Business Law
Contents <ul><li>Introduction </li></ul><ul><li>Digital Signatures & Electronic Signatures </li></ul><ul><li>Electronic Go...
Introduction <ul><li>Electronic Commerce </li></ul><ul><li>Information Technology Act , 2000  </li></ul><ul><li>as amended...
Digital Signatures <ul><li>Authentication of electronic record shall be effected by the use of asymmetric crypto system an...
Electronic Signatures <ul><li>Authentication of electronic record by a subscriber by means of electronic technique specifi...
Electronic Governance <ul><li>Act for Legal recognition of Electronic Records </li></ul><ul><li>Electronic Form </li></ul>...
Electronic Record <ul><li>Data, Record or data generated, image or sound stored, received or sent in an electronic form or...
Controller <ul><li>Appointment of Controller </li></ul><ul><li>Functions of Controller </li></ul><ul><li>Powers of Control...
Certifying Authority <ul><li>Definition </li></ul><ul><li>Obligations & Duties </li></ul><ul><ul><ul><ul><ul><li>Follow Pr...
Adjudication, Penalties& Compensation <ul><li>Power to Adjudicate </li></ul><ul><li>Power to Investigate Offences </li></u...
Case Study <ul><li>Parliament Attack Case </li></ul><ul><li>Analyzing & Retrieving information from laptops of terrorists ...
<ul><li>Questions </li></ul>
Cyber law
Upcoming SlideShare
Loading in...5
×

Cyber law

1,987

Published on

Published in: Education, Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,987
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
166
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Cyber law

  1. 1. Business Law
  2. 2. Contents <ul><li>Introduction </li></ul><ul><li>Digital Signatures & Electronic Signatures </li></ul><ul><li>Electronic Governance </li></ul><ul><li>Electronic Records </li></ul><ul><li>Controller & Certifying Authorities </li></ul><ul><li>Adjudication,Penalities & Compensation </li></ul><ul><li>Case Study </li></ul>
  3. 3. Introduction <ul><li>Electronic Commerce </li></ul><ul><li>Information Technology Act , 2000 </li></ul><ul><li>as amended by </li></ul><ul><li>The Information Technology(Amendment) Act, 2008 with effect from 27/10/2009 </li></ul><ul><li>Objectives of the Act </li></ul><ul><li>Provision of Act </li></ul>
  4. 4. Digital Signatures <ul><li>Authentication of electronic record shall be effected by the use of asymmetric crypto system and hash function which envelope and transfer the initial electronic record to another (Sec.2(1)& Sec.3(1)) </li></ul><ul><li>Manners of Authentication </li></ul><ul><li>Verification of Digital signatures </li></ul><ul><li>Generation of Digital Signatures Certificate </li></ul><ul><li>Revocation of Digital Signatures Certificate </li></ul><ul><li>Suspension of Digital Signatures Certificate </li></ul>
  5. 5. Electronic Signatures <ul><li>Authentication of electronic record by a subscriber by means of electronic technique specified in the second schedule (sec.2(1)) </li></ul><ul><li>Subscriber </li></ul><ul><li>Duties of Subscriber </li></ul><ul><ul><ul><ul><ul><li>Generating key pair </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Acceptance of Digital Signature Certificate </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Control of private Key </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Extend Facilities to decrypt information </li></ul></ul></ul></ul></ul>
  6. 6. Electronic Governance <ul><li>Act for Legal recognition of Electronic Records </li></ul><ul><li>Electronic Form </li></ul><ul><li>Electronic Form evidence </li></ul><ul><li>Access </li></ul><ul><li>Computer & Network </li></ul><ul><li>Verification of Electronic Records </li></ul><ul><li>Authentication of Electronic Records </li></ul><ul><li>Use of Electronic Records </li></ul>
  7. 7. Electronic Record <ul><li>Data, Record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche(Sec.2(1)) </li></ul><ul><li>Originator </li></ul><ul><li>Intermediary </li></ul><ul><li>Liability of Intermediary </li></ul><ul><li>When Intermediary not Liable? </li></ul><ul><li>Indian Computer Emergency Response Team </li></ul>
  8. 8. Controller <ul><li>Appointment of Controller </li></ul><ul><li>Functions of Controller </li></ul><ul><li>Powers of Controller </li></ul><ul><ul><ul><ul><ul><li>To delegate </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>To Investigate contraventions </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>To give directions </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Access to Computers and date </li></ul></ul></ul></ul></ul>
  9. 9. Certifying Authority <ul><li>Definition </li></ul><ul><li>Obligations & Duties </li></ul><ul><ul><ul><ul><ul><li>Follow Procedures </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Cross certification </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Security guidelines </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Compliances by employees </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Disclosures </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Confidential Information </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Audit </li></ul></ul></ul></ul></ul>
  10. 10. Adjudication, Penalties& Compensation <ul><li>Power to Adjudicate </li></ul><ul><li>Power to Investigate Offences </li></ul><ul><li>Penalty & Compensation for damage to computer </li></ul><ul><li>Penalty for failure to furnish information, return </li></ul><ul><li>Penalty for securing access to a protected system </li></ul><ul><li>Punishment for sending offensive messages </li></ul><ul><li>Punishment for identifying theft </li></ul><ul><li>Punishment for cheating by Personation </li></ul><ul><li>Punishment for violation of privacy </li></ul><ul><li>Punishment for cyber terrorism </li></ul><ul><li>Penalty for breach of confidentiality & privacy </li></ul>
  11. 11. Case Study <ul><li>Parliament Attack Case </li></ul><ul><li>Analyzing & Retrieving information from laptops of terrorists </li></ul><ul><li>Laptops send to Computer forensics division </li></ul><ul><li>Contains information about terrorists motive </li></ul><ul><li>Retrieved the details </li></ul><ul><li>Suitable punishments were given according to the law </li></ul>
  12. 12. <ul><li>Questions </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×