Tag: cyber crime

Understanding the legal meaning of “originator” under Information Technology Act, 2000(amended in 2008) by Dr.Debarati Halder

Image owned by Debarati halder

While scrolling my Instagram in a lazy Sunday morning in late august in 2025, I came across this sad news of a new father carrying his dead new born child to the office of the District Magistrate in a remote place in northern India because he wanted justice for the medical negligence shown to his pregnant wife; due to which their new born baby died. Someone had taken the video of his meeting the official which had become โ€œviralโ€. The man was able to convince the administration and the audience (of online content) about his ordeal and the administration had taken swift action against the concerned hospital.

Who is an originator?

Who created this content? Who uploaded this content? Can he be rewarded for public service for making us all understand how access to medical services is still a distant dream for many women in India? Which this may make us think about โ€˜whistle blowingโ€™ and genuine reporting, I wanted to emphasize on the this to explain who is an originator in the present context.

S.2(za) of the Information Technology Act, 2000(amended in 2008) defines the term originator as a person who

(i) sends, generates, stores or transmits any electronic message, or

(ii) causes any electronic message to be sent, generated, stored or transmitted to any other person,

This clause very categorically excludes intermediary from the concept of originator.

As may be seen above, originator may necessarily include a โ€˜personโ€™, whether a biological person or a juridical person ( which includes any organization, Nation, government etc, represented by authorized human being). If we now see the above incident of capturing the sad moment in camera, uploading the same in the social media platform and sharing the same worldwide through his/her authorized and lawfully possessed account, we may understand that the first person who recorded the same may be the first originator of the content. Let us again see S.2(ZA) of the Information Technology Act, 2000(amended in 2008) : it says if any one generates any content or stores the content (electronic message) or causes to do the same, he may be considered as an originator as well.

Are  โ€˜originator โ€˜ and โ€˜senderโ€™  same?

But here one issue may rise doubts about the literal meaning of โ€œoriginator: whether the term applies for one who generates or stores electronic message (which may be perceived as content) ? or , whether originator is also one who generates, stores or even transmits or causes to do all these?

I have seen in many instances many practitioners, students and common people who may want to understand their rights, may get extremely confused in this regard. If we go by literal rule of interpretation, does one who originates and stores the message or content (which may be offensive), have to take the responsibility and liability as that of the โ€˜senderโ€™ who transmits the messages to the addressee or the recipient?  In some understandings like shifting liability to the โ€˜sendersโ€™ in WhatsApp messages whereby the recipients/addresses may get victimized due to such โ€˜sendingโ€™ , the former may be termed as originators because he may originate/curate/store the message and then send the same with a knowledge that such content may affect the addressee. But what about the person who originates and stores the content, but does not send the same?   Here, we may apply both Literal Rule of interpretation and Doctrine of harmonious construction which may provide a holistic interpretation to resolve the conflict. A person who may generate any content and stores it, may do so illegally as well if he generates the content without proper permission like generating child sexual abuse contents by capturing real-life child sexual abuse incidences and storing the same with an intention for self-gratification. But not to forget, the content is stored in an electronic device which may be unauthorisedly accessed: hence, he may have to take the responsibility of not only originating an illegal content, but also the responsibility of โ€˜sendingโ€™/ transmittingโ€™ the illegal content which may have more harmful effect than merely generating and storing the content.  

The draftsmen therefore created the concept of โ€˜originatorโ€™ under S.2(ZA) of the information technology Act, 2000(amended in 2008) from a predictive perspective which will attract the liability of a sender to the originator as well. Clearly, this is evident from S.11 of the Information Technology Act, 2000(amended in 2008) where the provision explains about attribution of electronic records by stating

An electronic record shall be attributed to the originator if

  • It was sent by the originator himself
  • The said electronic record was sent by any authorized person on behalf of the originator
  •  The electronic record was sent by an information system that programmed by or on behalf of the originator to operate automatically.

It is for this reason that every user of digital communication technology must be extremely careful about what is being generated and stored by him and what is being sent by him.

Stay safe, stay aware!

