Download Now
Home Blog Page 546

Government access to encrypted communications : an overview

0
Image source - https://bit.ly/3kbZfDi

This article is written by Rishabh Shukla, pursuing B.A.LL.B (Hons) from the Maharaja Sayajirao University of Baroda, Faculty of Law. This is an exhaustive article which deals with all aspects of encryption, its increasing impact on government, individuals, laws, and accessibility of encrypted communications by legislative authorities.

Introduction

The term privacy refers to one of those aspects of life that concerns everyone. Every person on this planet has their level of privacy which they wish to secure from others, even when it comes to basic aspects like communication. That is why these days, people are rapidly heading towards applications that provide a safe and secure flow of their data and communication. To quote examples, applications like WhatsApp and Facebook provide this service through a term known as ‘encryption’. However, it is pertinent to note that applications like these prove to be a pain for the government in many instances. Encryption is a crucial concept when it comes to protecting the private information and data of individuals. Also, the right to privacy is one of the Fundamental Rights as declared by the Hon’ble Supreme Court of India, under Article 21 of the Constitution.

However, one must not forget that every coin has two sides, and therefore one must not study the concept of encryption only from one side. Along with the positive effects that it holds, encryption also invites negative effects. Because of the high-level security of encryption, end-to-end encryption gives easy access to the commission of crimes and to get away with the same easily, since no one can trace the origin of the information or the user engaged in such activities. Even the companies themselves, who are providing such high-level services fail, resulting in the government facing obstruction in tracking down the origin of the culprit and maintaining law and order. This speaks regarding needs and laws that are specifically concerned with the term encryption, meaning, level of security, the flow of personal information, the encryption provided by foreign and domestic companies. This article deals in every detail with all the aspects of encryption, its increasing impact on government, individuals and laws. In addition, it attempts to answer the question as to what extent can the government access encryption communication.

Technological influence on the relationship between the government and the citizens 

Today, the concept of E-government (electronic-government) defines the new form of relationship that exists between governments and their citizens. This relationship is incorporated with the execution, development and application of computer instrumentation such as information and communication technologies.

This new way of functioning of the government believes that change is deeper. It goes beyond the technological aspect and focuses on changes that are specific to the public and the government itself. A set up of association and administration of public undertakings, presenting positive transformational processes in their administration and the institutional structure itself, increasing public value to the services provided and the procedures mandates, through the introduction and continuous appropriation of information and communication technologies as a facilitator of these transformations.

This technological reform results in improving the efficiency of the administration and government and thus, introducing it closer and in an easier way to citizens. Public administration is facing challenges to have an efficient and authentic administration, since various activities, including information, can be accessed sitting comfortably on a couch, anytime, anywhere. Additionally, it also results in the reduction of access costs, resources, and time, and eliminates every geographical barrier that may exist.

To wrap it up, the following are the advantages of the implementation of e-Governance:

  • Improved services to the citizens
  • Effective and efficient control over the organization and management
  • Efficiency in the distribution of resources
  • Increasing autonomy, through the extension of self-service
  • Reduction in time and costs of management
  • Elimination of existent geographical barriers

That is the reason why Information and Communication Technologies (ICT) could be a possible solution for increasing the efficiency of the public sector and crucially promoting democratic values, equality, equity, and citizen participation.

The intervention of the concept of the right to privacy 

The validity or invalidity of restrictions on the practice of encryption and cryptography remains mere speculation, in the cases of any issue that is affecting constitutional rights. While it is true that the right to privacy is recognized as an inherent right under the right to life with dignity given in Article 21 and the right to freedom of speech and expression, given in Article 19 of the Constitution, nonetheless, must be stood as a hindrance in restraining such activities that might otherwise be deleterious to national security and interests. Both of these rights contain certain express conditions, as to when they may be deprived.

The protection of privacy acquires greater intricacy within the e-government, because of the fact that it creates a high impact on legal aspects of State security and public affairs. In addition, it is strongly linked to the privacy rights of the citizens. 

In many instances, the legal framework may result in adding difficulties to larger-scale or automation projects. These existing gaps can even result in a contradiction of equal premises. The incorporation of technology into public processes might end up resulting in violation of the privacy of citizens – from capturing their personal data to dissemination, allowed or not, of theirs.

This is the reason why public agencies must indulge in building new processes in order to guarantee the safeguarding of all the information that they collect on the citizens and companies, ensuring the implementation of the relevant security measures and steps, to control access to the information.

To sum up, the implementation of the e-government may result in social improvement, as long as these organizations take into account their planning and consider the risks that are involved. In addition, the government must work on two lines: to ensure all citizens access to technological channels and to make them learn to safely use these new tools.

When it comes to the concept of the Indian Constitution and privacy, the last few decades have seen tremendous growth in the belief that the Indian Constitution contains rights in addition to those that are expressly mentioned in its content. These rights can also be termed unenumerated rights. A simple rationale that is behind this formulation is that enumerated rights would be completely meaningless without providing for certain other additional rights by implication.

Whereas, when it comes to privacy as it is defined in the Indian Information Technology Act, 2000, during the time of legislating on cyber laws, the Parliament of India seemed to have neglected at a large level, the issue of privacy of personally identifiable information or personal secured information. Apparently, there is only a single provision that deals with the same, that is, of Section 72 the Act, which establishes an Information Technology Offence for “Breach of Confidentiality and Privacy”.

Government access to encryption – a threat

With India poised to unveil the new rules that clearly are threatening encrypted communications in and around the world at large, it is safe to state that the fight of encryption is now fully underway.

It must be noted that as per the privacy policies of the applications including WhatsApp and Facebook, the messages that are end-to-end encrypted can only be read by the sender and the recipient of such messages. The encrypted platforms themselves cannot have the access to read these messages, because they don’t have a key to the same. These policies have led to periodic attempts by the administration and legislative authorities to force these platforms to create so-called “backdoors” that would allow them to easily have access to the contents of these messages. Although platforms have resisted the same, and the issue has generally been in a deadlock.

In India, things are moving at a rapid pace to make the concept of end-to-end encryption illegal. India has sought to exert a significant amount of control over the internet in the wake of lynchings that were committed after false rumours spread on WhatsApp. The Indian government has often opted for extremely harsh ways in order to regulate the web – including shutting down internet access at least 95 times last year, and also not to forget, an indefinite shutdown in Kashmir, an act that an honourable judge termed as an “abuse of power” earlier this year.

The set of rules that were proposed over a year ago, would result in forcing these tech platforms to cooperate continuously with requests by the government, without requiring so much as a warrant or court order. Among these requirements is one, that any post can be “traceable” to its origin. In what is believed to be a world-first, the rules would require tech companies to do the investigating and to deploy their sophisticated tools in order to track the spread of a post on their server to its point of origin, and then turn such information received over to law enforcement.

This approach is apparently quite different from the current approach, wherein the Legislative Authorities identify a suspect and then ask these platforms to supply information about them. Now, the companies involved in technological stuff could essentially be required to serve as subordinates of the state, conducting investigations on behalf of law enforcement, without so much as a court order.

Advantages of encryption 

Encryption has various advantages, they are listed as follows:

  1. It can protect information that is stored in any device from unauthorized access, including people who might otherwise have access to one’s devices.
  2. It can help protect information while it is in transit from one device to another.
  3. Encryption can help in deterring and detecting accidental or intentional alteration in data.

Limitations of encryption 

Along with its advantages, encryption has various advantages as well, including:

  1. It is not capable of preventing or safeguarding an attacker from deleting the data together.
  2. A cyber hacker or persons involved in malpractices of information technology can compromise the encryption programme itself. Such an attacker might modify the programme to use a key different from one that is provided or might record all of the encryption keys in a special file for retrieving it later.

Comparative analysis

The dual-use cyber-tech of India is apparently not at par with its western competitors. In addition to this, it is a well-known fact that India is also not a part of cooperative espionage networks like the Five Eyes. In this backdrop, sophisticated encryption is the only viable way to keep data secure both within domestic borders and without.

More and more countries nowadays are choosing to reflexively regulate their encryption. It is therefore crucial for India to take a considered approach. Several international trends have shown that countries that have influential governments and opaque intelligence services are not in the favour of end-to-end encryption. These include countries like Russia, Pakistan, Kazakhstan, Colombia and China. There are two major reasons why India should not follow their lead in setting down its standards on encryption that are more restrictive than market standards. The first one being, an Indian internet user is heavily reliant on the services of companies that are based abroad unlike, say, a Chinese citizen. If India imposes data disclosure mandates that are not compatible with their domestic standards, then there are chances that these requests will fail (as they do under a Mutual Legal Assistance Treaty). Given the fact that the United States and Germany are the clear market leaders in the number of encryption products, Indian policymakers must keenly watch the approach that these governments take towards encrypted platforms.

In India, encryption is mainly controlled by the Information and Technology Act, 2000. In the year 2008, an amendment was made in the IT Act which added Section 84A, a provision that gives enormous power to the government to prescribe modes and methods for encryption. But sadly, no progress has been made by the government so far after that. In India, no law is solely dedicated to encryption.

Conclusion

To sum up, I would like to conclude that encryption is something that is used by many applications and service providers in order to protect the data and information of their users. It is a process through which messages sent by one party gets converted into undecipherable random text which can be made decipherable by encryption key only when it is received by the receiver on the other end. Today, encryption is used by various internet providers, including Facebook, WhatsApp, Service providers, and even some private companies. The growing upgrade in technology along with the growing reliance on online applications speaks volumes for the urgent need to make encryption laws for various reasons, one of which is national security. There have been many instances wherein a crime was initiated or planned or agitated through such online applications, but end-to-end encryption present in such applications made it difficult for the government to locate the whole racket of culprits or the original sender. An example of the same is the famous Blackberry case wherein, it was found that the members of terror attacks in Mumbai communicated the whole plan through their blackberry devices. 

With a plurality of various actors and interests that are involved, encryption can perhaps be referred to as one of the most complex issues of the decade. It includes the implication of rights, commerce, law enforcement and intelligence. The Draft Policy of India fails to truly address the multifarious issues at play, it only addresses law enforcement concerns. Privacy activists and the ICT industry have long favoured stronger encryption standards. However, one major stakeholder that has not yet weighed in on the debate is the intelligence community. Like law enforcement agencies, espionage organisations also prefer to go for easy access to information. However, unlike law enforcement agencies, intelligence organisations are mandated with maintaining ‘information assurance.’ This involves protecting domestic data from being intercepted and exploited by foreign intelligence agencies and non-state actors. 

References


LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

https://t.me/joinchat/J_0YrBa4IBSHdpuTfQO_sA

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

Laws that govern ID theft in India

0
Image source-https://rb.gy/okaom5

This article is written by Debargha Chatterjee who is pursuing a Diploma in Cyber Law, FinTech Regulations, and Technology Contracts from LawSikho.

Introduction

ID Theft or Identity Theft is recognized as a matter of worldwide concern. With the revolution of technology, and with globalization and digital adaptation currently prevailing across all fields, technology has been influencing the mindset of people quite rapidly. The importance of Information Technology has gradually reached newer heights, having positive and negative effects. Identity Theft has been a growing concern in the recent past, owing to the development and revolution of Information Technology in India.

In this article, the author tries to analyze the various forms of ID theft in India and the present legal framework that exists to combat and counter them.

What is “ID Theft”?

“ID Theft” or ‘identity theft’ mainly refers to the crimes that take place wherein a person wrongfully obtains and uses another person’s data. These may include the theft of name, date of birth, unique identification number, bank account number, credit/debit card number, phone number, and so forth, in some way that involves any fraudulent activity or deception.

This can be done, technically, for economic gain to obtain any kind of goods and services. Criminals may also use such data to fraudulently obtain fake identification cards, bank accounts, birth certificates, and important documents.

Even fingerprints can be used as a weapon of identity theft. A lot of personal data via any fake biometric device can cause a breach of personal data. If a person’s fingerprints fall into the wrong hands, it might allow the criminals to make profits in the former’s name which has been used. 

Incidentally, most victims hardly realize that such a breach of personal data has even been done, and by the time the realization arrives, it might even be too late to recover from such an incident.

Recovery from such Identity Thefts is a long process that takes months and years, and yet, the success rate is very low.

Modes of identity thefts

There are various techniques through which data theft could be committed and personal information could be procured through electronic devices. These are as follows –

Hacking 

The persons known as hackers unscrupulously break into the information contained in any other computer system. Section 66 deals with the offense of unauthorized access to the computer resource and defines it as “Whoever with the purpose or intention to cause any loss, damage or to destroy, delete or to alter any information that resides in a public or any person’s computer. 

Diminish its utility, values or affects it injuriously by any means, commits hacking.” The offense of hacking is a violation of one’s fundamental right to privacy as provided by the Constitution of India

It is a method wherein viruses or worms like malware divert information from another computer system by decrypting it to the hacker who after obtaining the information either use it themselves or give it to others to commit fraud using such information.

Phishing 

It uses fake email-ids or messages containing viruses-affected websites. These infected websites urge people to enter their personal information such as login information, account information.

Email/SMS spoofing

The spoofed e-mail is one that shows its origin to be different from where it actually originated. In SMS spoofing, the offender steals the identity of another person in the form of a phone number and sending SMS via the internet and the receiver gets the SMS from the mobile number of the victim.

ATM skimming/carding 

Cybercriminals make unauthorized use of ATM debit and credit cards to withdraw money from the bank accounts of the individual.

Vishing 

The cyber-criminal calls the victim by posing to be a bank representative or call center employee, thereby fooling them to disclose crucial information about their identity.

Pharming

It is a form of online fraud involving malicious code and fraudulent websites, through which cybercriminals install malicious codes on a computer server. These codes automatically direct the user to fraudulent websites without the knowledge or consent of the user. These websites look similar to that of the original website, wherein the users may not even realize the fraudulent activity while submitting personal data and information, as well as their financial data.

Malware

Malware refers to the intrusive software that is designed to damage or destroy computer systems and their existing data, to gain unauthorized access to a network. These are malicious software variants, including viruses, ransomware, and spyware. Malware is typically delivered in the form of a link or file over email and requires the user to click on the link or open the file to execute the malware.

Warning signs

Most victims aren’t aware of the possible signs that act as indicators of an identity threat taking place. These indicators are as follows –

Warning/Notice from bank/service provider;

Unauthorized statement of card purchases;

Randomly receiving of One Time Password (OTP) from unknown websites;

Verification calls from bank or service provider;

Small amounts being debited from bank account at frequent or regular intervals.

Unsecured websites

Cybercriminals make use of unsecured websites to gain access to the user’s personal and financial information. Users are influenced to access these websites and fill in their details which are then received by the cyber attackers or hackers. Websites having the domain name “HTTPS” are considered secured, whereas, websites with the domain name “HTTP” are considered unsecured websites.

Identity theft in the modern era

In the modern age of computerization, globalization, and the internet world, our computers and electronic devices collect a lot of information about every human being and stores them in files secreted deep on its hard drive. Storage of sensitive information such as login IDs and passwords, names, addresses, and even credit card numbers, occur using files like cache, browser history, and other temporary internet files. 

Using such sensitive information, a hacker can access this data by wrongful means and can share the same with someone else or can even install some nasty software on the computer and electronic device to extract sensitive and secretive information.

Identity theft possesses a very serious problem for everyone in this age of digitalization. It is a serious crime, increasing at a tremendous rate, causing damage to consumers financially, leading institutions retail establishments, and the economy as a whole. The reality is more complex with electronic identity fraud expanding the range of forms. It is not necessary that such fraud may only impact financially, but it may also cause intense damage to the reputation, time spent dealing with disinformation, and exclusion from particular services since the stolen name has been used improperly. 

Time has come in order to consider that electronic networks work as an enabler for identity theft, where the thief intends to gain information online for acting offline, and for the basis of theft or other injuries which shall be caused online.

Identity theft has become the crime of the century – the latest and most horrendous of a string of appalling white-collar crimes. Everyone is unsafe with more and more data fraud cases coloring the headlines by the end of the day. 

There has been a rapid increase in data fraud and identity theft cases in developing economies like India, too. Although the Government of India is reluctant enough not to release any data on the number of cases related to identity theft that has taken place in the recent past, it may be assumed with the regular writings in the newspaper columns how dangerous and frequent these identity thefts are occurring in the course of our day-to-day life.

The pandemic effect of identity theft in India

According to the 2021 Norton Cyber Safety Insights Report, the cyber safety major surveyed more than 10,000 adults in 10 countries for the results, among which 1000 adults from India submitted their respective responses. The report indicates that, of 1000 respondents in the country, 36% of Indian adults detected unauthorized access to an account or device in the past 12 months. 

Every 2 out of 5 Indians experienced identity theft. 14% of the victims were impacted during the past year alone, which indicates that almost 27 million Indian adults experienced identity theft in the past 12 months, as per the reports. The reports also indicate that almost 60% of the entire population of adults and from the older generation have a fear of their identity being stolen. 

Almost 65% of the population of adults feel that they are well protected against the occurrence of any kind of identity theft, whereas, many have no idea about what to do in case of identity theft. The major percent who are unaware of the facts of identity theft wish to have more information on such incidents so that they can prepare themselves accordingly.

A major reason for the frequent and astonishingly high rise in the cases of identity theft in India is regarded as the remote working caused by the pandemic. It has been revealed by studies that almost 7 out of 10 Indian adults have been affected by various cybercriminals and hackers due to the remote working feature that the victims had to adapt to, owing to the circumstances. 

