International Conference-INBUSH (International Business Horizon) 2009 Amity International Business School,Noida 25-27 Feb 2009 “Business Laws: Foundation.

Slides:



Advertisements
Similar presentations
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
Advertisements

Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By – Sagar Rahurkar.
Discussion on SA-500 – AUDIT EVIDENCE
Auditing Computer Systems
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.
Cyber Crime: Judicial Perspective By Talwant Singh Addl. Distt. & Sessions Judge Delhi
Cyber Crimes, Cyber Investigation and Cyber Evidence
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Security Controls – What Works
Information Security Policies and Standards
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
INTERNET and CODE OF CONDUCT
Session 3 – Information Security Policies
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
Business Law Module 4 Module IV: Information Technology Act 2000
Cyber Law & Islamic Ethics
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Dr. Diganta Biswas School of Law Christ University, Bangalore.
National Smartcard Project Work Package 8 – Security Issues Report.
Course: Government Process Re-engineering Day 3 Session 3: Legal and Policy Framework for GPR.
INFORMATION TECHNOLOGY ACT. Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities.
Unauthorized copying or distribution of this material is strictly prohibited IT Act 2000 Amendments in 2008.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
AUDIT & AUDITORS Government Companies :-
HIPAA PRIVACY AND SECURITY AWARENESS.
Other Laws (Primarily for E-Government) COEN 351.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
PUBLIC FINANCE MANAGEMENT ACT TREASURY REGULATIONS AND.
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
Indian Penal Code Act, 1860 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled Legal Expert with.
S4: Understanding the IT environment of the entity.
The law on Intermediary Liability in India
Part 11, Electronic Records; Electronic Signatures
DIGITAL SIGNATURE.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
CONTROLLING INFORMATION SYSTEMS
Chapter 8 Auditing in an E-commerce Environment
1. Object and Usefulness of Secretarial Audit “Secretarial Audit of a company conducted by a Practising Company Secretary on the same lines as financial.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Amendments of the Indian Evidence Act, 1872 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled.
Cyber Law And Ethics And Ethics.
BY Suhail Anjum Siddiqui,Advocate B.com.(Hons)LL.B(Hons.) MBA.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
LAWS OF MALAYSIA ACT 658 ELECTRONIC COMMERCE ACT 2006.
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
1 24. “(1) The Certification Council may grant accreditation to certification service provider, its cryptography services, electronic signature or advanced.
Legal And Policy Framework
IT ACT 2000 and 2008 Important Sections Awareness Presentation
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
Cyber Crime Laws and Mitigation of Cyber Crimes in Corporate Companies
Cyber Issues Facing Medical Practice Managers
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
INFORMATION SYSTEMS SECURITY and CONTROL
14. “(1) Unless otherwise agreed where the originator has stated that the electronic communication is conditional on receipt of acknowledgment, the electronic.
Presentation transcript:

International Conference-INBUSH (International Business Horizon) 2009 Amity International Business School,Noida Feb 2009 “Business Laws: Foundation for strong Corporate Governance, without which we will only repeat the story of 'Satyam’’ Role of the Information Technology in ensuring sound Corporate Governance in India Karnika Seth Managing Partner SETH ASSOCIATES ADVOCATES AND LEGAL CONSULTANTS

Corporate Governance and IT Information technology plays a key support function in a company as it assists the board and the management to report key risks, and their assessment of how these risks are being managed in fulfillment of the requirements under clause 49 of the listing agreement. The Chief Information Officer (CIO) needs to play a significant role in supporting boards, audit committees and the management, in first understanding, and then implementing good Corporate governance practices.

