SlideShare a Scribd company logo
1 of 6
The Legislative response to Grossly Offensive or menacing emails and SMS<br />The electronic communications has changed the way the world communicates and also the communication habit.  The communication via SMS or electronic email manifests the freedom of speech and expression guaranteed by our constitution to every citizen [Article 19 (1) (a)], however, the freedom is not absolute, it is a qualified right, as constitution also sets significant limitations on that freedom, as the state may by law effect such reasonable restrictions as it deems necessary or expedient in the interest of the security of the state, the sovereignty and integrity of India, friendly relations with foreign states, public order, decency or morality or in relation to contempt of court, defamation or incitement to an offence. <br />Due to the misuse of the modern communication device and increased incidents of sending hate messages, threatening SMS, threatening Email to politicians, VIPs in politically charged environment, the legislature introduced Section 66A Information Technology (Amendment) Act, 2008 notified w.e.f. 27th October, 2009 which reads as follows:-<br />“66A. Punishment for sending offensive messages through communication service, etc.-  Any person who sends, by means of a computer resource or a communication device,—<br />(a) any information that is grossly offensive or has menacing character; or <br />(b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device,<br />(c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages, shall be punishable with imprisonment for a term which may extend to three years and with fine.<br />‘Explanation.— For the purpose of this section, terms “electronic mail” and “electronic mail message” means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, images, audio, video and any other electronic record, which may be transmitted with the message.”<br />Thus, the legislative intent was to make act of sending SMS, emails, or posting of any messages via communication device or computer resource which is grossly offensive or of menacing character or any information which the sender knows to be false but posted for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity etc. or disguised or anonymous emails or fake emails to cause annoyance. <br />“Grossly offensive or menacing character”: However, when an information or message shall be termed as grossly offensive or having menacing character has not been defined or explained in the Section 66A IT Act which leaves room for controversy.  Interestingly, the Section 66A IT Act is deeply influenced and probably originated from Section 127 of the Communication Act 2003, an UK Legislation. <br />The wordings of Section 127 of the Communication Act, 2003 are as follows:-<br />“127 Improper use of public electronic communications network<br />(1) A person is guilty of an offence if he—<br />(a) sends by means of a public electronic communications network a message or other matter that is grossly offensive or of an indecent, obscene or menacing character; or<br />(b) causes any such message or matter to be so sent.<br />(2) A person is guilty of an offence if, for the purpose of causing annoyance, inconvenience or needless anxiety to another, he—<br />(a) sends by means of a public electronic communications network, a message that he knows to be false,<br />(b) causes such a message to be sent; or<br />(c) persistently makes use of a public electronic communications network.<br />(3) A person guilty of an offence under this section shall be liable, on summary conviction, to imprisonment for a term not exceeding six months or to a fine not exceeding level 5 on the standard scale, or to both.<br />(4) Subsections (1) and (2) do not apply to anything done in the course of providing a programme service (within the meaning of the Broadcasting Act 1990 (c. 42)).”<br />Thus, the Communications Act 2003 section 127 covers the sending of grossly offending or menacing messages via public electronic communications network. Section 127(1)(a) relates to a message etc that is grossly offensive or of an indecent, obscene or menacing character and should be used for indecent phone calls and emails. Section 127(2) targets false messages and persistent misuse intended to cause annoyance, inconvenience or needless anxiety. The judgment of DPP v. Collins ([2005] EWHC 1308 (Admin)), an UK High Court decision sheds some light to what is “Menacing Character”, in which it observed that “A menacing message, fairly plainly, is a message which conveys a threat – in other words, which seeks to create a fear in or through the recipient that something unpleasant is going to happen. Here the intended or likely effect on the recipient must ordinarily be a central factor in deciding whether the charge is made out. Obscenity and indecency, too, are generally in the eye of the beholder; but the law has historically treated them as a matter of objective fact to be determined by contemporary standards of decency.”<br />Further, House of Lords has clarified what makes a message sent by means of a public electronic communications network quot;
grossly offensivequot;
 and therefore capable of amounting to a crime under the Communications Act 2003 (quot;
Actquot;
) in Director of Public Prosecutions (Appellant) v. Collins (Respondent) on appeal from [2005] EWHC 1308 (Admin). Their Lordship held that “to determine as a question of fact whether a message is grossly offensive, that in making this determination the Justices must apply the standards of an open and just multi-racial society, and that the words must be judged taking account of their context and all relevant circumstances.  Usages and sensitivities may change over time. Language otherwise insulting may be used in an unpejorative, even affectionate, way, or may be adopted as a badge of honour (“Old Contemptibles”). There can be no yardstick of gross offensiveness otherwise than by the application of reasonably enlightened, but not perfectionist, contemporary standards to the particular message sent in its particular context. The test is whether a message is couched in terms liable to cause gross offence to those to whom it relates.”<br />The instances/cases of offending emails, SMS <br />Cases abroad:<br />,[object Object]
