Professional Documents
Culture Documents
In todays world technology is playing a very important role. Now a days people are so busy in their
social life that they don’t get time to spend some time with their loved once. We can say that
technology is controlling the whole society or world. Technology is good for the society as well as
evil for the society. Now just clarify this sentence that how is it good and how is it bad. If we talk
about technology in good sense then the first reason why technology is good for the society is that it
connect us throughout the world. We basically share our past, enrich our present and secure our
future through the use of social media. Skype and Google are the best way to connect with our
friends, family. Texting, calling, and e-mailing have revolutionized the way we keep in touch and
these forms of communication only continue to advance. The second reason why Technology is good
for the society is that it conserves energy and produces more goods. HOW? Basically technology
allows us to find different alternatives of using non Reneawable and costly resources. From hybrid
vehicles to energy efficient light bulbs, there are ways to save everywhere. One machine can do
today in minutes what in years past would have taken days to accomplish. The third reason why
technology is good for the society is that it helps in doing online payments, and for business
purpose technology is playing a very important role. For example: there are many social websites
which are doing their business in a very good way and is also expanding their business with the help
of technology. Some of the best websites are Flipkart, amazon, jabong, etc. As we are being saying
that technology is good for society but it is also evil for the society.HOW? Basically the first reason is
that Cyber bullying and sexual predator activity is reaching new lengths. As technology grows, so
does the means by which predators and bullies can target their victim. The second reason is the
depravation of privacy and security. We know that world is experiencing many advances in the
technology but they are also facing problems with regard to privacy and security. Privacy issues are
basically connected with tracking location and spying on information. It is correctly said that it is very
easy for the professionals to trace and keep an eye on any of the electronic devices that connects to
a network by simple tracking the IP location. Nw a days some advertising websites can track
location, watch what users do and see what the users like and dislike by s doing a survey of which
products are more preferred, while some countries usually spy on another countries to maintain its
internal security and spy on extremely important information. The third reason why technology is
not good for the society is the social issues. For the benefit purpose enormous websites are being
established and games are one of them. Some of the games make it more similarities to the real life.
Games are so realistic that they are killing and other disguisting scenes are included in games. These
serious effects are basically divided into two main categories which are temper fluctuating and lack
of social skills. The forth reason is that people use to thread the victims by making amageos videos
which may lead to suicide of the victims. 8
Initially technology was made to serve the world but people have use it in a wrong way which have
basically caused serious problems that are health problems, privacy problems and social problems.
Health problems are considered as critical issues which affects mental and physical health of the
user. Moreover, privacy is negatively affected due to spying and stealing of information of users.
Furthermore, socializing is affected by rapid change of temper and lack of social skills. People should
spend less time and communicate with each other and use technology in rates that it doesn’t hurt
people to avoid getting any problems in the future. 5
So to protect the technology activities from all frauds government has enacted Information Technoly
Act 2000 and it was amended in the year 2008 and was named as Information Technology Act (
Amendmend) 2008.
INFORMATION TECHNOLOGY ACT 2008 Amendments were done as the original bill have failed to
improve further development of IT sector and related security concerns. Many changes were taken
place and some of them were a new definition were given to the word “communication device”.
This act also focused on validating the electronic signature by making the owner of the given IP
address responsible for content accessed and also making corporation responsible for implementing
effective data security practices and liable for breaches.
This Amendments have been criticized for decrizing the penalties for cybercrimes and also for
lacking sufficient safeguards to protect the civil rights of the indivisuals. Section 69 of this act
authorizes the government to monitor, intercept, and block data at its discreation. Pavan Duggal a
law consultant says that ‘ The act have provided the government with the power of survilance, block
data traffic. This new power have given the government a texture and colour of being a survilance
state.
Till nw we came to know many things about the technology and The Information Technology ACT,
2008. Now
INTERMEDIARIES UNDER INFORMATION TECHNOLOGY ACT, 2008
Intermediaries have been defined under section 2 (1) (w) of Information Technology Act, 2008.
