SlideShare una empresa de Scribd logo
1 de 2
 HYPERLINK 
http://www.neerajaarora.com/case-study-of-%e2%80%9cbpo-data-theft%e2%80%9d-case/
 CASE STUDY OF BPO DATA THEFT CASE EX-EMPLOYEES INVOLVED IN DATA THEFT FROM CALL CENTRES ARRESTED! ROUTED PROPRIETARY COMPANY DATA THROUGH THEIR OWN PARALLEL COMPANY! CAUSED LOSSES TO COMPANY OF OVER Rs 3.3 CRORES! The Police in its effort to crackdown on clandestine theft of data and other information from call centres has apprehended four ex-employees, involved in such activities. The brief facts of the case are that a complaint was received from M/s Pintach Technologies Ltd. (PTL), i against Mr. Binoy, M/s Telequick and some other employees of their organization, for fraud & cheating, through theft and clandestine sale of their proprietary data. M/s PTL had a subsidiary company in United States of America under the name and style of M/s Pintach Technologies Inc. (PTI) which did business with Mortgage Originators in USA. Mortgage Originators provided loans to US residents for residential premises. The prospective loan seekers were called leads. The business of Pintach involved providing leads to Mortgage Originators. The said company bought calling data related to leads from Data Vendors in USA. The data included the particulars of the loan seekers and their telephone numbers. M/s PTI generated leads through arrangements with Call Centres in India to call from the data and shortlist home owners who were interested in availing refinance facility on their existing mortgage loans (leads). M/s PTL coordinated between M/s PTI and the call centres to give effect to the above process through its program management services. M/s PTI sent the data to M/s PTL in India who in turn provided this data to various call centres. In the year 2004, M/s PTI realized that there was a sudden drop in the productivity of the call centres and therefore the production of leads although the inputs at the end of the company meant to be given to various call centres by the employees of the company had remained same as before and increased as well to some call centres. The concerned officials of the company got alarmed and made an in house enquiry. On a careful and a meticulous scrutiny it was revealed that accused Binoy one of the employee of M/s PTL in connivance with some other officers of their organization, had been deceiving and causing wrongful loss to the company and wrongful gain for themselves, by selling the data purchased by M/s PTI in USA through a parallel company M/s Telequicks. On the said complaint a case FIR No.: XXX u/s 420/408 IPC r/w 66 IT Act, was registered and investigation taken up by the Police. The process of data receipt and delivery, follows a complicated route before the leads are delivered to the prospective buyers. The data purchased in USA by M/s PTI is emailed to M/s PTL, India  in batches called buckets, usually comprising of lacs of records. It is then scrubbed with ˜Do Not Call lists and sent to designated call centres for making telephone calls to various persons in USA. The willing clients called ˜hot leads are short-listed by the call centres and sent back to M/s PTL as prospective clients. The list of hot leads is then emailed to USA for selling to the end buyers who may be Banks, Insurance Companies etc. Preliminary investigations revealed that Mr. Binoy was working with M/s PTL since November, 2001. He was holding the post of Senior Program Manager and was the team leader for data management. While still employed at M/s PTL, Binoy along with his father P.K. Saha in January 2004, opened a partnership firm in the name and style of M/s Telequick. Binoy thereafter, brought a rediff pro email id in the name of ˜tele quick. Come from Rediff.com. Using this id he started passing on the data bought by and belonging to M/s PTI to various call centres as if the same belonged to M/s Tele quick, to make the calls on their behalf for the generation of leads. The accused, Binoy had roped in two of his colleagues namely Abdul and Sanjeev who actively assisted him in his clandestine activities. Abdul, while still an employee of the complainant company, co-ordinated with various calls centres on behalf of M/s Telequicks. Sanjeev on the other hand had facilitated the installation of proprietary sequencing software in the personal computer of Binoy. In order to have a clientele base in USA, Binoy had sought the assistance of one Rajesh Srivastava an employee of PTI, based in USA. The hot leads obtained from various call centres, by Telequicks, were sold in USA to clients introduce by Rajesh. Rajesh also followed up on the payments due to Telequicks in USA. During investigations all the call centres who had been paid by Telequicks were contacted to obtain emails and the raw data sent to them as attachments. Such data was obtained from one of the call centre namely, M/s Savron, Gurgaon and compared with the data purchased by the complainant company during the period June-September 2004. As the data to be analysed was voluminous, SQL queries were formulated and the data was imported from worksheets to SQL tables. On running the queries it was revealed that some of the data buckets purchased by the complainant company matched completely with the data sent by M/s Telequick to M/s Savron. Further, a scrutiny of the emails indicated that the emails with data attachments sent by M/s Telequick had originated from the exclusive IP address allotted to M/s Pintach (PTL), the complainant company, by VSNL Accused Binoy, Rajesh, Abdul and Sanjeev have been arrested by a team of Police from Gurgaon and Faridabad. Binoy is BTech (Textiles) and an MBA from IIT Delhi. Co-accused Rajesh Srivastava is a BE (Electronics) from Regional Engg. College, MP. Abdul is BSc (Hons) and an MBA Marketing from AMU, Aligarh. Sanjeev Sharma, is a post graduate in computer application from GNIIT and a B Com graduate. All the four accused persons were working together in M/s Pintach Technologies at one point of time were they hatched this idea to use the data of M/s Pintach for their own benefit. Binoy and Rajesh had since left M/s PTL and are running a company by the name of M/s Protech from Gurgaon. Both the accused claim themselves to be representatives of M/s LeadPointer, USA, apparently a sister concern of M/s MortagagePointer, USA to whom the leads generated through the stolen data were originally sold.   The hot leads generated are highly priced. Due to diversion of the data the productivity (ratio of total working hours to total leads generated) of operations of the complainant company fell from 0.31 to 0.21 a fall of 33 % over a four month period. As a result the company faced a loss of about 14,000 odd leads. Priced at about Rs 2400, the parallel operations planned and run by the accused persons led to over Rs 3.3 crore loss to the complainant company.  HYPERLINK 
http://www.neerajaarora.com/
 Neeraj Aarora (Advocate)
Unique Case Of Extortion Through Internet

