SlideShare a Scribd company logo
The Information Technology Act,
2000
and
The Information Technology
(amendment) Act, 2008
A Comparative analysis
By Prashanth Gowda.B.S
Birth of Cyber Laws
• The United Nations General Assembly have
adopted the Model Law on Electronic Commerce on
30th January 1997.
• It is referred to as the “UNCITRAL Model Law on
E-Commerce”.
Birth of Cyber Laws
• India passed the Information Technology Act,
2000 on 17th October, 2000.
• Amended on 27th October 2009.
Amended Act is known as -
The Information Technology (amendment) Act,
2008.
Also amended
Indian
Penal
Code
Indian
Eviden
ce Act
Banker
s'
Books
Eviden
ce Act
Electronic authentication
• The IT Act, 2000
specified “digital
signatures” as the means
of electronic
authentication.
• This approach was not a
technology neutral
approach and the law was
bound by a specific
technology.
Electronic authentication
• The IT Act, 2008 introduces the concept of
“electronic signatures” in addition to digital
signatures.
• Electronic signatures is the wider term covering
digital signatures, biometric authentication, etc.
• It has a technology neutral approach and not
bound by any specific technology.
Types of electronic signatures
• Passwords, personal
identification numbers
(PINs)
i.e. based on the
knowledge of the user.
Types of electronic signatures
• Biometric
authentication -
i.e. method based on the
physical features or
personal trait of the user
Types of electronic signatures
• Scanned handwritten
signatures.
• Signature by means of
a digital pen.
• “OK” or “I accept”
boxes.
• Secure Sockets Layer
(SSL) certificates.
Civil Provisions
• Section 43 - Unauthorised Access
– U/ the IT Act, 2008 no limit on
amount of compensation for
offences under Section 43
– U/ the IT Act , 2000 it was Rs. 1
Crore
Section 43
If any person
without
permission of
the owner or
incharge of a
computer -
Accesses
or secures
access to a
computer
Downloa
ds, copies
or
extracts
data
Introduce
s
computer
contamin
ant or
virus
Damages
computer
Disrupts
computer
or
network
Provides
assistance
to facilitate
illegal
access
Charges the
services availed
of by a person
to the account
of another
person
Civil Provisions
• Section 43(A) – new
provision
– Corporate bodies handling
sensitive personal
information in a computer
resource are under an
obligation to ensure
adoption of reasonable
security practices to
maintain its secrecy.
Civil Provisions
– Even mobile companies to respect privacy of
customers u/ Sec. 43(A).(Rutuja Tawade v/s
Vodafone)
– Nadeem Kashmiri’s case (credit card fraud)
– Liability on call centers, BPOs
Adjudication of Civil offences
– Under the IT Act, 2008 the “Adjudicating Officers” to try cases
where the claim is upto Rs. 5 crore.
– Above that the case will have to be filed before the “Civil
Courts”.
– Under the IT Act, 2000 civil courts did not have jurisdiction to
try civil suits.
Criminal Provisions
Section 66
• Provision has been significantly changed.
• Under IT Act, 2008 all the acts referred under
section 43, are also covered u/Sec. 66 if they are
done “dishonestly” or “fraudulently”.
• Many cybercrimes on which there were no express
provisions made in the IT Act, 2000 are now
included in the IT Act, 2008.
Section 66(A)
• Sending of offensive or false
messages - new provision
– Also known as “Cyber
Stalking”
– Covers sending of menacing,
offensive or false messages via
SMS/EMAIL/MMS
– Punishment – imprisonment
upto 3 years and fine
Section 66(B)
• Dishonestly receiving stolen
computer resource or
communication device - new
provision
– Also covers use of stolen
Computers, mobile phones,
SIM Cards, etc
– Punishment – imprisonment
upto 3 years or fine upto Rs. 1
lakh or both
Section 66(C)
• Identity theft - new provision
– Fraudulently or dishonestly
using someone else’s electronic
signature, password or any
other unique identification
feature
– Punishment - imprisonment
upto 3 years and fine upto Rs. 1
lakh
Section 66(D)
• Cheating by personation - new provision
– Cheating by pretending to be some other person
– Punishment – imprisonment upto 3 years and fine upto Rs.
1 lakh
Section 66(E)
• Violation of privacy - new provision
– Popularly known as Voyeurism
– Pune spy cam incident where a 58-year old man was
arrested for installing spy cameras in his house to
‘snoop’ on his young lady tenants
– Covers acts like hiding cameras in changing rooms,
hotel rooms, etc
– Punishment –imprisonment upto 3 years or fine upto
Rs. 2 lakh or both
Section 66(F)
• Cyber terrorism - new provision
– Whoever uses cyberspace with
intent to threaten the unity,
integrity, security or sovereignty
of India or to strike terror in the
people
– Punishment - Imprisonment
which may extent to life
imprisonment
Preservation of information by
intermediaries
• Section 67(C) – new provision
– Intermediary shall preserve and retain such
information as may be specified for such
duration and in such manner and format as
the Central Government may prescribe.
Government’s power to intercept
• Section 69 – new provision
– Government to intercept, monitor or decrypt any
information generated through any computer resource if it
thinks to do so in the interest of the sovereignty or integrity
of India.
Government’s power to intercept
– Punishment for refusing to hand over
passwords to an authorized official of the
Central or State Government
– Punishment – imprisonment upto 7 years and
fine
Liability of Intermediary not to
disclose any personal information
• Section 72(A) - new provision
– Intermediary to act as per the terms of its lawful contract
and not beyond it.
– Punishment – imprisonment upto 3 years or fine upto 5
lakh or both
Liability of Intermediary
• Section 79
– An intermediary not to be liable for any third
party information, data, or communication link
made available or hosted by him.
Liability of Intermediary
• Intermediary need to prove that he didn’t –
– Initiate the transmission,
– Select the receiver of the transmission, and
– Select or modify the information contained in the
transmission and
– The intermediary observes due diligence while
discharging his duties under the Act.
Abetment
• Section 84(B) – new provision
– Abetting to commit an offence is punishable
– Punishment – Same punishment provided for the
offence under the Act
Attempt