Despite such vulnerability concerning remote working, according to reports, only 36% of the total population of adults have purchased security software or increased pre-existing security software after facing unauthorized access to their account or device.

Legal analysis of identity theft in India

“Identity” is the proof of one’s existence, whereas, “theft” is the unlawful possession without ownership or the consent of the entitled person. Thus, identity theft is when an individual possesses another’s existence without the consent or ownership of that person. In simple words, identity is stolen when a person happens to duplicate or impersonate another person who he is not. 

The Black Law’s Dictionary states identity theft as the unlawful taking and use of another person’s identifying data for fraudulent purposes. Identity theft is a very broad term and expands to a considerable number of offenses from misrepresentation to forgery, whilst some are considered to be traditional crimes, and the others, such as ATM skimming, phishing, etc., fall under the broader aspect of identity theft.

According to the Indian Law, identity theft is considered to be punishable under two legislations, namely, the Indian Penal Code (IPC), 1860, and Information Technology Act (IT Act), 2000. As an offense, identity theft was recognized after the amendment of the Indian Penal Code by the Information Technology Act, 2000. 

These amended provisions mainly deal with electronic records to be specific. The electronic record, according to the IPC, 1860, is similar to the definition as stated in the IT Act, 2000, which implies electronic record as, “data, record, or data generated, image, the sound which is sent or received through any electronic form.

Focussing on the provisions related to the offense of Identity Theft, ‘theft’, under Section 378 of the IPC, 1860, may not cover identity theft since it only extends to the movable, tangible, property, and does not include cyberspace. No specific section in the Indian Penal Code, 1860, mentions “identity theft”, but Sections 463, 464, 465, 469, and 474 of IPC, 1860, provided the provisions for penalizing forgery, and after the amendment of IPC, 1860, identity theft has also been included under the scope of these provisions. Section 419 and 420 of the IPC interpret identity theft as cheating and is equally punishable since it is cheating by impersonation. 

Indian Penal Code, 1860, beats around the bush to criminalize identity theft and adds it as an extended forgery or cheating. The term ‘identity theft’ was added into the Information Technology Act, 2000, after its amendment in 2008. It took some time to realize the necessity of offense-specific laws, under Section 66C of the IT Act, 2000, which protects the fraudulent and dishonest use of any identification feature of any person.

Implementing and executing these laws is another big problem that justice faces. There is no personnel to cope up with the constantly updating cybercrimes in India. Also, there is a lack of awareness of these serious cyber-crimes which feeds into the rise in the number of cases of identity theft. National Cyber Security Policy (NCSP), 2013, focuses on the creation of a national nodal agency as well as proper and strict certification policy, yet, lacks in many areas. 

Presently, under the IT Act, 2000, there is only one type of certification policy namely ISO027001 ISMS certification, which does not satisfy the legitimacy of such certification and NCSP does not plan to introduce more certification policies. The NCSP, 2013, also encourages compliance with the open standards and public key infrastructure, without the provision of a basic definition.

Also, the policy aims at a human resource of building a team of around 5 lakh personnel in the upcoming five years, which falls short in reality. Overall, the National Cyber Security Policy, 2013, turned out to be more of a superficial plan and distant from the basic reality.

Thus, it can be said that these laws seem to be sufficient in order to be able to tackle the offense of identity theft, however, the growing number of reported cyber outbreaks raise several questions on the existing legislation.

Laws protecting identity theft

Considering the long list of the forms of Identity Theft, let us choose the top two of its ways, i.e., ATM Skimming and Phishing.

ATM skimming –

Understanding ATM skimming –

The idea of “cash anywhere, anytime” has encouraged the setup of machines that would allow easy withdrawal of cash by authorized account holders. Sooner rather than later, automated teller machines (ATMs) became the primary and much-needed facility that has been provided by the banks to their respective customers. ATM frauds have been conducted in various forms for years now, by way of, placing keypad overlays, hacking of the cameras placed in the cabins, to the installation of cameras in the machine itself. 

Among all of these, skimming has become a much more advance and concerning the form of financial fraud. Identity theft is considered as the initial point as it webs out to other forms of offenses, and thus, a whole chain of events can cause financial losses.

The definition of ATM skimming has not been specifically provided but ATM “Skimming” is considered to be an illegal activity that involves the installing of a device, that is usually undetectable by ATM users, and which secretly records bank account data when the user inserts an ATM card into the particular machine. 

Using such a comprehensive method, the criminals can be able to encode the stolen data onto a blank ATM card and use it to steal money from the account holder’s bank account.

Considering the level of crime such as ATM skimming, the aptness of legislation and accountability for such high-end sinister crime is an angle that needs to be countered while exploring the realm of such offense. 

The only provision of the legislation that, to some extent can cope up with crimes related to ATM skimming is the Information Technology Act, 2000, along with the Information Technology (Amendment) Act, 2008. 

Case Reference

As stated by the court in the case of Commissioner Of Income Tax-III v/s. M/S NCR Corporation Pvt Ltd., ATMs fall under the jurisdiction of cyber penal laws since any computer system is an integral part of an ATM machine, and based on information processed by such computer system in the respective ATM machine, the mechanical function of the cash dispensation or cash deposit is processed. Therefore, ATMs can be considered as computers within the purview of the Information Technology Act, 2000.

Legal framework – 

With only handful of acts that exist to govern cyber law in India, there are a very limited number of provisions that comply and apply to cybercrimes like ATM skimming. Provisions that deal with the crime of ATM skimming under the Information Technology Act, 2000, are Sections 43 & 66. Adding to these two, Sections 43A, 66C, 66D have been added after the amendment of the Information Technology Act, 2008, along with other provisions such as Section 420 of the Indian Penal Code. 

Section 43 of the Information Technology Act, 2000, provides the civil liability of a third party, wherein any person, without the permission of the owner or the person in charge of access, downloads, copies, contaminates virus, damages, disrupts, or causes interruption, denies access, provides access to any unauthorized person in accordance to the act, and charges the services availed of by any person to the account of another. 

These clauses under Section 43 are accustomed to Section 63 to Section 74 of the IT Act, 2000. It must be noted that clauses (i) and (j) happen to deal with more serious crimes related to tampering of computer source code, alteration, damage, or destroying of any information residing in the computer resource. However, Section 43 only lays down the provisions with the liability of a third party instead of a data processor or data controller.

Attempts have been made in the recent Personal Data Protection Bill, 2019, to include damage and the standard on which such fraudsters can be held liable. Although the Personal Data Protection Bill, 2019, does not specifically define damage or injury, however, it explains “harm” which expressively includes the situation causing bodily or mental injury, loss, distortion, identity theft, and financial loss or loss of property, further identifying the standard on which such criminals can be penalized which are more inclusive of the crucial aspects of ATM skimming.

The shortcomings on data protection and the liability of a corporate body can be comprehensibly marked in Section 43A of the Information Technology (Amendment) Act, 2008, wherein, a body corporate possessing, dealing or handling any ‘sensitive personal data’ is negligent in implementing or maintaining ‘reasonable security practices and procedure’, which further causes any wrongful loss or wrongful gain, and shall be liable to pay compensation to the aggrieved person. 

Reasonable security practices and procedures as stated in the explanation may arise by way of agreement, through any law in force or as prescribed by the central government in consonance to expert advice as it may deem fit, and such explanation shall provide a brief outline of what can be constituted as a reasonable practice and procedure rather than that what provides a comprehensive meaning to it.

Subsequently, a wide power and discretion have been given to the central government for providing a suitable meaning to sensitive personal data as well as personal data which is yet to be classified in the Act. However, an effort has been made in the Personal Data Protection Bill, 2019, to give meaning to ‘personal data’ and ‘sensitive personal data’ while omitting Section 43A completely, and further, fragmenting the liability of body corporate into the liability of data processor and data fiduciary. 

According to the Personal Data Protection Bill, 2019, personal data includes traits, characteristics, attributes, or any other information of a natural person about the identity of such person whether online or offline also may include any data or information from which an inference can be drawn for profiling. 

A more comprehensive approach has been taken while defining sensitive personal data, which not only includes biometric, financial, health, sex life, caste or tribe but also inscribes transgender status, intersex status, and sexual orientation. 

Referring to what can be considered as personal data or sensitive personal data, the Personal Data Protection Bill, 2019, also provides an explanation, wherein it states that if disclosure of such data causes significant harm, or, if there is an expectation of confidentiality, such can be classified and sanctioned as sensitive personal data by the authority under the Personal Data Protection Bill, 2019. 

This definition incorporates the loss of personal information through ATM skimming and the subsequent financial loss as sensitive personal data. Yet, there is still room left in terms of the categorization of sensitive data and penalty to be imposed based on the seriousness of the loss occurring due to the negligence and inadequate security by such data processors or data fiduciary. 

ATM skimming, as criminal liability, is covered concerning other offenses under Section 66 of the Information Technology Act, 2000, which explains that any offense covered under Section 43 shall be punishable with imprisonment for a term of 3 years or with a fine which may extend to five lakh rupees or both. 

On the other hand, Section 66C and 66D deal with the punishment for identity theft and cheating by impersonation by using computer resources. These available provisions are still to include ATM skimming or skimming in general as a specific offense.

In the case of Vidyawanti v/s. State Bank of India, a revision petition was submitted by the petitioner to the National Consumer Disputes Redressal Commission, New Delhi. In this case, after a failed transaction at the ATM of State Bank of India installed at Nehru Place, Karnal, several unauthorized transactions took place at the ATM through the account of the complainant. 

On the same day, the complainant wrote a letter to the State Bank of Patiala seeking a refund of Rs. 40,000 wrongfully withdrawn from her account. However, the respondents failed to oblige. This led to the filing of the consumer complaint by the aggrieved party. It was held by the court that, from the shreds of evidence shown to the Hon’ble Court, it was clear that a third party had manipulated the ATM machine which had further resulted in unauthorized transactions. 

Since the money had been wrongfully withdrawn from the account of the complainant, the body corporate who was in such banking business, earned a profit out of it and was liable to make good of the loss incurred to the aggrieved party. 

This case clearly defined the scope of the bank’s liability about the manipulation of such ATMs as the burden of responsibility would be on the banks to make sure that the ATM machines were not altered and ensured compliance with the standard of security.

Phishing

What is “Phishing”?

Phishing, as per the Oxford Dictionary, is termed as the fraudulent practice of sending e-mails disguised as reputed companies to induce individuals to reveal important personal information such as passwords and credit card numbers, and so forth. 

Phishing is a form of identity theft that aims to steal sensitive information such as online banking passwords, credit or debit card numbers, and such relatable information from the users.

It is considered to be a kind of activity that is used to trick people into giving up their financial identity such as, bank account details, pan card numbers, account passwords, etc., over the Internet, or by e-mail, or by other means, and hence, using such sensitive information for fraudulent activities in order to dupe money from the users.

The Indian judiciary system has interpreted “phishing” in the case of the National Association of Software and Service Companies v/s. Ajay Sood. It was held by the court that, ‘Phishing’ is a form of internet fraud. 

In the case of phishing, a person pretending to have a legitimate association, such as a bank or an insurance company, in order to extract personal data from a user, such as, access codes, passwords, etc. which are further used for his advantage, and misrepresents on the identity of the legitimate party. 

Generally, phishing scams involve persons who pretend to be representing online banks and siphon cash from e-banking accounts after conning the consumers into handing over such confidential banking details.

Although phishing is not a new threat the constant increase in the quality of the attacks makes it even more unpredictable. The introduction of new channels of distribution, like instant messaging and social networks posing newer threats and detection of phishing, becomes furthermore difficult. 

Vishing, or also called ‘voice phishing’ has become the most recent development in this field. Vishing attacks are perpetrated through a phone call. Similarly, ‘Smishing’ is a new technique that is being used to phish through SMS.

Subsequently, ‘Pharming’ is the newest method of phishing wherein the attacker redirects the victim to a malicious website of their choice. This is done through the conversion of an alphabetical URL into a numerical IP address to locate and direct the visitors to the malicious website.

Legal framework

From the legal point of view, in India, under the Information Technology Act, 2000, phishing is considered to be punishable since it involves fraudulently acquiring sensitive information through disguising a site as a trusted entity. Some provisions are applicable on phishing, for example, Sections 66, 66A, and 66D of the Information Technology Act, 2000, and Section 420, 379, 468, and 471 of the India Penal Code, 1860. 

The repealed clause (c) of Section 66A of the IT Act states that such an act is punishable if any person, using any computer resource, communication device, or any electronic mail sends a message for causing annoyance, inconvenience, to deceive or to mislead the addressee or the recipient about the origin of such message. 

In this section, the act of phishing could have been included under clause (c) since phishing is an act of deceiving and misleading the receiver of the mail or SMS or any other electronic form, but this section was later omitted in the year 2015 since it went against the freedom of speech and expression under the Article 19(2) of the Constitution of India. 

However, Section 66D of the Information Technology Act, 2000, penalizes cheating by impersonation utilizing any communication device or computer resource with imprisonment as described for a term which may extend to three years, and shall also be liable to a fine which may extend to one lakh rupees. 

However, this section does not mention the word ‘phishing’, yet it is still inclusive of ‘Phishing’ and the extended forms, since, in phishing, there is an impersonation for the purpose of cheating or duping people to extract data or money.

While there is a rise in the number of phishing cases, yet there is no such mechanism or authority placed in order to take cognizance of these matters. The only possible way for the victims of phishing to find a remedy is to report at the police station where the crime has been committed. 

Due to the lack of technology, the Indian police department is not well-equipped to solve these identity theft-related crimes. For the police department to be able to take stern actions, it is necessarily required to have a cyber-cell, or cyber-crime branch, at each district if not at every police station. 

Even in the recently released National Cyber Security Policy, 2013, there are only mere suggestions, with no actual method being formulated to reduce the increasing number of identity frauds.

Case References of identity theft

Let us now study the different landmark cases concerning the various sections under the Information Technology Act, 2000.

Section 43 – Penalty and compensation for damage to a computer, computer system, etc.

Mphasis BPO Fraud, 2005 

In this case, four call center employees who were working at an outsourcing facility operated by “Mphasis” in India, gathered PIN codes from four customers of Mphasis’ client, The Citi Group. These suspected employees were not authorized to obtain such PIN codes. In association with others, the employees opened new accounts at Indian banks using false identities. 

Within two months, they used the PIN codes and other account information obtained during their employment at Mphasis to transfer money from the respective bank accounts of The Citi Group customers to the newly created bank accounts at the Indian banks.It was by April 2005 that the Indian police had tipped off to the scam by a bank from the United States, and had quickly identified the individuals involved in the scam. 

The accused were arrested when they attempted to withdraw cash from the falsified accounts; approximately $426,000 was stolen; the amount that could be recovered was $230,000. It was held by the Court that Section 43(a) was applicable here due to the nature of unauthorized access involved in committing such transactions.

Section 65 – Tampering with computer source documents.

Syed Asifuddin and Ors. v/s. The State of Andhra Pradesh 

This case relates to the Tata Indicom employees who were arrested for the manipulation of the electronic 32-bit number, known as ESN, that is programmed into the cell phones which had been stolen exclusively franchised to the Reliance Infocomm. It was held by the Court that such tampering with the source code invoked Section 65 of the Information Technology Act, 2000.

Section 66 – Computer related offences.

Kumar v/s. Whiteley 

In this case, the accused obtained unauthorized access to the Joint Academic Network (JANET) and hence, deleted, added extra files and changed the passwords to deny access to the authorized users of the organization. Upon investigation, it had come to light that, Kumar, the accused, was logging in to the BSNL broadband Internet connection pretending to be the authorized genuine user and ‘altered the computer database of broadband Internet user accounts’ of the subscribers. 

The CBI had to register a cyber-crime case against Kumar and carried out investigations based on a complaint raised by the Press Information Bureau, Chennai, which further detected the unauthorized misuse of broadband Internet. 

The complaint had also stated that the subscribers had incurred a loss of Rs. 38,248/- due to Kumar’s such wrongful act. It was found that he used to ‘hack’ sites from Bangalore, Chennai, and other cities too, the Press Information Bureau stated.

It was held by The Additional Chief Metropolitan Magistrate, Egmore, Chennai, that the accused, N G Arun Kumar, the techie from Bangalore shall be sentenced to rigorous imprisonment for one year along with a fine of Rs. 5,000/- under Section 420 IPC (cheating) and Section 66 of IT Act (Computer related Offense).

Section 66A – Punishment for sending offensive messages through communication service.

Fake Profile of President posted by an imposter 

On 9th September 2010, an imposter made a fake profile in the name of the then Hon’ble President of India, Mrs. Pratibha Devi Patil. A complaint was lodged from the Additional Controller, the President Household, and the President Secretariat regarding the four fake profiles which were created in the name of the then Hon’ble President on a social networking website, Facebook. 

The mentioned complaint stated that the President’s House had nothing to do with Facebook and the fake profile was misleading the general public. The FIR under Section 469 IPC, and 66A of the Information Technology Act, 2000, was registered based on such complaint at the police station of Economic Offences Wing, the elite wing of Delhi Police, which specializes in the investigation of economic crimes including cyber offenses.

Section 66D – Punishment for cheating by impersonation by using computer resources.

