The document summarizes the key amendments made to the Indian Evidence Act of 1872 by the Information Technology Act of 2000 regarding electronic records and digital signatures. Some of the main changes include:
1) Expanding the definitions of "evidence" and certain terms to include electronic records.
2) Stating that electronic records, including those stored on computers, can be considered documents if certain conditions are met.
3) Creating new provisions for dealing with electronic records as evidence, including presumptions around digital signatures, electronic agreements, and records being five years old.
4) Allowing opinions of Certifying Authorities on digital signatures and verification of signatures by public keys.
This document summarizes key points about electronic evidence in India from a presentation given by Adv. Prashant Mali. It discusses a case where electronic evidence was relied upon to convict someone of a crime. It also outlines the conditions for admissibility of electronic records as evidence under Section 65-B of Indian law. Additionally, it discusses various forensic labs where electronic records can be examined, precedents around email and call records as evidence, and requirements for electronic records from banks to be admitted as evidence.
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The IT Act was enacted in 2000, making India the 12th country to adopt cyber laws, and is based on UNCITRAL model law on e-commerce.
- The objectives of the Act were to provide legal recognition for electronic transactions and documents, facilitate e-governance, and amend related laws to include electronic forms.
- It defines important terms like electronic records, digital signatures, and secure digital signatures verified using public key infrastructure.
- The Act provides for legal recognition of electronic records and digital signatures, and regulates the functions of the Controller of Certifying Authorities and licensed Cert
The document provides an overview of the Information Technology Act 2000 of India. It discusses key objectives of the act such as providing legal recognition to electronic transactions and records. It also defines important terms used in the act like computer, electronic record, digital signature. The roles of regulatory authorities like the Controller of Certifying Authorities in licensing and auditing Certifying Authorities are summarized. Provisions around digital signatures, electronic records and their admissibility as evidence are also briefly outlined.
The document discusses the Indian Information Technology Act of 2000. Some key points:
- The Act aims to provide legal recognition for electronic records and digital signatures to facilitate electronic governance and commerce.
- It defines cyber crimes and penalties. It also establishes mechanisms like the Controller of Certifying Authorities and the Cyber Appellate Tribunal.
- The original Act contained 94 sections across 13 chapters addressing issues like electronic signatures, electronic governance, record retention, and cyber crimes. It also amended other existing laws.
- A major amendment in 2008 introduced sections on offensive online communications and increased surveillance powers for authorities. It also addressed cybercrimes like pornography and cyberterrorism.
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
The document provides an overview of the Information Technology Act 2000 of India. Some key points:
- The IT Act was enacted in 2000, making India one of the first 12 countries to adopt cyber laws. It is based on the UNCITRAL Model Law on e-commerce.
- The objectives of the Act were to provide legal recognition for electronic transactions and facilitate e-governance. It amended several other Indian laws to include electronic records and digital signatures.
- The Act applies to cyber offenses committed in India or involving Indian systems. It defines important terms like electronic records, digital signatures, and secure electronic records using cryptography.
- Digital signatures use public key infrastructure for verification by relying parties
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The Act was enacted in 2000 to provide legal recognition to electronic records and digital signatures. It is based on the UNCITRAL Model Law on E-Commerce.
- The objectives are to facilitate electronic governance and commerce. It defines electronic records, digital signatures, secure systems, etc. and recognizes their legal validity.
- It applies to the whole of India and any offenses committed outside India involving computers in India. Various cybercrimes are punishable under the Act.
- It establishes provisions for public key infrastructure, digital signature certificates, duties of subscribers, and regulates certifying authorities to facilitate
Logs & The Law: What is Admissible in Court?loglogic
What is the role of Log Data in legal cases, such as a database security breach? Learn how logs are used, best legal practices, logs as evidence, and what architecture and solutions can help.
This document summarizes key points about electronic evidence in India from a presentation given by Adv. Prashant Mali. It discusses a case where electronic evidence was relied upon to convict someone of a crime. It also outlines the conditions for admissibility of electronic records as evidence under Section 65-B of Indian law. Additionally, it discusses various forensic labs where electronic records can be examined, precedents around email and call records as evidence, and requirements for electronic records from banks to be admitted as evidence.
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The IT Act was enacted in 2000, making India the 12th country to adopt cyber laws, and is based on UNCITRAL model law on e-commerce.
- The objectives of the Act were to provide legal recognition for electronic transactions and documents, facilitate e-governance, and amend related laws to include electronic forms.
- It defines important terms like electronic records, digital signatures, and secure digital signatures verified using public key infrastructure.
- The Act provides for legal recognition of electronic records and digital signatures, and regulates the functions of the Controller of Certifying Authorities and licensed Cert
The document provides an overview of the Information Technology Act 2000 of India. It discusses key objectives of the act such as providing legal recognition to electronic transactions and records. It also defines important terms used in the act like computer, electronic record, digital signature. The roles of regulatory authorities like the Controller of Certifying Authorities in licensing and auditing Certifying Authorities are summarized. Provisions around digital signatures, electronic records and their admissibility as evidence are also briefly outlined.
The document discusses the Indian Information Technology Act of 2000. Some key points:
- The Act aims to provide legal recognition for electronic records and digital signatures to facilitate electronic governance and commerce.
- It defines cyber crimes and penalties. It also establishes mechanisms like the Controller of Certifying Authorities and the Cyber Appellate Tribunal.
- The original Act contained 94 sections across 13 chapters addressing issues like electronic signatures, electronic governance, record retention, and cyber crimes. It also amended other existing laws.
- A major amendment in 2008 introduced sections on offensive online communications and increased surveillance powers for authorities. It also addressed cybercrimes like pornography and cyberterrorism.
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
The document provides an overview of the Information Technology Act 2000 of India. Some key points:
- The IT Act was enacted in 2000, making India one of the first 12 countries to adopt cyber laws. It is based on the UNCITRAL Model Law on e-commerce.
- The objectives of the Act were to provide legal recognition for electronic transactions and facilitate e-governance. It amended several other Indian laws to include electronic records and digital signatures.
- The Act applies to cyber offenses committed in India or involving Indian systems. It defines important terms like electronic records, digital signatures, and secure electronic records using cryptography.
