Documentos de Académico
Documentos de Profesional
Documentos de Cultura
It has been said that if foreign tort law is applied it could to liability being imposed for tort unknown
to English law and it may effect in different interests from those recognised under English law.
Various solutions have been used in different countries over the centuries.
Factors
I. the place where tort was committed;
II. the residence
III. habitual relationship was centered.
Foreign tort
A tort which is committed abroad I,e the cause of action had arisin abroad
Kinds:
Tort of Realty: Nature of injury to land situated outside the country
Personal Tort: Nature of injury to person or movable property
The forms of remedies, the modes of proceeding, and the execution of judgments, are to be regulat
ed solely andexclusively, by the laws of the place where the action is instituted or as the civilians unif
ormly express it, according to the lexfori
Lex Loci Deliciti
The application of the Lex Loci Deliciti is the prevailing doctrine on the continent of European
countries and USA.
Boys Vs Chaplin
CA ([1968] 2 QB 1
The plaintiff had been injured in a road accident in Malta. By the law of Malta, non-economic damage
(pain and suffering, loss of amenity) was not actionable. Only financial loss was compensatable. The
plaintiff brought proceedings in England.
The plaintiff sued in England for a traffic accident which had happened in Malta. The law of Malta
would have denied certain elements of damages which would be available in this jurisdiction.
Held:
Held: Liability in respect of the road accident in which only English parties were involved was
governed by English law.
The House was asked whether the rule which excluded liability for non-economic damages was
substantive law or concerned only the remedies available. (Majority) The rule was part of the
substantive law of tort liability.
Cyber torts
“Cyber torts may be said to be those species, of which, genus is the conventional torts, and
where either the computer is an object or subject of the conduct constituting tort”. “Any
criminal activity that uses a computer either as an instrumentality, target or a means for
perpetuating further crimes comes within the ambit of cyber tort
Meaning
“ unlawful acts wherein the computer is either a tool or target or both”.
Mode And Manner Of Committing Cyber Tort
4. Data diddling- This kind of an attack involves altering raw data just before a computer processes it
and then changing it back after the processing is completed. The Electricity Board faced similar
problem of data diddling while the department was being computerised.
Mode And Manner Of Committing Cyber Tort
5. Salami attacks- This kind of crime is normally prevalent in the financial institutions or for the
Mrs. Prabhavati Baskey, Asst Prof of Law, GNLU
purpose of committing financial crimes. An important feature of this type of offence is that the
alteration is so small that it would normally go unnoticed. E.g. The Ziegler case wherein a logic bomb
was introduced in the bank’s system, which deducted 10 cents from every account and deposited it in
a particular account.
Mode And Manner Of Committing Cyber Tort
7. Virus/worm attacks- Viruses are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network. They usually affect the data
on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach
themselves to. They merely make functional copies of themselves and do this repeatedly till they eat
up all the available space on a computer's memory. E.g. love bug virus, which affected at least 5 % of
the computers of the globe. The losses were accounted to be $ 10 million. The world's most famous
worm was the Internet worm let loose on the Internet by Robert Morris sometime in 1988 which
almost brought the development of Internet to a complete halt.
Mode And Manner Of Committing Cyber Tort
8. Logic bombs- These are event dependent programs. This implies that these programs are
created to do something only when a certain event (known as a trigger event) occurs. E.g. even
some viruses may be termed logic bombs because they lie dormant all through the year and
become active only on a particular date (like the Chernobyl virus).
9. Trojan attacks- This term has its origin in the word ‘Trojan horse’. In software field this
means an unauthorized programme, which passively gains control over another’s system by
representing itself as an authorised programme. The most common form of installing a Trojan
is through e-mail. E.g. a Trojan was installed in the computer of a lady film director in the U.S.
while chatting. The cyber criminal through the web cam installed in the computer obtained
her nude photographs. He further harassed this lady.
Mode And Manner Of Committing Cyber Tort
9. Trojan attacks- This term has its origin in the word ‘Trojan horse’. In software field this
means an unauthorized programme, which passively gains control over another’s system by
representing itself as an authorised programme. The most common form of installing a Trojan
is through e-mail. E.g. a Trojan was installed in the computer of a lady film director in the U.S.
while chatting. The cyber criminal through the web cam installed in the computer obtained
her nude photographs. He further harassed this lady.
Mode And Manner Of Committing Cyber Tort
MASS TORT
A mass tort is a single tort that results in injury to many victims
Mass disasters have been the experience of many countries: Chernobyl, Bhopal, Minimata,
Three Mile Island, the Amoco-Cadiz and Exxon Valdez, Thalidomide and DES, the
ubiquitous asbestos, and many others
Mass torts
Three types of disasters:
(1) single-event occurrences which simultaneously inflict injury on many individuals, like airplane
crashes or nuclear explosions;
(2) serial injuries ("creeping disasters") caused by the same product to numerous victims over a
period of time, like asbestos and pharmaceuticals;
(3) (3) toxic damage affecting persons or property over a given area.3
Generally, most mass tort cases relate to some form of negligence, and the most
common types of mass tort claims are:
2. Pharmaceutical claims.
3. Environmental torts.
Factors facilitating claim
The court will consider the following, among other things, when determining whether to give
permission:
1. Whether a large number of plaintiffs are involved;
2. Whether the plaintiffs are located near to or far from each other;
3. Whether the injuries suffered by the various plaintiffs are similar; and
4. Whether the claims made by the plaintiffs are associated with a common cause, such as a
single product or disaster.
A mass tort action and class action