Samdeep Vaghese v/s. State of Kerala

The representative of a Company, which was engaged in the business of trading and distribution of petrochemicals in India and overseas, filed a complaint against nine persons, alleging offenses under Sections 65, 66, 66A, 66C, and 66D of the Information Technology Act, 2000, along with Section 419 and Section 420 of the Indian Penal Code, 1860.

The company had a website in the name of `www.jaypolychem.com’. However, another website, called, `www.jayplychem.org’ was set up in the social platform by the accused Samdeep Varghese, a.k.a., Sam, (who was dismissed by the company) in conspiracy with another accused, including Preeti and Charanjeet Singh, who happen to be the sister and brother-in-law of `Sam’, respectively. 

Defamatory statements and malicious matters about the company and its directors were made available publicly on that website. The accused sister and brother-in-law, respectively, of Sam, based in Cochin, and had been acting in collusion with known and unknown persons, who had collectively created the company and committed acts of forgery, impersonation, etc. 

Another two of the accused, Amardeep Singh and Rahul had often visited Delhi and Cochin. The first accused and others sent emails from fake email IDs of many of the customers, suppliers, banks, etc., to malign the name and image of the Company and its Directors. 

The defamation campaign run by all the said persons named above had caused immense damage to the name and reputation of the Company. Hence, the Company suffered losses of several crores of Rupees from producers, suppliers, and customers and was unable to do business.

Section 66E – Punishment for violation of privacy.

Jawaharlal Nehru University MMS Scandal 

In a severe shock to the prestigious and renowned institute as the Jawaharlal Nehru University, a pornographic MMS clip was made on the campus and transmitted outside the university. Few of the media reports claimed that the two accused students initially intended to extort money from the girl in the video. However, when such an attempt had failed, the accused put the video out on mobile phones, on the internet and even sold it as a CD in the blue film market.

Section 66F – Cyber terrorism.

Bomb Hoax Mail Case 

The Mumbai police had registered a case of ‘cyber terrorism’, one of the first in the state since the Information Technology (Amendment) Act, 2008, came into effect, wherein, a threat email was sent to the BSE and NSE. The MRA Marg police and the Cyber Crime Investigation Cell are jointly probed into the case. The suspect had been detained in this case. 

The police said that an email was sent, challenging the security agencies to prevent a terror attack, by one Shahab Md. with email ID, “[email protected]” to the BSE’s administrative email ID, “[email protected]”. The IP address of the sender was traced and it was found out that such mail had come from a village in Patna in Bihar. The ISP was Sify. 

The fact that the email ID was created just four minutes before the email was sent had come to light soon. In order to divert the police from tracing the accused, the sender had, while creating such email ID, provided two mobile numbers in the personal details column. 

Both the numbers, after investigation, were found out to be belonging to a photo frame-maker in Patna. Consequently, the MRA Marg police registered forgery for purpose of cheating, criminal intimidation cases under the Indian Penal Code, and a cyber-terrorism case under the Information Technology (Amendment) Act, 2008.

Section 67 – Punishment for publishing or transmitting obscene material in electronic form.

State of Tamil Nadu v/s. Suhas Katti

This case is related to the posting of obscene, defamatory, and annoying messages about a divorcee woman in the Yahoo message group. Emails were forwarded to the victim for information by the accused through a fake email account opened by the accused in the name of the victim. 

These postings led to annoying phone calls coming to the lady. Based on the lady’s complaint, the police tracked and arrested the accused. Upon investigation, it was revealed that he was a well-known family friend of the victim and was interested in marrying her. However, she was married to another person, and that marriage ended in divorce, the accused started contacting her. 

On her denial of his proposal to marry him, he started harassing her through the social media platform. It was held that the accused was found guilty of offences under Section 469, Section 509 of the Indian Penal Code, 1860, and Section 67 of the Information Technology Act, 2000. The accused was further sentenced for the offence as follows: 

  • As per Section 469 of the Indian Penal Code, 1860, he had to undergo rigorous imprisonment for 2 years and had to pay a fine of Rs.500/-.
  • As per Section 509 of the Indian Penal Code, 1860, he had to undergo 1 year of simple imprisonment and had to pay Rs.500/-.
  • As per Section 67 of the Information Technology Act, 2000, he had to undergo 2 years of imprisonment and had to pay a fine of Rs.4000/-.

All of the above sentences were to run concurrently. The accused paid the fine amount and was lodged at the Central Prison in Chennai. This was considered the first-ever case where the accused had been convicted under Section 67 of the Information Technology Act, 2000, in India.

Section 67B – Punishment for publishing or transmitting of material depicting children in the sexually explicit act, etc., in electronic form.

Janhit Manch and Ors. v/s. The Union of India 

A Public Interest Litigation (PIL) was submitted, wherein, the petition sought for a blanket ban on pornographic websites. The Non-Governmental Organization had argued that websites displaying such sexually explicit content, especially those that include children, had an adverse effect and influence, leading the youth on a delinquent path.

Protection from Identity Theft

To protect oneself from the increasing rate of identity theft cases, the following measures are being suggested –

  • Compulsory use of a strong password or secret security PIN;
  • Mandatory change of password regularly;
  • Keeping a distance from shady or suspicious websites and links;
  • Never providing someone else any personal information;
  • Protection of documents and important data;
  • Having an authorized security firewall to protect from being hacked into electronic devices;
  • Limiting the exposure of credit cards and other personal information cards.

If someone has been a victim of identity theft, it is important to contact the local police station immediately, followed by a complaint at the residing area’s Cyber Cell Police Station and the concerned institution, for eg., if Naveen’s bank details have been compromised and there is an unwanted transaction taken place without consent, Naveen should contact the Bank authorities where he is the authorized account holder.

Conclusion

Identity theft has been a huge invasion of privacy for a person, affecting the victim, both mentally and socially. However, the impact of identity theft is not limited to the individual; it equally poses a threat to organizations and companies as well.

From the legal point of view, Indian laws are on a back-foot when it comes to the protection of identity theft, or, an individual or organization’s data, leaving a huge scope of improvement of laws as well as policies and regulations concerning identity theft. 

The lack of specific laws, act as a host of manipulative offences which have rapidly grown in the recent past, as compared to the last two decades. To ensure adequate implementation of the existing laws, and to equally monitor the situation, a proper system with an efficient hierarchy of jurisdiction is necessary. 

It is also necessary to curb overlapping of power and employ adequate humane personnel. Lastly, the government needs to create awareness among the consumers for the ways of protecting personal information and safe internet practices. Furthermore, they need to be educated about their rights and redressal of mechanisms that are available to them in case of identity theft. 

To minimize the harm and early detection of identity theft, individuals should also keep a track of their credit report and keep a track of the personal data wherever it is being used, and ask for justification as to why such data is being required and how safe it is.

References


LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

https://t.me/joinchat/J_0YrBa4IBSHdpuTfQO_sA

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content. 

Download Now

An overview of price manipulation associated with the global energy sector

0
Price manipulation
Image Source: https://rb.gy/mwrwmf

This article is written by Rishika Rathore, B.A., L.L.B. student, from the school of law, Jagran Lakecity University. It talks about how price manipulation and its kinds affect the global energy sector while studying the laws and regulations against price manipulation along with global instances of the same.   

Introduction

Price manipulation has always been a disputable issue in all commodity markets, but largely in the energy market. The ultimate goal of a refined energy market is to suffice the consumer’s demand for resources like electricity, gas, oil, etc. at minimum cost by providing the right quantity of the same, without any manipulation of the market.

There’s a famous quote by Mahatma Gandhi, which says, “Earth provides enough to satisfy every man’s need, but not every man’s greed”. Thus, due to the greedy intentions of receiving unfair profits, some individuals deliberately try to influence the market by using untrue and misleading information about the price of an asset or market standard. 

Therefore, to bring down this frequent unethical manipulation, it is necessary to adopt effective laws and regulations along with numerical models to estimate the harms and damages in the market. 

Understanding the energy sector

The energy sector has played a significant role in industrial growth over the past few decades, providing fuel to power the rest of the economy. It is a prime category of capital that deals in producing and supplying energy, having companies involved in the research and development of oil or gas reserves, drilling as well as refining oil and gas. The energy sector includes unified power value companies which get based on how the energy is sourced, generally separated into two categories: renewable and non-renewable. Moreover, it includes secondary sources like electricity. Energy prices are typically driven by supply and demand, along with the revenue performance of energy producers, for global energy. 

Categories in the energy sector

Non-renewable resources

Non-renewable resources are those natural resources that took a long time to replenish and are limited or fixed in amount, for example, fossil fuels. These resources normally get used up before getting restored. Also, it creates harmful wastes that are not easy to dispose of. 

Renewable resources 

Renewable resources derive their existence from natural resources or activities that get regularly replenished. These resources have an unlimited supply and are sufficient in amount, for example, sunlight or wind.

Examples of natural resources: 

Non-renewable sources

Renewable sources

Natural Gas and diesel Fuels

Gasoline

Heating oil

Nuclear power

Petroleum products and oils

Hydropower

Biofuels such as ethanol

Wind power

Solar power

Geothermal energy

What price manipulation means

When traders, stockbrokers, bankers, or analysts make the intentional attempt to artificially increase or decrease the price of an asset, security, or market benchmark, aiming to make greater profits, it is called price manipulation or market manipulation. The word “artificially” is used here because the manipulator seeks to tilt the curve of the demand and supply to drive the price in accordance with his desires.

This manipulation is done by spreading false information, misrepresentations, illegal revenue reports, posting fake orders, or by failing to disclose relevant information about the market prices. For example, a merchant X bought stocks of a company ABC, and soon after this, merchant Y trade-off spreads false information that the price of ABC’s stock is going to decline. Merchant X and many other traders, who bought such stocks, sold them to merchant Y at loss. Here, the market price of stocks got manipulated and that resulted in stock manipulation. 

Kinds of price manipulations

Churning

When any trader or stockbroker attracts more investors by putting down buy and sell boards simultaneously, in order to get higher commission or profit, it indicates churning. This act is illegal and moreover, a violation of ethical relationships among parties. Here, the returns remain inert or even decrease, but due to continuous trading, the traders are able to get huge commissions. 

Ramping

When traders spread false rumors or perform fake illegal activities to either inflate or deflate the price of any stock or asset, it is called ramping, metaphorically known as painting the tape. It affects both long-term as well as short-term traders, along with company fundamentals.

Bear raiding

Bear raiding is done when a trader sells a security and then repurchases the same security, generating a boost in price and activity as well. 

Insider trading

When insiders use confidential and crucial information of a company in order to get benefits or to avoid any losses, it is known as front running or insider trading.

Concerning

When a trader buys enough of a particular commodity, stock, or security with the intention of gaining a price, controlling the supply, or setting up the market price for it.

Known instances of price manipulation in the global energy sector

A huge market manipulation occurred in the United States by two traders and trading firms owned by Norwegian billionaire John Fredriksen. In 2008, traders James Dyer of Oklahoma’s Parnon Energy and Nick Wildgoose of Europe’s Arcadia Energy got sued for reportedly squashing oil markets and making $50 million. They used their respective posts within the U.S trading sector to manipulate the oil market, by driving the price of West Texas Intermediate crude oil to artificially increases, and then back down into the market. Due to this, the prices crashed and traders got dragged into huge unlawful profits from short-sale positions. 

In 2001, Enron became synonymous with corruption and fraud due to his accounting scam, known as Enron Scandal, which resulted in great price manipulation. This fundamental scam was formulated on an old financing method known as “prepay”, where producers sell their product at a discount for cash now and deliver it later. With the help of intermediary banks such as JP Morgan and Citigroup, Enron borrowed dollars and provided commodities to the dealers. Also, he prepared “off-balance-sheet” financing disguised as commodity merchants of which Enron’s investors and creditors were not at all unaware. Enron Corporation was an American energy service and commodities company, established in Texas.

California electricity crisis

In 2001, the state of California witnessed a huge electricity crisis, in which the Californians had to go through a shortage of electricity supply which was a result of the market manipulation and curbed retail electricity prices. The state was in a large-scale blackout at that time, due to which the largest energy company of California, Pacific Gas, and Electricity Company, collapsed and went bankrupt. 

California used to have an installed generating capacity of 45 GW. But at the time of the blackout, the demand was 28 GW. The gap between demand and supply was deliberately created by energy companies, to create an artificial shortage of electricity. The state energy market permitted energy companies to charge higher prices for electricity by playing a false act that electricity is being generated outside the state. Thus, the regulation of electricity market price came into the hands of traders, and therefore, they started selling power at premium prices, causing price manipulation in the energy sector.

The Atlantic Trading case

In the case of Atlantic Trading USA LLC vs BP P.L.C (2020), the plaintiff claimed that the defendant manipulated the spot price of Brent Crude Oil by putting forward the false data on oil transactions to a price reporting service in London, the consequences of which was the twisted price of Brent crude oil in the U.S. futures markets. Moreover, it was claimed that the sole purpose of doing such an act was to deliberately manipulate the prices and trade off those prices. The lower court held that if the manipulated schemes misrepresent prices on the U.S. products that originate overseas, then they are beyond the reach of the law. Subsequently, the Supreme Court refused to review the case any further. 

Wholesale gas price manipulation by EGM

In 2016, a market competitor warned Ofgem about a doubtful activity on Great Britain’s wholesale gas market. The company manager found that a trader had engaged in spoofing for three months, who was working in the name and behalf of Engie Global Market (EGM). The term “spoofing” is a process in which the trader places bids and then offers for the contract without any intention of making any trade, thus he sends out misleading price signals. Ofgem claimed that EGM had failed to take appropriate measures against the prevention or detection of the breach, resulting in price manipulation. Thus, Ofgem put a fine on EGM of £2.1 million as their traders manipulated the wholesale gas prices to increase profits.

GreenHat Energy LLC and electricity betting

Recently, in 2021, the Federation Energy Regulatory Commission fined Green Hat Energy LLC and its owners for placing bets on the financial transmission rights market, also known as potential grid bottlenecks, by sending false price signals. The defectors were three veteran power traders of JP Morgan Chase and Co., who had to pay a sum of $242 million for alleged manipulation of the country’s largest electricity market.

Regulations across the globe dealing with price manipulation in the global energy sector 

The legislation and jurisprudence, regarding price manipulation in the energy market, have seen significant developments in the United States, Canada, and Europe as these holders of mega energy sectors have witnessed huge instances regarding price manipulation. 

Federal Energy Regulatory Commission Rules, U.S 

The Federal Energy Regulatory Commission (FERC), established under the Department of Energy Organisation Act 1977, is an independent federal agency in the U.S. that manages the transmission of natural gas, electricity, and oil, between states. This Commission is responsible for faux pas in the energy sector, including the authority to punish the companies or traders for manipulating market prices. 

The Energy Policy Act of 2005 enables FERC to regulate the transmission and wholesale sales of electricity as well as natural oil, in interstate commerce. Moreover, it monitors and investigates energy markets, in case of any kind of price manipulation. For example, in 2015, an administrative law judge held that the American division of the British multinational oil and gas company, BP plc, has deliberately arranged their deliveries of natural gas in such a way that the future price of natural gas gets manipulated. Thus, the company was ordered to repay its unfair profits of $207,000 along with $20 million as a penalty.

Market Surveillance Administrator or Panel, Canada

The Canadian competitive electricity markets exist only in Ontario and Alberta. In both provinces, the State governments have established agencies to guard against market manipulation. As per the case of Alberta, a separate agency called the Market Surveillance Administrator (MSA) has been established to conduct investigations. But the applications regarding settlements, penalties, or enforcement of decisions, can only be created by the Alberta Utilities Commission.

In Ontario, there are two separate agencies that conduct investigations. The first is a division of the Ontario IESO. The second is the Market Surveillance Panel (MSP), which is a panel of the Ontario Energy Board, responsible for the regulation of energy in Ontario. Although MSP has no authority to establish penalties, it simply makes recommendations through published reports. On the other hand, the IESO has the power to determine penalties, approve settlements as well as conduct investigations. Moreover, in Ontario, fines can be appealed to the Ontario Energy Board, but there is no review system of settlements. 

Regulation on Wholesale Energy Market Integrity and Transparency Regulation, Europe

Europe has been gradual in terms of the development of jurisprudence on energy market manipulation. But in 2011, the European Commission adopted the Regulation on Wholesale Energy Market Integrity and Transparency, known as REMIT. This regulation introduced an EU-wide monitoring system that was able to detect and prevent market manipulation. Also, it requires disclosure of price-sensitive information regarding energy generation, storage, and transmission. The adoption of REMIT produced a shared compliance responsibility between the Agency for the Cooperation of Energy Regulators (ACER) and National Regulatory Authorities (NRAs). The Office of Gas and Electricity Markets (Ofgem) is the applicable NRA in the U.K. Until REMIT, some of the European countries had to rely upon the competition laws to deal with energy market manipulation. 

Conclusion

Manipulation is a prospective serious problem in the energy market, across many countries. Throughout the research and review of legal cases involving manipulation, it has been suggested that there is a need to revise existing laws to provide more specific guidance on what constitutes market power manipulation. The foremost step in this process is to learn the possible consequences of price manipulation in the energy sector. The second step is to identify the kinds of conduct that specify price manipulation, and the final step to draft relevant and strict laws and regulations against price or market manipulation. 

References


Students of Lawsikho courses regularly produce writing assignments and work on practical exercises as a part of their coursework and develop themselves in real-life practical skills.

LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

Amul Dairy wins its first IPR battle outside India

0

This article has been written by Buddhisagar Kulkarni pursuing the Diploma in Business Laws for In-House Counsels from LawSikho.