- Digital signatures use public key infrastructure for verification by relying parties
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The Act was enacted in 2000 to provide legal recognition to electronic records and digital signatures. It is based on the UNCITRAL Model Law on E-Commerce.
- The objectives are to facilitate electronic governance and commerce. It defines electronic records, digital signatures, secure systems, etc. and recognizes their legal validity.
- It applies to the whole of India and any offenses committed outside India involving computers in India. Various cybercrimes are punishable under the Act.
- It establishes provisions for public key infrastructure, digital signature certificates, duties of subscribers, and regulates certifying authorities to facilitate
Logs & The Law: What is Admissible in Court?loglogic
What is the role of Log Data in legal cases, such as a database security breach? Learn how logs are used, best legal practices, logs as evidence, and what architecture and solutions can help.
What are the duties of the subscriber of Digital Signature Certificate? [#48]Kamal Thakur
The document discusses the duties of a subscriber with a digital signature certificate. It outlines that the subscriber must generate their own key pair, accept the digital signature certificate by publishing it or demonstrating approval, and take steps to retain control of their private key and prevent unauthorized disclosure. If the private key is ever compromised, the subscriber must immediately notify the Certifying Authority in the manner specified by regulations.
This document outlines rules established by the Government of India regarding Certifying Authorities. It defines key terms related to digital signatures and certifying authorities. It establishes standards for digital signature certificates and outlines requirements for licensing certifying authorities, including minimum capital and net worth. It also specifies rules regarding cross-certification, validity of licenses, suspension of licenses, and renewal of licenses.
This presentation provides an overview of e-governance efforts in India. It defines e-governance as using information and communication technologies to deliver government services, exchange information, and integrate systems between government, citizens, and businesses. The presentation notes that e-governance aims to provide convenient, efficient, and transparent access to government services. It also discusses key provisions of the Information Technology Act, 2000 regarding legal recognition of electronic records and digital signatures, use of electronic records and digital signatures by the government, retention of electronic records, and rules for digital signatures.
The document discusses e-signing of contracts under Indian law. It provides details on the procedure for e-signing using Aadhaar authentication, the legal position which recognizes e-signatures as valid, and relevant provisions from the Information Technology Act that enable e-signatures and establish their validity. E-signed contracts are admissible in court under provisions added to the Indian Evidence Act that give evidentiary value to electronic records and place the onus on proving an electronic signature is incorrect on the challenging party.
The document contains two notifications from the Government of India's Ministry of Information Technology. The first notification announces that the provisions of the Information Technology Act, 2000 will come into force on October 17, 2000. The second notification contains rules regulating Certifying Authorities under the Information Technology Act, including rules around licensing Certifying Authorities, standards for digital signature certificates, application process, fees, cross-certification, and validity and suspension of licenses.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
The document discusses the authentication of electronic evidence in court. It notes that electronic documents and data come in many forms and present new issues for admissibility. It outlines five hurdles for admitting electronic evidence: relevance, authenticity, hearsay, original writing rule, and unfair prejudice. It focuses on authenticating electronic evidence by establishing its source and demonstrating that it has not been altered. Methods discussed include testimony from witnesses with knowledge, forensic experts, hash values, and maintaining a clear chain of custody for electronic data.
The document summarizes key aspects of the Information Technology Act 2000 of India. It defines important terms like digital signature, subscriber, certifying authority. It explains the objectives of the act to facilitate e-commerce and e-governance. It describes digital signature certificates, their classes and responsibilities of subscribers. It also provides an overview of penalties and adjudication processes covered in the act for cyber crimes.
Chapter 06 Information Technology Act 2000Robin Kapoor
This document provides an overview of key sections of the Information Technology Act, 2000 regarding electronic records and digital signatures.
The Act is based on a UNCITRAL model law to facilitate electronic commerce by giving legal recognition to electronic records and digital signatures. Digital signatures use asymmetric cryptography and hash functions to authenticate electronic records.
The Act establishes rules for using digital signatures to authenticate electronic records, defines digital certificates issued by certifying authorities, and provides legal recognition for electronic records, digital signatures, and electronic governance procedures like filing documents electronically. It also covers attribution, acknowledgement and time/place of dispatch and receipt of electronic records.
This document is a research project submitted by Ronak Karanpuria to Prof. S.B.N. Prakash at the National Law School of India University in Bangalore for the subject of E-commerce & IT law in trimester IV of 2013-14. The research project examines the topic of "Electronic Evidence" and addresses its relevance, authenticity, and admissibility in court procedures in the context of the modern digital environment. The document includes sections on the types of electronic evidence, assessing electronic evidence, techno-legal prerequisites for electronic evidence, and the admissibility of electronic evidence. It also briefly discusses cloud computing.
The document summarizes a presentation on patent eligibility under 35 U.S.C. 101 given by Timothy Hadlock on business method patents and recent court decisions. It discusses the Bilski Supreme Court decision, the CyberSource v. Retail Decisions Federal Circuit case, and provides an analysis of the CyberSource case. The CyberSource case found method and computer readable medium claims directed to detecting credit card fraud to be ineligible abstract ideas. The court established new rules that computational methods performed in the human mind are not patent eligible and that merely reciting a computer does not make an abstract idea eligible.
This document summarizes key aspects of the 2008 amendments to India's Information Technology Act, including newly added cybercrimes and strengthened government interception powers. It notes the amendments aim to make the law technology neutral and defines cyber terrorism, adding offenses like identity theft and phishing. The amendments impact corporate India by increasing liability for data breaches and requiring intermediaries to exercise due diligence. The presentation encourages companies to implement cybersecurity practices and conduct a due diligence program to limit legal exposure under the new law.
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...Rohan Nyayadhish
At Digital Task Force, we specialise in mobile data extraction in the form of soft copy / print documents such as SMS, WhatsApp Chats, all kinds of media applications, routing locations for keeping Electronic Evidence's Authenticity intact, retrieving data/information from password/pin code protected phones, non-bootable phones, phones with broken displays, data deleted from the phone's memory drives on basis of condition of the device.
At Digital Task Force, we generate Audio/Video transcripts from Audio/Video/CCTV Footages. Based on our client's requirements and the necessities of a case, we are authorized to provide 65 B Certifications & Hash Value Reports as required by Section 65B of The Indian Evidence Act, 1872 in order to authenticate Electronic Evidence and have it be admissible in court.
