The document discusses cyber laws and provides an overview of key concepts related to cyber laws in India. It defines key terms like cyberspace, discusses the fundamentals and jurisprudence of cyber law, and outlines some of the major provisions and amendments of the Information Technology Act, 2000, which is the primary law governing cyber laws in India. The document also discusses the evolution of e-commerce and provides examples of e-governance initiatives in India.
This document provides an introduction to cyber law. It discusses how the internet and technology have evolved over time to connect people to information and each other. It also notes some of the risks that have emerged with technology, such as cyber crimes. The document then defines cyberspace and discusses some key aspects of it, such as its lack of boundaries and potential for anonymity. It concludes by outlining some penalty provisions under cyber law for offenses related to unauthorized access and harming computers/networks.
Cybercrime Investigations and IT Act,2000Karnika Seth
This document provides an overview of the legal framework for cybercrime investigations in India. It discusses the Information Technology Act 2000 and 2008 amendments, which provide the main legal statutes governing cybercrimes. The amendments aimed to address new cybercrimes, strengthen evidence collection and increase accountability of intermediaries. Key aspects covered include cybercrime definitions, investigating agency powers, adjudicating authorities, and responsibilities of network service providers.
This document discusses cybercrime in India, including the Information Technology Act 2000 and its amendments. It provides definitions of cybercrime, classifications of offenses like those against individuals, property, organizations and society. Examples of famous cybercrime cases in India are mentioned. Statistics on cybercrime growth are presented. The role of organizations like NASSCOM in combating cybercrime through initiatives focused on engagement, education, enactment and enforcement is summarized. Suggestions for dealing with cybercrime through international cooperation, funding research, upgrading laws and training law enforcement are provided.
Cyber laws and cyber crimes are discussed. Cyber law refers to legal issues related to communications technology and the internet. The Information Technology Act was passed in 2000 in India to recognize electronic transactions and facilitate electronic filing. Cyber crimes include hacking, data theft, spreading viruses, identity theft, and email spoofing. The IT Act and Indian Penal Code sections apply to cyber crimes and outline punishments such as imprisonment and fines. Cyber laws are needed to tackle cyber crimes and protect intellectual property rights in today's internet-reliant world.
The document discusses the Information Technology Act of 2000 in India. It was passed to promote e-commerce and regulate electronic transactions. Some key points:
- The Act provides legal recognition for digital signatures and electronic documents to facilitate online transactions and e-governance.
- It established regulatory authorities for certifying digital signature certificates and created provisions to prevent cybercrimes like hacking and publishing of obscene content online.
- Major amendments in 2008 introduced concepts of electronic signatures beyond digital signatures, data protection responsibilities for companies, and new cybercrimes under the Act.
This document provides an overview of cyber law in India. It summarizes the Information Technology Act 2000, which provides the legal framework for electronic commerce and digital signatures. It outlines some key sections of the act related to digital signatures, cyber crimes, data privacy, penalties, and amendments made in 2008. Examples of cyber crimes in India are also briefly described. The summary is intended to convey the high-level purpose and scope of cyber law in India according to this document.
This document provides an introduction to cyber law. It discusses how the internet and technology have evolved over time to connect people to information and each other. It also notes some of the risks that have emerged with technology, such as cyber crimes. The document then defines cyberspace and discusses some key aspects of it, such as its lack of boundaries and potential for anonymity. It concludes by outlining some penalty provisions under cyber law for offenses related to unauthorized access and harming computers/networks.
Cybercrime Investigations and IT Act,2000Karnika Seth
This document provides an overview of the legal framework for cybercrime investigations in India. It discusses the Information Technology Act 2000 and 2008 amendments, which provide the main legal statutes governing cybercrimes. The amendments aimed to address new cybercrimes, strengthen evidence collection and increase accountability of intermediaries. Key aspects covered include cybercrime definitions, investigating agency powers, adjudicating authorities, and responsibilities of network service providers.
This document discusses cybercrime in India, including the Information Technology Act 2000 and its amendments. It provides definitions of cybercrime, classifications of offenses like those against individuals, property, organizations and society. Examples of famous cybercrime cases in India are mentioned. Statistics on cybercrime growth are presented. The role of organizations like NASSCOM in combating cybercrime through initiatives focused on engagement, education, enactment and enforcement is summarized. Suggestions for dealing with cybercrime through international cooperation, funding research, upgrading laws and training law enforcement are provided.
