You are on page 1of 7

Q1)Enl

i
stsomesal
i
entf
eat
urest
heamendmentbi
l
lITAct2008.
Ans)
TheITAct2000ofI ndiawast heresultofaModel el
ect
roni
ccommer celawpassed
bytheUNGener al
Assembl yin1997leadingtotheUNCI TRALModelLawofE
t
h
Commer ce.I
ndi
awast he12 nat iontopassal awonEcommer cebasedontheUN
i
niti
ati
ve.I
TAct2008i samendmentt ot heITAct2000andi smorefocusedon
Securi
tyanddataprotecti
on.TheI Tactcanber eadi
nthewebsiteoftheMini
stryof
I
T.Somev er
ybasi
cf eatur
esonl yaregivenbelow.TheITact2008isin90secti
ons
deali
ngwithmanyaspect s.Someoft heimportantel
ementsareasfoll
ows:
•El
ect
roni
canddi
git
alsi
gnat
ures
•El
ect
roni
cgov
ernance
•At
tri
but
ion,
acknowl
edgement
,anddi
spat
chofdat
a
•Secur
it
yconcer
nsandpr
ovi
sions
•Cer
ti
fyi
ngaut
hor
it
ies
•El
ect
roni
csi
gnat
urecer
ti
fi
cat
es
•Rev
ocat
ion,
breachofcont
ract
•Penal
ti
esandpuni
shment
Inthepr eamble,t
heactst atesthepur poseas" topr ovi
del egalr
ecogni
ti
onf orthe
transactionscar
ri
edoutbymeansofel ectr
onicdat ainterchangeandothermeansof
electr
oniccommuni cation,commonl yrefer
redtoas" El
ect r
onicCommer ce"
, which
i
nv olvetheuseofalternati
vest opaperbasedmet hodsofcommuni cat
ionand
storageofi nf
ormati
on, tofacili
tateelect
ronicfil
ingsofdocument swit
ht he
Gov ernmentagenciesandf urthertoamendt heIndi anPenal Code,I
ndi
anEv idence
Act ,
1872, TheBankers'BooksEv i
denceAct ,1891, andtheReser veBankofI ndi
aAct,
1934andf ormatter
sconnect edt herewithorincidentalthereto.

Q2)Definethet
erm cy
berspaceandenl
i
stt
hesecur
it
yconcer
nsi
n
cyberspace.
Ans)
"CyberSecuri
ty"meansprotect
inginf
ormation,equipment,devi
ces,computer,
comput err
esource,
communi cati
ondeviceandi nformati
onstoredtherei
nfrom
unauthori
zedaccess,use,
discl
osure,di
srupti
on, modif
icati
on,ordestr
ucti
on.
Withmoreandmorepeoplegaini
ngaccesst
otheint
ernetthroughmobil
ephones
andlapt
ops,t
hecyberspacehasbecomecrowdedwithmor eandmor epeopl
e
accessi
ngandupl
oadinginf
ormati
on,doi
ngtr
ansact
ions,gai
ningaccessto
enter
tainment,andcommuni catingwithmul ti
plef r
iendsorcol leagues.Wi t
hso
muchact ivi
tygoingoni nthisspace,itisnat uralthatpeopl eintendingtocommi t
fr
audandear nquickmoneyal soareont hepr owl .Thef raudulentactivi
ti
esgoi ngon
i
nt hi
sspacei scalledcybercri
me.Somet i
mesi tisjustforfun, sometimesf or
adventureandtestingone’scapabi l
it
iesandsomet i
meswi t
hi ntenti
ontodef raud.
Comput ermaybeat argetofat t
ackbyhacki ngi ntoitforinformat i
on,i
ntroducing
manyt ypesofmal warest odisablethesy stem.Comput ermayal sobeusedasa
weaponf orcredi
tcar dfraud,pornography ,
tof raudulentlyaccessper sonal data,t
o
sendhat emessages, todefamesomeoneet c.Cy bersecur i
tyinv ol
vesprotecting
i
nformat i
onanddev i
cesf r
om unauthorisedaccessanddest ructionormi suse.
Cy
ber
cri
mesar
eofmanyt
ypesandf
ormanypur
poses.
1.DataSecurit
y:Datasecurityi
sveryimport
antfororgani
sati
onsandindiv
idual
s.
Corporatedatasecuri
tyi
sv eryimport
antpart
icul
arl
yfororgani
sat
ionsthatdealwi
th
sensi
ti
v einf
ormationoftheircust
omers.
2.Techni
calPr
ivacyi
nCyberspace:Pr
ivacyi
stheabil
it
yorri
ghtofani
ndi
vi
dualor
grouptokeept
hemselvesinanonymit
yandanyinfor
mat i
onaboutt
hei
ndi
vidual
or
groupismadeknownbyt hem att
hei
rdiscr
eti
on.