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Dr. Prashant Vats
This document outlines amendments made to the Indian Evidence Act of 1872 by the Information Technology Act of 2000 regarding electronic records and digital signatures. Some key points:
- It defines electronic terms like digital signature and includes electronic records in definitions of evidence and documents.
- It allows electronic records and documents produced from computers to be considered admissible as evidence if certain conditions are met regarding the computer system and record keeping.
- It establishes provisions for proving digital signatures and verifying them, including allowing courts to request digital signature certificates from individuals, controllers or certifying authorities.
- It creates presumptions that electronic records of official gazettes, electronic agreements containing digital signatures, and secure digital records and signatures are valid unless proven
This document discusses digital and electronic evidence under Indian law. It begins by defining key terms like electronic record, data, and the legal recognition of electronic records under the Information Technology Act. It then discusses topics like the admissibility of electronic records and computer printouts as evidence, retention of electronic records, email as evidence, and important case laws related to call detail records, CDs/DVDs, IP addresses, and the need for certificates under Section 65B of the Indian Evidence Act. It provides guidance on when a certificate is or is not needed and clarifies that original electronic records need not be preserved.
This document summarizes key amendments made to Indian laws related to cybercrime evidence. It discusses how the Indian Evidence Act and Information Technology Act were amended to address electronic records and digital signatures. Key points covered include: expanding the definition of evidence to include electronic records; new presumptions related to electronic agreements, records, signatures and messages; and amended provisions for the admissibility and authentication of electronic evidence in court. It also summarizes recent amendments increasing penalties for various cybercrimes like identity theft, cyber terrorism and child pornography.
Appreciation of Electronic Evidence-PDFTalwant Singh
The document discusses electronic evidence or e-evidence. It defines e-evidence as any probative information stored or transmitted digitally that may be used in court. It notes that courts must determine if e-evidence is relevant, authentic, and not hearsay, and if the original is required. Common forms of e-evidence include emails, photos, records, documents and files. Indian law has been updated to recognize e-evidence, including provisions for admissibility and authentication of digital records. Courts have accepted various forms of e-evidence in several cases.
This document outlines key aspects of Nepal's Electronic Transactions Act of 2063 (2008).
1. It establishes the legal validity and recognition of electronic records and digital signatures, allowing electronic transactions to have the same legal standing as traditional written documents.
2. Digital signatures created using an asymmetric cryptosystem and hash function will authenticate an electronic record. The public key can then verify the record was signed by the private key holder.
3. The Act provides definitions for important terms related to digital signatures, electronic records, cryptography, and information technology to clarify how they will be applied under the law.
(1) The Electronic Transactions Act was enacted to regulate electronic records and digital signatures by providing them legal validity and recognition.
(2) Key terms like electronic form, electronic record, digital signature, originator, addressee etc. are defined to have the same meaning when used in reference to electronic records as they would have in reference to physical documents.
(3) The act provides for legal recognition of electronic records and digital signatures by establishing them as valid alternatives to physical documents signed using handwritten signatures when prevailing law requires written, printed or signed records.
Gautam 046.pptx on evidence law related to electronic evidenceGautamShaurya
The term 'Electronic Evidence' signifies a piece of evidence generated by some mechanical or electronic processes which is often relevant in proving or disproving a fact or fact at issue, the information that constitutes evidence before the court. Electronic Evidence is commonly known as Digital evidence.
Electronic Evidence is found in all computer and multimedia as well as communication devices. Increasingly most of the business transactions are done in paperless mode but when the disputes arise, then where to look for evidence? This presentation will help you in this field.
1. The document discusses the need for cyber law in India and provides an overview of the key aspects of the Information Technology Act 2000, which was enacted to address this need.
2. It defines important terms related to cyber law like electronic record, digital signature, and explains concepts such as attribution of electronic records and acknowledgement of receipt.
3. It also summarizes provisions of the Act around offenses and penalties for cybercrimes, functions of the Controller of Certifying Authorities, and directions that can be issued to subscribers and certifying authorities.
What are the duties of the subscriber of Digital Signature Certificate? [#48]Kamal Thakur
The document discusses the duties of a subscriber with a digital signature certificate. It outlines that the subscriber must generate their own key pair, accept the digital signature certificate by publishing it or demonstrating approval, and take steps to retain control of their private key and prevent unauthorized disclosure. If the private key is ever compromised, the subscriber must immediately notify the Certifying Authority in the manner specified by regulations.
This document outlines rules established by the Government of India regarding Certifying Authorities. It defines key terms related to digital signatures and certifying authorities. It establishes standards for digital signature certificates and outlines requirements for licensing certifying authorities, including minimum capital and net worth. It also specifies rules regarding cross-certification, validity of licenses, suspension of licenses, and renewal of licenses.
This presentation provides an overview of e-governance efforts in India. It defines e-governance as using information and communication technologies to deliver government services, exchange information, and integrate systems between government, citizens, and businesses. The presentation notes that e-governance aims to provide convenient, efficient, and transparent access to government services. It also discusses key provisions of the Information Technology Act, 2000 regarding legal recognition of electronic records and digital signatures, use of electronic records and digital signatures by the government, retention of electronic records, and rules for digital signatures.
The document discusses e-signing of contracts under Indian law. It provides details on the procedure for e-signing using Aadhaar authentication, the legal position which recognizes e-signatures as valid, and relevant provisions from the Information Technology Act that enable e-signatures and establish their validity. E-signed contracts are admissible in court under provisions added to the Indian Evidence Act that give evidentiary value to electronic records and place the onus on proving an electronic signature is incorrect on the challenging party.
The document contains two notifications from the Government of India's Ministry of Information Technology. The first notification announces that the provisions of the Information Technology Act, 2000 will come into force on October 17, 2000. The second notification contains rules regulating Certifying Authorities under the Information Technology Act, including rules around licensing Certifying Authorities, standards for digital signature certificates, application process, fees, cross-certification, and validity and suspension of licenses.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
The document discusses the authentication of electronic evidence in court. It notes that electronic documents and data come in many forms and present new issues for admissibility. It outlines five hurdles for admitting electronic evidence: relevance, authenticity, hearsay, original writing rule, and unfair prejudice. It focuses on authenticating electronic evidence by establishing its source and demonstrating that it has not been altered. Methods discussed include testimony from witnesses with knowledge, forensic experts, hash values, and maintaining a clear chain of custody for electronic data.
