SlideShare a Scribd company logo
Cyber Law
Prepared By 
Manu Melwin Joy 
Assistant Professor 
Ilahia School of Management Studies 
Kerala, India. 
Phone – 9744551114 
Mail – manu_melwinjoy@yahoo.com 
Kindly restrict the use of slides for personal purpose. 
Please seek permission to reproduce the same in public forms and presentations.
Introduction 
• In discharge of its 
international responsibility, 
the Government of India 
enacted a Law in 2000 
known as Information 
Technology Act 2000. 
• The Act extends to the 
whole of India and it applies 
also to any offence or 
contravention thereon 
committed outside India by 
any person.
Objects of the Act 
• To grant legal recognition to 
electronic records. 
• To grant legal recognition to 
digital signatures. 
• To permit retention of 
information, documents and 
records in electronic forms. 
• To foster use and acceptance of 
electronic records and digital 
signatures in the Government 
offices and its agencies. 
• To prevent possible misuse of 
electronic medium. 
• To prevent and arrest offences as 
well as deter the abuse of 
information Technology.
Digital signature 
• Digital signature is 
authentication of an 
electronic record by a 
subscriber by means of an 
electronic method or 
procedure.
Digital signature 
• Digital signature is created in two 
distinct steps. 
– Electronic record is converted into a 
message digest by using a 
mathematical function known as 
‘hash function’ which digitally 
freezes the electronic record thus 
ensuring the integrity of the content 
of the intended communication 
contained in the electronic record. 
– Identity of the person affixing the 
digital signature is authenticated 
through the use of a private key 
which attaches itself to the message 
digest and which can be verified by 
any person who has the public key 
corresponding to the private key.
Electronic governance 
• Legal recognition of electronic records. 
• Legal recognition of digital signature. 
• Use of electronic records and digital 
signatures in government. 
• Retention of electronic records. 
• Publication of rules, regulations etc in 
Electronic Gazette. 
• Power to make rules by Central 
government in respect of digital signature.
Attribution of electronic records 
• An electronic record shall be 
attributed to the originator 
– If it was sent by the originator 
himself. 
– By a person who had the 
authority to act on behalf of 
the originator in respect of that 
electronic record. 
– By an information system 
programmed by or on behalf of 
the originator to operate 
automatically.
Acknowledgment of electronic records 
• Where the originator has not 
agreed with the addressee that 
the acknowledgment of receipt 
of electronic record be given in 
a particular form or by a 
particular method, an 
acknowledgement may be 
given by 
– Any communication by the 
addressee, automated or 
otherwise. 
– Any conduct of addressee, 
sufficient to indicate to the 
originator that the electronic 
record has been received.
Dispatch of electronic records 
– The dispatch of an electronic record 
occurs when it enters a computer 
resource outside the control of the 
originator. 
– The time of receipt of an electronic 
record shall be determined as 
follows: (a) if the addressee has 
designated a computer resource for 
the purpose of receiving electronic 
records (b) if the addressee has not 
designated a computer resource 
along with specified timings, receipt 
occurs when the electronic record 
enters the computing resource and 
(3) an electronic record is deemed 
to be dispatched from the place of 
business of the originator.
Security of electronic records and 
digital signatures 
• Secure electronic record. 
• Secure digital signature. 
• Security procedure.
Regulation of certifying authorities 
• Certifying authority is a 
person who has granted a 
license to issue a digital 
signature. 
• Appointment of controller 
certifying authorities – The 
central government by 
notification in the official 
gazette appoints a controller 
of certifying authorities.
Regulation of certifying authorities 
• Power to investigate 
contravention and making 
access to computer – The 
controller or any officer 
authorized by him shall 
investigate any contravention 