IT risk management covers a range of factors global sourcing regulatory compliance, privacy, trans-border data flow, export control, financial disclosure, certifications, fraud detection, protection of intellectual property

IT Risk Management for good corporate governance Organisations that use IT strategically and need to recover from significant business interruptions deploy Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) systems. Security breaches may occur due to the negligence of staffers, third-party access to key applications, or lack of appropriate security of information systems. It is essential that all organisations have information security policies and procedures in place as well as a formal incident response management team that can detect and escalate security breaches. Pointers- lack of procedures on user access rights and inadequate review of access rights on a periodic basis. Segregation of duties amongst users should be addressed to promote tighter control. Physical access risks exist on account of poor awareness levels and training. Investments made by organisations are for physical goods and not on IT assets, especially data. Physical security functions are typically not integrated with information systems security

Outsourcing of IT services with caution Another complexity relates to global sourcing trends for IT services, and, more broadly, business process outsourcing. Organisations may embark on a relationship with a vendor which leads to a marked drop in service standards, and the cost savings are not as expected. Many regulations and laws apply to information systems including Information Technology Act, Copyright Act, Trademarks Act, Indian Penal Code, privacy, data protection laws, Companies Act, consumer protection, Tort law

Information Technology Act, 2000 Enacted on 17 th May India is 12th nation in the world to adopt cyber laws IT Act is based on Model law on e- commerce adopted by UNCITRAL

Objectives of the IT Act To provide legal recognition for transactions:- Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“ To facilitate electronic filing of documents with Government agencies and E-Payments To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act,1934

Extent of application Extends to whole of India and also applies to any offence or contravention there under committed outside India by any person {section 1 (2)} read with Section 75- Act applies to offence or contravention committed outside India by any person irrespective of his nationality, if such act involves a computer, computer system or network located in India Section 2 (1) (a) –”Access” means gaining entry into,instructing or communicating with the logical, arithmetic or memory function resources of a computer, computer resource or network

Definitions ( section 2) "computer" means electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software or communication facilities which are connected or relates to the computer in a computer system or computer network; "computer network" means the inter-connection of one or more computers through- (i) the use of satellite, microwave, terrestrial lime or other communication media; and (ii) terminals or a complex consisting of two or more interconnected computers whether or not the interconnection is continuously maintained;

Definitions ( section 2) "computer system" means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable being used in conjunction with external files which contain computer programmes, electronic instructions, input data and output data that performs logic, arithmetic, data storage and retrieval, communication control and other functions; "data" means a representation of information, knowledge, facts, concepts or instruction which are being prepared or have been prepared in a formalised manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer.

Definitions ( section 2) "electronic record" means data, record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche; “ secure system ” means computer hardware, software, and procedure that- (a) are reasonably secure from unauthorized access and misuse; (b) provide a reasonable level of reliability and correct operation; (c) are reasonably suited to performing the intended function; and (d) adhere to generally accepted security procedures “ security procedure ” means the security procedure prescribed by the Central Government under the IT Act, secure electronic record – where any security procedure has been applied to an electronic record at a specific point of time, then such record shall be deemed to be a secure electronic record from such point of time to the time of verification-Section 14 of IT Act, 2000

IT Act is inapplicable to… (a) a negotiable instrument (Other than a cheque) as defined in section 13 of the Negotiable Instruments Act, 1881; (b) a power-of-attorney as defined in section 1A of the Powers-of-Attorney Act, 1882; (c) a trust as defined in section 3 of the Indian Trusts Act, 1882;

IT Act is inapplicable to… (d) a will as defined in clause (h) of section 2 of the Indian Succession Act, 1925 including any other testamentary disposition (e) any contract for the sale or conveyance of immovable property or any interest in such property; (f) any such class of documents or transactions as may be notified by the Central Government

Section 3 Defines Digital Signatures The authentication to be affected by use of asymmetric crypto system and hash function The private key and the public key are unique to the subscriber and constitute functioning key pair Verification of electronic record possible

Important provisions of IT Act, 2000 Legal recognition to electronic records- Section 4 of IT Act. Legal recognition of digital signatures- Section 5 of IT Act, 2000 Section 6- Use of electronic records and digital signatures in Government and its agencies. Section 7- Retention of electronic records 1.Information should remain accessible for subsequent reference 2.Retained in a format that ensures accuracy 3.Details of dispatch and receipt are available.