Introduction

Nowadays, there has been a rise in cases of trademark infringement. The unauthorized use of a trademark or service mark on or concerning products and/or services in a way that is likely to mislead, deceive, or mistake about the origin of the products and/or services is referred to as trademark infringement. A plaintiff must prove in court that it owns a valid mark, that it has priority (its rights in the mark(s) are before the defendant’s), and that the defendant’s mark is likely to confuse consumers about the origin of the products or services offered under the parties’ marks. In this article, we will study the provisions governing trademark infringement in India and Canada. We will further look at how Amul won a trademark infringement case in Canada.

Trademark violation rules in India

Section 29 of the Trademark Act, 1999 (“the Act”)contains the provisions regarding the infringement of the trademark.

To file a trademark infringement action, the trademark must be registered.

The conditions for an infringement action to be initiated

  1. The supposedly infringing mark must be identical to or confusingly similar to the registered trademark;
  2. The goods/services for which the allegedly infringing mark is utilised must be protected by the registered trademark’s registration;
  3. The allegedly infringing mark must be used in the course of business; and
  4. The usage must be made in such a way that it is likely to be misinterpreted as a trademark.

When does the use of a trademark infringe on a registered trademark?

  1. Its resemblance to a registered trademark and similarity to the goods or services covered by registration; or
  2. Its resemblance to a registered trademark, as well as its identity with the goods or services protected by registration; or
  3. Its identity with a registered trademark, as well as its identity with goods and services covered by the registration

is likely to trigger public uncertainty (in case 3 above, uncertainty is assumed), or is likely to have a connection with the registered trademark.

If a registered trademark has a reputation in India and an identical or similar mark is used without due cause concerning products or services that are not similar to those for which a registered trademark is registered, such usage amounts to infringement. The following acts would constitute a violation of the Registered Trademark under the Act:

  1. Utilization of the registered trademark as a brand name or part of a brand name for products or services similar to those for which the registered trademark is registered; or
  2. Use of the trademark in marketing if such marketing takes the undue influence of and is opposite to genuine practice in industrial or commercial matters, or is harmful to its unique identity; or is harmful to the trademark’s reputation.
  3. Even oral use of the mark can be considered infringement under the Act.

Who has the right to sue for infringement?

Infringement can be pursued by the registered proprietor, his heirs, and the registered user(s). A registered trademark assignee may also sue for violation. If the registration of the trademark is obtained before the final hearing of the passing off suit, the passing off suit can be converted into a combined action of infringement and passing off.

Passing off

  • An unregistered trademark user is barred from bringing an infringement action. However, if the mark in question has become well known in India, the owner of such a trademark has redress and may seek redress through passing off action. 
  • The goal of this tort is to protect commercial goodwill and ensure that one’s business reputation is not harmed. Because business goodwill is an asset and thus a type of property, the law protects it from encroachment as such.
  • In a passing off activity, the plaintiff must prove that the mark, name, or get-up – the use of which by the defendant is the subject of the action – is distinctive of his goods in the eyes of most people or a specific class of the general public and that his goods are recognised in the market by a specific mark or logo.

Suits for infringement and passing off

  • The court may issue injunctive relief in an action for infringement of a registered trademark or for passing off for either a registered or unregistered mark.
  • Along with the surrender of the violating marks for deletion, the court may also grant damages or an order for an account of profits.
  • In addition to civil remedies, the Act includes strict criminal provisions governing crimes and punishment.

Trademark violation rules in Canada

Unregistered trademarks – are they protected?

  • Both registered and unregistered (common law) trademark rights are recognised in Canadian law. The mark must be registered to bring a trademark infringement action under Canada’s Trademark Act (“TMA”).
  • Even if the mark is not registered, it may still be protected through a passing-off action, which can be brought under the common law tort of passing-off or under specific sections of the TMA that effectively codify the tort of passing-off.
  • To prevail in a passing-off action, the Supreme Court of Canada in Ciba-Geigy Canada Ltd. v Apotex Inc had held that the claimant must demonstrate:

a. The presence of goodwill concerning the trademark.

b. Public deception by the defendant as a result of a misrepresentation.

c. Actual or potential harm to the claimant as a result of the misrepresentation.

How is a violation of a registered trademark determined?

Under Section 19 and/or Section 20, violation actions brought under the TMA can only be brought for registered marks. A violation under Section 19 of the TMA is more limited. It effectively covers the defendant’s use of an exactly similar trademark in connection with similar goods/services. Violation of trademark under Section 20 of the TMA is wider and takes place when a defendant utilizes a trademark or trade name that is confusingly similar to the claimant’s registered mark. The defendant’s infringed mark does not have to be similar to the claimant’s mark, nor does it have to be used with similar goods/services.

In determining whether a trademark is perplexing, the court will consider all conditions, including certain factors listed in Section 6(5) of the TMA, such as:

  • The marks’ intrinsic uniqueness.
  • The period for which they have been in use.
  • The nature of the items and the distribution routes.
  • The degree to which the marks resemble one another.

Sections 19 and 20 of the TMA both require the defendant to use the contested mark. Section 22 of the TMA prohibits anybody from using another person’s registered trademark in a way that, while not confusing, is likely to reduce the value of the goodwill connected with it.

In Veuve Clicquot Ponsardin v. Boutiques Cliquot Ltée, the Supreme Court of Canada stated that the claimant must demonstrate that:

  • The defendant used the claimant’s mark. 
  • The claimant’s mark is well-known to have substantial goodwill.
  • The claimant’s mark was utilized in a way that was probably to harm its goodwill.
  • The likelihood is that the goodwill will be denigrated.

Who has the right to sue for trademark infringement?

  • Holder of a Trademark

The owner of a registered trademark has the legal right to sue for infringement.

  • A Licensee with sole authority

A trademark licensee (exclusive or non-exclusive) can also file a lawsuit for infringement, subject to any contract terms to the contrary. The license itself frequently specifies whether a licensee is permitted to take this step.

Where otherwise not tackled by contract, Section 50(3) of the TMA states that a licensee may ask that the trademark owner bring infringement proceedings, and if the proprietor is unable or fails to do so within two months, the licensee may carry proceedings and join the proprietor as a defendant.

For the licensee’s use of the mark to accrue to the trademark owner, trademark licences in Canada must meet specific criteria. Trademark licences, on the other hand, are not required to be registered with the Canadian Trademarks Office. As a result, to file a case for violation, a trademark licensee does not need to be registered.

What choices does a trademark holder have when it comes to enforcing its rights?

Civil prosecution

The Federal Court has the authority to implement any of the TMA’s provisions or any privilege or cure conferred or defined by it.

The Federal Court or a provincial superior court, under Section 53.2(1) of the TMA, can make any order it deems appropriate in the circumstances, including:

  • Preliminary injunction.
  • Compensation for the claimant’s losses.
  • Profits of the defendant must be accounted for.
  • Penal damages.
  • Disposal of any offending products, packaging, labels, or advertising material, as well as any equipment used to produce the goods, packaging, labels, or advertising material.

Section 53.2 of the TMA is not comprehensive. There is also common law and equal and fair remedies available.

Criminal prosecution

If criminal proceedings are brought by the government, the Criminal Code of Canada (“Criminal Code”) contains several provisions relating to trademarks that can result in indictable offences or summary convictions. Offenses that are important include:

  • Forgery of a trademark (Sections 406 to 407 of Criminal Code).
  • Passing-off (Section 408 of Criminal Code).
  • Instruments for forging trademark (Section 409 of Criminal Code).
  • Defacing a trademark or using bottles bearing another’s trademark to defraud (Section 410 of Criminal Code).
  • Selling or marketing utilized refurbished goods bearing another person’s trademark or trade name without full disclosure (Section 411 of Criminal Code).

Border controls

A court can use Section 53(4) of the TMA to prevent the future importation of goods bearing an invalid mark. At the request of a registered trademark owner, the judge can order the Minister of Public Safety and Emergency Preparedness to hold up trade-marked goods that are to be imported or released in violation of the TMA under Section 53.1 of the TMA.

The TMA’s Sections 51.0251.12 provide methods to help registered trademark holders in holding up imported and exported fake goods. The Canada Border Services Agency (CBSA) is in charge of enforcing the regime, which allows customs officials to seize and give samples of goods alleged to be fake.

The Request for Assistance (RFA) is at the heart of the anti-counterfeit system, through which the proprietor of Canadian trademark registration and/or registered or unregistered copyright can file an RFA application with the CBSA, enumerating its rights and providing information to allow customs officers to more easily recognize and seize suspected fake items at the border. When CBSA inspectors come across alleged fake items during their inspections, they will contact the brand owner to enable the detention of the goods and the initiation of court proceedings for infringement.

Now, we will analyze how Amul Dairy obtained a significant victory in a trademark infringement case in the Federal Court of Canada.

Facts and issues underlying Amul’s case

  • The Kaira District Cooperative Milk Producers Union Limited (commonly known as ‘Amul Dairy’) and the Gujarat Cooperative Milk Marketing Federation (‘GCMMF’), which markets the Amul brand, sued Amul Canada and four others – Mohit Rana, Akash Ghosh, Chandu Das, and Patel (the first name not known) – in the Federal Court of Canada.Amul Dairy and GCMMF are collectively referred to as Plaintiffs.
  • Since 2010, the Plaintiffs have offered for sale, advertised, sold, and distributed various AMUL branded items in Canada.
  • Plaintiffs, in particular, have held the Canadian Trademark “AMUL” since 2014, and it had been in use in Canada since June 30, 2020.
  • Plaintiffs also owned the Canadian trademark design with the tag line “Amul the Taste of India,” which had been used in Canada in connection with products such as “coffee, tea, chocolate, coffee replacements, sugar, milk, and so on.”
  • Amul Dairy also held the mark and design for the phrase “Amul Pasteurized Butter utterly butterly delicious”, which was used in conjunction with dairy products, edible oils, and fats.
  • In January 2020, Plaintiffs discovered that the said group had overtly duplicated the trademark “Amul” and the logo of “Amul-The Taste of India,” as well as made a false LinkedIn profile.
  • Plaintiffs claimed that Defendants used the trademarks and trade names AMUL and Amul Canada Ltd. on LinkedIn to advertise, market, offer for sale, sell, and supply items identical to the Plaintiffs’ goods.
  • The suspect had set up a LinkedIn page called ‘Amul Canada’ and mentioned themselves as employees of the company.
  • Amul Canada’s LinkedIn page also included icons for “see jobs” and “follow,” and the four offenders were listed as Amul Canada employees.
  • They had failed to answer the legal summons, prompting Plaintiffs’ attorneys to file an ex-parte motion for default verdict.
  • Defendant also claimed to have employees in Canada, even though the Plaintiffs had never authorized or assented to Amul Canada or any of the four individual accused persons using the Plaintiffs’ trademarks and copyrights in any way.

The court’s inferences 

  • Observing the Defendants’ deceptive behavior and the Plaintiffs’ exhaustion of all sensible efforts to have the Defendants cease and desist their behavior both even before and during the beginning of these proceedings, the Bench held that the Plaintiffs had every power to invite the Motion for Default Judgment ex parte to cease the misuse of their intellectual property.
  • The Bench stated that there were potential damages that could have related, whether through sales, marketing, distribution, and/or recruiting employees, and that the Defendants had engaged in purposeful dishonest behavior and had aimed people’s attention to its business in such a way as to lead to confusion in Canada between the Defendants’ goods and business and those of the Plaintiffs.
  • Plaintiffs have satisfied all of the elements for establishing the “passing off” test, which includes the existence of goodwill, deception of the public due to misrepresentation, and actual or potential damages to Plaintiffs, according to the Federal Court of Canada. It further stated that not only has Plaintiffs Brand continued to exist for well over 50 years and is marketed worldwide through digital and other channels – and thus obtained uniqueness over time – and the quantities of milk and cheese distribution demonstrate that Plaintiffs’ products have a public image within at least a certain segment of the consumer market in Canada.
  • The act of incorrectly advertising their desire to rise butter sales in Canada for the Defendants to entice more purported employees, distributors, and/or consumers through social media pages was held by the Court to be unauthorized use of the Plaintiffs’ mark adequate to violate the right to exclusivity contrary to Sections 19 and 20(1)(a) of TMA.
  • Similarly, the Defendants had brought their business to the attention of the public in such a way that it caused or was likely to cause confusion in Canada, at the time they began doing so, between their goods and the Plaintiffs’ goods and business, in violation of Section 7(b) of TMA.

Judgment

In light of the foregoing, the Bench came to the following findings:

  • To perpetually forbid violating the Plaintiffs’ trademark and copyright – ‘Amul’ and ‘Amul-The Taste of India’ – and guiding public attention to the Defendants’ products or business in such a manner as to create or be likely to create confusion in Canada.
  • All LinkedIn pages/accounts used by the Defendants must be transferred to Plaintiffs within thirty (30) days. This includes any other LinkedIn pages/accounts, domain names and social media sites owned or controlled by the Defendants that display Plaintiffs’ trademarks or copyright.
  • To deliver a list of all entities that contacted the Defendants about the Defendants’ business via the LinkedIn pages, as well as their contact information.
  • The Plaintiffs were granted $10,000 in damages for violations of TMA, $5,000 in damages for violations of the Copyright Act, and the lump sum costs of $17,733.

Conclusion

By long-standing in the market, high-quality products/services, and tremendous demand in the market, considerable promotional activities, and affable relations with the trade people and consumers, Plaintiff’s mark has become a household name and is well-reputed and well-known among the consumers.

Defendants are using identical/deceptively similar marks of Plaintiffs. Due to such close resemblance of the Defendants’ mark with the prior adopted and widely used mark of Plaintiffs, the consumers and trade people were getting confused/deceived into believing that the Defendant’s mark is in some way connected to or associated with Plaintiffs. So, if Defendants supplied inferior quality products, it would harm the Plaintiff’s goodwill and consequently affect its sale. Hence, the Canadian court’s decision in favor of Plaintiffs is a very big win for Plaintiffs and it is also its first overseas victory in a trademark case. This case has set a good precedent for trademark violation cases overseas.

References

  1. https://uk.practicallaw.thomsonreuters.com/w-010-8439?transitionType=Default&contextData=(sc.Default)&firstPage=true.
  2. http://www.nishithdesai.com/fileadmin/user_upload/pdfs/Research_Papers/Intellectual_Property-Law_in_India-Web.pdf.
  3. https://www.scconline.com/blog/post/2021/07/14/amul/.
  4. https://www.opindia.com/2021/07/canada-amul-dairy-wins-trademark-case-to-receive-19-59-lakhs-as-damages/.
  5. https://timesofindia.indiatimes.com/city/vadodara/amul-wins-its-first-trademark-violation-case-outside-india/articleshow/84304212.cms.
  6. https://laws-lois.justice.gc.ca/eng/acts/T-13/page-2.html#h-450214.

Students of Lawsikho courses regularly produce writing assignments and work on practical exercises as a part of their coursework and develop themselves in real-life practical skills.

LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

Freedom of the press : the desirability of external regulation

0
Image source: https://bit.ly/2x53D1L

This article is written by Reet Balmiki, from NALSAR University of Law. This is an exhaustive article discussing the current regulation mechanism of the Indian press and its limitations along with the need for external regulation of the press.

Introduction 

“Freedom of the press is essential to the preservation of a democracy, but there is a difference between freedom and license.” 

-Franklin D. Roosevelt

In a pandemic-stricken world, the press has worked tirelessly to fulfill its pivotal role in keeping the public informed. They have worked around the clock, on the frontlines, risking their lives during these trying times to dispense essential information. The media, which is a watchdog in democracy, is also known as the fourth pillar of democracy. While the three branches of the government, the executive, the judiciary and the legislative, ensure the proper functioning of democracy and maintain the checks and balances, the media ensures transparency in social, economic, and political activities. It brings to light the true and harsh events of society and allows the public to form their views and opinions on the happenings. 

The Indian media, however, has been increasingly criticized for deviating from its role and objectives. Though the expansion of the media is desirable, many consider its increasing corporatization to be alarming. These concerns were further aggravated with the Indian media being eroded by the paid news syndrome, which undermines the basic confines of journalism. Additionally, the increasing media competition has resulted in reduced accuracy and credibility and has shifted the focus from providing information fairly and truly to a biased manner to increase viewership and profits. Such bias could feature due to the media house becoming an ambassador of a corporate group or political party or exaggeration to make the story more appealing or by publishing stories from unreliable sources. In this process, the media is forgetting and overlooking its social responsibility. 

Freedom of the press – the cornerstone of a democratic society 

In a democracy, it is the people who appoint the representatives to rule on their behalf and they have the right to know about the affairs of the elected government. The press has played a huge role as a public educator and has enabled transparency in the functioning of the government. In such a society where the press serves the purpose of advancing the public interest by praising and criticizing the government’s actions, the government likely imposes restrictions on the media to suppress such criticism. However, since open criticism is essential for the people to form their opinion and for the government to improve its functioning, the freedom of the press is protected and guaranteed under the Indian Constitution

Constitutional and judicial perspective

The freedom of the press is not explicitly mentioned in the Constitution. In the constituent assembly debates, Dr. Ambedkar resisted the special mention of freedom as he believed the press and an individual to be the same as far as the right to free speech was concerned. Therefore, the press has the same right as all other citizens and is subject to the same restrictions under the Constitution. 

