information technology act - ca perspective

80
Information Technology Act - CA perspective CA A.Rafeq, FCA, CISA, CIA, CGEIT Managing Director, Wincer Infotech Limited Bangalore, 25 th Jan. 2012 1

Upload: others

Post on 04-Jan-2022

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Information Technology Act - CA perspective

Information Technology Act - CA perspective

CA A.Rafeq, FCA, CISA, CIA, CGEIT

Managing Director, Wincer Infotech Limited

Bangalore, 25th Jan. 2012

1

Page 2: Information Technology Act - CA perspective

Agenda

1. Need for Chartered

Accountants to embrace IT

2. Overview of IT Act 2000 and IT

Act 2008

3. Impact of IT Act on

Government, Enterprises and

Individuals – some case studies

4. Impact and opportunities for

Chartered Accountants

– IT Act

2

Page 3: Information Technology Act - CA perspective

1. Need for Chartered Accountants to embrace IT

3

Page 4: Information Technology Act - CA perspective

Technology: key enabler of business change

• Value does not come miraculously from technology

• Technology only provides a capability

• Value is only realized when this capability is applied and managed as part of comprehensive program of business change.

• Evolved from automation through information to transformation, extent and complexity of business change has grown dramatically, and includes: – Business strategy – Business processes – How people work – Organizational structure and – Technology

4

Page 5: Information Technology Act - CA perspective

Industrial revolution to Knowledge revolution

• Industrial revolution to the Knowledge revolution – Pervasive IT

• Role of IT in the evolving knowledge society is comparable to that of the railroad during the Industrial Revolution.

• Amount of private and enterprise data stored on computers is doubling every 12 to 18 months.

• Mobile computing gives users the freedom to roam, with access to data and services at any time and in any place.

• IT is becoming a primary driver of business growth and is expected to make a greater contribution to success of enterprises.

• Investment in IT is being made as it impacts business performance. • Technology continues to be the one key driver of business growth

worldwide, with IT spends continuing to see an annual rise for the foreseeable future – TCS Annual Report 2010-2011.

5

Page 6: Information Technology Act - CA perspective

Future of IT

• A Dutch start up, Sparked • is using wireless sensors on cattle so that when one is sick or

pregnant, it sends a message to the farmer. • Each cow transmits 200 MB of data per year. • We can monitor ourselves this way too. • Using a wireless cardiac monitor your physician can check for health

risks. • And this is just the beginning of embedded IT.

6

Page 7: Information Technology Act - CA perspective

7

Page 8: Information Technology Act - CA perspective

8

Page 10: Information Technology Act - CA perspective

Cloud computing

Global Scenario: • Cloud services revenue to touch $149 billion in 2014. $55 billion

forecasted worldwide revenue from public IT cloud services alone.

• Cloud services cost less than traditional outsourced services, with savings ranging from 20% to 50% depending on the type of service offered.

• 30% the rate at which cloud computing will grow in 2011, or more than 5 times the rate of IT industry as a whole.

• 2.3 million jobs (the net new jobs created by cloud on a cumulative basis over the period 2010 to 2015.

• The impact of cloud computing will be very high on the nearly $60 billion outsourcing sector, whose mantra is cost savings. This sector has little choice but to include cloud computing as part of their service portfolio.

10

Page 11: Information Technology Act - CA perspective

Cloud computing Indian Scenario: • India is ahead of US in cloud adoption. Top cloud users today are Brazil (27%), Germany

(27%), India (26%), US (23%).

• Cloud computing market in India is expected to cross USD 1.08 billion by 2015, from USD 110 million in 2010.

• Of the projected $4.5-billion total cloud computing market in India by 2015, private cloud will account for $3.5 billion.

• It will generate about 100,000 additional jobs and save about 50 percent of cost of IT operations for Indian enterprises.

• India's No. 3 outsourcing firm looks at cloud computing as a "game changer”. It is building data centers in India is implementing private clouds in partnership with other IT firms.

