Lab - Unit 5 - It Act 2000
Lab - Unit 5 - It Act 2000
Lab - Unit 5 - It Act 2000
Unit 5:
The Information Technology
Act,2000
Definitions
Electronic Signature
Electronic Governance
Regulations of certifying authorities
Penalty
Compensation and Adjudication
1
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act
of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law
in India dealing with cybercrime and electronic commerce.
Secondary or subordinate legislation to the IT Act includes the Intermediary Guidelines Rules
2011 and the Information Technology (Intermediary Guidelines and Digital Media Ethics
Code) Rules, 2021.
The bill was passed in the budget session of 2000 and signed by President K. R.
Narayanan on 9 June 2000. The bill was finalised by a group of officials headed by
then Minister of Information Technology Pramod Mahajan.
The original Act contained 94 sections, divided into 13 chapters and 4 schedules. The laws
apply to the whole of India. If a crime involves a computer or network located in India,
persons of other nationalities can also be indicted under the law.
The Act provides a legal framework for electronic governance by giving recognition
to electronic records and digital signatures. It also defines cyber crimes and prescribes
penalties for them.
The Act directed the formation of a Controller of Certifying Authorities to regulate the
issuance of digital signatures. It also established a Cyber Appellate Tribunal to resolve
disputes arising from this new law. The Act also amended various sections of the Indian
Penal Code, 1860, the Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891,
and the Reserve Bank of India Act, 1934 to make them compliant with new technologies.
2
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
1.2.) Amendments:
A major amendment was made in 2008. It introduced Section 66A which penalized sending
"offensive messages".
It also introduced Section 69, which gave authorities the power of "interception or monitoring
or decryption of any information through any computer resource". Additionally, it introduced
provisions addressing - pornography, child porn, cyber terrorism and voyeurism.
The amendment was passed on 22 December 2008 without any debate in Lok Sabha. The
next day it was passed by the Rajya Sabha. It was signed into law by President Pratibha Patil,
on 5 February 2009.
2) Electronic Signature:
As we all know, signatures are the identity of an individual. Traditionally, signatures are
handwritten with pen on paper. However, now we can have electronic signatures! So, what
brought this change? Digitization is the answer. Many businesses adopted the digital route for
different business processes. This is the reason for which you can see better efficiency in
marketing and sales.
2.1.: Definition:
Electronic signature, commonly known as ‘e-signature’ and ‘e-sign’ is a legal concept, that is
different from digital signature which is a cryptographic method used to implement electronic
signatures. An electronic signature provides a precise and secure identification method to the
signatory to provide a seamless transaction.
An electronic signature has equal legal value as that of a handwritten signature as long as it
satisfies the requirements of the regulation under which it has been created. It is very simple
to create an electronic signature, and once created, it can be added to any document, even
along with other annotations like freeform text and check marks.
In layman’s terms, an electronic signature, commonly known as e-signature, is an electronic
expression of the agreement of a person to accept the terms mentioned in a particular
document.
3
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
According to the US Federal ESIGN Act, that was passed in 2000, “Electronic signature can
be defined as an electronic symbol, sound or process that is associated with a record or a
contract logically. An electronic signature is created or adopted by a person in order to
sign the record.”
Combined together, these two acts – UETA and ESIGN ACT allow the usage of electronic
signatures to replace the handwritten signatures. It is required that an electronic signature
meets the four legal hallmarks of the e-signature. In simple terms, here are four requirements
for an electronic signature to be recognized and validated by the US law, these are:
Sabargam College Prepared By: Shailesh P. Pandhi
4
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
1. The signer is who he/she claims to be. An electronic signature is the identity of the
signer. If required, the identity of the signer could be authenticated or verified using a
number of digital markers such as an IP address.
2. The intention of the signer to sign is clear. The terms of the document/ contract/
transaction should have been communicated well with the signer. The signer should
be intentionally agreed to undergo the e-signing procedure.
3. It could be verified that the signature is associated with the signed
document. This parameter basically involves the signing process such as how the
document was signed, which process the signer completed, and which documentation
supports the electronic transaction involving e-signature.
