This document discusses the definition, essential elements, and validity of e-contracts under Indian law. It defines an e-contract as any contract formed through electronic means like email. The key points are:
1. The Indian Contract Act and Information Technology Act recognize the validity of e-contracts and electronic communications/records as legally binding.
2. Essential elements of a valid contract like offer, acceptance, consideration must be present in e-contracts for them to be enforceable.
3. E-contracts can be formed via websites through clickwrap/browsewrap/shrinkwrap agreements or via email exchange. The postal rule of acceptance applies to email.
4. Electronic records and digital signatures have evidentiary
E-contracts are contracts formed through electronic means like online shopping sites or apps. The document discusses the introduction, definition, nature, elements and types of e-contracts under Indian law. Key points include: e-contracts must meet all requirements of a valid contract under the Indian Contract Act; digital signatures can validate e-contracts; and Indian courts have recognized the formation of contracts through electronic communications and documents.
1) Electronic contracts are standard form contracts with non-negotiable terms formulated by one party like a manufacturer or service provider. The Information Technology Act, 2000 recognizes the validity of e-contracts.
2) E-contracts can be formed via email exchanges or through websites using clickwrap, browsewrap, or shrinkwrap agreements. However, e-contracts raise issues around jurisdiction, capacity to contract, consent, and meeting of minds.
3) The Information Technology Act and Indian Evidence Act provide for the validity and evidentiary value of e-contracts in India if they meet requirements for identification of parties, subject matter, signatures. However, the laws do not address all aspects of online contracts.
This document discusses electronic contracts (e-contracts) under Indian law. It defines essential elements of valid contracts including offer, acceptance, consideration, and intention to create legal relations. Key provisions of the Information Technology Act relating to attribution of electronic records and time/place of communication are summarized. Different types of e-contracts like shrink wrap and click wrap agreements are described. Sample clauses from real e-contracts for email services, domain purchase, online share trading, and online shopping are provided to illustrate common purposes and sub-parts of e-contracts. Finally, the document outlines the legal framework for secure e-contracts covering different business and legal phases of the contracting process.
Cyberspace jurisdiction meaning and conceptgagan deep
Cyberspace refers to the global, online world of computer networks and the internet. Jurisdiction over cybercrimes is complex due to the borderless nature of cyberspace. Under Indian law, criminal courts have jurisdiction over offenses committed within India. The Civil Procedure Code and Code of Criminal Procedure establish jurisdiction based on location and nationality. International law principles like universal jurisdiction provide some guidance but are insufficient on their own. Conflicting laws between countries pose challenges, though treaties and conventions can help resolve disputes. Overall, determining proper legal jurisdiction for crimes committed via cyber networks remains unclear.
The document provides an introduction to cyber law and the concept of cyberspace. It discusses how cyberspace has evolved from connecting people to information in 1990 to connecting everything today. It defines cyberspace as the electronic medium of computer networks used for online communication. Cyberspace includes the internet, websites, computers, networks, software, and electronic devices. The document outlines some key characteristics of cyberspace such as its intangible nature, lack of respect for national boundaries, open participation, and potential for anonymity. It also discusses various cyber crimes and penalties under the IT Act.
This document discusses the definition, essential elements, and validity of e-contracts under Indian law. It defines an e-contract as any contract formed through electronic means like email. The key points are:
1. The Indian Contract Act and Information Technology Act recognize the validity of e-contracts and electronic communications/records as legally binding.
2. Essential elements of a valid contract like offer, acceptance, consideration must be present in e-contracts for them to be enforceable.
3. E-contracts can be formed via websites through clickwrap/browsewrap/shrinkwrap agreements or via email exchange. The postal rule of acceptance applies to email.
4. Electronic records and digital signatures have evidentiary
E-contracts are contracts formed through electronic means like online shopping sites or apps. The document discusses the introduction, definition, nature, elements and types of e-contracts under Indian law. Key points include: e-contracts must meet all requirements of a valid contract under the Indian Contract Act; digital signatures can validate e-contracts; and Indian courts have recognized the formation of contracts through electronic communications and documents.
1) Electronic contracts are standard form contracts with non-negotiable terms formulated by one party like a manufacturer or service provider. The Information Technology Act, 2000 recognizes the validity of e-contracts.
2) E-contracts can be formed via email exchanges or through websites using clickwrap, browsewrap, or shrinkwrap agreements. However, e-contracts raise issues around jurisdiction, capacity to contract, consent, and meeting of minds.
3) The Information Technology Act and Indian Evidence Act provide for the validity and evidentiary value of e-contracts in India if they meet requirements for identification of parties, subject matter, signatures. However, the laws do not address all aspects of online contracts.
This document discusses electronic contracts (e-contracts) under Indian law. It defines essential elements of valid contracts including offer, acceptance, consideration, and intention to create legal relations. Key provisions of the Information Technology Act relating to attribution of electronic records and time/place of communication are summarized. Different types of e-contracts like shrink wrap and click wrap agreements are described. Sample clauses from real e-contracts for email services, domain purchase, online share trading, and online shopping are provided to illustrate common purposes and sub-parts of e-contracts. Finally, the document outlines the legal framework for secure e-contracts covering different business and legal phases of the contracting process.
Cyberspace jurisdiction meaning and conceptgagan deep
Cyberspace refers to the global, online world of computer networks and the internet. Jurisdiction over cybercrimes is complex due to the borderless nature of cyberspace. Under Indian law, criminal courts have jurisdiction over offenses committed within India. The Civil Procedure Code and Code of Criminal Procedure establish jurisdiction based on location and nationality. International law principles like universal jurisdiction provide some guidance but are insufficient on their own. Conflicting laws between countries pose challenges, though treaties and conventions can help resolve disputes. Overall, determining proper legal jurisdiction for crimes committed via cyber networks remains unclear.
The document provides an introduction to cyber law and the concept of cyberspace. It discusses how cyberspace has evolved from connecting people to information in 1990 to connecting everything today. It defines cyberspace as the electronic medium of computer networks used for online communication. Cyberspace includes the internet, websites, computers, networks, software, and electronic devices. The document outlines some key characteristics of cyberspace such as its intangible nature, lack of respect for national boundaries, open participation, and potential for anonymity. It also discusses various cyber crimes and penalties under the IT Act.
This presentation provides an overview of e-governance efforts in India. It defines e-governance as using information and communication technologies to deliver government services, exchange information, and integrate systems between government, citizens, and businesses. The presentation notes that e-governance aims to provide convenient, efficient, and transparent access to government services. It also discusses key provisions of the Information Technology Act, 2000 regarding legal recognition of electronic records and digital signatures, use of electronic records and digital signatures by the government, retention of electronic records, and rules for digital signatures.
The document discusses the objectives and key provisions of the Information Technology Act, 2000 in India. The key points are:
1) The Act aims to provide legal recognition for electronic commerce and electronic records on par with paper documents. It also aims to facilitate e-governance and electronic filing of documents.
2) The Act defines important terms related to digital infrastructure and transactions. It also establishes authorities like the Controller of Certifying Authorities to regulate digital signature certificates.
3) The Act addresses issues like legal recognition of electronic documents and digital signatures to support e-commerce. It also establishes mechanisms for offenses and justice systems related to cybercrimes.
The document discusses electronic contracts, including online contracts formed through click wrap and shrink wrap agreements. It defines electronic contracts as agreements formed through the internet using websites or email to establish offer and acceptance. While electronic contracts are similar to traditional contracts, the concepts of offer and acceptance must be adapted to the online context. It also discusses key issues like intention to contract, consideration, and remedies for breach. Specific types of electronic contracts like click wrap and shrink wrap agreements are examined in more detail.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
This document discusses various trademark issues that can arise on the internet. It covers topics like domain name registration, the different parts of a domain name, cybersquatting, typosquatting, linking, meta-tagging, and renewal snatching. Remedies for trademark infringement in cyberspace include actions under the Anti-Cybersquatting Consumer Protection Act in the US or dispute resolution policies set by ICANN internationally.
An e-contract is any contract formed through electronic means such as email, websites, or software. The Uniform Computer Information Transactions Act provides rules for forming, governing, and setting basic terms of e-contracts. E-contracts can be formed through processes like exchanging emails containing offers and acceptances, completing web forms, or clicking to agree to online terms. There are different types of e-contracts like employment contracts, shrinkwrap contracts governing software licenses, and source code escrow agreements. Forming e-contracts involves information, intention, agreement, and settlement phases with various legal considerations around elements, signatures, and international guidelines.