• The cloud has the potential to transform business ecosystems that are relatively under penetrated by IT due to high capital requirements, such as government, healthcare and education.

• CC allows us to deliver standard end-to-end processes as a service to customers using new operating models - TCS

11

Page 12: Information Technology Act - CA perspective

Impact of IT for CA in future

• CAs with solid IT skills are needed to design, integrate, and implement advanced software systems, as well as serve as consultants to link hardware/software solutions with sound business plans.

• Technology will continue to challenge and reshape our lifestyles, work patterns, educational experiences, and communication styles and techniques. Technology will rewrite the “rules of business,” leaving those far behind who will not harness it and effectively integrate it.

• Many of the traditional, essential skills of CAs are being replaced by new technologies that are increasing in number and being rapidly developed, often from unexpected sources.

12

Page 13: Information Technology Act - CA perspective

Innovation - key to success

There’s plenty of evidence that if

You don’t find dramatically new ways of doing business,

You’re not going to be in business

13

Page 14: Information Technology Act - CA perspective

• IT – The road ahead for CAs

• The core competencies of a CA are a unique combination of knowledge and skills in various aspects of accounting, assurance, information systems, governance, management, risk, controls, regulatory compliances, business processes, human relations, technology and related areas relevant for enterprises of all types and oriented towards the objective of providing value and deliverables as per requirement of clients/users.

• Global studies have shown that the traditional core competencies of CAs needs to be enhanced with increased understanding of technology systems and there is urgent need to develop the ability to process and integrate information among various areas of business practice.

• CA firms have to become IT savvy so as to deploy the optimum level of IT within their firm and also to have the required working knowledge of IT to audit/consult for their clients.

14

Page 15: Information Technology Act - CA perspective

IT – The road ahead for CAs

• Interested in providing IT implementation and consulting services

• Get good understanding of technologies, tools, processes, and trends… and REGULTIONS.

• CA firms have to consider IT not merely as an office asset to be procured for use by staff as an office automation tool but as a critical infrastructure which has a strategic long-term impact on their service delivery capabilities.

15

Page 16: Information Technology Act - CA perspective

16

Page 17: Information Technology Act - CA perspective

Example of GRC risk

17

Page 18: Information Technology Act - CA perspective

IT Governance Principle

• “Information Technology is critical to the success of an enterprise, Information Technology is an issue which cannot be relegated solely to management or IT Specialists, but must instead receive the focussed attention of both”.

18

Page 19: Information Technology Act - CA perspective

The key questions?

Corporate Governance

• How do suppliers of finance get managers to return some of the profits to them?

• How do suppliers of finance make sure that managers do not steal the capital they supply or invest in bad projects?

• How do suppliers of finance control managers?

IT Governance

• How do board and executive management get their CIO and IT organisation to return some business value to them?

• How do board and executive management get their CIO and IT organisation do not steal the capital they supply or invest in bad IT projects?

• How do board and executive management control their CIO and IT organisation?

19

Page 20: Information Technology Act - CA perspective

2. Overview of IT Act 2000 and IT Act 2008

20

Page 21: Information Technology Act - CA perspective

Objectives of the IT Act 2000

• Provide legal recognition for transactions carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“

• Facilitate electronic filing of documents with Government agencies and E-Payments - E-Governance:

• Amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934

Establish Certifying Authorities for Digital Signature

Recognize Digital Signature

Impose tough penalties on Cyber crimes

Set up Appellate authorities

Schedule II provides for Guidelines for Implementation and management of IT Security

21

Page 22: Information Technology Act - CA perspective

Extent of application

• Extends to whole of India and also applies to any offence or contravention there under committed outside India by any person {section 1 (2)} read with Section 75- Act applies to offence or contravention committed outside India by any person irrespective of his nationality, if such act involves a computer, computer system or network located in India

