Unit - Ii
Unit - Ii
Unit - Ii
Introduction :- scientist who have figured out how to get computer to talk to each other 50
years ago, possibly have no idea that their computer could evolve into the highly commercial,
user friendly, internet of today.
Way back in 1969 the ‘infant’ internet was possibly boon, when a computer was first
connected to a switch or routes and later on to another computer.
Internet has revolutionized society to enable users to search for material, retrieve it,
store it on their computers and open it with a single command.
The dramatic rise of internet and World Wide Web has transformed the way business is
carried out, improving accuracy, efficiency and speed.
Today’s industrial economy is evolving into a new business environment in which
money, goods, services and information are exchanged electronically.
The internet becoming more popular with each passing day. E-commerce has emerged
as the fastest growing form of business today.
Meaning of E-Commerce:- the ability to conduct business electronically or over the internet.
Initiatives in India –
1. IPC
2. Indian Evidence Act
3. The Contract Act
4. The Indian Telegraph Act
5. The Banker’s Books Evidence Act
6. The general clauses act
7. The R.B.I Act
It has examined various combination of tools including legal and business process and policies.
E security would give credibility to E-commerce against online frauds and hacking etc. which
can be achieved by adequate legal framework and a protective technology.
1|Page
Business to business
The B2B kind of e-commerce refers to a company, selling or buying from other
companies.
A company communicates with the other companies by electronic means.
It is by means of Electronic Data Interchange ( EDI ).
EDI transaction include sending or receiving of orders invoices and shipping notices.
This is the method of extending the organization computing power beyond its
boundaries.
But the high cost and maintenance of the networks made this method out of reach for
small and medium sized business.
With the introduction of the internet, companies regardless of size can communicate
with each other electronically and cheaply.
Companies that do so use it in several ways depending on weather they are
manufacturers or suppliers.
Business to customers
This kind of e-commerce refers to a company selling its products or services to the
customers using the internet as the communication medium.
It is an umbrella term for entire spectrum of activities such as Electronic Data
Interchange ( EDI ), electronic payment systems, inventory and order management,
product support and service, information delivery and other business application linking
solutions through the use of paperless information technologies such as the internet bar
coding, e mail, smart cards, CDROMS etc.
Benefits :-
1. Increase customer satisfaction. The internet is always open- so business is always open
24 hours a day 7 days a week and 365 days a year.
2. Increases sales volume.
3. Decreases costs of doing business.
The technology of cryptography provided legal sanction by Information Technology Act,
2000 would go a long way boosting E-commerce.
Risks of E-Commerce
1. Security
The issue of cyber jurisdiction has been become global character which cannot be
genuinely address by passing only national legislations. Cyber jurisdiction global in
character which requires global solution. An international treaty relating to uniform
rules applicable to E-commerce badly needed to be adopted.
Initiatives in India :
2|Page
1. I.P.C
2. Indian Evidence Act
3. The Contract Act
4. The Indian Telegraph Act
5. The Bankers Books Evidence Act
6. The General Clauses Act
7. The Reserve Bank of India Act
To facilitate E-commerce various changes are made in the aforesaid act as an initiative
taken in India.
Digital signature
Creating a digital signature: basically a digital signature is a two way process; involving two
parties:
A Hash function is an algorithm which creates a digital representation or finger print in form
of a hash value or hash result of a standard length which is much more smaller than the
message.
Algorithm (a set of rules that must be followed when solving a particular problem.)
Definition: a digital signature can be defined as a short unit of data in the documents
context and provides assurance to the recipient that the data is authentic.
The electronic record means data record or data generated image or sound, stored received
or sent in an electronic form.
The electronic form with reference to information means any information guaranteed, sent
received or stored in media, magnetic, optical, computer memory or similar device.
3|Page
Role and regulation of Certifying Authorities
The problem of identification of public key holder can be solved by appointing a third party
trusted by sender as well as recipient, to perform the task it is necessary to associate a person,
or entity with a specific public key. This third party is generally called as C.A .
The I.T Act calls that third party as certifying authority. It is also called issuing authority or
certificate issuer. These expressions have been used interchangeably throughout this work.
1. A Certifying Authority is a trusted body either public or private that ascertains the
identity of the applicant of D.S.C (Digital Signature Certificate).
2. He certifies that the public key of a public- private key pair used to create digital
signature belongs to that person.
3. The applicant seeking to verify a digital signature needs at least –
a) The public key corresponding to the private key used to create the digital signature.
b) Reliable evidence that the public key is identified with the signer.
Once the certifying authority has verified the association between an identified person and
a public key, the certifying authority then issue a certificate.
4|Page
Each certificate contains a public key value and information that uniquely ‘identifies’ the
certificate’s subject that is, the person, device or other identity that holds the
corresponding private key.
Since public keys are meant for public use, so there is no need of keeping public key value
confidential, so certificates are not generally confidential.
Types of certificates
Class 1 are designed for casual web browsing and secure e-mail and are issued to
individuals only inter and intra organizational e-mail, transaction e-mail.
Class 2 more expensive provides a reasonable level of assurance of a subscriber’s
identity but it is not fool proof.
Class 3 are issued to individuals as well as organizations for electronic data interchange
(EDI), software validation, e-banking services, membership based online services.
Class 4 involve through investigation of both an individual as well as organization given
by CA in a statement called certification practice statement (2h).
Public key and private key has to be kept valid only for limited duration, a longer period of
validity increases the chance of compromise.
5|Page
Chapter 4
Appointment
Functions:-
1. One of the important functionaries in the I.T.Act is the controller of certifying authority.
2. His role in public key infrastructure is indispensible.
3. He acts as a central controlling body.
4. He has been assigned multiferous functions to effectuate smooth functioning of the
certifying authority.
5. The controller may perform all of the following functions:
a) Exercising supervision over the activities of C.A.
b) Certifying public key of the C.A.
c) Laying down standards to be maintained by C.A.
d) Prescribing qualification, experience for employees.
e) Prescribing business rules.
Powers of controller:
6|Page
II. Power to issue license ( 21, 22)
III. Power to renew license ( 23,24,25)
IV. Power to suspend + revoke license (26)
V. Power to delegate and investigate (27,28)
a) Power regarding discovery + production of evidence
b) Power of search and seizure
c) Power of requisition Books of Account
d) Power of call for information
e) Power of survey
f) Power to collect certain information
g) Power to inspect registers of companies
5. Power to have access to computers and data.
6. Power to issue direction.
7. Power to decrypt information.
8. Power to make regulations.
7|Page