The Information Technology Act, 2000 provides the legal framework for electronic governance in India. Some key points covered in the act include:
- Legal recognition of electronic records and digital signatures.
- Regulation of certifying authorities that issue digital signature certificates.
- Establishment of the Cyber Appellate Tribunal to hear appeals related to the act.
- Offences and penalties related to cyber crimes like hacking and publishing obscene content.
- Procedures for adjudicating violations and determining appropriate penalties.
The document discusses cyber law in India. It notes that cyber law is defined under the IT Act of 2000 and governs cyber space, including computers, networks, and electronic devices. It describes cyber crimes as unlawful acts using computers as tools or targets. Common cyber crimes include pornography, identity theft, and financial theft. The IT Act of 2000 and its 2008 amendment provide the legal framework for cyber law in India by recognizing electronic commerce and records and addressing cyber crimes.
Right to privacy on internet and Data Protectionatuljaybhaye
The document discusses the concepts of privacy and data protection on the internet. It defines the right to privacy and explains how privacy is recognized differently across various jurisdictions like the Universal Declaration of Human Rights, European Convention on Human Rights, and the Constitution of India. It also summarizes key privacy laws in the US and UK. The document then discusses various threats to privacy from technologies like cookies, web bugs, and viruses. It provides details about sensitive personal data protection laws in India and the UK. Finally, it discusses the right to privacy versus the right to interception under Indian law.
The Information Technology Act 2000 was enacted in India on May 17, 2000 to provide legal recognition to electronic commerce and transactions carried out by electronic data interchange and other means of electronic communication. The Act is based on a model law adopted by the UN on e-commerce. It aims to facilitate electronic governance and filing of documents. Some key components of the Act include provisions around digital signatures, duties of subscribers, penalties for offences, and protection for network service providers. It also defines important terms related to e-commerce and cyber security.
(1) The Electronic Transactions Act was enacted to regulate electronic records and digital signatures by providing them legal validity and recognition.
(2) Key terms like electronic form, electronic record, digital signature, originator, addressee etc. are defined to have the same meaning when used in reference to electronic records as they would have in reference to physical documents.
(3) The act provides for legal recognition of electronic records and digital signatures by establishing them as valid alternatives to physical documents signed using handwritten signatures when prevailing law requires written, printed or signed records.
Classification of cause of action / characterisationcarolineelias239
it is the second element in private international law to decide a case having foreign element, after assuming jurisdiction by a court. It is essential to categorize facts of a case & to find out which part of law to be applied - whether tort / contract/ succession/ marital issues etc. Then only a case can be decided.
This document discusses cyber or online contracts. It defines a cyber-contract as one created through communications over computer networks, whether entirely through email exchanges showing offer and acceptance, or a combination of electronic and other means. The key elements of a valid contract - offer, acceptance, consideration, and consent - still apply to online contracts. Digital signatures can verify the identity of parties to an online contract by encrypting messages with public and private keys. This allows confirmation that a message has not been altered and verifies the sender. Overall, the document outlines how traditional contract law elements can be applied to agreements made electronically.
E contracts and validity of e contracts in IndiaKajalRandhawa
what is e-contract, types of e-contract, parties to e-contract, essentials of e-contract, provisions of e-contract under various laws, judgment on the validity of e-contract, validity and enforceability of e-contracts, electronic signature, legal issues involved in e-contract, Place of formation of an E-Contract and the area of jurisdiction in case of Breach, Admissibility of Electronic contracts as evidence in Courts, suggestions, conclusion
The document discusses the Information Technology Act of 2000 in India. It was passed to promote e-commerce and regulate electronic transactions. Some key points:
- The Act provides legal recognition for digital signatures and electronic documents to facilitate online transactions and e-governance.
- It established regulatory authorities for certifying digital signature certificates and created provisions to prevent cybercrimes like hacking and publishing of obscene content online.
- Major amendments in 2008 introduced concepts of electronic signatures beyond digital signatures, data protection responsibilities for companies, and new cybercrimes under the Act.
Intelectual property right and Passing OffPARTH PATEL
This document discusses trademarks and the law of passing off under Indian trademark law. It defines a trademark as a distinctive sign that identifies the source of goods/services. Indian law provides statutory protection under the Trademark Act of 1999 and common law protection under passing off. Passing off is a tort that protects goodwill from misrepresentation that causes damage. To succeed in a passing off claim, the plaintiff must prove reputation of goods, possibility of deception, and likelihood of damages. The key elements and tests for passing off are discussed, along with factors courts consider and differences between passing off and trademark infringement.
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
The document discusses various aspects of intellectual property, including copyright, trademarks, patents, and databases. It provides definitions and explanations of key concepts such as the different types of intellectual property, the rights they provide, and how intellectual property laws apply in areas like the internet and new technologies. The document is intended to serve as an overview and introduction to intellectual property for non-experts.
The Information Technology Act 2000 is one of the important laws relating to Indian cyber laws. It was passed by the Indian Parliament in 2000 and consists of 13 chapters and 4 schedules. The objectives of the act include giving legal recognition to electronic transactions, digital signatures, and storing company data electronically. It aims to promote e-commerce and regulate cyber crime. Some key provisions establish rules for electronic records and receipts, empower organizations to secure electronic records and signatures, and appoint authorities to regulate certifying agencies and investigate cyber crimes. However, the act does not cover some areas like infringement of copyright and domains. [/SUMMARY]
This document provides an overview of the UNCITRAL Model Law and international commercial arbitration. Some key points:
- UNCITRAL is the core UN body dealing with international trade law and established model laws like the Model Law on International Commercial Arbitration to harmonize arbitration standards.
- The Model Law aims to address inconsistencies and gaps in national arbitration laws to better facilitate cross-border arbitration. It serves as a model for domestic arbitration legislation.
- The Indian Arbitration Act is based largely on the UNCITRAL Model Law and aims to consolidate arbitration laws in India according to international standards.
- The Model Law covers important aspects of the arbitration process like the
this is a presentation on electronic contracts. this will be helpful in the study of various types of contract in the law. this topic is also there in the BBA course. in legal environment - 2
The document provides an overview of the Information Technology Act of 2000 passed by the Indian Parliament. The key points are:
1. The Act aims to provide legal recognition to electronic transactions and commerce by facilitating electronic filing and use of digital signatures.
2. It defines cybercrimes like hacking and publishing obscene material and prescribes penalties like imprisonment and fines.
3. The Act recognizes digital signatures authenticated by Certifying Authorities as legally valid. It also defines terms like digital signatures, private/public keys, and encryption.
4. It provides for adjudication of cybercrimes and compensation up to Rs. 10 million for offenses like unauthorized access or tampering with computer systems.
This presentation provides an overview of e-governance efforts in India. It defines e-governance as using information and communication technologies to deliver government services, exchange information, and integrate systems between government, citizens, and businesses. The presentation notes that e-governance aims to provide convenient, efficient, and transparent access to government services. It also discusses key provisions of the Information Technology Act, 2000 regarding legal recognition of electronic records and digital signatures, use of electronic records and digital signatures by the government, retention of electronic records, and rules for digital signatures.
The document discusses the objectives and key provisions of the Information Technology Act, 2000 in India. The key points are:
1) The Act aims to provide legal recognition for electronic commerce and electronic records on par with paper documents. It also aims to facilitate e-governance and electronic filing of documents.
2) The Act defines important terms related to digital infrastructure and transactions. It also establishes authorities like the Controller of Certifying Authorities to regulate digital signature certificates.
3) The Act addresses issues like legal recognition of electronic documents and digital signatures to support e-commerce. It also establishes mechanisms for offenses and justice systems related to cybercrimes.
The document discusses electronic contracts, including online contracts formed through click wrap and shrink wrap agreements. It defines electronic contracts as agreements formed through the internet using websites or email to establish offer and acceptance. While electronic contracts are similar to traditional contracts, the concepts of offer and acceptance must be adapted to the online context. It also discusses key issues like intention to contract, consideration, and remedies for breach. Specific types of electronic contracts like click wrap and shrink wrap agreements are examined in more detail.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
This document discusses various trademark issues that can arise on the internet. It covers topics like domain name registration, the different parts of a domain name, cybersquatting, typosquatting, linking, meta-tagging, and renewal snatching. Remedies for trademark infringement in cyberspace include actions under the Anti-Cybersquatting Consumer Protection Act in the US or dispute resolution policies set by ICANN internationally.