Intermediaries are the person who on behalf of any other person stores or transmits that message
or provides any services with respect to that message. This act has clarified the definition of
Intermediaries including the telecom service provider, web-hosting service provider, online
payment sites, internet service provider, and many more. Intermediaiers are entitled that provide
services enabling the delivery of online content to the end user. Some of the players involved in this
are as follows:
INTERNET SERVICE PROVIDER : ISPs like Airtel basically help users to connect to the internet
by means of wired or wireless connections.
WEB HOSTS: These are service providers like godaddy.com that provide space on server
computers to place files for various web sites so that these sites can be accessed by users.
INTERACTIVE WEBSITES: These includes social sites such as facebook, Twitter,snapchat etc
which act as a platform to store the bloging platform such as blogspot or wordpress. There
are auction sites such as Ebay etc.
Cyber Cafes: All information as being given from here and basically are used by the society.
An intermediary may held to be liable for infringing content hosted on its platform only when it has
specific or actual knowledge or a reason to believe that such information may be infringing.
Once an intermediary has been informed by a complainant of potentially infringing content hosted
on its platform, it is not obligated to proactively verify and remove content subsequently hosted on
its platform that may infringe the intellectual property rights of the complainant.
Before the Information Technology Amendment Act 2008 came into force, the scenario in India was
worse for intermediaries. Intermediaries were liable for their users content. This led to the arrest of
Bazee.com chief Avinash Bajaj in connection with the sale of the infamous DPS Noida MMS clip CD
on the website. Post the Bazee.com fiasco the Information Technology Laws have been amendedThe
Information Technology (Amendment) Act 2008 makes a genuine effort to provide immunity to the
intermediaries but needs to plug in some gaps so as to enable the intermediaries to operate without
fear and inhibitions.
DUE DELIGENCE TO BE OBSERVED BY THE INTERMEDIARIES
(1) The intermediary shall publish the rules and regulations, privacy policy and
user agreement for access-or usage of the intermediary's computer resource by any person.
(2) The intermediary, on whose computer system the information is stored or hosted or
affected person in writing or through email signed with electronic signature about any
such information as mentioned in sub-rule (2) above, shall act within thirty six hours and
where applicable, work with user or owner of such information to disable such information
that is in contravention of sub-rule (2). Further the intermediary shall preserve such
information and associated records for at least ninety days for investigation purposes,
(5) The Intermediary shall inform its users that in case of non-compliance with rules and
regulations, user agreement and privacy policy for access or usage of intermediary
computer resource, the Intermediary has the right to immediately terminate the access or
usage lights of the users to the computer resource of Intermediary and remove noncompliant
information..
(6) The intermediary shall strictly follow the provisions of the Act or any other laws for the
(7) When required by lawful order, the intermediary shall provide information or any such
1330 GI/11-3B
Printed by the Manager, Government of India Press, Ring Road. Mayapuri. New Delhi-110064
and Published by the Controller of Publications, Delhi-1 I0054
investigative, protective, cyber security activity. The information or any such assistance
shall be provided for the purpose of verification of identity, or for prevention, detection,
any law for the time being in force, on a request in writing staling clearly the purpose of
(8) The intermediary shall take all reasonable measures to secure its computer
resource and
(9) The intermediary shall report cyber security incidents and also share cyber
security
Team.
(10) The intermediary shall not knowingly deploy or install or modify the
technical configuration of computer resource or become party to any such act which may
change or has the potential to change the normal course of operation of the computer
resource than what it is supposed to "perform thereby circumventing any law for the time
being in force:
technological means for the sole purpose of performing the acts of securing the
(11) The intermediary shall publish on its website the name of the Grievance Officer
and his
contact details as well as mechanism by which users or any victim who suffers as a
result of access or usage of computer resource by any person in violation of rule 3 can
notify their complaints against such access or usage of computer resource of the
intermediary or other matters pertaining to the computer resources made available by it.
The Grievance Officer shall redress the complaints within one month from the date of
receipt of complaint