Page 91 - DCOM404_CORPORATE_LEGAL_FRAMEWORK
P. 91

Corporate Legal Framework




                    Notes          4.14 Keywords

                                   APIO: Assistance Public Information Offi cers

                                   CIC: Central Information Commission
                                   Decryption: Decryption is the reverse process of converting encoded data to its original
                                   un-encoded form, plaintext.

                                   Digital Signatures: a message signed with a sender’s private key can be verified by anyone

                                   who has access to the sender’s public key, thereby proving that the sender signed it and that the
                                   message has not been tampered with. This is used to ensure authenticity.
                                   Encryption: Encryption is a process of coding information which could either be a file or  mail

                                   message  in into cipher text  a form unreadable without a decoding key in order to prevent
                                   anyone except the intended recipient from reading that data.
                                   Information Technology: Hardware and software that perform data processing tasks, such as
                                   capturing, transmitting, storing, retrieving, manipulating or displaying data.
                                   PIO: Public Information Offi cers

                                   RTI: Right to Information

                                   4.15 Self Assessment

                                   Fill in the blanks:
                                   1.   ....................... is a part of fundamental rights under Article 19 (1) of the Constitution.
                                   2.   RTI ....................... transparency & credibility of public authority.


                                   3.  Effective information flow helps citizen to secure their ....................... and .......................
                                   4.   IT Act facilitates electronic storage of data in place of ....................... methods of storage of
                                        data.

                                   5.   IT Act provides legal recognition for transactions carried out by means of .......................
                                        and other means of .......................
                                   6.   RTI extends to ....................... of India.

                                   7.   A trust is defined in the .......................
                                   8.   Legal recognition of electronic records come under .......................
                                   9.   Secure digital signature come under .......................
                                   10.   Right to legal representation comes under .......................
                                   11.   Hacking with computer system comes under .......................
                                   12.   IT Act, 2000 was passed which is based on the ....................... Model law on electronic
                                        Commerce.
                                   State whether the following statements are true or false:
                                   13.   RTI Act, 2005 was implemented in our country on 15th June, 2005

                                   14.   The Indian IT Act also needs to evolve with the rapidly changing technology environment
                                        that breeds new forms of crimes and criminals.








          86                               LOVELY PROFESSIONAL UNIVERSITY
   86   87   88   89   90   91   92   93   94   95   96