The document summarizes key aspects of the Information Technology Act 2000 of India. It defines important terms like digital signature, subscriber, certifying authority. It explains the objectives of the act to facilitate e-commerce and e-governance. It describes digital signature certificates, their classes and responsibilities of subscribers. It also provides an overview of penalties and adjudication processes covered in the act for cyber crimes.
Chapter 06 Information Technology Act 2000Robin Kapoor
This document provides an overview of key sections of the Information Technology Act, 2000 regarding electronic records and digital signatures.
The Act is based on a UNCITRAL model law to facilitate electronic commerce by giving legal recognition to electronic records and digital signatures. Digital signatures use asymmetric cryptography and hash functions to authenticate electronic records.
The Act establishes rules for using digital signatures to authenticate electronic records, defines digital certificates issued by certifying authorities, and provides legal recognition for electronic records, digital signatures, and electronic governance procedures like filing documents electronically. It also covers attribution, acknowledgement and time/place of dispatch and receipt of electronic records.
This document is a research project submitted by Ronak Karanpuria to Prof. S.B.N. Prakash at the National Law School of India University in Bangalore for the subject of E-commerce & IT law in trimester IV of 2013-14. The research project examines the topic of "Electronic Evidence" and addresses its relevance, authenticity, and admissibility in court procedures in the context of the modern digital environment. The document includes sections on the types of electronic evidence, assessing electronic evidence, techno-legal prerequisites for electronic evidence, and the admissibility of electronic evidence. It also briefly discusses cloud computing.
The document summarizes a presentation on patent eligibility under 35 U.S.C. 101 given by Timothy Hadlock on business method patents and recent court decisions. It discusses the Bilski Supreme Court decision, the CyberSource v. Retail Decisions Federal Circuit case, and provides an analysis of the CyberSource case. The CyberSource case found method and computer readable medium claims directed to detecting credit card fraud to be ineligible abstract ideas. The court established new rules that computational methods performed in the human mind are not patent eligible and that merely reciting a computer does not make an abstract idea eligible.
This document summarizes key aspects of the 2008 amendments to India's Information Technology Act, including newly added cybercrimes and strengthened government interception powers. It notes the amendments aim to make the law technology neutral and defines cyber terrorism, adding offenses like identity theft and phishing. The amendments impact corporate India by increasing liability for data breaches and requiring intermediaries to exercise due diligence. The presentation encourages companies to implement cybersecurity practices and conduct a due diligence program to limit legal exposure under the new law.
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...Rohan Nyayadhish
At Digital Task Force, we specialise in mobile data extraction in the form of soft copy / print documents such as SMS, WhatsApp Chats, all kinds of media applications, routing locations for keeping Electronic Evidence's Authenticity intact, retrieving data/information from password/pin code protected phones, non-bootable phones, phones with broken displays, data deleted from the phone's memory drives on basis of condition of the device.
At Digital Task Force, we generate Audio/Video transcripts from Audio/Video/CCTV Footages. Based on our client's requirements and the necessities of a case, we are authorized to provide 65 B Certifications & Hash Value Reports as required by Section 65B of The Indian Evidence Act, 1872 in order to authenticate Electronic Evidence and have it be admissible in court.
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Dr. Prashant Vats
This document outlines amendments made to the Indian Evidence Act of 1872 by the Information Technology Act of 2000 regarding electronic records and digital signatures. Some key points:
- It defines electronic terms like digital signature and includes electronic records in definitions of evidence and documents.
- It allows electronic records and documents produced from computers to be considered admissible as evidence if certain conditions are met regarding the computer system and record keeping.
- It establishes provisions for proving digital signatures and verifying them, including allowing courts to request digital signature certificates from individuals, controllers or certifying authorities.
- It creates presumptions that electronic records of official gazettes, electronic agreements containing digital signatures, and secure digital records and signatures are valid unless proven
This document discusses digital and electronic evidence under Indian law. It begins by defining key terms like electronic record, data, and the legal recognition of electronic records under the Information Technology Act. It then discusses topics like the admissibility of electronic records and computer printouts as evidence, retention of electronic records, email as evidence, and important case laws related to call detail records, CDs/DVDs, IP addresses, and the need for certificates under Section 65B of the Indian Evidence Act. It provides guidance on when a certificate is or is not needed and clarifies that original electronic records need not be preserved.
This document summarizes key amendments made to Indian laws related to cybercrime evidence. It discusses how the Indian Evidence Act and Information Technology Act were amended to address electronic records and digital signatures. Key points covered include: expanding the definition of evidence to include electronic records; new presumptions related to electronic agreements, records, signatures and messages; and amended provisions for the admissibility and authentication of electronic evidence in court. It also summarizes recent amendments increasing penalties for various cybercrimes like identity theft, cyber terrorism and child pornography.
Appreciation of Electronic Evidence-PDFTalwant Singh
The document discusses electronic evidence or e-evidence. It defines e-evidence as any probative information stored or transmitted digitally that may be used in court. It notes that courts must determine if e-evidence is relevant, authentic, and not hearsay, and if the original is required. Common forms of e-evidence include emails, photos, records, documents and files. Indian law has been updated to recognize e-evidence, including provisions for admissibility and authentication of digital records. Courts have accepted various forms of e-evidence in several cases.
This document outlines key aspects of Nepal's Electronic Transactions Act of 2063 (2008).
1. It establishes the legal validity and recognition of electronic records and digital signatures, allowing electronic transactions to have the same legal standing as traditional written documents.
2. Digital signatures created using an asymmetric cryptosystem and hash function will authenticate an electronic record. The public key can then verify the record was signed by the private key holder.
3. The Act provides definitions for important terms related to digital signatures, electronic records, cryptography, and information technology to clarify how they will be applied under the law.
(1) The Electronic Transactions Act was enacted to regulate electronic records and digital signatures by providing them legal validity and recognition.
(2) Key terms like electronic form, electronic record, digital signature, originator, addressee etc. are defined to have the same meaning when used in reference to electronic records as they would have in reference to physical documents.