4. The record should be retained by the creator or sender. The electronic signature
records and documents should be created to retain and reproduce accurately for
further reference by all the parties and individuals who are responsible to retain the
record or contract.
A. Click-to-Sign Signatures
B. Basic Electronic Signatures
C. Advanced Electronic Signatures
D. Qualified Electronic Signatures
5
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
A. Click-to-Sign Signatures
Click-to-Sign category includes signatures in the form of scanned images, tick boxed, typed
names, and e-squiggles. In this type, the document is not provided with any cryptographic
protection. Due to which, this type of signatures neither verify the signatory nor protect the
document to be changed. It is possible to cut and paste this type of signatures from one
document to another easily. Using this type of signatures by own is not at all recommended.
B. Basic Electronic Signatures
Basic electronic signatures involve the process of applying a handwritten signature mark on
the document by the signer which is then protected with a cryptographic digital signature. So,
the basic electronic signatures allow the signer to create a crypto digital signature by using a
server-held signing key so-referred to as a witness digital signature.
Whenever the user applies e-signature on any document, this witness digital signature is
applied every time which binds the e-signature to the document cryptographically from any
subsequent changes, thus ensures data integrity. Whenever the user apply e-signature on any
document, this witness digital signature is applied every time which binds the e-signature to
the document cryptographically.
6
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
In the event that the accompanying data has been modified or changed after the
document was signed, the signature must be invalidated
Here are various kind of documents that can be signed with an electronic signature such as,
Marriage registration
Family law, and
Inheritance rights
A. Get documents signed fast – With an electronic signature, the document is signed
very fast i.e. within few minutes. Signing a document with a handwritten signature
would not also take time, but it takes time when the signatory is at distance. By using
an electronic signature software, you can create and send any document to be signed
over the boundaries in less than minute. The document is then received by the
signatory and signed in no time.
B. Sign documents from anywhere – For the handwritten signature, the sender had to
wait for days to weeks depending on the location of the signatory. Sometimes, it
might not be possible to send confidential documents via post. Or when sent through
Sabargam College Prepared By: Shailesh P. Pandhi
7
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
email, the signatory would have to get the hard copy to sign, and again shared the
scanned copy after signature. It might also take a few hours. But e-signature and e-
signature software has made the signing process very simple. Now, wherever be the
signatory, the documents are sent in email via e-signature software, and get signed
within minutes.
C. Save money with e-signature software packages – There is no doubt that e-
signature software has made the signing process simpler. Now, you don’t need to
spend on getting hard copy of the documents and sending them via post to the
signatory. Also, one can make big savings on the monthly and yearly packages
offered by the electronic signature vendors. So, it brings business benefits of
electronic signature in terms of investment.
D. Collect secure and legally binding signatures – As mentioned earlier, sharing
confidential and signed documents via post or over internet might not be much secure.
But e-signature software are secure enough to be used in order to share the
confidential information and signatures. Besides, electronic signatures are secure and
legally approved signatures, so you can create once and use them whenever and
wherever required.
E. Effort and time saving to handle technical hassles – When you decide to use
electronic signature for your business, organization or individual usage, you opt to use
an electronic signature software. By using an e-signature software, businesses save
their time as this software are not only easy to use, but comes with a support team of
technical experts that is always ready to resolve all your queries.
F. Increased service and efficiency – Now, with the electronic signature, business and
legal departments need not to cut down the business expenses by avoiding the
services. But they should opt to use e-signatures like modern technologies to reduce
their costs. An e-signature vendor helps the businesses to digitize all the important
and confidential legal documents. Also, it helps to share and sign the documents in an
easy, fast, and secure manner, independent of the number of parties involved.
3.E-Governance
8
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
3.1.: Meaning
B. G2C (Government to Citizen): The interaction amidst the government and general
public is G2C interaction. Here an interface is set up between government and
citizens, which enables citizens to get access to wide variety of public services. The
citizens has the freedom to share their views and grievances on government policies
anytime, anywhere.
C. G2B (Government to Business): In this case, the e-governance helps the business
class to interact with the government seamlessly. It aims at eliminating red-tapism,
saving time, cost and establish transparency in the business environment, while
interacting with government.