• Section 84(C) – new provision
– Attempt to commit an offence is punishable
– Punishment – Imprisonment which may extend
to one-half of the longest term of imprisonment
provided for that offence
Investigation Powers
• Section 78 – new provision
– As per the IT Act, 2008 Cyber crime cases can be
investigated by the “Inspector” rank police
officers.
– U/ the IT Act, 2000 such powers were with the
“DYSP/ACP”.
Compounding of Offences
• Section 77 (A) – new provision
– Compounding – “Out of court settlement”
– Offences
“for which less than three years imprisonment
has been provided”
can be compounded.
Compounding of Offences
– Such offence should not affect the socio
economic conditions of the country or
– has been committed against a child below the age
of 18 years or a woman.
Electronic Contracts
Halifax May 10, 2006Electronic Contracts - NJI 34
Overview
 Law generally has no form rule for contracts
 Law of contracts is media-neutral
 Question of enforceability comes down to a
question of the presence of consent, proof
of consent, validity of consent:
– These are traditional, basic contract concepts
• Legislation has supported these conclusions
• Consider examples
Halifax May 10, 2006 Electronic Contracts - NJI 35
Legislation
• United Nations – Canada and US (etc)
– All jurisdictions in Canada have something (exc NWT)
– MB’s key parts not in force – so does it matter?
– Application is subject to some exceptions
• General principle: non-discrimination
• Writing, signature, original, record-retention rules
• Consent to use is key security feature
• Legal standard vs prudent standard
• E-records do not have to be more reliable than paper
Halifax May 10, 2006 Electronic Contracts - NJI 36
Legislation
• “Functional equivalents”:
– Writing: “accessible so as to be usable for subsequent
reference”
• Accessible to whom: techie or newbie? “subsequent?”
• Not necessarily looking like print e.g. voice recognition
– Provision: “capable of being retained” (Ont. exception)
– Originals: “reliable assurance of integrity”
– Signature: “information in electronic form that a person
has created or adopted in order to sign a document and
that is in, attached to or associated with the document”
Halifax May 10, 2006 Electronic Contracts - NJI 37
Legislation
• Contract rules
– Electronic form does not prevent validity
– Contracts may be formed by clicking on icons, touching
screens, talking to a computer, etc
– Contracts may be made in dealing with “electronic agents”
i.e. software robots
– Mistakes in dealing with electronic agents may be
corrected if program does not allow verification of contract
before completion
– Time and place rules, but no mailbox rule
– Current issue: presumed receipt in the face of spam and
virus filters
Halifax May 10, 2006 Electronic Contracts - NJI 38
Forms of consent
• Shrinkwrap: terms (of licence) inside box, notice outside
– Systemshops v King in Canada (1980s case)
– Zeidenberg v ProCD in US
• Click-through/clickwrap: terms are shown, buyer clicks “I
agree” or “OK”
– Rudder v Microsoft - an easier case than shrink-wrap
• Consider examples from web
• Some limits: Zhu v. Merrill Lynch, Robet v Versus Brokerage
Services: experts knew web messages were not always
reliable, duty to check before acting on them.
– Note: these were cases about one-on-one messages, NOT someone
dealing with an impersonal web site, as are almost all of the others.
Halifax May 10, 2006 Electronic Contracts - NJI 39
Forms of consent
• “Browsewrap”: implied consent from mere use of or
access to web site
• Ticket cases etc as parallel in paper world
• Questions go to notice of terms, accessibility of
terms, and fairness
• Consider examples (inc. Zhu v Merrill Lynch)
• Enforcement has largely been where people are
doing something prohibited by terms that they
should have know was bad anyway, e.g.
– Canada: CREA v. Sutton
– US: Ticketmaster, Register.com, Cairo
Halifax May 10, 2006 Electronic Contracts - NJI 40
Forms of consent
• Unilateral Modification: implied or express consent
• Right to change is widely claimed in web terms
• Economic model understandable – adhesion
contracts
• Rogers v Kanitz – high-water mark (trial court only)
– “that’s how business is done on the Net”
• Aspencer1 v Paysystems
– Not so fast – at least in Quebec (with doubtful dicta)
• Consumer Protection Act, 2002 (Ontario)
– Reverses Kanitz on arbitration and class actions, i.e. not in
general about modifications
Halifax May 10, 2006 Electronic Contracts - NJI 41
Authentication
• of consent
– herein of signatures (very briefly)
• form and intent
– Singapore: e-mail headers as signatures (lease)
– England: e-mail headers as not signatures (guarantee)
• of parties
– reliability of attribution – question of proof
– seldom litigated – but in age of identity theft?
• of text
– how does the signer know what he/she is signing?
Halifax May 10, 2006 Electronic Contracts - NJI 42
Jurisdiction
• General principles and tests
– Interactivity, targeting, etc
• Rudder – click-through choice of forum upheld
• Specht – obscure choice of forum and process denied
• May involve choice of law, choice of forum
• Consumers - special rules
– Quebec Civil Code
– Uniform Law policy
– EU policies – Rome treaties
• Hague Convention on Choice of Court (2005)
Halifax May 10, 2006 Electronic Contracts - NJI 43
Substance of contract
• Unconscionability defences are media- neutral
• Some applications in the cases:
– arbitration clauses
– class action clauses (overlaps with preceding, not the same)
– some special rules e.g. Quebec in Dell (to SCC)
– jurisdiction – choice of lax/business-friendly/inaccessible places?
• French cases as examples of analysis - AOL.FR and its progeny
(at least 4 French ISPs have suffered the same fate now)
– “standard” North American clauses held illegal, unconscionable
Halifax May 10, 2006 Electronic Contracts - NJI 44
Open questions
• Errors in contracts – facts of Dell, etc
• Attempts to protect other interests
– Notably intersection with copyright
• Digital rights management, technical protection measures
• No reverse engineering
• Licences vs sales (“the age of access” but “access to knowledge”)
• Illegal contracts: e.g. gaming, etc - use of
intermediaries to block or enforce (e.g. role of credit
card companies, PayPal etc)