Secure digital signature-S.15 If by application of a security procedure agreed to by the parties concerned, it can be verified that a digital signature, at the time it was affixed, was: (a) unique to the subscriber affixing it; (b) capable of identifying such subscriber; (c) created in a manner or using a means under the exclusive control of the subscriber and is linked to the electronic record to which it relates in such a manner that if the electronic record was altered the digital signature would be invalidated, then such digital signature shall be deemed to be a secure digital signature

Certificate based Key Management Operated by trusted- third party - CA Provides Trading Partners Certificates Notarises the relationship between a public key and its owner CA User A User B CA A B CA ACA B

CCA CA Relying Party Subscriber Directory of Certificates CRLs Directory of Certificates CRLs PKI Hierarchy

Regulation of Certifying Authorities [Chapter VI] The Central Government may appoint a Controller of Certifying Authority who shall exercise supervision over the activities of Certifying Authorities. Certifying Authority means a person who has been granted a licence to issue a Digital Signature Certificate. The Controller of Certifying Authority shall have powers to lay down rules, regulations, duties, responsibilities and functions of the Certifying Authority issuing Digital Signature Certificates. The Certifying Authority empowered to issue a Digital Signature Certificate shall have to procure a license from the Controller of Certifying Authority to issue Digital Signature Certificates. The Controller of Certifying Authority has prescribed detailed rules and regulations in the Act, as to the application for license, suspension of license and procedure for grant or rejection of license.

Digital Signature Certificate [Chapter VII] Any person may make an application to the Certifying Authority for issue of Digital Signature Certificate. The Certifying Authority while issuing such certificate shall certify that it has complied with the provisions of the Act. The Certifying Authority has to ensure that the subscriber (i.e., a person in whose name the Digital Signature Certificate is issued) holds the private key corresponding to the public key listed in the Digital Signature Certificate and such public and private keys constitute a functioning key pair. The Certifying Authority has the power to suspend or revoke Digital Signature Certificate.

Civil Wrongs under IT Act Chapter IX of IT Act, Section 43 Whoever without permission of owner of the computer  Secures access (mere U/A access) Not necessarily through a network  Downloads, copies, extracts any data  Introduces or causes to be introduced any viruses or contaminant  Damages or causes to be damaged any computer resource Destroy, alter, delete, add, modify or rearrange Change the format of a file  Disrupts or causes disruption of any computer resource Preventing normal continuance of computer © Seth Associates, 2009 All Rights Reserved

 Denies or causes denial of access by any means Denial of service attacks  Assists any person to do any thing above Rogue Websites, Search Engines, Insiders providing vulnerabilities  Charges the services availed by a person to the account of another person by tampering or manipulating any computer resource Credit card frauds, Internet time thefts  Liable to pay damages not exceeding Rs. One crore to the affected party  Investigation by  ADJUDICATING OFFICER  Powers of a civil court Civil Wrongs under IT Act (Contd.) © Seth Associates, 2009 All Rights Reserved

Cybercrime provisions under IT Act,2000 Offences & Relevant Sections under IT Act Tampering with Computer source documents Sec.65 Hacking with Computer systems, Data alteration Sec.66 Publishing obscene information Sec.67 Un-authorized access to protected system Sec.70 Breach of Confidentiality and Privacy Sec.72 Publishing false digital signature certificates Sec.73 © Seth Associates, 2009 All Rights Reserved

A good corporate governance may need resolving complicated cybercrime issues Cyber terrorism Cyber pornography Defamation Cyber stalking (section 509 IPC) Sale of illegal articles-narcotics, weapons, wildlife Online gambling Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code spoofing Forgery Phising Credit card frauds Crime against persons Crime against Government Crime against property © Seth Associates, 2009 All Rights Reserved

TYPES OF CYBER CRIMES Cyber crimes Hacking Information Theft bombing Salami attacks Web jacking Denial of Service attacks Trojan attacks © Seth Associates, 2008 All Rights Reserved

