18.04.2015 Views

Editor: I. Mallikarjuna Sharma Volume 11: 15-31 March 2015 No. 5-6

Martyrs memorial special issue of 15-31 March 2015 paying tributes to Bhagat Singh and other comrades.

Martyrs memorial special issue of 15-31 March 2015 paying tributes to Bhagat Singh and other comrades.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ISC-170 Shreya Singhal v. Union of India [IND-SC] (20<strong>15</strong>) 1 LAW<br />

109. It will be noticed that Section 69A unlike<br />

Section 66A is a narrowly drawn provision with<br />

several safeguards. First and foremost, blocking<br />

can only be resorted to where the Central<br />

Government is satisfied that it is necessary so to<br />

do. Secondly, such necessity is relatable only to<br />

some of the subjects set out in Article 19(2).<br />

Thirdly, reasons have to be recorded in writing in<br />

such blocking order so that they may be assailed<br />

in a writ petition under Article 226 of the<br />

Constitution.<br />

<strong>11</strong>0. The Rules further provide for a hearing<br />

before the Committee set up – which Committee<br />

then looks into whether or not it is necessary to<br />

block such information. It is only when the<br />

Committee finds that there is such a necessity that<br />

a blocking order is made. It is also clear from an<br />

examination of Rule 8 that it is not merely the<br />

intermediary who may be heard. If the “person”<br />

i.e. the originator is identified he is also to be<br />

heard before a blocking order is passed. Above<br />

all, it is only after these procedural safeguards are<br />

met that blocking orders are made and in case<br />

there is a certified copy of a court order, only<br />

then can such blocking order also be made. It is<br />

only an intermediary who finally fails to comply<br />

with the directions issued who is punishable<br />

under sub-section (3) of Section 69A.<br />

<strong>11</strong>1. Merely because certain additional safeguards<br />

such as those found in Section 95 and 96 CrPC<br />

are not available does not make the Rules<br />

constitutionally infirm. We are of the view that<br />

the Rules are not constitutionally infirm in any<br />

manner.<br />

Section 79 and the Information Technology<br />

(Intermediary Guidelines) Rules, 20<strong>11</strong>.<br />

<strong>11</strong>2. Section 79 belongs to Chapter XII of the Act<br />

in which intermediaries are exempt from liability<br />

if they fulfill the conditions of the Section.<br />

Section 79 states:<br />

“79. Exemption from liability of intermediary in<br />

certain cases. – (1) <strong>No</strong>twithstanding anything<br />

contained in any law for the time being in force<br />

but subject to the provisions of sub-sections (2)<br />

and (3), an intermediary shall not be liable for<br />

any third party information, data, or<br />

communication link made available or hosted by<br />

him.<br />

(2) The provisions of sub-section (1) shall apply<br />

if –<br />

(a) the function of the intermediary is limited to<br />

providing access to a communication system<br />

over which information made available by third<br />

parties is transmitted or temporarily stored or<br />

hosted; or<br />

(b) the intermediary does not –<br />

(i) initiate the transmission,<br />

(ii) select the receiver of the transmission, and<br />

(iii) select or modify the information contained<br />

in the transmission;<br />

(c) the intermediary observes due diligence while<br />

discharging his duties under this Act and also<br />

observes such other guidelines as the Central<br />

Government may prescribe in this behalf.<br />

(3) The provisions of sub-section (1) shall not<br />

apply if –<br />

(a) the intermediary has conspired or abetted or<br />

aided or induced, whether by threats or promise<br />

or otherwise in the commission of the unlawful<br />

act;<br />

(b) upon receiving actual knowledge, or on being<br />

notified by the appropriate Government or its<br />

agency that any information, data or<br />

communication link residing in or connected to a<br />

computer resource controlled by the intermediary<br />

is being used to commit the unlawful act, the<br />

intermediary fails to expeditiously remove or<br />

disable access to that material on that resource<br />

without vitiating the evidence in any manner.<br />

Explanation. – For the purposes of this section,<br />

the expression “third party information” means<br />

any information dealt with by an intermediary in<br />

his capacity as an intermediary.]”<br />

<strong>11</strong>3. Under the 20<strong>11</strong> Rules, by Rule 3 an<br />

intermediary has not only to publish the rules and<br />

regulations, privacy policy and user agreement<br />

for access or usage of the intermediary’s<br />

computer resource but he has also to inform all<br />

users of the various matters set out in Rule 3(2).<br />

Since Rule 3(2) and 3(4) are important, they are<br />

set out herein-below:-<br />

Law Animated World, <strong>15</strong>-<strong>31</strong> <strong>March</strong> 20<strong>15</strong><br />

84

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!