Please note: If you want to share /use the write-up for your work, please cite it as Halder Debarati (2025), Understanding the legal meaning of originator under Information Technology Act, 2000(amended in 2008). Published in https://internetlegalstudies.com/2025/08/24/understanding-the-legal-meaning-of-originator-under-information-technology-act-2000amended-in-2008-by-dr-debarati-halder/ on 24-08-2025

Celebs and crime

This is in sequence of my earlier blog on female actors and their plight in the cyber crime arena posted on http://debaraticyberspace.blogspot.com titleled “Cyber harassing the women , saga continues for Indian cine stars”.to day morning I noticed this particular blog has been copied in another site withoutย clearlyย giving the original source, i.e, the name of the author, the web resource etc. What I understand ย is , probably in my earlier blog in question,ย Iย had taken names of few well knownย glamorousย ย female actors and that caused my blog and myself to be taken away from me.Sounds funny? well, that’s it… woman is again in trouble. This is what I wanted to prove as how female celebs attract unwanted onlookers and alsoย perpetrators in the cyber space.

However, I want toย clearlyย mention that if some one isย interested to use my blogs or for that instance, any blog of any individual, the work must be properly cited.please do mention the author’s name , the blog’s original address and then explain how it really affects you for good or bad.
Hope this creates an awareness again for cyber crime against women in India and world as well..
Debarati Halder, Advocate

Centre for Cyber Victim Counseling (CCVC): A committed organization to help Cyber Crime Victims

CYBER CRIME AGAINST WOMEN

It had been eight long months since we started Centre for โ€œCyber Victims Counselingโ€ (CCVC). I felt this is the right time to write a few words about this brain child of oursโ€ฆโ€ฆme and my husband. We are basically a โ€œTrustโ€, an all voluntary not for profit NGO with social service agenda, working towards betterment of cyber space. Our primary concern is Indian cyber space. Being a lawyer myself, I felt this is the best way I could contribute to my country and countrymen. Indian cyber space has become more secured than before due to several organizations and individuals who are working on cyber crime issues since couple of years. On behalf of CCVC, we are proud to follow their footsteps.ย ย ย 
ย When we conceived the idea of CCVC, I never knew there would be so many responses. Many contacted us for different sorts of help and guidance from within the country as well as outside the country. We in CCVC are thankful to all of you who consider us โ€œworthy friendsโ€ to tell your problems. While we were building CCVC, we received many criticisms too. We consider them as treasures in disguise. Feedbacks, guidance and criticisms make CCVC stronger to help the victims, individuals, students and the researchers as well. We are growing in handling each experience of yours. I take this opportunity to thank Jayne Hitchcock, whom I consider as my mentor. I got to learn basic cyber ethics from her. WHOA and Hitchcock were our โ€œmotivatorsโ€ behind starting CCVC.
I know, healing a patient with physical pain is a tough job. But healing a victim of cyber attack is neither an easy task. The pain one goes through remains for long, some times for life. Besides providing counseling to cyber crime victims, what satisfies me more is the blogs I run as a part of CCVCโ€™s activities. These blogs creates awareness about cyber crimes and victimisation. I would be extremely happy to help all who need to know about cyber crime and laws . In the CCVC, we are planning for more activities in the coming months. Do keep an eye on CCVCโ€™c blogs @ http://cybervictims.blogspot.com/ and http://debaraticyberspace.blogspot.com/ to know about our further plans and activities.

AN APPEAL TO ALL

THIS IS A FORWARD FROM OUR SISTER BLOG @http://cybervictims.blogspot.com/

WE AT CCVC HAVE STARTED 2010 WITH A CAUSE.THE POPULAR SOCIAL NETWORKING WEBSITE ORKUT.COM IS BEING USED BY MANY TO CREATE FAKE PROFILES AND COMMUNITIES WHICH ARE DEFAMING , DEMEANING AND SOME TIMES CARRIES SEXUALLY EXPLICIT CONTENTS. THIS PARTICULAR ISSUE IS NOT RESPONDED WELL BY ORKUT. AS PER THE INDIAN LEGAL STANDARD, SUCH PROFILES AND COMMUNITIES ARE ILLEGAL. BUT UNFORTUNATELY SINCE ORKUT IS GUIDED NOT BY INDIAN LAWS BUT BY UNIVERSAL POLICY GUIDELINES OF ITS OWN (WHICH IS MADE ON THE BASIS OF US FREEDOM OF SPEECH AND EXPRESSION), MANY TIMES INNOCENT VICTIMS HAVE BEEN REFUSED ANY POSITIVE HELP. HENCE WE HAVE FILED AN ONLINE PETITION. THE URL IS http://www.petitiononline.com/ccvc123/petition.html. IF U HAPPEN TO READ THIS BLOG, PLEASE SIGN THE PETITION BOTH IN THIS LINK AS WELL AS IN CCVC’S WEBSITE. WE ACKNOWLEDGE YOUR KIND RESPONSE.
THANK U
DEBARATI
JAISHANKAR

