SlideShare a Scribd company logo
E-CommerceLawofthePhilippines
1.Doesanemaildocumentacceptableaslegaldocumentasevidenceinthe
courts?Justifyyouranswer.Specifythelaw,article,andsectioninformation.
Chapter3:LEGALRECOGNITIONOFELECTRONICDATAMESSAGESAND
ELECTRONICDOCUMENTS
Section11.AuthenticationofElectronicDataMessagesandElectronicDocuments.
Section11.AuthenticationofElectronicDataMessagesandElectronicDocuments.
2. Whatare the requirements foran electronic documentto be accepted as legal
document? Justify youranswer.Specify the law,article,and section information.
Chapter 3: LEGAL RECOGNITION OF ELECTRONIC DATA MESSAGES AND
ELECTRONIC DOCUMENTS
Section 7. Legal Recognition of Electronic documents- Electronic documents shall
have the legal effect, validity or enforce ability as any other document or legal
writing,
(a) Where the law requires a document to be in writing, that requirement is met by an
electronic document if the said electronic document maintains its integrity and reliability
and can be authenticated so as to be usable for subsequent reference, in that–
i. The electronic document has remained complete and unaltered, apart from the addition
of any endorsement and any authorized change, or any change which arises in the normal
course of communication, storage and display; and
ii. The electronic document is reliable in the light of the purpose for which it was generated
and in the light of all relevant circumstances.
(b) Paragraph (a) applies whether the requirement therein is in the from of an obligation or
whether the law simply provides consequences for the document not being presented or
retained in its original from.
(c) Where the law requires that a document be presented or retained in its original form,
that requirement is met by an electronic document if-
i. There exists a reliable assurance as to the integrity of the document from the time when
it was first generated in its final from; and
ii. That document is capable of being displayed to the person to whom it is to be
presented: Provided, That no provision of this Act shall apply to vary any and all
requirements of existing laws on formalities required in the execution of documents for
their validity.
For evidentiary purposes, an electronic document shall be the functional equivalent of a
written document under existing laws.
This Act does not modify any statutory any statutory rule relating to admissibility of
electronic data massages or electronic documents, except the rules relating to
authentication and best evidence.
3. Is it legal to create electronic contracts agreed by both parties? Justify your
answer. Specify the law, article, and section information.
Part V: FINAL PROVISIONS
Section 38. Variation of Agreement. – As between parties involved in generating, sending,
receiving, storing or otherwise processing electronic data message or electronic
document, any provisions of this Act may be varied by agreement between and among
them.
4. Would you be imprisoned if you are found guilty of computer hacking? Justify
your answer. Specify the law, article, and section information.
Part V: FINAL PROVISIONS
Yes, Section 33. Penalties. - The following Acts, shall be penalized by fine
and/or imprisonment.
Section 38. Variation of Agreement. – As between parties involved in generating, sending,
receiving, storing or otherwise processing electronic data message or electronic
document, any provisions of this Act may be varied by agreement between and among
them.
(a) Hacking or crackling with refers to unauthorized access into or interference in a
computer system/server or information and communication system; or any access in order
to corrupt, alter, steal, or destroy using a computer or other similar information and
communication devices, without the knowledge and consent of the owner of the computer
or information and communications system, including the introduction of computer viruses
and
the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data
messages or electronic documents shall be punished by a minimum fine of One Hundred
Thousand pesos (P 100,000.00) and a maximum commensurate to the damage incurred
and a mandatory imprisonment of six (6) months to three (3) years.
5. How much is the fine for computer hacking? Justify your answer. Specify the law,
article, and section information.
Part V: FINAL PROVISIONS
Section 33. Penalties. - The following Acts, shall be penalized by fine and/or
imprisonment.
(b) Piracy or the unauthorized copying, reproduction, dissemination, or distribution,
importation, use, removal, alteration, substitution, modification, storage, uploading,
downloading, communication, making available to the public, or broadcasting of protected
material, electronic signature or copyrighted works including legally protected sound
recording or phonograms or information material on protected works, through the use of
telecommunication networks, such as, but not limited to, the internet, in a manner that
infringes intellectual property rights shall be punished by a minimum fine of One Hundred
Thousand pesos (P 100,000.00) and a maximum commensurate to the damage incurred
and a mandatory imprisonment of six (6) months to three (3) years.
6. Would you be imprisoned for copying or downloading copyrighted movies and
music from the internet without proper copyright permissions? Justify your answer.
Specify the law, article, and section information.
Part V: FINAL PROVISIONS
Section 33. Penalties. - The following Acts, shall be penalized by fine and/or
imprisonment.
(c) Violations of the Consumer Act of Republic Act No. 7394 and other relevant to pertinent
laws through transaction covered by or using electronic data messages or electronic
documents, shall be penalized with the same penalties as provided in those laws;
6. Would you be imprisoned for copying or downloading copyrighted movies and
music from the internet without proper copyright permissions? Justify your answer.
Specify the law, article, and section information.
Part V: FINAL PROVISIONS
Section 33. Penalties. - The following Acts, shall be penalized by fine and/or
imprisonment.
(c) Violations of the Consumer Act of Republic Act No. 7394 and other relevant to pertinent
laws through transaction covered by or using electronic data messages or electronic
documents, shall be penalized with the same penalties as provided in those laws;