– Civil and criminal processes may overlap
Halifax May 10, 2006 Electronic Contracts - NJI 45
Other legal principles may apply
• The usual contract rules apply, e.g.:
– meeting of minds
– certainty of object
– consideration
– AND contracts as to form (legislation does not cure them)
• The usual contracting legislation applies, e.g.:
– Consumer Protection Act
– Internet Sales Harmonization template (as adopted)
• Other legislation may apply, as to form or content
– UECA yields to contrary intention
Halifax May 10, 2006 Electronic Contracts - NJI 46
Internet Sales Harmonization Template
• The template was adopted by the FPT
Consumer Measures Committee in 2001.
• It is in force in several provinces.
• Its main terms:
• Mandatory disclosure of information (& timing rules)
– seller’s identity, location, applicable law
– description of product, price, terms, remedies
• Receipts needed
• Cancellation rights for non-disclosure, non-delivery
Halifax May 10, 2006 Electronic Contracts - NJI 47
Conclusion
• “What’s old is new again” in the
electronic age
–Was there a meeting of the minds?
–Was the transaction affirmed by the
user/consumer?
–Was the transaction fair?
–AND questions of form, questions of proof
Digital Signature
•is a type of asymmetric cryptography used to simulate the security
properties of a signature in digital, rather than written, form. Digital
signature schemes normally give two algorithms, one for signing which
involves the user's secret or private key, and one for verifying signatures
which involves the user's public key. The output of the signature process
is called the "digital signature.“
•is an electronic signature that can be used to authenticate the identity
of the sender of a message or the signer of a document, and possibly to
ensure that the original content of the message or document that has
been sent is unchanged. Digital signatures are easily transportable,
cannot be imitated by someone else, and can be automatically time-
stamped. The ability to ensure that the original signed message arrived
means that the sender cannot easily repudiate it later.
What is a digital signature?
How it works
• The use of digital signatures usually involves two processes,
one performed by the signer and the other by the receiver of
the digital signature:
• Digital signature creation uses a hash result derived from and
unique to both the signed message and a given private key.
For the hash result to be secure, there must be only a
negligible possibility that the same digital signature could be
created by the combination of any other message or private
key.
• Digital signature verification is the process of checking the
digital signature by reference to the original message and a
given public key, thereby determining whether the digital
signature was created for that same message using the
private key that corresponds to the referenced public key.
Example
• Assume you were going to send the draft of a contract to your lawyer in
another town. You want to give your lawyer the assurance that it was
unchanged from what you sent and that it is really from you.
1. You copy-and-paste the contract (it's a short one!) into an e-mail note.
2. Using special software, you obtain a message hash (mathematical
summary) of the contract.
3. You then use a private key that you have previously obtained from a
public-private key authority to encrypt the hash.
4. The encrypted hash becomes your digital signature of the message. (Note
that it will be different each time you send a message.)
• At the other end, your lawyer receives the message.
1. To make sure it's intact and from you, your lawyer makes a hash of the
received message.
2. Your lawyer then uses your public key to decrypt the message hash or
summary.
3. If the hashes match, the received message is valid.
Benefits of digital signatures
These are common reasons for applying a digital signature to communications:
• Authentication
Although messages may often include information about the entity sending a
message, that information may not be accurate. Digital signatures can be used to
authenticate the source of messages. When ownership of a digital signature secret
key is bound to a specific user, a valid signature shows that the message was sent
by that user. The importance of high confidence in sender authenticity is especially
obvious in a financial context. For example, suppose a bank's branch office sends
instructions to the central office requesting a change in the balance of an account.
If the central office is not convinced that such a message is truly sent from an
authorized source, acting on such a request could be a grave mistake.
• Integrity
In many scenarios, the sender and receiver of a message may have a need for
confidence that the message has not been altered during transmission. Although
encryption hides the contents of a message, it may be possible to change an
encrypted message without understanding it. (Some encryption algorithms, known
as nonmalleable ones, prevent this, but others do not.) However, if a message is
digitally signed, any change in the message will invalidate the signature.
Furthermore, there is no efficient way to modify a message and its signature to
produce a new message with a valid signature, because this is still considered to
be computationally infeasible by most cryptographic hash functions.
Drawbacks of digital signatures
Despite their usefulness, digital signatures do not alone solve all the
problems we might wish them to.
Non-repudiation
In a cryptographic context, the word repudiation refers to the act of
disclaiming responsibility for a message. A message's recipient may
insist the sender attach a signature in order to make later repudiation
more difficult, since the recipient can show the signed message to a
third party (eg, a court) to reinforce a claim as to its signatories and
integrity. However, loss of control over a user's private key will mean
that all digital signatures using that key, and so ostensibly 'from' that
user, are suspect. Nonetheless, a user cannot repudiate a signed
message without repudiating their signature key.
Main Questions?
1. In the digital signature who use the private key and who
use the public key?
2. What are the benefits of digital signatures?
Email: sr@asianlaws.org

