Wednesday, March 4, 2009

Cyber Cafes, India

Blogger News Network
Cyber Cafes in India now come under strict Regulations
Posted on January 6th, 2009
by naavi in All News, India News
Read 820 times.
In the past several years, there have been many instances in India where Cyber Cafes have been used either for real or false terrorist communication. Several Cyber Crimes including stealing of bank passwords and subsequent fraudulent withdrawal of money have also happened through Cyber Cafes. Cyber Cafes have also been used regularly for sending of obscene mails to harass people. In view of these, Cyber Cafes have been considered as one of the key intermediaries which need to be regulated.
In order to regulate Cyber Cafes, several States had passed regulations some under ITA 2000 and some under the State Police Act. Now, The Information Technology Amendment Act 2008 has made many significant changes in the prevailing laws of cyber space applicable in India, one of which is regarding Cyber Cafes.
ITA 2000 had not defined Cyber Cafes and one had to interpret them as “Network Service Providers” referred to under the erstwhile Section 79 which imposed on them a responsibility for “Due Diligence” failing which they would be liable for the offences committed in their network. The concept of “Due Diligence” was interpreted from the various provisions in Cyber Cafe regulations where available or under the normal responsibilities expected from network service providers.
The New Act (To be effective after notification) after amendments which we refer as ITA 2008 has however provided a specific definition for the term “Cyber Cafe” and also included them under the term “Intermediaries”. Several aspects of the act therefore become applicable to Cyber Cafes and there is a need to take a fresh look at what Cyber Cafes are expected to do for Cyber Law Compliance.
Firstly, according to Section 2(na) of ITA 2008, “Cyber cafe” means any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public. This definition is an improvement of what was earlier proposed by the Expert Committee and the first draft of ITAA 2006 which had several anomalies.
This definition may however conflict with the definitions given under the current regulations passed by various States. For example, the Karnataka regulations for Cyber Cafes define a Cyber Cafe as: “Any premises where the Cyber Cafe Owner/Network Service Provider provides the computer services including internet access to the public”.
According to TN regulations, a “Browsing Center” means and includes “any establishment by what so ever name called where the general public have an access to Internet in any of its forms, protocols either on payment or free of charges for any purpose including recreation or amusement” It also says..” a browsing center shall be deemed to be a public place as defined under Sec-3 of Tamil Nadu City Police 1888″.
In the Karnataka definition, any “Network Service Provider” providing “Computer Services” may be called the “Cyber Cafe”. In the TN definition, any Kiosks in say Airport or a Railway Station where free Internet access is given to public may also qualify as a Cyber Cafe. The TN rules require registration of Cyber Cafes and both impose responsibilities such as maintenance of visitor’s register, verification of photo ID etc.
The Karnataka regulation was notified under Section 90 of ITA 2000 while the TN act was notified under the State police act. Now that ITA 2000 has been amended, the provisions under Karnataka Cyber Cafe regulation may have to be considered as in fructuous while there may a question mark on the validity of TN regulations. Mumbai, Maharashtra and Gujarat who also have some state level regulations may also be in a state similar to that of TN.
Section 2(w) of ITA 2008 further states that the definition of “Intermediaries” includes “Cyber Cafes”. The regulations for Intermediaries therefore apply to Cyber Cafes after ITA 2008 becomes effective.
As per Section 67(C) of ITA 2008, an Intermediary is expected to preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe and on failure to do so he may be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.
Thus the responsibility of Cyber Cafes has now been clearly defined with a three year imprisonment which is also cognizable, bailable and compoundable.
Additionally, three important sections have been added to the present Act according to which the Government has the powers to intercept, monitor, block, and collect traffic data. These sections impose certain responsibilities on the intermediaries and make non compliance punishable. These regulations also apply to Cyber Cafes.
For example, under Section 69 (modified version), the central Government or a State Government or any of its officer specially authorized by the Central Government or the State Government, as the case may be, direct any agency of the appropriate Government to intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any information transmitted received or stored through any computer resource. The Procedure and safeguards subject to which such interception or monitoring or decryption may be carried out, will be prescribed and if the intermediary fails to assist the agency, he may be punished with an imprisonment for a term which may extend to seven years and shall also be liable to fine.
The important points to be noted in this section as well as the two other sections 69A and 69 B are
a) These powers are available to both the Central and State Governments who can specially authorize an officer for the purpose.
b) It can be invoked even for preventing incitement to the commission of any cognizable offence. It is debatable whether the term “Cognizable offence” has to be restricted to ITA 2008 only or can be extended to IPC or other laws as well.
c) Government shall prescribe necessary safeguards to be followed by Intermediaries.
d) The powers include demanding of information stored in a computer e) Non compliance may result in stiff penalty of imprisonment upto 7 years.
Under Section 69 A, the Central Government or any of its officer specially authorized by it in this behalf may direct any agency of the Government or intermediary to block access by the public. The intermediary who fails to comply with the direction issued under sub-section (1) shall be punished with an imprisonment for a term which may extend to seven years and also be liable to fine. This section provides for blocking of websites in any case where prevention of a cognizable offence. This can take care of blocking of websites which may host pornographic content which is an offence under sections 67, 67A and 67 B of ITA 2008.
Under Section 69 B, the Government now will have powers to collect “Traffic data” and also seek online access to information in the hands of an intermediary. The Intermediary who intentionally or knowingly contravenes the provisions may be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.
Under this section, Government can force Cyber Cafes to follow safeguards specified and also demand online access if required.
The sections 69, 69A and 69B specifically vest the powers in an agency to be designated. It has deliberately avoided the use of the term “Police”. The legislative intent is therefore indicative that Police need not be the agency to exercise the powers under these sections.
There is of course a serious concern in the public that the powers under these sections may be misused. Naavi.org has been suggesting that we need to set up an agency called “Netizen’s Rights Commission” on the lines of the Human Rights Commission which can have the powers to receive the complaints, investigate and recommend prosecution of abuse of the powers under the sections 69,69A and 69B.
In the event any State Government would like to assume powers under these sections and also provide the benefits of the powers to the Police, it would be advisable for the State Government to set up a “State Netizen’s Rights Commission” and subject the Police to the scrutiny of the commission or set up a separate non-police agency such as a “State Cyber Security Authority” and then vest the powers in such an authority.
In the meantime, if the Central Government also notifies an agency for the purpose of exercising the authority under Sections 69, 69A and 69B and provides it with pan national jurisdiction, then there may be a conflict of jurisdiction such as what we today have between the State Police and the CBI.
There is an expectation that the Indian Computer Emergency Team referred to under Section 70 B of ITA2008 may itself be designated as the agency of the Central Government with a national jurisdiction and CERT-In the present division of MCIT may itself be stepping into the shoes of the Indian Computer Emergency Team.
Considering that there are thousands of Cyber Cafes all over India, in the event a Central agency takes up the responsibility for monitoring Cyber Cafes, there may be a need for an “All India Cyber Cafe Monitoring Authority” exclusively to meet the requirements of Cyber Cafe regulations. [More details on the amendments is available at http://www.naavi.org/)
Naavi
Let Others Know About This Post These icons link to social bookmarking sites where readers can share and discover new web pages.


