BUSINESS TRANSACTIONS AND CYBER LAW INC GUNTUR PUTTU GURU PRASAD
LEGAL FRAME WORK FOR IT RELATED TRANSACTIONS The
IT act is made applicable to cyber crimes committed in and outside India. The act brings into its ambit recognition and authentication of electronic transactions, records and digital signatures. A legal frame work for regulating the e-commerce transactions and imposition of punishments and penalties for violating the regulations is aslo put in place by the act
CLICK-WRAP AGREEMENTS
Click-wrap or web–wrap agreements are commonly used in connection with e-commerce transactions. These agreements are typically used to specify the terms and conditions applicable to the use of the website as well as to the products and services purchased over the internet. With these agreements , the buyer or user usually explicitly assents to these terms by clicking on a button stating’ I agree’ or ‘ I accept’ after having had an opportunity to review the terms
AUTHENTICATION OF ELECTRONIC RECORDS A
record is the documentation of a transaction that happens as a result of someone taking a particular action at a particular time. Electronic records are extremely good at generating and storing data, but much less adequate at identifying when that data could be considered a record.
ATTRIBUTION OF ELECTRONIC RECORDS An
electronic record shall be attributed to the originator if it fulfills the following conditions Sent by the originator himself or a person who had authority to act on behalf of the originator to operate Sent by an information system programmed by or on behalf of the originator to operate automatically
LEGAL STATUS FOR ELECTRONIC RECORDS Amendments
to Negotiable instruments
act,1881 Amendments to RBI act,1934 Amendments to Banker’s books evidence act,1891 Amendments to Indian penal code
CYBER OFFENCES Against Against individuals individual property
Against organizations
Against society at large
Harassment via emails
Transmitting virus
Unauthorized control
Pornography
Cyber-stalking
Net trespass
Possession of unauthorized information
Trafficking
Sending of obscene material
Unauthorized control
Cyber terrorism
Financial crimes
defamation
IP crimes
Distribution of pirated software
Sale of illegal articles
Unauthorized control over computer
Time - thefts
Indecent exposure Email spoofing Cheating and fraud
Online gambling forgery