CL
CL
CL
Cyber Law
Cyber law is the set of laws, rules, and regulations that guide the Internet.
They are meant to stop cybercrime, keep digital assets safe, and control
what people can do online.
Types of E-Contracts
There are several types of e-contracts, each with its unique features:
Unilateral e-contracts involve one party making an offer, and the other
party's acceptance is not required, whereas bilateral e-contracts require
mutual agreement between both parties.
These e-contracts require users to click on an "I Agree" button to accept the
terms and conditions before using a service, such as signing up for an online
platform.
These e-contracts are used in the software industry, where the terms and
conditions are contained within the software's packaging.
Shrinkwrap agreements are considered binding when the user opens the
software package, thereby accepting the terms and conditions.
e) Smart Contracts:
The Electronic Signatures in IT act, 2000 Act has played a significant role in
legitimizing e-contracts, as it grants electronic signatures the same legal
status as handwritten signatures.
PROCEDURES OF E-CONTRACT
1. Offer
An offer states the exchange of value between the contracting parties, and
the offer’s details may be highly detailed. For example, some contract
requirements may include an identifying number of an item, such as a
vehicle’s VIN, for the contract to be valid. Simply making an offer for “a blue
car” may not be specific enough.
2. Acceptance
If the offeree accepts the proposed offer — whether the original offer or a
counteroffer — they may do so verbally or in writing. Acceptance of an offer
can come in several forms, including:
Each of the parties involved must agree to the terms and conditions and be
bound by the contract. For a contract to be legally binding, both parties must
be aware of what they are agreeing to.
Agree of their own free will to be bound by the obligations set forth in the
deal
4. Competency
All parties agreeing to the contract must be competent to enter into a legally
binding agreement. In short, an individual cannot unwittingly sign away their
rights or property. Competency is a common argument in the validity of a will
or other estate planning documents.
U.S. contract law requires all parties signing the contract to demonstrate that
they are in possession of their faculties and are able to give consent. A minor
(someone under the age of 18) is not legally able to consent to a contract,
for example, and so their signature on a contract could render it invalid.
Minors aren’t the only category or persons who may be deemed legally
incompetent to sign a contract. Someone falling into one of these categories
may also not have the capacity to enter into a contractual agreement:
However, just because someone falls into one of these categories doesn’t
mean they cannot participate in the contract.
A minor child can have their legal representatives, such as their parent or
guardian, sign a contract for them, or in the case of someone who doesn’t
understand the language of the original contract, a certified translated copy
may be provided for them to sign.
5. Legal Purpose
A contract, either written or verbal, serves to legally bind all parties to the
terms of the agreement. The legal purpose of a contract is to provide
enforceable options for an aggrieved party if the other party fails to honor
the terms of the agreement.
6.Transaction Details
The explicit details of the transaction may be stated in a contract. If, for
example, one party purchased an item from another party and agreed to pay
for it in installments, then the details of the payments, such as a calendar of
the date, time, or amount, would be part of the contract.
Other transaction details in the contract could include proof of sale for an
item or service, such as a copy of the sales receipt. Or transaction details
may be the date and method of delivery of an item, as one might find when
buying something online and having it delivered.
7.Digital Signature
A digital signature is an electronic version of a fingerprint or a wet signature.
It guarantees that a digital document, such as a text file, email, or
spreadsheet, is genuine.
Digital Signature
Hash value of a message when encrypted with the private key of a person
is his digital signature on that e-Document. Digital Signature of a person
therefore varies from document to document thus ensuring authenticity of
each word of that document. As the public key of the signer is known,
anybody can verify the message and the digital signature.
Digital signatures get their official status through signing certificates. Signing
certificates serve as authentication for transmitted documents, their
contents and the author of these documents. An official third-party certificate
authority is responsible for administering these certificates. CAs verify that
organizations are in compliance with cybersecurity standards, such as
International Organization for Standardization (ISO) standards. Only after an
organization has been approved is a certificate provided.
The approval process starts with the CA assessing the needs of the author
and ensuring their methods comply with regulations. The CA then issues a
signing certificate and the cryptographic key pair needed to secure the
documents' contents. A mathematical algorithm generates this key pair to
ensure the contents can't be accessed without both keys. Ultimately, the
digital signature includes the following:
The signing certificate from the CA, which contains the public key and the
written proof that the CA has approved the process.
The private key, which the author must keep confidential and which is used
to encrypt the documents.
Timestamping. This provides the date and time of a digital signature and is
useful when timing is critical, such as for stock trades, lottery ticket issuance
and legal proceedings.
Globally accepted and legally compliant. The public key infrastructure (PKI)
standard ensures vendor-generated keys are made and stored securely. With
digital signatures becoming an international standard, more countries
are accepting them as legally binding.
Insecure channels. Despite the security layer digital signatures provide, the
channels used to transmit documents can still have inadequate security
measures. Without proper encryption and authentication, they could lead to
compromised documents and data loss.
Key management. Compromised or lost keys are useless; therefore,
organizations must be prepared to craft policies and procedures for
employees to properly manage their keys, which can be complicated.
Cryptographic mechanisms
This section lists the cryptographic mechanisms or tools that may be used to
achieve the security goals of an eContracting system. A more detailed
description of these mechanisms is provided in the later sections of this
report.