(3) The act provides for legal recognition of electronic records and digital signatures by establishing them as valid alternatives to physical documents signed using handwritten signatures when prevailing law requires written, printed or signed records.
Gautam 046.pptx on evidence law related to electronic evidenceGautamShaurya
The term 'Electronic Evidence' signifies a piece of evidence generated by some mechanical or electronic processes which is often relevant in proving or disproving a fact or fact at issue, the information that constitutes evidence before the court. Electronic Evidence is commonly known as Digital evidence.
Electronic Evidence is found in all computer and multimedia as well as communication devices. Increasingly most of the business transactions are done in paperless mode but when the disputes arise, then where to look for evidence? This presentation will help you in this field.
1. The document discusses the need for cyber law in India and provides an overview of the key aspects of the Information Technology Act 2000, which was enacted to address this need.
2. It defines important terms related to cyber law like electronic record, digital signature, and explains concepts such as attribution of electronic records and acknowledgement of receipt.
3. It also summarizes provisions of the Act around offenses and penalties for cybercrimes, functions of the Controller of Certifying Authorities, and directions that can be issued to subscribers and certifying authorities.
Information Technology Act 2000 An OverviewAnubhav
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The Act aims to provide legal recognition for electronic transactions and facilitate e-filing/payments with the government.
- It defines important terms like electronic records, digital signatures, and security procedures. Digital signatures created using asymmetric cryptographic keys can verify electronic records.
- A public key infrastructure (PKI) allows parties without prior agreements to verify each other's identities through digital certificates issued by a certification authority.
- The Act lays out the legal processes for digital signatures to authenticate electronic records in a secure manner similar to physical signatures.
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
The document provides an overview of the Information Technology Act 2000 of India. Some key points:
- The IT Act was enacted in 2000, making India the 12th country to adopt cyber laws, and is based on UNCITRAL model law on e-commerce.
- The Act aims to provide legal recognition for electronic transactions and facilitate e-governance. It defines electronic records and digital signatures.
- A Controller of Certifying Authorities regulates and licenses Certifying Authorities to issue digital signature certificates using public key infrastructure.
- The Act recognizes electronic records and digital signatures as legally valid. It aims to facilitate electronic governance and commerce.
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
The document provides an overview of the Information Technology Act, 2000 of India. Some key points:
- The Act aims to provide legal recognition to electronic records and transactions carried out online. It defines electronic records and digital signatures.
- It establishes a Controller of Certifying Authorities to regulate and license Certifying Authorities to issue digital signature certificates.
- The Act recognizes electronic governance and gives legal validity to electronic records and digital signatures. It aims to facilitate electronic filing of documents.
- It defines offences related to cybercrime and provides penalties and adjudication process for contravention of the Act's provisions. Adjudicating officers are empowered to determine compensation in cases of loss or unfair advantage resulting
The document discusses amendments made to Sections 59 and 65B of the Indian Evidence Act regarding electronic records and electronic evidence.
Section 65B provides that electronic records, if printed or stored on a device, can be considered documents if certain conditions are met. This includes the computer regularly processing information and the electronic record being an accurate reproduction of the information entered.
The document also discusses court cases related to electronic evidence and the need for a certificate under Section 65B to authenticate electronic records in order to admit them as evidence in court proceedings. Failure to provide such a certificate can result in electronic evidence like audio/video recordings being inadmissible.
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
The document provides an overview of the Information Technology Act 2000 in India. It discusses key aspects of the act such as its objectives, definitions, provisions regarding electronic records and digital signatures. It also describes the role of the Controller of Certifying Authorities (CCA) in regulating and licensing Certifying Authorities, setting standards for public key infrastructure and digital signature certification processes. The CCA establishes a hierarchy with the government as the root of trust to help secure electronic communications and transactions through digital signatures certified by licensed Certifying Authorities.
This document discusses key aspects of the Information Technology Act, 2000 in India, including its objectives and provisions related to electronic governance and digital signatures.
Some key points:
- The Act aims to facilitate electronic commerce and give legal recognition to electronic records and digital signatures. It allows for electronic filing of documents with the government.
- Digital signatures work by encrypting a message digest with a private key, and can be verified using the corresponding public key. Digital certificates bind a public key to an individual.
- The Act provides for legal recognition of electronic records, digital signatures, retention of electronic documents, and publication of official notices electronically. It also specifies rules for attribution, acknowledgment and dispatch of electronic records.
The document provides an overview of cyber law in India. It discusses:
1) Cyber law is a vast study that includes many acts like the IT Act, Evidence Act, IPC, and CrPC. Understanding cyber issues like http and https is challenging for lawyers.
2) The IT Act aims to provide legal recognition for electronic transactions and commerce. It has administrative, civil, and criminal provisions to regulate cyber issues.
3) Other laws like the IPC, Evidence Act, and CrPC also apply to cyber crimes in areas like hacking, identity theft, and online fraud. The Evidence Act has provisions for digital evidence admissibility.
4) Investigating cyber crimes is difficult due to the
This section of the Information Technology Act 2000 establishes penalties for unauthorized access to or damage of computer systems. It outlines various offenses including accessing a computer without permission, downloading or copying data without authorization, introducing viruses, damaging systems, disrupting access, assisting unauthorized access, and altering or destroying computer information. Individuals who commit such offenses without permission can be held liable and required to pay damages in compensation to affected persons.
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
The document discusses the appreciation and admissibility of digital evidence under Sri Lankan law. It notes that prior to 1995, there were no provisions for admitting computer evidence. The Evidence (Special Provisions) Act of 1995 was introduced to efficiently and legally manage computer-based evidence in civil and criminal court proceedings. The act defines computers broadly and allows computer-generated evidence to be admitted if it meets certain conditions regarding the computer's operation and the accuracy of information supplied. Several other acts also address digital evidence admission. Digital evidence poses challenges regarding discovery due to its volume, persistence, and multiple storage locations.
The Information Technology Act 2000 provides a legal framework for electronic commerce and digital signatures. It aims to facilitate electronic governance and amend various laws to apply in the digital context. The Act defines cyber crimes and sets penalties for offenses involving unauthorized computer access, cyber attacks, and tampering with digital records. It establishes authorities for issuing digital certificates and adjudicating cyber disputes, while limiting the jurisdiction of regular courts on technology-related matters.
