Page 126 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 126
Sarabjit Kumar, Lovely Professional University Unit 10: Legal Issues - II
Unit 10: Legal Issues - II
CONTENTS
Objectives
Introduction
10.1 Technology for Authenticating Electronic Document
10.2 Laws for E-Commerce in India
10.2.1 Cyber Laws in India
10.2.2 Commonly Used Laws
10.3 EDI Interchange Agreement
10.4 Summary
10.5 Keywords
10.6 Self Assessment
10.7 Review Questions
10.8 Further Readings
Objectives
After studying this unit, you will be able to:
• Explain the technology for authenticating electronic document
• Discuss the laws for e-commerce in India
• Interpret EDI interchange agreement
Introduction
The Indian parliament came up with the Information Technology Act, 2002, that gives identification for
its legal enactment. Now, if anyone knowingly or unknowingly conceals, destroys, tampers, or alters
any computer source code, it would be considered an offense. However, electronic records can be
authenticated and safeguarded using digital signatures. There are many laws which govern advertising,
children, copyright, trademarks, and zoning.
10.1 Technology for Authenticating Electronic Document
Communication systems and digital technology have made changes in the way businesses are done.
Use of computer to create, transfer, and store the information or data is increasing. The Information
Technology Act, 2000, was passed to promote efficient delivery of government services by means of
reliable electronic records. Electronic documents can be authenticated using digital signatures, which in
turn are validated by a subscriber using an electronic method or procedure. Any subscriber can
authenticate the electronic record by affixing his digital signature.
Digital signatures can be affixed with the grammatical variations and similar expression using any
methodology or procedure by a person with the intention of authenticating electronic record. Digital
signatures should follow the Public Key Infrastructure (PKI). PKI allows access to users to basically
unsecure public network like the Internet to securely and privately exchange data with the use of public
and a private cryptographic key pair, which is obtained and shared through a trusted authority. A
digital signature scheme consists of three algorithms. They are
1. Key Generation Algorithm: This allows a user to choose a private key randomly from a set of
possible private keys. The algorithm generates a private key and public key.
2. Signing Algorithm: This generates a signature using the message and private key.
LOVELY PROFESSIONAL UNIVERSITY 119