The freedom of the press is a valuable and sacred right enshrined under Article 19(1)(a) of the Constitution. Hence, the press like all citizens has the right to express their views and opinions freely. The courts have also recognized the freedom of the press to be a part of freedom of speech and expression on several occasions. 

The court in Sakal Papers (P) Ltd. And Others vs The Union Of India (1961) observed that “Our Constitution does not expressly provide for the freedom of the press but it has been held by this Court that this freedom is included in “freedom of speech and expression” guaranteed by cl. (1)(a) of Art. 19.” Similarly,  in the case of Romesh Thapar v. State of Madras (1950), the Supreme Court held that “freedom of speech and the press lay at the foundation of all democratic organizations, for without free political discussion no public education, so essential for the proper functioning of the processes of popular government, is possible.”

Scope and ambit of freedom of the press

In the Romesh Thapar case, it was observed that freedom of speech includes the freedom to propagate ideas. For propagating ideas, opinions, and other views, a citizen has the right to circulate them by either word of mouth or in writing. This extends the application of freedom to all modes of publication. In the recent case of Anuradha Bhasin vs Union Of India (2020), the Court analyzed the constitutionality of the internet shutdown and movement restrictions on the ability of journalists to travel and publish in Jammu and Kashmir. Further, the impact of the imposition of online communication and freedom of movement restrictions was analyzed. The Court, in this judgment, extended the application of Article 19 to the medium of the internet, thus extending the freedom of the press to all everything being said in articles, blogs, social media posts, etc.

However, the freedom of the press, like the freedom of speech, is not absolute and is subject to the restrictions under Article 19(2) of the Constitution. Therefore, the right under Article 19(1)(a) has certain exceptions which are limited on the grounds mentioned under Article 19(2). For imposing restrictions based on this Article, it is required that:

  • The action must be sanctioned by law;
  • The proposed action must be a reasonable restriction;
  • Such restriction must be in furtherance of interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality or concerning contempt of court, defamation, or incitement to an offence.

The courts on various instances have observed that the freedom of speech, though not absolute, must be protected unless situations fall under the grounds of Article 19(2). Due to this reason, the court in Romesh Thapar observed that “very narrow and stringent limits have been set to permissible legislative abridgment of the right of free speech and expression, and this was doubtless due to the realization that freedom of speech and the press lay at the foundation of all democratic organizations.

Regulation of the press

The press in India is mostly self-regulating. The notion of self-regulation is that the media should be regulated by the press professional themselves. It means the media develops or creates a self-regulation mechanism independent from government control. They set out appropriate standards and codes of behaviour for the press to uphold their freedom of speech while monitoring and holding them accountable. The Media Self-Regulation Guidebook, Organization for Security and Co-operation in Europe, defines media self-regulation as “a joint endeavor by media professionals to set up voluntary editorial guidelines and abide by them in a learning process open to the public. By doing so, the independent media accept their share of responsibility for the quality of public discourse in the nation, while fully preserving their editorial autonomy in shaping it.

Current regulation mechanism of the press 

While the press in India follows self-regulation, there exist statutory bodies for the regulation of the press by issuing standards that take the role of guidelines. These bodies aim to achieve a balance between the aspects of public interest and solving the issue of accountability of the press. During the 1975 emergency, the encroachment made by the government shook the foundation of democracy and gagged the press. Post the emergency period, self-regulation was adopted by restoring the Press Council of India (PCI) under the Press Council Act 1978

This statutory body was established “for the purpose of preserving the freedom of the Press and of maintaining and improving the standards of newspapers and news agencies in India.” The main functions of the PCI are –

  1. Helping newspapers maintain their independence.
  2. Build a code of conduct for journalists and news agencies
  3. Help maintain “high standards of public taste” and foster responsibility among citizens 
  4. Review developments likely to restrict the flow of news.

The PCI has the power to receive and enquire into the complaints concerning ethical violations and professional misconduct. It has the power to summon witnesses and take evidence under oath, demand copies of public records to be submitted, even issue warnings, and so on. The decisions of the PCI cannot be appealed before a court and are considered final. 

However, the PCI has been severely criticized for being toothless due to the restrictions on its power. The PCI does not have the power to penalize the press for violation of the guidelines imposed by it. This means that though the press must follow these guidelines, there is no downside for them to not abide by them. This makes the enforcement of the guidelines difficult. Additionally, the PCI is also restricted in its jurisdiction as it enforces standards upon print media and cannot review electronic media like television and internet media. 

As the PCI governs the print media, the Central Board of Film Certification (CBFC) governs all content screened in theatres or broadcasted via television. However, the CBFC does not have the power to issue guidelines concerning standards of news and journalistic conduct. In addition to short films and documentaries, news channels are an important part of the media. They are governed by the News Broadcasters Association (NBA), which can warn, censure, and impose fines for the violation of the Code of Ethics. However, they lack the statutory power required to ensure the proper implementation of such guidelines and codes. This brings the need for proper self-regulation mechanisms that rightly balance the freedom of the press and their social responsibilities towards the people.

Need for external regulation

The press, the backbone of a democracy, has gained more popularity than ever in recent times. However, on several occasions, the press has diverted from its pertinent role of providing information in a scramble for more viewership. The line between news and advertising has blurred over time and this endangers the essence of democracy, a free and authentic press. 

new legal draft

With the prominent role and responsibilities of the media comes great influential power. Such power along with unsupervised freedom could lead to the misuse of the institution for promoting misinformation. Lack of supervision and accountability of the media can result in practices against the spirit of journalism. This also reduces the credibility of the media and risks people’s trust in democracy. Therefore, while the freedom of the press must be respected and protected, there is also a need for external regulation to ensure that media isn’t used as a tool to achieve ends against the principle of democracy. Due to the media’s powerful role and the current trend, the need for external regulation is increasingly echoing due to various reasons:

  • The press acts as a watchdog of the three organs of the government and ensures that they perform their constitutional duties. In this manner, the press holds the government accountable for its actions on behalf of the citizens. 
  • To ensure that the press while playing this crucial function does not unfairly take advantage of its role and the influence it has on the citizens, there must be a few ethics and guidelines overseeing its role. 
  • The increasing corporatization and competition among the press, along with its expansion to social media and the internet, calls for an urgent need for external regulation. 
  • While print media is reviewed and regulated by the Press Council of India, television channels and modes of electronic media remain unregulated. 
  • To ensure that the media provide a free flow of accurate and credible news to serve the interest of the people. The spread of fake news may harm the reputation of a person or a community as well as result in a loss of credibility and trust in the media.
  • To curb the spread of yellow journalism and ensure the spread of mere truth. Yellow journalism is a wide term and includes sensationalism, gossips, scandals, misinformation, and over-exaggeration to distort or twist the news. 
  • To subdue the recent spike in paid news has resulted in bias and reduces the independence of the press. The press provides favourable treatment to institutions that have paid for the news. Here, the news is an advertisement without the “ad tag.” This is a serious malpractice as it deceives the public by manipulating the actual news.
  • To keep a check that the press covers the significant news concerning socio-economic issues. The recent scramble for television rating points (TRPs) has resulted in the press covering popular matters like activities of film stars, cricketers, etc while leaving out important issues that the people should be aware of.
  • Though freedom of expression is a fundamental right, the spread of hate speech against a person or group through the emergence of multiple platforms for dissenting hate must be countered. It is necessary to ensure that the press follows basic ethics and is aware of the responsibilities and social implications that come with a free press. 
  • The media interference in judicial matters is not unheard of. The media often comment on ongoing cases and present their implementation of the facts. This is known as investigative journalism. Such news often influences the people and judges by creating a  perception of innocence or guilt. This is known as “trial by media” and impacts the person’s reputation or the verdict of the judgment. Such abuse of the influential power by the press must be kept under check to ensure a fair trial by the judiciary. 

Limitations of self-regulation by the press

The propagation of recent trends like yellow journalism, hate speech, media trials, fake news, etc highlight the shortcomings of the current system of self-regulation by the press. There exist several limitations in this system, these are-

  • The PCI drafted the Norms of Journalist Conduct as required under Section 13(2)(b) of the Press Council Act 1978. However, due to the lack of statutory backing in the implementation of the Code, it is considered a moral obligation and is followed by a few conscious journalists favouring self-regulation. 
  • The challenges in enforcement have resulted in several ethical violations and the spread of misinformation. 
  • The Act does not empower the Council to enforce its orders and directions. The non-execution of orders restricts the Council from mandating self-regulation by agencies refusing to follow the issued norms. Due to this, the very object of regulating journalistic practices and standards is not served.
  • The risk of industries subverting regulatory goals with their business goals undermines the basis of self-regulation. 
  • Though the press performs a public function and has social responsibilities, it is still a private entity. The private nature of self-regulation may overlook the needs of the public or the pivotal role of the press in a democracy. 
  • The press may be unwilling to invest the resources or may lack the power to ensure proper self-regulation and enforce corrective sanctions. 
  • There is also a lack of incentive to monitor and enforce sanctions to ensure self-regulation. 
  • A self-regulator may likely ignore their duty if the long-term gain of doing so outweighs the present loss incurred.
  • The lack of proper and equal enforcement of self-regulation puts those who abide by the norms at a disadvantage. This reduces the chances of implementation of such a process due to the possibility of incurring loss or reduction in profits. 

Conclusion

The sole aim of journalism should be service. The newspaper is a great power, but just as an unchained torrent of water submerges the whole countryside and devastates crops, even so, an uncontrolled pen serves but to destroy.

-Mahatma Gandhi.

Over the years, the Indian press has continued to gain more importance and has grown stronger. The role of a free press in a democracy is crucial and is well-protected under the Indian Constitution. However, considering the risk of absolute power lying with an unchecked press and observing the recent dangerous trends set by the Indian press, the need for external regulation is emerging along with the increased importance of the press. 

With the emergence of newer modes of media, the reach of the press has expanded. This increases its power and simultaneously, its social responsibilities. To uphold the freedom of the press while restraining its actions to its constitutional role, there is an urgent need for a proper external regulatory body to maintain the balance. The current mechanisms, though empowering, are futile due to the restrictions imposed on the statutory bodies. Thus, there is a need to enforce and implement mechanisms that enable a free press to perform its democratic functions. 

References


LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

Evolution of Hindu women’s right to property

0

This article is written by Arya Mittal from Hidayatullah National Law University. The article deals with the evolving rights in holding and disposition of property to Hindu women under Hindu laws. 

Introduction

“A daughter always remains a loving daughter. A son is a son until he gets a wife. A daughter is a daughter throughout her life.”

-Justice Arun Mishra

The above-mentioned quote is an excerpt of the recent landmark case (discussed later) which accorded equal status to daughters in comparison to sons in coparcenary rights. Since time immemorial, women in India and abroad have had struggles to gain their most basic rights. One such right is the right to property. In ancient Hindu society, it was presumed that the daughter would one day be married and sent to a different household. Therefore, in case of partition or division of property, it was only the male Hindu members of the family who would get a share. The only time women would get property was when they were married (stridhan) and on other auspicious occasions in public gatherings. Women did not have any other source of income and thus, were not given a share in the property.

With the evolution of time, women have come at par with men. They have their independent source of income and property. In such a scenario, the laws needed to evolve with society. Therefore, different laws have been enacted in the past few decades, some of which include the Hindu Women’s Right to Property Act, 1937, Hindu Succession Act, 1956, Hindu Succession (Amendment) Act, 2005, and many more. There have even been various judicial pronouncements to clear the ambiguities in the law and bring out the correct interpretation. All of these laws and judgments have been discussed further.

Hindu woman’s right under classic Hindu Law

Holding of property

There are adequate proofs in the historical Vedas and commentaries which justify that women were capable of holding the property. However, practically, they were not given any such rights. Moreover, transactions done by them were considered to be invalid. Their property was bifurcated into stridhan and non-stridhan. The former was further divided into saudayika and non-saudayika.  

Saudayika property: Women had absolute ownership over saudayika property. Such property included gifts by her husband, parents, or other family members.

Non-saudayika property: Women had limited ownership over their non-saudayika property after marriage and consent of husband was necessary for alienation. Such property included gifts by non-relatives.

Non-stridhan property: These included gifts or property inherited by her through a male or female relation. She had limited rights over it as she could only use such property but had no right to alienate it. Such property would devolve on her death.

Introduction of the Hindu Women’s Right to Property Act, 1937

With the introduction of the Hindu Women’s Right to Property Act, 1937, the widow of the deceased husband now had a right over her husband’s property after his death. Unlike previously, where the property was divided among the surviving coparceners by the doctrine of survivorship, now, it was the widow who had the sole right over such property. However, she had limited rights over such property which remained with her till her death.

Disposition of property

As regards the rights of disposition, a woman had an absolute right to dispose of her saudayika property irrespective of their marital status. However, in the case of non-saudayika property, her absolute right would extinguish after marriage and she needed the consent of her husband to alienate or dispose of such property. The non-stridhan property was inalienable nor did she have any right to dispose of it to anyone. After her death, such property would be divided among her heirs.

As regards her deceased husband’s property, she had no right to dispose of such property and it would be disposed of by rules of inheritance and survivorship in case of self-acquired property and ancestral property respectively.

Hindu woman’s right after the Hindu Succession Act, 1956

Holding of property

Section 14 of the Hindu Succession Act, 1956 states:

“Any property possessed by a female Hindu, whether acquired before or after the commencement of this Act, shall be held by her as full owner thereof and not as a limited owner.”

In the explanation, it explicitly states all types of property by whatsoever name it may be called. It states, ““property” includes both movable and immovable property acquired by a female Hindu by inheritance or devise, or at a partition, or in lieu of maintenance or arrears of maintenance, or by a gift from any person, whether a relative or not, before, at or after her marriage, or by her skill or exertion, or by purchase or by prescription, or in any other manner whatsoever and also any such property held by her as stridhana immediately before the commencement of this Act.

Thus, with the introduction of the Hindu Succession Act, 1956, a Hindu woman now had absolute ownership of any property that she possessed. This meant that now, there was no difference between her saudayika property, non-saudayika property, and non-stridhan property. Thus, even in cases of property other than saudayika property, she no longer needed her husband’s consent or to follow any restriction.

Punithavalli Ammal v. Ramalingam and Anr. (1964)

The Supreme Court, in this case, held that Section 14(1) gives an absolute right to women and it cannot be curtailed in any manner by making any presumption or interpretation of the law. It further held that the date of possession of such property is irrelevant as women in possession of the property before the enactment of the provision would now be given absolute rights which were previously limited.

Radha Rani Bhargava v. Hanuman Prasad Bhargava (1966)

The Supreme Court, in this case, reiterated its stand and held the woman to be the absolute owner. Such ownership cannot be challenged on any basis. However, it can be challenged if it can be proved that the widow transferred or alienated the property before the enactment of Section 14 and such transfer or alienation was made without any reasonable cause or legal necessity. Thus, this is the only situation in which the absolute ownership rights of the woman can be challenged. 

Pratap Singh v. Union of India (1985)

Section 14(1) faced a lot of criticisms wherein the Hindu men stated it to be unconstitutional on the ground that it infringes the right to equality guaranteed under Article 14. However, the Supreme Court in Pratap Singh held that the provision was, in no way, a violation of either Article 14 or Article 15(1). It was constitutional since the rights of women need to be strengthened.

Amendment in four states

In 1985, Andhra Pradesh became the first state to bring a tremendous amendment in the succession laws by providing the status of a coparcener to unmarried daughters. Thus, Andhra Pradesh succeeded in bringing this law two decades ahead of other states. Inspired by this amendment, other states including Tamil Nadu, Maharashtra and Karnataka also accorded the status of a coparcener to unmarried daughters. These states became an inspiration and a similar suggestion was then given by BP Jeevan Reddy in his Law Commission Report for changes in centrally enacted law.

Disposition of property

Since Hindu women now had absolute ownership of all the property they had, there was no question regarding the disposition of such property. Women could freely transfer or sell such property and appropriate money gained through such sale as per their wish. As regards the testamentary disposition, she had a right to dispose of her self-acquired property by way of a will. Enactment of Hindu Succession Act, 1956 gave way for intestate and testamentary disposition of property. However, as regards the coparcenary property, it was only men who could dispose it by a will whereas women were not entitled to do so.

Agasti Karuna v. Cherukuri Krishnaiah (2000)

The Court held in this case that women had absolute right over the property of the deceased husband under Section 14. Any transfer or alienation of such property by the wife after the commencement of the Act cannot be challenged by any of the heirs.

Hindu woman’s right after Hindu Succession (Amendment) Act, 2005

Holding of property

One of the most revolutionary changes brought in by the 2005 Amendment Act is that now even daughters were eligible to be coparceners in the Joint Hindu Family of his father. Moreover, her marital status would be irrelevant in this regard. It substituted Section 6 of the 1956 Act and now states:

“On and from the commencement of the Hindu Succession (Amendment) Act, 2005, in a Joint Hindu family governed by the Mitakshara law, the daughter of a coparcener shall,-

  1. by birth become a coparcener in her own right in the same manner as the son;
  2. have the same rights in the coparcenary property as she would have had if she had been a son;
  3. be subject to the same liabilities in respect of the said coparcenary property as that of a son”

Thus, daughters are now considered at par with sons in terms of coparceners and now have an equal right to hold coparcenary property. Thus, with the 2005 Amendment, the following incidents are now possible:

  1. A Hindu woman has an equal right to become the Karta of Hindu Undivided family if she is the senior-most member in the family, which was previously not possible.
  2. Secondly, she can now put her self-acquired property in the family fund which was earlier not allowed by the Act.
  3. In the case of the deceased father, a daughter has an equal right over his property whether she is married or unmarried.
  4. Daughters now have an interest in the coparcenary property and can even demand partition for the same.
  5. Women can now not only start their coparcenary but also their own joint family.