Q3)Def
inet
het
erm dat
aandsecur
it
yissuesconcer
nedwi
thi
t.
Ans)
Datasecurit
yisv eryimpor t
antfororgani sati
onsandi ndi vi
duals.Corporatedata
secur
it
yisv eryimpor tantparti
cul
arlyforor ganisati
onst hatdeal wit
hsensi t
ive
i
nformati
onoft hei rcustomers.Hacker sconst antl
yareont hepr owltobreachinto
secur
it
ysy stemsofcor porateenti
ti
est ost ealdataforper sonal gai
n.Datacanbe
madeinaccessiblet ogenuineusersandcanbeal socor rupted.Customerdat aof
bankaccount sorcar dpay mentsystemsneedv er
yhighl evelofsecurit
y.Datacan
bepubli
c,private,orli
mi t
edaccess.Pr ivateorlimitedaccessdat aneedst obe
secur
edbyv ari
ousmeanst osecurethedat aandpr eventitsmi suse.
Dat
asecur
it
ymaybel
ostbecauseof
•Weaksaf
etysy
stems
•Unsaf
eorcar
elesshandl
i
ngofdat
a
•Car
elessnessont
hepar
tofi
ndi
vi
dual
cust
omer
s
•Hacker
sspeci
fi
cal
l
ytar
get
ingdat
aforper
sonal
gai
ns
Forcor
por
ates,
dat
abr
eachcanr
esul
tin
•Fi
nanci
all
oss
•Lossofcust
omert
rust
•Damaget
oreput
ati
on
•Cust
omerr
ight
slawsui
tsr
esul
ti
ngi
nheav
ylegal
cost
sandset
tl
ement
s
Sur
viv
alofbusi
nessesi
nthemoder
ndi
git
alwor
lddependsheav
il
yondat
asecur
it
y
ofi
tskeyasset
s
andpersonal
dataofcustomer
s.Manycount
ri
esar
eint
roduci
ngst
ri
ngent
regul
ati
onsondatapri
vacy
andanybr
eachofdat
acanev
okecust
omerr
ightl
egal
act
ion.
Dat
asecur
it
yri
skscancomef
rom:
•Acci
dent
alexposur
eofdat
abyempl
oyeeswhoshar
ecr
it
ical
inf
ormat
ionwi
th
ot
hers
•Phishi
ngisaki
ndofmessagesentbyat
tacker
swhoposeasalegi
timat
esource
andprompttheusert
ocli
ckonali
nktosharesensi
ti
vei
nfor
mat
ion;manyti
mes,t
he
att
ackerst
akeadvant
ageofgr
eedofpeopl
et omakequi
ckmoney.
•Ransomwareisamali
cioussoft
warethati
nfectsacorporat
ecomput
ersy
stem and
encr
yptst
hedatamakingitunav
ail
ableforl
egit
imateuse.Thedat
acanbeusedonly
wit
hadecrypt
ionkeywhichispr
ovidedonpaymentofransom amount
.
•Weaksecur
it
ysy
stemswhi
chcanbeeasi
l
yhackedandent
ered.