Cyber laws and cyber crimes are discussed. Cyber law refers to legal issues related to communications technology and the internet. The Information Technology Act was passed in 2000 in India to recognize electronic transactions and facilitate electronic filing. Cyber crimes include hacking, data theft, spreading viruses, identity theft, and email spoofing. The IT Act and Indian Penal Code sections apply to cyber crimes and outline punishments such as imprisonment and fines. Cyber laws are needed to tackle cyber crimes and protect intellectual property rights in today's internet-reliant world.
The document discusses the Information Technology Act of 2000 in India. It was passed to promote e-commerce and regulate electronic transactions. Some key points:
- The Act provides legal recognition for digital signatures and electronic documents to facilitate online transactions and e-governance.
- It established regulatory authorities for certifying digital signature certificates and created provisions to prevent cybercrimes like hacking and publishing of obscene content online.
- Major amendments in 2008 introduced concepts of electronic signatures beyond digital signatures, data protection responsibilities for companies, and new cybercrimes under the Act.
This document provides an overview of cyber law in India. It summarizes the Information Technology Act 2000, which provides the legal framework for electronic commerce and digital signatures. It outlines some key sections of the act related to digital signatures, cyber crimes, data privacy, penalties, and amendments made in 2008. Examples of cyber crimes in India are also briefly described. The summary is intended to convey the high-level purpose and scope of cyber law in India according to this document.
This document provides an introduction to cyber law and intellectual property rights. It defines key terms related to the internet and world wide web such as how the web was invented by Tim Berners-Lee. It also summarizes provisions of the Indian IT Act 2000 related to email validity, e-commerce, and digital signatures. The document further discusses cyber crimes, cyber squatting, and features of the IT Act related to tampering and publishing obscene content. It provides an overview of how digital signatures are used and authenticated under the IT Act.
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
The document discusses various aspects of intellectual property, including copyright, trademarks, patents, and databases. It provides definitions and explanations of key concepts such as the different types of intellectual property, the rights they provide, and how intellectual property laws apply in areas like the internet and new technologies. The document is intended to serve as an overview and introduction to intellectual property for non-experts.
This presentation provides an overview of e-governance efforts in India. It defines e-governance as using information and communication technologies to deliver government services, exchange information, and integrate systems between government, citizens, and businesses. The presentation notes that e-governance aims to provide convenient, efficient, and transparent access to government services. It also discusses key provisions of the Information Technology Act, 2000 regarding legal recognition of electronic records and digital signatures, use of electronic records and digital signatures by the government, retention of electronic records, and rules for digital signatures.
Cyberspace jurisdiction meaning and conceptgagan deep
Cyberspace refers to the global, online world of computer networks and the internet. Jurisdiction over cybercrimes is complex due to the borderless nature of cyberspace. Under Indian law, criminal courts have jurisdiction over offenses committed within India. The Civil Procedure Code and Code of Criminal Procedure establish jurisdiction based on location and nationality. International law principles like universal jurisdiction provide some guidance but are insufficient on their own. Conflicting laws between countries pose challenges, though treaties and conventions can help resolve disputes. Overall, determining proper legal jurisdiction for crimes committed via cyber networks remains unclear.
Cyber law, also known as IT law, governs issues related to information technology and the internet. The primary source of cyber law in India is the Information Technology Act of 2000, which aims to facilitate e-commerce and regulate cybercrime. The Act recognizes electronic transactions and digital signatures. It covers offenses like hacking, identity theft, and transmitting obscene content online. The IT Amendment Act of 2008 expanded the scope of the original Act to address new issues and accommodate IT developments. It strengthened data security requirements and defined responsibilities around IP addresses.
The Information Technology Act, 2000 provides the legal framework for electronic governance in India. Some key points of the act include:
1. It defines electronic records and digital signatures, giving them legal validity equal to paper documents.
2. It establishes procedures for digital signature certificates and revocation. Certifying authorities are responsible for issuing and verifying certificates.
3. Offences under the act include hacking and publishing obscene material. It defines penalties for various cyber crimes and empowers the Controller of Certifying Authorities to investigate violations.
