Information Technology Act 2000. India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.

Slides:



Advertisements
Similar presentations
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Advertisements

TWO DIFFERENT DEPARTMENTS OF THE GOVERNMENT OF INDIA GOVERN THE TELECOMMUNICATIONS SECTOR AND THE INFORMATION TECHNOLOGY SECTOR THESE TWO DEPARTMENTS.
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
International forum on eNotarization and eApostilles The impact of e-technology on notarial acts: legal and technical possibilities and limits -relevance.
UNITED NATIONS COMMISION ON INTERNATIONAL TRADE LAW Enhancing legal certainty for electronic signatures and other authentication methods José Angelo Estrella.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
1. Asset Recovery Rules in Jordan 5 th Pan-European High Level Conference on asset Recovery Offices Cyprus Oct Prof. Fayyad Alqudah (LL.B,
The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By – Sagar Rahurkar.
INTRODUCTION A company which is incorporated or formed outside Pakistan which establishes its place of business within Pakistan is called a ‘Foreign Company’.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Legality of Electronic Images under the Electronic Transactions Ordinance Presentation by Mr Alan Siu, Deputy Secretary for Information Technology and.
Information Technology Act 2000 and Amendments therein
INDIAN CYBERLAW- SOME PERSPECTIVES INDIAN CYBERLAW- SOME PERSPECTIVES.
INFORMATION TECHNOLOGY ACT 2000 AN OVERVIEW. PRESENTATION OVERVIEW Need for the law Legal issues regarding offer, Acceptance and conclusion of contract.
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
Respecting Privacy in Global Networks/ Guernsey, Wednesday 11 th April, Paula Ortiz López Spanish Data Protection Agency.
1 Review of the Electronic Transactions Ordinance Information Infrastructure Advisory Committee 9 April 2002.
Law for Business and Personal Use
Juan A. Avellán Chief Legal Officer WISeKey S.A. Regulatory Considerations for the Establishment of a Global Public Key Infrastructure.
Elitex ’08 : Securing Indian Cyber Space Interoperability and Standardisation issues for India PKI Sivarama Krishnan Executive Director PricewaterhouseCoopers.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
Creating Trust in Electronic Environment - IT Act 2000 Deputy Controller (Technology) Controller of Certifying Authorities Ministry of Communications &
Business Law Module 4 Module IV: Information Technology Act 2000
Cyber Law & Islamic Ethics
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Facilitating Cross Border Trade and Commerce through Mutual Recognition of Digital Signatures/Certifying Authorities Controller of Certifying Authorities(CCA)
Course: Government Process Re-engineering Day 3 Session 3: Legal and Policy Framework for GPR.
Course: Regulatory framework for e-Governance
INFORMATION TECHNOLOGY ACT. Connectivity via the Internet has greatly abridged geographical distances and made communication even more rapid. While activities.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Unauthorized copying or distribution of this material is strictly prohibited IT Act 2000 Amendments in 2008.
Business Law for the Entrepreneur and Manager
PRESENTATION TO SELECT COMMITTEE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL ANDILE NGCABA12 JUNE 2002.
Business Law Chapter 13: Business Law in the Internet Era.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
Types of Laws Copyright © Texas Education Agency, All rights reserved.
Cybersecurity Governance in Ethiopia
FERA TO FEMA. Objectives To facilitate external trade and payments To promote the orderly development and maintenance of foreign exchange market.
Mr Alan SIU, Deputy Secretary for Information Technology and Broadcasting A Clear Legal Framework for Electronic Transactions.
Indian Penal Code Act, 1860 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled Legal Expert with.
Foreign Trade (Development and Regulation) Act, 1992  Chapter I - Preliminary  Chapter II- Power of Central Govt to make orders and announce Export and.
FOREIGN EXCHANGE MANAGEMENT ACT, 1999
EQUAL REMUNERATATION ACT INTRODUCTION The principle of equal work to men and women worker has been gaining increasing acceptance all over the world.
E-Finance in India A Perspective Geneva October 24, 2001.
E-Business Law in China By Chris Hartnett. Signatures in China Function of a signature is to provide evidence of Function of a signature is to provide.
Minimum Wages Act 1948.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
The Information Technology Act Terms E-Commerce E-Commerce E-Governance E-Governance B2B B2B B2C B2C EDI EDI Internet, Intranet, Extranet Internet,
BRIEFING TO THE PORTFOLIO COMMITTEES FOR SAFETY AND SECURITY AND JUSTICE AND CONSTITUTIONAL DEVELOPMENT SOUTH AFRICAN POLICE SERVICE AMENDMENT BILL, 2008.
Contract Labour. CL are indirect employees, persons who are hired, supervised and remunerated by a contractor, who in turn, is compensated by the establishment.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Types of Laws Created by The University of North Texas in partnership with the Texas Education Agency.
The Singapore Treaty on the Law of Trademarks Kiev March Noëlle Moutout Assistant Legal Officer.
Sources of the Canadian Legal System
Cyber Law And Ethics And Ethics.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Foreign Exchange Regulation Act (FERA), 1973
Licensing & Technology Transfer to and from India : Evolution of Information Technology & Software Industry Presented by:- Indranil Chowdhury - Howrey,
BRIEFING TO THE SELECT COMMITTEE ON SECURITY AND JUSTICE: MUNICIPAL LAW ENFORCEMENT OFFICERS (7 June 2017)
SECURITY STANDARDS AND CYBER LAWS
Data Protection Act and Other Laws
Legal And Policy Framework
Restrictions, including those restrictions permitted by the European Convention on Human Rights Police powers of stop and search.
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
Foreign Exchange Management Act, 1999
Poisons Act CHNB.
Presentation transcript:

Information Technology Act 2000

India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology Act to promote E-Commerce and electronic transactions. Indian parliament has already passed the legislation known as Information Technology Act 2000 drafted by the Ministry of Communications and Information Technology.

The passing of the Information Technology Act by the Indian Parliament has now paved way for the legal recognition of transactions carried out by means of "electronic commerce”. Electronic commerce can now be carried out by persons to whom a "Digital Certificate" is issued. Any person to whom such certificate is issued can now authenticate an electronic record by affixing his digital signature to the document.

Some of the peculiar features of the cyber world are: a) No physical boundaries. b) No writing. c) No handwritten signature, seals, thumb impression. d) Lack of Security, risk factor high. e) Taxes, rules, regulations, between Countries not clearly defined. f) Technology fast changing. g) Ignorance of Common man about technology. h) No single authority over Internet who can decide

Objectives It is proposed to provide for legal recognition of electronic records and digital signatures. To prevent the possible misuse arising out of transactions and other dealings concluded over the electronic medium, it is also proposed to create civil and criminal liabilities for contravention of the provisions of the proposed legislation. It is proposed to provide for the use and acceptance of electronic records and digital signatures in the Government offices and its agencies

Highlights of the Information Technology Act 2000 Electronic Contracts will be legally valid. LEGAL recognition of Digital signatures. Security procedure for Electronic records and Digital signature. Appointment of Certifying Authorities (CAs) and controller Controller to Act as repository of all Digital Certificates. Certifying Authorities to get license to issue Digital Certificates. Various types of computer crimes defined and stringent penalties provided under the Act.

Appointment of Adjudicating Officer for holding inquiries under the Act. Establishment of Cyber Appellate Tribunal under the Act. Act to apply for offences or Contraventions committed outside India Power of Police Officers and other Officers to enter into any public place and search and arrest without warrant. Constitution of Cyber Regulations Advisory Committee who will advice the Central Government and Controller. Amendments in Indian Penal Code, Indian Evidence Act, Banker's Books Evidence Act and Reserve Bank of India Act