A man was found guilty for tweeting airport bomb threat. His tweet, "Robin Hood airport is closed. You've got a week and a bit to get your shit together, otherwise I'm blowing the airport sky high!!" The tweeter Paul Chambers was actually just kidding. However, the police arrested him and he was charged with sending by a public communications network a message that was grossly offensive or of an indecent, obscene or menacing character contrary to Section 127 of the Communications Act 2003. A district judge at Doncaster Magistrates Court ruled that the Tweet was ''of a menacing nature in the context of the times in which we live''. Chambers has been ordered to pay a £385 fine, a £15 victims surcharge and £600 costs.
A man from South Yorkshire who sent offensive, threatening and abusive emails directed at children's social workers in East Sussex was convicted. The accused sent number of very disturbing, obscene and threatening emails in the Children's Services department. On the complaint of Children’s service department, the police investigated and the man behind the messages was traced and charged with offences under section 127 of the Communications Act.India<br />The threatening emails and SMS were hitherto covered under Section 506 Indian Penal Code. However, with the insertion of Section 66A IT Act, in force w.e.f. 27th October, 2009, these offending emails, SMS are covered under IT Act. <br />,[object Object]
Man arrested for making hoax call: A 25-year-old man was arrested on 9TH May, 2010  for making an anonymous call warning that Delhi Chief Minister Sheila Dikshit’s life was in danger. Veer Singh, a resident of Farsh Vihar in east Delhi, allegedly made the call Thursday to implicate a man who was harassing him to repay his dues. He had stolen a mobile phone from Narela in outer Delhi to make the call to the police control room and then called up the other man. Veer Singh thought the police would track down the other person and arrest him in connection with the death threat to the Delhi chief minister.
Threatening SMS sent to Shashi Tharoor, Ex-Union Minister for State and other Parliamentarians: The accused person “A” was having animosity towards other person “B” in a love triangle, and the A in order to frame B, impersonated himself as B and send threatening SMSs to parliamentarians. The various FIRs were registered u/s 66A IT Act, r/w 506, 507, 509 IPC was registered in various police stations in Delhi, Haryana and Himanchal Pradesh.The aforesaid incidents revealed that the offending SMS, emails were generally send by the accused persons via electronic medium be it mobile phone or computer network to implicate others. Thus, the alleged act of sending SMS via mobile phone or offending or threatening Email involving criminal intimidation including danger and obstruction are squarely covered under Section 66 A of Information Technology Act, 2000 and there is no application of Section 506 IPC to the alleged act. It would be pertinent to mention here that the bail of the accused person who sent threatening email to CM Naveen Patnaik was denied because of the applicability of Section 506 IPC which in State of Orissa is non bailable. However, the invoking of Section 506/507 IPC to the alleged act is not correct by virtue of Section 81 of the Information Technology Act, 2000 which gives an overriding effect to the provisions of the IT Act over the other Acts including the Indian Penal Code. It clearly states that, “the provisions of this Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force.” Thus, this section of the Information Technology Act 2000 if read with Section 66A  makes the legislative mandate very clear & loud that in matters pertaining to threat or criminal intimidation via a computer resource or communication device, the IT Act 2000 would have an overriding effect over other law including the Indian Penal Code in view of the clear mandate of Section 81 IT Act. The Section 81 IT Act, is reproduced below:-<br />“81. Act to have overriding effect.<br />The provisions of this Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force.<br />Provided that nothing contained in this Act shall restrict any person from exercising any right conferred under the Copyright Act, 1957 or the Patents Act, 1970.”<br />Even otherwise, Hon’ble Apex Court in case titled as Suresh Nanda Vs. C.B.I. in Criminal Appeal No. 179 of 2008 in SLP (Crl.) No. 3408 of 2007 held that the Special Act prevails over General Acts. The author has successfully represented the accused persons in the Shashi Tharoor SMS case and secured their bail by successfully arguing that in view of the specific provisions in the I.T. Acts, 2000, which are bailable in nature, the same would have the overriding effect by virtue of non obstante clause in Section 81 IT Act and the other offences of the IPC have been added by the prosecution merely for the purpose of making the offence non bailable in nature and they are not applicable. The author argued in length and stated vehemently before the Session Court that as the result of the investigation done by the Delhi Police which clearly reveals that the alleged act of threatening, criminal intimidation and endanger was with the sole intention to harass the other person involved in love triangle and clearly, there was no intention to execute the threat or commit extortion which is one of the essential ingredients to bring home the offences mentioned under Section 506 IPC. Even otherwise the offence u/s 506 IPC in Delhi is bailable. Further, no overt act has been alleged to be done by the accused persons which show any intention to execute the threat or extortion. <br /> HYPERLINK quot;
http://www.neerajaarora.comquot;
 Neeraj Aarora<br />(Advocate) <br />
The legislative response to grossly offensive or menacing emails and sms

