SlideShare a Scribd company logo
1 of 15
History
 In 1996, the United Nations Commission on
International Trade Law (UNCITRAL) adopted the
model law on electronic commerce (e-commerce) to
bring uniformity in the law in different countries.
 Further, the General Assembly of the United Nations
recommended that all countries must consider this
model law before making changes to their own laws.
India became the 12th country to enable cyber law
after it passed the Information Technology Act, 2000.
Objective
 The Information Technology Act, 2000 provides legal
recognition to the transaction done via an electronic
exchange of data and other electronic means of
communication or electronic commerce transactions.
 This also involves the use of alternatives to a paper-
based method of communication and information
storage to facilitate the electronic filing of documents
with the Government agencies.
Objectives…..
 Grant legal recognition to all transactions done via an
electronic exchange of data or other electronic means of
communication or e-commerce, in place of the earlier paper-
based method of communication.
 Give legal recognition to digital signatures for the
authentication of any information or matters requiring legal
authentication
 Facilitate the electronic filing of documents with Government
agencies and also departments
 Facilitate the electronic storage of data
 Give legal sanction and also facilitate the electronic transfer of
funds between banks and financial institutions
 Grant legal recognition to bankers under the Evidence Act,
1891 and the Reserve Bank of India Act, 1934, for keeping the
books of accounts in electronic form.
Features
 All electronic contracts made through secure electronic
channels are legally valid.
 Legal recognition for digital signatures.
 Security measures for electronic records and also digital
signatures are in place
 A procedure for the appointment of adjudicating officers for
holding inquiries under the Act is finalized.
 Provision for establishing a Cyber Regulatory Appellant
Tribunal under the Act. Further, this tribunal will handle all
appeals made against the order of the Controller or
Adjudicating Officer.
Features
 An appeal against the order of the Cyber Appellant Tribunal is
possible only in the High Court
 Digital Signatures will use an asymmetric cryptosystem and also a
hash function
 Provision for the appointment of the Controller of Certifying
Authorities (CCA) to license and regulate the working of Certifying
Authorities. The Controller to act as a repository of all digital
signatures.
 The Act applies to offenses or contraventions committed outside
India
 Senior police officers and other officers can enter any public place
and search and arrest without warrant
 Provisions for the constitution of a Cyber Regulations Advisory
Committee to advise the Central Government and Controller.
LEGAL RECOGNITION OF ELECTRONIC
RECORDS
 Recognition of electronic records
 Digital Signature
 Use of Digital Signature
 Electronic Signature
 Electronic Governance
 Attribution, Acknowledgement and Dispatch of
Electronic Records
 Secure Electronic Records and Secure Electronic
Signatures
Recognition of electronic records
 The Information Technology Act, 2000 also aims to
provide the legal framework under which legal
sanctity is accorded to all electronic records and other
activities carried out by electronic Information
Systems Control and Audit means.
 The Act states that unless otherwise agreed, an
acceptance of contract may be expressed by electronic
means of communication and the same shall have
legal validity and enforceability.
Digital Signature (Amended Vide
ITAA 2008):
 Section 3 gives legal recognition to electronic records
and digital signatures
Use of Digital Signature
 For sending and receiving digitally signed and
encrypted emails.
 For carrying out secure web-based transactions.
 For Signing Documents like MS-Word, MS-Excel and
PDF’s.
Electronic Signature
 Electronic signature has also been dealt with under
Section 3A of the IT Act, 2008.
 A subscriber can authenticate any electronic record by
such electronic signature or electronic authentication
technique which is considered reliable and may be
specified in the Second Schedule.
 An Amendment to the IT Act in 2008 introduced the term
electronic signatures.
Electronic Governance
 E-governance or Electronic Governance is dealt with under Sections 4
to 10A of the IT Act, 2000.
 It provides for legal recognition of electronic records and signature and
also provides for legal recognition of contracts formed through
electronic means. Like filling of Forms etc.
 Section 4 provides for “legal recognition of electronic records”
 Section 5 provides for legal recognition of Digital Signatures
 Section 6 lays down the foundation of Electronic Governance
 Section 7 provides that the documents, records or information
which is to be retained
 Section 8 provides for the publication of rules, regulations and
notifications in the Electronic Gazette.
 section 9 of the Act provides that the conditions stipulated in
sections 6, 7 and 8 shall not confer any right to insist that the
document should be accepted in an electronic form by any Ministry
or department of the Central Government or the State Government.
Attribution, Acknowledgement
and Dispatch of Electronic Records
 ‘Attribution’ means ‘to consider it to be written or
made by someone’. Hence, section 11 lays down how an
electronic record is to be attributed to the person who
originated it.
 Section12 provides for the manner in which
acknowledgement of receipt of an electronic record by
various modes shall be made.
 Section 13 of the act provides for the manner in which
the time and place of dispatch and receipt of electronic
record sent by the originator shall be identified.
Secure Electronic Records and
Secure Electronic Signatures
 Section 14 provides where any security procedure has
been applied to an electronic record at a specific point
of time, then such record shall be deemed to be a
secure electronic record from such point of time to the
time of verification.
 Section 15 provides for the security procedure to be
applied to Digital Signatures for being treated as a
secure digital signature.
 Section 16 provides for the power of the Central
Government to prescribe the security procedure in
respect of secure electronic records and secure digital
signatures.
Thanking You….
Mohit Goswami

