Video: Cyber crime case in Hyderabad

Software expert tried to take revenge against a women, who turned down his marriage proposal, falls into cyber crime cell net. Engineer had put obscene profiles of the victim on various networking sites like Facebook and Orkut and also sent letter through post containing morphed pictures of the girl, with written message in Telgu, which formed the basic evidence and led to his arrest by Hyderabad Police.

He would be punished under various provisions of Information Technology Act, especially section 67, which provides for publishing of obscene material in electronic form and Indian Penal Code !

Video by

TCS website hacked

On Sunday, visitors to Tata Consultancy Services (TCS) website were taken for a hacker’s surprize as the HomePage of the website greeted visitors with a ‘For Sale’ message. It has been reported that the problem was at Domain Registrar as no servers were compromised but it was a case of DNS hijacking.

According to the wikipedia: DNS hijacking or DNS redirection is the practice of redirecting the resolution of Domain name system (DNS) names to IP addresses to rogue DNS servers, particularly for the practice of phishing, or the practice of some ISPs resolving otherwise non-existent domains to the ISPs own servers.

DNS hijacking is a kind of hacking, and is punishable under section 66 (read with section 43) of Information Technology Act, 2008.

Basically, there are two aspects to a hosted website, one is the Domain name and other is the Hosting space. It is necessary for the Domain name name – servers to point to the correct Hosting company servers by providing the required information, which is normally in the form of, etc. Such information is secured with a username and password, which is different than the normal Hosting user account information.

In many cases in India, the Domain Owners do not realize that they havn’t been provided with the access to such other Domain Control Panel but only the Hosting Cpanel by the Registrars, which leads to a kind of blackmail by the local Domain service providers in most of the cases, as such companies can later deny the transfer of Domain name to other registrars in the absence of the Secret Key, which is compulsorily required for such transfers (which is available within the Domain Control Panel).

If you have been victim of such blackmail by your Domain name registrar, please contact here for legal help !

For Domain name registration and unlimited website Hosting, please visit

CBI arrests software company owner for piracy of Microsoft Products

The Managing Director of K.K.Solutions, Kamlesh Jha, has been arrested by CBI on a complaint by Microsoft on the grounds of piracy and manipulation of genuine Microsoft Products.

The accused was a gold certified partner of Microsft. He was obtaining Pirated software CDs, packaging material and fake certificate of Authencity (COAs) from China, which were used for packing of manipulated genuine softwares obtained locally and for further sale. The accused has been also alleged to have abusing the “Microsoft Activation Downgrade Programme”, by obtaining WIN XP keys from Microsoft in the name of downgrading of VISTA to XP but instead used these keys on counterfieted software and sell them in the market.

The case has been registered under Indian Penal Code, Information Technology (Amendment) Act 2008 and Copyright Act 1957.

And ofcourse these kind of action from Microsoft Company are not something new. Microsoft has actively implementing various measures in India since the last 3-4 years to curb piracy, which includes making calls/visits at various software company offices to check upon the genuinity of Microsoft Products. And in some cases conducting raids with the help of Police / Special organizations like  BSA.

Many such cases have come up in various courts in India but mostly they end up in settlement (where ever allowed), as the accused have no way out but to pay up 4-5 times of the cost of softwares as penalty. Though, recently Microsoft was fined for filing of piracy cases without jurisdiction. Details below…

Related Links:

Information Technology (Amendment) Act 2006 & 2008 comes into force

The Information Technology (Amendment) Act, 2008 has came into force yesterday. The Rules pertaining to section 52 (Salary, Allowances and Other Terms and Conditions of Service of Chairperson and Members), section 54 (Procedure for Investigation of Misbehaviour or Incapacity of Chairperson and Members), section 69 (Procedure and Safeguards for Interception, Monitoring and Decryption of Information), section 69A (Procedure and Safeguards for Blocking for Access of Information by Public), section 69B (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) and notification under section 70B for appointment of the Indian Computer Emergency Response Team have also been notified.

The Information Technology Act was enacted in the year 2000 with a view to give a fillip to the growth of electronic based transactions, to provide legal recognition for e-commerce and e-transactions, to facilitate e-governance, to prevent computer based crimes and ensure security practices and procedures in the context of widest possible use of information technology worldwide.

With proliferation of information technology enabled services such as e-governance, e-commerce and e-transactions; data security, data privacy and implementation of security practices and procedures relating to these applications of electronic communications have assumed greater importance and they required harmonization with the provisions of the Information Technology Act. Further, protection of Critical Information Infrastructure is pivotal to national security, economy, public health and safety, thus it had become necessary to declare such infrastructure as protected system, so as to restrict unauthorised access.

Further, a rapid increase in the use of computer and Internet has given rise to new forms of crimes like, sending offensive emails and multimedia messages, child pornography, cyber terrorism, publishing sexually explicit materials in electronic form, video voyeurism, breach of confidentiality and leakage of data by intermediary, e-commerce frauds like cheating by personation – commonly known as phishing, identity theft, frauds on online auction sites, etc. So, penal provisions were required to be included in the Information Technology Act, 2000. Also, the Act needed to be technology-neutral to provide for alternative technology of electronic signature for bringing harmonization with Model Law on Electronic Signatures adopted by United Nations Commission on International Trade Law (UNCITRAL).

Keeping in view the above, Government had introduced the Information Technology (Amendment) Bill, 2006 in the Lok Sabha on 15th December 2006. Both Houses of Parliament passed the Bill on 23rd December 2008. Subsequently the Information Technology (Amendment) Act, 2008 received the assent of President on 5th February 2009 and was notified in the Gazette of India.


Download a copy of Information Technology (Amendment) Act, 2008 here