More Related Content

What's hot

Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
sujithsunil
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
Naveen Kumar C
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
Ms. Parasmani Jangid
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Dr. Prashant Vats
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
Nanda Mohan Shenoy
 
IPR – An Overview, Copyright Issues in Cyberspace
IPR – An Overview, Copyright Issues in Cyberspace IPR – An Overview, Copyright Issues in Cyberspace
IPR – An Overview, Copyright Issues in Cyberspace
Dr. Prashant Vats
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
Talwant Singh
 
It act 2000
It act 2000It act 2000
It act 2000
Jaipal Dhobale
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
Nitya Nand Pandey
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
Karnika Seth
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
Sreelekshmi Mohan
 

What's hot (20)

Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
it act 2000
it act 2000it act 2000
it act 2000
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
IPR – An Overview, Copyright Issues in Cyberspace
IPR – An Overview, Copyright Issues in Cyberspace IPR – An Overview, Copyright Issues in Cyberspace
IPR – An Overview, Copyright Issues in Cyberspace
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
It act 2000
It act 2000It act 2000
It act 2000
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 

Viewers also liked

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
Neeraj Aarora
 
Cyber crime in details with sections and clause
Cyber crime in details with sections and clauseCyber crime in details with sections and clause
Cyber crime in details with sections and clause
Avinash Tegginmani
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
Chintan Pathak
 
Misra, D.C. (2009) An E Governance Vision For India By 2020 Gvmitm 23.5.09
Misra, D.C. (2009)  An E Governance Vision For India By 2020 Gvmitm 23.5.09Misra, D.C. (2009)  An E Governance Vision For India By 2020 Gvmitm 23.5.09
Misra, D.C. (2009) An E Governance Vision For India By 2020 Gvmitm 23.5.09
Dr D.C. Misra
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Netiquette
NetiquetteNetiquette
Netiquette
sara ibrahim
 
Cyber law ipc
Cyber law ipcCyber law ipc
Cyber law ipc
prabhatjon
 
Introduction 2017
Introduction 2017Introduction 2017
Introduction 2017
Juan M. Irache
 
Information technology act
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
Gopal Choudhary
 
Role of E-Governance In Bharat Nirman
Role of E-Governance In Bharat NirmanRole of E-Governance In Bharat Nirman
Role of E-Governance In Bharat NirmanShravan Bhumkar
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush Agrawal
Ankush Agrawal
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
mayur_ceh
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Digital Citizenship & Netiquette
Digital Citizenship & NetiquetteDigital Citizenship & Netiquette
Digital Citizenship & Netiquette
Steve Katz
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
Guerillateaching netiquette
Guerillateaching netiquetteGuerillateaching netiquette
Guerillateaching netiquette
Guerillateacher
 
Role of ICT in Good Governance
Role of ICT in Good GovernanceRole of ICT in Good Governance
Role of ICT in Good Governance
Amit Tyagi
 

Viewers also liked (20)

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 
Cyber crime in details with sections and clause
Cyber crime in details with sections and clauseCyber crime in details with sections and clause
Cyber crime in details with sections and clause
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
Misra, D.C. (2009) An E Governance Vision For India By 2020 Gvmitm 23.5.09
Misra, D.C. (2009)  An E Governance Vision For India By 2020 Gvmitm 23.5.09Misra, D.C. (2009)  An E Governance Vision For India By 2020 Gvmitm 23.5.09
Misra, D.C. (2009) An E Governance Vision For India By 2020 Gvmitm 23.5.09
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Cyber law ipc
Cyber law ipcCyber law ipc
Cyber law ipc
 