An e-contract is any contract formed through electronic means such as email, websites, or software. The Uniform Computer Information Transactions Act provides rules for forming, governing, and setting basic terms of e-contracts. E-contracts can be formed through processes like exchanging emails containing offers and acceptances, completing web forms, or clicking to agree to online terms. There are different types of e-contracts like employment contracts, shrinkwrap contracts governing software licenses, and source code escrow agreements. Forming e-contracts involves information, intention, agreement, and settlement phases with various legal considerations around elements, signatures, and international guidelines.
The Information Technology Act, 2000 provides the legal framework for electronic governance in India. Some key points covered in the act include:
- Legal recognition of electronic records and digital signatures.
- Regulation of certifying authorities that issue digital signature certificates.
- Establishment of the Cyber Appellate Tribunal to hear appeals related to the act.
- Offences and penalties related to cyber crimes like hacking and publishing obscene content.
- Procedures for adjudicating violations and determining appropriate penalties.
The document discusses cyber law in India. It notes that cyber law is defined under the IT Act of 2000 and governs cyber space, including computers, networks, and electronic devices. It describes cyber crimes as unlawful acts using computers as tools or targets. Common cyber crimes include pornography, identity theft, and financial theft. The IT Act of 2000 and its 2008 amendment provide the legal framework for cyber law in India by recognizing electronic commerce and records and addressing cyber crimes.
Right to privacy on internet and Data Protectionatuljaybhaye
The document discusses the concepts of privacy and data protection on the internet. It defines the right to privacy and explains how privacy is recognized differently across various jurisdictions like the Universal Declaration of Human Rights, European Convention on Human Rights, and the Constitution of India. It also summarizes key privacy laws in the US and UK. The document then discusses various threats to privacy from technologies like cookies, web bugs, and viruses. It provides details about sensitive personal data protection laws in India and the UK. Finally, it discusses the right to privacy versus the right to interception under Indian law.
The Information Technology Act 2000 was enacted in India on May 17, 2000 to provide legal recognition to electronic commerce and transactions carried out by electronic data interchange and other means of electronic communication. The Act is based on a model law adopted by the UN on e-commerce. It aims to facilitate electronic governance and filing of documents. Some key components of the Act include provisions around digital signatures, duties of subscribers, penalties for offences, and protection for network service providers. It also defines important terms related to e-commerce and cyber security.
(1) The Electronic Transactions Act was enacted to regulate electronic records and digital signatures by providing them legal validity and recognition.
(2) Key terms like electronic form, electronic record, digital signature, originator, addressee etc. are defined to have the same meaning when used in reference to electronic records as they would have in reference to physical documents.
(3) The act provides for legal recognition of electronic records and digital signatures by establishing them as valid alternatives to physical documents signed using handwritten signatures when prevailing law requires written, printed or signed records.
Classification of cause of action / characterisationcarolineelias239
it is the second element in private international law to decide a case having foreign element, after assuming jurisdiction by a court. It is essential to categorize facts of a case & to find out which part of law to be applied - whether tort / contract/ succession/ marital issues etc. Then only a case can be decided.
This document discusses cyber or online contracts. It defines a cyber-contract as one created through communications over computer networks, whether entirely through email exchanges showing offer and acceptance, or a combination of electronic and other means. The key elements of a valid contract - offer, acceptance, consideration, and consent - still apply to online contracts. Digital signatures can verify the identity of parties to an online contract by encrypting messages with public and private keys. This allows confirmation that a message has not been altered and verifies the sender. Overall, the document outlines how traditional contract law elements can be applied to agreements made electronically.
E contracts and validity of e contracts in IndiaKajalRandhawa
what is e-contract, types of e-contract, parties to e-contract, essentials of e-contract, provisions of e-contract under various laws, judgment on the validity of e-contract, validity and enforceability of e-contracts, electronic signature, legal issues involved in e-contract, Place of formation of an E-Contract and the area of jurisdiction in case of Breach, Admissibility of Electronic contracts as evidence in Courts, suggestions, conclusion
The document discusses the Information Technology Act of 2000 in India. It was passed to promote e-commerce and regulate electronic transactions. Some key points:
- The Act provides legal recognition for digital signatures and electronic documents to facilitate online transactions and e-governance.
- It established regulatory authorities for certifying digital signature certificates and created provisions to prevent cybercrimes like hacking and publishing of obscene content online.
- Major amendments in 2008 introduced concepts of electronic signatures beyond digital signatures, data protection responsibilities for companies, and new cybercrimes under the Act.
Intelectual property right and Passing OffPARTH PATEL
This document discusses trademarks and the law of passing off under Indian trademark law. It defines a trademark as a distinctive sign that identifies the source of goods/services. Indian law provides statutory protection under the Trademark Act of 1999 and common law protection under passing off. Passing off is a tort that protects goodwill from misrepresentation that causes damage. To succeed in a passing off claim, the plaintiff must prove reputation of goods, possibility of deception, and likelihood of damages. The key elements and tests for passing off are discussed, along with factors courts consider and differences between passing off and trademark infringement.
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
The document discusses various aspects of intellectual property, including copyright, trademarks, patents, and databases. It provides definitions and explanations of key concepts such as the different types of intellectual property, the rights they provide, and how intellectual property laws apply in areas like the internet and new technologies. The document is intended to serve as an overview and introduction to intellectual property for non-experts.
The Information Technology Act 2000 is one of the important laws relating to Indian cyber laws. It was passed by the Indian Parliament in 2000 and consists of 13 chapters and 4 schedules. The objectives of the act include giving legal recognition to electronic transactions, digital signatures, and storing company data electronically. It aims to promote e-commerce and regulate cyber crime. Some key provisions establish rules for electronic records and receipts, empower organizations to secure electronic records and signatures, and appoint authorities to regulate certifying agencies and investigate cyber crimes. However, the act does not cover some areas like infringement of copyright and domains. [/SUMMARY]
This document provides an overview of the UNCITRAL Model Law and international commercial arbitration. Some key points:
- UNCITRAL is the core UN body dealing with international trade law and established model laws like the Model Law on International Commercial Arbitration to harmonize arbitration standards.
- The Model Law aims to address inconsistencies and gaps in national arbitration laws to better facilitate cross-border arbitration. It serves as a model for domestic arbitration legislation.
- The Indian Arbitration Act is based largely on the UNCITRAL Model Law and aims to consolidate arbitration laws in India according to international standards.
- The Model Law covers important aspects of the arbitration process like the
this is a presentation on electronic contracts. this will be helpful in the study of various types of contract in the law. this topic is also there in the BBA course. in legal environment - 2
The document provides an overview of the Information Technology Act of 2000 passed by the Indian Parliament. The key points are:
1. The Act aims to provide legal recognition to electronic transactions and commerce by facilitating electronic filing and use of digital signatures.
2. It defines cybercrimes like hacking and publishing obscene material and prescribes penalties like imprisonment and fines.
3. The Act recognizes digital signatures authenticated by Certifying Authorities as legally valid. It also defines terms like digital signatures, private/public keys, and encryption.
4. It provides for adjudication of cybercrimes and compensation up to Rs. 10 million for offenses like unauthorized access or tampering with computer systems.
This document discusses cyber laws in India. It begins by defining cyber space and how increased internet usage has facilitated communication but also enabled cyber crimes. Cyber crimes are defined as unlawful acts using computers as tools or targets. The document then discusses the Information Technology Act 2000, which provides the legal framework for electronic transactions. It established the Controller of Certifying Authorities to regulate digital signature certificates and certifying authorities. The objectives of the act are to facilitate e-commerce, recognize digital signatures, and prevent computer crimes and protect privacy. Key chapters cover attribution of electronic records, secure electronic records and signatures, and regulation of certifying authorities.
1. Cyber crimes in India have increased significantly, with a 200% rise in Delhi and various online fraud cases reported.
2. The Information Technology Act, 2000 aims to provide legal recognition for electronic transactions and digital signatures to facilitate electronic governance and commerce.
3. The Act defines cyber crimes such as hacking and publishing obscene content online, and prescribes penalties such as imprisonment and fines.
The document discusses digital and electronic signatures, comparing their key differences and legal status in Canada. It provides an overview of the signature technologies, including what must be achieved (security, integrity, non-repudiation, etc.). Best practices for electronic signatures and records are outlined. Pricing models for on-premise versus cloud-based solutions are compared. The document aims to help organizations understand how digital and electronic signatures can improve business processes while ensuring compliance.