22

Page 23: Information Technology Act - CA perspective

Act is NOT applicable to…

(a) a negotiable instrument (Other than a cheque) as defined in section 13 of the Negotiable Instruments Act, 1881; (b) a power-of-attorney as defined in section 1A of the Powers-of-Attorney Act, 1882; (c) a trust as defined in section 3 of the Indian Trusts Act, 1882; (d) a will as defined in clause (h) of section 2 of the Indian Succession Act, 1925 including any other testamentary disposition (e) any contract for the sale or conveyance of immovable property or any interest in such property; (f) any such class of documents or transactions as may be notified by the Central Government

23

Page 24: Information Technology Act - CA perspective

IT Act 2000

• Enacted on 17th May 2000- India is 12th nation in the world to adopt cyber laws

• IT Act is based on Model law on e-commerce adopted by UNCITRAL

• IT Act was amended by IT Amendment Act, 2008

• When the Information Technology Act, 2000 was introduced –it was the first information technology legislation introduced in India!

• And Information Technology (Amendment) Act 2008 (Effective from October 27, 2009) - could be a Game Changer!

• ITA Rules, 2011

24

Page 25: Information Technology Act - CA perspective

Objectives of IT Act 2008

• Casts responsibility on body corporate to protect sensitive personal information (Sec. 43A)

• Recognizes and punishes offences by companies and individual(employee) actions (Sec. 43, 66 to 66F, 67..): – Sending offensive messages using electronic medium or using body

corporate’s IT for unacceptable purposes – Dishonestly stolen computer resource – Unauthorized Access to computer resources – Identity theft/Cheating by personating using computer – Violation of privacy – Cyber terrorism/Offences using computer – Publishing or transmitting obscene material

• Provides for Extensive powers for Police & Statutory Authorities

25

Page 26: Information Technology Act - CA perspective

What IT Act 2008 amendment aims for

• Paradigm shift in data protection and privacy regime in India: – Establishing a self regulation framework – Maintenance of reasonable security practices and

procedures – Articulating “sensitive personal data or information” – Adjudication related to data protection and privacy [civil

liabilities] – Providing criminal prosecution vis-à-vis data protection

and privacy

26

Page 27: Information Technology Act - CA perspective

Rules to IT Act 2008

• Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011.

• Information Technology (Intermediaries guidelines) Rules, 2011

• Information Technology (Electronic Service Delivery) Rules, 2011

27

Page 28: Information Technology Act - CA perspective

Definitions (section 2)

• "computer" means electronic, magnetic, optical or other high-speed date processing device or system which performs logical, arithmetic and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software or communication facilities which are connected or relates to the computer in a computer system or computer network;

• "computer network" means the inter-connection of one or more computers through- – (i) the use of satellite, microwave, terrestrial lime or other

communication media; and

– (ii) terminals or a complex consisting of two or more interconnected computers whether or not the interconnection is continuously maintained;

28

Page 29: Information Technology Act - CA perspective

Definitions (section 2)

• "electronic record" means date, record or date generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche;

• “secure system” means computer hardware, software, and procedure that-

(a) are reasonably secure from unauthorized access and misuse; (b) provide a reasonable level of reliability and correct operation; (c) are reasonably suited to performing the intended function; and (d) adhere to generally accepted security procedures • “security procedure” means the security procedure prescribed by the

Central Government under the IT Act, 2000.

• secure electronic record – where any security procedure has been applied to an electronic record at a specific point of time, then such record shall be deemed to be a secure electronic record from such point of time to the time of verification

29

Page 30: Information Technology Act - CA perspective

Definitions

• Information includes

• Data, text, images, sound, voice, codes, computer programmes, software and databases or micro film or computer generated micro fiche

• Electronic form

• With reference to information means

• Any information generated, sent, received or stored

• in media, magnetic, optical, computer memory, microfilm, computer generated micro fiche or similar device

30

Page 31: Information Technology Act - CA perspective

Definition

• Digital signature • Authentication of any electronic record by a subscriber • by means of an electronic method or procedure • in accordance with the provisions of section 3

• Affixing digital signature • Adoption of any methodology or procedure by a person for

purpose of authenticating an electronic record by means of a digital signature

• Intermediary

• With respect to any particular electronic message means • Any person who on behalf of another person receives,

stores or transmits that message or provides any service with respect to that message

