You are on page 1of 16

Came to force on 17th October 2000

Internet users remain in physical jurisdictions and are subject to laws independent of their presence on the Internet Laws of the state/nation which apply to the person or business with whom the transaction takes place. provide everyone with the safe and secure environment where an illegal encroachment of some cyber criminal, as law calls it, to be prosecuted and punished for his crime

OBJECTIVES
To provide legal recognition for transactions carried out by means of electronic data interchange and Other means of electronic communication, commonly referred to as "electronic commerce. To facilitates the electronics filling of documents with govt department/agencies. To bring suitable amendments to the existing laws in pursuit of the objectives of the act. To give favorable consideration to the model law recommended by UNCITRAL to maintain harmony with international laws.

Cyber Laws applies to


Access Addressee Affixing digital signature Appropriate government Crypto system Certification Computer Computer network Computer resource Data Digital signature certification Electronic form Function Information Intermediary Key pair Originator Subscriber Verification certificate

Negotiable Instrument Power of Attorney Trust or Trustee Will Sale of Immoveable Property . Official Gazettes.

Electronic governance
Legal recognition of electronic records. Legal recognition of digital signatures. Retention of electronic records. Publication of rules, policies in gazettes.

Attribution of electronic records


Attribution to the originator
If sent by himself Acting on behalf Auto-operating

Acknowledgement of receipt
No Agreement Stipulation by the originator

Time and place of dispatch


Dispatch of electronic record Specified device Retrieval by addressee Place of business Residence

Click Wrap Agreements

Specify terms & conditions Applicable to use of website as well as e-products & services.

I ACCEPT or I AGREE
Enhances agreement enforceability Affirmative sentence more appealing to failure to act. Clear and simple mechanism Effective Disclaimer.

1. Supervision 2. Certifying Public Keys 3. Setting Standards 4. Setting Qualifying Criteria for assets 5. Specifying Terms And Conditions 6. Supervision of Content 7. Setting conditions for audit 8. Establishing a new system 9. Resolving Conflicts 10. Assigning duties for the other subordinate authorities.

Security procedure
1. Nature of transaction

1. Level of sophistication

2. Volume of transaction

3. Alternatives rejected

E-License
Granting Valid for a period Non transferable Subject to terms Application Certification statement Procedures and ID statement Payment of fees Other documents

Suspension False statement Failure to conditions Failure to maintain standards Contradiction

Digital signature
Grant Application to CA Public and Private Key Verification Revocation Request from subscriber
Death of the subscriber Dissolution of the firm Requirement of Issuance not satisfied Private key compromised

Suspension
Request from
Subscriber Any authorised person

In Public Interest Should be communicated to the subscriber Should not be suspended for more than 15 Days, unless notified to the subscriber

Penalties and adjudication


Penalty for damage Penalty for access Penalty for virus Penalty for disruption Penalty for denial of access Failure to suffice information Residuary penalty

Offences
Tampering with system Handing over the power Protected systems Misinterpretation Breach of confidentiality and privacy False disclosure of digital signature Fraudulent purpose Confiscation

You might also like