of the provision of this act, 
regulates or rules made 
thereunder. Those officers in 
such cases, shall have access 
to any computer system or 
data.
Regulation of certifying authorities 
• Functions of Controller. 
– Exercising supervision over the 
activities of the certifying 
authorities. 
– Certifying public keys of the 
certifying authorities. 
– Laying down the standards to 
be maintained by the certifying 
authorities. 
– Specifying the qualification and 
experience which employees of 
the certifying authorities 
should possess.
Digital signature certificates 
• Issue of Digital signature certificate 
– Any person may make an 
application to the certifying 
authority for the issue of a digital 
signature certificate which is 
accompanied by a fee and 
certification practice statement. On 
receipt of an application, the 
certifying authority may, after 
consideration of the certification 
practice statement and after 
making such enquiries it may deem 
fit (a) grand the digital signature 
certificate or (b) for reasons to be 
recorded in writing rejection of 
application.
Digital signature certificates 
• Suspension of Digital 
signature certificate – The 
certifying authority which has 
issued a digital signature 
certificate may suspend such 
certificate (a) on receipt of a 
request to that effect from 
the subscriber or any person 
authorized by him and (b) if it 
is of opinion that the 
certificate should be 
suspended in the public 
interest.
Digital signature certificates 
• Revocation of Digital 
signature certificate - – The 
certifying authority may 
revoke a digital signature 
certificate issued by it (a) 
where the subscriber or any 
other person authorized by 
him makes a request to that 
effect or (b) upon the death 
of the subscriber or (c) upon 
the dissolution of the firm.
Penalty 
• Penalty for damage of 
computer systems – If any 
person without permission of 
owner or any other person 
who is in-charge of the 
computer access, download 
or disrupt the functions, he 
shall be liable to pay damages 
by way of compensation not 
exceeding one crore rupees 
to the person so affected.
Penalty 
• Penalty for failure to furnish 
information – If any person 
who is required to under this 
act fail to furnish any 
document, he shall be liable 
to a penalty not exceeding 
one lakh and fifty thousand 
rupees for each such failure.
Adjudication 
• Power of adjudication – For the 
purpose of adjudication, central 
government shall appoint any 
officer not below the rank of 
director as the adjudicating 
officer. If he is satisfied that the 
person has committed the 
contravention, he may impose 
such penalty as he thinks fit.
Cyber Regulations Appellate Tribunal 
• A cyber appellate tribunal 
shall consists of one person 
only referred to as the 
presiding officer, appointed 
by the central government.
Cyber Regulations Appellate Tribunal 
• Any person aggrieved by an 
order made my controller may 
prefer an appeal to a cyber 
Appellate Tribunal within a 
period of 45 days from the date 
on which a copy of order made 
by the controller is received by 
the person aggrieved. On 
receipt of an appeal, Tribunal 
may after giving the parties an 
opportunity of being heard, pas 
such order thereon as it thinks 
fit.
Cyber Regulations Appellate Tribunal 
• A penalty imposed under this 
act, if it is not paid, shall be 
recovered as an arrear of land 
revenue and the license or 
the digital signature 
certificate, as the case may 
be, shall be suspended till the 
penalty is paid.
Offences 
• Tampering with computer 
source documents – Three 
years imprisonment or fine 
worth two lakhs. 
• Hacking with computer system 
- Three years imprisonment or 
fine worth two lakhs. 
• Publishing of information which 
is obscene in electronic form - 
Ten years imprisonment or fine 
worth two lakhs.
Offences 
• Securing access to protected 
system - Ten years 
imprisonment or fine. 
• Misrepresentation - Two years 
imprisonment or fine of one 
lakh. 
• Breach of confidentiality and 
privacy - Two years 
imprisonment or fine of one 
lakh. 
• Publishing of false digital 
signature certificate - Two years 
imprisonment or fine of one 
lakh.
Cyber law - Legal Environment of Business - Business Law - Commercial Law - Manu Melwin Joy