More Related Content

What's hot

Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Adwiteeya Agrawal
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
JulainaMehraj
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
ITM UNIVERSITY, RAIPUR- SCHOOL OF LAW
 
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj Aarora
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
atuljaybhaye
 
Cyber laws of US
Cyber laws of USCyber laws of US
Cyber laws of US
Akshay Jaryal
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Maxwell Ranasinghe
 
Legal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesLegal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as Intermediaries
EquiCorp Associates
 
Trending methods of international service of process
Trending methods of international service of processTrending methods of international service of process
Trending methods of international service of process
Steven Silton
 
The cable television networks regulation) act, 1995
The cable television networks regulation) act, 1995The cable television networks regulation) act, 1995
The cable television networks regulation) act, 1995
Leo Lukose
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
ian_oguis
 
Academic letter re changes in surveillance law
Academic letter re changes in surveillance lawAcademic letter re changes in surveillance law
Academic letter re changes in surveillance law
Andrew Murray
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
shamvisingh
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
gagan deep
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
Karnika Seth
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
Mohit Goswami
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
MarkFredderickAbejo
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
Mohit Dholakiya
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj Aarora
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a Newbie
Anuj Khandelwal
 

What's hot (20)

Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence act
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Cyber laws of US
Cyber laws of USCyber laws of US
Cyber laws of US
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
Legal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesLegal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as Intermediaries
 
Trending methods of international service of process
Trending methods of international service of processTrending methods of international service of process
Trending methods of international service of process
 
The cable television networks regulation) act, 1995
The cable television networks regulation) act, 1995The cable television networks regulation) act, 1995
The cable television networks regulation) act, 1995
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Academic letter re changes in surveillance law
Academic letter re changes in surveillance lawAcademic letter re changes in surveillance law
Academic letter re changes in surveillance law
 
Cyber jurisdiction in India
Cyber jurisdiction in IndiaCyber jurisdiction in India
Cyber jurisdiction in India
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a Newbie
 

Similar to E commerce law

IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
Tapan Khilar
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
RegineManuel2
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
Alison - Free Online Learning
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Shankey Gupta
 
electronic_records_article.pdf
electronic_records_article.pdfelectronic_records_article.pdf
electronic_records_article.pdf
DharmendraRai32
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
Parth Patel
 
CYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).pptCYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
AdityaRanjan789094
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Anirban Mandal
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
Anirban Mandal
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
Vishni Ganepola
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
Dr. Prashant Vats
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
Maruthi N.E
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
MohaiUDin
 
law.pptx
law.pptxlaw.pptx
law.pptx
monujangir2
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
Dipayan Sarkar
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
Aldrin SuperGo
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
badangayonmgb
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
atuljaybhaye
 
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docxUNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
lillie234567
 

Similar to E commerce law (20)

IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
 
electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)electronic commerce act 8792 (2000)
electronic commerce act 8792 (2000)
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
electronic_records_article.pdf
electronic_records_article.pdfelectronic_records_article.pdf
electronic_records_article.pdf
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
 
CYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).pptCYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
law.pptx
law.pptxlaw.pptx
law.pptx
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docxUNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
UNOFFICIALTRANSLATIONLawonCombatingCybercrimeint.docx
 

Recently uploaded

Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Leena Ghag-Sakpal
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 