Similar to Information Technology Act, 2000, THE SECOND SCHEDULE : Amendments to the Indian Evidence Act, 1872 (20)
This document contains C code examples for various programming concepts like functions, loops, arrays, structures, unions, file handling etc. There are a total of 30 code snippets showing how to use different data types, control structures and functions in C programming language. The code snippets range from simple Hello World program to more complex examples demonstrating concepts like recursion, structures, file handling etc.
The document discusses 12 financial functions in Microsoft Excel: FV, ACCRINT, COUPDAYBS, CUMIPMT, CUMPRINC, DB, DDB, DISC, DURATION, EFFECT, FVSCHEDULE, and INTRATE. Each function is described, including what it calculates and its syntax and required/optional arguments. Examples are provided for some of the functions.
This document describes several text functions in Excel including joining strings with the & operator, extracting portions of strings with LEFT, RIGHT, MID, and FIND functions, getting the length of a string with LEN, and replacing text within a string using SUBSTITUTE.
The document discusses various lookup functions in Microsoft Excel, including LOOKUP, HLOOKUP, INDEX, MATCH, and CHOOSE. It provides the syntax and purpose of each function. LOOKUP returns a value from a range based on a lookup value. HLOOKUP looks up a value in the top row and returns the value from the same column in a specified row. INDEX returns a value based on row and column numbers. MATCH locates the position of a lookup value. CHOOSE returns a value from a list using a given index position.
This document provides information on using date and time functions in Excel. It describes how to enter dates using "/" or "-" and times using ":" in a cell. Functions like YEAR, MONTH, DAY, NOW, TODAY, HOUR, MINUTE and SECOND are used to extract individual components from dates or times. The DATE and TIME functions allow adding or subtracting specific numbers of years, months, days, hours, minutes and seconds to dates or times.
This document describes 11 statistical and financial functions in Excel including AVERAGE, AVERAGEIF, MEDIAN, MODE, STEDV, MIN, MAX, LARGE, SMALL, FV, and COUNT. These functions allow users to calculate averages, find median, mode, standard deviation, minimum, maximum, future values, and counts of numbers in a dataset. The FV function specifically returns the future value of an investment given periodic payments and interest rate.
Subtotals in Excel allow you to summarize different groups of data in worksheets to make the information easier to understand. You can insert subtotals that use functions like SUM, COUNT, and AVERAGE to total subsets of values and create an outline to display or hide detail groups. To add a subtotal, select the data, click the Subtotal button on the Data tab, and choose a subtotal function.
Mathematical functions in Excel are used to perform arithmetic operations like sum, average, count, max, min. The SUM function adds the values within a cell range. For example, SUM(C1:C3)=15 adds the values in cells C1 through C3. The AVERAGE function calculates the average of a range of cells. COUNT counts the number of cells that contain numbers. Other common functions include ROUND, RAND, MOD, INT, ABS, ARABIC, and CEILING.MATH.
1) The document discusses methods of resolving cybersquatting disputes in India, including policies from international bodies like ICANN and WIPO, as well as national bodies and judicial precedents.
2) It outlines ICANN's Uniform Domain Name Dispute Resolution Policy and WIPO's domain name dispute resolution services. In India, disputes can be resolved through the .IN Dispute Resolution Policy or trademark infringement lawsuits.
3) Key court cases that helped define cybersquatting in India are discussed, such as Rediff Communication v. Cyberbooth and Aroon Purie v. Kautilya Krishan Pandey. The conclusion is that India needs specific cyberlaws to better handle domain name disputes
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An OverviewDr. Prashant Vats
This document discusses meta-tagging and trademark misuse related to meta-tagging under Indian law. It begins by explaining what meta-tags are and how they can be used to manipulate search engine results. It then discusses legal cases where misleading meta-tags containing competitors' trademarks were found to cause initial interest confusion and violate trademark law. The document outlines exceptions for descriptive, comparative and consumer review uses of trademarks in meta-tags that constitute fair use. It concludes that while India recognizes issues with meta-tagging abuse, concrete laws are still needed to properly regulate meta-tags and intellectual property on the internet.
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIADr. Prashant Vats
1) The document discusses methods of resolving cybersquatting disputes in India, including policies from international bodies like ICANN and WIPO, as well as national bodies and judicial precedents.
2) It outlines ICANN's Uniform Domain Name Dispute Resolution Policy and WIPO's domain name dispute resolution services. In India, disputes can be resolved through the .IN Dispute Resolution Policy or trademark infringement lawsuits.
3) Key court cases that helped define cybersquatting in India are discussed, such as Rediff Communication v. Cyberbooth and Aroon Purie v. Kautilya Krishan Pandey. The conclusion is that India needs specific cyberlaws to better deal with cybers
This document provides information about various topics related to computer software and intellectual property rights, including:
- Definitions of property, intellectual property, patents, copyrights, and software patents.
- The classification of intellectual property into industrial property and literary property.
- Criteria for patentability such as novelty, inventive step, and industrial applicability.
- A list of patentable and non-patentable inventions.
- An overview of the patenting process and timelines for protection of different intellectual property rights.
- Discussion of software patents, copyright protections, and differences between patents and copyrights for software.
- Examples of computer-aided inventions and fields that
This document discusses trademark issues related to domain names in the digital era. It begins by explaining how domain names have become important business identifiers online and discusses some of the structure and purpose of domain name systems. It then explains how disputes can arise over domain name ownership between trademark holders operating in different regions. The document outlines the domain name assignment procedure and some available legal remedies for disputes, including the Uniform Domain Name Dispute Resolution Policy (UDRP) established by ICANN. It provides details on the UDRP process and notes that India has its own dispute resolution policy for .IN domain names as well. In conclusion, it states that domain name dispute resolution has proven an effective alternative to litigation for resolving conflicts.
Trade-Related Aspects of Intellectual Property Rights (TRIPS)Dr. Prashant Vats
The TRIPS agreement is an international agreement administered by the WTO that introduced intellectual property law into the multilateral trading system. It requires WTO members to provide minimum standards of protection for copyrights, trademarks, patents, and other intellectual property. TRIPS was negotiated at the end of the Uruguay Round between 1989-1990 and remains the most comprehensive agreement on IP. It has provisions for enforcement and allows for compulsory licensing of medicines under certain conditions. However, many nations have adopted even higher "TRIPS-plus" standards through bilateral agreements.