More Related Content

What's hot

E contracting in india
E contracting in indiaE contracting in india
E contracting in india
atuljaybhaye
 
Cyber law
Cyber lawCyber law
Cyber law
premarhea
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
Adv Prashant Mali
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Dr. Heera Lal IAS
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
shamvisingh
 
What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]
Kamal Thakur
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
Sneha J Chouhan
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
shrinivas kulkarni
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
Nanda Mohan Shenoy
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
atuljaybhaye
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
Sreelekshmi Mohan
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
Legal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerceLegal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerce
Prince Sharma
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
Kanhaiya Kumar
 

What's hot (20)

E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
Cyber law
Cyber lawCyber law
Cyber law
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
 
What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]What are the duties of the subscriber of Digital Signature Certificate? [#48]
What are the duties of the subscriber of Digital Signature Certificate? [#48]
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Legal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerceLegal Aspect Pertaining to E-commerce
Legal Aspect Pertaining to E-commerce
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 

Viewers also liked

Cyber lawyer india
Cyber lawyer indiaCyber lawyer india
Cyber lawyer india
cyberjure
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Jyotindra Zaveri
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
Adv Prashant Mali
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 

Viewers also liked (8)

Cyber lawyer india
Cyber lawyer indiaCyber lawyer india
Cyber lawyer india
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 

Similar to Cyber law - Legal Environment of Business - Business Law - Commercial Law - Manu Melwin Joy

IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
reenu40
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Tirthankar Sutradhar
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
Gururaj H L
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
Prateek Sinha
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
shrutiganpule74
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
Talwant Singh
 
Identitymanagment
IdentitymanagmentIdentitymanagment
Identitymanagment
ioannis iglezakis
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conferenceAdv Prashant Mali
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
gallowayandcollens
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
akshitarathi77
 
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber CrimesRelevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Dr. Prashant Vats
 
Cyber
CyberCyber
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
drsrivanicshod
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
gallowayandcollens
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
Himanshu Jawa
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
Karnika Seth
 

Similar to Cyber law - Legal Environment of Business - Business Law - Commercial Law - Manu Melwin Joy (20)

IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
 
Identitymanagment
IdentitymanagmentIdentitymanagment
Identitymanagment
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber CrimesRelevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
 
Cyber
CyberCyber
Cyber
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 

More from manumelwin

Volkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin Joy
Volkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin JoyVolkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin Joy
Volkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin Joy
manumelwin
 
Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...
Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...
Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...
manumelwin
 
IKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin Joy
IKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin JoyIKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin Joy
IKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin Joy
manumelwin
 
Bletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin Joy
Bletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin JoyBletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin Joy
Bletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin Joy
manumelwin
 
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
manumelwin
 
Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...
Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...
Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...
manumelwin
 
Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...
Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...
Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...
manumelwin
 
Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...
Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...
Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...
manumelwin
 
Randomized complete block design - Dr. Manu Melwin Joy - School of Management...
Randomized complete block design - Dr. Manu Melwin Joy - School of Management...Randomized complete block design - Dr. Manu Melwin Joy - School of Management...
Randomized complete block design - Dr. Manu Melwin Joy - School of Management...
manumelwin
 
ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...
ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...
ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...
manumelwin
 
Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...
Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...
Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...
manumelwin
 
How information system is transforming business - - Dr. Manu Melwin Joy - Sch...
How information system is transforming business - - Dr. Manu Melwin Joy - Sch...How information system is transforming business - - Dr. Manu Melwin Joy - Sch...
How information system is transforming business - - Dr. Manu Melwin Joy - Sch...
manumelwin
 
Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...
Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...
Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...
manumelwin
 
Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...
Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...
Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...
manumelwin
 
Definition of information system - Dr. Manu Melwin Joy - School of Management...
Definition of information system - Dr. Manu Melwin Joy - School of Management...Definition of information system - Dr. Manu Melwin Joy - School of Management...
Definition of information system - Dr. Manu Melwin Joy - School of Management...
manumelwin
 
PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...
PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...
PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...
manumelwin
 
Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy
 Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy
Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy
manumelwin
 
B2B marketing - Manu Melwin Joy
B2B marketing - Manu Melwin JoyB2B marketing - Manu Melwin Joy
B2B marketing - Manu Melwin Joy
manumelwin
 
Industrial marketing - Manu Melwin Joy
Industrial marketing - Manu Melwin JoyIndustrial marketing - Manu Melwin Joy
Industrial marketing - Manu Melwin Joy
manumelwin
 
Green marketing - Manu Melwin Joy
Green marketing - Manu Melwin JoyGreen marketing - Manu Melwin Joy
Green marketing - Manu Melwin Joy
manumelwin
 

More from manumelwin (20)

Volkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin Joy
Volkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin JoyVolkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin Joy
Volkswagen Hidden Advert - Gamification in Recruitment - Dr. Manu Melwin Joy
 
Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...
Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...
Swedish Armed Force - Who Cares? - Gamification in Recruitment - Dr. Manu Mel...
 
IKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin Joy
IKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin JoyIKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin Joy
IKEA - Assemble your career - Gamification in Recruitment - Dr. Manu Melwin Joy
 
Bletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin Joy
Bletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin JoyBletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin Joy
Bletchley Park’s crossword - Gamification in Recruitment - Dr. Manu Melwin Joy
 
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
Yates’ algorithm for 2n factorial experiment - Dr. Manu Melwin Joy - School o...
 
Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...
Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...
Factorial design - Dr. Manu Melwin Joy - School of Management Studies, Cochin...
 
Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...
Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...
Ducan’s multiple range test - - Dr. Manu Melwin Joy - School of Management St...
 
Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...
Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...
Latin square design- Dr. Manu Melwin Joy - School of Management Studies, Coch...
 
Randomized complete block design - Dr. Manu Melwin Joy - School of Management...
Randomized complete block design - Dr. Manu Melwin Joy - School of Management...Randomized complete block design - Dr. Manu Melwin Joy - School of Management...
Randomized complete block design - Dr. Manu Melwin Joy - School of Management...
 
ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...
ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...
ANOVA - Dr. Manu Melwin Joy - School of Management Studies, Cochin University...
 
Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...
Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...
Design of experiments - Dr. Manu Melwin Joy - School of Management Studies, C...
 
How information system is transforming business - - Dr. Manu Melwin Joy - Sch...
How information system is transforming business - - Dr. Manu Melwin Joy - Sch...How information system is transforming business - - Dr. Manu Melwin Joy - Sch...
How information system is transforming business - - Dr. Manu Melwin Joy - Sch...
 
Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...
Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...
Internet revolution - Dr. Manu Melwin Joy - School of Management Studies, Coc...
 
Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...
Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...
Smart phone revolution - Dr. Manu Melwin Joy - School of Management Studies, ...
 
Definition of information system - Dr. Manu Melwin Joy - School of Management...
Definition of information system - Dr. Manu Melwin Joy - School of Management...Definition of information system - Dr. Manu Melwin Joy - School of Management...
Definition of information system - Dr. Manu Melwin Joy - School of Management...
 
PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...
PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...
PESTEL Analysis - Manu Melwin Joy - School of Management Studies, Cochin Univ...
 
Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy
 Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy
Oxytocin and Trust - Neuro Human Resource Management (NHRM) - Manu Melwin Joy
 
B2B marketing - Manu Melwin Joy
B2B marketing - Manu Melwin JoyB2B marketing - Manu Melwin Joy
B2B marketing - Manu Melwin Joy
 
Industrial marketing - Manu Melwin Joy
Industrial marketing - Manu Melwin JoyIndustrial marketing - Manu Melwin Joy
Industrial marketing - Manu Melwin Joy
 
Green marketing - Manu Melwin Joy
Green marketing - Manu Melwin JoyGreen marketing - Manu Melwin Joy
Green marketing - Manu Melwin Joy
 

Recently uploaded

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 

Recently uploaded (20)

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

Cyber law - Legal Environment of Business - Business Law - Commercial Law - Manu Melwin Joy