This document discusses considerations for validating electronic signatures. It recommends checking company policy to determine what types of electronic signatures are acceptable. It also suggests verifying any standards required by the company, such as certification IDs, as well as ensuring the correct software is used to capture signatures. For legal purposes, it advises using software that records details like timestamps and email trails. Hashing and notarization are also mentioned as methods to help validate electronic signatures and determine if a document has been altered after being signed. The document concludes with an overview of the ESIGN Act and its requirements regarding electronic records and signatures in the US.
This document discusses digital signatures and electronic signatures. It begins by defining electronic signatures as symbols or data attached to an electronically transmitted document to verify the sender's intent to sign. It then explains the differences between electronic signatures and digital signatures, noting that digital signatures use cryptography via public and private keys. The document outlines some key points about digital signatures, including their advantages and how they are used to digitally sign documents. It also discusses the legal recognition of digital and electronic signatures in India according to the Information Technology Act of 2000.
Ethics of Online Forms and E-Signatures for AttorneysGreg McLawsen
Did you really ever think you’d see the day when a pen-
and-ink signature on a document, or even an original document, wasn’t required? Well, that day has come – and you need to insure you are not only in compliance with court rules, but also ethics rules. We’ll examine:
• The RPCs relevant to documents and signatures (RPC 1.6 on confidentiality of information), and touch upon on the attorneys duty to supervise associate attorneys, legal support staff, and LLLTs (5.1, 5.2, 5.3, and 5.10)
• The competent use of various e-signature services
• The ethical and technical requirements for safeguarding client signatures
• How to competently and safely complete and submit on-line forms
This presentation was given at the January 22, 2016 annual CLE of the Washington State Bar Association's Solo and Small Practice Section
The Information Technology Act, 2000 provides the legal framework for electronic governance in India. Some key points of the act include:
1. It defines electronic records and digital signatures, giving them legal validity equal to paper documents.
2. It establishes procedures for digital signature certificates and revocation. Certifying authorities are responsible for issuing and verifying certificates.
3. Offences under the act include hacking and publishing obscene material. It defines penalties for various cyber crimes and empowers the Controller of Certifying Authorities to investigate violations.
4. The act led to the establishment of the Cyber Appellate Tribunal to hear appeals from penalties issued by the Controller.
The Electronic Commerce Act 2000 of Ireland validates electronic communications and signatures to the same extent as paper-based ones, provided the receiving party consents. For financial advisors, electronic records meet legal retention obligations if they assure integrity and accessibility of information over time. Digiproving electronic signatures satisfy these requirements by making documents unalterable after signing and certifying the time and location of creation. However, "advanced electronic signatures" involving digital certificates from certification authorities are recognized as witnessed signatures but come with overhead of identity proofing and annual costs.
The document summarizes key aspects of India's Information Technology Act 2000 and its subsequent amendment in 2008. It discusses the objectives of the original act, which included providing legal recognition to electronic transactions and digital signatures. It also describes some important exclusions. The amendment act in 2008 addressed issues like data privacy, information security, and defined additional cyber crimes. The document also provides explanations of digital signatures, digital signature certificates, and concepts like verification and expiration. Finally, it discusses cyber crimes and cyber law, defining them and outlining penalties under the Indian act.
This document discusses e-commerce and contracts in the digital age. It defines e-commerce and outlines the key elements of a contract, including offer, acceptance, consideration, and capacity. It discusses issues with e-commerce contracts regarding identity, terms and conditions, and governing law. The document also summarizes Australia's Electronic Transactions Act and its role in validating electronic transactions and signatures.
This document discusses e-commerce and key legal issues related to contracts formed online. It defines e-commerce and outlines the basic elements of a contract, including offer, acceptance, consideration, and capacity. Issues specific to e-commerce contracts, such as authenticating digital signatures and determining the time and place of formation, are also examined. The document also reviews entity structures like sole proprietorships, partnerships and companies. It concludes by covering domain name registration in Australia.
This document discusses e-commerce and issues related to contracts in an online business environment. It defines e-commerce and outlines the basic elements of a contract, including offer, acceptance, consideration, and capacity. It discusses issues that arise for e-commerce deals, such as determining the identity of buyers/sellers and governing law. The document also summarizes Australia's Electronic Transactions Act and its provisions regarding electronic signatures and record keeping.
This document discusses e-commerce and issues related to contracts in an online business environment. It defines e-commerce and outlines the basic elements of a contract, including offer, acceptance, consideration, and capacity. It discusses issues that arise for e-commerce deals, such as determining the identity of buyers/sellers and governing law. The document also summarizes Australia's Electronic Transactions Act and its provisions regarding electronic signatures and record keeping.
This document discusses how InfoTrack now provides an easy and efficient way to prepare and electronically sign Section 32 statements and contracts of sale for real estate transactions. Practitioners can order documents, searches, and certificates from InfoTrack online and have them electronically signed anywhere using SignIT. This streamlines the conveyancing process by eliminating the need for paper documents and signatures. The electronic signing process uses DocuSign and can be done from any device. InfoTrack aims to save practitioners time by automating document preparation and approval workflows for real estate transactions.
This document provides an overview of cyber laws in India. It discusses that cyber law refers to all legal aspects related to the internet and web. It notes the need for cyber laws to ensure security of information, government data, intellectual property, privacy, and legality of online transactions. The Information Technology Act was passed in 2000, making India the 12th country to adopt cyber laws. Key features included legal recognition of digital signatures, e-governance, and attribution of electronic records. The act also defines cyber crimes and security of electronic records and digital signatures.
This document discusses digital signatures, including their history, purpose, and how they work. Digital signatures provide authentication, integrity, and non-repudiation for electronic documents by using public key cryptography. A digital signature is generated by encrypting a hash of a message with the sender's private key. Anyone can verify the signature using the sender's public key, ensuring the message came from that sender and was not altered. Challenges include keeping private keys secure and the processing time required, but digital signatures enable secure e-commerce and e-governance applications.
DIGITAL PERSONAL DATA PROTECTION ACT 2023-PPT-VPD.pptxVijay Dalmia
The Digital Personal Data Protection Act, 2023 (DPDP Act) is a significant development in Indian data protection. Here's a concise overview:
**Personal Data and Processing:**
- "Personal data" under DPDP Act refers to any data identifying an individual.
- "Processing" includes various operations, like collection and storage.
**Data Fiduciary and Data Processor:**
- "Data Fiduciary" determines data processing purposes.
- "Data Processor" processes data on behalf of a Data Fiduciary.
**Coverage:**
- DPDP Act covers those processing personal data, excluding personal or domestic purposes.
**Applicability:**
- Applies when processing occurs within or outside India related to offering goods/services within India.
**Permitted Processing:**
- Personal data can be processed with consent or under legitimate uses outlined in DPDP Act.
**Consent:**
- Consent should be clear, informed, and obtained through affirmative action.
**Notice:**
- A notice is mandatory before collecting personal data.
- Fresh notice required if processing begins before DPDP Act commencement.
**Data Fiduciary Obligations:**
- Appoint Data Processor via valid contract.
- Ensure data completeness, accuracy, and security.
- Erase data when purpose is fulfilled.
- Implement technical and security measures.
- Report breaches to Data Protection Board.
- Establish grievance redressal mechanism.
- Publish contact information of Data Protection Officer.
**Significant Data Fiduciary:**
- Conduct periodic data protection impact assessments.
- Appoint Data Protection Officer and independent data auditor.
**Data Protection Board:**
- An enforcement body established by the Central Government.
- Appeals go to Telecom Disputes Settlement and Appellate Tribunal.
**Consent Manager:**
- Facilitates consent management through an accessible platform.
- Registered with Data Protection Board.
**Data Principal Rights:**
- Right to access personal data.
- Right to correction, erasure, and grievance redressal.
- Right to nominate and withdraw consent.
**Cross-Border Data Transfers:**
- Generally allowed, but Central Government can restrict specific countries/territories.
**Penalties:**
- Non-compliance may result in penalties up to INR 250 Crores (approx. US$ 3,01,00,000).
**Compliance Timeframe:**
- No specific timeframe provided; companies should proactively prepare for DPDP Act compliance.
This summary provides a concise overview of the DPDP Act's key provisions and obligations.