Introduction 2017
Introduction 2017Introduction 2017
Introduction 2017
 
Information technology act
Information technology actInformation technology act
Information technology act
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
Role of E-Governance In Bharat Nirman
Role of E-Governance In Bharat NirmanRole of E-Governance In Bharat Nirman
Role of E-Governance In Bharat Nirman
 
Netiquette by Ankush Agrawal
Netiquette by Ankush AgrawalNetiquette by Ankush Agrawal
Netiquette by Ankush Agrawal
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Digital Citizenship & Netiquette
Digital Citizenship & NetiquetteDigital Citizenship & Netiquette
Digital Citizenship & Netiquette
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Guerillateaching netiquette
Guerillateaching netiquetteGuerillateaching netiquette
Guerillateaching netiquette
 
Role of ICT in Good Governance
Role of ICT in Good GovernanceRole of ICT in Good Governance
Role of ICT in Good Governance
 

Similar to it act

CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
JulainaMehraj
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
sheryl90
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
Karnika Seth
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
utkarshjani
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
Anil Yadav
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
Anil Yadav
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
Jahid Khan Rahat
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
Gautam GR
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
Himanshu Jawa
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
kinjal vaghela
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptx
AnimeshTripathi33
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Shankey Gupta
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 
Regulatory Framework of E-Commerce
Regulatory Framework of E-CommerceRegulatory Framework of E-Commerce
Regulatory Framework of E-Commerce
Mamta Bhola
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
Nargis Parveen
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
Dr. Prashant Vats
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
Matt Siltala
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Sanjith261
 
Cyber
CyberCyber

Similar to it act (20)

CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptx
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
Regulatory Framework of E-Commerce
Regulatory Framework of E-CommerceRegulatory Framework of E-Commerce
Regulatory Framework of E-Commerce
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Cyber
CyberCyber
Cyber
 

More from 9535814851

Wireless application prorocol
Wireless application prorocolWireless application prorocol
Wireless application prorocol
9535814851
 
it grc
it grc it grc
it grc
9535814851
 
information system and computers
information system and computersinformation system and computers
information system and computers
9535814851
 
Information technology govenance
Information technology govenanceInformation technology govenance
Information technology govenance
9535814851
 
information system and computers
information system and computersinformation system and computers
information system and computers
9535814851
 
human resource information system
human resource information system human resource information system
human resource information system
9535814851
 
information system and computers
information system and computersinformation system and computers
information system and computers
9535814851
 
Software development life cycle copy
Software development life cycle   copySoftware development life cycle   copy
Software development life cycle copy
9535814851
 
Database management system
Database management system   Database management system
Database management system
9535814851
 
information system and computers
information system and computersinformation system and computers
information system and computers
9535814851
 
information system and computers
information system and computers information system and computers
information system and computers
9535814851
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
9535814851
 
Information system
Information systemInformation system
Information system
9535814851
 
Mc card new product launch
Mc card new product launchMc card new product launch
Mc card new product launch
9535814851
 
marketing information system
 marketing information system marketing information system
marketing information system
9535814851
 
information system and computers
information system and computersinformation system and computers
information system and computers
9535814851
 
2007 mcom mis module 1.0
2007 mcom mis module 1.02007 mcom mis module 1.0
2007 mcom mis module 1.0
9535814851
 

More from 9535814851 (17)

Wireless application prorocol
Wireless application prorocolWireless application prorocol
Wireless application prorocol
 
it grc
it grc it grc
it grc
 
information system and computers
information system and computersinformation system and computers
information system and computers
 
Information technology govenance
Information technology govenanceInformation technology govenance
Information technology govenance
 
information system and computers
information system and computersinformation system and computers
information system and computers
 
human resource information system
human resource information system human resource information system
human resource information system
 
information system and computers
information system and computersinformation system and computers
information system and computers
 
Software development life cycle copy
Software development life cycle   copySoftware development life cycle   copy
Software development life cycle copy
 
Database management system
Database management system   Database management system
Database management system
 
information system and computers
information system and computersinformation system and computers
information system and computers
 
information system and computers
information system and computers information system and computers
information system and computers
 
Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2Health insurance portability and act(hipaa)2
Health insurance portability and act(hipaa)2
 
Information system
Information systemInformation system
Information system
 
Mc card new product launch
Mc card new product launchMc card new product launch
Mc card new product launch
 
marketing information system
 marketing information system marketing information system
marketing information system
 
information system and computers
information system and computersinformation system and computers
information system and computers
 
