An Evaluation of the Legal Framework of Cyber-Crimes in Sri Lanka
Total Page:16
File Type:pdf, Size:1020Kb
AN EVALUATION OF THE LEGAL FRAMEWORK OF CYBER-CRIMES IN SRI LANKA DAMITHRI KODITHUWAKKU Attorney-at-law, LL.B(Hons)(United Kingdom) Technical infrastructure of today’s world new means of committing traditional crimes highly depends on internet. Social, political, have been discovered. business, education, health, leisure and “The computer is rapidly increasing entertainment, media practices of people are society’s dependence upon it, with the highly influenced with the rapid result that society becomes development of Information technology. progressively more vulnerable to Internet has become the basic tool which computer malfunction, whether facilitates the global communication and all accidental or deliberately induced, and are provided with increased opportunities in to computer manipulation and white- the global cyber arena.1 With the color law-breaking”.2 development of Information technology to cater human needs using virtual dimension, With the emerging use of information ordinary services have converted into technology and computers related crimes electronic forms and the E-Banking, E- have become a global concern. Gradually Business, Communication, Education and E- almost all the electronic devices including Governance fields are highly utilised. smartphones, tablets, watches, health Despite the all advantages of IT related devices would have a distinct developments number of crimes relating to Internet Protocol (IP) address and with the IT have been increasing and more people facility to connected to the internet and as a become vulnerable each day. result of that vulnerability of users get With the rapid development in technology increased and attacks on these devises could 3 and the internet, new types of crimes and damage the core functions of the society. As a result of storage of confidential information, privacy and data protection has 2 1 KennedyD Gunawardana , 'Current Status of Information C. G. Weeramantry, Justice Without Frontiers: Furthering Human Rights, (First published 1997, Published online by Technology And Its Issues in Sri Lanka ' [September - Cambridge University Press: 27 February 2017) 259 December, 2007] Vol 15(No3 )International Journal of The 3 Computer, the Internet and Jayantha Fernando, ‘THE IMPACT OF THE BUDAPEST CYBERCRIME CONVENTION ON SRI LANKAN LEGAL Management <https://pdfs.semanticscholar.org/d735/e019 SYSTEM’[2016] 9919d65bd3785c28da449cc6f3f33e43.pdf> accessed 4 August 2019 become a major concern as computers are related offences, content-related offences not only targeted for crime but are also and copyright-related offences.11 important instruments used in the In Sri Lanka, Computer Crimes Act No. 24 of commission of other offences. 2007 primarily addresses computer-related Enhancing cyber security and protecting crimes and hacking offences. In this Act, critical information infrastructures are computer crime is a term used to identify all essential to each nation’s security and crimes frauds that are connected with or economic well-being. Making the Internet related to computer and Information and safer (and protecting Internet users) has Communication Technology Act No.27 of become integral to the development of new 2003information technology. This Act services as well as government policy.4 The covers a broad range of offences which are Evidence(Special Provisions) Act5, the common offences identified and recognized Information and Communication internationally as well. Recognising the Technology6, the Payment and Settlement nature of computer crimes which are Systems Act7, the Electronic Transactions committed disregarding boundaries under Act8, the Payment Devices Frauds Act9 and the Section 2 of the Computer Crime Act the Computer Crime Act10 are the main courts have a wide jurisdiction to attend the pieces of legislations which governs the matters irrespective of whether the person legal regime in the area of Information resides, the crime was committed or the Technology in Sri Lanka. The term “cyber- damage was caused a person or corporation 12 crime” is used to cover a wide variety of within or outside Sri Lanka. In line with criminal conduct and include a broad range Article 22 of the Budapest convention, of different offences. One approach can be Computer Crime Act covers wide range of found in the Convention on Cybercrime, application without considering the 13 which distinguishes between four different geographical boarders and nationality. types of offences: offences against the Section 27 enables the extradition of cyber 14 confidentiality, integrity and availability of criminals among the states. However, computer data and systems, computer- above said provisions will not effectively function without the international cooperation among the states, one state 4 Gade, Nikhita Reddy & Reddy, A Study Of Cyber Security 10 Computer Crime Act No.24 of 2007 Challenges And Its Emerging Trends On Latest 11 Marco Gercke, Understanding cybercrime: phenomena, Technologies. Ugander. (2014). challenges and legal (ITU Telecommunication