IT ACt 2000
IT ACt 2000
IT ACt 2000
Technology
Act 2000
Dr. Kavita Goel
Model law on Electronic
Commerce
UNCITRAL Konkan Railway
Corporation Ltd. V. Rani
Construction (P) Ltd.
Introduction
use of alternatives to paper-based
methods of communication and storage
of information
E-Governance
Application Sec 1of IT Act 2000
Extends to the whole of India and it applies also
to any offence or contravention thereunder
committed outside India by any person
Art. 253: Legislation for giving effect to
International Agreements
Sec 75: if the conduct or act constituting the
offence or contravention involves a
computer or network located in India
Negotiable Instrument(Other than a cheque) as
defined in The Negotiable Instruments Act, 1881;
PNB first bank to deploy image based clearing system inter city within 48 hours
Virtual Currency like Bitcoins, Dogecoin,
Laws on cryptocurrency
No legal regulation in India
Not a Negotiable Instrument under NI Act 1881
In global pandemic the price of one Bitcoin has been increased by six times in 12
months
Investment of around 7 million Indians in crypto assets
In 2013 one caution was issued by RBI on use of Virtual currencycircular
In 2018, first formal restrictions by RBI by circular
Banning of Cryptocurrency & regulation of Official Digital Currency Bill 2019
Internet and Mobile Association of India V. RBI, 2020SCC online SC 275: struck down
circular issued by RBI in 2018
Cryptocurrency & regulation of Official Digital Currency Bill 2021
The Indian Government imposed Anti-Money Laundering provisions on Virtual Digital
Assets (VDA) on 7th March 2023 under Prevention of Money laundering Act(PMLA)
Statement on Development and Regulatory
policies by RBI
Maintenance services are a
great example of Business to
B2G transactions. To maintain Government
public buildings and open spaces, (B2G)
government agencies may solicit
the services from businesses
Consumer to
Government
(C2G)
Payment of Taxes
online, license fees
etc.
Government to Birth certificate,
Consumer (G2C) death certificate,
Adhar card
Types of eCommerce by Revenue
Model
Drop shipping
Wholesaling
Private Labeling
White Labeling
Subscription Service
Dropshipping
In white labeling, a
company purchases a
ready-made product line
from a manufacturer and
applies its own branding to
sell them.
The Chocolate Gift offers
white labeling services for
businesses that want to
resell their chocolate bars.
Customers may order at
least 240 items using a
custom brand design
Subscription Service
Fundamental requirement
•Authenticity of sender
•Message's integrity
•Non-repudiation
Cryptography (Symmetric
and Asymmetric)
Data Encryption
Standard: 58 bits
Private Key
Cryptographic 3 Data Encryption
System: Secret Standard: 192 bits Symmetric
Key
Plaintext- Advanced
ciphertext - Encryption
plaintext Standard: 128-256
decryption bits
Asymmetric
(3) The Central Government may prescribe the procedure for the
purpose of ascertaining whether electronic signature is that of
the person by whom it is purported to have been affixed
or authenticated.
(4) The Central Government may, by notification in the Official
Gazette, add to or omit any electronic signature or
electronic authentication technique and the procedure for affixing
such signature from the Second Schedule: Provided that no
electronic signature or authentication technique shall be specified
in the Second Schedule unless such signature or technique is
reliable.
Contd.
Users with an Aadhaar ID, the unique identification number issued by the
Indian government to all Indian residents, are free to use an online e-
signature service to securely sign documents online. In this case, the online
e-signature service integrates with an Application Service Provider (ASP) to
provide users with a mobile or web app interface that they can interact
with.
The users then use this app interface to apply e-signatures to any online
document by authenticating their identity using an eKYC service such as
OTP (one-time passcode) provided by an e-sign service provider. The
online e-signature service works with an accredited service provider to
provide certificates and authentication services that comply with
government guidelines
e-sign services
Authentication under 2nd Schedule
2nd schedule
E-KYC and CA
Trusted third party-after amendment of 2020
e-KYC" means the transfer of digitally signed demographic
data such as Name, Address, Date of Birth, Gender,
Mobile number, Email address, photograph etc of an
individual. collected and verified by e-KYC provider on
successful authentication of same individual
The applicable e-KYC services provider for eSign are
UIDAI ( Online Aadhaar e-KYC Services)
eSign User Account with CA
Signatures under IT Act
2000
Sec 2(ta) Electronic
Signature: means authentication of
any electronic record by a
subscriber by means of the
electronic technique specified in
the Second Schedule and includes
digital signature
Sec 2(p) Digital Signature: means
authentication of any electronic
record by a subscriber by means of
an electronic method or procedure
in accordance with the provisions of
section 3
Electronic signature (name in the end of email, PIN,
Digital Signature
image of sign, bio-metric identifier)
A digital signature relies on public key infrastructure An electronic signature is simply a legally valid
which authenticates the electronic signature electronic replacement of a handwritten signature.
Digital signatures carry a user's information along Electronic signatures do not contain any
with electronic signatures. authentication attached to them.
A digital signature secures a document. An electronic signature verifies the document.
Digital signatures are validated by licensed Electronic signatures are not validated by licensed
certifying authorities such as eMudhra. certifying authorities.
Electronic signatures do not come with encryption
Digital signatures come with encryption standards.
standards.
A digital signature consists of various security An electronic signature is less secure and is more
features and is less prone to tampering. vulnerable to tampering.
An electronic signature can be a file, image, or
A digital signature acts as an electronic fingerprint
symbol attached to a document to give consent
that consists of a person's identification.
for a signature.
An electronic signature offers lower security and no
A digital signature is created via cryptographic
cryptographic algorithms are used in creating a
algorithms.
simple electronic signature.
A digital signature is authenticated using a digital An electronic signature is authenticated using a