4. The act led to the establishment of the Cyber Appellate Tribunal to hear appeals from penalties issued by the Controller.
The document provides an overview of cyberlaw in India. It discusses the key aspects of cyberlaw including cybercrimes, electronic signatures, intellectual property, data protection and privacy. It summarizes the Information Technology Act 2000 and its amendment in 2008, which serves as the primary legislation governing cyberlaw in India. The amendment added new sections covering cyber terrorism and data protection and replaced 'digital signature' with 'electronic signature' to make the act more technology neutral.
Cyber law In India: its need & importanceAditya Shukla
Cyber Law in India
The document discusses the need for cyber law in India. It notes that as internet usage has increased, so have cyber crimes. The Information Technology Act of 2000 and its 2008 amendment were introduced to address issues around electronic transactions, cyber crimes, and data protection. Some key points covered include definitions of cyber crimes like hacking and transmitting obscene content, penalties listed in the IT Acts, and the importance of having cyber laws as digital activities continue growing.
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The Act was enacted in 2000 to provide legal recognition to electronic records and digital signatures. It is based on the UNCITRAL Model Law on E-Commerce.
- The objectives are to facilitate electronic governance and commerce. It defines electronic records, digital signatures, secure systems, etc. and recognizes their legal validity.
- It applies to the whole of India and any offenses committed outside India involving computers in India. Various cybercrimes are punishable under the Act.
- It establishes provisions for public key infrastructure, digital signature certificates, duties of subscribers, and regulates certifying authorities to facilitate
This document summarizes key aspects of the 2008 amendments to India's Information Technology Act, including newly added cybercrimes and strengthened government interception powers. It notes the amendments aim to make the law technology neutral and defines cyber terrorism, adding offenses like identity theft and phishing. The amendments impact corporate India by increasing liability for data breaches and requiring intermediaries to exercise due diligence. The presentation encourages companies to implement cybersecurity practices and conduct a due diligence program to limit legal exposure under the new law.
What is Cyber Law? Why is cyber security law needed? International cyber law. What is copyright? What are security, controls, privacy, piracy and ethics? Code of ethics for computer professionals. What is cyber insurance?
Cyber law & Intellectual property issuesatuljaybhaye
This document discusses cyber law and intellectual property issues from the Indian perspective. It begins by defining cyber law and explaining the need for cyber law due to the disadvantages of increased internet accessibility and rampant cyber crimes. It then discusses the history and scope of the Information Technology Act of 2000 in India, which was enacted to respond to UN recommendations on electronic transactions and governance. The document also covers the different types of intellectual property, forms of copyright and trademark infringement online, and landmark cases related to domains and trademarks. It concludes by suggesting areas where Indian cyber law could be strengthened.
The IT Act was enacted in 2000, making India the 12th country to adopt cyber laws. The objectives of the Act were to provide legal recognition to electronic transactions and records, facilitate e-filing with government agencies and e-payments, and amend related laws. The Act defines key terms like "secure system" and "security procedure". It also legally recognizes digital signatures and regulations electronic records and publications. The Act contains provisions to tackle cybercrimes like hacking, publishing obscene content, unauthorized access, and breach of privacy and confidentiality. Various cybercrimes are punishable under the IT Act and other laws like the IPC.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
This document discusses cyber crime and issues of jurisdiction. It begins with background on the growth of internet usage and the rise of cyber crime. It then defines cyber crime and outlines its history. The document describes several common types of cyber crimes such as hacking, identity theft, cyber stalking, theft, and spoofing. It discusses the challenges of jurisdiction for cyber crimes, distinguishing between subject matter and personal jurisdiction. An example case involving jurisdiction is provided. The conclusion emphasizes the need for international cooperation and evolving cyber laws to address new forms of cyber crime.
The document discusses cyber law in India. It notes that cyber law is defined under the IT Act of 2000 and governs cyber space, including computers, networks, and electronic devices. It describes cyber crimes as unlawful acts using computers as tools or targets. Common cyber crimes include pornography, identity theft, and financial theft. The IT Act of 2000 and its 2008 amendment provide the legal framework for cyber law in India by recognizing electronic commerce and records and addressing cyber crimes.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
The Information Technology Act 2000 provides legal recognition for electronic records and digital signatures. It facilitates electronic governance and commerce by recognizing the validity of electronic contracts, attributions, and signatures. The Act establishes a regulatory framework and penalties for cyber crimes. It amends other related laws around electronic evidence and banking.