Thus, Hindu women have now been brought at par with men and have all the rights as those granted to sons in terms of the coparcenary.

Prakash & Ors. v. Phulavati and Ors. (2016)

In the case of Phulavati, the daughter acquired the property from her deceased father who had acquired it from his adoptive mother. The appellant in the present case contended that the respondent had a right over only the self-acquired property of the father. However, at this time, the 2005 Amendment was introduced and the respondent now claimed share as per the amendment.

The Supreme Court held that “only living daughters of living fathers could become coparceners” and no remedy would lie if the father died before the commencement of the Hindu Succession (Amendment) Act, 2005. Therefore, no retrospective effect could be given to the Act and in the case of a pre-deceased father, the property would devolve as per the rules of survivorship. Therefore, such a daughter whose father died before the date of commencement of the Act could only have a right in his self-acquired property and not coparcenary property.

Danamma v. Amar Singh (2018)

The facts of Danamma were that a man died in 2001 leaving behind a wife, two sons, and two daughters. After the death, the grandson of the deceased grandfather sought partition. However, they denied any share to the two daughters claiming that they were born before the enactment of the Hindu Succession Act, 1956. The contention was upheld by both the trial court and High Court, though, by then, the 2005 Amendment had already come into being.

On appeal to the Supreme Court, the Supreme Court held that daughters could be treated as coparceners and be given a share in coparcenary property if the case had been pending before the 2005 Amendment Act. Moreover, the date of birth of the daughter was irrelevant, the only condition being, she should be alive on the date of partition.

The above two cases added to further conflicts as both the cases were contradictory. The dispute was finally settled in 2020.

Vineeta Sharma v. Rakesh Sharma & Ors. (2020)

Overruling Phulavati and partly overruling Danamma, the Supreme Court, in this case, stated that the right in coparcenary is accorded by birth. Thus, the birthdate of a daughter is immaterial in this regard. Moreover, it stated that the father need not be alive as on commencement of the 2005 Amendment Act. It held that the Act will be effective retroactively. That is, daughters will be given a share in the coparcenary property even if the father died before 2005. The Supreme Court pointed to the object of the Act which was to remove gender discrimination regarding rules of the coparcenary. Thus, the object could be fulfilled only if the Act was applied retroactively.

Disposition of property

As mentioned before, the 2005 Amendment substituted the former Section 6. Section 6(1) deals with the right of Hindu women to hold the property whereas Section 6(2) and Section 6(3) deal with the disposition of the property.

The former gives the authority to a female coparcener to dispose of her coparcenary property as per her will. It has also been stated above that with the amendment, daughters have been brought at par with sons. As a result, they were even entitled to hold the coparcenary property as well as ask for partition in such property. Thus, in such a case, a woman should even have the right to dispose of her property as per her wish i.e. make a testamentary disposition of such property. Section 6(2) which has been inserted allows this and says that a female coparcener can dispose of her coparcenary property by way of a testamentary disposition.

Section 6(3) deals with the incidents of devolution of property in case of the death of a Hindu. It states that it will be treated as if a partition is taking place and property will be divided as per rules of intestate or testamentary succession. Moreover, it explicitly states that female coparceners are entitled to an equal share as other male coparceners. Also, in the case of a predeceased son or daughter, their heirs would be entitled to such a share in the property.

Section 30 earlier allowed for testamentary disposition of coparcenary property for only male Hindus since females were not previously part of the coparcenary. But since, with the 2005 Amendment, they also have a right to be the part of coparcenary, they even have the right to dispose of the coparcenary property by the way of a will, as also stated in Section 6(2).

Conclusion

The law is now finally settled and Hindu women have been accorded equal rights in the property as Hindu men. Thus, Hindu women have led a long way from the classic Hindu law which gave them very limited rights to the Hindu Succession (Amendment) Act, 2005. In the process, they even got absolute ownership of the property they possessed from the limited ownership which earlier hindered their absolute enjoyment of property. Moreover, they have been accorded coparceners in the Hindu Joint Family. With this, they even got the right to ask for partition as well as dispose of such coparcenary property as per their own will or through a testamentary disposition. Additionally, the role of the judiciary in this regard is also commendable as, without its assistance, the right would have merely existed in legal statutes but not in the Hindu society practically.

To conclude, there has been tremendous development relating to the rights of Hindu women in holding and disposing of their property. Lastly, this has been possible only with the help of the proactive role of the judiciary, that the Hindu women have gained their rights in a true sense. 

References

  • Mulla Hindu Law by Dinshah Fardunji Mulla and Satyajeet Atul Desai
  • Family Law II Lectures by Poonam Pradhan Saxena
  • Supreme Court on Family Property, Partition, Succession, Will and Inheritance by Surendra Malik and Sudeep Malik

LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

Grievance redressal mechanism to solve an industrial dispute in India

0

This article has been written by Kalpesh Shailendra Amrute pursuing the Diploma in Labour, Employment and Industrial Laws (including POSH) for HR Managers from LawSikho.

Introduction

HR professionals, acting as a middle man, have to do a balancing act between the management and workers to ensure uninterrupted and smooth flow of business operations. While doing so many times we face challenges from workers related to payment issues, disciplinary issues, issues related to working conditions etc. These issues can be of individual or collective in nature. While we do our best to alleviate them, sometimes taking a legal course of action becomes imminent, either by choice or with no alternative. In that scenario before the legal team steps in, HR has to act as the first line of defence for any organization. In order to minimise damage as well as to protect the interest of the organization, it is necessary to understand the overall mechanism of grievance redressal and the legal framework surrounding it to deal with such matters more efficiently and effectively.

Accordingly, in this article, we will try to understand –

  1. Meaning of grievance and the difference between a complaint and grievance
  2. Understanding the concept of industrial dispute
  3. Possible voluntary set-up to resolve them
  4. Dispute settlement mechanism in law and authorities involved in it

What is a grievance?

Before we ponder over the mechanism to resolve issues. First, let us understand the meaning of grievance. In simple words, it is a formal complaint filed by an aggrieved employee regarding any dissatisfaction he faces in his job. A grievance can be raised either by individuals, groups or by a union of workmen (if it exists).

Causes for a grievance primarily be,

  • Related to company policies and procedures
  • Related to nature of work
  • Payment related issues
  • Employee relations either with colleagues or manager

Difference between a complaint and a grievance

While both look similar in nature, there is a marginal difference between the two.

Complain

Grievance

A complaint is any dissatisfaction on part of an employee related to the job.

When a complaint remains unattended, it becomes a grievance.

A complaint is usually informal and can be expressed orally as well as in writing

A grievance is a formal way of expressing discontent, usually in written format

Complaints are mostly of individual nature

A grievance can be filed by an individual, a group of workers or by the union.

The impact could be lesser and remains within the organization as complaints are usually caused by minor issues.

The impact of an unattended grievance can be huge, as it may lead to a legal dispute and could even affect the reputation of the organization.

 

Industrial dispute and its legal perspective 

When a grievance is aggravated and heading for a legal course, it becomes an “industrial dispute”. The main reason for the arising of industrial dispute is the difference between the management and workmen related to employment. In India, we have a separate act dedicated to deal with such matters. The Industrial Dispute Act, 1947, not just defines the term but also provides a step by step mechanism to deal with such matters from a legal point of view. Provisions of this act aim towards providing benign measures seeking to pre-empt industrial tensions. Unlike many other labour laws which are intended mainly to protect the interest of employees, this act proposes a tripartite dispute settlement mechanism involving workmen, employers and the appropriate government.  

A dispute can be raised by any person working in the capacity of a workman in an industry. In case of any dispute, they may directly approach the conciliation officer in the district to register their grievances. Persons working in an administrative role or at a managerial capacity are excluded being a workman as per the provision of this act. 

Possible voluntary set-up for resolution of a dispute

Before understanding the external authorities provided in the act, let us first discuss the possible ways to manage any grievance within the organization. This can be useful even to those organizations, not covered under the Act, i.e. service sector. Let’s discuss each one in detail;

  • Certified Standing Orders – Carefully drafted and duly certified standing orders as per the provisions of The Industrial Employment (standing orders) Act, 1946 provides a legal framework for an organization to deal with ease for matters related to employment. It helps the employer to get rid of any unnecessary industrial dispute. Topics mentioned below need to be provided in standing orders.
  • Workmen’s classification – Permanent, Temporary, Probationers, Badlis etc.
  • Work timing, shifts, leaves, holidays.
  • Attendance, Wage periods, Wage rate.
  • Termination of employment & notice given by either party, act of misconduct, suspension & dismissal.
  • Grievance redressal means against unfair treatment.
  • Code of conduct and policies – It gives guidelines for workmen as well as management to carry out day to day operations in a systematic manner and deal with any unwanted situation in a systematic way. Policies allow to maintain better transparency and facilitate better decision making. For example, a well-defined compensation policy helps to maintain equality among workers, any incentive plan drafted carefully provides clarity and prevents the possibility of dissatisfaction among workers possibly leading to a dispute. At the same time the code of conduct simplifies the way workers should carry themselves at work. 
  •  Setting up of helpdesk by HR – Acting as an intermediary between the employer and workmen, handling grievances is a part of HR job. Setting up helpdesk will help workers to approach HR for their queries and get it resolved in a timely manner without any hustle. In a tech-driven world using systems like chatbot can be used. Such helpdesks will not only help to resolve any grievances but also to make employer understand the overall mood among workers. Based on which employer may take any pre-emptive action, if required.
  • Joint workgroups – Such groups allow workers participation in business affairs. This will help to build trust between employers and workmen. Since they work at the ground level, workers can provide valuable feedback to the management about the performance of the machinery, existing processes etc. This will help to increase the productivity and overall growth of the organization.
  • Communication- It is a “buzzword” to avoid any conflict. Employers should not shy away from sharing relevant information with workers. Meetings, town halls etc. should happen on a regular basis to reduce grapevine communication. For example, during time’s like Covid-19 when tough decisions like retrenchment, lay-off are despicable, direct communication by the employer with workers is preferred rather than taking any action in haste. This may reduce the risk of potential legal action by the workers. 

Authorities under the Act for settlement of disputes

In total there are six to eight various authorities set up as a part of dispute settlement machinery, which are mainly divided into three stages – Conciliation, Arbitration and Adjudication. Let’s discuss them one by one.

  • Works CommitteeSection 3 of the ID act provides for setting up of such committees mainly in factories with 100 or more workers. The formation of the committee is bi-partite with equal representation from employers and employees. Worker representatives should be elected departmentally from various groups and categories of workmen in consultation with the registered trade unions. The main objectives of such committees are to secure and promote healthy relations between the employer and workmen, have a say in matters of common interest and to cool down any material difference arising from such matters.
  • Grievance Redressal Committee – As per amended provisions of the ID Act in 2010 and Section 9C, it is mandatory for every industrial establishment to have such a committee internally for resolution of disputes. Total members of such a committee to be restricted at six (with an equal number of members from the employer and workmen) while the position of the chairperson to be rotated alternatively on yearly basis between the committee members. Any proceedings to be completed by the committee within a month. Workman aggrieved by the decision of the committee can appeal to the employer, who upon receiving such a complaint need to dispose of it within a month from its receipt and send the copy of his decision to the workman. However, it is important to note that the provisions of this section do not affect the right of a workmen to raise an industrial dispute as per the act.
  • Conciliation Officer – He is basically a mediator appointed by the appropriate government, i.e. either central or state, usually an officer of the rank of assistant labour commissioner in every district. They call both parties to the dispute to a table to discuss and come to a common consensus to resolve the issue. The aim is to come to an amicable “settlement” of dispute. His duties include, 

– To investigate and settle the dispute in a fair and amicable way without delay

– Prepare a memorandum of settlement with signs from both the parties and send it to the government along with his report.

  • Board of Conciliation – Any matter not resolved at the above stage can be referred to the board. It includes an independent chairman (mostly a conciliation officer), two to four members representing both the disputed parties in equal numbers. Duties of the board are similar to the conciliation officer. Board requires to submit its report to the government maximum within two months from the date the matter refer to them. Upon failure to solve the dispute, the appropriate government may refer the matter for adjudication.
  • Arbitrator – Although the ID act does not define arbitrator, but it includes umpires. There is a separate act called “The Arbitration Act, 1940” in India. An arbitrator is an independent person appointed by both parties to dispute, usually well in advance for amicable settlement of disputes. The award is recognised as per the act and binding on both the parties. Appointing an arbitrator is a voluntary act and not binding to the parties as per Section 10A of the ID act. Arbitrators are required to submit a signed copy of the arbitration award to the government post their investigation.
  • Court of Inquiry – Not in every case court orders an enquiry, unless it feels it necessary to do so. In exceptional cases, if there is an enquiry, then a report of enquiry (usually held by the senior judge of court) to be submitted within a period of six months from the date of enquiry.
  • Labour Court (LC)– Matters mentioned in Schedule II of the ID act are generally notified to the labour courts by the government. Labour courts are run by the presiding officer equivalent to the senior level district judge. Matters such as strikes & lay-off, dismissal or discharge of workmen, validating standing orders etc. are referred and heard by the labour court. “Award” given by the labour court is final and binding to the parties of the dispute.
  • Industrial Tribunal (IT) – Even though industrial tribunals have more power as compared to labour courts. Schedule II and Schedule III are the subject matters of industrial tribunals. Its presiding officer is equivalent to a high court judge. Subject matters of industrial tribunals are retrenchment, any closure of the establishment, profit sharing, wage-related matters including those related to PF & gratuity etc. 
  • National Tribunal (NT) – Even though matters heard at the National tribunal are of the same subjects as those of labour courts and industrial tribunals, they are being adjudicated at the national tribunal when the impact of the matter is on a large number of population as well as matters impacting more than one state. The judge of a national tribunal is a “presiding officer” equivalent to a Chief Justice of High Court judge.

Dispute Settlement Mechanism

  • The Board of adjudicating authorities have the right to force the attendance of any person, examine witnesses and compel to produce documents and proofs related to the dispute.
  • Every authority at the adjudication stage is deemed to be a civil court.
  • Be it labour court or any tribunal, their judgement is known as “award” is final decision binding on the parties to the dispute.
  • Award given by the authorities has to be in writing and signed by the presiding officer before its submission to the government.

Since any award given by the adjudicating authorities is final and cannot be appealed further as per the ID act, however, if any party feels its fundamental rights are violated, they may file a “writ petition” in the high court of their jurisdiction or in the Supreme Court of India. 

Conclusion

Both management and workers are fundamental parts of any commercial organization. While both works towards the growth of the organization, differences are inexorable during the process. Even though there is a “legal way” to deal with it, it is not advisable to take the route too often. it is not just time-consuming but also strain the relationships between the two resulted in impacting adversely to the organization, not just performance-wise but it affects the reputation of the business as well. Having a robust internal system to deal with employee grievances in a systematic manner along with empathy towards their problem is prudent and may save millions of dollars for a company in possible future legal battles. Therefore, transparency in matters and flexibility in approach from both sides is desirable for the eternal growth of the organization. 

References


Students of Lawsikho courses regularly produce writing assignments and work on practical exercises as a part of their coursework and develop themselves in real-life practical skills.

LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

 

Download Now

Analysing the debates surrounding centre-state relations with respect to legislative lists

0

This article is written by Arya Mittal from Hidayatullah National Law University. The article analyses the debates surrounding the distribution of legislative powers between the Centre and states.

Introduction

It is believed that the federation with a strong centre is the soundest framework of the Indian Constitution. Though the states have been granted autonomy, many of the matters are exclusively dealt with by the Union. In such a scenario, the Union and states must work in harmony in the interest of the general public. This gave rise to the principle of cooperative federalism which states that the Union and states should cooperate with one another to avoid conflicts. This forms the crux of centre-state relations.

Centre-state relations have always been a topic for debate. Ever since India gained independence, the issue has attracted attention. Schedule VII which had to be discussed in two days, took six days (August 29, 1949 – September 03, 1949) of the Constituent Assembly, since it was a crucial issue. However, the issue could not be resolved. Later, different commissions also had to be formed to examine the relation between the two and the distribution of powers between them. The debate surrounding the distribution of powers in the three legislative lists has been discussed hereafter.

Constitutional Provisions

Schedule VII of the Constitution

Schedule VII is of utmost importance to determine the distribution of powers between the Centre and the states. It provides for three lists namely Union List (List I), State List (List II), and Concurrent List (List III). The majority of the powers were provided in the Union List followed by State List and Concurrent List. A large number of powers to the Union was the inception point of all debates.

Article 246 of the Constitution

This provision complements the three lists provided under Schedule VII. It states that the Parliament shall have exclusive right to form laws on subject matters enlisted in List I. The states shall have exclusive right to form laws on subject matters enlisted in List II. Lastly, the Centre as well as the states shall have mutual rights in subject matters provided in List III.

Article 248 of the Constitution

Article 248 gives residuary power to the Parliament i.e. it has the power to enact laws on those subjects which are not covered by List II and List III and this power even extends to the imposition of taxes. The same has also been supplemented by Entry 97 of List I of Schedule VII. 