Cyber crimes punishable under various Indian laws Sending pornographic or obscene s are punishable under Section 67 of the IT Act.An offence under this section is punishable on first conviction with imprisonment for a term,which may extend to five years and with fine, which may extend to One lakh rupees. In the event of a second or subsequent conviction the recommended punishment is imprisonment for a term, which may extend to ten years and also with fine which may extend to Two lakh rupees. s that are defamatory in nature are punishable under Section 500 of the Indian Penal Code (IPC), which recommends an imprisonment of upto two years or a fine or both. Threatening s are punishable under the provisions of the IPC pertaining to criminal intimidation, insult and annoyance (Chapter XXII), extortion (Chapter XVII) spoofing spoofing is covered under provisions of the IPC relating to fraud, cheating by personation (Chapter XVII), forgery (Chapter XVIII) © Seth Associates, 2009 All Rights Reserved

Forgery is an offence under Section 463 of IPC Section 463 IPC- “ whoever makes any false documents or false electronic record or part of a document or electronic record, with intent to cause damage or injury to the public, or to any person, or to support any claim or title or to cause any person to part with property, or to enter into any express or implied contracts or with intent to commit fraud or that fraud may be committed commits forgery”. Punishment – upto 2 years imprisonment, fine/both Section 468of IPC - Forgery for purpose of cheating is punishable with imprisonment which may extend to 7 years and fine Section 477A- falsification of accounts is punishable with imprisonment of upto 7 years, fine or both –Non cognizable, bailable. Section 85- offences by companies- where the person contravening the IT Act is a company, all persons responsible for conduct of company’s affairs will be proceeded against unless no knowledge /due measures plea is proved.

Sending threatening messages by Sec 503 IPC Sending defamatory messages by Sec 499, 500 IPC Forgery of electronic recordsSec 463, 470, 471 IPC Bogus websites, cyber fraudsSec 420 IPC spoofingSec 416, 417, 463 IPC Online sale of DrugsNDPS Act Web - JackingSec. 383 IPC Online sale of ArmsArms Act Computer Related Crimes under IPC and Special Laws © Seth Associates, 2008 All Rights Reserved

Some more offences dealt with under IPC… Criminal breach of trust/Fraud- Sec. 405,406,408,409 IPC Destruction of electronic evidence- Sec.204,477 IPC False electronic evidence-Sec.193 IPC Offences by or against public servant- Sec.167,172,173,175 IPC © Seth Associates, 2009 All Rights Reserved

Amendments- Indian Evidence Act 1872 Section 3 of the Evidence Act amended to take care of admissibility of ER as evidence along with the paper based records as part of the documents which can be produced before the court for inspection.

Societe Des products Nestle SA case 2006 (33 ) PTC 469 & State v Mohd Afzal, 2003 (7) AD (Delhi)1 By virue of provision of Section 65A, the contents of electronic records may be proved in evidence by parties in accordance with provision of 65B. Held- Sub section (1) of section 65B makes admissible as a document, paper print out of electronic records stored in optical or magnetic media produced by a computer subject to fulfillment of conditions specified in subsection 2 of Section 65B. a)The computer from which the record is generated was regularly used to store or process information in respect of activity regularly carried on by person having lawful control over the period, and relates to the period over which the computer was regularly used. b)Information was fed in the computer in the ordinary course of the activities of the person having lawful control over the computer. c)The computer was operating properly, and if not, was not such as to affect the electronic record or its accuracy. d)Information reproduced is such as is fed into computer in the ordinary course of activity.

Presumptions in law- Section 85 B Indian Evidence Act The law also presumes that in any proceedings, involving secure digital signature, the court shall presume, unless the contrary is proved, that the secure digital signature is affixed by the subscriber with the intention of signing or approving the electronic record In any proceedings involving a secure electronic record, the court shall presume, unless contrary is proved, that the secure electronic record has not been altered since the specific point of time, to which the secure status relates

Corporate governance & IT Increasing reliance on Information Technology to store and use data and for preparation of accounts Need to maintain reasonable security practices IT risk management needs to be sound and consistent Familiarity with Information technology laws and regulatory framework is advisable Legal due diligence practices need to be strengthened in every corporate set up.

Thank You! SETH ASSOCIATES ADVOCATES AND LEGAL CONSULTANTS Corporate Law Office: B-10, Sector 40, NOIDA , N.C.R, India Tel: +91 (120) , Fax: +91 (120) © Seth Associates, 2009 All Rights Reserved