31

Page 32: Information Technology Act - CA perspective

Electronic Governance

• Legal recognition of electronic records (Sec.4) • Where any law provides that information of any other

matter shall be in writing or in the typewritten or printed form then

• Not withstanding anything contained in any law,

• Such requirement shall be deemed to be have been satisfied if such information or matter is:

» Rendered or made available in an electronic form and

» Accessible so as to be usable for a subsequent

reference

32

Page 33: Information Technology Act - CA perspective

Recognition for E-Governance

• Provides for following in electronic form (Sec.6): • Filing of any form, application or any other document with

any office, authority, body or agency owned or controlled by the appropriate Government in a particular manner:

» The issue or grant of any licence, permit, sanction or

approval by whatever name called in a particular manner

» The receipt or payment of money in a particular manner

» As prescribed by the appropriate Government

33

Page 34: Information Technology Act - CA perspective

A digital signature

• Created using a software.

• Unique and dynamically created by the software.

• Used for identifying and authenticating a user for transactions in the digital world similar to identifying and authenticating users through physical signatures in the physical world.

• Issued by the Certificate Authority and is valid for the period it is allotted.

• Any one can confirm whether the digital certificate is valid by confirming with the Certificate authority who has issued it.

34

Page 35: Information Technology Act - CA perspective

Electronic Signature substituted by digital signature in IT Act 2008

• Subscriber may authenticate any electronic record by

• Such electronic signature or electronic authentication technique that is: – Considered reliable and specified in second schedule

• Technique shall be considered reliable if:

– Signature creation data is unique to and under the control of the

authenticator

– Alterations are detectable

– Eg. PIN, digitised fingerprint or image, retina scan

35

Page 36: Information Technology Act - CA perspective

Impact of Digital Signature

• "As enterprises increasingly use digital signature technologies to support e-commerce, legal issues such as non-repudiation, online contracts and protection of intellectual property will become more common“

• "Business managers, Auditors and lawyers need to understand some of the underlying technology as they grapple with the legal implications”

36

Page 37: Information Technology Act - CA perspective

Secure digital signature-S.15

• If by application of a security procedure agreed to by the parties concerned, it can be verified that a digital signature, at the time it was affixed, was: (a) unique to the subscriber affixing it; (b) capable of identifying such subscriber; (c) created in a manner or using a means under the

exclusive control of the subscriber and is linked to the electronic record to which it relates in such a manner that if the electronic record was altered the digital signature would be invalidated, then such digital signature shall be deemed to be a secure digital signature

37

Page 38: Information Technology Act - CA perspective

Public Key Infrastructure

• Allow parties to have free access to the signer’s public key

• This assures that the public key corresponds to the signer’s private key – Trust between parties as if they know one another

• Parties with no trading partner agreements, operating on open networks, need to have highest level of trust in one another

38

Page 39: Information Technology Act - CA perspective

Certificate based Key Management

• Operated by trusted-third party – CA

• Provides Trading Partners Certificates

• Notarises the relationship between a public key and its owner

CA

User A User B

CA A B

CA A CA B

39

Page 40: Information Technology Act - CA perspective

The licensing process

• Examining the application and accompanying documents as provided in sections 21 to 24 of the IT Act, and all the Rules and Regulations there- under;

• Approving the Certification Practice Statement(CPS);

• Auditing the physical and technical infrastructure of the applicants through a panel of auditors maintained by the CCA.