How to Copyright a Website to Protect It under IPR and copyright actDr. Prashant Vats
- A website is a collection of interconnected web pages located on the same server and maintained by an organization. The content on a website, such as writing, images, and videos, can be copyrighted but not the website structure itself.
- To copyright a website, the content must be original, owned by the applicant, and clearly described. Copyright protection applies automatically when content goes live but registering the copyright provides additional legal protections.
- Parts of a website that cannot be copyrighted include domain names, website layout/design, links to other sites, public domain works, and common symbols/icons. Employees' work is owned by the business but contractors retain ownership unless assigned in a contract.
- To protect a website
The document discusses several international treaties related to intellectual property protection administered by the World Intellectual Property Organization (WIPO). It provides details on the Beijing Treaty on Audiovisual Performances, the Berne Convention for the Protection of Literary and Artistic Works, and the principles and minimum standards of protection established by the Berne Convention. The Berne Convention deals with protecting works and author's rights, establishing the principles of national treatment, automatic protection without formalities, and independence of protection across countries.
The document discusses intellectual property rights (IPR) and copyright issues related to cyberspace. It provides an overview of different types of IPR, including copyright, patents, trademarks, and trade secrets. It then discusses specific copyright challenges in cyberspace, noting that computer programs, databases, and other digital works are now protected under copyright law. However, the internet's borderless nature has made it difficult to enforce copyright and protect works from unauthorized copying. Stronger international cooperation is needed to address these challenges in the digital era.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxOH TEIK BIN
(A Free eBook comprising 3 Sets of Presentation of a selection of Puzzles, Brain Teasers and Thinking Problems to exercise both the mind and the Right and Left Brain. To help keep the mind and brain fit and healthy. Good for both the young and old alike.
Answers are given for all the puzzles and problems.)
With Metta,
Bro. Oh Teik Bin 🙏🤓🤔🥰
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
Brand Guideline of Bashundhara A4 Paper - 2024khabri85
It outlines the basic identity elements such as symbol, logotype, colors, and typefaces. It provides examples of applying the identity to materials like letterhead, business cards, reports, folders, and websites.
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
Information and Communication Technology in EducationMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 2)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐈𝐂𝐓 𝐢𝐧 𝐞𝐝𝐮𝐜𝐚𝐭𝐢𝐨𝐧:
Students will be able to explain the role and impact of Information and Communication Technology (ICT) in education. They will understand how ICT tools, such as computers, the internet, and educational software, enhance learning and teaching processes. By exploring various ICT applications, students will recognize how these technologies facilitate access to information, improve communication, support collaboration, and enable personalized learning experiences.
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐫𝐞𝐥𝐢𝐚𝐛𝐥𝐞 𝐬𝐨𝐮𝐫𝐜𝐞𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭:
-Students will be able to discuss what constitutes reliable sources on the internet. They will learn to identify key characteristics of trustworthy information, such as credibility, accuracy, and authority. By examining different types of online sources, students will develop skills to evaluate the reliability of websites and content, ensuring they can distinguish between reputable information and misinformation.
3. • 1. In section 3,-
• (a) in the definition of "Evidence’, for the words "all
document produced for the inspection of the Court", the
words "all documents including electronic records
produced for the inspection of the Court" shall be
substituted ;
• (b) after the definition of "India, the following shall be
inserted, namely:-
• ‘the expressions "Certifying Authority", digital signature",
"Digital Signature Certificate", "electronic form",
"electronic records", "information", "secure electronic
record", "secure digital signature" and "subscriber’ shall
have the meanings respectively assigned to them in the
Information Technology Act, 2000.
4. • 2. IN section 17, for the words "oral or documentary,"
words "oral or documentary or contained in electronic
form’ shall be substituted.
• 3. After section 22, the following section shall be inserted,
namely:- "22A". When oral admission as to contents of
electronic records are relevant.-
• Oral admission as to contents of electronic records are not
relevant, unless the genuineness of the electronic record
produced is in question".
• 4. In section 34, for the words "Entries in the books of
account", the words "Entries in the books of account,
including those maintained in an electronic form" shall be
substituted.
• 5. In section 35, for the word "record", in both the places
where it occurs, the words "record or an electronic
record" shall be substituted.
5. • 6. For section 39, the following section shall be substituted, namely:-
"39. What evidence to be given when statement forms part of a
conversation, documents, electronic record, book or series of letters or
papers.-When any statement of which evidence is given forms part of
longer statement, or of a conversation or part of an isolated documents,
or is contained in a document which forms part of a book, or is contained
in part of electronic record or of a connected series of letters or papers,
evidence shall be given of so much and no more of the statement,
conversation, document, electronic record, book or series of letters or
papers as the Court considers necessary in that particular case to the full
understanding of the nature and effect of the statement, and of the
circumstances under which it was made."
• 7. After section 47, the following section shall be inserted, namely:-
"47A. Opinion as to digital signature when relevant.- When the court has
to form an opinion as to the digital signature of any person, the opinion
of the Certifying Authority which has issued the digital signature
Certificate is a relevant fact"
• 8. In section 59, for the words "contents of documents "the words"
contents of documents or electronic records" shall be substituted.
• 9. After section 65, the following shall be inserted, namely:- "65A.
Special provisions as to evidence relating to electronic record.-the
contents of electronic records may be proved in accordance with the
provisions of section 65B.
6. 65B. Admissibility of electronic records.
• (1) Notwithstanding anything contained in this Act, any information contained in
an electronic record which is printed on a paper, stored, recorded or copies in
optical or magnetic media produced by a computer (hereinafter referred to as the
computer output) shall be deemed to be also a document, if the conditions
mentioned in this section are satisfied in relation to the information and computer
in question and shall be admissible in any proceedings, without further proof or
production of the original, as evidence of any contents of the original or of any fact
stated therein of which direct evidence would be admissible.
