ELECTRONIC COMMUNICATION ACT 2000 Raashida & Sangeetha.

Slides:



Advertisements
Similar presentations
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
Advertisements

Digital Stamps of Companies Tarvi Martens SK, Estonia.
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
The Legal Documents Archive of Austria's Lawyers Ra Prof. Dr. Wolfgang Heufler.
Dematerialization of Organisations’ Key Business Processes Security and e-Invoicing ATHENEE PALACE HILTON, Bucuresti September 21 st 2004 Genovel Iovu.
Digital Signatures Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Digital.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Adviser’s Control Panel. Explanation of our “My Tracer” Control Panel for ABSA Advisers Let’s have a look at the Functionality.
 The act contributes in making UK the best and safest place to electronic commerce.  Aims to build confidence in electronic communications.  Creates.
Opening Presentation of Notary Reqs 8/5/2004 Tobias Gondrom.
Encryption and the Law: The need for a legal regulatory framework for PKI Yee Fen Lim Department of Law Macquarie University.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
DIGITAL SIGNATURE AND ELECTRONIC DOCUMENTS IN ITALY Prof. Pierluigi Ridolfi AIPA Authority for Information Technology in the Public Administration V. Solferino,
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
“Electronic Payment System”
Ecommerce Applications 2009/10 Session 31 E-Commerce Applications E-payment.
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Cyber Law & Islamic Ethics
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
Legislation, Regulation, Guidelines
8 Nob 06 / CEN/ISSS ETSI STF 305: Procedures for Handling Advanced Electronic Signatures on Digital Accounting CEN/ISSS Workshop.
May 28, 2002Mårten Trolin1 Protocols for e-commerce Traditional credit cards SET SPA/UCAF 3D-Secure Temporary card numbers Direct Payments.
E-commerce Law Electronic signatures and security.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Copyright © 2004 by Nelson, a division of Thomson Canada Limited CANADIAN BUSINESS AND THE LAW Second Edition by Dorothy Duplessis Steven Enman Shannon.
Secure Electronic Transaction (SET)
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Mr Alan SIU, Deputy Secretary for Information Technology and Broadcasting A Clear Legal Framework for Electronic Transactions.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Meganet Corporation VME Sign Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Security and Privacy: Panel of Perspectives Rick Skeel University of Oklahoma.
Digital Signatures and Digital Certificates Monil Adhikari.
Module 7 – SET SET predecessors iKP, STT, SEPP. iKP Developed by IBM Three parties are involved - Customer, Merchant, and Acquirer Uses public key cryptography,
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
1 CS 5339 Web-Based Systems Contract Law. 2 General Contracting Principles Mixture of common law and code law Uniform Commercial Code (model law) Many.
CREATING NEW VENDORS  Departmental Administrative Specialist should verify that the vendor is not an existing vendor using XK03 in IRIS.  All NEW vendors.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
TAG Presentation 18th May 2004 Paul Butler
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
TAG Presentation 18th May 2004 Paul Butler
Fraud Detection and Prevention
Class 2 Digital Signature Certificate Noida
Using eSignature for Signing IBM Contracts
Certificates An increasingly popular form of authentication
ELECTRONIC SIGNATURES
ELECTRONIC SIGNATURES
Presentation transcript:

ELECTRONIC COMMUNICATION ACT 2000 Raashida & Sangeetha

WHY WAS THE ACT NEEDED?  They wanted people to feel secure that any electronic documentation or electronic contracts were as genuine and legally binding as those on paper. Where money is involved, businesses need to be confident that documents transmitted electronically such as orders or invoices are genuine and have not been altered in any way. They also need to feel secure that others cannot access any confidential or personal information transmitted electronically.  The electronic communications act 2000 was passed with the intention of creating framework that would provide that confidence to individuals and businesses.

THE ELECTRONIC COMMUNICATIONS ACT  There are two parts to the Electronic Communications Act Part 1 Allows Cryptography serveries in the UK Part 2 Allows Electronic Signatures  Both of these are important for transactions to take place electronically (e.g. via the internet)  It also means that legislations and contracts don’t can be electronically updated and not by hand.

CRYPTOGRAPHY  It is a method of scrambling information, this increases security. Therefore it can only be accessed by who needs to access it.  Its been used by banks and the government for years. It could be helpful to other companies that electronically trade.  The government has a list of cryptography providers. These can be an option for companies, they don’t have to use those, but as trust is required they might wish to do so.

ELECTRONIC SIGNATURES  An electronic signature is a digital mark, code or other symbol that is associated with a particular individual. It can be used to sign an electronic document and is used in place of a hand written signature.  It can confirm that the communication is authentic and hasn’t been tampered with.  The owner of the electronic signature can be checked and verified in several ways, for example through a certificate provided by a special provider.

BENEFITS  Businesses and individuals engaging in e-commerce can feel secure that their transactions are safe and secure.  Businesses and individuals can feel secure that documents or contacts signed with an electronic signature are as legally binding as those signed by hand.

PROBLEMS WITH THE ACT  Even though this act means that digital signatures have been legally binding for many years, most people have never heard of them or are still suspicious about their use. It is likely to take many years before their use becomes acceptable and commonplace.  Many people still distrust the security of digital signatures. The very first official digital signature used after passing the act was ‘hijacked’ within 24 hours of its creation.