Recently uploaded (20)

Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 

E commerce law

  • 2. 2. Whatare the requirements foran electronic documentto be accepted as legal document? Justify youranswer.Specify the law,article,and section information. Chapter 3: LEGAL RECOGNITION OF ELECTRONIC DATA MESSAGES AND ELECTRONIC DOCUMENTS Section 7. Legal Recognition of Electronic documents- Electronic documents shall have the legal effect, validity or enforce ability as any other document or legal writing, (a) Where the law requires a document to be in writing, that requirement is met by an electronic document if the said electronic document maintains its integrity and reliability and can be authenticated so as to be usable for subsequent reference, in that– i. The electronic document has remained complete and unaltered, apart from the addition of any endorsement and any authorized change, or any change which arises in the normal course of communication, storage and display; and
  • 3. ii. The electronic document is reliable in the light of the purpose for which it was generated and in the light of all relevant circumstances. (b) Paragraph (a) applies whether the requirement therein is in the from of an obligation or whether the law simply provides consequences for the document not being presented or retained in its original from. (c) Where the law requires that a document be presented or retained in its original form, that requirement is met by an electronic document if- i. There exists a reliable assurance as to the integrity of the document from the time when it was first generated in its final from; and ii. That document is capable of being displayed to the person to whom it is to be presented: Provided, That no provision of this Act shall apply to vary any and all requirements of existing laws on formalities required in the execution of documents for their validity. For evidentiary purposes, an electronic document shall be the functional equivalent of a written document under existing laws. This Act does not modify any statutory any statutory rule relating to admissibility of electronic data massages or electronic documents, except the rules relating to authentication and best evidence.
  • 4. 3. Is it legal to create electronic contracts agreed by both parties? Justify your answer. Specify the law, article, and section information. Part V: FINAL PROVISIONS Section 38. Variation of Agreement. – As between parties involved in generating, sending, receiving, storing or otherwise processing electronic data message or electronic document, any provisions of this Act may be varied by agreement between and among them. 4. Would you be imprisoned if you are found guilty of computer hacking? Justify your answer. Specify the law, article, and section information. Part V: FINAL PROVISIONS Yes, Section 33. Penalties. - The following Acts, shall be penalized by fine and/or imprisonment. Section 38. Variation of Agreement. – As between parties involved in generating, sending, receiving, storing or otherwise processing electronic data message or electronic document, any provisions of this Act may be varied by agreement between and among them. (a) Hacking or crackling with refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and
  • 5. the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic documents shall be punished by a minimum fine of One Hundred Thousand pesos (P 100,000.00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years. 5. How much is the fine for computer hacking? Justify your answer. Specify the law, article, and section information. Part V: FINAL PROVISIONS Section 33. Penalties. - The following Acts, shall be penalized by fine and/or imprisonment. (b) Piracy or the unauthorized copying, reproduction, dissemination, or distribution, importation, use, removal, alteration, substitution, modification, storage, uploading, downloading, communication, making available to the public, or broadcasting of protected material, electronic signature or copyrighted works including legally protected sound recording or phonograms or information material on protected works, through the use of telecommunication networks, such as, but not limited to, the internet, in a manner that infringes intellectual property rights shall be punished by a minimum fine of One Hundred Thousand pesos (P 100,000.00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years.
  • 6. 6. Would you be imprisoned for copying or downloading copyrighted movies and music from the internet without proper copyright permissions? Justify your answer. Specify the law, article, and section information. Part V: FINAL PROVISIONS Section 33. Penalties. - The following Acts, shall be penalized by fine and/or imprisonment. (c) Violations of the Consumer Act of Republic Act No. 7394 and other relevant to pertinent laws through transaction covered by or using electronic data messages or electronic documents, shall be penalized with the same penalties as provided in those laws;
  • 7. 6. Would you be imprisoned for copying or downloading copyrighted movies and music from the internet without proper copyright permissions? Justify your answer. Specify the law, article, and section information. Part V: FINAL PROVISIONS Section 33. Penalties. - The following Acts, shall be penalized by fine and/or imprisonment. (c) Violations of the Consumer Act of Republic Act No. 7394 and other relevant to pertinent laws through transaction covered by or using electronic data messages or electronic documents, shall be penalized with the same penalties as provided in those laws;