Enforcement Of Intellectual Property Rights Through CustomsVijay Dalmia
Custom Act, 1962 & Intellectual Property Rights Enforcement Rules, 2007
Apart from the various remedies provided under the IP Laws in India, one of the most efficient ways to protect and enforce intellectual property rights is through Custom Act, 1962
It prohibits import of goods that infringe Intellectual Property at the Custom Borders thereby restricting the entry of the goods infringing Intellectual Property Rights
Under Section 156 (1) read with Section 11 (2) (n) and (u) of the Customs Act, 1962, the Central Government has made the Intellectual Property Rights (Imported Goods) Enforcement Rules, 2007 applicable to imported goods.
The Intellectual Property Rights (Imported Goods) Enforcement Rules, 2007 has been amended vide notification no. 56/2018. - Customs (N.T.) dated 22nd June 2018 and the said rules have been called the Intellectual Property Rights (Imported Goods) Enforcement Amendment Rules, 2018.
Intellectual Property Rights (Imported Goods) Enforcement Amendment Rules, 2018
Vide the said Amendment Rules, the Central Government has amended Rule 2 and Rule 5 of the Intellectual Property Rights (Imported Goods) Enforcement Rules, 2007.
As per the Amendment, in Rule 2 in clause (b), the words and figures “patent as defined in the Patents Act, 1970” has been omitted and in clause (c), the words and figures “the Patents Act, 1970” shall be omitted.
In Rule 5, after condition (b), two more conditions have been inserted.
The Intellectual Property Rights (Imported Goods) Enforcement Amendment Rules, 2018 can be accessed from the following link: https://patentsrewind.files.wordpress.com/2018/07/custom-notification.pdf
After the amendment of 2018, the IPR Enforcement Rules 2007 permits a Right Holder to protect the following different types of Intellectual property-
Under the Intellectual Property Rights (Imported Goods) Enforcement Rules, 2007, goods infringing intellectual property rights which are made, reproduced, put into circulation or otherwise used in breach of the intellectual property laws in India or outside India and without the consent of the right holder or a person duly authorized to do so by the right holder.
Notice to be Registered by the Custom Authorities on satisfaction
Within 30 working days from the date of receipt of the notice under Rule 3 (1) or from the extended period as per Rule 3 (4), the Commissioner shall notify the applicant whether notice is registered or rejected.
Minimum validity of registration of notice for a period of 1 year
Prohibition and suspension of import of infringing goods under Section 11 of the Customs Act, 1962.
At all the Ports (Custom Borders) in India
Notice can be given by the Right Holder of the suspected infringing goods
Commissioner of Customs can suo moto suspend the clearance of such infringing goods
Rule 7(4): Where the Deputy Commissioner of Customs or Assistant Commissioner of Customs, as the case may be, has suspended clearance of goods on his own initiative and right holder
White Collar Crime by Vijay Pal Dalmia.pptxVijay Dalmia
A Crime is a Crime.
Colour does not change the crime.
Blue Collar crime is motivated by
fury,
vengeance,
Emotions.
White collar crime is a crime
motivated by greed
meticulously organized & accomplished
committed by the people who belongs to the higher class of society and
These people :
Are from reputable group of society.
Commit these crimes during the course of their occupation.
Usually have a better understanding of
technology,
their respective field,
disciplines etc.
are people of high stature and
There is generally an element of breach of trust by carrying out unethical business practices because of motivation to gain financially.
It is the offenders’ position that accords upon them the opportunity to perpetrate such crimes.
Essential elements of White Collar crime:
Fraud
Deceit
Cheating
Breach of Trust
Intent
Disguise
Knowledge
Concealment
Conspiracy
Organized
Planning
Legislations against White Collar Crimes in India
# Companies Act, 1960.
# Income Tax Act, 1961.
# Indian Penal Code, 1860.
# Commodities Act, 1955.
# Prevention of corruption Act, 1988.
# Negotiable Instrument Act,
# Prevention of Money Laundering Act, 2002.
# IT Act, 2005.
# Imports and Exports (Control) Act, 1950
#Fugitive Economic Offenders Act, 2018
#Foreign Exchange Management Act
# Special Court (Trial of offences relation to Transactions in Securities) Act, 1992
#Central Vigilance Commission Act, 2003
Vijay Pal Dalmia, AdvocateSupreme Court of India & Delhi High CourtEmail id: vpdalmia@gmail.com Mobile No.: +91 9810081079Linkedin: https://www.linkedin.com/in/vpdalmia/ Facebook: https://www.facebook.com/vpdalmia Twitter: @vpdalmia
Taxation of Cryptocurrencies – Virtual Digital Assets in India-VPDalmia.pptxVijay Dalmia
The document summarizes the taxation of cryptocurrencies in India. It defines cryptocurrencies as virtual digital assets under Indian law and outlines how they are taxed. Income from transferring cryptocurrencies is taxed at 30% and is subject to TDS of 1% by the payer. Gains from gifting cryptocurrencies are also taxed. Cryptocurrency exchanges providing trading services are subject to 18% GST. Overall, the document provides an overview of the key Indian tax and legal provisions related to cryptocurrencies.
Indian Approach On Bitcoins-cryptocurrencies- Blockchain Legal Practical Pe...Vijay Dalmia
There are no specific laws relating to Blockchain in India.
Under the Indian laws Blockchain is governed by the general laws of India including laws relating to contracts.
Blockchain Technology is being adopted practically by all, i.e. Government and Private Parties including Banks.
Cryptocurrencies/Crypto Assets/ Cryptos are not FIAT currencies.
Fiat Currency is different from Cryptocurrencies.
Virtual Currencies like Bitcoins are not legal currencies or fiat currency, issued by any Government, and in fact, these are not a currency at all.
Virtual Currencies like Bitcoins are nomenclature for various “computer algorithms”, which are being used to generate codes by private parties and traded over the internet.
Most of the currencies in the world including the currency of India i.e. rupee, are Fiat currencies. Fiat money is the currency that a government has declared to be legal tender, but which may not be backed by any physical commodity like Gold.
The prices of such currencies are
arbitrary
without any backing of any government and geographical restrictions.
Virtual Currencies like Bitcoins are
State Free,
Border Free and
Control Free.
removes the need of a trusted third party such as a governmental agency, bank, etc.
A Virtual Currency like Bitcoin, is a stateless digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank like the Reserve Bank of India, rendering it immune from government interference.
At the moment, there is no express law that classifies virtual currencies as a good, service, security, commodity, derivative or currency
Some of the laws which have a direct bearing on the legal aspects relating to illegal Virtual Currencies like Bitcoins, are as under:
The Constitution of India, 1950;
Reserve Bank of India Act, 1934,
The Foreign Exchange Management Act, 1999 (“FEMA”);
The Reserve Bank of India Act, 1934 (“RBI Act”);
The Coinage Act, 1906 (“Coinage Act”);
The Securities Contracts (Regulation) Act, 1956 (“SCRA”);
The Sale of Goods Act, 1930 (“Sale of Goods Act”);
The Payment and Settlement Systems Act, 2007 (“Payment Act”).
Indian Contract Act, 1872 (“Contract Act”).
The term ‘Currency’ has been defined under Section 2(h) of the Foreign Exchange Management Act, 1999 to include all currency notes, postal notes, postal orders, money orders, cheques, drafts, travelers cheques, letters of credit, bills of exchange and promissory notes, credit cards or such other similar instruments, as may be notified by the Reserve Bank.
It is clear that Bitcoin is not similar to any of the instruments mentioned in the definition, especially digital or virtual currencies. Section 2(m) of The Foreign Exchange Management Act, 1999, ‘foreign currency’ has been defined as any currency other than Indian currency.
Under Section 2 (q) of FEMA, “Indian currency” means currency which is expressed or drawn in Indian
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Vijay Dalmia
This document discusses the need for companies to have robust IT security, email, and internet usage policies. It notes that most organizations do not have adequate policies in place to protect data and prevent misuse. The document outlines why such policies are important from both a legal and risk management perspective. It discusses how policies help establish appropriate usage of company resources, prevent data theft, and ensure compliance with privacy laws. The document advises that policies should apply to all employees and others associated with the organization. It provides examples of objectives that policies can achieve, such as maintaining security and productivity. The conclusion emphasizes that policies help reduce legal risks and damage to an organization's reputation.
The right to be taken out of Police custody by being brought before a Magistrate is a right given in the interest of, the accused.