Article 254 of the Constitution

Article 254 provides that in case of a repugnancy between a Central statute and state statute, the former would prevail and the latter would be void except if it follows the condition in clause (2) of the provision. This again gives superiority to the Union in comparison to the states in any of the subject matters concerning the Concurrent List.

Constituent Assembly debates

The Constituent Assembly debates held for six days saw a lot of complications in the distribution of powers in the three legislative lists. The national leaders such as Rajendra Prasad and Dr. B.R. Ambedkar advocated for a strong centre whereas leaders of many states and provinces were not convinced with the same. The opinions of such leaders have been discussed hereafter. 

Sardar Hukum Singh – leader of East Punjab Province

Sardar Hukum Singh stated that “With every day that passes, we are progressing more and more towards a unitary system, not merely in times of war as was first intended, but in normal times as well.” His contention related to List I, Entry 78 (List I, Entry 52 of the Draft Constitution) in pursuance of which, even the control of the High Courts was provided under the Union List. Yet another contention moved by him was concerning List I, Entry 97 (List I, Entry 91 of the Draft Constitution) which provided for residuary powers. He believed such power should not be accorded to the Union. Moreover, he sarcastically suggested changing the entries of List I as ‘all matters other than those in List II and List III’.

Kaka Bhagwant Roy – leader from Patiala and Eastern Punjab states

Kaka Bhagwant Roy also opposed giving excessive powers to the State. He stated, “India is a very big country. She has many provinces. These Provinces have their difficulties and can understand their problems much better than the Centre.” His amendment related to List I, Entry 52 (List I, Entry 64 of the Draft Constitution). He was of the view that powers related to industries should be dealt with by the State. Conferring them with responsibilities but not providing them with powers would slow down the industrial development in the country.

H.V. Kamath – a leader from Central Provinces and Berar

H.V. Kamath was also a prominent figure who advocated for the rights of states and provinces while the distribution of powers between Union and states and provinces. His amendment was related to List I, Entry 21 (List I, Entry 22 of the Draft Constitution). He opined that some states and provinces had certain developments in civil aviation so the entry should be made in Concurrent List rather than restricting it to the Union only. Another amendment moved by him was about regulation and control of films under List I, Entry 60 (List I, Entry 70A of the Draft Constitution). He believed owing to the linguistic and cultural differences, each province and state should have its own censorship board since one custom which will be permissible in one state, might find criticism in the other, which will make it impossible for the Union alone to control this situation.

R.K. Sidhwa – a leader from Central Provinces and Berar

R.K. Sidhwa also provided certain amendments in favour of states and provinces. One such amendment related to List I, Entry 68 (List I, Entry 41). He argued that the Central Government had been inefficient in extracting the rich minerals and identifying their correct usage. Thus, the matter should be exercised by the states and provinces who could do it in a much better way. Moreover, he strongly urged that Terminal Tax levied by local bodies should remain in State List and not be transferred to List I, Entry 89 (List I, Entry 83 of the Draft Constitution). He said, “I strongly feel that the Terminal Tax is entirely in the region of the Provincial Government and the Local Bodies and they have been levying it throughout the century and it will be wrong for the Centre to take away this item.”

Naziruddin Ahmad – a leader from West Bengal

Naziruddin Ahmad stated, “I should think that the Centre is getting seriously encumbered with a large number of subjects.….it would have the effect of unduly enlarging the jurisdiction of the Union, and curtailing the jurisdiction of the Provinces. This tendency should stop.” He also contended against giving excessive powers to the Union. This statement is an extract of his contention concerning List I, Entry 63 (List I, Entry 40 of the Draft Constitution) which gave power to the Union in regards to all educational institutions. This was criticised since the Centre could gain control over any institution in any state as per its wish.  In another statement, he said, “If the Provinces are to be robbed one by one of their powers, political, financial and others, it would be far better for us to say here and now that Provincial Autonomy must go and there must be a Unitary Government.” His disagreement related to giving power of non-narcotic drugs to the Centre under List I, Entry 84 (List I, Entry 86 of the Draft Constitution) which was exclusively a Provincial subject earlier.

Mahavir Tyagi – a leader from United Provinces

Mahavir Tyagi, who was representing the United Provinces, showed opposition to List I, Entry 3 (List I, Entry 7 of the Draft Constitution). The jurisdiction of cantonments in various states would be given to the Centre as per this entry. He believed it to be unjust if people are treated differently because one area lies in a cantonment zone while the other does not. He narrated about the practical difficulties which people had already been facing as a result of such existing provisions. However, his amendment was not moved and was negative.

Debates giving rise to Sarkaria Commission

Due to strenuous relations between Centre and states, Sarkaria Commission was formed in 1983 to examine the relations between Centre and states. Chapter II of the Report of the Sarkaria Commission relates to legislative relations. As evident from the report, the following contentions were raised by different state governments.

Exercise of legislative powers

Most of the states were vehement about the approach taken by the Centre in the exercise of its powers under List I. More than its existence, the leaders opposed the usage of its legislative powers. They believed Entry 52 and 54 of the Union List gave them excessive powers which reduced the role of states. However, the same was rejected by the Commission owing to its national importance.

Biasness towards centre

The states believed that the legislative lists were too biased and had an inclination towards the increased role of the Centre which reduced their role and powers. They contended that the lists need to be revisited so that powers could be decentralised. This was also rejected by the Commission which held that such division to be correct.

Abolition of concurrent list

Some states contended that List III should be banned and matters should exclusively be given to the Union or the states since it often leads to conflict and it is the act of the Union that prevails. Yet again, the argument was rejected by the Commission since abolishing List III would serve no good and makers of the Constitution had intentionally created it so that the Union and states can harmoniously work with one another for the development of the country.

Transfer from List III to List II

Certain states argued that some matters should exclusively lie in their jurisdiction and the Centre should not meddle in the affairs of the states. Consequently, they argued that certain subject matters should thus be transferred from List III to List II.

Debates giving rise to Punchhi Commission

The issue of centre-state relations rose again and as a result, the Punchhi Commission was formed in 2007 to review their relations. Volume II of the Report of Punchhi Commission relates to legislative relations. Major problems of distribution of powers have been stated in the report in Chapter 3 and the same has been discussed here.

Decentralisation

Most of the states believed that centralisation, required at the time of independence, is not needed anymore and thus, decentralisation should take place. They argued that the federal system should be made more prevalent to satisfy the needs of the present time. Lastly, they emphasised the ‘principle of subsidiarity’.

Exercise of power by states

As also contended by the Sarkaria Commission, most of the states were unsatisfied by the way in which the Union exercised its legislative powers to the prejudice of states. There were lesser issues with the distribution of powers and more issues with the exercise of such distributed powers. Moreover, the residuary power by the Union had also been the root of many problems.

State autonomy

State autonomy or provincial autonomy has been an issue since the independence of India. Even at that time, many leaders of different states and provinces raised issues for provincial autonomy and it seems that the issue is still prevalent today.

Consultation of states

Another important contention made by the states was that whenever the Centre enacts a statute on any subject matter of Concurrent List, it should take consultation of the states. They felt this was necessary so that their population could be adequately represented and the law could suit the conditions of their territory. Even the Commission agreed on the same and recommended it in its report.

Judicial pronouncements relating to legislative Lists

State of West Bengal v. Union of India (1962)

In this case, West Bengal contended that an act of Parliament was beyond its legislative powers and should be held ultra vires of the Constitution. The Supreme Court held that the Indian Constitution is ‘not truly federal in character’. Further, the Union had residuary powers and powers related to industrial, commercial and, economic unity lies with the Union.

International Tourist Corporation v. State of Haryana (1980)

The case related to the interpretation of Entry 97 of List I. the Supreme Court held that though the Union has residuary powers yet, it cannot ‘encroach into the legislative powers of states’ and use it so expansively that defeats the very purpose of a federation. It should not destroy the provincial autonomy of the states. Lastly, the residuary power should be used only when it is not enumerated in List II and List III and not in any other situation. 

new legal draft

Federation of Hotel and Restaurant v. Union of India (1988)

In this case, the Supreme Court, while dealing with the overlapping of subjects in the three lists, held that “It is the duty of the Courts, however difficult it may be, to ascertain to what degree and to what extent, the authority to deal with matters falling within these classes of subjects exists in each legislature and to define, in the particular case before them, the limits of the respective powers. It could not have been the intention that a conflict should exist; and, to prevent such a result, the two provisions must be read together, and the language of one interpreted, and, where necessary modified by that of the other.” Thus, in such cases, the courts should always try to adopt a harmonious construction that does not result in the nullity of any of the statutes.

Forum for People’s Collective Efforts v. State of West Bengal (2021)

This is a recent judgement of the Supreme Court which struck down the real estate laws formulated by the West Bengal legislature since it was not in accordance with the centrally enacted RERA law. It held that “In such cases where the competent legislation has been enacted by the same legislature, techniques such as a harmonious construction can be resorted to, to ensure that the operation of both the statutes can co-exist. Where, however, the competing statutes are not of the same legislature, it then becomes necessary to apply the concept of repugnancy, bearing in mind the intent of Parliament.” Therefore, though the Court always tries to adopt a harmonious construction, if not possible, then the Central Act prevails.

Inferred reasons for the rift between centre and states

Historical reasons

Ever since the beginning, the kings and the rulers had their kingdom and inclusion in the Indian territory would mean reduced powers. Thus, the leaders were earlier reluctant to be a part of the nation.

Promise for a federal structure

At the initial point, the states and provinces were told that the country would remain federal and it was only in situations of exigency that the Union would take over the states, as also stated by Sardar Hukum Singh. However, gradually, most of the powers were given to the Centre to strengthen it which has been a great issue. 

Exercise of powers

The most common reason was the exercise of powers by the Union. It was believed that the Union abused its position and took undue advantage of the powers provided under the Union List. To exemplify, it exercised its residuary powers which were detrimental to the interests of certain states.

The reduced role of states

As stated by many leaders, when the Indian Constitution was being framed, a lot of powers were transferred to the Union, on which they earlier exercised exclusive power. This reduced role and power of states have been one of the reasons for criticism of the distribution of powers between centres and states.

Practical difficulties

The states had their own practical difficulties in implementing the provisions of the Constitution. To exemplify, cantonments were legislated by the Union which made it difficult for people since people of the same states had to follow different provisions without any reasonable classification. Similarly, when the films are regulated by a national board, it is impracticable to have a board member of every state but at the same time, in absence of that, sentiments of a particular community might be affected which might not have arisen if such power rested with states.

The inefficiency of Central government

Due to so many powers and responsibilities vested in the Union, it was believed by certain states that the Union had become inefficient and had not been able to work properly which slowed down the development of the country as a whole.

Conclusion

On analyzing different sources such as the Constituent Assembly debates and Reports of Sarkaria Commission and Punchhi Commission, it is now clear why the state leaders have not been satisfied with the distribution of powers in the three legislative lists. It is a multi-layered issue and there is no one reason which has led to the conflict. Undoubtedly, a strong centre is essential for the development and security of a country yet the federal principles underlying the Indian legal system have not been able to achieve great success since it has suppressed the states and their role in the economy. Though the above-mentioned reasons are not the only reasons but some of the major reasons as to why leaders have been reluctant in adopting a centralized nation. Therefore, the recommendations provided by the different committees need to be addressed so that the Centre and states work harmoniously and move towards cooperative federalism.

References


LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

Foreign investment scenario in Colombia

0

This article has been written by Romit Nandan Sahai pursuing the Diploma in M&A, Institutional Finance, and Investment Laws (PE and VC transactions) from LawSikho.

Introduction

In the eighties, Latin America was characterized by an economic crunch; almost all of the countries were roped in with huge external debts, sluggish and often receding GDP, and very little influx of Foreign Investment. However, for one particular country, this was not the story, at least not for long. Colombia walked away from the economic crisis that was plaguing its neighboring countries through deliberate changes in its fundamental economic wisdom. Throughout the nineties, Colombia took an active step to move away from its old protectionist / Closed Economic Model to streamline itself with the Open Commercial Market Model that was prevalent in the West to attract FDI.

The backdrop of the investment scenario in Colombia

Colombia, for much of the period since 1945, was sustaining its economic growth on unskilled labour and export of its wealth of natural resources. During this time, Colombia’s FDI inflow was non-existent, averaging at around $50 million USD till the 1970s; this was mainly owed to the restrictive stance of its legislation on foreign investment. However, it was the 1980 external debt crisis that propelled Colombia’s FDI to grow three folds in the next few decades. By 2005, Colombia was the fifth largest economy in Latin America with a staggering GDP of $102 Billion and an average per person GDP of $2,277 USD.

Development of foreign investment legislation in Colombia

This section will trace the legislative history of the investment laws in Colombia to highlight the change in Colombia’s attitude from regressing foreign investment to embracing it.

Decree 444 of 1967 of Colombia

On a plain reading, one would think that foreign investment was not possible in Colombia prior to the 1980s. But that was not the case; FDI did exist in Colombia as long as back in 1967 but with lots of strict regulations. 

The first legislation that originated FDI in Colombia was the Decree 444 of 1967. It laid down the requirements that Foreign Investors had to meet before they could invest in Colombia like:

  1. Getting the Prior Approval of the National Planning Office
  2. Registration of Investments in the Exchange Office
  3. Repatriation of any Profits gained on investment. (The profit remittance was limited to only 10% of the capital, and there was no increase in repatriation even if there was an increase in the investment).
  4. Passing the evaluative standards for determining if the Investment would be Convenient in terms of:
  1. Employment generation,
  2. Net Effect in Balance of Payments,
  3. Use of Raw Materials & other Domestic Products & By-Products
  4. Whether the Investments intends to increase exports & export diversification.

This first legislation of Colombia as evident was quite restrictive, it did not allow investors to remit profit and the main standard that the investment was put against for approval was whether it would be beneficial to Colombia or not. 

Decision 24 of 1973 of the Andean Pact

As the economic crisis was brewing in Latin America, the Andean Common Market Group, more commonly known as the Andean Group, was established in attempts to avert the crisis by promoting innovation & industrial progress. Under the Pact, a Common Foreign Investment & technology Licensing Code was enacted, better known as Decision 24 of 1973, which was supposed to promote economic growth among the Andean Countries through Regional Cooperation. 

The Andean Commission was of the view that it was FDI that was responsible for Latin America’s nearing economic doom, and through the Pact, they aimed to remove the ‘negative effects of FDI’ so as to better their economic state. Decision 24 was enacted to give effect to this very same object by imposing even more restrictions in foreign investment like:

  1. Foreign Investment was completely restricted in any area that was already being carried out by Domestic Corporations.
  2. Any Foreign Enterprise already established in any Andean Country had to sell 51% of its stake to the Nationals of that Country in order to stay in the Free Trade Scheme of the Andean Group.
  3. Remittance of Profits was limited to just 14% of the net investments.
  4. FDI was also completely restricted in the Banking, Insurance & Public Utilities sector.

The Andean Commission took a contrary stance on foreign investments, it viewed it as an evil that depreciates a country’s growth and economic prowess. It instead wanted to make the Andean countries self-sufficient on their own and thus restricted FDI even more.

Decision 220 of 1987 of the Andean Pact

After the Economic Debacle of 1986, the Andean Group realized that completely shutting down Foreign Investments in favour of Closed Regional Cooperation was a bad idea, and so they repealed Decision 24 and replaced it with Decision 220 a year later. The new law removed several restrictions and overhauled areas of FDI, Registration Requirements, Repatriation of Profits.  Key changes introduced under its ambit were:

  1. Foreign Investors could be allowed after approval from the Country to acquire Shares of Domestic Corporations & Investors.
  2. Remittance of Profits on Foreign Investments was allowed up to 20% of the net investment and can be modified to a higher percentage on approval.
  3. The requirement of selling a 51% stake was removed by Colombia.

This was the turning point from where not only were foreign investments permitted but were also now being encouraged as the Andean Commission had realized how important FDI is for technology enhancement and economic growth acceleration. 

Decision 291 of 1991 and Economic Liberalization ‘Plan Apertura’ 

The Andean Commission, after loosening its restrictions on Foreign Investment in 1987, completely removed all of them in 1991 with Decision 291 in attempts to stimulate the inflow and circulation of capital. Under it: 

  1. All Andean Countries now had complete freedom to formulate and adopt rules governing FDI in their countries. 
  2. Freely transferable & convertible foreign exchange was introduced for repatriation and remittance of all profits. 
  3. Sale or reduction of investment or liquidation was made easier and tax-free.
  4. Further, Foreign Investors were vested with the same rights as National Investors.

Following suit with the changes made under the Andean pact, Colombia undertook more initiatives in order to change its Foreign Investment Schemes. In 1991 Colombia introduced its Economic Reform Plan called Apertura, which introduced significant changes that played a pivotal role in Colombia’s Foreign Investment growth:

  1. It removed its tariff barriers,
  2. It also removed a significant portion of its licensing and registration restrictions,
  3. It introduced new regulations to make foreign exchange & investment easier,
  4. And it undertook the promotion of ‘Internationalisation of its Economy’ by integrating Colombia with Latin America and the Caribbean. 

With Apertura, Andean countries were finally free to decide and tailor the FDI policies according to the needs and requirements of their country. And it was this very move that had resulted in Colombia becoming the hub of FDI in South America.