The document discusses various topics related to e-commerce including definitions of e-commerce and e-business, differences between buy-side and sell-side e-commerce, types of e-business models, drivers and barriers to adoption of sell-side e-commerce, examples of digital information, and what the semantic web is. It also provides a bibliography of sources for the information presented.
The document discusses electronic commerce or e-commerce. It provides 3 key points:
1. E-commerce involves the buying and selling of products and services over electronic systems like the internet and has grown significantly with widespread internet usage.
2. Early e-commerce developments included EDI, EFT, credit cards, and airline reservation systems in the 1970s-1980s, with the internet fueling further growth from the 1990s onward.
3. Current e-commerce encompasses various models (B2C, B2B, C2C, etc.), applications, government regulations, and global trends, and has significantly impacted markets and retailers.
This document provides an introduction to cyber law and intellectual property rights. It defines key terms related to the internet and world wide web such as how the web was invented by Tim Berners-Lee. It also summarizes provisions of the Indian IT Act 2000 related to email validity, e-commerce, and digital signatures. The document further discusses cyber crimes, cyber squatting, and features of the IT Act related to tampering and publishing obscene content. It provides an overview of how digital signatures are used and authenticated under the IT Act.
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
The document discusses various aspects of intellectual property, including copyright, trademarks, patents, and databases. It provides definitions and explanations of key concepts such as the different types of intellectual property, the rights they provide, and how intellectual property laws apply in areas like the internet and new technologies. The document is intended to serve as an overview and introduction to intellectual property for non-experts.
This presentation provides an overview of e-governance efforts in India. It defines e-governance as using information and communication technologies to deliver government services, exchange information, and integrate systems between government, citizens, and businesses. The presentation notes that e-governance aims to provide convenient, efficient, and transparent access to government services. It also discusses key provisions of the Information Technology Act, 2000 regarding legal recognition of electronic records and digital signatures, use of electronic records and digital signatures by the government, retention of electronic records, and rules for digital signatures.
Cyberspace jurisdiction meaning and conceptgagan deep
Cyberspace refers to the global, online world of computer networks and the internet. Jurisdiction over cybercrimes is complex due to the borderless nature of cyberspace. Under Indian law, criminal courts have jurisdiction over offenses committed within India. The Civil Procedure Code and Code of Criminal Procedure establish jurisdiction based on location and nationality. International law principles like universal jurisdiction provide some guidance but are insufficient on their own. Conflicting laws between countries pose challenges, though treaties and conventions can help resolve disputes. Overall, determining proper legal jurisdiction for crimes committed via cyber networks remains unclear.
Cyber law, also known as IT law, governs issues related to information technology and the internet. The primary source of cyber law in India is the Information Technology Act of 2000, which aims to facilitate e-commerce and regulate cybercrime. The Act recognizes electronic transactions and digital signatures. It covers offenses like hacking, identity theft, and transmitting obscene content online. The IT Amendment Act of 2008 expanded the scope of the original Act to address new issues and accommodate IT developments. It strengthened data security requirements and defined responsibilities around IP addresses.
The Information Technology Act, 2000 provides the legal framework for electronic governance in India. Some key points of the act include:
1. It defines electronic records and digital signatures, giving them legal validity equal to paper documents.
2. It establishes procedures for digital signature certificates and revocation. Certifying authorities are responsible for issuing and verifying certificates.
3. Offences under the act include hacking and publishing obscene material. It defines penalties for various cyber crimes and empowers the Controller of Certifying Authorities to investigate violations.
4. The act led to the establishment of the Cyber Appellate Tribunal to hear appeals from penalties issued by the Controller.
The document provides an overview of cyberlaw in India. It discusses the key aspects of cyberlaw including cybercrimes, electronic signatures, intellectual property, data protection and privacy. It summarizes the Information Technology Act 2000 and its amendment in 2008, which serves as the primary legislation governing cyberlaw in India. The amendment added new sections covering cyber terrorism and data protection and replaced 'digital signature' with 'electronic signature' to make the act more technology neutral.