2007 mcom mis module 1.0
2007 mcom mis module 1.02007 mcom mis module 1.0
2007 mcom mis module 1.0
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 

it act

  • 1. The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By Prashanth Gowda.B.S
  • 2. Birth of Cyber Laws • The United Nations General Assembly have adopted the Model Law on Electronic Commerce on 30th January 1997. • It is referred to as the “UNCITRAL Model Law on E-Commerce”.
  • 3. Birth of Cyber Laws • India passed the Information Technology Act, 2000 on 17th October, 2000. • Amended on 27th October 2009. Amended Act is known as - The Information Technology (amendment) Act, 2008.
  • 5. Electronic authentication • The IT Act, 2000 specified “digital signatures” as the means of electronic authentication. • This approach was not a technology neutral approach and the law was bound by a specific technology.
  • 6. Electronic authentication • The IT Act, 2008 introduces the concept of “electronic signatures” in addition to digital signatures. • Electronic signatures is the wider term covering digital signatures, biometric authentication, etc. • It has a technology neutral approach and not bound by any specific technology.
  • 7. Types of electronic signatures • Passwords, personal identification numbers (PINs) i.e. based on the knowledge of the user.
  • 8. Types of electronic signatures • Biometric authentication - i.e. method based on the physical features or personal trait of the user
  • 9. Types of electronic signatures • Scanned handwritten signatures. • Signature by means of a digital pen. • “OK” or “I accept” boxes. • Secure Sockets Layer (SSL) certificates.
  • 10. Civil Provisions • Section 43 - Unauthorised Access – U/ the IT Act, 2008 no limit on amount of compensation for offences under Section 43 – U/ the IT Act , 2000 it was Rs. 1 Crore
  • 11. Section 43 If any person without permission of the owner or incharge of a computer - Accesses or secures access to a computer Downloa ds, copies or extracts data Introduce s computer contamin ant or virus Damages computer Disrupts computer or network Provides assistance to facilitate illegal access Charges the services availed of by a person to the account of another person
  • 12. Civil Provisions • Section 43(A) – new provision – Corporate bodies handling sensitive personal information in a computer resource are under an obligation to ensure adoption of reasonable security practices to maintain its secrecy.
  • 13. Civil Provisions – Even mobile companies to respect privacy of customers u/ Sec. 43(A).(Rutuja Tawade v/s Vodafone) – Nadeem Kashmiri’s case (credit card fraud) – Liability on call centers, BPOs
  • 14. Adjudication of Civil offences – Under the IT Act, 2008 the “Adjudicating Officers” to try cases where the claim is upto Rs. 5 crore. – Above that the case will have to be filed before the “Civil Courts”. – Under the IT Act, 2000 civil courts did not have jurisdiction to try civil suits.
  • 15. Criminal Provisions Section 66 • Provision has been significantly changed. • Under IT Act, 2008 all the acts referred under section 43, are also covered u/Sec. 66 if they are done “dishonestly” or “fraudulently”. • Many cybercrimes on which there were no express provisions made in the IT Act, 2000 are now included in the IT Act, 2008.
  • 16. Section 66(A) • Sending of offensive or false messages - new provision – Also known as “Cyber Stalking” – Covers sending of menacing, offensive or false messages via SMS/EMAIL/MMS – Punishment – imprisonment upto 3 years and fine
  • 17. Section 66(B) • Dishonestly receiving stolen computer resource or communication device - new provision – Also covers use of stolen Computers, mobile phones, SIM Cards, etc – Punishment – imprisonment upto 3 years or fine upto Rs. 1 lakh or both
  • 18. Section 66(C) • Identity theft - new provision – Fraudulently or dishonestly using someone else’s electronic signature, password or any other unique identification feature – Punishment - imprisonment upto 3 years and fine upto Rs. 1 lakh
  • 19. Section 66(D) • Cheating by personation - new provision – Cheating by pretending to be some other person – Punishment – imprisonment upto 3 years and fine upto Rs. 1 lakh
  • 20. Section 66(E) • Violation of privacy - new provision – Popularly known as Voyeurism – Pune spy cam incident where a 58-year old man was arrested for installing spy cameras in his house to ‘snoop’ on his young lady tenants – Covers acts like hiding cameras in changing rooms, hotel rooms, etc – Punishment –imprisonment upto 3 years or fine upto Rs. 2 lakh or both
  • 21. Section 66(F) • Cyber terrorism - new provision – Whoever uses cyberspace with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people – Punishment - Imprisonment which may extent to life imprisonment
  • 22. Preservation of information by intermediaries • Section 67(C) – new provision – Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.
  • 23. Government’s power to intercept • Section 69 – new provision – Government to intercept, monitor or decrypt any information generated through any computer resource if it thinks to do so in the interest of the sovereignty or integrity of India.
  • 24. Government’s power to intercept – Punishment for refusing to hand over passwords to an authorized official of the Central or State Government – Punishment – imprisonment upto 7 years and fine
  • 25. Liability of Intermediary not to disclose any personal information • Section 72(A) - new provision – Intermediary to act as per the terms of its lawful contract and not beyond it. – Punishment – imprisonment upto 3 years or fine upto 5 lakh or both
  • 26. Liability of Intermediary • Section 79 – An intermediary not to be liable for any third party information, data, or communication link made available or hosted by him.
  • 27. Liability of Intermediary • Intermediary need to prove that he didn’t – – Initiate the transmission, – Select the receiver of the transmission, and – Select or modify the information contained in the transmission and – The intermediary observes due diligence while discharging his duties under the Act.
