Download Now
Home Blog Page 497

What are the limitations of online contract : an analysis

0

This article has been written by Jyotiranjan Mallick pursuing the Diploma in Cyber Law, FinTech Regulations and Technology Contracts from LawSikho. This article has been edited by Aditi Deshmukh (Associate, Lawsikho) and Dipshi Swara (Senior Associate, Lawsik

Introduction 

With the rampant development of Information technology, telecommunication, software, and cyber infrastructure there is a rapid change in lifestyle. This modern development of cyber infrastructure has also impacted the manner in which businesses operate since information and dissemination of the data takes place within seconds through the cyber network of the internet. This is the place where concepts such as e-commerce and e-contracts come into play, which provides flexibility in terms of operation of businesses and executing contracts through the virtual medium of the internet. The rise of e-commerce and e-contracts results in a high level of  “enterprise integration” wherein these contracts become a daily part of our commercial lives. The rise of e-contracts however comes with its own sets of legal and conceptual implications. 

Meaning of E-Contract

E-contract can be defined as any contract formed in the course of e-commerce by the interaction of two or more individuals using electronic ways, such as e-mail, or other option the interaction of an individual with an electronic agent, such as a computer program, or any software. In India per the Information Technology Act, 2000 particularly Section 10-A which was introduced with the IT amendment act 2008, an electronic contract is held to be valid and enforceable.

Since section 10 of the IT Act gives the validity to e-contracts, the next set of steps includes the additional compliances that must be made for its validation. For the validity of the e-contract, an electronic signature comes to play. An electronic signature is defined by the IT Act, Section 2(p) as the authentication of any electronic record by a subscriber by means of the electronic technique specified in the second schedule and it includes a digital signature.

An electronic signature serves the same aim as that of a hand signature. Further Section 85 c of the Indian evidence act states that as far as a digital signature is concerned, the courts presume that the information provided in that certificate is true and correct. As long as there are two parties who have executed the e-contract with the digital sign it will be held to be valid. 

What are the essentials of E -contract ?

Similar to the application of a traditional contract the smart contract also has to follow its essential ingredient for it to be deemed as a “valid contract”. Take for consideration a clickwrap contract, before agreeing to the box that states “I Agree” or “I agree to the terms” the catalogue represents a set of terms that you must affirm before proceeding further. This catalogue represents an “offer” which if agreed by asserting the “I agree” constitutes the acceptance of the contract. The crux of a contract being completed, the auxiliary ingredients such as lawful consideration, competency of the parties to contract and the free consent is by default implied with the assent to the “I agree”. However, the contours of smart contracts unlike the traditional contract is majorly operated via the internet or blockchain which results in creating its own sets of limitations which will be discussed in the next section. 

Feelium E Contract on Twitter: "Have a look at the Essential of an E- Contract. Follow us for regular updates. #Econtracts #Feeliumecon #digital # contracts #legal #documents #electroniccontracts #econtract #secure  #legalrisk #compliance #consent #offer #

What are the general limitations of the e- contract?

  1. Jurisdiction 

One of the general limitations of e-contracts is the virtual medium within which it operates. The Internet represents a medium that doesn’t have any set or defined territorial boundaries. The manner in which the network node operates can transgress any international boundaries. This means that an e-contract can be executed between the two individuals sitting from the two opposite corners of the world. The complexity of delineating a boundary represents a dilemma of ascertaining the jurisdiction as to where the contract was formed, what would be applicable domestic law in case such a source is determined, etc. This results in complex litigation which consumes a lot of time in delineating such jurisdiction let alone adjudicating the issue to resolve the same. 

  1. Formation of the contract 

The complicity of the internet as a mode of forming the contract has resulted in creating certain uncertainties. One of the uncertainties is whether the website owner who is using the web address as a  medium to formulate the contract is acting in the capacity of an offer maker or someone who is making an invitation to the offer. Does the potential customer’s communication constitute an offer or an acceptance? 

The answer will dictate the time and place a contract is made. This is the reason that an e-commerce business should clearly stipulate a method of acceptance of the contract for selling the item on its website. For example, the medium should reciprocate that the medium such a website or the app is a facilitator for an invitation to offer and should mandate that any indication of interest sent by an e-customer is an offer, not an acceptance. Once the e-business receives an offer from a purchaser, it can decide whether or not to accept. 

3. Validity of the Electronic contract 

Another emerging issue is the legal validity of Web wrap or click-on contracts. These types of clickwrap agreement or end-users license acceptance are mainly found when you are trying to purchase certain items from the internet or installing software etc. This mechanism allows the user or customer to purchase the product or service by clicking agree to the terms by clicking a box on the screen that says “OK” or “I agree.”. The complication however arises as to when the acceptance takes place. Traditional contract law usually holds that an acceptance takes place when sent by the offeree using an authorized mode of communication. This is referred to as the “mailbox rule”. 

In the case of the internet as a mode that involves an instantaneous mode of communication the interpretation of the acceptance can be understood Enrores u. Miles Far East Corporation where an English court ruled that acceptance is effective upon receipt in situations involving instantaneous forms of communication. This is generally followed in the case of e-contract however from the depiction it’s clear that it is in abrogation of the mailbox rule, but is consistent with the policy in the virtual medium. However, complications arise when a conflict emerges in the application. Thereafter, the rule of interpretation will apply for considering acceptance. 

Limitations of E-contract vis a vis Indian Contract law 

The formation of the contract under the Indian law is governed by the Indian contract act 1872. The contract act however only specifies basic criteria such as a lawful object, free consent, the competence of the parties etc. which is not in pace with the various applications of smart contracts or electronic contracts. 

  1. One of the key problems that arise is the mechanism under which the contracts are formulated under the contract act. Section  4 of the Indian Contract Act follows the postal rule method for determining the communications. As previously discussed, this postal/mailbox rule which confirms the acceptance to the contract when the other party receives a receipt of the same.

In the case of online contracts, the method is instantaneous communication where a simple click to order something from an online shopping portal leads to a complex electronic contract and. an ordinary consumer may lack the capacity to understand the issues arising out of the same. . For instance, in e-mail contracts, the recipient may not be aware of the acceptance till he checks his email. In terms of the applicability of the Contract act to such modern technologies, complications arise to determine the “acceptance” of the contract. For understanding, if we were to apply the “mailbox/postal” rule then in communication involving tech, e-mail, e-commerce sites the acceptance should technically be completed the moment the communication of acceptance is sent. 

This is owing to the fact that per the contract act, such acceptance is complete against the offeror and a valid contract has already arisen irrespective of whether the offeror has checked his messages or not. On the other hand, in case of website contracts, offer and its acceptance may be simultaneous and instant resulting in a binding contract upon a mere click‘ even when such click may be due to server error or by mistake on part of the consumer. This might create a legal and logistical complication of determining as to when the contract was completed/accepted creating problems in ascertaining jurisdiction to adjudicate commercial disputes. 

  1. Another issue that arises with electronic contracts is the flaw in giving a free and fair consent to the terms of the same. In traditional terms of law, a contract is an agreement between two people who agree to the same objectives with a consensus of mind, with additional requirements such as competence, free consent and lawful objectives. The rationale is that parties are on the same level of transactional power with no one having a disproportionate influence over the other party. This is however not the case in online contracts, specifically clickwrap agreements and other standardised forms of transaction in commerce/banking where one party sets the terms and conditions for the entire contract. This results in disproportionate influence of one party over the other which attracts manifold numbers of cases of mistake, misrepresentation or fraud wherein the other party is forced  to enter such contracts due to a huge volume of terms in the same.

Conclusion 

Electronic contracts simplify daily transactions for an e-consumer to a large extent. However, they also give rise to issues of free consent and freedom to contract. To reside the responsibility of the caution all on the hands of the consumer would result in creating a disproportionately inequivalent ecosystem. Hence caution should not be the only solution that should be available with the customer of an e-contract. There needs to be proper supervision to the terms that are set to the e-contracts. Moreover, there needs to provide accessible solutions in a limited time span for daily dishonored e-contracts.


Students of Lawsikho courses regularly produce writing assignments and work on practical exercises as a part of their coursework and develop themselves in real-life practical skills.

LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:https://t.me/joinchat/J_0YrBa4IBSHdpuTfQO_sA

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

Pro bono cases in India : an overview

0
Image Source: https://bit.ly/2uAnAwt

This article is written by Amrit Kaur, a student of Dr. B.R. Ambedkar National Law University, RAI, Sonepat. The article gives an overview of the pro bono cases in India.

Introduction

Pro bono is an abbreviation for the Latin phrase pro bono publico, which translates as “for the public good.” The phrase typically refers to professional services that are provided for free or at a reduced cost. Professionals from a variety of disciplines provide pro bono services to nonprofit organizations. Hospitals, universities, national charities, churches, and foundations are among these organizations. It is also possible to do pro bono work for individuals who are unable to pay. 

The phrase pro bono is primarily used in the legal profession. Pro bono lawyers serve the public interest by offering free legal services to people in need. Instead of working for profit, the practitioner is believed to work for the benefit of the larger good. The American Bar Association, which has a pro bono centre on its website, urges all attorneys to volunteer 50 hours per year to pro bono cases.

With so many people living below the poverty line, India’s economic situation makes providing efficient legal services challenging. When a substantial portion of the population struggles to obtain even necessities of life, it is unreasonable to ask them to pay for legal expenses. It is also unfair for lawyers to seek fees that are not proportional to their clients’ economic circumstances.

So, here comes the role of pro bono legal services which as stated above refers to the practice of providing legal aid to those individuals who cannot afford to hire an attorney. Those who are in actual need of legal assistance are represented by attorneys for free or at a low fee. In such instances, the lawyer realizes his responsibility to advance social objectives and thus works selflessly in the interests of society.

The legal perspective

The right to free legal aid is enshrined in Article 39A of the Indian Constitution. Part IV (Directive Principles of State Policy), added by the Constitution (42nd Amendment) Act 1976, states that the State is obligated to keep a check that the legal system provides equal justice to all its citizens. The state must offer free legal assistance to individuals who cannot access justice due to financial constraints.

In the case of Hussainara Khatoon v. Home Secretary, State of Bihar (1979), the Supreme Court held that the right to a speedy trial is a fundamental right guaranteed under Article 21 of the Constitution. Furthermore, according to Article 22(1) of the Constitution, the accused in a case, has the right to be represented by any legal practitioner of his choice.

The Supreme Court, in the case of State of Maharashtra v. Manubhai Pragaji Vashi and Ors. (1995), held that failing to give free legal help to an accused at the expense of the state unless the accused himself refuses for the same, would jeopardize the whole trial. Further, Justice Krishna Iyer stated in the case of M.H Hoskot v. State Of Maharashtra (1978) that providing free legal assistance is the state’s responsibility and not the government’s charity.

Similar rules on free legal assistance can also be found in the Code of Criminal Procedure, 1973 and the Code of Civil Procedure, 1908. According to Section 304 of the Criminal Procedure Code, the state is obligated to offer legal aid to anybody accused of an offence that is to be tried in the Court of Sessions. Moreover, Order 33 of the Civil Procedure Code discharges a person from the liability of paying court fees if he/she does not have the required means to seek justice.

The Legal Services Authority Act, 1987 (LSA) was also enacted which took effect on November 9, 1995. The Act specifies the scope of legal assistance available for the economically weak, backward section and the disabled people. ‘No one must be denied access to justice because of economic or other limitations,’ is the vision of this Act. The  Act strives to educate people about the law, provide free legal assistance, and organize Lok Adalats. The introduction of Lok Adalats under this Act marked the beginning of a new chapter in the country’s legal system. It was successful in providing litigants with a secondary forum for conciliatory conflict resolution. The Legal Service Committees were also established at the Supreme Court and High Courts as a result of the Legal Services Authorities (Amendment) Act of 2002.

At the International level, legal aid representation is stated in Article 14(3)(d) of the International Covenant on Civil and Political Rights. It stipulates that the accused has the right to choose his counsel, who must offer competent representation in the interests of justice.

The current state of pro bono cases in India

While pro bono work is encouraged under Indian law, it is fraught with difficulties. To begin with, India’s growing need for commercial attorneys stifles pro bono sector development. Furthermore, India’s enormous diversity, its liberal laws and jurisprudence concerning legal services for the underprivileged, its large population living in poverty, its history and current status as a secular, democratic, republic and its recent economic growth, as well as the expectations that growth has raised, all combine to create a unique and challenging environment in which the pro bono legal services sector is developing.

​​There are several public complaints about the formal legal system, including corruption, judicial efficiency, and lack of public faith in the judiciary, all of which leads to informal conflict settlement. Pendency has been one of the most serious issues confronting India’s legal system. Nearly 30 million cases were pending in Indian courts as of April 2015, according to estimates. Furthermore, there are more than 345 vacancies for judges pending confirmation and appointment at the High Court level, which exacerbates the situation. Lawyers, activists, and even Supreme Court judges have focused their attention on this issue, which is critical to understanding not only how legal services are provided and regulated in India, but also the real opportunities and challenges that lawyers interested in providing pro bono services in India face.

Over the last three decades, legislative, institutional, and jurisprudential reforms in India have provided the groundwork for the underprivileged to get free legal services. In practice, however, only a few organisations efficiently provide these services, relying on India’s unique PIL process for legal assistance. 

Also, it is to be noted here that, at present, foreign-qualified attorneys are prohibited from representing pro bono clients under domestic Indian law. Foreign-qualified attorneys can, however, actively contribute to pro bono legal services by contributing research and writing skills in individual cases, as well as indirectly, by partnering with Indian organizations to build capacity. The demand for pro bono legal services in India greatly outnumbers the supply, and thus, determined, organized efforts by the legal professionals would go a long way towards ensuring legal aid to the needy and access to justice to all as stipulated by the Constitution.

Efforts of the government in providing free legal assistance

Under the Legal Services Authorities Act, 1987, the Central Government provides financial support to State Legal Services Authorities (SLSAs) through the National Legal Services Authority (NALSA). As per Section 12 of the aforementioned Act, one of the responsibilities is to provide free legal assistance to all eligible categories of persons, including the destitute and prisoners awaiting trial. Accordingly, NALSA allocates cash from grants-in-aid obtained from the Central Government to various SLSAs in order to fulfil those goals. SLSAs also get grants or donations from their respective state governments.

The Government has even introduced three legal empowerment initiatives, i.e., Tele-law, Pro Bono legal services, and Nyaya Mitra. Tele-law project was started in 1800 Gram Panchayats in 11 states of the nation to provide free legal assistance to marginalized individuals under Section 12 of the Legal Services Authorities Act, 1987.  Other people can get legal advice for 30 rupees only. Lawyers on the panel are available by video conferencing or telephone conversation at Common Service Centres (CSCs). In February 2019, Tele-law released a mobile application and a dashboard to facilitate last-mile connectivity.

Free legal assistance, including legal representation, is offered to marginalized individuals via the Pro Bono legal services program also, which is governed by Section 12 of the Legal Services Authorities Act, 1987. Five hundred and thirty-three attorneys have signed up to offer pro bono legal services under the scheme. 

Nyaya Bandhu, a mobile app was launched in February 2019,  to connect registered pro bono advocates with registered applicants. Additionally, through the legal services clinics established in jails, NALSA provides free and competent legal assistance to under-trial prisoners and convicts. In magisterial and session courts, about 11,800 remand advocates have been appointed to provide legal services to arrestees in criminal courts. 

Furthermore, at regular intervals, awareness camps/programs are held in jails to inform inmates about free legal assistance and their legal rights, including the right to bail. Legal Services Authority officials visit jails on a regular basis to identify inmates who want legal assistance and guidance. Besides these steps, a district judge-led Under Trial Review Committee has been established in each district to review the cases of all under-trial who have completed half of the maximum sentence allowed for the offences they are charged with.

Benefits of investing in pro bono cases

Here are a few reasons why law firms and individual lawyers should devote more time and effort to expanding its pro bono program:

Offers a lot of experience

Pro bono work typically allows lawyers to practise in areas of law that are not their primary focus. For example, when a firm partners with a legal aid clinic, it obtains a list of cases that require attorneys. In that list, if there is a benefits lawsuit, it may be handled by a corporate litigator whereas an IP attorney might assist someone with their immigration status. Thus, lawyers get a chance to work in different focus areas than their own. Attorneys can brush up on areas of law that they may not have thought about since law school. Most people find it rewarding, and in some cases even enjoyable.

Creates a conducive environment for collaboration

Pro bono cases provide attorneys with the chance to work with other lawyers in their firms who they would not otherwise know, as well as practice in areas outside of their day-to-day work. This fosters collaboration and increases future cross-firm prospects. It also assists attorneys in forming networks with other lawyers who work for legal assistance foundations. Networking leads to business development, which helps the firm as well.

Appeals to prospective candidates

The question of pro bono work of the firm is commonly asked by the prospective candidates, when a firm is recruiting new attorneys, particularly from younger generations. A pro bono program that is at least moderately active, can help a firm to recruit new talent in the coming several years. This is because work done by a law firm in the field of pro bono attracts prospective candidates to seek jobs in that particular law firm.

Enhances the talents of young lawyers

As long as one is talking about young talent, working in the field of pro bono helps young attorneys to develop their skills by gaining experience and exposure. It’s a win-win situation for the young attorneys and the society as it would help in tapping the youthful enthusiasm and desire of the young lawyers to serve society.

The reputation of the firm is enhanced

For the firm’s image, doing pro bono work is beneficial. Many, if not all, awards and recognitions for law firms now require information regarding pro bono work performed by the firm. If the firm is unable to demonstrate that it does not perform this type of community service, its chances of getting such accolades plummet.