More Related Content

What's hot

Banker & Cuctomer Relationship
Banker & Cuctomer RelationshipBanker & Cuctomer Relationship
Banker & Cuctomer RelationshipGurpreet Kaur
 
BANKER-CUSTOMER RELATIONSHIP.pdf
BANKER-CUSTOMER RELATIONSHIP.pdfBANKER-CUSTOMER RELATIONSHIP.pdf
BANKER-CUSTOMER RELATIONSHIP.pdfAbinash Mandilwar
 
Income tax authorities under Income tax act 1961
Income tax authorities under Income tax act 1961Income tax authorities under Income tax act 1961
Income tax authorities under Income tax act 1961Chirantan Tiwari
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Principles of Trust: Classification and Creation
Principles of Trust: Classification and CreationPrinciples of Trust: Classification and Creation
Principles of Trust: Classification and CreationPreeti Sikder
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesatuljaybhaye
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Dr. Heera Lal IAS
 
Payment of cheques chapter 1
Payment of cheques chapter 1Payment of cheques chapter 1
Payment of cheques chapter 1Nayan Vaghela
 
Various types of Negotiable Instruments
Various types of Negotiable InstrumentsVarious types of Negotiable Instruments
Various types of Negotiable InstrumentsRishi Kumar Gupta
 
Negotiable instruments
Negotiable instrumentsNegotiable instruments
Negotiable instrumentsPreet Gill
 

What's hot (20)

It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Banker & Cuctomer Relationship
Banker & Cuctomer RelationshipBanker & Cuctomer Relationship
Banker & Cuctomer Relationship
 
BANKER-CUSTOMER RELATIONSHIP.pdf
BANKER-CUSTOMER RELATIONSHIP.pdfBANKER-CUSTOMER RELATIONSHIP.pdf
BANKER-CUSTOMER RELATIONSHIP.pdf
 
Rights and obligations of banker
Rights and obligations of bankerRights and obligations of banker
Rights and obligations of banker
 
Types of endorsement
Types of endorsementTypes of endorsement
Types of endorsement
 
Banking Law
Banking LawBanking Law
Banking Law
 
Income tax authorities under Income tax act 1961
Income tax authorities under Income tax act 1961Income tax authorities under Income tax act 1961
Income tax authorities under Income tax act 1961
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Collecting and paying banker
Collecting and paying bankerCollecting and paying banker
Collecting and paying banker
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Principles of Trust: Classification and Creation
Principles of Trust: Classification and CreationPrinciples of Trust: Classification and Creation
Principles of Trust: Classification and Creation
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Payment of cheques chapter 1
Payment of cheques chapter 1Payment of cheques chapter 1
Payment of cheques chapter 1
 
Various types of Negotiable Instruments
Various types of Negotiable InstrumentsVarious types of Negotiable Instruments
Various types of Negotiable Instruments
 