Más contenido relacionado

Destacado

Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 
DOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYDOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYNeeraj Aarora
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessNeeraj Aarora
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examinerNeeraj Aarora
 
Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant maliAdv Prashant Mali
 

Destacado (6)

Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 
DOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYDOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITY
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert Witness
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
 
Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant mali
 
Blowing the whistle
Blowing the whistleBlowing the whistle
Blowing the whistle
 

Más de Neeraj Aarora

SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesSHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesNeeraj Aarora
 
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_studentsNeeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_studentsNeeraj Aarora
 
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patentsNeeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patentsNeeraj Aarora
 
Neeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic auditNeeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic auditNeeraj Aarora
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj Aarora
 
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj Aarora
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
 

Más de Neeraj Aarora (7)

SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesSHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
 
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_studentsNeeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_students
 
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patentsNeeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
 
Neeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic auditNeeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic audit
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
 
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 

Último

WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 

Último (20)

WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 

Unique Case Of Extortion Through Internet

  • 1. HYPERLINK http://www.neerajaarora.com/case-study-of-%e2%80%9cbpo-data-theft%e2%80%9d-case/ CASE STUDY OF BPO DATA THEFT CASE EX-EMPLOYEES INVOLVED IN DATA THEFT FROM CALL CENTRES ARRESTED! ROUTED PROPRIETARY COMPANY DATA THROUGH THEIR OWN PARALLEL COMPANY! CAUSED LOSSES TO COMPANY OF OVER Rs 3.3 CRORES! The Police in its effort to crackdown on clandestine theft of data and other information from call centres has apprehended four ex-employees, involved in such activities. The brief facts of the case are that a complaint was received from M/s Pintach Technologies Ltd. (PTL), i against Mr. Binoy, M/s Telequick and some other employees of their organization, for fraud & cheating, through theft and clandestine sale of their proprietary data. M/s PTL had a subsidiary company in United States of America under the name and style of M/s Pintach Technologies Inc. (PTI) which did business with Mortgage Originators in USA. Mortgage Originators provided loans to US residents for residential premises. The prospective loan seekers were called leads. The business of Pintach involved providing leads to Mortgage Originators. The said company bought calling data related to leads from Data Vendors in USA. The data included the particulars of the loan seekers and their telephone numbers. M/s PTI generated leads through arrangements with Call Centres in India to call from the data and shortlist home owners who were interested in availing refinance facility on their existing mortgage loans (leads). M/s PTL coordinated between M/s PTI and the call centres to give effect to the above process through its program management services. M/s PTI sent the data to M/s PTL in India who in turn provided this data to various call centres. In the year 2004, M/s PTI realized that there was a sudden drop in the productivity of the call centres and therefore the production of leads although the inputs at the end of the company meant to be given to various call centres by the employees of the company had remained same as before and increased as well to some call centres. The concerned officials of the company got alarmed and made an in house enquiry. On a careful and a meticulous scrutiny it was revealed that accused