Provides a sense of self-fulfilment

Perhaps the most essential feature of pro bono is the fact that it is done for free. It is believed that assisting others when in need with their legal work for free or at a reduced rate re-energizes and re-commits a firm or an attorney to the law. As a result of their pro bono work, attorneys are constantly reminded that they practice law to assist humanity. By providing pro bono legal services, lawyers have the potential to inspire and encourage people in dire and hopeless situations to face difficulties with courage.

Conclusion

The pro bono sector in India still needs to be developed more. Though the government is trying its best to foster this sector, the sector needs a constant commitment from the legal fraternity for its growth and development. Every lawyer should devote at least some part of their professional life towards such cases, after all, the right to justice is absolute and non-negotiable.

 References


LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

https://t.me/joinchat/J_0YrBa4IBSHdpuTfQO_sA

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

All you need to know about Data Sharing Agreement

0
Personal data
Image Source - https://rb.gy/vxgav2

This article is written by Nidhi Mishra, pursuing Diploma in Advanced Contract Drafting, Negotiation, and Dispute Resolution from LawSikho. The article has been edited by Ruchika Mohapatra (Associate, LawSikho) and Dipshi Swara (Senior Associate, LawSikho).

Introduction

What is a Data Sharing Agreement?

Data Sharing Agreement, as the name suggests is an agreement that is entered into by the parties to regulate the terms and conditions of their data sharing activity.

In the digital era, data has become the new oil, data privacy is a prime concern. In these times when an individual’s digital data is being tracked, they should at least have control over what data is being stored, who is storing their personal data and the authority and means to be able to delete them at any time they wish. The right to privacy is at maximum risk on the internet by theft of personal data and its use for monetary gains, etc.

Purpose of a Data Sharing Agreement

Data Sharing Agreement is necessary as it governs what data would be shared between the parties, for what purpose, its collection, storage, use, transmission, re-use and destruction. It also covers what is to happen to the data at each stage, sets standards and helps all the parties to be clear about their respective roles along with detailing what data is to be shared between the parties.

Properly documented and a well-drafted data sharing agreement prevents any sort of miscommunication between the parties and also prevents the misuse of data by the parties involved.

The amount of detail that is to be mentioned in the agreement should be commensurate with the nature of the data to be collected, the likelihood of a privacy breach, and the possible magnitude of harm that may occur to participants if their privacy rights were violated.

Applicability of a Data Sharing Agreement

This type of agreement is most common between governmental or private organizations involved in the area of research and policymaking. The agreement can or cannot be for consideration and generally are entered in the nature of MOU when these are without consideration. Lack of consideration itself does not implicate the non-binding nature of an MOU. It is the intention of the Parties that is inferred from the terms of the MOU that makes it binding or not binding and a binding MOU is as enforceable before the court of law as is any other agreement. Government departments and other public bodies like regulators, law enforcement bodies may enter into a memorandum of understanding with each other that includes data sharing provisions and fulfils the role of a data-sharing agreement. Some recent examples would include CBDT and CBIC entering into one such agreement and SEBI entering into Data Sharing Agreement with CBDT. 

How is a Data Sharing Agreement different from a Non-Disclosure Agreement?

Data Sharing Agreements as opposed to the Non-Disclosure Agreement are the primary contract between the parties to govern their activity of sharing data. This data sharing act can be for any purpose like research activities, marketing activities or merely for record-keeping. 

Non-Disclosure Agreements on the other hand are more of an incidental contract to some main contract that defines the relationship of the parties. These are entered into to prevent any unauthorized use or transmission of any confidential information that parties might share as part of their business or any other relationship. Here parties first enter into a business contract like software agreement, staffing services agreement, a business collaboration agreement or any agreement governing their business relationship. To protect the data that parties may disclose to each other in furtherance of these aforementioned agreements, parties enter into a Non-Disclosure Agreement.

In both Agreements, Parties are bound by the confidentiality of the Data that is being shared between them, but in the former, Data Sharing is the primary act whereas in the latter data sharing is consequential to some business dealing or act.

Points to remember while drafting a Data Sharing Agreement

In addition to the other boilerplate clauses, one should keep the following pointers handy while drafting a Data Sharing Agreement:

  1. The Agreement should clearly and specifically state what data is being shared and for what purpose and whether the data is public data or personal data. Public data is available for the public at large and anyone can have access to it therefore security and protection of such data would be negligible whereas on the other hand private data is personal to the subject and cannot be shared without the subject’s prior permission and therefore would require stricter data protection and data security clauses. 

Sample Clause: 

The purpose of this Agreement is to facilitate the submission of data to Company X for the creation, use, and maintenance of a system of integrated social, health, and educational data concerning citizens of Country Z, in order to obtain a more complete understanding of the service needs, service gaps, and impact of services. The data will be used for the following purposes: 

a. For inclusion in the case management system, to coordinate, manage, track, and report on the services provided to individuals and families. [Subject] agrees to allow the disclosure of personally identifiable information to the entities shown in Exhibit A to this Agreement provided that (i) appropriate consent or authorization if required for use, has been obtained from the individual or the individual’s parent or guardian; and (ii) role-based access control is assigned as specified in Exhibit A. 

b. For research and evaluation purposes to study and report on the impact of services provided by organizations contributing data and to study and report on factors related to service provision, assessment of need, and topics relevant to innovating new approaches to benefit the citizens of Country Z.

  1. The time period of data sharing should be clearly mentioned. The Agreement should clearly state the duration for which the data can be used by the other party and what will happen post-termination, whether the shared data shall be returned to the disclosing party or destroyed by the receiving party. 

Sample Clause: 

Term- This Agreement shall be in effect for a period of five years from the Effective Date unless terminated before in accordance with the Termination clause. Parties shall have the option to renew the Agreement by mutual decision post completion of the Term of this Agreement.

Termination– This Agreement may be terminated by either party by giving thirty (30) days written notice to the other party. In the event of the termination of the Agreement, the Parties shall, upon request, (1) delete all data containing individually identifying information obtained under this Agreement; and (2) certify in writing within ten (10) business days that all copies of the data stored on cloud-based or local servers, backup servers, backup media, or other media have been permanently erased or destroyed.

  1. The provision should be made for its limited or unlimited use and its storage, protection and transmission. It should clearly be pointed out in the agreement if the receiving party can use the data only for a single purpose and object or if it can be used repetitively as and when the need arises. Further, the contract should also mention if the receiving party is allowed to disseminate the aforementioned data to other third parties or its own subsidiaries and affiliates and to what extent. 

Sample Clause: 

a. Company X and Organization Y will be joint custodians of the raw and linked data sets and will be responsible for the observance of all conditions for use and for establishment and maintenance of security arrangements as specified in this Agreement to prevent unauthorized use. 

b. Unless otherwise stated or modified in this Agreement, Company X and Organization Y shall manage, link, and store data as specified in Exhibit C to this Agreement. 

c. Company X will not use Confidential Information for any purpose other than the purposes specified in this agreement. The Company X and Organization Y will fully cooperate with [Subject] in the event that an adult individual or the parent or guardian of a minor under 18 years old requests the opportunity to review his/her personally identifiable information disclosed to Company X and/or Organization Y by [Subject] or wishes to revoke their consent to data sharing with the Company X and/or Organization Y. [Subject] will notify the Camden Coalition and CFS in the event it obtains written consent for data sharing with the Company X and Organization Y, a revocation of consent to share data with the Company X and Organization Y, or a request to review personally identifiable information stored by the Camden Company X and Organization Y from an adult or parent/guardian of a minor under 18 years old. 

d. [Subject] will not release any data it receives as a result of its participation in this Agreement to any third parties not specifically authorized to have access to such data under this Agreement.

  1. The nature of the information that is shared sets the mood of the entire agreement. For example; if the data shared is of the nature which is personally identifying and highly restricted then it should be subject to intense scrutiny and safeguards while on the other hand anonymous information will require limited safeguards.

Sample Clause: 

Data shall be provided by Provider in a sufficiently secure manner and Parties shall handle all Data in accordance with the applicable data protection law and shall keep such data confidential.

  1. With respect to the data, the Recipient shall be considered to be a separate data controller under the applicable data protection law for the processing of the data for the Recipient’s research plan. 
  2. The Recipient shall implement appropriate technical and organizational measures to meet the requirements for data controllers of the applicable data protection law.
  3. If the Recipient becomes aware of a personal data breach, Recipient shall promptly notify the provider. In such a case Parties will fully cooperate with each other to remedy the personal data breach, fulfil the statutory notification obligations timely and cure any damages. The term ‘personal data breach’ refers to Articles 33 and 34 of GDPR.
  4. In the event that the Subject withdraws his/her permission for the use thereof, Provider shall supply Recipient with sufficient information and Recipient shall immediately cease all use of the relevant data and shall delete all copies of the relevant data. Upon request from Provider, Recipient shall confirm in writing the complete deletion of such data.

Provider shall be the data controller of the data under the GDPR up until the moment the data is provided to the Recipient.

  1. Provisions regarding Data Protection should be bi-fold i.e. firstly the data protection and security needs to be taken care of by putting in place relevant clauses regarding storage and transmission and secondly, efforts should be made to protect the trade secrets and other related IP rights and a separate clause is also be required for the same and should clearly mention with whom the IP Rights of the data belong and with whom the ownership remains during and after the contract. The on which the receiving party is entitled to use the IP rights of the disclosing party also needs to be a part of the data-sharing agreement. 

Sample Clause: 

All rights, titles, and interests in Subject Data will remain the property of Subject.  The Provider has no intellectual property rights or other claims to Subject Data that is hosted, stored, or transferred to and from the products or the cloud services platform provided by   Provider, or to Subject’s Confidential Information. The Provider will cooperate with the Subject to protect the Subject’s intellectual property rights and Subject Data. The Provider will promptly notify the Subject if the Provider becomes aware of any potential infringement of those rights in accordance with the provisions of this Agreement.

  1. The consent of a data subject must always be obtained before his or her personal data is shared and the extent of sharing and extent of usage ought to be agreed upon by the data subject. In case of any deviation from the pre-arranged and pre-consented sharing, the contract would be declared to have been breached.

Sample Clause:

It shall be the responsibility of the Provider to take due permissions and authorization from the Subject before using and disseminating any personal data of the Subject to the Recipient.

  1. Depending upon the amount of data and its availability in various forms will determine how the data will be shared and would ultimately pose a question as to which party would bear the cost of sharing the data and a very specific provision governing this issue should be the part of a data-sharing agreement. If the data is available in digital form or in hard copy format. What is the size of the data available? Which party would bear the cost of managing and procuring the devices required to store and transfer data? If it’s in hard copy format, which party would bear the cost of copying and transferring the data from one place to another? 

Sample Clause: 

The requisite data is available with the Provider in digital format and is of size 50 TB. It shall be the responsibility of the Recipient to procure storage devices for the transfer, storage and safekeeping of the Data. 

  1. Even though the circumstances require data-sharing, the data should not be shared in the following cases:
  1. When the disclosing party does not hold intellectual property rights,
  2. When the subjects have expressed a preference to not have their data used or shared for other activities or other research,
  3. When the data is embargoed or otherwise restricted under pre-existing agreements,
  4. When the data is involved in litigation,
  5. The Liability clause should clearly establish the liability that parties would entail in case of breach of any contractual obligation, such as when one of the parties discloses the data received from the other party to another party not authorized to receive the data.

Sample Clause: 

Provider agrees that it will monitor and test its Data Safeguards from time to time, and further agrees to adjust its Data Safeguards from time to time in light of relevant circumstances or the results of any relevant testing or monitoring.  If Provider suspects or becomes aware of any unauthorized access to any Subject Data or Personal Data by any unauthorized person or third party, or becomes aware of any other security breach relating to Personal Data held or stored by Provider under this Agreement or in connection with the performance of services performed under this Agreement, Provider shall immediately notify Subject in writing and shall fully cooperate with Subject at Provider’s expense to prevent or stop such Data Breach.  In the event of such data breach, Provider shall fully and immediately comply with applicable laws, and shall take the appropriate steps to remedy such Data Breach. The Provider will defend, indemnify and hold Subject, its Affiliates, and their respective officers, directors, employees and agents, harmless from and against any and all claims, suits, causes of action, liability, loss, costs and damages, including reasonable attorney fees, arising out of or relating to any third party claim arising from the breach by Provider of its obligations contained in this Section, except to the extent resulting from the acts or omissions of Subject. 

Sample of Some Boilerplate Clauses

  1. Entire Agreement: This Agreement constitutes the entire agreement between the parties and supersedes all prior oral or written agreements.
  2. Severance: The invalidity or unenforceability of a provision shall not affect the other provisions of this Agreement and all unaffected provisions shall remain in full force and effect.
  3. Non-disclosure: The Recipient undertakes and agrees that the content of this Agreement (including, without limitation, the fact that this Agreement exists and the amount of the consideration payable) will not be disclosed to any third party by it other than to its professional advisers or as may be required by law or as may be agreed between the parties or to enforce the terms of this Agreement.
  4. Counterparts: This Agreement may be executed in any number of counterparts, which shall together constitute one Agreement. 
  5. Costs: Each party shall incur its own costs and expenses in connection with the preparation, negotiation and implementation of this Agreement.
  6. Receipts: The receipt of money by either of the parties shall not prevent either of them from questioning the correctness of any statement in respect of such money.
  7. No Partnership: Nothing in this Agreement shall create or be deemed to create a partnership or the relationship of employer and employee between the parties.
  8. Authority: Each of the parties warrants that it has all necessary rights, authority and power to enter into this Agreement and that it has obtained all necessary approvals to do so.
  9. Third-Party Rights: Notwithstanding any provision to the contrary, a person who is not a party to this Agreement has no right under the Indian Contracts Act, 1872 to enforce any term of this Agreement.
  10. Assignment: This Agreement shall not be assigned, transferred, mortgaged or otherwise encumbered or dealt with in any other manner by the Recipient except with the prior written consent of the Provider.
  11. Waiver: The waiver by either party of any breach or default of any of the provisions of this Agreement by the other party shall not be construed as a waiver of any succeeding breach of the same or other provisions. Any delay or omission on the part of either party to exercise any right that it has shall not operate as a waiver of any breach by the other party.
  12. Amendments: No amendment or modification to this Agreement will be effective or binding unless it refers to this Agreement and is in writing signed by both parties. The Schedule to this Agreement may be updated from time to time by and initiated by duly authorized representatives of the Parties.
  13. Survival: All provisions of this Agreement intended to survive the termination shall so survive the expiry of this Agreement and remain in force and effect.
  14. Other Rights: No exercise by either party shall restrict or prejudice the exercise of any other right granted by or under this Agreement or otherwise available to it.
  15. Cumulative Remedies: Subject to the specific limitations set out in this Agreement, no remedy conferred by any provision of this Agreement is intended to be exclusive of any other remedy except as expressly provided for in this Agreement and each and every remedy shall be cumulative and shall be in addition to every other remedy given thereunder or existing at law or in equity by statute or otherwise.
  16. Agency: Nothing in this Agreement shall be construed as creating a joint venture of any kind or constituting any party an agent of the other for any purpose whatsoever. Parties shall not have the authority to contract in the name of the other party or create a liability against the other party in any way.
  17. Sub-Contractors: The Recipient shall not be entitled to perform any of its obligations under this Agreement through agents or subcontractors without the prior written consent of the Provider.
  18. Conflicts: In the event of a conflict between the provisions of this Agreement and any schedules or appendices, the provisions of this Agreement shall prevail.
  19. Set Off: The Provider shall be entitled to set off any amount of liability against any sum that would otherwise be due to the Recipient.
  20. Discretion: No decision, exercise of discretion, judgment or opinion or approval of any matter mentioned in this Agreement or arising from it shall be deemed to have been made by either Party except in writing.
  21. Further Assurance: At any time after the date of this Agreement the Recipient shall, at the request of the Provider, execute or procure the execution of such documents and do or procure the doing of such acts and things as the Recipient may require for the purpose of giving to the Recipient the full benefit of all the provisions of this Agreement.

Data Protection Law : Indian Scenario

Currently, India does not have any distinct and specific law governing the technicalities of data sharing activity. However, the Right to Privacy under Article 21 of the Constitution of India and few sections like Section 43A and Section 72A from the Information Technology Act, 2000 and rules thereunder do touch upon the issue. These laws are definitely not enough to govern the issue and certainly have loopholes.  The ambit of the IT Act and its Rules are restricted. Most of the provisions only apply to sensitive personal data collected through a computer resource. These regulations are limited to corporate entities that perform automated data processing, and consumers can only take enforcement actions against a few provisions only. There are no regulations on data localization, which is the main concern and reason for India’s ban on Chinese apps. But these laws cannot be blamed as they were not primarily drafted for data protection. However, the following legislations are in the pipeline of the legislature that deals directly with the digital rights of the people.

Personal Data Protection Bill, 2019

The key features of the draft PDP Bill encompass different forms of personal data and its protection with a centralized data protection authority or regulator. It widens the rights of an individual with respect to their personal data and its protection. There are penalties outlined in the bill for non-compliance as well. The application of the draft bill is extraterritorial in its nature and would also make foreign organizations liable for any breach of personal data of the subjects if a reasonable nexus is being established between the foreign organization and the subject with respect to a breach of personal data.

Digital Information Security in Healthcare Act, 2017 (‘DISHA’)

Like every other sector, even the health sector has been digitized. With applications ranging from online consultation, medicine delivery and laboratory tests, the personal health data of the subjects are all over the internet and is prone to the risk of the privacy breach.