9
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
4.1. Introduction
Section 17 provides that the Central Government may, by notification in the Official Gazette,
appoint a Controller of Certifying Authorities for the purposes of this Act. It may also be the same
or subsequent notification appoint such number of Deputy Controllers, Assistant Controllers, other
officers and employees as it deems fit.
The controller has to functionunder the general control and directions of the Central Government
and the Deputy Controllers and Assistant Controllers have to function under general
superintendence and control of the controller. The controller shall have its head office at a place
prescribed by the Central Government. There shall be a seal of the office of the controller.
Sabargam College Prepared By: Shailesh P. Pandhi
10
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
A. To act as regulator of certifying authorities (Sec. 18). The main functions of the controller are
to regulate the working of certifying authorities. He performs the following functions in this
regard:
B. To recognise the foreign certifying authority (Sec. 19). The controller, with the prior permission
of the Central Government and by notification in the Official Gazette, may recognise any foreign
certifying authority for the purpose of this Act [Sec. 19(1)].The controller may revoke such
recognition by notification in the Official Gazette for reasons to be recorded in writing [Sec.
19(3)].
C. To grant licence to CAs to issue electronic signature certificate (Sec. 21). The controller can
grant a licence to any person to issue electronic signature certificate provided he applies and fulfils
such requirements with respect to qualification, expertise, manpower, financial resources and
other infrastructure facilities which are necessary for the issue of Electronic Signature Certificate
[Sec. 21(1) and (2)].The controller may after considering the documents and such other factors, as
he deems fit, grant the licence or reject the application. He may reject only after the applicant has
been given a reasonable opportunity of presenting his case (Sec. 24).
D. To suspend licence (Sec. 25). The controller may suspend licence if he is satisfied after making
an enquiry that CA has:
Made a statement which is incorrect or false in material particulars in or relation to the application
for the issue or renewal of licence.
Failed to comply with terms and conditions necessary for granting of licence.
11
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
The notice of suspension or revocation may be published in the database maintained by the
controller (sec. 26).
12
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
(b) by any means to usurp the normal operation of the computer, computer system,
or computer network;
(iii) "computer virus “means any computer instruction, information, data or programme
that destroys, damages, degrades or adversely affects the performance of a computer
resource or attaches itself to another computer resource and operates when a
programme, data or instruction is executed or some other event takes place in that
computer resource;
(iv) "damage “means to destroy, alter, delete, add, modify or rearrange any computer
resource by any means;
13
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
(b) file any return or furnish any information, books or other documents within the time
specified therefor in the regulations fails to file return or furnish the same within the
time specified therefor in the regulations, he shall be liable to a penalty not exceeding
five thousand rupees for every day during which such failure continues;
(c) maintain books of account or records fails to maintain the same, he shall be liable to a
penalty not exceeding ten thousand rupees for every day during which the failure
continues.
14
T.Y.B.B.A. Legal Aspect of Business Unit:5 The Information Technology Act: 2000
(2) The adjudicating officer shall, after giving the person referred to in sub-section (1) a
reasonable opportunity for making representation in the matter and if, on such inquiry, he is
satisfied that the person has committed the contravention, he may impose such penalty or
award such compensation as he thinks fit in accordance with the provisions of that section.
(3) No person shall be appointed as an adjudicating officer unless he possesses such
experience in the field of Information Technology and legal or judicial experience as may be
prescribed by the Central Government.
(4) Where more than one adjudicating officers are appointed, the Central Government shall
specify by order the matters and places with respect to which such officers shall exercise their
jurisdiction.
(5) Every adjudicating officer shall have the powers of a Civil Court which are conferred on
the Cyber Appellate Tribunal under sub-section (2) of section 58, and-
(a) all proceedings before it shall be deemed to be judicial proceedings within the
meaning of sections 193 and 228 of the Indian Penal Code (45 of 1860);
(b) shall be deemed to be a Civil Court for the purposes of sections 345 and 346 of the
Code of Criminal Procedure, 1973 (2 of 1974);
[(c) shall be deemed to be a Civil Court for purposes of Order XXI of the Civil Procedure
Code, 1908 (5 of 1908).]
(b) the amount of loss caused to any person as a result of the default;
15