Smart Law in Digital India - Legal, Regulatory & Governance Challenges July 24, 2016 Sajai Singh Partner J. Sagar Associates advocates & solicitors Ahmedabad.

Slides:



Advertisements
Similar presentations
EXPERIENCES OF OTHER COUNTRIES IN REGULATION OF PAYMENT CARDS SYSTEM This section reviews the regulatory experiences of other countries with respect to.
Advertisements

Today’s Strategic Imperative: E-Business Annika Burton Matt Richardson Shantell Howard.
Mobile Technology & Cyber Threats Promoting E-Commerce in Ghana Ruby Saakor Tetteh Ministry of Trade & Industry, Ghana Sixth Annual African Dialogue Consumer.
E-Commerce Thuyduong Nguyen IT Spring 2003 April 28, 2003.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
E-Commerce: Regulatory, Ethical, and Social Environments
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
By Mr. Abdalla A. Shaame.  ICT is an acronym that stands for Information Communications Technology  However, apart from explaining an acronym, there.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
Information Systems CS-507 Lecture 41
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Information Warfare Playgrounds to Battlegrounds.
What is e-government? E-Government refers to the use by government agencies of information technologies (such as Wide Area Networks, the Internet, and.
LEGAL CHALLENGES & STRATEGIES IN E-PROCUREMENT IN CONSTRUCTION
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Copyright © 2005 Pearson Education Inc. Marketing in the Digital Age Chapter 3 PowerPoint slides Express version Instructor name Course name School name.
US Perspectives on Internet Policy Opportunities and Challenges in 2010 David P. McClure President & CEO US Internet Industry Association.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
E-BUSINESS.
Electronic Commerce By: Shannon McManus. Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually.
Mission: NCSA’s mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Information Warfare Playgrounds to Battlegrounds.
Presented by Umang Das April 30, E-Governance… Three important stake holders Government,Citizens and Businesses/Interes t groups Four Main Objectives.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School THE INTERNET AND ELECTRONIC COMMERCE LESSON 10.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
TV or Not TV Eli Noam Columbia University, Columbia Institute for Tele-Information FCC Washington, DC March
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Principles of E-business. Two factors that significant contribute to the success of e-business are: the trust people place in the online businesseshow.
Protecting Data, Sharing Information Graham Wakerley: Director
A policy framework for an open and trusted Internet
4 THE DIGITAL FIRM: ELECTRONIC COMMERCE & ELECTRONIC BUSINESS.
Date: March. 30, Monday Evening.
PRESENTATION ON THE ONLINE GAMBLING - REGULATION 2 March 2012
21st Century Workforce G2G (government to other governments)
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Chapter 10 Cyberlaw, Social Media, and Privacy
Information Technology Sector
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Researcher and Lecturer Assistant at FCI Assiut University
E-Commerce: Doing Business on the Internet
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Trends in my profession, Information Technology
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
Chapter 2: Introduction to Electronic Commerce
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
LEGAL & ETHICAL ISSUES InsurTech & Health Insurance Providers
Year 10 ICT ECDL/ICDL IT Security.
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
E-Commerce: Regulatory, Ethical, and Social Environments
13th International Microinsurance Conference
Overview of Electronic Commerce
GOVERNANCE AND ICT by Puneet Shukla N. R. E. C
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
The impossible task of regulating IOT
Global megatrends (relevant for our business)
Introduction to e-Business Chapter 1
Trust by Design: The Internet of Things
IT and Society Week 2: Privacy.
Presentation transcript:

Smart Law in Digital India - Legal, Regulatory & Governance Challenges July 24, 2016 Sajai Singh Partner J. Sagar Associates advocates & solicitors Ahmedabad | Bengaluru | Chennai | Gurgaon | Hyderabad | Mumbai | New Delhi ISACA - 19th Annual Karnataka Conference

Data harvested in a networked and sensor-loaded India, used to improve efficiencies, informed planning and enhance service delivery - New Concept in India Cybersecurity, in an interconnected world Cyber forensics & Law enforcement Consumer Protection Public-Private Partnerships Privacy & Data Protection Liability Bad Code & Glitches Neutrality & Objectivity Cloud Computing Introduction

What Makes India Digital? Deployment of connected devices & Internet of Things (IoT) Machine to Machine (M2M) communication 4 th Industrial Revolution! –India & the Industrial Internet Big Data created – volume, velocity and variety Legal tools, which provide closest analogies from past E-Governance –Technology to improve Government efficiency –Reinvent Government’s relationship with citizens –Citizen empowerment –Less corruption –Increased transparency –Greater convenience –Revenue growth –Cost reduction

Security Threats impeding Digital India Government data and system practically exposed to public realm through Internet Criminals can now operate on a global scale Security threats (individual, Government and to critical infrastructure) come in many forms … –Errors & Omissions –Fraud –Employee sabotage –Loss of physical support –Malicious hackers –Malicious code –Industrial espionage –Foreign Government espionage –Identity Theft and Impersonation

Consumer Protection Public expectation from Government will be higher –Greater demand for more accountability and proportional liability Information deficiencies, specially in view of augmented reality After-sales difficulties Fraud and unethical conduct –Identity deception –False advertising –Receiving payment without intending to supply –Scams Online payment challenges Apportionment of liability between consumers and service providers Privacy problems

Public-Private Partnership Issues  Meshing of young technology with old infrastructure in commercial partnerships  Several stakeholders involved:  Who would one be contracting with?  Would may be sued? Lack of transparency …  May create conflicts amongst the stakeholders involved  Who owns (and who controls) the (big) data created?  Data may be shielded under the veil of ‘trade secrets’

How ‘public’ is privacy in Digital India? Increased and undue surveillance Who will be responsible for the constant collection swapping, processing, storing and exchanging of personal data? Privacy & Data Protection

Issues of Liability  Potential fragility of digital infrastructure  Flawed algorithms may lead to resource wastage  Hacking of essential infrastructure  Self-driving car crash liability?  Legal validity of electronic transactions  Contracts with minors  Stamping requirements  Online contracting

Net Neutrality  The principle of net neutrality states that internet users should be able to access all content on the internet without being discriminated by ISPs  All websites to be treated equally  All applications accessed at same internet speed  All applications accessible for the same cost

Cloud Computing (Big) Data loss Service disruption loss Access and Usage Restrictions IPR Aspect Jurisdictional Issues

Thank You … Sajai Singh