Digital Information Security in Healthcare Act (‘DISHA’) when enacted would be India’s first Health Data specific legislation and will come with provisions governing the storage and exchange of health data of the subjects. Stricter privacy and security programme for digital health data and with a central and a state-level regulatory authority for the enforcement and adjudication of the same.

Non-Personal Data Governance Framework (‘the NPD Framework’)

This would elaborate on the different types of Non-Personal Data that may be collected and stipulate what private and public rights are associated with it. There would be a separate regulatory body to regulate the data sharing process of such data and private entities are exempted from any such transfer. 

Conclusion

All and all with COVID-19 hitting the world and utilization of the internet becoming a vital aspect for everyday activities, potent Data Protection Laws are the need of the hour and privacy that is delayed is the privacy that is denied. Although as much as an efficacious law is required, there is no substitute for a well-drafted Data Sharing Agreement. Good data protection law in the future but good contract law is the present and one must remember while drafting a Data Sharing Agreement that it is not the substantive data protection law that will protect your client because ignorance of the law is no excuse, rather a well-drafted liability and indemnification clause might.

References

  1. https://ura.uchicago.edu/page/data-sharing-agreements
  2. https://ico.org.uk/for-organisations/data-sharing-a-code-of-practice/data-sharing-agreements/
  3. https://www.dataguidance.com/notes/india-data-protection-overview
  4. https://www.twobirds.com/en/news/articles/2019/global/big-data-and-issues-and-data-sharing-agreements
  5. https://www.lexology.com/library/detail.aspx?g=08197ebe-aeb4-41d6-a855-ce57a313ea6d
  6. https://www.natlawreview.com/article/privacy-and-data-protection-india-wrap-2020
  7. https://www.financialexpress.com/economy/cbdt-cbic-sign-pact-for-data-sharing/2031016/
  8. https://timesofindia.indiatimes.com/business/india-business/sebi-cbdt-in-data-sharing-pact/articleshow/76862094.cms
  9. https://www.iberdrola.com/innovation/what-are-digital-rights

Students of Lawsikho courses regularly produce writing assignments and work on practical exercises as a part of their coursework and develop themselves in real-life practical skills.

LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

https://t.me/joinchat/J_0YrBa4IBSHdpuTfQO_sA

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

Wills in India and a global outlook on the history of the same

0
https://rb.gy/fmmnbt
Image Source - https://rb.gy/fmmnbt

This article has been written by Ms. Nikara Liesha Fernandez from the School of Law, Christ University, Bangalore. This article deals with an exhaustive overview of the system of wills in India as well as the evolution of the same from a global perspective. 

Introduction

Wills in India are governed primarily by the Indian Succession Act, 1925 (ISA) to all individuals except Muslims whose matters of inheritance are governed by Mohammedan law (Hanafi law). Although Hindus rely upon the Hindu Succession Act, 1956 for matters of inheritance (especially in the case of intestate succession matters), certain provisions of the ISA are also applicable to them. Hindus, in this case, include Jains, Buddhists and Sikhs as well. Any individuals who enter into the institution of marriage under the Special Marriage Act, 1954 are bound by the ISA in matters of inheritance and succession. Other religious groups such as Christians, Parsis and Jews rely solely on the ISA for the matter of wills. 

Wills, as defined under Section 2(h) of the ISA is ‘the legal declaration of the intention of a testator with respect to his property which he desires to be carried into effect after his death.’ Thus, wills are important documents which unlike other legal documents like Gift and Sale deeds have relatively simpler language and can be made on a normal sheet of paper such that there is no involvement of stamp duty charges.

Need for wills

There is a common misconception that wills are only made by individuals during their later stages in life or as they age and are in bad health. The urgency of it is evident as wills provide for the wishes of the person writing it to be carried out in a systematic manner in accordance with the individual’s wishes in his absence. This however is not necessarily true. Any individual above 18 years of age who is of sound mind can write a will. Multiple wills can be written by an individual during his/her lifetime and the will which is taken into consideration in the event of his/her death is the last will to be written by him/her. 

The most common belongings of an individual whose distribution is governed by his/her will are personal as well as real property. Corporate persons, however, due to the belief that they have perpetual existence do not come under the scope of wills and rather have separate laws which decide their winding up, reorganization and closure. 

Wills need to be as clear as possible in order to provide for each and every one of an individual’s assets to avoid conflict between the family members and other individuals having claims to a deceased’s assets. 

Another use of wills that is not commonly discussed is that of tracing family lineage for the purpose of genealogy. It is interesting to note that in 1705, in the United States of America, even slaves formed a part of the contents of an individual’s will as they were considered to be the personal property of their owners.  

Wills have been around since time immemorial and a lot of their practices and contents have remained the same even to date. In order to properly understand the evolutionary history of wills, it is necessary to establish the meanings of certain essential terms relating to the same. 

Writing a will also reduces the inheritance tax payable on the value of the property and money left behind by the deceased.

Terminologies relating to the concept of wills

Important terms relating to wills

  1. Testator

This is the term that refers to the individual who makes the will. Testator is the term used in the case of a man and Testatrix is the term used in the case of a woman. The testator’s signature, or any other mark of identification in case he/she is unable to sign due to any handicap, is required preferably at the end of the will

  1. Beneficiary

This term refers to the person to whom the testator wills his property and assets in the will. There can be multiple beneficiaries named in a person’s will regardless of whether they are related to the testator by blood or not. 

  1. Executor

This refers to the person whom the testator appoints to carry out the provisions of his/her will in the event of his/her death. The beneficiary of a will can also be the executor of the same. 

  1. Attestation and witnesses

Attestation is the process by which two or more individuals (as mandated by the law) physically witness the testator writing his/her will and whose signatures are also required at the end of the will. The witness of a will however, cannot be a beneficiary of the same. 

  1. Testamentary succession

This type of succession is that by which an individual inherits a deceased individual’s assets in accordance with the provisions of the latter’s will. 

Important terms in the absence of a will 

  1. Administrator

This term refers to the person who is appointed by a competent authority to play the role of the executor when there has been no individual already appointed as the same by the deceased individual, prior to his/her death.

  1. Intestate succession

This type of succession occurs when an individual dies without having written a will distributing the property and assets under his/her ownership. In this scenario, the distribution of property occurs once the claims are brought forward by the relatives/other individuals who have an interest in the deceased’s property who state their relationship to the deceased through the letters of administration filed in court. 

Other important terms and principles relating to wills

  1. Codicil

This is an instrument that supplements the original will by way of adding, explaining, altering or modifying the provisions of the same. 

  1. Probates 

These are a means of proving the validity of a will by way of its certification under seal by a court exercising competent jurisdiction. It grants the rights of administration to an individual of the testator’s estate. Probates are mostly optional save for the jurisdictions of High Courts in the erstwhile presidency towns of Mumbai, Kolkata and Chennai. 

Types of wills

Joint wills and Mutual wills

Joint wills are written on a single piece of paper where two or more testators dispose of the property that is jointly or separately held by them to the same or different beneficiaries/legatees. Mutual wills are made by two testators who confer mutual benefits on each other. This is mostly taken on by husband and wife however, in the event of the death of one of them, the other takes undue advantage of the same, it becomes irrevocable. They are also known as reciprocal wills. The case of Kuppuswami Raja And Anr. vs Perumal Raja And Ors. (1963) dealt with whether the will in question was a mutual will or a joint will. The Madras High Court ruled that ‘a joint mutual Will becomes irrevocable on the death of one of the testators if the survivor had received benefits under the mutual Will, and that there need not be a specific contract prohibiting revocation when the arrangement takes the form of not two simultaneous mutual Wills but one single document.’

Conditional wills

These wills come into effect only in the event of the happening of a particular condition. These wills are also known as contingent wills. The concept of conditional wills has been elaborated upon in-depth by the Kerala High Court in the case of Sridevi Amma And Ors. vs Venkitaparasurama Ayyan And Ors. (1959) wherein it was held that importance must especially be given to the language and surrounding circumstances of such wills. It is according to these factors that the courts can decide whether a will is valid or whether it is rendered inoperative because the condition or contingency failed to happen.

Privileged wills

These wills form a special part of the ISA and differ from regular wills which are known as ‘underprivileged wills’. As it is essential that wills be made in writing, special wills negate this necessity in the cases of soldiers, airmen or mariners when they are engaged in actual service and acts of warfare. In such cases, even an oral or verbal will is permissible under the law. Other conditions with regard to the process by which privileged wills are to be made are illustrated under Section 65 and Section 66  of the ISA and the same has been elaborately discussed by the Delhi High Court in the case of Goutam Bhadra and Ors. vs. Gouri Bhadra and Ors. (2014)  Section 63 of the Act similarly, deals with unprivileged wills. 

Handwritten wills

These are the most common type of wills and are also known as holographic wills. The benefit of these wills is that they do not require any witnesses. The negative part of this will, however, is that the courts can have issues while deciphering the deceased’s handwriting. In the case of Sh. Rama Kant Chaturvedi v. Sh. Mithlesh Chandra Chaturvedi (2001) the Delhi High Court came to the conclusion that in addition to a holographic will automatically having a better standing in a court of law than an oral one, the presence of witnesses further adds weightage to the legitimacy of the will. 

Formal wills

These are the wills that are the safest bet to follow. They are written in the presence of witnesses by a person who has attained majority and is of sound mind. 

Statutory wills

These are wills that are drafted by lawyers in the format prescribed by statutory law. The con of these wills is that it is standardized in form and cannot be modified by an individual to suit one’s personal circumstances.

Self-proving will

These wills are required to be notarized or must contain a self-proving affidavit attached to the will. 

Advanced Medical Directives (AMD or Living will)

These wills have become common in modern times. Rather than dealing with the division of the property of an individual, these wills contain the wishes of an individual with regard to the medical treatment desired by him/her in the event of him/her falling terminally ill and being unable to communicate the same to the medical staff. 

Laws governing wills in India

Under Hindu law- The Hindu Succession Act, 1956

This Act is applicable to all Hindus mainly to aid in the distribution of their property and assets in cases of intestate succession. The aim of the Act was to ‘amend and codify’ the law relating to the same. Hindus, under this Act include individuals belonging to all of the various forms of Hinduism including ‘a Virashaiva, a Lingayat, a follower of Brahmo, Prarthana or Arya Samaj, Buddhists, Jains and Sikhs.’

The order of succession or devolution of property for an individual who has died intestate according to the above Act is as follows-

  1. For male Hindus- There exist four classes of legal heirs
  • Class I heirs include the wife, children, mother, children of the predeceased children, widow of the predeceased son and a few other such relatives. The property is distributed in an equal share to the widow, mother and each of the children respectively.   
  • Class II heirs are those individuals who are eligible to inherit the property of the deceased in the absence of any Class I heirs. 
  • Class III and IV heirs are those individuals who inherit the property of the deceased in the absence of class II heirs. They are divided into agnates and cognates. Agnates are the relations through the male only who are the class III heirs. In the absence of the agnates, the cognates (the relations through the female only) who are the class IV heirs inherit the property. 
  1. For female Hindus- 
  • Class I relatives are the husband, children and children of any predeceased children. 
  • Class II heirs are the heirs of the husband
  • Class III heirs are the parents of the deceased, if alive
  • If any property is inherited by a Hindu from her parents, the same would revert back to the father’s legal heirs in case the female dies without a child.
  1. Other circumstances-

In cases where more than one person dies simultaneously in certain natural calamities or in a plane crash, car crash, etc. and it is not possible to determine the exact time of death of the individuals, it is to be presumed that the older individual died first. 

A person found guilty of murder is not eligible to inherit any property according to the law, however his/her heirs are eligible to inherit the same. 

Under Islamic or Mohammedan law

Under Muslim law, a will is known as ‘Wasiyat’ which is defined as ‘a moral exhortation or a declaration in compliance with moral duty of every Muslim to make arrangements for the distribution of his estate or property.’ Different Muslim sects follow different personal laws within the Mohammedan law itself in dealing with matters of inheritance and succession which are not codified. For example, the law governing succession in the case of Shia and Sunni Muslims differ with the latter following Hanafi law according to which the successors of the deceased individuals are entitled to a maximum of a one-third share of the property of the deceased after accommodating the costs for the funeral expenses, paying off the outstanding wages of domestic servants, debts of the deceased, etc. 

The three classes of heirs under Muslim law are-

  • Sharers- the legal heirs who are entitled to a share in the deceased’s estate 
  • Residuaries- the individuals who inherit any remaining property after the sharers claim their share. 
  • Distant kindred- The individuals who inherit the property and shares in the absence of sharers or residuaries

Another point to note is that under Muslim law, even oral oaths are permitted. It is also not necessary that the will be signed and if it is signed, then it need not be attested. 

According to Section 3 of the Shariat Act, 1927, the Khoja and Sunni Bohra Muslims of Gujarat are entitled to make testamentary dispositions of their whole property rather than a one-third share unless they make a statutory declaration under the Act. A Muslim can, however, transfer his entire property through a gift.

Under Christian law

The widow or widower of the deceased is entitled to inherit a one-third share of the property, the remainder of which is distributed among the lineal descendants of the deceased wherein each child, or in case of a predeceased child, his/her children, get equal shares of the property. In the absence of the latter, the widow or widower inherits half the property and the remainder is distributed to the kindred individuals (other relatives of the deceased).  Among the kindred individuals, the father gets the first preference in the absence of which, or in case the latter is predeceased, the mother followed by the brother, sister and their children inherit the property equally. 

In addition to the above, Christians follow the ISA entirely in matters of inheritance and succession. 

Individuals incapable of making wills

In addition to only individuals who are of sound mind and who have attained majority (18 years of age or 21 years of age in the case of an individual under guardianship), Section 59 of the ISA specifies those individuals who are incapable of making wills which can be recognized by law. 

In essence, as long as the testator is able to comprehend his actions through the will and the effects of the same, the will can be considered to be valid. Thus even individuals who are deaf and dumb are eligible to write wills. People who are intoxicated or suffer from any illness by which they are unable to comprehend what they are doing are not eligible to make a will; however, individuals who are ordinarily insane may make a will that is legally tenable during an interval when he/she is of sound mind. 

Factors rendering wills invalid

Section 61 of the ISA states that wills which have been signed by testators who are under coercion, fraud or importunity such that he/she is deprived of his/her own free will or agency are void in the eyes of law. 

Conditions under which a will becomes invalid

  1. If the will is not attested by at least two witnesses it becomes invalid. In the case of Narinder Singh Rao v. Avm Mahinder Singh Rao & Ors. (2013), it was held that if the will is signed by only a single witness, it cannot be considered to be valid in the eyes of the law. This principle was previously laid down by the Supreme Court in the case of Gopal Swaroop v. Krishna Murari Mangal & Ors. (2003).  
  2. When the will is not signed by a testator, it is considered to be invalid. In the absence of a signature, even a thumb impression is sufficient to validate a will.
  3. When the will has not been dated it is considered to be void. In this case, even if the will has been attested by two witnesses, and signed by the testator, it stands to be void if it does not contain the date on which the will was signed.  

Origin of wills in the global context

The desire to protect one’s property and ensure the preservation of the same for the generations to follow in order to preserve the family legacy and name has been a matter of pride for affluent families all across the world and particularly in Europe where codified provisions were established by law to preserve the same. 

Some historical evidence suggesting the practice of wills are as follows-

In Roman law, which will be discussed in depth later in this article, the widow and children’s claims of property and assets from her husband and their father respectively were recognized by law. In order to protect the same, minimum legal standards of entitlement were set to ensure the family inherits some of the deceased husband’s property through the remedy of querela inofficiosi testamenti’.

Mosaic law, which was followed by the Jews and Christians of Europe recognized the children’s right to inheritance. Through a parable of the Bible, an illustration is shown of Esau selling his birthright to his son Jacob.

Further, in 1215, the Magna Carta, the royal charter or rights agreed upon by King John of England recognised certain rights of inheritance of family members.

St. Thomas Aquinas, a popular Catholic saint, in his writings of Summa Theologica’ stated that ‘marriage is an institution directed to the rearing of offspring, and hence it is “natural law” that parents should lay up for their children, and that children should be their parents’ heirs.’

Blackstone, a popular jurist, in his commentaries from the time period of 1765-69 stated that ‘the right to inherit was a civil right and not a natural one.’ 

Greece

The ancient Grecian law, particularly in Athens, was the first European law that dealt with the matter of inheritance by stating that the estate of a deceased person should naturally be inherited by his children. In the absence of any lineal descendants, the property should be inherited by the collateral relations. 

Solon, an Athenian statesman, who was in power from 638 to 558 B.C established a law by which individuals who had completed twenty years of age were entrusted with the right to make wills. However, there were certain conditions attached to this right as well which were as follows- 

  1. The individual cannot be adopted and must be a blood relation 
  2. Individuals who have male children were not allowed to make wills as the male children would naturally inherit the property on the demise of the individual
  3. The will must be made by an individual who is of sound mind
  4. The individual making the will should do so by his free will and not under the influence of compulsion, deceit, flattery and necessity

The wills had to be made in the presence of witnesses who additionally added their seals to the will to confirm the validity of the same. The provisions of the will were to be carried out by the trustees of the same. 

Roman law

According to ancient Roman law, wills were only permitted to be made by aristocrats and noblemen known as ‘Patricians’. The person writing the will was known as the testator, as is known today and the wills were initially oral declarations rather than being written (nuncupatio). Later on however, the will was made in writing and in the presence of witnesses, the testator was to declare that it was his last will. In the case of intestate succession, the property naturally went to the deceased’s wife and children or in the absence of the same, to his broader, extended family. 

