View
213
Download
0
Category
Tags:
Preview:
DESCRIPTION
This Presentation Describes the Chapter 5 of indian IT Acts.i.e Information Technology Acts.This Presentation Describes Secure Electronic Records and Secure ELectronic Signature
Citation preview
Secure Electronic Records and Secure Electronic Signatures
Poornima College Of Engineering
Seminar on IT Acts
Presented By:Name: - Lokesh KumarRoll No: - 27IV-C
Submitted To:-Mr. Loveleen Tak
Table of Contents
This Presentation will include the following Topics of chapter-V of IT Acts:-
Electronic Record
Electronic Signature
Security Procedure
What is Electronic Record ?
Any combination of text, graphics, data, audio, pictorial, or other information representation in digital form that is created, modified, maintained, archived, retrieved, or distributed by a computer system.
Electronic Record-Security Risks
Hacking By unauthorized Agencies
Long term data management problem
Loss of privacy
Data Loss in Hazards
Secure Electronic Record
Any electronic record where any security procedure has been applied to an electronic record at a specific point of time, then such record shall be deemed to be a secure electronic record from such point of time to the time of verification.
Procedures to Make Electronic Records Secure
1.Symmetric Key Cryptography2.Asymmetric Key Cryptography
What is Electronic Signature?
The term 'electronic signature' means an electronic sound, symbol, or process, attached to or logically associated with a contract or other record and executed or adopted by a person with the intent to sign the record.
Benefits of Electronic Signature
Time and money saved
Faster results
Increased efficiency
Legally binding
documents
Flexibility to work
on the go
What is Secure Electronic Signature?
A Electronic Signature is said to be Secure if: -
is unique to the person making the signature.
the technology or process used to make the signature is under the sole control of the person making the signature.
the technology or process can be used to identify the person using the technology or process.
the electronic signature can be linked with an electronic document in such a way that it can be used to determine whether the electronic document has been changed since the electronic signature was incorporated in, attached to or associated with the electronic document.
Security Procedures
The Central Government shall for the purpose of this Act prescribe the security procedure having regard to commercial circumstances prevailing at the time when the procedure was used, including-
the nature of the transaction.
the level of sophistication of the parties with reference to their technological capacity.
the volume of similar transactions engaged in by other parties.
the availability of alternatives offered to but rejected by any party.
the cost of alternative procedures.
the procedures in general use for similar types of transactions or communications.
Conclusion
Learning of This Presentation are:-
Secure Electronic Record
Secure Electronic Signature
Security Procedures
Recommended