More Related Content

More from Neeraj Aarora

More from Neeraj Aarora (6)

Current trends in cyber crime scenario
Current trends in cyber crime scenarioCurrent trends in cyber crime scenario
Current trends in cyber crime scenario
 
Blowing the whistle
Blowing the whistleBlowing the whistle
Blowing the whistle
 
State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...
 
DOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYDOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITY
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert Witness
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 

Recently uploaded

Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 

The legislative response to grossly offensive or menacing emails and sms

  • 1.
  • 2. A man was found guilty for tweeting airport bomb threat. His tweet, "Robin Hood airport is closed. You've got a week and a bit to get your shit together, otherwise I'm blowing the airport sky high!!" The tweeter Paul Chambers was actually just kidding. However, the police arrested him and he was charged with sending by a public communications network a message that was grossly offensive or of an indecent, obscene or menacing character contrary to Section 127 of the Communications Act 2003. A district judge at Doncaster Magistrates Court ruled that the Tweet was ''of a menacing nature in the context of the times in which we live''. Chambers has been ordered to pay a £385 fine, a £15 victims surcharge and £600 costs.
  • 3.
  • 4. Man arrested for making hoax call: A 25-year-old man was arrested on 9TH May, 2010 for making an anonymous call warning that Delhi Chief Minister Sheila Dikshit’s life was in danger. Veer Singh, a resident of Farsh Vihar in east Delhi, allegedly made the call Thursday to implicate a man who was harassing him to repay his dues. He had stolen a mobile phone from Narela in outer Delhi to make the call to the police control room and then called up the other man. Veer Singh thought the police would track down the other person and arrest him in connection with the death threat to the Delhi chief minister.
  • 5. Threatening SMS sent to Shashi Tharoor, Ex-Union Minister for State and other Parliamentarians: The accused person “A” was having animosity towards other person “B” in a love triangle, and the A in order to frame B, impersonated himself as B and send threatening SMSs to parliamentarians. The various FIRs were registered u/s 66A IT Act, r/w 506, 507, 509 IPC was registered in various police stations in Delhi, Haryana and Himanchal Pradesh.The aforesaid incidents revealed that the offending SMS, emails were generally send by the accused persons via electronic medium be it mobile phone or computer network to implicate others. Thus, the alleged act of sending SMS via mobile phone or offending or threatening Email involving criminal intimidation including danger and obstruction are squarely covered under Section 66 A of Information Technology Act, 2000 and there is no application of Section 506 IPC to the alleged act. It would be pertinent to mention here that the bail of the accused person who sent threatening email to CM Naveen Patnaik was denied because of the applicability of Section 506 IPC which in State of Orissa is non bailable. However, the invoking of Section 506/507 IPC to the alleged act is not correct by virtue of Section 81 of the Information Technology Act, 2000 which gives an overriding effect to the provisions of the IT Act over the other Acts including the Indian Penal Code. It clearly states that, “the provisions of this Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force.” Thus, this section of the Information Technology Act 2000 if read with Section 66A makes the legislative mandate very clear & loud that in matters pertaining to threat or criminal intimidation via a computer resource or communication device, the IT Act 2000 would have an overriding effect over other law including the Indian Penal Code in view of the clear mandate of Section 81 IT Act. The Section 81 IT Act, is reproduced below:-<br />“81. Act to have overriding effect.<br />The provisions of this Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force.<br />Provided that nothing contained in this Act shall restrict any person from exercising any right conferred under the Copyright Act, 1957 or the Patents Act, 1970.”<br />Even otherwise, Hon’ble Apex Court in case titled as Suresh Nanda Vs. C.B.I. in Criminal Appeal No. 179 of 2008 in SLP (Crl.) No. 3408 of 2007 held that the Special Act prevails over General Acts. The author has successfully represented the accused persons in the Shashi Tharoor SMS case and secured their bail by successfully arguing that in view of the specific provisions in the I.T. Acts, 2000, which are bailable in nature, the same would have the overriding effect by virtue of non obstante clause in Section 81 IT Act and the other offences of the IPC have been added by the prosecution merely for the purpose of making the offence non bailable in nature and they are not applicable. The author argued in length and stated vehemently before the Session Court that as the result of the investigation done by the Delhi Police which clearly reveals that the alleged act of threatening, criminal intimidation and endanger was with the sole intention to harass the other person involved in love triangle and clearly, there was no intention to execute the threat or commit extortion which is one of the essential ingredients to bring home the offences mentioned under Section 506 IPC. Even otherwise the offence u/s 506 IPC in Delhi is bailable. Further, no overt act has been alleged to be done by the accused persons which show any intention to execute the threat or extortion. <br /> HYPERLINK quot; http://www.neerajaarora.comquot; Neeraj Aarora<br />(Advocate) <br />