Arrest and detention can not be used to extract confession or as a means of compelling people to give information.
It prevents Police Stations being used as though they were prisons - a purpose for which they are unsuitable.
It affords an early recourse to a judicial officer independent of the Police on all questions of bail or discharge.
When the petitioner was arrested the Police Officer knew that he cannot complete his investigation within 24 hours, in such a case, Section 167(1), Cr.P.C. provides for the transmission forthwith of a copy of the entries in the Police Diary relating to the case and for the production of the accused before such Magistrate.
Special emphasis has to be laid on the words "forthwith" in Section 167(1).
The Criminal Procedure Code does not authorise detention by the police for 24 hours after the arrest.
A Police Officer making an arrest without warrant shall, without unnecessary delay take or send the person arrested before a Magistrate.
No Police Officer shall detain in custody a person arrested without warrant for a longer period than under all the circumstances of the case is reasonable, and such period shall not, in the absence of a special order of a Magistrate under Section 167, exceed twenty four hours exclusive of the time necessary for the journey from the place of arrest to the Magistrate's Court.
Thus, the twenty-four hours prescribed is the outermost limit beyond which a person cannot be detained in Police custody.
It is certainly not an authorization for the Police to detain him for twenty-four hours in their custody.
It is only in a case where a Police Officer considers that the investigation can be completed within the period of twenty-four hours that such detention for twenty-four hours is permitted. This is clear from Section 167(1), Cr.P.C.
When an arrested person is brought before a Magistrate, he has to decide whether
he should remand the person to Jail custody under Section 167(2) Cr.P.C. as requested by the Police and at the same time he has to decide whether the request of the person for bail should be granted.
In order to decide the question of remand, he must be satisfied on a perusal of the entries in the Police Diary that there were grounds for believing that the accusation or information against the accused was well founded and that the Police have exercised their right of arresting without warrant legally and further that it was necessary for the purpose of investigation that the accused should be remanded to custody.
Unless, the Magistrate is satisfied on all these points, he can- not remand the accused to Jail custody.
It. is for this purpose that Section 167(1) enjoins that a copy of the entries in the Police Diary should be transmitted to Court.
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia AdvocateVijay Dalmia
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia Advocate
Police Remand Judicial Remand & Default bail by Vijay Pal Dalmia Advocate - Terms, Conditions, Rights of Accused. Duty of Police and Courts
Indian approach on bitcoins, cryptocurrencies and blockchain – legal practica...Vijay Dalmia
This document provides an overview of blockchain technology and cryptocurrencies according to Indian law. It discusses that blockchain is distinct from cryptocurrencies, which are based on but not the same as blockchain. It outlines that while blockchain is legally recognized, cryptocurrencies are not considered legal tender in India and fall into a legal gray area. The document also examines how existing Indian laws around banking, currency, securities, and money transmission may apply to cryptocurrency.
Sanction for prosecution of offences under chapter xii of the income tax actVijay Dalmia
Under Chapter XII of the (Indian) Income Tax Act-1961, a person cannot be prosecuted for an offence Under Sections 275A, 275B, 276, 276A, 276B, 276BB, 276C, 276CC, 276D, 277, 277A or 278, except with the previous sanction of the Principal Commissioner or Commissioner or Commissioner(Appeals) or the appropriate Authority. Accordingly, in all cases of prosecution the fact of proper sanction by a competent authority is sine qua non, for initiating prosecution against an offender by the Income Tax Authorities. The issue of valid previous sanction becomes important, and may be taken as a defense by the accused during the course of trial. Following are the important points, which are to be considered, while granting sanction in any matter:
Reasonable security practices and procedures and sensitive personal data or i...Vijay Dalmia
The document discusses India's Information Technology Act and the Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules introduced in 2011. The rules aim to protect personal data and information by requiring companies to establish privacy policies, obtain consent for data collection and use, provide access to information, and implement security practices. Companies that do not comply could face penalties including paying compensation for damages under the IT Act.
Guide for de-mystifying law of trade mark enfocrement and litigation in indiaVijay Dalmia
The document provides an overview of trademark litigation law in India. It discusses several key points:
1) Trademarks can be protected in India through registration or as unregistered marks via infringement or passing off lawsuits.
2) Rights in trademarks can be acquired via registration, first adoption and continuous bona fide use, or assignment.
3) Registered trademarks may face cancellation petitions or opposition during registration. Unregistered marks rely on passing off claims.
4) Registration does not preclude passing off claims, as marks can still be challenged on grounds like prior use or registration.
IPR Enforcement in India through Criminal Measures - By Vijay Pal DalmiaVijay Dalmia
This document summarizes Indian laws relating to intellectual property including trademarks, copyrights, patents, industrial designs, geographical indications, and internet/information technology. It outlines the criminal statutes and procedures for IP infringement cases, noting that infringement is a cognizable offense allowing police to directly file cases. Upon conviction, penalties include imprisonment up to 3 years and fines up to Rs. 200,000 for trademarks, and minimum 6 month imprisonment and Rs. 50,000 fine for copyright. Special provisions also address copyright enforcement authorities in various states.
The document summarizes the process of criminal trials in India. It outlines the key laws governing criminal procedure and offenses in India, including the Code of Criminal Procedure, Indian Penal Code, and Indian Evidence Act. It then provides a flow chart depicting the typical stages of a criminal investigation and trial in India, from police investigation and filing charges to court proceedings, potential appeals, and outcomes of acquittal or conviction. Key concepts in Indian criminal law like bailable vs. non-bailable offenses, anticipatory bail, and cognizable vs. non-cognizable cases are also defined for context.
LAW OF THE SEMICONDUCTOR INTEGRATED CIRCUITS IN INDIA By Vijay Pal DalmiaVijay Dalmia
This document discusses Indian laws regarding the registration and protection of semiconductor integrated circuit layout designs. It outlines the key provisions of the Semiconductor Integrated Circuits Layout-Design Act, 2000, including definitions, registration procedures, opposition processes, rights conferred, infringement exceptions, penalties for infringement, and jurisdictional filing requirements. The layout-design is registered for 10 years and confers exclusive rights and remedies against unauthorized reproduction and distribution.
Reasonable security practices and procedures and sensitive personal data or i...Vijay Dalmia
The document summarizes key aspects of data protection law in India. It outlines the Information Technology Act of 2000 and its amendments in 2008 that introduced provisions for protecting personal data. The Ministry of Communications and Information Technology then promulgated the Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules in 2011 under these acts. The rules define sensitive personal data and set forth requirements for companies regarding privacy policies, consent, data access, security practices, and more to protect Indian citizens' personal information.
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
Information Technology Policy for Corporates is the need of the hour as organisations, are continuously at a stake for violation of information technology laws, commission of cyber crimes, sexual harassment, e-mail violations, and misuse of internet and intranet.
This document summarizes intellectual property laws and enforcement in India. It outlines the main forms of IP rights protected, including trademarks, copyrights, patents, industrial designs, and geographical indications. Registration is required for patents, industrial designs, and geographical indications but not for trademarks and copyrights. Registration confers monopoly rights and shifts the burden of proof to the opposing party in litigation. Civil remedies for IP infringement include injunctions, damages, seizure of infringing materials, and pre-trial asset preservation. Criminal remedies include fines and imprisonment. Interim injunctions are a key remedy to maintain the status quo. The document also discusses opposition and cancellation proceedings, domain name disputes, trade secret protection approaches, Anton Pillar orders, and highlights some
This document provides an overview of patent law from an Indian perspective. It defines what a patent is, outlines the key benefits and requirements for obtaining a patent in India, and describes the patent application and granting process. The document also discusses what can and cannot be patented, infringement issues, and how patents can provide strategic advantages for companies.
1. The document discusses wills in the Indian perspective, including the meaning and procedure of wills under Indian law. It defines the key characteristics of wills and different types of wills such as conditional, joint, mutual, and concurrent wills.
2. It outlines the advantages of making a will, eligibility requirements, the role and selection of executors, and the necessity of appointing an executor. The document also discusses the registration, deposit, revocation and alteration of wills.
3. The enforcement of wills through probate and letters of administration is explained, along with the defined meanings and necessity of obtaining probate or letters of administration under Indian law.
Corporate Governance : Scope and Legal Frameworkdevaki57
CORPORATE GOVERNANCE
MEANING
Corporate Governance refers to the way in which companies are governed and to what purpose. It identifies who has power and accountability, and who makes decisions. It is, in essence, a toolkit that enables management and the board to deal more effectively with the challenges of running a company.