Q4)St
atet
heobj
ect
ivesofenv
ironment
ali
mpactassessment
.
Ans)
Al
leconomic,dev
elopmental
acti
vi
ti
eswhi
chcreat
ewealt
h,provi
dej
obs,
andmake
av
ailabl
egoodsandservi
cesfort
hecommunit
yhavenecessari
l
ysomeadver
se
ef
fectsaswell
.
Themai
nai
msofEI
Aar
eto:
•Al
lproj
ectsarescr
uti
nisedi
nthev
eryear
lyst
agesf
oranyi
mpactont
he
env
ironmentandhealt
h
•Alter
nat
ivesar
est
udiedtoar
ri
veatt
hebestpr
ojectpr
ofi
l
ewhi
chi
senv
ironment
fr
iendl
yandcostef
fect
ive
•I
dent
if
yandpr
edi
ctt
hewayt
hepr
ojecti
mpact
stheenv
ironment
•Takest
epst
oev
aluat
ethemi
ti
gat
eanyadv
erseenv
ironment
ali
mpact
•Ensur
ethateconomi
cobj
ect
ivesdonotdomi
nat
edeci
sionmaki
ng
Q5)Stat
ethepr
ovi
sionsi
ntheI
Tactf
oraut
hent
icat
ionofel
ect
roni
c
r
ecords.
Ans)
Aut
hent
icat
ionofEl
ect
roni
cRecor
ds(
ITAct2008)
(1)Subjecttotheprov
isionsofthi
ssecti
onanysubscr
ibermayaut
hent
icat
ean
elect
ronicrecordbyaff
ixinghi
sDigit
alSi
gnat
ure
(2)Theauthent
icati
onoftheelectr
onicrecordshal
lbeaff
ect
edbytheuseof
asymmet r
iccry
ptosy st
em andhashf uncti
onwhichenvel
opandt
ransf
ormthei
nit
ial
elect
roni
crecordint
oanotherelect
ronicrecord.
3AEl
ect
roni
cSi
gnat
ure(
Inser
tedv
ideI
TAA2006)
(1)Notwithstandinganyt
hingcontai
nedinsecti
on3, butsubjectt
othepr
ovi
sionsof
sub-sect
ion( 2),
asubscribermayauthenti
cateanyelectroni
crecor
dbysuch
elect
roni
csi gnatureorel
ectroni
cauthent
icat
iontechniquewhich-
(
a)i
sconsi
der
edr
eli
abl
e;and
(
b)maybespeci
fi
edi
ntheSecondSchedul
e
(2)Fort
hepur posesoft
hissect
ionanyelectr
onicsi
gnatur
eorel
ect
roni
c
authent
icat
iontechni
queshal
lbeconsideredrel
i
ableif
-
(a)thesi
gnaturecr
eati
ondat
aortheauthent
icat
iondataar
e,wi
thi
nthecontextin
whichtheyareused,l
i
nkedtothesi
gnat
oryorast hecasemaybe,
theauthenti
cator
andofnoot herper
son;
(b)thesi
gnatur
ecreati
ondataortheaut
hent
icat
iondat
awere,attheti
meofsi gni
ng,
underthecontr
olofthesi
gnator
yor,ast
hecasemaybe, t
heauthenti
catorandofno
otherper
son;
(c)anyal
ter
ati
ont
otheel
ect
roni
csi
gnat
uremadeaf
teraf
fi
xi
ngsuchsi
gnat
urei
s
detect
abl
e
(d)anyalt
erat
iontotheinf
ormat
ionmadeaf
teri
tsaut
hent
icat
ionbyel
ect
roni
c
signat
ureisdetect
able;
and
(
e)i
tful
fi
lssuchot
hercondi
ti
onswhi
chmaybepr
escr
ibed.
Secur
eEl
ect
roni
cRecor
d
Wher eanysecuri
typrocedurehasbeenappli
edtoanelect
ronicr
ecordataspeci
fi
c
pointofti
me,thensuchr ecor
dshallbedeemedt obeasecureel
ectr
onicr
ecord
fr
om suchpointoftimet otheti
meofv er
if
icat
ion.
Secur
eEl
ect
roni
cSi
gnat
ure(
Subst
it
utedv
ideI
TAA2008)
Anel
ect
roni
csi
gnat
ureshal
lbedeemedt
obeasecur
eel
ect
roni
csi
gnat
urei
f-
(i
)thesignat
urecreat
iondat
a,att
het
imeofaffi
xingsi
gnat
ure,
wasundert
he
exclusi
vecontr
olofsi
gnator
yandnootherper
son;and
(
ii
)thesi
gnatur
ecreat
iondat
awasst
oredandaf
fi
xedi
nsuchexcl
usi
vemanneras
maybeprescri
bed
Expl
anat
ion-I
ncaseofdigi
talsi
gnat
ure,
the"
signat
urecr
eat
iondat
a"meanst
he
pri
vat
ekeyofthesubscr
iber
Secur
it
ypr
ocedur
esandPr
act
ices(
Amendedv
ideI
TAA2008)
TheCent r
alGov er
nmentmayf orthepurposesofsections14and15pr escri
bethe
securi
typroceduresandpr acticesprovi
dedt hatinpr
escri
bingsuchsecuri
ty
procedur
esandpr actices,theCent r
alGovernmentshallhaveregar
dtot he
commer ci
al ci
rcumst ances, natur
eoftransactionsandsuchotherrel
atedfactor
sas
i
tmayconsi derappr opr i
ate.

Q6)Whati
smeantbyI
ntel
l
ect
ual
Proper
ty?
Ans)
I
ntel
l
ectualpr
opertymeansthel
egal
rightswhi
chr esul
tfr
om i
ntel
l
ect
ual
act
ivi
tyi
n
t
heindustr
ial
,sci
enti
fi
c,l
i
ter
ary,
andarti
sti
cfi
elds.