Scheme of foreign investment in Colombia

This section will focus on the present stature and principles of the Colombian Government in regards to foreign inflow, investment, and foreign investors. It will highlight not just the regulatory authority but also the means and modality of investment and the rights and assurances to the Investors.

Establishment of COMPES

The development of the Foreign Investment landscape in Colombia was done through the enactment of Law 9 of 1991, which gave the Colombian Government’s Executive Branch wide-reaching powers to regulate and foster the Foreign Investment Landscape. Law 9 introduced several changes like:

  1. Under it, a Government Agency called Consejo Nacional de Política Económica y Social (COMPES) was established to regulate the schemes of investment.
  2. It mandated that Foreign Investors will be treated the same as National Investors.
  3. Conditions of remittance of Profits will be standard for all investors; there will be no disfavor or favour to Foreign Investors or National investors.

With COMPES, the government delegated the policy regulation to them and this would ensure that foreign policies were not only being regularly updated but also that they were up-to-the international standards. 

Resolution 51 of COMPES

In exercise of the powers given to COMPES, Resolution 51 was brought into force which is the Heart and Soul of Colombia’s Foreign Investment Scheme. Resolution 51 is the Colombian Statute for Foreign Investment, and it has undergone several revisions and modifications. 

Article 3: Principles guiding foreign investment in Colombia 

Colombia’s Foreign Investment Policy is tailored around three pivotal principles. They form the genesis of foreign investment in Colombia and are as follows:

  • Principle of Equal treatment: It mandates that Foreign Investments in Colombia will be subject to the same treatment as National or Domestic Investments. It prohibits preferential or discriminatory treatment.
  • Principle of Universality: It states that Foreign Investments may be made in any proportion in all sectors of the Colombian Economy except those sectors which are prohibited. 
  • Principle of Autonomy: It provides Automatic approval for investment: Foreign investors may invest without prior authorization in all sectors where FDI is permitted.

These principles form the absolute core of every single foreign policy. Any new law or policy change brought by COMPES would have to be deliberated on these three principles.

Which investments are categorized as foreign investments?

Much like everywhere else, Colombia also classifies its investment into two categories based upon the nature and scope of investment. They are categorized as follows:

  • Foreign Investments in Colombia are called Foreign Capital Investments.
  • Article 2 states that Foreign Capital Investments in Colombia made by Individuals, not residents of Colombia & Colombian Residents Abroad are Foreign Investments. 
  • Article 4 states that Foreign Investments include Portfolio Investments (investments in Colombian Stock Exchanges) & Foreign Direct Investment.

What are the methods of Foreign Direct Investment in Colombia?

Colombia is also quite expansive in its modalities of foreign investment, and as such, FDI in Colombia can take place in the following ways:

  • Article 7(a) Capital Contributions: These Contributions may be Tangible like goods, imports of machinery, equipment’s or Intangible like R&D, Technology, Trademarks, Patents, etc.
  • Article 7(b) Monetary Contributions: These include import of Foreign Currency Exchange, Foreign Currency Convertibles or acquisition of shares & rights.
  • Article 7(c) Contributions made by the import of Convertible Foreign Exchange for Purchase of Real-Estate

Foreign investments allowed in which sectors?

It is also very pertinent for foreign investors thinking of investing in Colombia to take note of where Foreign Investment is allowed. The majority of the sectors in Colombia permit foreign investment, but such investments are also automatically approved. The few sectors which are not as open are:

  • Article 9: It states that Foreign Investment is allowed in most sectors without any prior approval except those sectors enumerated in Article 8.
  • Article 8: It prohibits Foreign Investments in the following areas:
  1. Défense & National Security
  2. Processing & Disposal of Dangerous or Radioactive waste not produced in Colombia

COMPES is also authorized to identify any sector and prohibit investment in it.

  • Besides the sectors listed in Article 8, there are two sectors that are subject to special provisions they are:
  • Financial Sector and
  • Hydrocarbons & Mining Sector.

Colombia thus has very few sectors where FDI is prohibited or requires prior permission. This has allowed investors to be able to quickly invest in the country without fear of change in circumstance or economic stability. 

Approvals & registration requirement 

While foreign investment in Colombia does not require prior approvals, there still are few requirements that need to be met out. But such requirements can be fulfilled even after an investment is made. Some of the requirements are:

  • Article 9: Provides that in all sectors where Foreign Investment is allowed is approved automatically and does not require any conditions or complicated procedures. 
  • Article 15(a) states that registration is a necessary requirement for all Foreign Investments. Any Foreign Capital Investment, including any increase or modification or reinvestment of profits, has to be registered with the Central Bank (Banco de la República). 
  • The registration must be requested by the investor within three months after the date when the investment is made.
  • However, the registration period can be extended to 6 months upon the request with reasons for it by the interested party.
  • Any investment that fails to register will not be allowed to remit and sum invested or any profits from it to abroad. But it will allow reinvestment of the funds in Colombia. 

Exchange rights & guarantees to foreign investors

Foreign Investors who have invested in Colombia, besides the assurance of being treated equally and having autonomy, have certain more guarantees by the Colombian Government which shall not be taken away. These are:

a. Chapter IV of Resolution 51 provides certain rights & guarantees to all investors for their investments made in compliance with the law. 

b. Article 16 states the following rights of Foreign Investors:

  • Foreign Investors have the right to freely remit abroad the convertible currency and net profits produced by their investment based on their balance sheets. 
  • Foreign Investors have the right to reinvest their profits, to retain remissible profits which have not been distributed.
  • Foreign Investors also have the right to capitalize on any remissible profits.
  • Foreign Investors have also been vested the right to remit abroad freely any sums received from the sale, liquidation, or reduction of their investments.

Article 17 provides the guarantee that the remittance of profits and reimbursement of investments will not be changed to the disadvantage of the investors except when the international reserves are less than the last three months of imports and that too the change would be temporary. 

In order to not repeat the previous policy mistake of prohibiting or restricting remittance of profits, the Colombian government, learning from their mistakes, engraved a legal guarantee to investors for remitting their profits back.

Applicable laws & dispute resolution jurisdiction on foreign investments

The laws that would be applicable to foreign investments in Colombia are based on preference to international treaties, agreements, and standards and only where no such international law exists will the laws of Colombia apply. 

  • Chapter VII deals with the laws which will be applicable to the Representations made by Foreign Investors, to any Sanctions on Foreign Investors, and for the Control & Supervision of Foreign Investments.
  • Article 23 provides that the Colombian Legislations will be applicable for the resolution of any disputes related to the Statue of Foreign Investment. 
  • It also furthers states that if there are any International Treaties or Agreement for the same, then those will apply.
  • The Colombian Courts & Colombian Arbitration Rules will have jurisdiction on every dispute related to Foreign Investment unless there are international treaties or agreements for the same. 

Conclusion

It is very evident that Colombia’s active measures to overhaul and streamline its Foreign Investment Scenario has paid off. Colombia, since the adoption of Resolution 51, has witnessed a steady attraction and growth of Foreign Investment. Its provisions of Automatic Approvals, barrier-free entry, prohibition in very few sectors, and Free remittance of sums & profit abroad have greatly helped in overcoming the issues it earlier faced due to its closed and restrictive approach toward foreign investment.

References

[1] Jocelyn S. & Jessie R., Latin American Debt Crisis of the 1980s, (November 22, 2013) Federal Reserve History <https://www.federalreservehistory.org/essays/latin-american-debt-crisis>. 

[2] United Nations, Investment Policy Review: Colombia, (July, 2006) United Nations Conference on Trade and Development <https://unctad.org/system/files/official-document/iteipc200511_en.pdf>. 

[3] Global Tenders, Economy and Business Opportunities from Colombia, (June 12, 2021) < https://www.globaltenders.com/economy-of-colombia.php/>.  

[4] Steven J. & Alfonso W., Andean Pact, (June 1, 2021) Encyclopaedia of Latin American History & Culture <https://www.encyclopedia.com/humanities/encyclopedias-almanacs-transcripts-and-maps/andean-pact>.

[5] Santander, Colombia Foreign Investment, (August 13, 2021) <https://santandertrade.com/en/portal/establish-overseas/colombia/investing>.


Students of Lawsikho courses regularly produce writing assignments and work on practical exercises as a part of their coursework and develop themselves in real-life practical skills.

LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now

Is a suit for eviction maintainable before Wakf tribunal if the tenant disputes that the property is not a Wakf

0
Islamic-Law-Law-of-the-Muslim-World-eJournal.-June-14

This article is written by Harsh Gupta from the School of law, HILSR, Jamia Hamdard. This is an exhaustive article which deals with the maintainability issue if any dispute arises regarding the question of property whether wakf or not.

Introduction 

A dispute concerning whether a particular property is waqf property or not, or whether a certain wakf is a Shia waqf or Sunni waqf, can be referred to a tribunal by any person aggrieved by it. An action against the Survey Commissioner shall not be brought against him. There is one year of limitation after the publication of the list of wakf before an institution of suit may be brought. A tribunal’s decision in such cases is conclusive.

Dispute regarding Wakf property

It was observed by the Supreme Court in the case Faseela M v. Munnerul Islam Madrasa Committee and Others (1948) that Sections 6 and 7 of the Waqf Act, 1995, as amended by Act 27 of 2013, only allow the Wakf Tribunal to resolve disputes regarding wakf. This case involves the Wakf Tribunal before which respondents, appellants, set the argument that respondents are the landlord and appellants are tenants of the subject property. The subject property is described as wakf property. There was no dispute about the subject matter being waqf property, according to the appellant. In addition, he questioned the jurisdiction of the Wakf Tribunal in deciding the dispute between the parties. 

The court was thus asked to decide whether or not the landlord’s eviction suit against the tenant relating to wakf property was triable by the Civil Court or fell under the exclusive jurisdiction of the Wakf Tribunal.

As referenced in Ramesh Gobind Ram (Dead) through L.Rs v. Sugra Humayun Mirza Wakf, (2010), the court considered Sections 6(1), 6(5), 7(1), 7(5), 83, 85, and few provisions of the Act and explained the jurisdiction of the Wakf Tribunal vis-a-vis Civil Court. Despite the fact that Sections 6 and 7 of the Act cover evictions against tenants of a Wakf property, the court held that a lawsuit for eviction must be brought in the Civil Court. The Supreme Court ruled that a suit for eviction against the tenant in relation to a wakf property must be brought in the Civil Court since such a suit is not covered by the dispute specified in Sections 6 and 7 of the Act.

In the case Lal Shah Baba Dargah Trust and Others v. Magnum Developers and Others (2015), the petitioner challenges the order passed by the single judge of the Bombay High Court, holding that the wakf suit brought by the petitioner before a member of the Wakf Tribunal was unmaintainable, and directing it to be returned and presented to the Civil Court for adjudication.

The plaintiff in the instant case is Lalshah Baba Dargah Trust, which filed suit before the one member Maharashtra Wakf Tribunal, Aurangabad, claiming the suit property is wakf land held by a trust, and asking for a perpetual injunction restraining the defendants from developing the suit plot, from raising higher construction, from creating third-party interests, from changing the character of suit properties as well as from handing over possession of the flat constructed therein. The tribunal also heard a separate application for a temporary injunction, which was partially granted, and an interim injunction was granted in those terms.

In response to the order passed by the tribunal granting the injunction, the defendants filed a civil revision before the High Court under Section 83(4) of the Wakf Act, 1995. Additionally, the defendant challenged the jurisdiction of the one member tribunal on the ground that the functioning of the Tribunal constituted under Section 83(4) of the 1995 Act ceased to have jurisdiction after the 1995 Act was amended by Wakf (Amendment) Act of 2013 which came into force from 1 January 2013 the suit before the one-man tribunal was commenced.

Having heard the parties, the High Court granted the civil revision application and set aside the order of the Tribunal that it was without jurisdiction. In the impugned order, however, the High Court did not interfere with the interim order. 

The Supreme Court observed that the intent of the Parliament in substituting Section 83(4) is not that a tribunal disappears or ceases to exist until a three-member tribunal is established. The intention to introduce a new sub-section (4) in Section 83 is nothing other than to improve the Constitution of the tribunal, and the earlier subsection and the substituted subsection are complementary to each other. The Supreme Court held that the High Court committed a grave error of law in ruling that even without a new notification establishing a three-member tribunal, one another tribunal ceases to exist after the 2013 Amendment Act came into force. Further, the High Court erred in law by directing the Civil Court to decide the dispute in respect of wakf property.  

A recent case where Supreme Court held that suit for eviction is maintainable before Wakf tribunal 

Observations

In the case of Telangana State Wakf Board v. Mohamed Muzafar (2015), the Supreme Court ruled that an eviction suit could be brought before a Wakf Tribunal if the tenant disputed that the property was a wakf. Consequently, the Wakf Tribunal is the only one that can decide whether a piece of property is wakf-owned.

Facts of the case 

This case pertains to the Telangana State Wakf Board filing a suit with the Andhra Pradesh State Wakf Tribunal, Hyderabad, seeking eviction of the defendant from the property owned by the Wakf institution. In his written statement, the defendant, inter alia, asserted that the suit property was not a Wakf property. The Wakf Tribunal ruled that the suit schedule properties belong to the Wakf institution and ordered the defendant to vacate the suit schedule properties. According to the High Court, following its decision in Ramesh Gobindram v. Sugra Humayun Mirza Wakf (2010), the plaintiff cannot maintain the suit before the Wakf Tribunal and can avail of the remedy available according to law.

The Wakf Board argued in an appeal that in Board of Wakf, West Bengal and Another v. Anis Fatma Begum and Another (2010) and the case of Haryana Wakf Board v. Mahesh Kumar (2013), the court held that the determination of whether a property is Wakf property or not lies exclusively with the Wakf Tribunal after the passage of the Wakf Act. 

As was argued in the case of Punjab Wakf Board v. Sham Singh Harike (2019), a bar to the Civil Court’s jurisdiction over the provisions of the Wakf Act exists when the question of whether a particular matter in the suit or proceeding must be decided by the tribunal under any provision of the Wakf Act, 1995, and if the answer is in the affirmative the court is barred from exercising jurisdiction.

Arguments raised 

As well, the defendant relied on Faseela M v. Munnerul Islam Madrasa Committee to argue that even if the property is contested as not being a Wakf property and if it is a case seeking eviction of the tenant, the suit must be brought before the Civil Court and the Wakf Tribunal has no jurisdiction.

In addressing these opposing contentions, the bench comprising Justices Hemant Gupta and AS Bopanna noticed a judgment of three-judge bench in Kiran Devi v. Bihar State Sunni Wakf Board “In the case at hand, the plaintiff filed the affidavit before the competent Civil Court, whereas the defendants, the Wakf Board, contended the matter should be decided by the Wakf Tribunal. After filing an application, they sought transfer of the case to the Wakf Tribunal, which the Civil Court ordered and the High Court also upheld in its review. The plaintiff, after successfully arguing his claim to the Wakf Tribunal, lost his writ petition, wherein the plaintiff prevailed. In that case, the board raised the contention that the tribunal lacked jurisdiction based on Ramesh Gobindram and the appeal before this court. Accordingly, this court held that the judgment of the Wakf Tribunal cannot be viewed as lacking jurisdiction in the circumstances of the case”, it noted.

Findings of the case 

As a result, it was observed that the facts and circumstances in each case must be considered against the backdrop of the legal framework contained in the Wakf Act to determine jurisdiction. During this case, the Wakf Board terminated the tenancy of the defendant for the scheduled property after issuing a notice to the defendant. On the other hand, the defendant denied that the property in question belonged to the Wakf cult in his reply notice.

“Under the said circumstances, the instant case cannot be considered an admitted case of the property being Wakf property, because the respondent directly disputed it in his reply notice. Because of that, the appellants, who were of the impression that the first issue to be established was that the property in question was Wakf property, which could be considered by the Wakf Tribunal, had filed the suit before the Wakf Tribunal.”, the bench observed.

The decision of the court 

It was noted that a similar defence was taken in the written statement as well. Accordingly, the issue had been referred to the Wakf Tribunal based on the defence raised by the respondent, and the Wakf Tribunal had rendered its ruling based on the evidence presented to it. 

“As a result, the Wakf Tribunal has the authority to decide the question posed as an issue in this lawsuit. Furthermore, as noted earlier, the instant case developed on the basis of the evidence available, and the court concluded that the property in question is Wakf property and accordingly ruled”, the bench said while restoring the judgment of the tribunal.

Conclusion

In the recent case questioning the maintainability of filing a suit for eviction before the Wakf Tribunal was discussed and it was held that the Wakf Tribunal has the authority to decide the dispute regarding wakf property.

References 


Students of Lawsikho courses regularly produce writing assignments and work on practical exercises as a part of their coursework and develop themselves in real-life practical skills.

LawSikho has created a telegram group for exchanging legal knowledge, referrals, and various opportunities. You can click on this link and join:

Follow us on Instagram and subscribe to our YouTube channel for more amazing legal content.

Download Now
logo
FREE & ONLINE 3-Day Bootcamp (LIVE only) on

How Can Experienced Professionals Become Independent Directors

calender
28th, 29th Mar, 2026, 2 - 5pm (IST) &
30th Mar, 2026, 7 - 10pm (IST).
Bootcamp starting in
Days
HRS
MIN
SEC
Abhyuday AgarwalCOO & CO-Founder, LawSikho

Register now

Abhyuday AgarwalCOO & CO-Founder, LawSikho