Page 126 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 126

Sarabjit Kumar, Lovely Professional University                  Unit 10: Legal Issues - II




                                         Unit 10: Legal Issues - II


               CONTENTS

               Objectives
               Introduction
               10.1 Technology for Authenticating Electronic Document
               10.2 Laws for E-Commerce in India
                   10.2.1   Cyber Laws in India
                     10.2.2   Commonly Used Laws

               10.3 EDI Interchange Agreement
               10.4 Summary
               10.5 Keywords
               10.6 Self Assessment
               10.7 Review Questions
               10.8 Further Readings

               Objectives
               After studying this unit, you will be able to:
               •    Explain the technology for authenticating electronic document

               •    Discuss the laws for e-commerce in India
               •    Interpret EDI interchange agreement
               Introduction
               The Indian parliament came up with the Information Technology Act, 2002, that gives identification for
               its legal enactment. Now, if anyone knowingly or unknowingly conceals, destroys, tampers, or alters
               any computer source code,  it would be considered an  offense. However, electronic records can be
               authenticated and safeguarded using digital signatures. There are many laws which govern advertising,
               children, copyright, trademarks, and zoning.
               10.1 Technology for Authenticating Electronic Document

               Communication systems and digital technology have made changes in the way businesses are done.
               Use of computer to create, transfer, and store the information or data is increasing. The Information
               Technology Act, 2000, was passed to promote efficient delivery of government services by means of
               reliable electronic records. Electronic documents can be authenticated using digital signatures, which in
               turn are validated by a subscriber using  an electronic  method or procedure. Any  subscriber can
               authenticate the electronic record by affixing his digital signature.
               Digital signatures can be affixed with the  grammatical variations and similar expression using any
               methodology or procedure by a person with the intention of authenticating electronic record. Digital
               signatures should follow the Public Key Infrastructure (PKI).  PKI allows access to users to basically
               unsecure public network like the Internet to securely and privately exchange data with the use of public
               and a private cryptographic  key pair, which is obtained and shared through a trusted authority.  A
               digital signature scheme consists of three algorithms. They are
               1.   Key Generation Algorithm:  This allows a user to choose a private key randomly from a set of
                    possible private keys. The algorithm generates a private key and public key.

               2.   Signing Algorithm: This generates a signature using the message and private key.


                                    LOVELY PROFESSIONAL UNIVERSITY                              119
   121   122   123   124   125   126   127   128   129   130   131