40

Page 41: Information Technology Act - CA perspective

Audit Process

• Adequacy of security policies and implementation thereof;

• Existence of adequate physical security;

• Evaluation of functionalities in technology as it supports CA operations;

• CA’s services administration processes and procedures;

• Compliance to relevant CPS as approved and provided by the Controller;

• Adequacy to contracts/agreements for all outsourced CA operations;

• Adherence to Information Technology Act 2000, the rules and regulations

thereunder, and guidelines issued by the Controller from time-to-time. 41

Page 42: Information Technology Act - CA perspective

CCA

CA CA CA

Relying

Party Subscriber Subscriber Subscriber

Directory of

Certificates

CRLs

Directory of

Certificates

CRLs

PKI Hierarchy

42

Page 43: Information Technology Act - CA perspective

Section 12- Acknowledgement of Receipt

• If Originator has not specified particular method- Any

communication automated or otherwise or conduct to

indicate the receipt

• If specified that the receipt is necessary- Then unless

acknowledgement has been received Electronic Record shall

be deemed to have been never sent

• Where ack. not received within time specified or within

reasonable time the originator may give notice to treat the

Electronic record as though never sent 43

Page 44: Information Technology Act - CA perspective

Section 13- Dispatch of Electronic record

• Unless otherwise agreed dispatch occurs when ER enters resource outside the control of originator

• If addressee has a designated computer resource , receipt occurs at time ER enters the designated computer, if electronic record is sent to a computer resource of addressee that is not designated , receipt occurs when ER is retrieved by addressee

• If no Computer Resource designated- when ER enters Computer Resource of Addressee.

• Shall be deemed to be dispatched and received where originator has their principal place of business otherwise at his usual place of residence

44

Page 45: Information Technology Act - CA perspective

Civil Wrongs under IT Act

Chapter IX of IT Act, Section 43

• Whoever without permission of owner of the computer: – Secures access (mere U/A access)

• Not necessarily through a network

– Downloads, copies, extracts any data – Introduces or causes to be introduced any viruses or contaminant – Damages or causes to be damaged any computer resource

• Destroy, alter, delete, add, modify or rearrange • Change the format of a file

– Disrupts or causes disruption of any computer resource • Preventing normal continuance of computer

45

Page 46: Information Technology Act - CA perspective

Key Provisions of the IT Act for corporates – Sec. 43A

• The responsibility for protection of stakeholder information by body corporate primarily arises from the provisions of Section 43A of the Information Technology Act, 2008, which provides as follows:

• “Where a body corporate, possessing, dealing or handling any sensitive personal data or information

• in a computer resource which it owns, controls or operates,

• is negligent in implementing and maintaining reasonable security practices and procedures and

• thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected”.

46

Page 47: Information Technology Act - CA perspective

TYPES OF CYBER CRIMES

• Cyber terrorism

• Cyber pornography

• Defamation

• Cyber stalking (section 509 IPC)

• Sale of illegal articles-narcotics, weapons, wildlife

• Online gambling

• Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code

• Email spoofing

• Forgery

• Phising

• Credit card frauds

Crime against property

Crime against Government

Crime against persons

47

Page 48: Information Technology Act - CA perspective

Provision affecting body corporates

Section 85: • “Where a person committing a contravention of any of the

provisions of this Act or of any rule, direction or order made there under is a Company,

• every person who, at the time the contravention was committed,

• was in charge of, and was responsible to, the company for the conduct of business of the company as well as the company, shall be guilty of the contravention and shall be liable to be proceeded against and punished accordingly”

48

Page 49: Information Technology Act - CA perspective

3. Impact on Government, Enterprises and Individuals

– some case studies

49

Page 50: Information Technology Act - CA perspective

Impact of IT Act

Overall Impact

• Recognition of Electronic Records

• Electronic filing of records

• Legal recognition for digital signature

Specific Impact

• How digital signatures could be used within the company?

• How digital signatures could be used for business operations with customers and suppliers

• How digital signatures could be used for new business avenues?

• How will it impact the way your company is maintaining its record and conducting business operations?

50

Page 51: Information Technology Act - CA perspective

Security implications – different dimensions

GOVERNMENT:

Regulations and Policies, Lawful interception

ENTERPRISES:

Contractual, Risk management, Compliance, IT Security Strategy

NETIZEN:

Data Privacy, Safe Browsing

51

Page 52: Information Technology Act - CA perspective

Section 43A

• "body corporate" means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities

• "reasonable security practices and procedures“ means security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.