Wills during the reign of Justinian

The Roman emperor Justinian revolutionised and consolidated the law of Rome which formed the basis of the Civil law tradition practiced by European countries even today. The main doctrine of law was Justinian’s code known as Corpus Juris Civilis which contained three parts- the Digests, the Institutes and the Novels. 

Under Justinian’s law, the minimum age an individual had to be in order to make a will was 14 years of age for boys and 12 years of age for girls. The will had to be signed in the presence of witnesses and could only be made by those who possessed testamentary capacity. There was also an option for the will to be published orally. The heirs were required to pay all the dues of the property and assets inherited by them to which the deceased was formerly indebted to. Roman law also had provisions for privileged wills which had been discussed previously in the article. The children’s right to inherit was also given legal recognition during the reign of Justinian. 

Novel 115 C.3 also explicitly laid down the grounds according to which an individual or heir could be denied the right to inherit the deceased’s property or in other words, be disinherited. The grounds mainly speak of violent instances of the children towards their parents, the State, insanity and refusal to accept the Catholic faith. 

English law

Before the year 1066, during the Anglo-Saxon period in England, properties were disposed of among individuals through the process of wills which were known as ‘cwide’. Contrary to Roman law, it did not recognize the universal rights of inheritance for widows and children. 

Post the Norman Conquest of 1066, alienation of lands without the consent of the Crown was prohibited and the authorities took stringent measures to ensure that the rule of primogeniture was strictly followed. Primogeniture was the natural right of succession of the firstborn child according to feudal law through which the entire estate of the deceased passed on to the eldest son. In the absence of any male heir, the property of the deceased was disposed of, which meant it came under the ownership of the State. 

In the 1200s, the courts were governed by the religious fraternity and were known as ecclesiastical courts or Church courts. These courts decided the validity of wills and issued grants of probate in cases where the wills were found to be valid. The jurisdiction of disputed wills rested solely with these church courts rather than the King’s court. 

Following the 1200s, and until the rule of Henry the VIII in 1536, there were only minor changes made to the system of wills and inheritance. However, in 1536, Henry VIII established the Statue of Uses by which the beneficiaries of the land were held as the legal owners of the same in order to impose an active duty on them so that they pay taxes and dues relating to the land they inherit.

Statute of Wills, 1540

In the face of mass protests and dissatisfaction with the Statute of Uses, it was finally replaced by the Statute of Wills in 1540. According to this statute, landowners were now directly given the power to divide their land upon their death to any tenant in return for rent in cash or by way of agricultural services (but not military services). The tenant could be any individual except a body corporate. 

The similarities between the wills established by the Statute of wills 1540 and the wills of today are the necessity of the same being in writing, signed by the testator and two other witnesses as well as recognizing the ineligibility of infants, idiots, and individuals of non-sane memory from writing a will. 

The year 1858 saw the establishment of the Principal Probate Registry which contained copies of all the wills made including the letters of administration. Until the mid-19th century, there existed huge crevices in society between the rich and the poor with the former having the means to to make wills and thus the process of making wills was restricted to the richer sections of society as a result of which the bulk of the society which consisted of the poorer individuals did not leave any wills. 

The wills of the 19th century were known as the ‘Gift of Mourners’. These wills usually began with the words ‘In the name of God Amen’, following which the testator was required to state his mental competence to prove that he was eligible to make the will. This was followed by the list of bequests or the items the testator wished to distribute among the individuals mentioned in the will. It is interesting to note that the bequests of olden times started off with items like bed linen and brassware followed by items of greater value. 

Conclusion

Wills, especially during the times of COVID-19 and in recent years in general have become a point of interest for even younger individuals who wish to settle their affairs at an earlier stage rather than wait until they come upon some unforeseen circumstances which render them in a critical condition with the future being as uncertain as it currently is. There have been efforts by members of the legal fraternity towards providing legislations that legalise ‘digital wills’ as these can greatly assist in cutting costs and saving the time of individuals as well as solve the lack of accessibility to witnesses and lawyers during these pandemic times. It is indeed a positive step in the right direction and hopefully will become a reality in the near future. 

References

  1. https://www.mondaq.com/india/wills-intestacy-estate-planning/957940/succession-laws-in-india-in-a-nutshell 
  2. https://itatonline.org/articles_new/the-entire-law-on-the-making-of-wills-explained/ 
  3. https://www.bcasonline.org/Referencer2015-16/Other%20Laws/succession_and_wills.html 
  4. https://taxguru.in/corporate-law/concept-will-india.html https://www.legalindia.com/will-under-indian-law/ 
  5. https://www.eqt.com.au/-/media/equitytrustees/files/legal-profession/sir-ninian-stephen-lecture-papers/a-brief-history-of-inheriatance-through-the-ages.pdf 
  6. https://www.findersinternational.co.uk/news/the-history-of-wills/ 
  7. https://privateclient.cyrilamarchandblogs.com/2020/04/wills-in-the-time-of-corona-challenges-and-solutions/ 
  8. https://www.mondaq.com/india/wills-intestacy-estate-planning/879416/digital-wills-in-india-legal-or-illegal 

LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

https://t.me/joinchat/J_0YrBa4IBSHdpuTfQO_sA

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

The procedure of M&A auction

0
Blogs websites merger acquisition lawyers
Image source: https://bit.ly/2VHM56a

This article is written by Nimish Dhagarra, pursuing Diploma in M&A, Institutional Finance and Investment Laws (PE and VC transactions) from LawSikho. The article has been edited by Aditi Deshmukh (Associate, LawSikho) and Dipshi Swara (Senior Associate, LawSikho).

Introduction

The M&A space has been growing for the past decade and has been a trending sector to practice law in India, attracting investment from investors all around the world. In present times the process as well as procedure for merger and acquisition has become so flexible and dynamic in nature that it requires a great deal of attention to detail when entering into such transactions from deciding potential collaborators to agreeing the terms and conditions to due diligence to signing the final contracts. Due to the rise in such transactions, the Indian corporate sector has been on the edge of its seat as who knows which big monster companies might merge or acquire other dominant players in the market. But at the end of the day these deals provide a huge boost to all the stakeholder in the market from companies to its board of directors, employees, investors, suppliers, government and at last we consumers in the society. 

M&A in India

The merger and acquisition landscape in India is mostly regulated by the Companies Act, 2013. Acquisition in India can be done through two ways, either;

1. The entire business is transferred by way of merger/amalgamation or share buyout, 

2. Acquisition through an asset sale, slump sale or demerger.   

Depending upon the business strategy of the company, such transactions are either executed through a scheme of arrangement between two companies resulting in merger/amalgamation under Companies Act, 2013, if it is share buy out then through a share purchase agreement or if it slump sale or asset sale then it is executed through what is known as a Business Transfer Agreement which is a document used for acquiring a part of business or undertaking or division or unit of a company and lays down the consideration and undertaking itself.

But when it comes to merger and acquisition through auction, here the flexible and dynamic nature of merger and acquisition space really comes into play since parties have a little bit of extra freedom to auction their business to the higher bidder. This article will highlight the basic procedure of M&A auction transactions followed in India.          

What is an auction?

According to Collins Dictionary of Law, if refers to; “a (normally public) sale of property usually conducted by competitive bidding where the item auctioned is sold to the person who makes the highest bid. It is conducted by an auctioneer, who is deemed to be the agent of the seller until the hammer falls and he announces the completion of the sale in favour of the highest bidder. Many auctions now take place on the Internet whereby the auctioneer provides the site upon which the goods are advertised”.

The famous auction theory’s main aim is to utilize economics to design optimal bidding procedures and revenue-enhancing auctions. Now when it comes to business, you as an owner can offer to either auction the entire or part of the business or as an undertaking or as an asset or as a unit or division, depending upon your preference, the value of your company in the market and how competitors value the addition of your company to them. It is important to note that though an auction is time-consuming as well as an expensive process due to many compliances and formalities which are required in a typical sale, an auction can gain the selling company a very high selling price for their business and it leads to the seller having more options/alternative with them which places the seller in a better position to fetch a good price for their business meaning the seller can now select, evaluate and customize the deal according to their preferences. 

That is why in most cases, sale through the medium of auction concludes in the favour of the seller at an advantageous position. The aim is simple, to get the highest bidder to pay you the value for your company in terms favourable to you, based on your preference. The basic intention of an auction is easy to understand but the real implementation of the process is quite complex which makes it difficult for sellers to get the potential buyers they expected, that’s why in-house counsel, lawyers, M&A consultants or law firms are hired to make the process a smooth transaction by negotiation, drafting, advising, helping in due diligence, selecting the best buyers etc you name it, that why these intermediaries bridge the gap between the buyers and seller though there is no compulsion on seller company to engage such help, they have full discretion to organize the auction themselves too. 

The general perspective of the auction in India

Now in India in recent times e-auction platforms are preferred as a medium for companies to sell their business. These e-auction platforms conduct auctions for sale for the seller companies. Now it is up to the seller to choose a platform regulated by government or private companies based on their preference. The e-auction platform has brought a diverse change in the way we do auctions as it has made the process versatile at the same time safe by providing secured networks conducting auctions on a daily basis. The e-auction platform, especially during the pandemic has helped businesses in continuing their business activity. Now depending on the valuation of your business in the market, you may opt to do a private auction or a public auction. 

The public auction also known as the open auction is an auction in which the bidding is open to any or all the eligible buyers and the auction is done in the open with the seller setting the basic price and buyers bidding above the base price. Most sellers go for private auction as in the case of M&A transaction, the seller would like to have what is called a controlled bidding procedure in which the seller calls a few limited numbers of buyers to the preliminary stage for bidding and as we go through the stages, the number reduces and at the end the seller is left with his best potential buyer. It is important for sellers to have a large pool of potential buyers in order to get the price they are looking for so that they can explore the various options before them. Private auctions as the name suggests, are conducted away from the public eye in confidentiality to prevent leak of information or partiality in selecting the buyers and the process is conducted in a fair manner,  following the principle of natural justice and the general practices of auction. It is always in the best interest of all the parties to avoid dispute. 

It is important to know that in India there is no specific law governing the auction of businesses, the general practice of auction is followed where the seller has freedom and discretion to exercise in the process of selecting the buyers according to them. As mentioned above the main aim of the auction is to fetch a price greater than that in the market so it is important for the seller to provide the base price which exceeds the expectation of the stakeholders in the company and is approved by the board of directors and as the seller is conducting the auction,  they get to choose the terms and condition of the sale which the bidders must agree to beforehand.          

The procedure of auction 

1. Identification of potential buyers

The seller, after engaging with an M&A consultant, should first publish its intent to sell its business. After scanning the market and receiving interest from buyers, the seller should make a list of potential buyers which they think is qualified as per their expectation. After the list is finalized, the seller through his legal representatives will invite the potential buyers to the preliminary stage for bidding disclosing general information about the target company including the base price of the business. In parallel to this, the legal help engaged by the seller will prepare the necessary legal documents, information, reports and private data room for further stages.  

2. Disclosure of standard information/presentation 

  • After all the potential buyers have been assembled in the private room (which can be an online auction or physical private place of the meeting), the legal representatives of the seller will ask the potential buyers to sign a confidentiality agreement to keep the information that will be disclosed by them secured. After signing the agreement, the seller’s management will provide an information memorandum or in certain cases a vendor due diligence to all the buyers disclosing a detailed description of the sellers business. After going through the information memorandum, the buyers will submit their non-binding bids which should include the details, structure and condition of the deal proposed by them. 
  • It is important to note that during these stages the seller should remain anonymous and should act through its legal representatives only who will be conducting these procedures on behalf of them. It is also important that the seller should refrain from engaging in any communication with the outside world about their business, the auction or financial aspect of their business etc. 
  • The information memorandum is a document that aims to contain reasonably sufficient information about the target to elicit meaningful bids from potential buyers, such as; a description of the target’s business, industry and history; the principal assets; historical financial information and future projections; information about management and employees; and depending on the sensitivity of the transaction, information about key customers and contracts.

3. Evaluation of non-binding bids

  • Now, this is the second stage in which the seller, after much deliberation with its M&A consultant/legal representatives, will evaluate the bids of potential buyers and break down the bids to a few selected buyers towards which the sellers feel indicative. Now, these remaining potential buyers after notifying will be given access to the data room prepared by the seller through special access rights which will have all business of the seller from its incorporation to its present transaction and dealings. 
  • After this, the potential buyers are free to conduct their own due diligence and now the buyers have the floor to ask any question to the seller regarding business. In this stage, the buyers can engage with the seller directly and both the management can engage in discussion, meetings etc.

4. Assessment of offers

  • This is the third stage in the auction process in which the seller uploads the “seller and purchase agreement” on the data room. Now the potential buyers are given time to submit their binding offers with the proposed amendment that they want in the seller/purchase agreement. The offer submitted by the buyers should include a detailed report of how they have reached the specific offer price submitted by them, the structure of the offer and factors taken into consideration such as liabilities, evaluation of the business, market demand-supply etc.
  • After going through the binding offer submitted by the few potential buyers with the proposed amendments, the seller evaluates the offers and selects the ones that they feel is more feasible and suitable for their business. 

5. Negotiation and finalizing of the deal

  • This is the final stage in which the seller and potential buyer engage in negotiation over the proposed offer and the seller provides buyers access to a confidential agreement that was not disclosed in the previous stages. After going through the negotiations the seller finally selects one potential buyer that they think has offered the best-constructed price for their business. 
  • The potential buyer who has been selected will now be given exclusive negotiation rights for a limited time period. Now going back and forth in this period the buyer and seller will reach the final terms and conditions of the contract. 
  • At last, the buyers and seller will sign the fully negotiated contract and the auction procedure is finally complete meaning the business will now be transferred to the buyers upon his payment of the consideration to the seller.

General auction process and timeline

Stages Factors Duration 
Preparing of for SaleDefine Strategy
-Do we want to sell?
-To whom? (Identify potential buyers)
-For how much? (Create a valuation framework)
-What kind of process do we want to run? (Define the process and timetable)
Getting Ready
-Organize financials
-Create projections
-Produce marketing material
-Prepare non-disclosure agreement (NDA)
4-6 Weeks
Round 1-Contact buyers: Exchange NDAs and distribute the CIM
-Receive initial bids: Non-binding indications of interest used to narrow the buyers’ list
4-6 Weeks
Round 2-Hold meetings with interested buyers, conduct Q&A and answer follow-ups
-Set up a data room and facilitate due diligence for interested acquirers
-Draft definitive agreement
-Receive final bids/letters of intent (LOI)
4-6 Weeks
Negotiation -Negotiate with buyers submitting bids
-Circulate draft of the definitive agreement
-Enter into an exclusivity agreement with one bidder
-Continue to facilitate due diligence-Present finalized deal terms and fairness opinion to seller’s board, get board approval-Sign a definitive agreement
6-8 Weeks

Certain points that need to be kept in mind while auctioning your business

  1. One of the drawbacks of auctioning in India is that there is no specific legislation to regulate the auction of businesses in India, the general practice of auction and contract law are followed. 
  2. There are always high chances of a dispute arising as the buyers who did not get contracts may sue the sellers in the court for impartiality in the process etc. 
  3. There is also the fear of hostile takeovers as when a company publishes its intention for auction, there will be bidders looking to take over the seller’s business rather than engaging in a friendly competitive bidding fight. In India, hostile takeovers are regulated by SEBI (Substantial Acquisition of Shares and Takeovers) Regulations, 2011. In such scenarios, the targeted company can enter into a standstill agreement to restrict and delay the action of the bidders. A standstill agreement can help the targeted company prevent hostile takeovers by providing time to the company to assess its situation.
  4. As multiple parties are involved, there are high risks of leakage of confidential information at every stage. Although the confidentiality agreement is signed beforehand, once information is leaked, it is hard to track the source of leakage. 

Conclusion 

To summarize, the auction process starts with the distribution of information- memorandum to bidders; a first-round indicative bid by the bidders; due diligence/review of a draft sale/purchase agreement by bidders; a further round of bidding by a limited number of bidders with their comments on the draft sale/purchase agreement-negotiations between the seller and preferred bidders. Auction is a process that involves multiple parties, to have a smooth process there is a need to have a mechanism at hand to regulate the rights and liabilities of the parties. In totality, the M&A auction process has its advantages and disadvantages. The practitioners in the corporate field have mixed feelings about the acquisition from such means. If a company opts for engaging in acquisition through auction process either as a seller or bidder, it is highly advised to engage M&A consultants and your financial advisors as early as possible in the process to get the desired deal.   

References

  1. auction. (n.d.) Collins Dictionary of Law. (2006). Retrieved August 8, 2021, from https://legal-dictionary.thefreedictionary.com/auction
  2. Mark Davies and Trinh Chubbock, Kings and Spalding, The Auction Process: Advantages and Disadvantages and the Key Steps, EMPEA Legal & Regulatory Bulletin | WINTER 2017, Pg 12-15, https://www.globalprivatecapital.org/app/uploads/2017/10/The-Auction-Process.pdf
  3. Sautter, Christina M., “Auction Theory And Standstills: Dealing With Friends And Foes In A Sale Of Corporate Control” (2013). Journal Articles. 26. https://digitalcommons.law.lsu.edu/faculty_scholarship/26

Students of Lawsikho courses regularly produce writing assignments and work on practical exercises as a part of their coursework and develop themselves in real-life practical skills.

LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

https://t.me/joinchat/J_0YrBa4IBSHdpuTfQO_sA

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

An overview of gig economy becoming a new battleground for cybersecurity

0
Image source - https://cogniz.at/3EyU1uJ

This article is written by Sankara Narayanan, pursuing a  Diploma in US Technology Law and Paralegal Studies: Structuring, Contracts, Compliance, Disputes and Policy Advocacy, from LawSikho. This article has been edited by Aditi Deshmukh and Dipshi Swara.

Introduction

The term ‘gig’ normally used in the field of music now refers to a job undertaken for a short period. The labor market comprises freelancers and users engaged in contract work for a specified short time and paid through digital platforms refers to the gig economy. Specified work or service when carried out by a person for another person or company not permanently is freelance work. Digital platforms made it easier to perform work from remote locations. An individual can perform the work from an independent location and contribute towards achieving the goal of the company. Individuals, as well as organizations, found freelancing work more convenient and cost-effective, that it encouraged gig services and culminated into the gig economy. 

Gig economy involves the exchange of labor by freelancers for money to individuals or companies through digital platforms, facilitating as a medium of the interface between providers and customers, in a short-term period for payment to complete a particular task. It would be interesting for the freelancers to know the gig economy contributing to the growth of cybercrimes as digital platforms such as Upwork are used by many freelancers. The exponential growth in the gig economy, availability of a large number of freelancers, flaws in the cybersecurity system and lack of legal framework made the gig economy becoming a new battleground for cybersecurity.

Freelancing

The conventional method of maintaining human resources permanently in the current socio-economic situation causes many problems for employers as well as employees. As the market is getting competitive, companies need to streamline the resources to minimize operating costs and achieve economic benefits to have a competitive advantage in the marketplace. Human resources in developed economies are not only expensive but also difficult to source the right resource permanently. Most of the work can be efficiently carried out by competing for freelance workers operating from remote locations. It is found to be cheaper to outsource work through freelancers.

Pointers on Freelancing:

  • Freelancing is not a new concept, it has been prevalent in many countries and sectors such as writers, artists and others where direct personal presence is not required were operating remotely. 
  • Freelancing has expanded at a rapid rate due to various factors such as technological innovation, availability of trained human talent in various fields, globalization, growth in the IT sector, etc. 
  • A freelancer undertakes a particular job and provides his/her services to another person or company at a pre-agreed rate for such services, without any permanent employment contract or other commitments to the other person or company. 
  • Freelancing is doing the job or services by the freelancer. The freelancer who is not on the payroll of the company normally works on his own to complete the task entrusted to him by the company at a rate and conditions that have been agreed by the freelancer and the company. When the work is carried out through digital platforms, such activities contribute to the gig economy. 

The main advantage of freelancing is the availability of human talent at a competitive rate. Freelancers are available for almost all kinds of tasks. The number of professional freelancers is increasing and platforms that connect freelancers with the end-users are also increasing. The communication connectivity and speed of transferring data have tremendously improved. More and more companies engage freelancers for fulfilling their work thereby cutting down on human resources costs, as maintaining a permanent workforce becomes burdensome. When the individual economies of countries have transformed into the global economy, the number of businesses and enterprises has expanded at a global scale. Even before the Covid 19 pandemic, companies were outsourcing many business process operations locally and at a cheaper rate from developing countries. The cost of the business process became so expensive in the developing world especially the US, the world’s largest economy. US companies were utilizing the Indian talent pool for manning their call centers, back-end business process, and other IT-related works. The availability of talented IT professionals and another workforce with excellent communication knowledge encouraged developed economies to find cheaper solutions from other global sources. This also led to most of the work being outsourced to freelancers and growth in the gig economy. 

The gig economy

The gig economy relies on Information Technology (IT) networks and digital platforms. Cyberspace is the medium for the modern type of business. Data processing has become very easy, and the churned data has become resourceful and valuable. Cybercriminals found that stealing such data by breaching cybersecurity is very lucrative. This resulted in manifolds of cybersecurity threats. Companies are aware of the external threat and take appropriate measures to secure the data through various layers of protective measures.

But most cybersecurity issues and data breaches are caused by internal threats mostly carried out by employees within the company. Unlike a permanent employee of a company, freelancers and remote contract workers can misuse the data. The freelancers can access sensitive information of companies and it is often difficult to hold them accountable like that of a permanent employee. Many of them use their computer and use an open wi-fi system to transfer and retrieve data. While the data is transferred through unsecured wi-fi connection and internet or other networks, they are vulnerable to cyber-attack and hacking. Such cyber-attacks pose great risks and threats to data security that lead to cybercrimes. The customers can choose the services and make payments to freelancers through the associated digital platforms creating a separate economic system called the gig economy. 

A picture containing text, newspaper

Description automatically generated

The gig economy represents a free market system in which organizations and independent workers engage in short-term work arrangements. As the gig economy is growing at a faster rate, the use of digital platforms and IT infrastructure requirements are also increasing.

Information technology and gig economy growth

When many freelancers and customers are to be connected, digital platforms become an easy channel to facilitate the activities. Many digital platforms enabled freelancers and customers on a model of the hub and spoke systems, such as tourism, travel, hospitality like Uber and Airbnb through IT networks and digital platforms. Even small businesses cannot survive now without IT-enabled services be it that for e-commerce, payment gateways, or data processing. 

Almost all business and financial transactions are taking place through IT-enabled services. Most of such work is entrusted to freelancers and the means of connecting them with the companies or other individuals who require the freelancer’s services are through IT networks. As the gig economy is growing at a faster rate, IT infrastructure is in great demand, whether it is cloud services, servers, storage, cyber security, or system integration. With the advent of advanced cyber security measures in networks, companies rely on IT services to have better economic advantages. Most of such services are outsourced to expert companies. This expansion has contributed to enormous investments in the IT services industry. As the industry is growing, the manpower required to design, develop, implement, and maintain the system has also increased. Growth in the gig economy increased cybersecurity threats. 

Cyber security threats

Initially, companies utilized their intra IT networks or local area network (LAN) which were highly secure and less susceptible to external threats. But when the concept of a global village evolved where everyone is connected, individuals and companies are forced to use open sources for IT services to have wider coverage or a wide area network (WAN). With the speed of connectivity tremendously increased, most business functions are carried out online. Data collection, processing, coding, and storing became very easy and made data a valuable commodity. Companies started to gather and manipulate data for their economic advantage and the processed ‘big data’ became highly valuable. This attracted both external and internal cybercriminals to gain control or access such data. Most businesses are carried out in cyberspace, malevolent actors with malicious intent, steal data or money of others, disrupt and damage data, access classified information, impersonate others, damage the networks, and hack the system.

Cybersecurity is breached when the sensitive information of the company is accessed by an unauthorized person. As freelance workers are attracted to many online businesses, when the number of players increased, cyber security threats also increased. Cyberspace became very popular as both freelancers and companies benefited, thereby the gig economy started to grow at a faster pace. Cybersecurity threats can be internal or external or due to technical failures of the IT system. Data stealing, data privacy invasion, cyberbullying, blackmailing, and defamation are various crimes related to cybersecurity. 

Cyber security cases are increasing at an alarming rate all over the world and the Indian government reported over 1 million cases in 2020 which is three times more than that reported in the previous year. Growth in the gig economy is becoming the battleground for cybersecurity.

Battleground for cybersecurity 

The medium of the gig economy is mostly carried out through IT-enabled cyber communication channels. Cybersecurity threats can be due to internal, external, or technical failures. The internal threats can be intentional or unintentional. The employee of the company who has access to the sensitive data which he uses for his benefit or to make economic advantage intentionally acquires the data and misuses it. An innocent employee who may leave the system unprotected or make a mistake in the operation whereby the data is transferred to a third party without any malicious intent, still poses the threat of cybersecurity. 

External threats are; the work of hackers and cybercriminals who for economic or political reasons breach the data or digital platforms. Another type of cybersecurity threat may be caused due to failure or fault in the IT system by which the system may erroneously transfer data or money to a third party. Teenagers and children also indulge in cybercrimes, and they must be brought under proper legislation. The freelancers are based in different jurisdictions and often the territorial limitations help the cybercriminals to escape justice.

Cybersecurity legislation in India

Cybersecurity is a major problem for individual countries and is also an international crime as it can cause damage to the national economy. 

Cyber Security crimes in India are dealt with under The Information Technology Act, 2000 (IT Act) and the Information Technology (Amendment) Act, 2008. Section 43 refers to damaging a computer without the permission of the owner of the computer. Section 66 deals with fraudulent or dishonest acts that are referred to in Section 43. But the maximum penalty is a fine of up to Rs 5 Lakh and or 3 years imprisonment. 

Indian Constitution while providing fundamental rights in Article 19 (1) (a) provides freedom of speech and expression but comes with certain exceptions as freedom of expression cannot harm another’s reputation, making defamation a crime.

The Indian Penal Code, 1860 was amended to include offences committed via electronic forms and mediums.. Section 469, 470, 499, 500, 503, and 504 provides for forging, harming reputation, defamation, intimidation through an electronic medium, and punishment. 

The Companies Act, 2013 was also amended from time to time and the Serious Frauds Investigation Office (SFIO) has been entrusted with the power to control fraud by corporations in technology and legal compliance. Companies Inspection Investment and Inquiry Rules, 2014 has given more powers to SFIO.

One of the first cybercrime cases was CBI v. Arif Azim. Arif who was 24 years old at that time had ordered a TV from Sony India Pvt. Ltd. fraudulently using the credit card of an American national. The court found him guilty under Section 418, 419, and 420 of the Indian Penal Code and Section 66 of the IT Act. 

Another infamous case was that of Pune Citibank-Mphasis fraud case, where the Mphasis Ltd. call centre employees stole data of many US customers and amassed benefits of Rs. 1.5 Crores. The accomplices were found guilty under Sections 66 and 43 of the IT Act and were ordered to pay compensation to the victims.

These cases give an overview as to why it is important to have effective regulatory frameworks in place for curbing cyber crimes. Now that we are depending on the internet to do our work, engage in confidential information or documents sharing, and various payment transactions, it is incumbent that we have comprehensive legislations governing all these aspects.

Cybersecurity in other jurisdictions

The US has formulated a cybersecurity framework for combating cybercrimes. National Institute of Standards and Technology (NIST) has been entrusted to provide the framework for cybersecurity in setting up standards, manage, interpret, mitigating measures for data loss and other cyber risks. 

EU Cybersecurity Act, Regulation (EU) 2019/881 of the European Parliament and the Council has enacted the regulations to deal with the cybercrimes.

Despite the strict regulations in the USA and the EU on cybersecurity, the cybercrimes related to gig platforms are increasing. Cyber attackers wreak havoc in India too. India has reported a higher number of cybercrimes year to year. The Personal Data Protection Bill, to protect data breaches is still pending with Lok Sabha and once it is enacted at least the number of cases can be brought down to a considerable level.

Conclusion

The gig economy has gained greater importance in business due to the availability of expert freelancers who are ready to take up almost all jobs and technological innovations especially in the IT field, made the gig economy grow at exponential growth. This growth paved the way for a vast increase in cybersecurity threats and became a global battleground of cybercrimes. Individuals and organized crime syndicates are vying for the opportunity of any slack in the legal framework and lapse in cybersecurity to indulge in cybercrimes which have also grown in tandem with the gig economy. The current legislation and cybersecurity measures seem to be inadequate in dealing with the cybersecurity issues related to the gig economy. Freelancers can be based in different jurisdictions and the local legislation shall not be effective to bring them before the law. A comprehensive legal framework with international cooperation, continuous cybersecurity monitoring, and control is required to contain the gig economy-related cyber crimes as they will not only affect individual countries but also the world economy. 

References

  1. https://www.infosecurity-magazine.com/opinions/gig-economy-battleground/
  2. https://www.securityinfowatch.com/cybersecurity/article/21112260/what-the-growing-gig-economy-means-for-cybersecurity
  3. https://www.consultancy.uk/news/18965/growth-of-the-gig-economy-comes-with-a-cybersecurity-threat
  4. https://media-publications.bcg.com/Gig-Economy-Report-Executive-Summary.pdf
  5. https://economictimes.indiatimes.com/news/company/corporate-trends/3x-increase-in-cyber-attacks-results-in-increased-budgets-and-attention-on-cyber-security-issues-
  6. https://www.appknox.com/blog/cybersecurity-laws-in-india

Students of Lawsikho courses regularly produce writing assignments and work on practical exercises as a part of their coursework and develop themselves in real-life practical skill.

LawSikho has created a telegram group for exchanging legal knowledge, referrals and various opportunities. You can click on this link and join:

https://t.me/joinchat/J_0YrBa4IBSHdpuTfQO_sA

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

Mergers and acquisitions in India and its effect on the operating efficiency of an acquiring company

0

This article is written by Pranav Sethi, from SVKM NMIMS School of Law, Navi Mumbai. This article analyses Mergers and Acquisitions in India and its effect on the operating efficiency of acquiring a company.

Introduction

Governmental agencies in India were the first to propose corporate restructuring through mergers and acquisitions. This analysis aims to examine mergers and acquisitions in Indian firms across a variety of industries, including banking, telecommunications, and pharmaceuticals, as well as the concerns and obstacles faced by different firms during the merger and acquisition process. Due to increased competition among domestic manufacturers in both the domestic and international markets, the majority of corporations in India have opted to join through M&A (Mergers and acquisitions) transactions. 

The current practice of mergers and acquisitions has grown in importance in the modern corporate world around the country. For the restructuring of multiple trade organizations, merger and acquisition procedures are often considered. In today’s marketplaces, most corporations’ main goal is to produce worldwide consumer interference and benefit from it. Global consumer influence can be achieved by partnering with other existing or establishing enterprises both domestically and abroad. M&As as a foreign growth strategy has risen in popularity as a result of the increased implementation of deregulation, privatization, globalization, and liberalization (LPG) in most countries throughout the world. M&As have shown to be an all-encompassing means for expanding creation portfolios, entering new markets, gaining knowledge, expanding access to research and development, and gaining access to the assets that allow a firm to operate on a worldwide scale.

Merger

Merger refers to the combination of two or more business entities into a single business entity, with one company continuing to operate while the other ceases to do so. The assets, liabilities, and stocks of the defunct company or companies are acquired by the existing corporation. The buyer is usually an existing firm, whereas the seller is usually a startup firm. Mergers are typically done to increase a company’s market share, lower operating costs, expand into new locations, connect commonplace items, increase revenues, and increase benefits—all of which can result in money for the company’s shareholders.

Acquisition

Acquisition usually refers to a larger commercial entity acquiring a smaller company. The acquisition of all or a portion of a company’s assets for the desired business is known as acquisition. The development of an acquired firm to assemble the power or weaknesses of the acquiring firm is known as company acquisition. A merger is similar to an acquisition, but it refers to the merging of the interests of two companies into one stronger entity. As a result, the industry will grow at a faster and more profitable rate than typical organic expansion would allow. An acquisition means the acquiring of one firm by another without the creation of a new company.

The idea behind companies scaling up 

The general idea underlying M&A is that when two distinct organizations work together, they create greater value than if they worked alone. Companies continue to evaluate different options through mergers and acquisitions with the primary goal of maximizing wealth. The combining or merging of two companies always creates synergy benefits in this case.

Revenues (greater revenues), Expenses (lower expenses), or the cost of capital can all be used to determine the synergy value (lowering of the overall cost of capital).

Both sides of an M&A negotiation will have varying viewpoints about the valuation of an acquiring company: the seller wants to value the company as high as possible, while the buyer wants to secure the best deal possible. There are, however, a plethora of valid methods for determining a company’s worth.

The most frequent way for valuing a company is to compare it to similar companies in the same industry, but dealmakers use a range of other approaches and tools when evaluating a target company.

The following are a few of them:

Comparative Ratios

Comparative Ratios are a type of ratio that is used to compare two things. Two examples of the numerous comparable indicators on which purchasing corporations may base their offers are as follows:

Price-Earnings ratio (P/E ratio) 

An acquiring business offers to pay a multiple of the target business’s earnings using this ratio. The acquirer can obtain a decent idea of what the target’s P/E multiplier should be by examining the P/E for all the companies in the same industry group.

Replacement cost 

Acquisitions are rarely made based on the cost of replacing the company’s management. Assume that a company’s value is equal to the sum of all of its equipment and personnel costs just for simplicity. The acquiring corporation has the power to order the target to sell at that price, or it can build a competitor at the same price. Naturally, assembling strong management, acquiring property, and obtaining the necessary equipment takes time.

Enterprise-Value-to-Sales ratio (EV/sales)

With this ratio, the purchasing business wants a deal based on multiple revenues, while also keeping in mind the industry’s price-to-sales ratio.

Discounted Cash Flow (DCF) 

This is a crucial valuation technique in mergers and acquisitions. A discounted cash flow analysis calculates a company’s current value based on projected future cash flows. 

Forecasted free cash flows (net income + depreciation/amortization capital expenditures change in working capital) are discounted to present value using the company’s weighted average capital costs (WACC).

The premium for potential success

Almost often, acquiring businesses pays a significant premium above the stock market value of the business they buy. The argument for doing so almost usually boils down to the concept of combination: a merger rewards shareholders when the value of prospective synergy enhances a company’s post-merger stock price. If rational owners would profit more from not purchasing, they would be exceedingly unlikely to sell. It means that, irrespective of what the pre-merger valuation says, bidders will have to pay extra if they want to buy the company. 

Companies engage in mergers and acquisitions for a variety of strategic business reasons, the majority of which are economic in origin.

