Business Law Module 4 Module IV: Information Technology Act 2000

Slides:



Advertisements
Similar presentations
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Advertisements

TWO DIFFERENT DEPARTMENTS OF THE GOVERNMENT OF INDIA GOVERN THE TELECOMMUNICATIONS SECTOR AND THE INFORMATION TECHNOLOGY SECTOR THESE TWO DEPARTMENTS.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Northside I.S.D. Acceptable Use Policy
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By – Sagar Rahurkar.
Confidentiality and Privacy Controls
PRIVACY COMPLIANCE An Introduction to Privacy Privacy Training.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.
Cyber Crime: Judicial Perspective By Talwant Singh Addl. Distt. & Sessions Judge Delhi
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Your Rights Under the Internet Law By: Sannita S. Lam.
Chapter 23 Checks and Banking In the Digital Age
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
INTERNET and CODE OF CONDUCT
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Dr. Diganta Biswas School of Law Christ University, Bangalore.
General Purpose Packages
INFORMATION TECHNOLOGY ACT. Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Unauthorized copying or distribution of this material is strictly prohibited IT Act 2000 Amendments in 2008.
Business Law for the Entrepreneur and Manager
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
HIPAA PRIVACY AND SECURITY AWARENESS.
Employee Guidelines for Acceptable Use of Technology Resources.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Chapter 17 E-Commerce and Digital Law
Indian Penal Code Act, 1860 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled Legal Expert with.
The law on Intermediary Liability in India
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
DIGITAL SIGNATURE.
Lesson 15 : Networks And The Internet
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Cybercrime What is it, what does it cost, & how is it regulated?
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
Cyber Law And Ethics And Ethics.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
SECURITY STANDARDS AND CYBER LAWS
TOPIC: Meaning of Negotiable Instruments
Legal And Policy Framework
IT ACT 2000 and 2008 Important Sections Awareness Presentation
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
Cyber Crime Laws and Mitigation of Cyber Crimes in Corporate Companies
Confidentiality and Privacy Controls
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Presentation transcript:

Business Law Module 4 Module IV: Information Technology Act 2000 Technical terms, Electronic Governance attribution and acknowledgement of electronic records, certifying authorities The contents of slides numbers 8, 9,10, & 18 to 23---refer to electronic governance.

Information Technology Act 2000 The IT Act was enacted based on the UNCITRAL (United Nations Commission On International Trade Law Model Law). With the Model Law it has also considered the Committee recommendations on the Electronic Funds Transfer Schemes. The IT Act is made applicable to the whole of India including the State of Jammu and Kashmir and it is made applicable to the cyber crimes committed in and outside India.

Objects of the IT Act 2000 Legal recognition to transactions carried out by means of electronic data interchange. Promote electronic commerce (e-commerce), which is an alternative to the paper based method of communication and storage of information. To facilitate e-filing of documents with the government departments and agencies. To bring suitable amendments to the existing laws in pursuit of the objectives of the IT Act

Exclusion of certain transactions The IT Act shall Not be applicable to the Negotiable Instruments except for the Cheques. Not be applicable to the Power of Attorney. Not be applicable to Trusts. Not be applicable to a Will. Not be applicable to the transfer of immovable property or any interest in such property.

Online Contract To be determined by the traditional laws like Indian Contract Act, 1872. The rules relating to offer and acceptance similar to that of the IC Act. ( Based on the decision of Bhawandas vs. Girdharilal) included the e-mail contracts Determination of the liability of the parties is also similar to that of Indian Contract Act. Time and place of contract is also determined by the (Section 4 of the IC Act and Section 13 of the IT Act together deals with the formation of the e-contracts)

Kinds of Online contracts Click Wrap or Web Wrap Contracts is commonly used for the e-commerce transactions. The transaction takes place when the party agrees to buy the product or service by clicking the “ I agree” or “ I Accept” button on the virtual key board. The party has the opportunity to review the terms and conditions before accepting the offer. It is affirmatively assenting and the contract is enforceable in the court of law.

Shrink Wrap Contracts Usually used for the purpose of business transactions, that are based on the licensee user products e.g.. Software Products. The product has to be returned within 7 to 30 days of buying ( Cooling off). The contracts entered into by e-mails are also valid contracts, enforceable in the court of law, if the it is satisfactorily proved, as per the rules in the Indian Evidence Act. For all the various kinds of the online contracts, the consumer laws are applicable.

Authentication and Acceptance of Electronic Records It is a record which is communicated and maintained by means of electronic equipment. The purpose of such records is to keep the evidence in the business activity. Electronic records are recognized as equivalent to a written document. Even e evidence is accepted as valid evidence. The Indian Courts have moved ahead by collecting evidence through video conferencing.

Digital signature (Electronic Signature) The phrase “DIGITAL SIGNATURE” is now a subset of Electronic Signature as per IT Amendment Act 2008 It is given a legal recognition to facilitate the growth of e-commerce. It is created with the help of the science of cryptography and with hash Function (Encryption and decryption) The digital signatures will have Private Key and a Public Key for the purpose of authentication. The authentication of the digital signature is by asymmetric crypto system. The digital signatures are equal to affixing a signature and accepted in the court.