  • 2. Prepared By Manu Melwin Joy Assistant Professor Ilahia School of Management Studies Kerala, India. Phone – 9744551114 Mail – manu_melwinjoy@yahoo.com Kindly restrict the use of slides for personal purpose. Please seek permission to reproduce the same in public forms and presentations.
  • 3. Introduction • In discharge of its international responsibility, the Government of India enacted a Law in 2000 known as Information Technology Act 2000. • The Act extends to the whole of India and it applies also to any offence or contravention thereon committed outside India by any person.
  • 4. Objects of the Act • To grant legal recognition to electronic records. • To grant legal recognition to digital signatures. • To permit retention of information, documents and records in electronic forms. • To foster use and acceptance of electronic records and digital signatures in the Government offices and its agencies. • To prevent possible misuse of electronic medium. • To prevent and arrest offences as well as deter the abuse of information Technology.
  • 5. Digital signature • Digital signature is authentication of an electronic record by a subscriber by means of an electronic method or procedure.
  • 6. Digital signature • Digital signature is created in two distinct steps. – Electronic record is converted into a message digest by using a mathematical function known as ‘hash function’ which digitally freezes the electronic record thus ensuring the integrity of the content of the intended communication contained in the electronic record. – Identity of the person affixing the digital signature is authenticated through the use of a private key which attaches itself to the message digest and which can be verified by any person who has the public key corresponding to the private key.
  • 7. Electronic governance • Legal recognition of electronic records. • Legal recognition of digital signature. • Use of electronic records and digital signatures in government. • Retention of electronic records. • Publication of rules, regulations etc in Electronic Gazette. • Power to make rules by Central government in respect of digital signature.
  • 8. Attribution of electronic records • An electronic record shall be attributed to the originator – If it was sent by the originator himself. – By a person who had the authority to act on behalf of the originator in respect of that electronic record. – By an information system programmed by or on behalf of the originator to operate automatically.
  • 9. Acknowledgment of electronic records • Where the originator has not agreed with the addressee that the acknowledgment of receipt of electronic record be given in a particular form or by a particular method, an acknowledgement may be given by – Any communication by the addressee, automated or otherwise. – Any conduct of addressee, sufficient to indicate to the originator that the electronic record has been received.
  • 10. Dispatch of electronic records – The dispatch of an electronic record occurs when it enters a computer resource outside the control of the originator. – The time of receipt of an electronic record shall be determined as follows: (a) if the addressee has designated a computer resource for the purpose of receiving electronic records (b) if the addressee has not designated a computer resource along with specified timings, receipt occurs when the electronic record enters the computing resource and (3) an electronic record is deemed to be dispatched from the place of business of the originator.
  • 11. Security of electronic records and digital signatures • Secure electronic record. • Secure digital signature. • Security procedure.
  • 12. Regulation of certifying authorities • Certifying authority is a person who has granted a license to issue a digital signature. • Appointment of controller certifying authorities – The central government by notification in the official gazette appoints a controller of certifying authorities.
  • 13. Regulation of certifying authorities • Power to investigate contravention and making access to computer – The controller or any officer authorized by him shall investigate any contravention of the provision of this act, regulates or rules made thereunder. Those officers in such cases, shall have access to any computer system or data.
  • 14. Regulation of certifying authorities • Functions of Controller. – Exercising supervision over the activities of the certifying authorities. – Certifying public keys of the certifying authorities. – Laying down the standards to be maintained by the certifying authorities. – Specifying the qualification and experience which employees of the certifying authorities should possess.
  • 15. Digital signature certificates • Issue of Digital signature certificate – Any person may make an application to the certifying authority for the issue of a digital signature certificate which is accompanied by a fee and certification practice statement. On receipt of an application, the certifying authority may, after consideration of the certification practice statement and after making such enquiries it may deem fit (a) grand the digital signature certificate or (b) for reasons to be recorded in writing rejection of application.
  • 16. Digital signature certificates • Suspension of Digital signature certificate – The certifying authority which has issued a digital signature certificate may suspend such certificate (a) on receipt of a request to that effect from the subscriber or any person authorized by him and (b) if it is of opinion that the certificate should be suspended in the public interest.
  • 17. Digital signature certificates • Revocation of Digital signature certificate - – The certifying authority may revoke a digital signature certificate issued by it (a) where the subscriber or any other person authorized by him makes a request to that effect or (b) upon the death of the subscriber or (c) upon the dissolution of the firm.
  • 18. Penalty • Penalty for damage of computer systems – If any person without permission of owner or any other person who is in-charge of the computer access, download or disrupt the functions, he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected.
  • 19. Penalty • Penalty for failure to furnish information – If any person who is required to under this act fail to furnish any document, he shall be liable to a penalty not exceeding one lakh and fifty thousand rupees for each such failure.
  • 20. Adjudication • Power of adjudication – For the purpose of adjudication, central government shall appoint any officer not below the rank of director as the adjudicating officer. If he is satisfied that the person has committed the contravention, he may impose such penalty as he thinks fit.
  • 21. Cyber Regulations Appellate Tribunal • A cyber appellate tribunal shall consists of one person only referred to as the presiding officer, appointed by the central government.
  • 22. Cyber Regulations Appellate Tribunal • Any person aggrieved by an order made my controller may prefer an appeal to a cyber Appellate Tribunal within a period of 45 days from the date on which a copy of order made by the controller is received by the person aggrieved. On receipt of an appeal, Tribunal may after giving the parties an opportunity of being heard, pas such order thereon as it thinks fit.
  • 23. Cyber Regulations Appellate Tribunal • A penalty imposed under this act, if it is not paid, shall be recovered as an arrear of land revenue and the license or the digital signature certificate, as the case may be, shall be suspended till the penalty is paid.
  • 24. Offences • Tampering with computer source documents – Three years imprisonment or fine worth two lakhs. • Hacking with computer system - Three years imprisonment or fine worth two lakhs. • Publishing of information which is obscene in electronic form - Ten years imprisonment or fine worth two lakhs.
  • 25. Offences • Securing access to protected system - Ten years imprisonment or fine. • Misrepresentation - Two years imprisonment or fine of one lakh. • Breach of confidentiality and privacy - Two years imprisonment or fine of one lakh. • Publishing of false digital signature certificate - Two years imprisonment or fine of one lakh.