Cyber law In India: its need & importanceAditya Shukla
Cyber Law in India
The document discusses the need for cyber law in India. It notes that as internet usage has increased, so have cyber crimes. The Information Technology Act of 2000 and its 2008 amendment were introduced to address issues around electronic transactions, cyber crimes, and data protection. Some key points covered include definitions of cyber crimes like hacking and transmitting obscene content, penalties listed in the IT Acts, and the importance of having cyber laws as digital activities continue growing.
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The Act was enacted in 2000 to provide legal recognition to electronic records and digital signatures. It is based on the UNCITRAL Model Law on E-Commerce.
- The objectives are to facilitate electronic governance and commerce. It defines electronic records, digital signatures, secure systems, etc. and recognizes their legal validity.
- It applies to the whole of India and any offenses committed outside India involving computers in India. Various cybercrimes are punishable under the Act.
- It establishes provisions for public key infrastructure, digital signature certificates, duties of subscribers, and regulates certifying authorities to facilitate
This document summarizes key aspects of the 2008 amendments to India's Information Technology Act, including newly added cybercrimes and strengthened government interception powers. It notes the amendments aim to make the law technology neutral and defines cyber terrorism, adding offenses like identity theft and phishing. The amendments impact corporate India by increasing liability for data breaches and requiring intermediaries to exercise due diligence. The presentation encourages companies to implement cybersecurity practices and conduct a due diligence program to limit legal exposure under the new law.
What is Cyber Law? Why is cyber security law needed? International cyber law. What is copyright? What are security, controls, privacy, piracy and ethics? Code of ethics for computer professionals. What is cyber insurance?
Cyber law & Intellectual property issuesatuljaybhaye
This document discusses cyber law and intellectual property issues from the Indian perspective. It begins by defining cyber law and explaining the need for cyber law due to the disadvantages of increased internet accessibility and rampant cyber crimes. It then discusses the history and scope of the Information Technology Act of 2000 in India, which was enacted to respond to UN recommendations on electronic transactions and governance. The document also covers the different types of intellectual property, forms of copyright and trademark infringement online, and landmark cases related to domains and trademarks. It concludes by suggesting areas where Indian cyber law could be strengthened.
The IT Act was enacted in 2000, making India the 12th country to adopt cyber laws. The objectives of the Act were to provide legal recognition to electronic transactions and records, facilitate e-filing with government agencies and e-payments, and amend related laws. The Act defines key terms like "secure system" and "security procedure". It also legally recognizes digital signatures and regulations electronic records and publications. The Act contains provisions to tackle cybercrimes like hacking, publishing obscene content, unauthorized access, and breach of privacy and confidentiality. Various cybercrimes are punishable under the IT Act and other laws like the IPC.
Electronic or Digital evidence in India Courts
ip address as evidence
cdr address as evidence
electronic evidence under indian evidence act
electronic record in india
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
This document discusses cyber crime and issues of jurisdiction. It begins with background on the growth of internet usage and the rise of cyber crime. It then defines cyber crime and outlines its history. The document describes several common types of cyber crimes such as hacking, identity theft, cyber stalking, theft, and spoofing. It discusses the challenges of jurisdiction for cyber crimes, distinguishing between subject matter and personal jurisdiction. An example case involving jurisdiction is provided. The conclusion emphasizes the need for international cooperation and evolving cyber laws to address new forms of cyber crime.
The document discusses cyber law in India. It notes that cyber law is defined under the IT Act of 2000 and governs cyber space, including computers, networks, and electronic devices. It describes cyber crimes as unlawful acts using computers as tools or targets. Common cyber crimes include pornography, identity theft, and financial theft. The IT Act of 2000 and its 2008 amendment provide the legal framework for cyber law in India by recognizing electronic commerce and records and addressing cyber crimes.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
The Information Technology Act 2000 provides legal recognition for electronic records and digital signatures. It facilitates electronic governance and commerce by recognizing the validity of electronic contracts, attributions, and signatures. The Act establishes a regulatory framework and penalties for cyber crimes. It amends other related laws around electronic evidence and banking.
The document discusses various topics related to e-commerce including definitions of e-commerce and e-business, differences between buy-side and sell-side e-commerce, types of e-business models, drivers and barriers to adoption of sell-side e-commerce, examples of digital information, and what the semantic web is. It also provides a bibliography of sources for the information presented.