• "Sensitive personal data or information“ means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.

52

Page 53: Information Technology Act - CA perspective

Why Cyber law Compliance is a burning Issue?

• Has given a Security orientation to Cyber law in India

• Cyber Security is no longer a Technical Issue

• It is a legal prescription under ITA 2008

• Every Corporate Entity should therefore • Implement a structured plan of action to ensure that he is

not liable under ITA 2008 through a Cyber Law Compliance programme

53

Page 54: Information Technology Act - CA perspective

Seven basic compliance requirements

• Designate a Cyber Law Compliance officer

• Initiate training of employees on Cyber Law Compliance

• Introduce sanction procedures in HR policy for non compliance

• Use authentication procedures suggested in law

• Maintain data retention as suggested under Section 67C

• Identify and initiate safeguard requirements indicated under Sections 69 and 69A, 69B,43A

• Initiate global standards of data privacy on collection, retention, access, deletion etc

54

Page 55: Information Technology Act - CA perspective

Categories of Cybercrimes

Offences - sections 65 to 74 categorized as offences against:

Property

• Tampering with computer source documents

• Hacking

Person

• Obscenity

• Cyber trespass

• confidentiality and privacy

Sovereignty/government/Authority

• Interception of information affecting sovereignty

• Unauthorized access to protected systems

• Noncompliance with Orders of Certifying Authority

• Misrepresentation for obtaining Digital Signature

• Digital Signature for fraudulent or unlawful purpose

• Publishing Digital false in particulars

55

Page 56: Information Technology Act - CA perspective

Cyber Terrorism is defined in Section 66F

• Whoever threatens the unity, integrity, security or sovereignty of India or strike terror in people by: 1. Denying access to computer resource; or

2. Access computer resource without authority; or

3. Introduce any computer contaminant and causes death or destruction of property; or

• Penetrates restricted computer resources or information affecting sovereignty, integrity, friendly relations with foreign states, public order, decency, contempt of court, defamation or to the advantage of foreign state or group of persons.

• It is punishable with imprisonment upto life.

56

Page 57: Information Technology Act - CA perspective

Forgery

Andhra Pradesh Tax Case

• In the explanation of the Rs. 22 Crore which was recovered from the house of the owner of a plastic firm by the sleuths of vigilance department, the accused person submitted 6000 vouchers to legitimize the amount recovered, but after careful scrutiny of vouchers and contents of his computers it revealed that all of them were made after the raids were conducted .

• All vouchers were fake computerized vouchers.

57

Page 58: Information Technology Act - CA perspective

Cyber stalking

• Ritu Kohli (first lady to register the cyber stalking case) is a victim of cyber-stalking.

• A friend of her husband gave her phone number and name on a chat site for immoral purposes.

• A computer expert, Kohli was able to trace the culprit. Now, the latter is being tried for "outraging the modesty of a woman", under Section 509 of IPC.

58

Page 59: Information Technology Act - CA perspective

Cyber defamation

• SMC Pneumatics (India) Pvt. Ltd. v. Jogesh Kwatra: India’s first case of cyber defamation was reported when a company’s employee (defendant) started sending derogatory, defamatory and obscene e-mails about its Managing Director.

• The e-mails were anonymous and frequent, and were sent to many of their business associates to tarnish the image and goodwill of the plaintiff company.

• The plaintiff was able to identify the defendant with the help of a private computer expert and moved the Delhi High Court.

• The court granted an ad-interim injunction and restrained the employee from sending, publishing and transmitting e-mails, which are defamatory or derogatory to the plaintiffs.

59

Page 60: Information Technology Act - CA perspective

Online gambling: virtual casinos, Cases of money laundering

• Cyber lotto case: In Andhra Pradesh one Kola Mohan created a website and an email address on the Internet with the address '[email protected].' which shows his own name as beneficiary of 12.5 million pound in Euro lottery.

• After getting confirmation with the email address a telgu newspaper published this as news.

• He gathered huge sums from the public as well as from some banks. The fraud came to light only when a cheque amounting Rs 1.73 million discounted by him with Andhra bank got dishonored.