Development 5 The Evidence(Special Provisions) Act No.14 of 1995 Bureau) < www.itu.int/ITU- 6 Information and Communication Technology Act No.27 of D/cyb/cybersecurity/legislation.html> Accessed on 5th August 2003 12 7 Computer Crime Act No.24 of 2007 , Section 2, Payment and Settlement Systems Act No.28 of 2005 13 8 Computer Crime Act No.24 of 2007 Section 2, Electronic Transactions Act No.19 of 2006 14 9 Payment Devices Frauds Act No.30 of 2006 Computer Crime Act No.24 of 2007, Section 27. can’t solely fight against the computer In Sri Lanka, there is a challenge in crimes.15 preventing cyber-crime. The growth of network-based crime has raised difficult In Section 3 to Section 10, the Act describes issue in respect of appropriate balance the key substantive offences under between the needs of those investigating and Computer Crime Act such as Hacking (illegal prosecuting such crime, and the rights of access)16 , Cracking17, unlawful users of such networks, so there is a need to modification18, offences against national empower the coordination process. security19, dealing with unlawfully obtained Prosecutors, investigators, and Judges need data20, illegal interception of data21, using to work in coordinating manner and 22 illegal devices and unauthorized experienced investigators need to be trained 23 disclosure of information which are properly in order to deal with cyber-crime. adequately consistence with the Budapest Awareness in new media literacy and Convention under the heading of computer- information technology is one way of 24 integrity offences . minimizing cyber-crime. Further, Sri Lankan There are no laws or policies to ensure cyber legal system needs to be reviewed in order security, privacy or data protection in Sri to identify areas which need further Lanka. Although hacking and some other modifications. activities are offences under the Computer Computer Crime Act introduced new Crime Act, a remedy can’t be offered to a procedures in addition to the ordinary citizen if his or her sensitive data is criminal procedures and every offences withheld. This has a direct impact on our under this Act are cognizable offences25. trade because some countries are reluctant Further a significant arrangement is that, to enter into transactions with us due to the government can appoint a panel of experts lack of security in these on-line transactions. to assist police officers.26 A panel of experts If a country wants to actually enter into shall be appointed in order to assist the international trade and commerce, then police officers in the investigation process. there must be directives and policies to In the process of investigating the police protect data. officers and the experts are required to 15 Jonathan Clough, A World Of Difference: The Budapest 20 Computer Crimes Act No. 24 of 2007, Section 7 Convention On Cybercrime And The Challenges Of 21 Computer Crimes Act No. 24 of 2007, Section 8 Harmonisation, Monash University Law Review2011 (Vol 22 Computer Crimes Act No. 24 of 2007, Section 9 40, No 3) 23 Computer Crimes Act No. 24 of 2007, Section 10 16 Computer Crimes Act No. 24 of 2007 Section 3. 24 Convention on Cybercrime, Budapest, 23 November 2001 17 Computer Crimes Act No. 24 of 2007 Section 4 25 Computer Crimes Act No. 24 of 2007 Section 21 18 Computer Crimes Act No. 24 of 2007 Section 5 26 Computer Crimes Act No. 24 of 2007 Section 17 19 Computer Crimes Act No. 24 of 2007 Section 6 consider the protection of information and through that Sri Lanka can combat against rights of the individuals. the computer crime.31 Computer Crime Act complies with the In 2015, as the first country from South Budapest Convention (Art 16-21), and Asian region Sri Lanka acceded to the provides special power to the investigation Budapest Convention. Though the Computer officers including the power of search and crime Act was enacted before the said seizure which includes the laws for accession, the majority of the provisions interception and real time collection of were in compliance with the Budapest traffic data27, and the request to preserve Convention. Some provisions of the information28. However, some procedures Convention were not covered by the have to be strengthened based on Computer Crimes Act such as Child international standards. Compiles with Pornography32. However the Sri Lankan Article 15 of the Budapest convention, Penal code has provisions to address this, Computer Crime Act strives to ensure the however it may not adequate enough to right to privacy of the victims29 however prosecute these crimes when it is committed when it comes to Sri Lankan contest right to using Internet.33 privacy of victims cannot be ensured in the A major challenge in the existing legal investigation and prosecution process. framework is that the Computer Crimes Act Furthermore, for the purpose of effective has failed to identify some of the most enforcement Sri Lanka has established the common cyber-crime offences, such as computer crime division of police Illegal gambling, cyber-squatting, hate department and computer emergence speech and statements promoting racism, response team(CERT).