Binoy one of the employee of M/s PTL in connivance with some other officers of their organization, had been deceiving and causing wrongful loss to the company and wrongful gain for themselves, by selling the data purchased by M/s PTI in USA through a parallel company M/s Telequicks. On the said complaint a case FIR No.: XXX u/s 420/408 IPC r/w 66 IT Act, was registered and investigation taken up by the Police. The process of data receipt and delivery, follows a complicated route before the leads are delivered to the prospective buyers. The data purchased in USA by M/s PTI is emailed to M/s PTL, India in batches called buckets, usually comprising of lacs of records. It is then scrubbed with ˜Do Not Call lists and sent to designated call centres for making telephone calls to various persons in USA. The willing clients called ˜hot leads are short-listed by the call centres and sent back to M/s PTL as prospective clients. The list of hot leads is then emailed to USA for selling to the end buyers who may be Banks, Insurance Companies etc. Preliminary investigations revealed that Mr. Binoy was working with M/s PTL since November, 2001. He was holding the post of Senior Program Manager and was the team leader for data management. While still employed at M/s PTL, Binoy along with his father P.K. Saha in January 2004, opened a partnership firm in the name and style of M/s Telequick. Binoy thereafter, brought a rediff pro email id in the name of ˜tele quick. Come from Rediff.com. Using this id he started passing on the data bought by and belonging to M/s PTI to various call centres as if the same belonged to M/s Tele quick, to make the calls on their behalf for the generation of leads. The accused, Binoy had roped in two of his colleagues namely Abdul and Sanjeev who actively assisted him in his clandestine activities. Abdul, while still an employee of the complainant company, co-ordinated with various calls centres on behalf of M/s Telequicks. Sanjeev on the other hand had facilitated the installation of proprietary sequencing software in the personal computer of Binoy. In order to have a clientele base in USA, Binoy had sought the assistance of one Rajesh Srivastava an employee of PTI, based in USA. The hot leads obtained from various call centres, by Telequicks, were sold in USA to clients introduce by Rajesh. Rajesh also followed up on the payments due to Telequicks in USA. During investigations all the call centres who had been paid by Telequicks were contacted to obtain emails and the raw data sent to them as attachments. Such data was obtained from one of the call centre namely, M/s Savron, Gurgaon and compared with the data purchased by the complainant company during the period June-September 2004. As the data to be analysed was voluminous, SQL queries were formulated and the data was imported from worksheets to SQL tables. On running the queries it was revealed that some of the data buckets purchased by the complainant company matched completely with the data sent by M/s Telequick to M/s Savron. Further, a scrutiny of the emails indicated that the emails with data attachments sent by M/s Telequick had originated from the exclusive IP address allotted to M/s Pintach (PTL), the complainant company, by VSNL Accused Binoy, Rajesh, Abdul and Sanjeev have been arrested by a team of Police from Gurgaon and Faridabad. Binoy is BTech (Textiles) and an MBA from IIT Delhi. Co-accused Rajesh Srivastava is a BE (Electronics) from Regional Engg. College, MP. Abdul is BSc (Hons) and an MBA Marketing from AMU, Aligarh. Sanjeev Sharma, is a post graduate in computer application from GNIIT and a B Com graduate. All the four accused persons were working together in M/s Pintach Technologies at one point of time were they hatched this idea to use the data of M/s Pintach for their own benefit. Binoy and Rajesh had since left M/s PTL and are running a company by the name of M/s Protech from Gurgaon. Both the accused claim themselves to be representatives of M/s LeadPointer, USA, apparently a sister concern of M/s MortagagePointer, USA to whom the leads generated through the stolen data were originally sold.   The hot leads generated are highly priced. Due to diversion of the data the productivity (ratio of total working hours to total leads generated) of operations of the complainant company fell from 0.31 to 0.21 a fall of 33 % over a four month period. As a result the company faced a loss of about 14,000 odd leads. Priced at about Rs 2400, the parallel operations planned and run by the accused persons led to over Rs 3.3 crore loss to the complainant company. HYPERLINK http://www.neerajaarora.com/ Neeraj Aarora (Advocate)