• (2) The conditions referred to in sub-section (1) in respect of a computer output
shall be the following, namely:-
• (a) the computer output containing the information was produced by the
computer during the period over which the computer was used regularly to store
or process information for the purposes of any activities regularly carried on over
that period by the person having lawful control over the use of the computer;
• (b) during the said period, information of the kind contained in the electronic
record or of the kind from which the information so contained is derived was
regularly fed into the computer in the ordinary course of the said activities;
• (c) throughout the material part of the said period, the computer was operating
properly or, if not; then in respect of any period in which it was not operating
properly or was out of operation during that part of the period, was not such as to
affect the electronic record or the accuracy of its contents;
• (d) the information contained in the electronic record reproduces or is derived
from such information fed into the computer in the ordinary course of the said
activities.
7. 65B. Admissibility of electronic records.
• (3) Where over any period, the function of storing or processing information for
the purposes of any activities regularly carried on over that the period as
mentioned in clause (a) of sub-section (2) was regularly performed by computers,
whether-
• (a) by a combination of computers operating over that period; or
• (b) by different computer operating in succession over that period; or
• (c) by different combinations of computers operating in succession over that
period; or
• (d) in any other manner involving the successive operation over that period, in
whatever order, of one or more computers and one or more combinations of
computers, all the computers used for that purpose during that period shall be
treated for the purposes of this section as constituting single computer, and
references in this section to a computer shall be construed accordingly.
• (4) In any proceedings where it is desired to give a statement in evidence by
virtue of this section, a certificate doing any of the following things, that is to say-
• (a) identifying the electronic record containing the statement and describing the
manner in which it was produced;
• (b) giving such particulars of any device involved in the production of that
electronic record as may be appropriate for the purpose of showing that the
electronic record was produced by a computer;
• (c) dealing with any of the matters to which the conditions mentioned in sub-
section (2) relate, and purporting to be signed by a person occupying a
responsible official position in relation to the operation of the relevant device or
the management of the relevant activities (whichever is appropriate) shall be
evidence of any matter sufficient for a matter to be stated to the best of
knowledge and belief of the person stating it.
8. 65B. Admissibility of electronic records.
• (5) For the purposes of this section,-
• (a) information shall be taken to be supplied to a computer if it is
supplied thereto in any appropriate form and whether it is so supplied
directly or (with or without intervention) by means of any appropriate
equipment;
• (b) whether in the course of activities carried on by any official,
information is supplied with a view to its being stored or processed for
the purposes of those activities by a computer operated otherwise than
in the course of those activities, that information, in duly supplied to
that computer shall be taken to be supplied to it those activities;
• (c) a computer output shall be taken to have been produced by a
computer whether it was produced by it directly or (with or without
human intervention) by means of any appropriate equipment.
• Explanation.- For the purposes of this section any reference to
information being derived from other information shall be a reference to
its being derived there from by calculation, comparison or any other
process;
9. • 10. After section 67, the following section shall be inserted ,
namely:- "67. Proof as to digital signature.- Except in the case of a
secure digital signature, if the digital signature of any subscriber is
alleged to have been affixed to an electronic record the fact that
such digital signature is the digital signature of the subscriber
must be proved.’
• 11. After section 73, the following section shall be inserted,
namely:- "73A. Proof as to verification of digital signature.-In
order to ascertain whether a digital signature is that of the person
by whom it purports to have been affixed, the Court may direct-
• (a) that person or the Controller or the Certifying Authority to
produce the Digital Signature Certificate;
• (b) any other person to apply the public key listed in the Digital
Signature Certificate and verify the digital signature purported to
have been affixed by that person."
• Explanation .- For the purposes of this section, "Controller" means
the Controller appointed under sub-section (1) of section 17 of the
Information Technology Act, 2000."
10. • 12. After section 81, the following section shall be
inserted, namely:- "81A. Presumption as to Gazettes in
electronic forms.-The Court shall presume the
genuineness of every electronic record purporting to be
the Official Gazette, or purporting to be electronic record
directed by any law to be kept by person, if such
electronic record is kept substantially in the form required
by law and is produced from proper custody."
• 13. After section 85, the following sections shall be
inserted, namely:- "85A. Presumption as to electronic
agreements.- The court shall presume that every
electronic record purporting to be an agreement
containing the digital signatures of the parties was so
concluded by affixing the digital signature of the parties.
11. 85B. Presumption as to electronic
records and digital signatures.
• (1) IN any proceedings involving a secure digital
signature, the Court shall presume unless the
contrary is proved that-
• (a) the secure digital signature is affixed by
subscriber with the intention of signing or
approving the electronic record;
• (b) except in the case of a secure electronic
record or a secure digital signature, nothing in
this section shall create any presumption
relating to authenticity and integrity of the
electronic record or any digital signature.
12. 85C. Presumption as to Digital
Signature Certificates.-
• The Court shall presume, unless contrary is
proved, that the information listed in a
Digital Signature Certificate is correct, except
for information specified as subscriber
information which has not been verified, if
the certificate was accepted by the
subscriber."
13. • 14. After section 88, the following section shall be
inserted, namely:- "88A. Presumption as to electronic
messages.- The Court may presume that b electronic
message forwarded by the originator through an
electronic mail server to the addresses to whom the
message purports to be addressed corresponds with the
message as fed into his computer for transmission; but the
Court shall not make any presumption as to the person by
whom such message was sent."
• Explanation.- for the purposes of this section, the
expression "addressee’ and "originator" shall have the
same meanings respectively assigned to them in clauses
(b) and (za) of sub-section (1) of section 2 of the
information Technology Act, 2000."
14. • 15. After section 90, the following section shall be inserted, namely:-
"90 A. . Presumption as to electronic records five years old.-where
any electronic record, purporting or proved to be five years old, is
produced from any custody which the court in the particular case
considers proper, the Court may presume that the digital signature
which purports to be the digital signature of any particular person
was so affixed by him or any person authorized by him this behalf.
• Explanation.- Electronic records are said to be in proper custody if
they are in the place in which, and under the care of the person with
whom, they naturally be; but no custody is improper if it is proved to
have had a legitimate origin, or the circumstances of the particular
case are such as to render such and origin probable.
• 16. For section 131 the following section shall be substituted,
namely:- 131. Production of documents or electronic records which
another person, having possession, could refuse to produce.- No one
shall be compelled to produce documents in his possession or
electronic records under his control, which any other person would
be entitled to refuse to produce if they were in his possessions or
control, unless such last-mentioned person consents to their
production."