These include leveraging economy of scale in any, some, or all areas of research and innovation, production, and marketing (horizontal mergers); expanding distribution network or entering new markets to increase market share; diversifying the variety of products and services (diversification of business); gaining professional leadership by being purchased (by a smaller company); and diversifying the array of goods and services (diversification of business).

Other incentives can be considered, such as gaining distribution network pricing efficiency through the acquisition of a distribution channel (vertical merger) or even eliminating future competition. The activity of mergers and acquisitions has resulted in the internationalization of company activities. Mergers and acquisitions have become more popular as a quick and successful convergence technique, particularly in the cross-border scene. These are mostly driven by the volatile global economic environment, with emerging-market corporations scrambling to acquire cross-border assets at attractive rates, particularly following the 2008 Global Financial Crisis.

Many Indian businesses are exploring international partners, particularly in the West, to expand their market share and improve efficiencies. This transition is most noticeable in information technology, metals, pharmaceuticals, and life sciences, as well as the automobile and ancillary industries.

The primary reason for mergers and acquisitions is to maximize shareholder value, which is achieved by increasing the firm’s market value as a result of the merger. This can be accomplished through boosting profits, which can be accomplished through cost efficiency of scale, economies of scope, and economies of vertical integration, as well as synergies through cost savings—research and development, rationalization, purchasing power, the creation of internal capital markets, and financial savings-tax and interest rates.

Mergers and acquisitions have recently proven to be a panacea for highly leveraged corporations. This phenomenon became more apparent after 2015 when the banking sector tightened its lending standards. Unlike in the past, when most M&A agreements were driven by growth, overleveraged corporations tried to decrease debt by selling assets.

Mergers and Acquisitions in India’s various sectors

In the case of mergers & acquisitions, India has recently demonstrated the biggest potential. In the Indian market, it is effectively cooperating in a variety of areas. Many Indian corporations have grown organically to gain entrance to new business firms, while many foreign corporations are targeting Indian firms for advancement and growth. It has spread far and wide across all commercial platforms.

Pharmaceutical sector

Multiple mergers and acquisitions are taking place in the pharmaceutical industry around the world. Within a specific pharmaceutical genus, there is a dearth of competent research and development centers.

The enhanced shape items also have a significant role to play in the evolving M&A in the industry. In the Indian pharmaceutical sector, several companies have participated in mergers and acquisitions for example, merger of Ranbaxy and SunPharma, acquisition of Primal Healthcare by Abbott. Restructuring of the Indian Pharmaceutical Sector during M&A based on business-related deliberations and business goals is a must. It is also acknowledged on a global scale. M&A is the only way to get a competitive advantage both nationally and internationally, and as a result, a wide range of businesses are looking for planned acquisitions both domestically and internationally. The total number of companies acquiring numerous branches of other businesses has demonstrated that Indian pharmaceutical diligence is positioned to be a major player in this scenario.

new legal draft

Banking sector

In all parts of the globe, a large number of international and domestic banks are engaged in merger and acquisition activity. As a result, mergers and acquisitions have become commonplace in the majority of countries around the world. After M&A, the primary goal of the banking division is to receive recompense in economies of scale. M&A in the Indian banking sector has become a popular trend across the country. The primary motivation for M&A in the banking sector is to obtain repayment of financial scales. M&A is seen to be a relatively quick and efficient way to enter new markets and incorporate technological advances.

The goal of a company’s policy is to improve and maintain its competitive advantage. With the help of M&A in the banking sector, banks can achieve significant growth in their businesses while also reducing their charge to a manageable level. Another key benefit of such M&A is that it reduces competitiveness by eliminating competitors from the banking industry.

Sector of Telecommunications

The telecommunications industry is one of the most profitable and rapidly growing businesses in the world, and the number of mergers and acquisitions in this area has been steadily increasing. It is recognized as an essential part of the global utility and services sector. The telecommunications industry works with a variety of communication media, including mobile phones, landlines, and internet and broadband connections.

With more than 1.20 billion subscribers, India is the world’s second-largest telecommunications market, and it has experienced rapid expansion in the last 15 years. The Indian mobile business is booming and will contribute significantly to the country’s GDP. Telecom mergers and acquisitions are classified as horizontal mergers because the parties involved are in the same industry, namely the telecommunications business. The primary motivation for such mergers is to gain competitive advantages in the telecommunications industry. M&A activity in the telecommunications sector has been on the rise in recent years, and economists predict that this trend will continue.

Mergers come in a variety of forms

There seem to be a plethora of various mergers, from the perspective of commercial companies. Mergers are categorized into the following categories from an economist’s perspective, based on the relationship of the two business units:

Conglomerate merger

Typically, a merger of companies that have no shared business sectors or relationships of any kind. Combined firms may sell similar commodities or share distribution and marketing networks, as well as manufacturing methods. The following types of mergers can be generally defined:

Product-extension merger 

Companies offering separate but related items in the same marketplace or selling non-competing items and using the same marketing strategies of the manufacturing process are merged into conglomerates. Phillip Morris-Kraft, Pepsico-Pizza Hut, Proctor and Gamble, and Clorox are just a few examples.

Pure conglomerate merger

When two companies merge, there is no visible tie between them. Hughes Electronics, for example, is a part of BankCorp of America.

Market-extension merger 

Businesses that offer the same items in multiple regions/geographic areas join to form conglomerates. Morrison stores and Safeway, for example, as well as Time Warner-TCI.

Horizontal merger

It occurs when two enterprises in direct competition maintain the same product categories and markets, resulting in the merger of direct competitors. Exxon and Mobil, Ford and Volvo, Volkswagen and Rolls-Royce, and Lamborghini are just a few examples.

Vertical merger

A client and company or a supplier and business, i.e. a merging of companies with an existing or perceived buyer-seller connection, such as Ford and Bendix or Time Warner and TBS.

Analysis & key points

According to a basic study, horizontal mergers remove sellers and hence modify the marketing strategy, i.e. they have a direct impact on seller concentration, whereas vertical and conglomerate mergers have no direct impact on market structures, such as seller concentration. They don’t have any anticompetitive effects. 

Every merger has its own set of conditions and reasoning, and these factors influence how the deal is handled, addressed, managed, and implemented. The success of a merger, on the other hand, is determined by how well the dealmakers can combine two organizations while keeping day-to-day operations running. Each transaction has its own set of flips, which are shaped by several external factors like the human capital element and command structure. Much relies on the company’s management and capacity to retain important employees who are critical to the company’s long-term success.

All parties must have a clear understanding of the motivation for such a purchase, i.e. there must be a consensus- ad- idiom. Earnings, proprietary information, and customer base are either marginal or fundamental to the acquiring firm, and the purpose will influence the overall risk of such a merger and acquisition. Before the start of any transaction, due diligence is usually performed to assess the risks involved, the number of assets and liabilities to be purchased, and so on.

Merger, amalgamation, and takeover – legal procedures

The Indian Companies Act, 1956, is the foundation law for mergers, and it operates in collaboration with various statutory regulations.

Sections 391 to 396 of the Companies Act, 1956, which relate to the settlement and arrangement with creditors and shareholders of a company required for a merger, contain the fundamental rules on mergers, amalgamations, and reconstructions.

Section 391 grants the Tribunal the authority to sanction, subject to specific criteria, a compromise or arrangement between a firm and its creditors/members. The Tribunal has the authority under Section 392 to compel and/or monitor such adjustments or settlements with creditors and members.

When creditors and members of the affected company agree to such an agreement, Section 393 ensures that the information requested by them is available.

By making an adequate application to the Tribunal, Section 394 offers measures for aiding company reconstruction and amalgamation.

Section 395 gives the power and responsibility to acquire the shares of shareholders who disagree with the majority’s scheme or contract.

Section 396 relates to the central government’s ability to facilitate the merger of corporations in the national service.

Both the amalgamating company or firms and the merged firm should conform with the procedures outlined in Sections 391 to 394 and provide information of all procedures for the Tribunal’s consideration. It is insufficient if one of the companies completes all of the essential requirements on its own.

Sections 394 and 394A of the Companies Act relating to the processes and practices to be undertaken to accomplish company amalgamations, as well as regulations related to the Tribunal’s and the central government’s authorities in this regard.

Following the filing of the application, the Tribunal will issue instructions setting the hearings dates and providing a copy of the application to the Registrar of Companies and the Regional Director of the Company Law Board following Section 394A, as well as the Official Liquidator for the report verifying that the corporation’s activities have not been administered in a prejudicial-like manner that might affect the interest of the shareholders or the public. Before authorizing the plan of merger, the Tribunal must notify the national government of any request brought to it under Sections 391 to 394, and the Tribunal must consider the government’s submissions, if any, before delivering any order granting or denying the scheme of merger. As a result, the central government is given a role in the topic of company mergers before the Tribunal approves or rejects the proposal.

The Company Law Board, through its Regional Directors, exercises the central government’s duties and responsibilities in this area. The Tribunal would allow the petitioner firm an opportunity to respond to all concerns presented by shareholders, creditors, the government, and others when considering the petitions of the firms following the plan of amalgamation. As a result, the organization must remain prepared to deal with a variety of arguments and difficulties.

As a result of the Tribunal’s order, the amalgamating firm’s assets and liabilities are passed to the merged firm. The Tribunal is particularly entitled under Section 394 to make particular provisions in its decision certifying an amalgamation for the transfer to the merged company of the whole or any portion of the merged company’s properties, liabilities, and so on. Only in those situations where the Tribunal specifically instructs so in its order would the workers of the amalgamating firm’s rights and responsibilities be moved to the merged firm.

By the Tribunal’s order authorizing a plan of amalgamation, the assets and liabilities of the transferor company are directly routed to the merged company. The Tribunal also sets guidelines for payments to the covered entity companies’ shareholders, the continuance by or against the issuing corporation of any court proceedings ongoing by or against any share capital, the dissolution (without winding up) of any transferor company, and any other incidents. The corporation to which the decision relates must produce the decision of the Tribunal providing sanction to the scheme of amalgamation (i.e., the merging and amalgamated companies) to the Registrar of Companies within 30 days for certification.

Benefits of Mergers and Acquisitions 

M&A are two permanent forms of corporate combinations used to manage, control, or administrate a company’s operations. While purchasing the company, shareholders benefit from the M&A since the premiums offered to promote approval of the M&A because it provides a much higher fee than the rate of shares. Typically, companies engage in M&A to combine their market influence and control.

  1. Synergy is created by combining two businesses that are sufficiently influential to boost trade recital, financial growth, and overall shareholder value over time.
  2. Competitive Advantage- The new company’s merged assets aid in obtaining and sustaining a competitive advantage in the market.
  3. “Cost Efficiency- The merger increases the company’s spending power, which aids in bulk order negotiations, resulting in cost efficiency.”
  4. Improved product range and industrial exposure – Businesses acquire other businesses to expand their market reach and profit.
  5. A merger may increase the marketing and distribution capabilities of two organizations, opening up new sales prospects.
  6. A merger can also help a company’s reputation with investors: larger companies frequently have a better time obtaining funding than smaller companies.
  7. Economic remuneration may encourage mergers and companies to fully utilize tax shields, improve financial control, and take advantage of alternative tax benefits.
  8. Geographical or other capital investment: this is aimed to smooth a firm’s earnings outcomes, which in turn smooths the stock price over time, providing conservative investors more confidence in the company. However, this does not necessarily result in shareholder value.
  9. Resource transfer: Because resources are allocated differently across organizations, the interplay of target and purchasing company resources can generate value by resolving knowledge asymmetry or merging limited resources. For example, layoffs, tax cuts, and so on.

India’s top five Mergers and Acquisitions

Tata and Corus Steel

The acquisition of Corus Steel by Tata in 2006 was estimated at more than $10 billion. Tata’s opening offer was £4.55 per share, but after a bidding battle with CSN, Tata increased its offer to £6.08 per share. Following the merger, Corus Steel was renamed Corus Steel, and the corporation became the fifth-largest steel producer in the world.

Vodafone Hutch-Essar

Vodafone, the world’s largest mobile provider by revenues, paid $11.1 billion for a 67 percent interest in Hutch Essar. Vodafone later spent $5.46 billion to purchase out Essar’s balance interest in the company in 2011. The purchase of Essar by Vodafone signalled the company’s foray into India and, ultimately, the formation of Vi. Unfortunately, the Vodafone group was soon entangled in a tax dispute with the Indian Income Tax Department over the purchase.

Arcelor Mittal

The largest merger, worth $38.3 billion, was also the most turbulent. Mittal Steel made an initial bid for Arcelor of $23 billion in 2006, which was eventually boosted to $38.3 billion. The executives disapproved of the arrangement since it was affected by the nationalistic economics of numerous nations. The French, Spanish, and Luxembourg governments were among them. The French, American, and British media all slammed the ferocious French opposition. After which, Commerce Minister Kamal Nath even claimed that any effort by France to scuttle the agreement will result in a trade war between the two countries.

Walmart Acquisition of Flipkart

Walmart’s purchase of Flipkart signified the company’s entrance into the Indian market. Walmart defeated Amazon in a bidding war and paid $16 billion for a 77 percent interest in Flipkart. Following the agreement, eBay and Softbank divested their Flipkart stakes. Flipkart’s logistics and supply chain network was expanded as a consequence of the transaction. Flipkart had already bought other eCommerce startups, including Myntra, Jabong, PhonePe, and eBay.

Vodafone Idea merger

According to Reuters, the Vodafone Idea merger is worth $23 billion. Even though the acquisition created a telecom conglomerate, it is safe to claim that the two businesses were driven to do so by Reliance Jio’s arrival and the ensuing price war. In the face of increasing competition in the telecom business, both companies struggled. The deal benefited both Idea and Vodafone, since Vodafone now owns 45.1 percent of the combined firm, with the Aditya Birla group owning 26 percent and Idea owning the rest. On September 7th, Vodafone Idea launched its new corporate identity, ‘Vi,’ marking the conclusion of the two businesses’ unification.

Conclusion

This article demonstrates why organizations choose mergers and acquisitions and what incentives they receive as a result of the process. This can also be turned into a stock and flow model that can be simulated with the right inputs. The purpose of the study was to see if the type of purchase, i.e. domestic or cross-border, had a different impact on the acquiring firms ’ performance. The results and analysis of the acquiring business’ main financial indicators reveal that the impact of mergers differed for domestic and cross-border acquisitions. The sort of purchase appears to have a significant impact on the business’ performance, and it does make a difference. The financial accounts, such as the company’s profit and loss analyses, are deemed to be the most important factors in determining the benefits of mergers and acquisitions. The success of M&A is determined by elements like the company’s profit and loss, market share, shareholder interest, and corporate growth. The success rate can be easily determined by looking at the company’s market worth.

References


LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

https://t.me/joinchat/J_0YrBa4IBSHdpuTfQO_sA

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

Cybersecurity laws of Ireland : an analysis

0
Image source - https://bit.ly/2XXPNw7

This article is written by Jatin K. Chheda, pursuing a Diploma in Cyber Law, Fintech Regulations and Technology Contracts from LawSikho.

Introduction

Throughout evolution, mankind has endeavoured to advance its civilisation. From prehistoric ages, the dark ages to Stone Age, Iron Age, Bronze Age, Industrial Age mankind has used technology in its stride to better its socio-economic purposes.

We are now on the onset of yet another advancement in human evolution, as we step into the most advanced age- the “Digital & Tech Age’. With the advances in technology space at supersonic speeds human civilisation has now entered a new paradigm as global structures, nations, economies, businesses and people are virtually connected together. A new parallel space has opened up transgressing geographical barriers, boundaries and limitations.

At this point in time, it is the countries that are seen making giant strides, to become global technological hubs that drive and empower cyberspace. One such key global player and now a technology hub leading the technological advances is Ireland.

The parallels that are drawn between the physical reality and virtual reality, i.e. cyberspace are fraught with human activity of all kinds. Suffice to say the facets of human nature are seen running amongst these parallels. While on one hand there is the positive side, on the other there are serious security issues threatening cyberspace. Infact, with the borderless incognito nature of cyberspace security is of greater concern and cybersecurity brings with it greater perils if breached. 

This article is aimed at reviewing a multi-layered, robust and well enveloped cybersecurity structure that Ireland’s Cybersecurity Laws create. Concerned persons should take keen interest in understanding the design of this fortified framework through law, regulations and policies both domestic and international. This article aims to review the Irish cybersecurity laws, regulations and landscape.

Ireland- An Integrated Cyber and Technology Hub

In the 1970’s Ireland devised a new industrial policy, aimed at attracting FDI from the USA in particular. What was going to work for Ireland was that it had just joined the then EEC (European Economic Community), present-day EU (European Union) and coupled with being an English speaking nation culturally very close and to add to that Ireland reduced its corporate tax rate to 12.5% (Source) the perfect mix to set the stage for a slow but steady march towards making it a Global Tech Hub.

Over the years Ireland has become the business haven for Global technology giants like Apple, Dell, etc. A brief snapshot of Ireland’s IT landscape will help understand Ireland’s strategic and eminent position in the Global Tech landscape.

According to ‘The Changing Landscape of Disruptive technologies- Global Innovation hubs published by KPMG, Ireland. Is one of the youngest dynamic and tech-savvy countries in Europe also claiming it to be the choicest name for tech bigwigs, startups and entrepreneurs? Image

“Ireland is the location of choice and a gateway to Europe for successful businesses. A winning combination of talented people, attractive business taxes, commitment to the EU and an exceptional track record sets Ireland apart. We are home to entrepreneurs, innovators, and business leaders in every sector from fintech to pharma. They choose Ireland for many different reasons but they each have one thing in common—A DESIRE TO SUCCEED IN A BUSINESS-FRIENDLY EUROPEAN ENVIRONMENT THAT IS GREAT FOR BUSINESS AND GREAT FOR LIVING.” — Anna Scally Partner, Head of Technology, Media and Telecoms, KPMG in Ireland (Source)

The Trident- IDA, Enterprise Ireland and SFI

The Irish have taken a three-pronged approach to boost technology innovation. 