E transaction
E transactionE transaction
E transaction
 
Negotiable instruments
Negotiable instrumentsNegotiable instruments
Negotiable instruments
 

Similar to Information Technology Act 2008

INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In IndiaRohit6699
 
Embracing Digital Transformation Electronic Signatures for Audit Reports and ...
Embracing Digital Transformation Electronic Signatures for Audit Reports and ...Embracing Digital Transformation Electronic Signatures for Audit Reports and ...
Embracing Digital Transformation Electronic Signatures for Audit Reports and ...Drysign By Exela
 
Electronic contracts and electronic signatures under Australian law
Electronic contracts and electronic signatures under Australian lawElectronic contracts and electronic signatures under Australian law
Electronic contracts and electronic signatures under Australian lawrun_frictionless
 
Electronic transaction law no 2
Electronic transaction law no 2Electronic transaction law no 2
Electronic transaction law no 2Abbassi Law Office
 
Information technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxInformation technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxsandeepharish2
 
Countries that have made electronic signatures legal
Countries that have made electronic signatures legalCountries that have made electronic signatures legal
Countries that have made electronic signatures legalDaria Kizilova
 
Advanced Electronic Signatures
Advanced Electronic SignaturesAdvanced Electronic Signatures
Advanced Electronic SignaturesClaire Webber
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 

Similar to Information Technology Act 2008 (20)

INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Cyber law
Cyber lawCyber law
Cyber law
 
It act 2000
It act 2000It act 2000
It act 2000
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Validity Of E singnature In India
Validity Of E singnature In IndiaValidity Of E singnature In India
Validity Of E singnature In India
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Embracing Digital Transformation Electronic Signatures for Audit Reports and ...
Embracing Digital Transformation Electronic Signatures for Audit Reports and ...Embracing Digital Transformation Electronic Signatures for Audit Reports and ...
Embracing Digital Transformation Electronic Signatures for Audit Reports and ...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Electronic contracts and electronic signatures under Australian law
Electronic contracts and electronic signatures under Australian lawElectronic contracts and electronic signatures under Australian law
Electronic contracts and electronic signatures under Australian law
 
Electronic transaction law no 2
Electronic transaction law no 2Electronic transaction law no 2
Electronic transaction law no 2
 
Cyber Law and Cyber Crime
Cyber Law and Cyber Crime Cyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Information technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptxInformation technology act (SANDEEP HARISH B).pptx
Information technology act (SANDEEP HARISH B).pptx
 
E-signing-3
E-signing-3E-signing-3
E-signing-3
 
Countries that have made electronic signatures legal
Countries that have made electronic signatures legalCountries that have made electronic signatures legal
Countries that have made electronic signatures legal
 
It act 2000
It act 2000It act 2000
It act 2000
 
Advanced Electronic Signatures
Advanced Electronic SignaturesAdvanced Electronic Signatures
Advanced Electronic Signatures
 
Professional issues in IT
Professional issues in IT Professional issues in IT
Professional issues in IT
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 

Recently uploaded

Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 

Recently uploaded (20)

Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 

Information Technology Act 2008

  • 1.
  • 2. History  In 1996, the United Nations Commission on International Trade Law (UNCITRAL) adopted the model law on electronic commerce (e-commerce) to bring uniformity in the law in different countries.  Further, the General Assembly of the United Nations recommended that all countries must consider this model law before making changes to their own laws. India became the 12th country to enable cyber law after it passed the Information Technology Act, 2000.
  • 3. Objective  The Information Technology Act, 2000 provides legal recognition to the transaction done via an electronic exchange of data and other electronic means of communication or electronic commerce transactions.  This also involves the use of alternatives to a paper- based method of communication and information storage to facilitate the electronic filing of documents with the Government agencies.
  • 4. Objectives…..  Grant legal recognition to all transactions done via an electronic exchange of data or other electronic means of communication or e-commerce, in place of the earlier paper- based method of communication.  Give legal recognition to digital signatures for the authentication of any information or matters requiring legal authentication  Facilitate the electronic filing of documents with Government agencies and also departments  Facilitate the electronic storage of data  Give legal sanction and also facilitate the electronic transfer of funds between banks and financial institutions  Grant legal recognition to bankers under the Evidence Act, 1891 and the Reserve Bank of India Act, 1934, for keeping the books of accounts in electronic form.
  • 5. Features  All electronic contracts made through secure electronic channels are legally valid.  Legal recognition for digital signatures.  Security measures for electronic records and also digital signatures are in place  A procedure for the appointment of adjudicating officers for holding inquiries under the Act is finalized.  Provision for establishing a Cyber Regulatory Appellant Tribunal under the Act. Further, this tribunal will handle all appeals made against the order of the Controller or Adjudicating Officer.
  • 6. Features  An appeal against the order of the Cyber Appellant Tribunal is possible only in the High Court  Digital Signatures will use an asymmetric cryptosystem and also a hash function  Provision for the appointment of the Controller of Certifying Authorities (CCA) to license and regulate the working of Certifying Authorities. The Controller to act as a repository of all digital signatures.  The Act applies to offenses or contraventions committed outside India  Senior police officers and other officers can enter any public place and search and arrest without warrant  Provisions for the constitution of a Cyber Regulations Advisory Committee to advise the Central Government and Controller.
  • 7. LEGAL RECOGNITION OF ELECTRONIC RECORDS  Recognition of electronic records  Digital Signature  Use of Digital Signature  Electronic Signature  Electronic Governance  Attribution, Acknowledgement and Dispatch of Electronic Records  Secure Electronic Records and Secure Electronic Signatures
  • 8. Recognition of electronic records  The Information Technology Act, 2000 also aims to provide the legal framework under which legal sanctity is accorded to all electronic records and other activities carried out by electronic Information Systems Control and Audit means.  The Act states that unless otherwise agreed, an acceptance of contract may be expressed by electronic means of communication and the same shall have legal validity and enforceability.
  • 9. Digital Signature (Amended Vide ITAA 2008):  Section 3 gives legal recognition to electronic records and digital signatures
  • 10. Use of Digital Signature  For sending and receiving digitally signed and encrypted emails.  For carrying out secure web-based transactions.  For Signing Documents like MS-Word, MS-Excel and PDF’s.
  • 11. Electronic Signature  Electronic signature has also been dealt with under Section 3A of the IT Act, 2008.  A subscriber can authenticate any electronic record by such electronic signature or electronic authentication technique which is considered reliable and may be specified in the Second Schedule.  An Amendment to the IT Act in 2008 introduced the term electronic signatures.
  • 12. Electronic Governance  E-governance or Electronic Governance is dealt with under Sections 4 to 10A of the IT Act, 2000.  It provides for legal recognition of electronic records and signature and also provides for legal recognition of contracts formed through electronic means. Like filling of Forms etc.  Section 4 provides for “legal recognition of electronic records”  Section 5 provides for legal recognition of Digital Signatures  Section 6 lays down the foundation of Electronic Governance  Section 7 provides that the documents, records or information which is to be retained  Section 8 provides for the publication of rules, regulations and notifications in the Electronic Gazette.  section 9 of the Act provides that the conditions stipulated in sections 6, 7 and 8 shall not confer any right to insist that the document should be accepted in an electronic form by any Ministry or department of the Central Government or the State Government.
  • 13. Attribution, Acknowledgement and Dispatch of Electronic Records  ‘Attribution’ means ‘to consider it to be written or made by someone’. Hence, section 11 lays down how an electronic record is to be attributed to the person who originated it.  Section12 provides for the manner in which acknowledgement of receipt of an electronic record by various modes shall be made.  Section 13 of the act provides for the manner in which the time and place of dispatch and receipt of electronic record sent by the originator shall be identified.
  • 14. Secure Electronic Records and Secure Electronic Signatures  Section 14 provides where any security procedure has been applied to an electronic record at a specific point of time, then such record shall be deemed to be a secure electronic record from such point of time to the time of verification.  Section 15 provides for the security procedure to be applied to Digital Signatures for being treated as a secure digital signature.  Section 16 provides for the power of the Central Government to prescribe the security procedure in respect of secure electronic records and secure digital signatures.