सुप्रीम कोर्ट ने यह भी माना था कि मजिस्ट्रेट का यह कर्तव्य है कि वह सुनिश्चित करे कि अधिकारी पीएमएलए के तहत निर्धारित प्रक्रिया के साथ-साथ संवैधानिक सुरक्षा उपायों का भी उचित रूप से पालन करें।
A Critical Study of ICC Prosecutor's Move on GAZA WarNilendra Kumar
ICC Prosecutor Karim Khan's proposal to its judges seeking permission to prosecute Israeli leaders and Hamas commanders for crimes against the law of war has serious ramifications and calls deep scrutiny.
The presentation deals with the concept of Right to Default Bail laid down under Section 167 of the Code of Criminal Procedure 1973 and Section 187 of Bharatiya Nagarik Suraksha Sanhita 2023.
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...AHRP Law Firm
Law Number 13 of 2003 on Manpower has been partially revoked and amended several times, with the latest amendment made through Law Number 6 of 2023. Attention is drawn to a specific part of the Manpower Law concerning severance pay. This aspect is undoubtedly one of the most crucial parts regulated by the Manpower Law. It is essential for both employers and employees to abide by the law, fulfill their obligations, and retain their rights regarding this matter.
2. NATURE OF INTERNET
No physical boundaries.No physical boundaries.
No writing.No writing.
No handwritten signature, seals, thumbNo handwritten signature, seals, thumb
impression.impression.
Lack of Security, risk factor high.Lack of Security, risk factor high.
Taxes, rules, regulations, betweenTaxes, rules, regulations, between
countries not clearly defined.countries not clearly defined.
Technology fast changing.Technology fast changing.
Ignorance of Common man aboutIgnorance of Common man about
technology.technology.
No single authority over Internet whoNo single authority over Internet who
can decide.can decide.
3. ELECTRONIC CONTRACT
There are three main methods of contractingThere are three main methods of contracting
electronically:electronically:
Electronic mail, or e-mailElectronic mail, or e-mail
Website ContractsWebsite Contracts
Online/Click to Agree ContractsOnline/Click to Agree Contracts
4. CLASSIFICATION AS TO
SUBJECT MATTER
Sale of physical goodsSale of physical goods - goods are- goods are
ordered over the Internet with paymentordered over the Internet with payment
via the Internet but delivery occurs in thevia the Internet but delivery occurs in the
usual way;usual way;
Sale of digitised productsSale of digitised products - goods such- goods such
as software can be ordered, paid foras software can be ordered, paid for
and delivered on-line;and delivered on-line;
Supply of servicesSupply of services - examples include- examples include
electronic banking, sale of shares,electronic banking, sale of shares,
financial advice, or consumer advice.financial advice, or consumer advice.
5. ESSENTIALS OF AN ELECTRONIC
CONTRACT
Offer and Acceptance, throughOffer and Acceptance, through
EmailEmail
Website FormsWebsite Forms
Online AgreementsOnline Agreements
Lawful ConsiderationLawful Consideration
Selling a pornographic movieSelling a pornographic movie
Intention to create legal relationshipIntention to create legal relationship
Website providing Cultural informationWebsite providing Cultural information
6. ESSENTIALS OF AN ELECTRONIC
CONTRACT
Competent to ContractCompetent to Contract
How to ascertain the age online???How to ascertain the age online???
Free ConsentFree Consent
No Real-Time InteractionNo Real-Time Interaction
Lawful ObjectLawful Object
Possibility of performancePossibility of performance
7. ISSUES IN ELECTRONIC
CONTRACTS
AuthenticityAuthenticity
As to source or origin of the communicationAs to source or origin of the communication
IntegrityIntegrity
As to accuracy and totality of the communicationAs to accuracy and totality of the communication
Non repudiationNon repudiation
As not being able to deny the communicationAs not being able to deny the communication
Writing and signatureWriting and signature
ConfidentialityConfidentiality
As to control the disclosure of information duringAs to control the disclosure of information during
transmissiontransmission
8. ISSUES IN ELECTRONIC
CONTRACTS
Use of Electronic SignaturesUse of Electronic Signatures
Digital SignatureDigital Signature
Bio-metric MeasuresBio-metric Measures
9. INFORMATION TECHNOLOGY
ACT, 2000
Concept of Originator and AddresseeConcept of Originator and Addressee
Acknowledgement of receipt ofAcknowledgement of receipt of
Record/data/imformationRecord/data/imformation
Time of Dispatch and ReceiptTime of Dispatch and Receipt
““Instantaneous” CommunicationsInstantaneous” Communications
POSTAL RULEPOSTAL RULE
Applicable to email contracts??Applicable to email contracts??
Applicable to transaction over world wide webApplicable to transaction over world wide web
(www)???(www)???
10. ORGINATOR
AnAn OriginatorOriginator is a person who:is a person who:
sends, generates, stores or transmits any electronicsends, generates, stores or transmits any electronic
message ormessage or
causes any electronic message to be sent, generated,causes any electronic message to be sent, generated,
stored or transmitted to any other person.stored or transmitted to any other person.
An electronic record shall be attributed to theAn electronic record shall be attributed to the
originator—originator—
if it was sent by the originator himself;if it was sent by the originator himself;
by a person who had the authority to act on behalf ofby a person who had the authority to act on behalf of
the originator in respect of that electronic record; orthe originator in respect of that electronic record; or
by an information system programmed by or on behalf ofby an information system programmed by or on behalf of
the originator to operate automatically.the originator to operate automatically.
Does not include an intermediary like ISP etc.Does not include an intermediary like ISP etc.
11. ACKNOWLEDGEMENT OF
RECEIPT
AnAn AddresseeAddressee means a person who ismeans a person who is
intended by the originator to receive theintended by the originator to receive the
electronic recordelectronic record
but does not include any intermediarybut does not include any intermediary
Where the originator has not agreed withWhere the originator has not agreed with
the addressee that the acknowledgment ofthe addressee that the acknowledgment of
receipt of electronic record be given in areceipt of electronic record be given in a
particular form or by a particular method,particular form or by a particular method,
an acknowledgment may be given by:an acknowledgment may be given by:
any communication by the addressee, automatedany communication by the addressee, automated
or otherwise; oror otherwise; or
any conduct of the addressee, sufficient toany conduct of the addressee, sufficient to
indicate to the originator that the electronicindicate to the originator that the electronic
record has been received.record has been received.
12. TIME AND PLACE OF DISPATCH
AND RECEIPT
Time of Dispatch:Time of Dispatch: Dispatch of an electronic recordDispatch of an electronic record
occurs, "when it enters a computer resource outsideoccurs, "when it enters a computer resource outside
the control of the originator", unless agreed to thethe control of the originator", unless agreed to the
contrary between the originator and the addressee.contrary between the originator and the addressee.
13. TIME AND PLACE OF DISPATCH
AND RECEIPT
Time of Receipt:Time of Receipt:
If the addressee has designated a computerIf the addressee has designated a computer
resource for the purpose of receiving electronicresource for the purpose of receiving electronic
records:records:
receipt occurs at the time when the electronicreceipt occurs at the time when the electronic
record enters the designated computerrecord enters the designated computer
resource; orresource; or
if the electronic record is sent to a computerif the electronic record is sent to a computer
resource of the addressee that is not theresource of the addressee that is not the
designated computer resource, receipt occursdesignated computer resource, receipt occurs
at the time when the electronic record isat the time when the electronic record is
retrieved by the addressee;retrieved by the addressee;
If the addressee has not designated a computerIf the addressee has not designated a computer
resource along with specified timings, if any, receiptresource along with specified timings, if any, receipt
occurs when the electronic record enters theoccurs when the electronic record enters the
computer resource of the addressee.computer resource of the addressee.
Unless agreed to the contraryUnless agreed to the contrary
14. TIME AND PLACE OF DISPATCH
AND RECEIPT
Place of Dispatch and Receipt:
an electronic record is deemed to be despatched atan electronic record is deemed to be despatched at
the place where the originator has his place ofthe place where the originator has his place of
business,business,
An electronic record is deemed to be received at theAn electronic record is deemed to be received at the
place where the addressee has his place of businessplace where the addressee has his place of business..