The IDA Industrial Development Authority focuses on MNC’s to create jobs in Ireland. The IDA is mostly the global face of Ireland which markets Ireland to the rest of the world and with presence in other countries to fish for companies to put their European headquarters in Ireland.

Enterprise Ireland focuses on helping Irish businesses thrive domestically as well internationally. Enterprise Ireland is focused on helping Irish businesses by deploying infrastructure like incubators, accelerators, seed-stage matching investment funds, office parks. 

Science Foundation Ireland service research grants to Irish universities. They catalyse tax money to propel innovation and economic development through research by giving grants to Irish Universities. An interesting and noteworthy feature is that they have a program where SFI will pay the salary for one of their researchers to be placed in a company for a year across the globe. After a year the researcher can be hired by the companies if they are willing to join the company or else return to the university.

The ease of business, pro-innovation, and technology-savvy atmosphere and high-quality skilled talent readily available, and a thriving Information Communications Technology sector attracts talent, investors, and multinational corporations to make Ireland their European hub. Backed by a world-class education, a National ICT Skills Strategy and Plan, 2014 developed by the Irish government in partnership with industry leaders ensures constant budding talent. The friendly and light tax regime attracts global businesses to narrow down on Ireland. All of these factors make Ireland a prosperous ecosystem of tech giants, startups, and software players. 

With global tech giants like Google, Microsoft, Apple, Facebook, Twitter Dell, etc. operating European Headquarters from Ireland, and with tech startups, entrepreneurs, and players in the software space all contributing to make Ireland a Global Cyber & Tech Hub, it is imperative that a lot of crucial data is being exchanged, processed and stored in and across the borders of Ireland. A crucial question then arises- How secure is Cyberspace in Ireland? What are the laws governing and regulating Cyberspace in Ireland? What are the laws governing and ensuring Cybersecurity in Ireland?

Analysis of Ireland’s various kinds of Cybersecurity Laws 

Ireland is shielded under multi-layers of laws and regulations relating to Cybersecurity. These laws provide for various cybercrimes like hacking, phishing, electronic theft, etc. Apart from these Ireland has a multitude of laws governing data protection and privacy laws, payment services-related regulations. A comprehensive law review of Ireland’s Cybersecurity laws gives in-depth learning and understanding of Ireland’s approach to cybersecurity laws. Let us go through various kinds of Ireland’s cybersecurity laws.

a. Criminal Justice (Offences Relating to Information Systems) Act 2017

In 2017, Ireland enacted the Criminal Justice (Offences Relating to Information Systems) Act 2017, here with the ‘2017 Act’ taking effect from 12 June 2017 (Source) revamping the Irish law on cybercrimes while enforcing the Cybercrime Directive. The 2017 Act defines specific criminal offences concerning cybercrime-related activities like hacking, phishing, electronic theft, etc. The 2017 Act lays provisions for punishments up to 5 years (Source) imprisonment or a more stringent punishment of up to 10 Years imprisonment for offences of interfering with an information system without lawful authority.

The offences priorly contained in the Criminal Damage Act 1991 (Source) relating to hacking and criminal damage of data are now repealed and replaced under the 2017 Act. The 2017 Act provides for an array of new offences to deal with crimes relating to ransomware and other serious cyber security threats.

The provisions under the 2017 Act are:

Section Provisions
Section 1Interpretation Clause- definitions.
Section 2Hacking- intentionally accessing information without lawful authority by infringing security measures is an offence.
Section 3Interruption or intentional hindrance to the functioning of an information system by inputting data on the system; transmission, damage, deletion, alteration or suppression, causing deterioration of data on the system, or rendering data on the system to be inaccessible are all offences relating to Denial-of-Service attacks and are offences under the section.
Section 4Interference with data without lawful authority- intentionally deletion, damage, alteration, suppression, or rendering inaccessible, causing deterioration of data on information systems is an offence under section 4 of the Act.
Section 5Intentional Interception of transmission of data without lawful authority is an offence. 
Section 6Production, sale, procurement of computer programs for imports, distribution, or making available for the purpose of committing offences mentioned under Sections 2,3,4 or 5 is whether as a computer’s program or device or codes by way of which information system is capable of being accessed is an offence.
Section 7Procedures relating to search and seizure.
Section 8Penalties relating to offences committed under Section 2, 3, 4, 5, 6, 7(7), or 9(1). Separately under the section identity theft or fraud can be an aggravating factor in cases of ‘denial-of-service attack’ or ‘infection of IT systems’ offences.
Section 9Provides for offences committed for the benefit of a body corporate by a person and where the commission of such offence is attributable to the relevant officer of the body corporate having the requisite degree of control or authority over such person, the body corporate shall be guilty of the offence.
Section 10Jurisdiction- for offences committed within the territory of the State; classification of persons; residency status shall be deemed ordinarily resident if a person has been resident in the State for a period of 12 months immediately preceding the alleged commission of offence.
Section 11Procedures for offences relating to evidence in proceedings for offences outside Ireland.
Section 12Double jeopardy- where a person has been acquitted or convicted for in a foreign land, he shall not be proceeded against for offence relating to the same act within Ireland; the same for.
Section 13Amendments to Criminal Damage Act, 1991.
Section 14Amendment to Bail Act 1997 by adding Paragraph 39 providing for offences under Section 2, 3, 4, 5 or 6 of the 2017 Act.
Section 15Amendment to Criminal Justice Act 2011- substituting Paragraph 30 with 30 and 30A to Schedule 1 of the Criminal Justice Act 2011 providing for provisions for offences related to ‘data’.
Section 16Expenses incurred by the Minister in the administration of the 2017 Act shall be borne by the Oireachtas.
Section 17Short Title & Commencement.

A certain kind of cybercrimes are more frequent and prevalent, let us look at laws relating to such.

b. Review- The status of frequent and prevalent cyber crimes under Irish Laws

  1. Hacking- is an offence under Section 2.
  2. Denial-of-service attacks- are an offence under Section 3.
  3. Phishing is not an offence under the Act per se and does not constitute a specific offence in Ireland. 
  4. Infecting IT systems with malware- is covered under Section 4 of the 2017 Act.
  5. Distribution and sale of hardware or software or other tools to commit a cybercrime- is an offence under Section 6.
  6. Identity theft or fraud with regards to access devices- can be derived from Sections 6, 25, 26 and 27 for deception and forgery of the Criminal Justice (Theft and Fraud Offences) Act 2001 (the “2001 Act”), since there is no explicit mention or provision for this offence.
  7. Intercepting transmission of data without lawful authority- is covered under Section 5.
  8. Unsolicited penetration testing- could be an offence under Section 2 of the 2017 Act.

Cybercrimes under both the Acts attract certain punishments as well as penalties.

c. Penalties under the 2017 Act and 2001 Act

Nature of OffencePenaltyAct
Charged Summarily or less serious offenceMaximum fine €5000 2017 Act
Serious OffenceMaximum 5 years’ imprisonment and 10 years in case of Denial-of-service Attacks and an unlimited fine for serious offences.2017 Act
Making a gain or causing a loss by deceptionMaximum penalty of 5 years’ imprisonment and an unlimited fine2001 Act
Forgery and unlawful use of a computer offencesMaximum 10 years’ imprisonment and an unlimited fine2001 Act

Data Protection Laws

The matters relating to how data is collected, processed and stored in Ireland are governed by The General Data Protection Regulation (Regulation (EU) 2017/679 (“GDPR”) and the Data Protection Acts 1988 to 2018 (“DPA”). The onus lies on the data controllers to take utmost appropriate security measures against unauthorised access, alteration, deletion, disclosure, damage or destruction of data and are obligated to report incidents, particularly where incidences occur involving transmission of data over a network. The DPA provides for offences related to unauthorised sale, distribution or disclosure of personal data obtained without prior authorization.

E-Privacy

The e-Privacy Regulations 2011 (S.I. 336 of 2011) (Source) regulate how providers of telecommunications networks and services handle personal data while requiring service providers to take appropriate technical, security and organisational measures to safeguard the privacy and report incidences. The e-Privacy Regulation 2011 also prevents interception or surveillance of communications and related data without users’ consent. 

Under the e-Privacy Regulations providers of publicly available telecommunication networks are mandated to ensure adequate technical and organisational measures of security and security policy. Measures ensuring that personal data is accessible only by authorised persons for legally authorised purposes and must ensure the protection of data against tampering, misuse or damage, etc. 

Payment Services

The European Payments Services Regulations introduced regulatory technical standards to ensure strong customer authentication systems. It also requires payment service providers to inform the national competency authority in case of major security incidents to the authority as well as the customers. 

Dissemination of inaccurate information

In case of a security breach resulting in the dissemination of inaccurate information, the aggrieved person may seek remedies under the Defamation Act 2009 or at common law for breach of confidence and negligence.

Critical Infrastructure

The NISD Regulations and Commission Implementing Regulation (EU) specify elements to identify measures to ensure the security of network and information systems shall be applicable always. The National Cyber Security Strategy 2019-2024 mandates for the National Cyber Security Centre to engage in activities to protect critical information infrastructure. The NSSC authorised officers can conduct security assessments and audits and enforce instructions to remedy deficiencies under the enforcement powers under the NISD Regulations.

Reporting to authorities

In case of an incident where a personal data breach has occurred, the data controller must without any delays if possible within 72 hours of becoming aware of the data breach must notify the DPC of the incident with a description of the breach and number of data subjects or personal data records concerned. A list of likely consequences of breach and measures taken or planned to tackle the breach must also be provided.

Where the data breach risks the personal security, freedom, and rights of a data subject, the data controller must notify the data subject, to whom the data pertains. In case of a data breach related to services offered by unlikely available telecommunications networks, the service provider must inform the DPC of the incidents or potential incidents. In specific cases of breach of security of the network, providers must inform their subscribers without delay. Where specific data subjects’ personal data is breached, such subscribers must be informed personally. 

Where there is a substantial impact that hampers services, the NISD Regulations require OES and digital providers to notify NCSC with information for the NCSC to assess the impact on services and its cross-border impact as well.

Section 19 of the 2011 Act mandates reporting of certain cybercrimes to the Irish Police failure of which is an offence. 

The Central Bank of Ireland’s ‘Cross Industry Guidance in respect of Information Technology and Cybersecurity Risks’ mandates firms to report to themselves, incidences of data breaches or cybersecurity incidents that could have a grave and adverse impact on its ability to provide adequate services to their client and also adversely impacts its financial condition and reputation.

The laws are stringent on reporting incidents to the authorities. Non-compliance for not reporting incidents to authorities will make service providers or data controllers with substantial penalties. It is important to understand the liability that arises upon non-compliance.

Penalties for noncompliance

Failure to comply with adequate security measures or reporting incidents of the data security breach as per GDPR may attract administrative sanctions, ban on processing, and penalties up to €10 Million or 2% of global turnover as per Article 83 of the GDPR (Source).

Failure or non-compliance at the hands of telecommunications networks or services to comply with aforesaid e-Privacy Regulations is an offence that may attract a penalty of up to €250 thousand. In case of conviction, the court may order for any information relating to the offence to be destroyed or confiscated and relevant data to be erased.

Under NISD Regulations in absence of notifying an incident by an operator of essential services or a digital service provider may attract a penalty of up to €10 Million or 2% of global turnover (Source).

Conclusion

In a few decades, Ireland has made giant strides in rightfully attaining a leadership position in the global tech space. Making optimum strategic decisions from attracting foreign FDI in tech space to lowering corporate taxes to leveraging its socio-cultural aspects to deploying a three-pronged approach to fortify itself as a haven in the global tech arena. All of this however cannot and will not thrive without adequate measures to ensure robust law and policy regulating cyberspace.

Here again, Ireland has a strategic advantage with the multilevel regulation domestically with its own laws like the 2017 Act, 2011 Act, e-Privacy Regulation, etc. further enveloped with the European Union norms like the GDPR, European Union Payments Services Regulation, NISD Regulations, etc. giving it a robust defence system in its cybersecurity arsenal. Nonetheless, technological advances pace forward at dizzying speeds and so do cybersecurity breaches. Ireland must continue to think forward and strategically like it always has and endeavour to keep itself two steps ahead of the detractors to deter, prevent, prohibit and avert cybersecurity threats and attacks especially given the fact that it is one of the key regions handling global data. 

With the National Cyber Security Strategy 2019-2024 (Link) the Irish government’s main objectives are to ensure the state can respond and manage incidents of threats, attacks, and even national security and protect its national cybersecurity infrastructure from cybersecurity attacks. Under this new plan, Ireland continues to make efforts to increase skills and improvise its legal and regulatory framework to ensure awareness and measures at the national, individual and enterprise levels.

References

  1. https://www.idaireland.com
  2. https://assets.kpmg/content/dam/kpmg/by/pdf/by_ru-en-changing-landscape-of-disruptive-technologies.pdf
  3. https://iclg.com/
  4. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679
  5. https://www.ncsc.gov.ie/pdfs/National_Cyber_Security_Strategy.pdf
  6. https://www.mondaq.com/germany/security/1055382/nis-20–reform-of-the-european-network-and-information-security-directive

Students of Lawsikho courses regularly produce writing assignments and work on practical exercises as a part of their coursework and develop themselves in real-life practical skill.

LawSikho has created a telegram group for exchanging legal knowledge, referrals and various opportunities. You can click on this link and join:

https://t.me/joinchat/J_0YrBa4IBSHdpuTfQO_sA

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

Whether the Essential Commodities Act, 1955 needs urgent amendments

0
Image Source - https://bit.ly/2IkSrkd

This article is written by Smaranika Sen from Kolkata Police Law Institute. This article exhaustively deals with the urgent need for an Amendment of the Essential Commodities Act.

Introduction 

Various legislations were made prior to independence and immediately after independence. It had been observed that quite a huge number of legislations were made long back.  Over time, the aims, objectives, and the provisions that were in the Act became irrelevant or did not suffice the present need of society. At this very time, an Act needs Amendment. An Act also can be amended if it is found that the provisions in the Act are somehow going against the public policy or are unconstitutional. The Essential Commodities Act, 1955 contains some provisions which were believed to be not beneficial in the present situation. This was amended in the year 2020. According to a survey, it was observed that 63% of the farmers accepted the Amendment and the others were not quite happy with it. Through this article, let us analyse whether the Amendment was required or not. We will also try to analyse if any further Amendments are required to be made.

The Essential Commodities Act: an overview

The Essential Commodities Act was made with keeping in mind the everyday essential needs of human beings. In simpler words, essential commodities are those things that are required to sustain a normal life. The Act mainly states the price and availability of such essential commodities. It further regulates the price, production, and demands of those essential commodities. 

Historical background

The origin of this Act dates back to 1939. During this time, the Government of India made certain rules and regulations regarding the production, supply, etc of certain commodities under the Defence of India Act, 1939. However, the Act was seized in 1946. Later, it was observed that there was a need for legislation that would regulate the production, supply, distribution, pricing of such essential commodities. This led to the formation of the Essential Supplies (Temporary Powers) Act, 1946. With the Third Constitutional Amendment, the above-stated Act was replaced by the Essential Commodities Act, 1955. 

Nature and scope

The Act extends to the whole of India. The main object of this Act was to ensure that the essential commodities were available to the consumers and they were protected from any exploitation of unscrupulous traders. As already stated above, the Act regulated the production, pricing, supply, etc of the essential commodities. The Act also ensures equal distribution of the commodities. According to the Essential Commodities Act 1955, the essential commodities are:

  • Drugs, the term includes any kind of medicines for internal or external use irrespective of human beings, animals. It also includes any such substances that are intended to be used in diagnosis, treatment, mitigation, prevention of any diseases, disorders, etc. It further includes any such substances which are intended to affect the structure of the human body d or for the destruction of vermin or insects which cause diseases in human beings and animals, which are intended for use as a component of a drug, etc. And all other things which are mentioned under the definition of drugs in the Drugs and Cosmetics Act, 1940.
  • Fertilizers can be organic, inorganic, or mixed.
  • Foodstuffs, including edible oils.
  • Hank yarn, made wholly from cotton.
  • Petroleum and its products.
  • Jute, both in raw and textiles.
  • Seeds of fruits, vegetables, cattle fodder, jute, cotton.

Why was the Essential Commodities Act  amended

The Essential Commodities Act 1955 was very recently amended in the year 2020. The new Bill’s main aim was to remove certain items from the list of essential commodities. The Amendment also aims to remove fears of private investors of excessive regulatory interference in their business operations. The Act, in 1995, was legislated when there was a scarcity of food in India. There was a city of foodstuffs due to very low levels of food grain production. The country was mainly dependent upon imports and assistance from various other countries in order to feed the people living in it. The Act was enacted in order to prevent hoarding and black marketing of foodstuff. However, the situation has changed quite a lot now. The Ministry Of Consumer Affairs, Food And Public Distribution had clearly stated that the production of wheat, rice, pulses had increased and thereby India has now become an exporter of several agricultural products. The year 2020 saw the deadly pandemic. It changed various perceptions not only in the life and working procedures of offices, colleges, schools, companies, businesses, etc but also in the administration system of various governmental policies or legislation, etc. Similarly, it was observed by the competent authority that the essential commodities regarding the ongoing pandemic required certain additions and subtractions in the list. Therefore, the Act was amended. This was one of the main reasons for the Amendment of the Essential Commodities Act. 

