Professional Documents
Culture Documents
Amendments in 2008
Agenda
Background
Parts of the Act
What works
What doesnt work
Conclusion
Background
Formulated in the year 2000
Based on the UN UNCITRAL Model Law
on Electronic Commerce
Focuses quite a bit on digital signatures
Does not directly address concerns related
to electronic commerce and data privacy
Has been in the news in a number of highprofile cases
Title
Description
1.
Preliminary
2.
Digital Signature
3.
Electronic
Governance
4.
Attribution,
Acknowledgement,
and Despatch of
Electronic Records
5.
Secure Electronic
Records and Secure
Digital Signatures
6.
Regulation of
Certifying Authorities
Description
7.
Digital Signature
Certificates
8.
Duties of Subscribers
9.
Penalties and
Adjudication
10.
Cyber Regulations
Appellate Tribunal
11.
Offences
Title
Description
12.
Network Service
Providers not to be
Liable in Certain Cases
13.
Miscellaneous
Sections of note:
Digital Signatures
If a message should be readable but not
modifiable, a digital signature is used to
authenticate the sender
Parameter
Paper
Electronic
Authenticity
May be forged
Cannot be copied
Integrity
Signature
independent of the
document
Signature depends
on the contents of
the document
Non-repudiation a.Handwriting
expert needed
b.Error prone
a.Any computer
user
b.Error free
info@niiconsulting.com
Unauthorized copying or distribution of this material is strictly
Amendments - 2008
Points
Nothing mentioned on e-commerce and validity of
electronic commercial transactions
Majority of the sections deal with digital signatures
and certifying authorities
Hacking is treated very briefly and perfunctorily
Unauthorized access is a very broad definition as
per the Act
Somewhat Draconian in the rights it gives to
Deputy Superintendent of Police
Liabilities of company and network provider
Implications of reasonable storage of access data
clause?
Cases
Famous Baazee (now eBay India) CEO arrest case
Two school kids record a pornographic clip on their
mobile phone, and share it as an MMS
An IIT student receives the clip and posts it on
Baazee.com (the Indian arm of Ebay) for auction
When this is discovered, the Delhi Cyber Crime Cell
arrests:
Mr. Avnish Bajaj, Director of Bazee
The IIT student who posted the clip
The juvenile who was in the clip
Conclusions
Cases
The Cybercime Cells website was hacked
A hoax email about a bomb planted in
Parliament was sent to all the MPs
In both cases, the police arrested the
owners of the cyber cafes from where the
crimes were committed
Sections 65 (tampering with computer
source documents) and 66 (hacking with
computer system) were invoked
Conclusions
info@niiconsulting.com
Unauthorized copying or distribution of this material is strictly