15. JURISDICTIONAL ISSUES
Depends onDepends on where the contract haswhere the contract has
been formed (place of contract)been formed (place of contract)
Difficult and Uncertain to determineDifficult and Uncertain to determine
Cross-Border TransactionsCross-Border Transactions
Different National RulesDifferent National Rules
EmailEmail
Websites having multiple servers inWebsites having multiple servers in
different jurisdictionsdifferent jurisdictions
Mirror WebsitesMirror Websites
17. TYPES OF ELECTRONIC
CONTRACT
There are several types of contracts that personsThere are several types of contracts that persons
engaged in the business of manufacture ofengaged in the business of manufacture of
software or hardware would, in course of theirsoftware or hardware would, in course of their
business, be required to enter into. These are:business, be required to enter into. These are:
Click Wrap ContractClick Wrap Contract
Source Code Escrow AgreementsSource Code Escrow Agreements
Software Development & Licensing AgreementsSoftware Development & Licensing Agreements
Shrink Wrap ContractShrink Wrap Contract
Employment ContractsEmployment Contracts
Consultant AgreementsConsultant Agreements
Contractor AgreementsContractor Agreements
Sales, Re-Seller & Distributor AgreementsSales, Re-Seller & Distributor Agreements
Non-disclosure AgreementsNon-disclosure Agreements
18. CLICK WRAP CONTRACT
A "click-wrap agreement" is a Web version of theA "click-wrap agreement" is a Web version of the
shrink-wrap licensing agreement. It comes intoshrink-wrap licensing agreement. It comes into
force when an online buyer or user clicks on theforce when an online buyer or user clicks on the
'I Agree' button on the webpage to purchase or'I Agree' button on the webpage to purchase or
download a program. The term "click-wrap" isdownload a program. The term "click-wrap" is
derived from the fact that such onlinederived from the fact that such online
agreements often require clicking with a mouseagreements often require clicking with a mouse
on an on-screen icon or button to signal a party'son an on-screen icon or button to signal a party's
acceptance of the contract. Among otheracceptance of the contract. Among other
things, click-wrap agreements are used to:things, click-wrap agreements are used to:
establish the terms for the download and use ofestablish the terms for the download and use of
software over the Internet;software over the Internet;
set forth a Web site's Terms of Service,set forth a Web site's Terms of Service, i.e.,i.e., the rules bythe rules by
which users may access the Web site or a portion ofwhich users may access the Web site or a portion of
the Web site such as a chat or message service; andthe Web site such as a chat or message service; and
establish the terms for the sale of goods and servicesestablish the terms for the sale of goods and services
online.online.
19. CLICK WRAP CONTRACT
Type and ClickType and Click where the user must typewhere the user must type
"I accept" or other specified words in an"I accept" or other specified words in an
on-screen box and then click a "Submit"on-screen box and then click a "Submit"
or similar button. This displaysor similar button. This displays
acceptance of the terms of theacceptance of the terms of the
contract. A user cannot proceed tocontract. A user cannot proceed to
download or view the target informationdownload or view the target information
without following these steps.without following these steps.
Icon ClickingIcon Clicking where the user must clickwhere the user must click
on an "OK" or "I agree“ button on aon an "OK" or "I agree“ button on a
dialog box or pop-up window. A userdialog box or pop-up window. A user
indicates rejection by clicking “Cancel”indicates rejection by clicking “Cancel”
or closing the window.or closing the window.
20. SOURCE CODE ESCROW
AGREEMENTS
A Source Code Escrow Agreement is anA Source Code Escrow Agreement is an
agreement betweenagreement between
the software owner,the software owner,
the party receiving the license andthe party receiving the license and
the escrow agent.the escrow agent.
It is for the deposit of the source code of aIt is for the deposit of the source code of a
software with a third party escrow agent.software with a third party escrow agent.
Escrow is typically requested by a party licensingEscrow is typically requested by a party licensing
software (the licensee), to ensure maintenancesoftware (the licensee), to ensure maintenance
of the software.of the software.
The software source code is released to theThe software source code is released to the
licensee if the licensor files for bankruptcy orlicensee if the licensor files for bankruptcy or
otherwise fails to maintain and update theotherwise fails to maintain and update the
software as promised in the software licensesoftware as promised in the software license
agreement.agreement.
21. SOFTWARE DEVELOPMENT &
LICENSING AGREEMENTS
It is also known asIt is also known as End-User LicenseEnd-User License
Agreement.Agreement.
An End User License Agreement is aAn End User License Agreement is a
legal contract between thelegal contract between the
manufacturer and/or the author and themanufacturer and/or the author and the
end user of an application.end user of an application.
The End User License Agreement detailsThe End User License Agreement details
how the software can and cannot behow the software can and cannot be
used and any restrictions that theused and any restrictions that the
manufacturer imposesmanufacturer imposes
For example, most such agreements ofFor example, most such agreements of
proprietary software prohibit the userproprietary software prohibit the user
from sharing the software with anyonefrom sharing the software with anyone
else.else.
22. SHRINK WRAP CONTRACT
The term "shrink wrap agreement" refers to theThe term "shrink wrap agreement" refers to the
purchase agreements that are attached topurchase agreements that are attached to
shipped products, usually bound by shrink wrapshipped products, usually bound by shrink wrap
(plastic wrapping) that contain terms and(plastic wrapping) that contain terms and
conditions. Shrink wrap agreements can includeconditions. Shrink wrap agreements can include
the following terms:the following terms:
licenseslicenses
rights of userights of use
fees and paymentsfees and payments
forum clausesforum clauses
warranties andwarranties and
limitations of liability.limitations of liability.
Are Shrink Wrap Agreements Enforceable???Are Shrink Wrap Agreements Enforceable???
23. EMPLOYMENT CONTRACTS
The employment contracts are made for the purpose
of governing the relationship between the
management and the employees of the company.
There contracts are need to be drafted carefully,
keeping in mind the interest of the company, as well
as the law relating to the enforcement of such
contract.
24. CONSULTANT AGREEMENTS
There is a fast growing trend, to hire persons asThere is a fast growing trend, to hire persons as
consultants rather than take them on the roll of theconsultants rather than take them on the roll of the
company. In such case it would be necessary tocompany. In such case it would be necessary to
execute a ‘Consultant contract’. It is very similar to theexecute a ‘Consultant contract’. It is very similar to the
employee agreement.employee agreement.
25. CONTRACTOR AGREEMENTS
Similar to the consultant contract the companiesSimilar to the consultant contract the companies
prefer to enter into contractor agreement in case ofprefer to enter into contractor agreement in case of
the smaller companies. Care must be taken in regardthe smaller companies. Care must be taken in regard
to the maintainance of the confidentiality of theto the maintainance of the confidentiality of the
imformation that such contract employees would beimformation that such contract employees would be
exposed to, as well as standard protection of theexposed to, as well as standard protection of the
proprietary information.proprietary information.
26. SALES, RE-SELLER &
DISTRIBUTOR AGREEMENTS
In addition to the employees hired forIn addition to the employees hired for
the development of its products,the development of its products,
imformation technology companies alsoimformation technology companies also
engage personnel for the sales andengage personnel for the sales and
marketing of the products developmentmarketing of the products development
in such companies. The company wouldin such companies. The company would
enter into re-seller and distributionenter into re-seller and distribution
agreement with those persons. Careagreement with those persons. Care
must be take to ensure that restrictionsmust be take to ensure that restrictions
on territory, price, classes of persons foron territory, price, classes of persons for
whom goods are bought and sold.whom goods are bought and sold.
27. NON-DISCLOSURE
AGREEMENTS
Under certain circumstances, software companiesUnder certain circumstances, software companies
working on a specific project, would be requiredworking on a specific project, would be required
to obtain employee non-discloser agreements fromto obtain employee non-discloser agreements from
their employees, in respect of the project upontheir employees, in respect of the project upon
workingworking
28. Vaish Associates Advocates
New Delhi Mumbai Gurgaon Bengaluruǀ ǀ ǀ
Celebrating 40 years of professional excellence
IPR & IT Laws Practice Division
1st & 11th
Floors Mohan Dev Building 13, Tolstoy Marg New Delhi 110001 (India)ǀ ǀ ǀ
Phone: +91 11 49292532 (Direct)
Mobile: +91 9810081079
Phone: +91 11 49292525 (Board)
Fax: +91 11 23320484
www.vaishlaw.com
email:- vpdalmia@vaishlaw.com
Intellectual Property & Information Technology Laws Division