  • 28. Abetment • Section 84(B) – new provision – Abetting to commit an offence is punishable – Punishment – Same punishment provided for the offence under the Act
  • 29. Attempt • Section 84(C) – new provision – Attempt to commit an offence is punishable – Punishment – Imprisonment which may extend to one-half of the longest term of imprisonment provided for that offence
  • 30. Investigation Powers • Section 78 – new provision – As per the IT Act, 2008 Cyber crime cases can be investigated by the “Inspector” rank police officers. – U/ the IT Act, 2000 such powers were with the “DYSP/ACP”.
  • 31. Compounding of Offences • Section 77 (A) – new provision – Compounding – “Out of court settlement” – Offences “for which less than three years imprisonment has been provided” can be compounded.
  • 32. Compounding of Offences – Such offence should not affect the socio economic conditions of the country or – has been committed against a child below the age of 18 years or a woman.
  • 34. Halifax May 10, 2006Electronic Contracts - NJI 34 Overview  Law generally has no form rule for contracts  Law of contracts is media-neutral  Question of enforceability comes down to a question of the presence of consent, proof of consent, validity of consent: – These are traditional, basic contract concepts • Legislation has supported these conclusions • Consider examples
  • 35. Halifax May 10, 2006 Electronic Contracts - NJI 35 Legislation • United Nations – Canada and US (etc) – All jurisdictions in Canada have something (exc NWT) – MB’s key parts not in force – so does it matter? – Application is subject to some exceptions • General principle: non-discrimination • Writing, signature, original, record-retention rules • Consent to use is key security feature • Legal standard vs prudent standard • E-records do not have to be more reliable than paper
  • 36. Halifax May 10, 2006 Electronic Contracts - NJI 36 Legislation • “Functional equivalents”: – Writing: “accessible so as to be usable for subsequent reference” • Accessible to whom: techie or newbie? “subsequent?” • Not necessarily looking like print e.g. voice recognition – Provision: “capable of being retained” (Ont. exception) – Originals: “reliable assurance of integrity” – Signature: “information in electronic form that a person has created or adopted in order to sign a document and that is in, attached to or associated with the document”
  • 37. Halifax May 10, 2006 Electronic Contracts - NJI 37 Legislation • Contract rules – Electronic form does not prevent validity – Contracts may be formed by clicking on icons, touching screens, talking to a computer, etc – Contracts may be made in dealing with “electronic agents” i.e. software robots – Mistakes in dealing with electronic agents may be corrected if program does not allow verification of contract before completion – Time and place rules, but no mailbox rule – Current issue: presumed receipt in the face of spam and virus filters
  • 38. Halifax May 10, 2006 Electronic Contracts - NJI 38 Forms of consent • Shrinkwrap: terms (of licence) inside box, notice outside – Systemshops v King in Canada (1980s case) – Zeidenberg v ProCD in US • Click-through/clickwrap: terms are shown, buyer clicks “I agree” or “OK” – Rudder v Microsoft - an easier case than shrink-wrap • Consider examples from web • Some limits: Zhu v. Merrill Lynch, Robet v Versus Brokerage Services: experts knew web messages were not always reliable, duty to check before acting on them. – Note: these were cases about one-on-one messages, NOT someone dealing with an impersonal web site, as are almost all of the others.
  • 39. Halifax May 10, 2006 Electronic Contracts - NJI 39 Forms of consent • “Browsewrap”: implied consent from mere use of or access to web site • Ticket cases etc as parallel in paper world • Questions go to notice of terms, accessibility of terms, and fairness • Consider examples (inc. Zhu v Merrill Lynch) • Enforcement has largely been where people are doing something prohibited by terms that they should have know was bad anyway, e.g. – Canada: CREA v. Sutton – US: Ticketmaster, Register.com, Cairo
  • 40. Halifax May 10, 2006 Electronic Contracts - NJI 40 Forms of consent • Unilateral Modification: implied or express consent • Right to change is widely claimed in web terms • Economic model understandable – adhesion contracts • Rogers v Kanitz – high-water mark (trial court only) – “that’s how business is done on the Net” • Aspencer1 v Paysystems – Not so fast – at least in Quebec (with doubtful dicta) • Consumer Protection Act, 2002 (Ontario) – Reverses Kanitz on arbitration and class actions, i.e. not in general about modifications
  • 41. Halifax May 10, 2006 Electronic Contracts - NJI 41 Authentication • of consent – herein of signatures (very briefly) • form and intent – Singapore: e-mail headers as signatures (lease) – England: e-mail headers as not signatures (guarantee) • of parties – reliability of attribution – question of proof – seldom litigated – but in age of identity theft? • of text – how does the signer know what he/she is signing?
  • 42. Halifax May 10, 2006 Electronic Contracts - NJI 42 Jurisdiction • General principles and tests – Interactivity, targeting, etc • Rudder – click-through choice of forum upheld • Specht – obscure choice of forum and process denied • May involve choice of law, choice of forum • Consumers - special rules – Quebec Civil Code – Uniform Law policy – EU policies – Rome treaties • Hague Convention on Choice of Court (2005)
  • 43. Halifax May 10, 2006 Electronic Contracts - NJI 43 Substance of contract • Unconscionability defences are media- neutral • Some applications in the cases: – arbitration clauses – class action clauses (overlaps with preceding, not the same) – some special rules e.g. Quebec in Dell (to SCC) – jurisdiction – choice of lax/business-friendly/inaccessible places? • French cases as examples of analysis - AOL.FR and its progeny (at least 4 French ISPs have suffered the same fate now) – “standard” North American clauses held illegal, unconscionable