60

Page 61: Information Technology Act - CA perspective

Case Study- BPO Data Theft

• The recently reported case of a Bank Fraud in Pune in which some ex employees of BPO arm of MPhasis Ltd Msource, defrauded US Customers of Citi Bank to the tune of RS 1.5 crores has raised concerns of many kinds including the role of "Data Protection".

• The crime was obviously committed using "Unauthorized Access" to the "Electronic Account Space" of the customers. It is therefore firmly within the domain of "Cyber Crimes".

61

Page 62: Information Technology Act - CA perspective

BPO data theft -Case Study (contd.)

• The BPO is liable for lack of security that enabled the commission of the fraud as well as because of the vicarious responsibility for the ex-employee's involvement. The process of getting the PIN number was during the tenure of the persons as "Employees" and hence the organization is responsible for the crime.

• Some of the persons who have assisted others in the commission of the crime even though they may not be directly involved as beneficiaries will also be liable under Section 43 of ITA-2000.

• Under Section 79 and Section 85 of ITA-2000, vicarious responsibilities are indicated both for the BPO and the Bank on the grounds of "Lack of Due Diligence".

• At the same time, if the crime is investigated in India under ITA-2000, then the fact that the Bank was not using digital signatures for authenticating the customer instructions is a matter which would amount to gross negligence on the part of the Bank.

62

Page 63: Information Technology Act - CA perspective

Case Study- Case of Extortion of Money Through Internet

• The complainant has received a threatening email and demanded protection from unknown person claiming to be the member of Halala Gang, Dubai. Police registered a case u/s. 384/506/511 IPC.

• The sender of the email used the email ID [email protected] & [email protected] and signed as Chengez Babar.

• Both the email accounts were tracked, details collected from ISP’s & locations were identified.

• The Cyber cafes from which the emails has been made were monitored and the accused person was nabbed red handed.

63

Page 64: Information Technology Act - CA perspective

Email spoofing: • Pranab Mitra , former executive of Gujarat Ambuja Cement

posed as a woman, Rita Basu, and created a fake e-mail ID through which he contacted one V.R. Ninawe an Abu Dhabi businessmen.

• After long cyber relationship and emotional massages Mitra sent an e-mail that ‘‘she would commit suicide’’ if Ninawe ended the relationship. He also gave him ‘‘another friend Ruchira Sengupta’s’’ e-mail ID which was in fact his second bogus address.

• When Ninawe mailed at the other ID he was shocked to learn that Mitra had died and police is searching Ninawe. Mitra extorted few lacs Rupees as advocate fees etc. Mitra even sent e-mails as high court and police officials to extort more money. Ninawe finally came down to Mumbai to lodge a police case.

Page 65: Information Technology Act - CA perspective

Bankrupt Complainant approaches Police

• The complainant realizes having been cheated, approaches Police.

• Total amount obtained by the perpetrator = Rs 1.25 crore.

• The I.P. Addresses embedded in all e-mails received by complainant reveal the origin to be either

• Ambuja Cement Company or

• A residential address at Nerul.

• A bank account at Chembur

• Police swing into action and raid the addresses.

• Two laptops recovered at the said place contain most of the e-mail communication made under the various identities such as Ruchira, Advocate Mitra, New York Police, Kolkata Police etc.

• Man assuming all these identities was identified as P M, employee of Gujarat Ambuja

65

Page 66: Information Technology Act - CA perspective

4. Impact and opportunities for Chartered Accountants

66

Page 67: Information Technology Act - CA perspective

Chartered Accountants

Traditional areas: • Internal Auditing,

• Filing of returns

• Compliance

• MIS

New Areas: • Electronic filing of documents

• Web based business

• Web Assurance policies

• eEnabling business operations

67

Page 68: Information Technology Act - CA perspective

eCommerce Concepts and impact

• eCommerce refers to the use of technology to enhance the processing of commercial transactions between a company, its customers and its business partners.

