Information Technology Acts

Embed Size (px)

Citation preview

  • 8/2/2019 Information Technology Acts

    1/12

    Digital Signature

    Information Technology Acts

  • 8/2/2019 Information Technology Acts

    2/12

    Enacted on 17th May 2000- India is 12thnation in the world to adopt cyber laws

    IT Act is based on Model law on e-commerce

    adopted by UNCITRAL

    Information Technology Acts -2000

  • 8/2/2019 Information Technology Acts

    3/12

    To provide legal recognition for transactions:-

    Carried out by means of electronic datainterchange, and other means of electroniccommunication, commonly referred to as"electronic commerce

    To facilitate electronic filing of documents withGovernment agencies and E-Payment amend theIndian Penal Code, Indian Evidence Act,1872, theBankers Books Evidence Act 1891,Reserve Bank

    Objectives of IT Act

  • 8/2/2019 Information Technology Acts

    4/12

    Authenticates who created a document

    Adds formality and finality

    Deeds and wills

    Contracts over $500 or for more than year

    (Statute of Frauds) Timesheets and reports

    Homework

    Why Signatures?

  • 8/2/2019 Information Technology Acts

    5/12

    Not simply a typed name or image of ahandwritten signature

    Based on public-key encryption

    Associated with a digital document

    Digital Signatures

  • 8/2/2019 Information Technology Acts

    6/12

    Not simply a typed name or image of ahandwritten signature

    Based on public-key encryption

    Associated with a digital document

    Sections 3 definesDigital Signature

  • 8/2/2019 Information Technology Acts

    7/12

    Digitally signing a document

    Indicate extent of signed document

    Compute checksum of signed document

    Encrypt checksum, time and date, and otherinformation using private key

    Attach digital signature to end of document

    Optionally, encrypt signed document with

    receivers public key

    Digitally Signing a document

  • 8/2/2019 Information Technology Acts

    8/12

    Decrypt signed document, if necessary,usingprivate key Decrypt digital signature usingpublic key

    Verify checksum for documentDisplay the time and date of the document

    Verification a Document

  • 8/2/2019 Information Technology Acts

    9/12

    Where a rule of law requires a signature, or

    provides for certain consequences in theabsence of a signature, that

    rule is satisfied by a digital signature, if:

    (1) that digital signature is verified by referenceto the public key listed by a licensedcertification authority;

    Effect of Digital Signature

  • 8/2/2019 Information Technology Acts

    10/12

    Passed by Utah legislature in 1995

    Revised in 1996

    Implementing regulations now been writtenInitial infrastructure providers have been

    selected First state applications to beelectronic

    filing of court documents and UCC1 forms

    Status Of Act

  • 8/2/2019 Information Technology Acts

    11/12

    State actions

    Smart cards Electronic notary sealsSignature surrogates

    Private sector actions

    Cybernotaries Electronic checks

    Anonymous, verified transactions

    Future Developments

  • 8/2/2019 Information Technology Acts

    12/12

    Presented By:

    Meghna Sharma

    IT(Sec-A)

    Thank You!