The Acts Amended for the purpose of facilitating the IT Act, 2000 The Indian Penal Code, 1860. (Definition of Document and related sections) The Indian Evidence Act, 1972. (E-records to be admissible as Evidence) The Reserve bank of India Act, 1934. (Electronic Fund Transfers) The Negotiable Instruments Act, 1881. (Electronic, truncation and clearance of cheques) The Banker’s Book Evidence Act, 1891. (Ledgers books, day books, cash books account books etc acceptable if preserved in the electro magnetic storage devices. It needs certification)

Cyber Offences

Against the individual Harassment via e-mails Cyber stalking Obscene material Defamation Unauthorized access of the computer Email spoofing Cheating and Fraud

Against the individual property Transmitting Virus Net Trespass Unauthorized Control Intellectual property Crimes Time Thefts Data Privacy of employees and customers

Against the organisation Unauthorized Access and Control Possession of the unauthorized information Cyber Terrorism Distribution of pirated software. Data Theft

Against the society at large Pornography Trafficking Financial Crimes ( Internet Frauds) Sale of illegal articles Online gambling Forgery etc

Offences Specified under the IT Act, 2000 Damaging computers/ Data and networking Non- Compliance with the reporting system Unauthorized access Tampering Hacking Transmission of obscene material Misrepresentation False information in the Digital Signature Breach of Confidentiality Misuse of Digital Signature.

Information Technology Act Information Technology Act, 2000 saw some important changes through Information Technology (Amendment) Act, 2008. Important new terms like electronic signature and electronic signature certificate have been introduced. New offences have been introduced. For national security purposes some sections have been added.

Information Technology Act 2000 (Amendment 2008) Electronic Signature The term “Electronic Signature” means authentication of any electronic record by a subscriber by means of the electronic technique and includes digital signature. The term ‘electronic signature’. Now ‘digital signature’ has been made a subset of ‘electronic signature’. In the definition of ‘electronic signature’ it has been given that it includes ‘digital signature’. A subscriber may authenticate electronic records by electronic signature. The authentication was earlier possible only by digital signature. “Electronic Signature Certificate” means an Electronic Signature Certificate as per Sec 35 and includes “digital signature certificate” Secure Electronic Signatures should be ensured and security provisions are embodied in the amendment

Information Technology Act 2000 (Amendment 2008) “Communication Device” means Cell phones, personal digital assistance, or combination of both, or any other device used to communicate, send or transmit any text, video, audio or image. “Computer Network” means the interconnection of one or more computer or computer systems or communication device through—a) use of satellite or microwave, terrestrial line, wire, wireless or other communication media and b) terminals of a complex consisting of two or more interconnected computers or communication devices whether or not the interconnection is continuously maintained.

Information Technology Act 2000 (Amendment 2008) “Cyber Café” any facility from where access to internet is offered by any person in the ordinary course of business to the members of the public. “Cyber security” means protecting information, equipment, devices, computer, computer resource, communication device, and information stored therein from unauthorised access, use, disclosure, disruption, modification or destruction.

Information Technology Act 2000 (Amendment 2008) The Government may, for efficient delivery of services to the public through electronic mode , authorise by order, any service provider to set up, maintain and upgrade the computerised facilities and perform such other related services. Such service provider may be an individual, private agency, private company, sole proprietor firm or any other body or agency which has been granted government permission. They may collect, retain, and appropriate service charges even in the absence of specific provision in the Act. The Government may prescribe scale of service charges for specified activities.

Information Technology Act 2000 (Amendment 2008) Wherever audit is compulsory as per law, such audit can be conducted on the basis of electronic records Contract forms could be in electronic form Where a body corporate possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or gain to any person, such body corporate shall be liable to pay damages by way of compensation to the person so affected. No maximum limit of compensation is prescribed in the act

Information Technology Act 2000 (Amendment 2008) Reasonable Security practices means security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment as per agreement between the contracting parties or as per the prevailing law or as per government orders. Punishment for sending offensive messages through communication, service etc --imprisonment upto three years and with fine Punishment for dishonestly receiving stolen computer resource or communication device—imprisonment upto three years or with fine of Rs one lakh or with both

Information Technology Act 2000 (Amendment 2008) Punishment for Identity theft—Imprisonment for three years or with fine of Rs 1 lakh Punishment for cheating by personation by using computer resource—Imprisonment upto three years or with fine of Rs1 lakh Punishment for violation of Privacy—Imprisonment of three years or with fine of Rs 2 lakh or both Cyber terrorism—Imprisonment for life. Punishment for transmitting obscene materials– first offence—imprisonment of three years with fine of five lakh, second and subsequent offences—imprisonment of five years and a fine of Rs 10 lakh

Information Technology Act 2000 (Amendment 2008) Punishment for publishing or transmitting of materials containing sexually explicit act etc—first offence-Imprisonment of five years and fine of Rs10 lakh; second and subsequent offences –imprisonment of seven years and a fine of Rs 10 lakh The above nature of punishment is awarded for abuse of children by depicting them in sexually explicit act

Information Technology Act 2000 (Amendment 2008) Cyber Appellate Tribunal The name of Cyber Regulations Appellate Tribunal has been changed to Cyber Appellate Tribunal. Cyber Appellate Tribunal has been made a multi-member entity. This will provide for more expertise for the Tribunal. Intermediary Definition of ‘intermediary’ has been modified. As per the amendments in various sections now intermediaries are made more responsible and liable towards their acts. New Section 67C asks intermediaries to preserve and retain certain records for a stated period. New Section 69B is also quite stringent to intermediaries.

Information Technology Act 2000 (Amendment 2008) For National Security Purpose Section 69A has been introduced to enable blocking of websites by the central government. Section 69B provides powers to central government to collect traffic data from any computer resource. It could be either in transit or in storage. This move by the government was necessary for national security purpose but it may lead to abuse of power by government.

Information Technology Act 2000 (Amendment 2008) The powers under Section 80 were earlier available to DSP is now available to Inspectors. Section 81 has been amended to keep the primacy of Copyright and Patent Acts above ITA 2000. New Section 84C introduced to make ‘an attempt to commit an offence’ punishable. The punishment will be half of the punishment meant for the offence. State Governments will be exercising far more powers under the ITAA 2008 than what was envisaged under ITA 2000.