Cyber law

13
1 Business Law

description

 

Transcript of Cyber law

Page 1: Cyber law

1

Business Law

Page 2: Cyber law

Contents

• Introduction

• Digital Signatures & Electronic Signatures

• Electronic Governance

• Electronic Records

• Controller & Certifying Authorities

• Adjudication,Penalities & Compensation

• Case Study

2

Page 3: Cyber law

Introduction

• Electronic Commerce

• Information Technology Act , 2000

as amended by

The Information Technology(Amendment) Act,

2008 with effect from 27/10/2009

• Objectives of the Act

• Provision of Act 3

Page 4: Cyber law

Digital Signatures• Authentication of electronic record shall be effected by the

use of asymmetric crypto system and hash function which envelope and transfer the initial electronic record to another (Sec.2(1)& Sec.3(1))

• Manners of Authentication

• Verification of Digital signatures

• Generation of Digital Signatures Certificate

• Revocation of Digital Signatures Certificate

• Suspension of Digital Signatures Certificate 4

Page 5: Cyber law

Electronic Signatures

• Authentication of electronic record by a subscriber by means of electronic technique specified in the second schedule (sec.2(1))

• Subscriber

• Duties of Subscriber Generating key pair Acceptance of Digital Signature Certificate Control of private Key Extend Facilities to decrypt information

5

Page 6: Cyber law

Electronic Governance• Act for Legal recognition of Electronic Records

• Electronic Form

• Electronic Form evidence

• Access

• Computer & Network

• Verification of Electronic Records

• Authentication of Electronic Records

• Use of Electronic Records 6

Page 7: Cyber law

Electronic Record• Data, Record or data generated, image or sound stored,

received or sent in an electronic form or micro film or computer generated micro fiche(Sec.2(1))

• Originator

• Intermediary

• Liability of Intermediary

• When Intermediary not Liable?

• Indian Computer Emergency Response Team

7

Page 8: Cyber law

Controller

• Appointment of Controller

• Functions of Controller

• Powers of Controller

To delegate

To Investigate contraventions

To give directions

Access to Computers and date 8

Page 9: Cyber law

Certifying Authority

• Definition

• Obligations & Duties

Follow Procedures

Cross certification

Security guidelines

Compliances by employees

Disclosures

Confidential Information

Audit9

Page 10: Cyber law

Adjudication, Penalties& Compensation• Power to Adjudicate• Power to Investigate Offences• Penalty & Compensation for damage to computer• Penalty for failure to furnish information, return• Penalty for securing access to a protected system• Punishment for sending offensive messages• Punishment for identifying theft• Punishment for cheating by Personation• Punishment for violation of privacy• Punishment for cyber terrorism• Penalty for breach of confidentiality & privacy 10

Page 11: Cyber law

Case Study

• Parliament Attack Case

• Analyzing & Retrieving information from laptops of

terrorists

• Laptops send to Computer forensics division

• Contains information about terrorists motive

• Retrieved the details

• Suitable punishments were given according to the law 11

Page 12: Cyber law

Questions

12

Page 13: Cyber law

13