Social networking websites and the FUN

Unfortunately we women get most of our disturbances from the social networking websites where we are members. what kinds of disturbances?
1. some one keeps on sending friends’ request and he /she is a stranger . we hardly know whether the sender is a genuine person and wants a real friendship. here are some tips to find out the genuineness:
Check out the persons’ whole profile . if you find any thing suspicious, just put a full stop then and there.
Did you check his wall or message board? if it is open for viewing having a glimpse .
See his photo album and video clippings .
Check the communities he is member to.
You may get an idea who the person is and what is his real aim.
2. You get an unwanted visitor who keeps of scrapping on your message board. What should you do?
check who is the visitor by thoroughly examining his profile .If you feel he is a “real nuisence ” click ignore the person / “block the person” button in your profile and immidiately lock your message book.
3. Are you afraid that your personal photographs may be attakced?
Post some pictures that attract less or nil”sexual comments” ;
Do not “invite” your friends to visit your album . This could lead to inviting more unknown friends through your own friends.
4. Be careful of what you post in your profile. Do not post sensitive data about yourself.
5. Never “fight ” with your virtual friends using abusive language. Imagine if they revert back, you may find next morning your message board full of bullying words . There are chances that many of your friends may have seen these “hate-words” before you found it out yourself.
6. Do not try to experiment with banned , mischievous or obscene communities. this may lead you to even more bigger danger zone.

In my next blog I will share some tips to avoid any cyber danger that you may have fallen into.until then Bye from Debarati.

TYPES OF CYBER CRIME WOMEN FACE

Cyber crime, a crime the domain of which can be extended to many unknown spaces, happens most rudely to women. In my article on Cyber crime against women, which was published in Cyberlawtimes.com, I had shown some major types of crimes which attack women only in the net. But here I would like to discuss it broadly. Cyber crime can be of two types, (1) attacking the economy, which is also called e- crime like phishing etc, (2) attacking the individual self through emails and social networking websites. I am going to speak about the second point.
All most all sorts of cyber offences like hacking, pornography, breaching of confidentiality and security which are narrated in our Information technology Act 2000, originate mostly from emails and social networking websites. Other than these, some thing more which many of us women suffer in the internet are stalking and harassment. Many cyber law experts explained stalking as โ€œfollowingโ€ the netizen, each of her steps, her conversations, and her activities are followed silently. And then one day she receives an email revealing all her past activities, (some of which she may have wanted to do secretly) and then continuous blackmailing begins. I would say cyber harassment is even more annoying than any of these. A girl keeps on receiving emails from some known person, well, to be precise, NOT SO WELL KNOWN, asking her many embarrassing questions. How about this case where a girl is having an affair secretly and some one constantly blackmail her on her boy friend? Or she feels a threat that this emailing person would tell the world, especially her parents about her love affair? Or even in case of โ€œjittery Ex- boy friendโ€ who keeps on mailing her putting some bombarding words? Seems you too have heard of these sorts of cases? The other window of inviting headaches is the online chatting. Yahoo messenger, AOL, G talks etc gives us opens ways to make friends and speak with them. The girl slowly opens her heart, gets involved more and more and becomes addicted to chatting. She never knows when these girli girli chats become little mischievous and the person sitting on the opposite may not be a REAL FEMALE. She sends her photos, and the โ€œSHEโ€ too โ€ฆโ€ฆof some other female net user and the friendship becomes deeper than ever. Now the story takes a U turn when the girl this side suddenly finds her picture or her story in a very โ€œdirtyโ€ forum with her real name publicizing her โ€œnaughty desiresโ€. The story can be a bit different too when she gets involved with a male in the chatting box. Many of us have heard about internet chatting โ€“ partners turn into real life couples giving a fairy tell finishing of the whole story. The other side of the story is there are some instances also when the girl becomes a FOOL by her net boyfriend who could be even of her fatherโ€™s age. The male partner one day asks her to step in in the real world from the virtual world at some destination. Imagine the situation where the girl in question finds herself in a DEN or even in a DITCH . If she can escape luckily, she becomes so traumatized that she may even refuse to come back to her normal life