What are the changes brought

The Amendment stated that the stock holding limit on commodities will now be only imposed under exceptional circumstances like natural calamities or any national emergency or famine with a surge in prices. It further stated that processors and value chain participants will be exempted from the stock limit. The Amendment also removed certain items like onion, oil, potato from the list of essential commodities. Removing such items from the essential commodities list indicates that now the government has the power to regulate its supply or regulate such items under extraordinary circumstances like famine or war. It also stated that any order for regulating stock limit for any agriculture procedure will only be issued under the stated Act if there is a hundred percent increase in the retail price of horticulture produce or 50% increase in the retail price of non-perishable agricultural foodstuffs. 

Can the government bring in such an amendment

The Essential Commodities Act gives power to the government to add or subtract any items from the list of essential commodities in the Schedule. Lately, due to the pandemic, face masks and sanitisers have also been included in the list. The government also has the power to fix a stockholding limit for any commodity for a fixed period if it had been observed that a price of a certain commodity is going up due to short supply. There have been numerous times when governments in the past have recommended removing or adding certain items to the list. In 2001, various chief ministers in a conference call by the union government recommended that all the restrictions under the stated Act should be abolished and movement of the agricultural goods should be freed. Between 2002 and 2006, the number of items from the essential commodities lists reduced to 7 from 70. In 2016, the ruling government removed the licensing requirements, stock limits, and movement restrictions on certain food items, etc. 

Arguments in favour 

Various experts state that the Amendment has been beneficial to the farmers. According to them, the provisions which have been inserted in the Act through the Amendment will boost the farmers’ income. The farmers’ income will be increased as they will be able to sell their products everywhere irrespective of whether it is a local Mandi or not. This will lead the large companies and corporations to buy the crops directly from the farmers and thereby the farmers will get remuneration.

The government stated that over time, India has become surplus in almost every agricultural commodity. Therefore, the farmers have not been able to get better prices because of ill storage conditions in cold storage, warehouses, processing, etc. They further stated that an economic survey of the year 2019 and 2020 observed the stock limits on commodities under the Essential Commodities Act neither brought down the prices nor reduced volatility. Thus, the Amendment was necessary.

Arguments against

The Amendment of the Essential Commodities Act came along with the other two Amendments of the farmers’ ordinances. There were very huge protests from farmers all over the country regarding these ordinances. Various eminent personalities stated that the Amendments in the Essential Commodities Act may lead to an increase in rural poverty, thereby creating an adverse impact on the public distribution system. They further stated that food items like pulses, onions, and edible oils are the basic requirements of every human being and if the government would not regulate the supply of such food items there are very high chances of hoarding them. Some eminent personalities also stated that the bar of stock holding limits in the provisions of the Essential Commodities Act was too low and it will create a tyranny among the government officials. 

The forum of traders’ organisations stated that the Amendment will enhance the big businessman to hoard essential commodities which will eventually lead to rising prices. The opposition parties claimed that the Amendments were rushed through, there were no such property discussions in the houses. They further claimed that the Amendment regarding the Essential Commodities Act conflicted with the constitutional rights of the state. They also agreed on the fact that the new provisions were only beneficial to the hoarders and the black marketers.

new legal draft

Present scenario

In India, the dreadful effect of pandemics started in 2020. With several months of lockdown and people living in quarantine, slowly and steadily people started to get back to their normal life. Unfortunately, the pandemic was not yet over. The second wave of the pandemic was witnessed in the very early of 2021. The second wave created more chaos than the first wave. It showed that the healthcare system was unable to provide oxygen cylinders or beds or remdesivir injections etc which when needed for the human life to survive. It was a terrible scene that was witnessed by people all over the country.

Now the Amendment which was made by the Ministry of Health and Family Welfare in 2020 included the medical devices under the ambit of drugs in Section 3b  of the Drugs and Cosmetics Act 1940 and we know that drugs are one of the essential commodities listed under the Essential Commodities Act. Despite having such legislation, it was observed that there was the hoarding of oxygen cylinders, pulse meters etc. There was even black marketing of various medical devices which were required utmost then. It was observed that the Delhi Police arrested businessman and restauranter black marketing and coding of oxygen concentrators during the second wave of the pandemic. If it is looked at from the social perspective, we can see that the people who are affected due to such black marketing of essential commodities are the people who belong from the economically weaker background. They do not have enough money to buy oxygen cylinders or medical drugs or other necessities. It is leading to the exploitation of people’s lives, especially from weaker economic backgrounds. There have been many other instances also similar to this. All these incidents show that there is an urgent need to amend the Essential Commodities Act. 

Problems of the Act and solutions

The vital problem is that the Essential Commodities Act has no such punishment concerning black marketing or hoarding. It doesn’t support such Acts but it also does not create any punishments for them. A study shows that there have been more than 500 FIRs regarding the hoarding and black market sale of oxygen cylinders, medical drugs etc. However, nothing could be considered an offence as there is no punishment for it. Even the man who was arrested by the Delhi Police could not be charged for his Acts because of the lack of provisions in the Act. 

Some competent authorities stated that people who are committing black marketing, hoarding, etc will be punished under the Disaster Management Act, 2005, Epidemic Disease Act, 1897 and Indian Penal Code, 1860, but the lack of context of medical devices had not even rendered any illumination there. It also should be taken into consideration that modification of only a definition of ‘drugs’ will not resolve the situation. The central government must make Amendments adequately to overcome the problems. Some recommendations that can be stated are that: 

  • Offences regarding hoarding, black marketing must be non-bailable.
  • There must be fast-track courts that should be designated to deal with such matters.
  • Most importantly, the prices of medical drugs on medical devices should be moderated under the Essential Commodities Act. 

Conclusion

The Essential Commodities Act has been amended lately, but it seems that there are still some provisions that need urgent Amendments. One of the major modifications that are needed is to include all medical drugs and devices under the essential commodities list. Some state governments have included medical drugs and essential commodities but medical devices are still not included under it. The Act should prescribe strict punishment for those people who are violating the rules of the Act. The punishment should be reasonable enough as well as strict. The problem regarding the inclusion of basic items like edible oils, onions, pulses in the essential commodities list should once again be discussed with eminent economists or authorities in order to have a recheck of whether it is beneficial or not.

References


LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

https://t.me/joinchat/J_0YrBa4IBSHdpuTfQO_sA

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

Comparing Section 6(A) and 43 of the Transfer of Property Act in light of the case of Jumma Masjid Mercara v. Kodi Maniandra Devia

0
Image source - https://bit.ly/2XBYqM7

This article is written by Srestha Nandy, from IMS Unison University, Dehradun. This is an exhaustive article which deals with the issues related to Spes Succession and Estoppel under Indian Laws. This article has been edited by Sanjana Jain and Jannat.

Introduction

In a legal context, the word “Property” refers to a collection of rights that can be owned individually, collectively, or by a group of persons for enjoyment, destruction, or disbursement. Blackstone defined property as ‘the sole and full dominion which a man claims over the things of the world to the exclusion of others.’ The term ‘property’ originated from the Latin word ‘proprius’ which means “one own.” But it is not necessary that property needs to be something materialistic, it can be virtual also. 

In a legal atmosphere, there exist various provisions of property relating to its transfer and existence. Consequently, properties are also separated into various categories having distinctive features. To be specific, properties are of two types movable and immovable. In the case of immovable property in real movement of rights, possession, and ownership takes place. Under Section 3 of the Transfer of Property Act 1882, the term ‘immovable property’ is not defined distinctively. The section gives a concept of immovable property which states that the standing timber, growing grass is not immovable property. Whereas the General Clauses Act 1897 states that immovable property is something attached to the earth, benefits of which arising out of the land. The definition is given under Section 3 clause 26 of the Act. Also, the definition given under Section 2 clause 6 of the Registration Act 1908 includes other particulates such as hereditary allowances, rights to ways, light, ferries, fisheries, or those which are attached to the earth. 

The given case deals with immovable property which includes the aspects of estoppel and those conditions under which a property cannot be transferred. But the interesting fact lies here that often it is misunderstood that spes succession and estoppel are contradictory, but it is not true. In case of any fraudulent transfer by a spes successionis, the transferee can claim his deserved share on the grounds of estoppel where he has provided the consideration in good faith and was unaware of the misrepresentation. 

An overview of Section 6(A) and Section 43 of the Transfer of Property Act

Section 6(A) of the Transfer of Property Act 1882 

There is a distinct idea called Doctrine of Spes Successionis. It states the right of an individual who is an heir currently will receive the property after the death of the owner. This doctrine signifies the possibility that the heir apparent expects to succeed to property by will or succession. 

 Section 6(A) of the Transfer of Property Act, 1882 defines this concept.

The transferability of property focuses on alienation rei prefertur juri accrescendi. This maxim states alienation is better than the accumulation of property. The spes succession signifies the simple succession which exists in ancestral property, self-acquired property, wherever the property moves to the ascendants in case of death of the owner. But the special feature of this is the time of transfer, in case the owner is alive, one’s heirs only hold the right on the property that in future one will possess the ownership, but at present one cannot exercise any rights to transfer the property. 

For instance in case C is having a small grocery business. His son D is the only child of C. D gets an offer from a promoter that if he sells the land and the shop to him in return he will receive an apartment. D agrees to this and hands over the property deeds without the consent of C. C holds no knowledge about this transfer. This transfer will be void ab initio, as C has the only right to transfer his property. Here D will only have the right to transfer when the property comes to him, legally either after the death of his father or before if he receives it as a gift from his father.

In Latafat Husain And Ors vs. Hidayat Husain And Ors case, the plaintiff’s husband and husband’s brother had equal shares on a property. When the brother dies, his share of the property (⅛ of the share) goes to his mother. The mother gifted the property to the son of the plaintiff’s husband. Plaintiff was the second wife of Fasahat Husain. Fasahat appointed the plaintiff as mutwali who only receives the possession of the property of their son. Also earlier, she had relinquished the dower and claimed inheritance from the property of her husband. After the death of Fasahat Hussain, the plaintiff claimed for ⅛ share as the inheritance of her husband. To this, the court said that she will only retain the possession of the property as mutawali and no claim shall be entertained as previously she had relinquished herself from the inheritance.

The judgment was based on two aspects, first, when one has only possession, one cannot exercise any right or claim on that, and second on the estoppel, or in simpler words when one has promised for something one cannot deny that in future.

One famous maxim states ‘nemo dat quod non habit’ which signifies ‘no one gives what he doesn’t have.’ Specifically, maxim means in case any individual purchases something from someone who himself doesn’t have the ownership right, then it prevents the purchaser from obtaining the ownership title. So in simpler words, Section 43 of the Transfer of Property Act 1882 states no immovable property can be transferred by any individual, who is not authorized to do so. If a person does not possess the title to transfer the property and the same being transfers the property to another, it will be considered void. 

Section 43 of the Transfer of Property Act 1882 

This context is also known as ‘feeding the grant by estoppel.’

Section 43 is based on two aspects, one is ‘doctrine of estoppel’ and the other is ‘equitable estoppel.’ This doctrine signifies that when a person promises for something more than one possesses, then one has to complete one’s promise when one in real acquires the concerning immovable property. 

In Ram Bhawan Singh vs. Jagdish case, the judgment of the case denoted that the doctrine applies to the sale, mortgage, lease, exchange, and charge. Also, the doctrine is not applicable when the acquired interest of the transferor is not the subject matter of the concerned property but to any other immovable property. The court also held that, when the larger part of the interest comes to the transferor, it automatically passes to the transferee, which was misrepresented earlier as the transferor’s property. 

The necessity for comparison between the two provisions

There is a thin line that makes both aspects different from each other. The existence of such difference makes the facts and the judgment of the case proper because otherwise there will be a contradiction in the rights for succession, between the owner and the heirs. Also without this, fraudulent practices and misrepresentations will get favored and no definitive justice will be served.

The other major point to be considered is that estoppel is only applicable for immovable properties along with consideration behind the transfer while Sec 6(a) or spes successionis are applied to both movable and immovable properties. Transfers are void-ab initio under Sec 6(a) but for estoppel, the contract should be in existence till the transferor attains competency. 

In the case of spes succession, both the parties are mostly aware of the existence of the properties and the rules regarding successions. But in the case of estoppel, the chances of misrepresentation and fraudulent practices are more so it becomes easier to identify the grounds where the case stands based on the facts. 

Jumma Masjid Mercara v. Kodi Maniandra Devia 

Facts of the case 

  • In this case, three brothers( B1, B2, B3) had mortgaged property in the year 1990 to the mortgagee for a period of twenty years, from 1900 to 1920. In the terms of the contract it was mentioned that after the completion of twenty years, the property will be returned to the family of the three brothers. 
  • In the family, the two brothers were married, and their wives were W1 and W2, while the third brother was unmarried. These three brothers also had a sister S, and she had two children, and three grandsons ( Gr1, Gr2, and Gr3). All the brothers died and the sister too. Just the two wives and the grandchildren remained. 
  • According to the law, till the wives are alive they will hold the property. In case both the wives die the property will go to the sister and eventually to the grandsons. Grandsons were the heirs under the ground of spes succession. It was also mentioned that Gr1 will receive ½ of the share of the property while the other grandsons will get ¼ of the share of the property each. 
  • Under The Transfer of Property Act 1882 in this case, Sec 6(a) favors no transfer while Sec 43 favors transfer if promised earlier. 
  • It happened that the grandsons transferred the property to a transferee (T) and misrepresented the fact that they held the ownership. To this W2 filed a case against the grandsons as she was still alive. It was the 1st appeal, where the court favored the W1 and dismissed the case. But it is to be noted that the transfer to T was still valid on the grounds of Sec 43. 
  • After this before the 2nd appeal, W2 died, and the property went to the grandsons. Here the transferee T claimed for the property as there was an existence of consideration behind the transfer. 
  • To this a new party entered named Jumma Masjid claiming that the property was transferred to them in the form of a gift deed by the W2, also Gr1 had given them his portion i.e, ½ of the share with consideration of rupees 300. 

The contention of the parties 

  • This case holds two contentions. First the claim of the transferee T on the ground of estoppel. As in Indian law, the transferee has to claim for his share on the ground of Estoppel. 
  • The second is Jumma Masjid’s claim, which is based on a gift deed they received and a share of 1/2 of the property they received from Gr1 in consideration of 300 rupees. Also, Jumma Masjid argued that the grandsons are the heir and under spes succession Sec 6a, they are not eligible for transfer of the property so that is nothing but fraud and misrepresentation making the whole transfer to be invalid. 

Observation of the Court 

  • The court observed that the transferee claimed to be valid. And dismissed the claim of Jumma Masjid. This judgment signifies the rule of estoppel which is an evidentiary aspect while Section 6a substantive law and also mentions that in this case both the grounds cannot be combined, else it will lose the purpose of the doctrine.
  • So finally transferee T got the property where his claim was considered as a valid claim. It was also determined by the court that if the claim of Jumma Masjid was considered then it would lead to a consequence where the provision of spes succession would get vague and the right to transfer would lose dignity. 

Precedent judgments referred by the Court while deciding the case

In the comparison of the English law and Indian law on estoppel, it appears that in the case of early transfer of property by an individual who does not possess the ownership, it happens like this that whenever the individual receives the property, the property automatically gets transferred to the transferee without any claim from the side of the transferee. But in Indian law, it happens that the claim by the transferee is necessary to obtain the property under the ground of estoppel. In this case, transferee T had already claimed for his transfer, so this could not be ignored.

The judgment in the case of Alamanaya Kunigari Nabi Sab v. Murukuti Papiah acted as the precedent to the current case. In this case, it was held that if the transferee acted on the transferor’s representation, which is a spes succession, the case would support the doctrine of estoppel, and the transferee will have all the necessary grounds to acquire the property. 

Conclusion

In cases like this, where there are limited grounds for getting the favor of the court, it is necessary to consider some essential points. Those include the timing of the petitions filed, and because the validity of the grounds won’t be for a long time, after considering all the facts of the case it is really necessary to raise the effective ground to get the decision of the court in favor of the appeal. Even a small initiative could make the case upside down. For instance, if the transferee did not claim for his transfer of property, then Jumma Masjid, will get all the grounds to pull the case in his favor. So in case of subsequent appeals, it is important to analyze the facts as a small gap can lead to a big change. 

References

  1. https://saylordotorg.github.io/text_introduction-to-the-law-of-property-estate-planning-and-insurance/s12-02-personal-property.html 
  2. https://www.srdlawnotes.com/2018/03/theories-of-property-property-law.html
  3. Latafat Husain And Ors vs. Hidayat Husain And Ors 
  4. Nemo dat quod non habet – Academike.
  5. https://lawtimesjournal.in/doctrine-of-feeding-the-grant-by-estoppel/
  6.  Ram Bhawan Singh vs. Jagdish
  7.  Alamanaya Kunigari Nabi Sab v. Murukuti Papiah

LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

https://t.me/joinchat/J_0YrBa4IBSHdpuTfQO_sA

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now
logo
FREE & ONLINE 3-Day Bootcamp (LIVE only) on

How Can Experienced Professionals Become Independent Directors

calender
28th, 29th Mar, 2026, 2 - 5pm (IST) &
30th Mar, 2026, 7 - 10pm (IST).
Bootcamp starting in
Days
HRS
MIN
SEC
Abhyuday AgarwalCOO & CO-Founder, LawSikho

Register now

Abhyuday AgarwalCOO & CO-Founder, LawSikho