  • 44. Halifax May 10, 2006 Electronic Contracts - NJI 44 Open questions • Errors in contracts – facts of Dell, etc • Attempts to protect other interests – Notably intersection with copyright • Digital rights management, technical protection measures • No reverse engineering • Licences vs sales (“the age of access” but “access to knowledge”) • Illegal contracts: e.g. gaming, etc - use of intermediaries to block or enforce (e.g. role of credit card companies, PayPal etc) – Civil and criminal processes may overlap
  • 45. Halifax May 10, 2006 Electronic Contracts - NJI 45 Other legal principles may apply • The usual contract rules apply, e.g.: – meeting of minds – certainty of object – consideration – AND contracts as to form (legislation does not cure them) • The usual contracting legislation applies, e.g.: – Consumer Protection Act – Internet Sales Harmonization template (as adopted) • Other legislation may apply, as to form or content – UECA yields to contrary intention
  • 46. Halifax May 10, 2006 Electronic Contracts - NJI 46 Internet Sales Harmonization Template • The template was adopted by the FPT Consumer Measures Committee in 2001. • It is in force in several provinces. • Its main terms: • Mandatory disclosure of information (& timing rules) – seller’s identity, location, applicable law – description of product, price, terms, remedies • Receipts needed • Cancellation rights for non-disclosure, non-delivery
  • 47. Halifax May 10, 2006 Electronic Contracts - NJI 47 Conclusion • “What’s old is new again” in the electronic age –Was there a meeting of the minds? –Was the transaction affirmed by the user/consumer? –Was the transaction fair? –AND questions of form, questions of proof
  • 49. •is a type of asymmetric cryptography used to simulate the security properties of a signature in digital, rather than written, form. Digital signature schemes normally give two algorithms, one for signing which involves the user's secret or private key, and one for verifying signatures which involves the user's public key. The output of the signature process is called the "digital signature.“ •is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time- stamped. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later. What is a digital signature?
  • 50. How it works • The use of digital signatures usually involves two processes, one performed by the signer and the other by the receiver of the digital signature: • Digital signature creation uses a hash result derived from and unique to both the signed message and a given private key. For the hash result to be secure, there must be only a negligible possibility that the same digital signature could be created by the combination of any other message or private key. • Digital signature verification is the process of checking the digital signature by reference to the original message and a given public key, thereby determining whether the digital signature was created for that same message using the private key that corresponds to the referenced public key.
  • 51. Example • Assume you were going to send the draft of a contract to your lawyer in another town. You want to give your lawyer the assurance that it was unchanged from what you sent and that it is really from you. 1. You copy-and-paste the contract (it's a short one!) into an e-mail note. 2. Using special software, you obtain a message hash (mathematical summary) of the contract. 3. You then use a private key that you have previously obtained from a public-private key authority to encrypt the hash. 4. The encrypted hash becomes your digital signature of the message. (Note that it will be different each time you send a message.) • At the other end, your lawyer receives the message. 1. To make sure it's intact and from you, your lawyer makes a hash of the received message. 2. Your lawyer then uses your public key to decrypt the message hash or summary. 3. If the hashes match, the received message is valid.
  • 52. Benefits of digital signatures These are common reasons for applying a digital signature to communications: • Authentication Although messages may often include information about the entity sending a message, that information may not be accurate. Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. The importance of high confidence in sender authenticity is especially obvious in a financial context. For example, suppose a bank's branch office sends instructions to the central office requesting a change in the balance of an account. If the central office is not convinced that such a message is truly sent from an authorized source, acting on such a request could be a grave mistake. • Integrity In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. (Some encryption algorithms, known as nonmalleable ones, prevent this, but others do not.) However, if a message is digitally signed, any change in the message will invalidate the signature. Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature, because this is still considered to be computationally infeasible by most cryptographic hash functions.
  • 53. Drawbacks of digital signatures Despite their usefulness, digital signatures do not alone solve all the problems we might wish them to. Non-repudiation In a cryptographic context, the word repudiation refers to the act of disclaiming responsibility for a message. A message's recipient may insist the sender attach a signature in order to make later repudiation more difficult, since the recipient can show the signed message to a third party (eg, a court) to reinforce a claim as to its signatories and integrity. However, loss of control over a user's private key will mean that all digital signatures using that key, and so ostensibly 'from' that user, are suspect. Nonetheless, a user cannot repudiate a signed message without repudiating their signature key.
  • 54. Main Questions? 1. In the digital signature who use the private key and who use the public key? 2. What are the benefits of digital signatures?