Professional Documents
Culture Documents
Mehul Jain
Shweta Singh
Puneet Vyas
Subodh Mallya
Background
contract.
Legal issues in e-commerce
• Online Identity
businesses
ISSUES IN E-COMMERCE TRANSACTIONS
• Spamming
• Immersive marketing
.
Domain Names :If the company chooses a domain name that is
similar to some domain name or some existing trademark of a third
party, the company could be held liable for cybersquatting.
Electronic payment issues
Transaction risks
Consumer-oriented risks
JURISDICTION
For example, XYZ, a company in London, having its server in USA, may
sell its products to customers in India or other countries.
If you receive defective goods or if you regret having made the purchase,
the question would arise as to which jurisdiction can you sue the company
or claim damages or withdrawal respectively.
The company, onthe other hand, might find itself confronted with foreign
laws
REGULATORY MEASURES
-commerce Taxation
Private Key
What is Cryptography?
Hashing Algorithm ‘RSA” used for encryption/decryption
Where does my computer store my private key?
Who needs a key pair?
For how long does a key stay valid?
What happens when a key expires?
Message Transfer
I
N
T
E
R
N
E
T
REGULATION OF CERTIFYING AUTHORITIES
Exercising supervision over the activities of the Certifying
Authorities
Act as repository
Power to delegate
Disclosure
Demonstration of Use of DSC
Demonstration of Use of DSC
Digital
Signature
Certificate To
Be Attached
here
Details for Registering a DSC
Cyber Crime
Offences Under IT Act 2000
Offences Under IT Act 2000
The offence Offence Not an Offence Conditions
Computer network break-ins
Only if a computer is
Industrial espionage
involved
Copyright piracy χ
Software Piracy χ
Child Pornography
E-mail bombings χ
Only after the password is
Password ‘sniffers
Actually used to hack
Spoofing χ
Credit card fraud
Cyber squatting χ
Misleading search words χ
Using an imaginary password and gaining access
to a software
Changing the information in a file by a regular
operator
Copying data and selling or giving free to any
third party
While playing games, a virus enters the system
Taking a bribe to permit an offender to gain
entry to the office
Penal Provisions
43. Penalty of damage of computer, computer system, etc.
If any person without permission of the owner or any other person who is in
charge of a computer, computer or computer network,-
If any person without permission of the owner or any other person who is in charge of
a computer, computer or computer network,-
d)denies or causes the denial of access to any person authorised to access any
computer, or computer network by any means;
Sections 48 –
64 Deals with
the Cyber
Appellate
Tribunal
Cyber Appellate Tribunal
Cyber Appellate Tribunal
Appeal to Cyber Appellate Tribunal
(1) Save as provided in sub-section (2), any person aggrieved by an order made by
Controller or an adjudicating officer under this Act may prefer an appeal to a Cyber
Appellate Tribunal jurisdiction in the matter.
(2) No appeal shall lie to the Cyber Appellate Tribunal from an order made by an
adjudicating officer with the consent of the parties.
(3) Every appeal under sub-section (1) shall be filed within a period of forty-five days
from the date on which a copy of the order made by the Controller or the
adjudicating officer is received by the person aggrieved and it shall be in such form
and be accompanied by such fee as may be prescribed:
Provided that the Cyber Appellate Tribunal may entertain an appeal after the expiry
of the said period of forty-five days if it is satisfied that there was sufficient cause for
not filing it within that period.
Cyber Appellate Tribunal
Appeal to Cyber Appellate Tribunal
(5) The Cyber Appellate Tribunal shall send a copy or every order made by
it to the parties to the appeal and to the concerned Controller or
adjudicating officer.
(6) The appeal filed before the Cyber Appellate Tribunal under sub-section
(1) shall be dealt with by it as expeditiously as possible and endeavour
shall be made by it to dispose of the appeal finally within six months from
the date of receipt of the appeal.
Conclusion
WHERE WE ARE
Fastest growing sector
Contributes more than $30 Billion to India’s G.D.P
World leader in outsourcing
DIFFICULTIES
Slow response from govt.
Less support from foreign law enforcement
agencies
Slow in adaptability of technology used by
criminals
Suggestions
FUTURE COURSE OF ACTION
Need international co-operation
Mutual co-operation between countries
Transfer of technology between countries
Deportation of criminals
Educate the masses
Spreading awareness about cyber crimes
Training and educating policemen
More and more stringent norms
THANKS
QUESTIONS