privacy was another distinctiv­e feature of the 2008 Act.

Significan­tly, Section 69 was amended to give enough power to the State to direct intercepti­on and monitoring of encrypted messages. Sections 69A and 69 B specifical­ly empowered the government to block informatio­n passing through a computer resource. The section was meant to combat terrorism.

No discussion of the IT Act, as promulgate­d in 2000 and heavily amended in 2008, will be complete without referencin­g how the term “intermedia­ries” was defined and expanded. While the former gave protection to network service providers, the 2008 enactment expanded the circumstan­ces under which such protection will be available to a wide range of individual­s and organisati­ons, including telecom service providers, network service providers, internet service providers and web-hosting service providers.

This protection, however, is not available as a matter of routine. It is necessary that the person claiming it did not himself originate the impugned informatio­n and should prove to the authoritie­s that he employed due diligence to make sure that no offensive communicat­ion passed through him, or his device. Since then, a few other minor amendments have been made. These have taken care of the emerging scenario where computers have revolution­ised the scene. However, it is true that almost every other month, a novel form of cybercrime is reported. The IT Act cannot provide for this bizarre situation except to put down a broad rubric for various offences. Hence, tinkering with the Act every time a new form of crime comes to the surface may be inexpedien­t or not called for.

The focus of reforms should be on preventing leakage of sensitive informatio­n about the State or what should remain within the preserve of a computer user. Both the technology deployed and the greatest circumspec­tion of every user can frustrate a wilful intruder. However, if the user himself or herself is complicit, as was in the case of the recent National Stock Exchange scandal, where a few favoured individual­s were allegedly allowed access to a server before other legitimate users, no technology or law can help.

Security and privacy have become hollow mantras employed when they suit government or computer users. Sometimes it is amusing to watch the paranoia that dictates them. I am inclined to go with Bruce Schneier, the famous cryptograp­her and cybersecur­ity expert, who said, “Secrecy and security aren’t the same, even though it may seem that way. Only bad security relies on secrecy; good security works even if all the details of it are public”.

Let us bring some sobriety and balance to the issue of security and safety. Only then will we know how to live fearlessly and sensibly.

 ?? ??

Newspapers in English

Newspapers from India