Академический Документы
Профессиональный Документы
Культура Документы
&
DIGITAL SIGNATURE
Introduction
The government of India introduced the Information technology act, 2000 for making suitable amendments to the existing laws to facilitate e-commerce and give legal recognition to electronic records and digital signatures, which will facilitate the conclusion of contracts and the creation of legal rights and obligations through electronic communication like internet. The IT law also contains provisions regarding cyber law and all other activities carried out by electronic means.
The IT act sets out the conditions that would apply to qualify electronic records and digital signatures as being secure . It contains section 14 16 14. Secure electronic record. Where any security procedure has been applied to an electronic record at a specific point of time. then such record shall be deemed to be a secure electronic record from such point of time to the time of verification. 15. Secure digital signature. If, by application of a security procedure agreed to by the parties concerned, it can be verified that a digital signature, at the time it was affixed, wasunique to the subscriber affixing it. capable of identifying such subscriber. created in a manner or using a means under the exclusive control of the subscriber and is linked to the electronic record to which it relates in such a manner that if the electronic record was altered the digital signature would be invalidated. then such digital signature shall be deemed to be a secure digital signature.
16. Security procedure. The Central Government shall for the purposes of this Act prescribe the security procedure having regard to commercial circumstances prevailing at the time when the procedure was used, includingthe nature of the transaction. the level of sophistication of the parties with reference to their technological capacity. the volume of similar transactions engaged in by other parties. the availability of alternatives offered to but rejected by any party. the cost of alternative procedures, and the procedures in general use for similar types of transactions or communications.
The subscriber shall generate a key pair using a secure system. By accepting the certificate, the subscriber certifies to the public;
That he holds the private key correspondent to the public key. That all the information contained in the certificate as well as material relevant are true.
The subscriber shall exercise all reasonable care to retain control of his
Types of penalties
Residuary penalty (Sec 45) Whoever contravenes any rules and regulations made under this act, for the contravention of which no penalty has been separately provided according to this section.
Adjudicating officer
Power to adjudicate according to section 46. The officer can not be below the rank of a director to the government of India or an equivalent officer of a state government. Such appointment is made by the central government. A person to be eligible must have adequate experience in the field of IT and such legal or judicial experience as may be prescribed by the central
Quantum of compensation
Section 47 provides that while deciding up on the quantum of compensation the officer shall have due regard to the amount of gain of unfair advantage and the amount of loss caused to any person as well as the respective nature of the default.