FAQs

Security guard
Private factory guard
A security guard, (or security officer) is usually a privately and formally employed person who is paid to protect property, assets, or people.
Often, security officers are uniformed and act to protect property by maintaining a high visibility presence to deter illegal and inappropriate actions, observing (either directly, through patrols, or by watching alarm systems or video cameras) for signs of crime, fire or disorder; then taking action and reporting any incidents to their client and emergency services as appropriate.
Since at least the Middle Ages in Europe, the term watchman was more commonly applied to this function. This term was carried over to North America where it was interchangeable with night-watchman until both terms were replaced with the modern security-based titles.
Contents[hide]
1 Functions and duties
2 Personnel
2.1 Types of security personnel and companies
3 Licensing and regulation
3.1 United States
3.2 Europe
3.3 Canada
3.4 Malaysia
3.5 Hong Kong
3.5.1 Legislation
3.5.2 Qualify
3.5.3 Permit
3.5.4 Power of Arrest
3.5.5 Miscellaneous
4 Security officers and the police
5 Criticisms
6 Trends
7 History
8 Notable security guards
9 Unionization
10 See also
11 References
12 External links
//

[edit] Functions and duties
Many security firms and proprietary security departments practice the "detect, deter, observe and report" methodology. Security officers are not required to make arrests (but have the authority to make a citizen's arrest) or otherwise act as an agent of law enforcement at the request of a police officer, sheriff, and others.
In addition to the methodology mentioned above, a private security officer's primary duty is the prevention and deterrence of crime. Security personnel enforce company rules and can act to protect lives and property. In fact, they frequently have a contractual obligation to provide these actions. Security officers are often trained to perform arrest and control procedures (including handcuffing and restraints), operate emergency equipment, perform first aid, CPR, take accurate notes, write detailed reports, and perform other tasks as required by the contractee they are serving.
Many security officers are required to go through additional training mandated by the state for the carrying of weapons such as batons, firearms, and pepper spray (e.g. the Bureau of Security and Investigative Services[1] in California has requirements that a license for each item listed must be carried while on duty). [1] Some officers are required to complete police certification for special duties.
Positions are also set to grow in the U.S., with 350,000 new security jobs expected over the next decade.[2] In recent years, due to elevated threats of terrorism, most security officers are required to have bomb-threat training and/or emergency crisis training, especially those located in soft target areas such as shopping malls, schools, and any other area where the general public congregate.
One major economic justification for security personnel is that insurance companies (particularly fire insurance carriers) will give substantial rate discounts to sites which have a 24-hour presence; for a high risk or high value venue, the discount can often exceed the money being spent on its security program.
This is because having security on site increases the odds that any fire will be noticed and reported to the local fire department before a total loss occurs. Also, the presence of security personnel (particularly in combination with effective security procedures) tends to diminish "shrinkage," theft, employee misconduct and safety rule violations, property damage, or even sabotage. Many casinos hire security guards to protect money when transferring it from the casino to the casino's bank.
Security personnel may also perform access control at building entrances and vehicle gates; meaning, they ensure that employees and visitors display proper passes or identification before entering the facility. Security officers are often called upon to respond to minor emergencies (lost persons, lockouts, dead vehicle batteries, etc.) and to assist in serious emergencies by guiding emergency responders to the scene of the incident, helping to redirect foot traffic to safe locations, and by documenting what happened on an incident report.
Armed security officers are frequently contracted to respond as law enforcement until a given situation at a client location is under control and/or public authorities arrive on the scene.
Patrolling is usually a large part of a security officer's duties. Often these patrols are logged by use of a guard tour patrol system, which require regular patrols. The most commonly used form used to be mechanical clock systems that required a key for manual punching of a number to a strip of paper inside with the time pre-printed on it.
Recently, electronic systems have risen in popularity due to their light weight, ease of use, and downloadable logging capabilities [3]. Regular patrols are, however, becoming less accepted as an industry standard, as it provides predictability for the would-be criminal, as well as monotony for the security officer on duty.
Random patrols are easily programmed into these systems, allowing greater freedom of movement and unpredictability. Global positioning systems are also easing their way into the market as a more effective means of tracking officer movement and patrol behavior.

[edit] Personnel