Q7)St
atet
heobj
ect
ivesofenv
ironment
alpr
otect
ionact1986.
Ans)
Themai
nai
m oft
heactcanbest
atedas:
•Toi
nit
iat
eact
ionsasperdeci
sionst
akeni
ntheSt
ockhol
m conv
ent
ion
•Enact
ingl
awsasperneedt
opr
otectt
heenv
ironment
•Createani
nst
it
uti
onal
aut
hor
it
yandst
ruct
uret
oregul
atei
ndust
ryandactf
orany
vi
olati
on
•Coordi
nateact
ivi
ti
esbydi
ff
erentagenci
esunderexi
sti
ngl
awsf
orpr
event
ionand
cont
rolofpol
lut
ion
•Setst
andar
dsf
oremi
ssi
onbydi
ff
erenti
ndust
ri
es
•Enf
orci
ngt
heenv
ironment
alpr
otect
ionactandi
mposepenal
ti
esf
orv
iol
ati
on
•Attai
ntheri
ghtt
oli
feinaheal
thyenv
ironmentt
oev
eryci
ti
zenoft
hecount
ryas
assuredi
ntheconst
it
uti
on
Q8)Li
stt
hedi
ff
erencesbet
weenel
ect
roni
canddi
git
alsi
gnat
ures.
Ans)
"Electronicsi
gnature"meansaut henti
cationofanyelect
roni
crecordbyasubscriber
bymeansoft heelectroni
ct echniquespecifi
edinthesecondscheduleandincl
udes
digitalsignat
urewhi l
e" Di
gitalSi
gnature"meansaut hent
icat
ionofanyelect
roni
c
recor dbyasubscr iberbymeansofanel ectr
oni
cmet hodorprocedurei
naccordance
witht hepr ov
isi
onsofsect ion3.

Q9)Listoutt
hesubjectmat
terf
orpat
entpr
otect
ionandwhati
nvent
ions
cannotbeprotect
ed?
Ans)
APatentisakindofintell
ect
ualpropertyr
ightgrantedfortechnicalinvent
ionsthat
ar
enov elandhaveinventi
vesteps.Patent
sar egrantedtonewi nv enti
ons,theyare
i
nval
uable,usef
ul,andplayanimpor t
antroleineverydayli
fe.Iti
sgr antedtoreward
i
deasthathelpindevelopmentofnewt echnologiesandencour ager esear
ch.

Ther
ear
ecer
tai
nty
pesofi
nvent
iont
hatcannotbepat
ent
ed.Thesei
ncl
ude:

 l
iter
ary,dramat i
c,musi cal,orart
ist
icwor ks
 awayofdoi ngbusi ness,playi
ngagame, orthi
nki
ng
 amet hodofmedi cal t
reatmentordi agnosis
 adiscovery,scienti
fictheory,ormat hemat i
calmethod
 thewayi nformationispr esented
 somecomput erprogramsormobi leapps
 ‘
Essentiall
ybiological’processes,suchascr oss-
breedi
ngpl
ant
s,andpl
antor
animalvarieti
es

Q10)Enumer
atet
heSal
i
entf
eat
uresoft
heDesi
gnAct
,2000.

Ans)

Toat
tai
nthepr
otect
ionunderI
ndi
anl
aw,
adesi
gnmust
:

1.Benon-
obv
ious,

2.Associ
atewi
thshape,
pat
ter
n,or
nament
ati
on,
orconf
igur
ati
onofanypr
oduct

3.Sat
isf
ynovel
tyandori
ginal
i
tycondi
ti
on,
itshoul
dnotbehadbeenpubl
i
shedor
usedanywher
eearl
ier
4.Benon-
cont
rar
y,i
.e.
,doesnothur
tthef
eel
i
ngsofany
one.

5.Capabl
eofappl
yi
ngt
oar
ti
cles

Q11)Wr
it
eashor
tnot
eonUt
il
it
yModel
s?
Ans)
Ut il
it
ymodel sareaki ndofpr otecti
ongr antedt oinv entionswhichar el
ikepat ents
rights.Theser ightsareusual lygrant
edt osmal li
nv entions.Therear eno
InternationalTreatyobligati
onst oimplementUt il
ityModel system undert heir
Nat ional Laws.Thoughsev eralcountri
esof ferUtil
itymodel protection,Indiadoes
notof f
erandi thasnotenact edanyLawsoni t.Aut ili
typatentisanexcl usiveright
gr antedf oraninventi
on, whichal l
owst her i
ghthol dert opreventot hersf r
om
commer cial
lyusingthepr otectedinventionwi t
houthi sauthori
zat i
onf oral i
mi t
ed
per i
od.Thesear ealsoknownas' pet
typat ents'or'innov ati
onpat ents'or'mi nor
pat ents'or'smallpatents'
.
Insomecount ries, Ut
ili
tymodel scanbegr antedforpr oductst hatar
eeli
giblefor
grantofpatents, howev er
,thesubj ectmat terv ar
iesfrom count r
ytocountr
y.As
therearenoInter nati
onalTreat yobli
gationsonUt il
it
yModel s,therei
snouni formit
y
i
nappr oachforgr ant
ingUtili
tyModel Patent s.Theadv antagesofgoi nginforutil
i
ty
patentsisthel
essst ri
ngentr equirements, thoughthenov el
ty ,
non-obvi
ousnessand
util
i
tycomponent sareessent ialforthegr antofut i
li
typatent s.Theymaybesetata
standardlowert hantheneedf oraPat ent.

You might also like