• eCommerce has vast potential to change the way business is conducted.

• eCommerce transactions over the Internet include – Formation of Contracts – Delivery of Information and Services – Delivery of Content

• Traditional sources of competitive advantage will be supplanted, power and control will shift from suppliers to customers, global markets will become accessible to all comers and the traditional role of middlemen will be undermined

68

Page 69: Information Technology Act - CA perspective

eCommerce Issues

1. Web merchants may be bogus

2. Customers may be fictitious

3. Electronic documents on the Web may not be authentic

4. Trading partners may deny they were a party to the transaction

5. Transactions may be intercepted, tampered with or replayed

6. Digital signatures and electronic records may not be recognized as evidence in courts of law

7. Transactions may be hard to substantiate causing problem of accounting recognition.

8. Audit trails may be lacking or easily tampered with

69

Page 70: Information Technology Act - CA perspective

Minimum Security Requirement for eCommerce

NON REPUDIATION

AUTHENTICATION

CONFIDENTIALITY

INTEGRITY

Ref:

Sub:

Sir,

This is with your

Ref vide -------

-------------------- Vikram

Signature

Replace

letterhead &

signature on

original

document

Replace

Envelope

?

?

70

Page 71: Information Technology Act - CA perspective

The Answer

Encryption

Cryptographic

digital signature

NON REPUDIATION

AUTHENTICATION

CONFIDENTIALITY

INTEGRITY

Replaces

letterhead &

signature on

original

document

Replaces

Envelope

71

Page 72: Information Technology Act - CA perspective

Digital Certificates in eCommerce

• Verification of customer, merchant, bank .. – Non-repudiation

– Time stamping

– Authentication

– Legal evidence

• Secure E-Mail – Receipt of contracts

– Receipt of purchase orders

– Receipt of other important Electronic documents

72

Page 73: Information Technology Act - CA perspective

Impact on traditional areas

Key Issues impacting CAs

Authenticity

How do we implement a system that ensures that transactions are genuine and authorized?

Reliability

How do we rely on the information, which does not have physical documents?

Accessibility

How do we gain access and authenticate this information, which is digital form?

73

Page 74: Information Technology Act - CA perspective

Control Objectives for eCommerce

Business and Control objectives do NOT change e.g.

• Goods sold are as per customer order

• Delivered to correct customer

• Payment is correct and made to correct supplier

• Transactions are correctly recorded, etc

However, monitoring tools and techniques used need to be changed

74

Page 75: Information Technology Act - CA perspective

Sample checklist for evaluation

Section 43 A

(a) Are various components of “sensitive personal data or information” vis-à-vis users/customers defined by the enterprise?

(b) Does the enterprise you have a security policy?

Is the security policy documented?

Section 67C

Does the enterprise have an electronic record preservation and retention policy?

Section 69B

Has the enterprise adopted/established appropriate policy, procedures and safeguards for monitoring and collecting traffic data or information?

Are these documented?

75

Page 76: Information Technology Act - CA perspective

Sample checklist for evaluation

Section 70B

Does the enterprise have appropriate documented procedure to comply with the requests of CERT-IN regarding cyber security incidents?

Section 72A

(a)Does the enterprise have an adequate privacy policy?

(b) Whether the enterprise has provided for opt-in/opt-out clause in the privacy policy?

General

1. Have the enterprise appointed designated officer/nodal officer/computer-in-charge to comply with the directions of competent authority/agency under various provisions of the Act?

2. Whether details of such designated officer/nodal officer readily available online (at your website)?

76

Page 77: Information Technology Act - CA perspective

Key Concepts to Take Away

• Implications of IT Act 2000

– More pervasive as we move on

– Definite role to play

– Are we ready and equipped?

– Do we have the vision and long term focus?

– Certificate Authorities, Digital Signatures will be key enablers of eCommerce

• eCommerce offers exciting Avenues

77

Page 78: Information Technology Act - CA perspective

78

Page 80: Information Technology Act - CA perspective

All challenges are opportunities

IT is one such continuing challenge

80