The document discusses electronic commerce or e-commerce. It provides 3 key points:
1. E-commerce involves the buying and selling of products and services over electronic systems like the internet and has grown significantly with widespread internet usage.
2. Early e-commerce developments included EDI, EFT, credit cards, and airline reservation systems in the 1970s-1980s, with the internet fueling further growth from the 1990s onward.
3. Current e-commerce encompasses various models (B2C, B2B, C2C, etc.), applications, government regulations, and global trends, and has significantly impacted markets and retailers.
This document provides an introduction and overview of e-business and e-commerce. It defines e-business and e-commerce, discusses the differences between them, and outlines several key concepts related to e-business including types of e-business models, advantages and disadvantages of e-business, and components of the e-business value chain. The document also discusses trends in e-commerce in India and provides examples of major e-commerce companies.
Chapter 11 Globalization and the Digital Divide Learnin.docxzebadiahsummers
Chapter 11: Globalization and
the Digital Divide
Learning Objectives
Upon successful completion of this chapter, you will be
able to:
• explain the concept of globalization;
• describe the role of information technology in
globalization;
• identify the issues experienced by firms as they
face a global economy; and
• define the digital divide and explain Nielsen’s three
stages of the digital divide.
Introduction
The Internet has wired the world. Today it is just as simple to
communicate with someone on the other side of the world as it
is to talk to someone next door. But keep in mind that many
businesses attempted to outsource different needs in technology,
only to discover that near-sourcing (outsourcing to countries to
Chapter 11: Globalization and the
Digital Divide | 245
Internet
Statistics by
Continent.
Source:
https://www
.internetworl
dstats.com/
stats.htm.
(Click to
enlarge)
which your country is physically connected) had greater advantage.
This chapter looks at the implications of globalization and the
impact it is having on the world.
What Is Globalization?
Globalization refers to the integration of goods, services, and
culture among the nations of the world. Globalization is not
necessarily a new phenomenon. In many ways globalization has
existed since the days of European colonization. Further advances
in telecommunication and transportation technologies accelerated
globalization. The advent of the the worldwide Internet has made all
nations virtual next door neighbors.
The Internet is truly a worldwide phenomenon. As of December
2017 the Internet was being used by over 4.1 billion people world
wide.
1
From its initial beginnings in the United States in the 1970s to
the development of the World Wide Web in the 1990s to the social
networks and e-commerce of today, the Internet has continued to
increase the integration between countries, making globalization a
fact of life for citizens all over the world.
1. [1]
246 | Information Systems for Business and Beyond (2019)
https://www.internetworldstats.com/stats.htm
https://www.internetworldstats.com/stats.htm
The Network Society
In 1996 social-sciences researcher Manuel Castells published The
Rise of the Network Society, in which he identified new ways
economic activity was being organized around the networks that
the new telecommunication technologies had provided. This new,
global economic activity was different from the past, because “it
is an economy with the capacity to work as a unit in real time on
a planetary scale.”
2
Having a world connected via the Internet has
some massive implications.
The World Is Flat
Thomas Friedman’s 2005 book The World Is Flat uses anecdotal
evidence to present the impact the personal computer, the Internet,
and communication software have had on business, specifically the
impact on globalization. Three eras of globalization are defi.
This document summarizes the evolution of electronic commerce and web technologies. It describes how e-commerce began in 1995 with basic online retail and advertising, and has grown exponentially since. The history is broken into three periods: invention from 1995-2000, consolidation from 2001-2006, and reinvention from 2007 onward with mobile, social media, and big data. Key concepts discussed include dimensions of e-commerce, different types of organizations that use it, and underlying information systems that enable intra- and inter-organizational electronic transactions and exchanges.
E-commerce refers to the buying and selling of goods or services over the Internet. There are several types including business-to-business (B2B), business-to-consumer (B2C), consumer-to-consumer (C2C), and consumer-to-business (C2B). The document traces the history of e-commerce from the 1970s to today and discusses how the Internet has enabled global e-commerce opportunities and challenges. Key issues for multinational companies include understanding cultural differences that impact adoption rates, building consumer trust, and designing websites that are culturally sensitive.
The document discusses the history and development of electronic commerce (e-commerce). It begins by defining e-commerce as conducting business transactions electronically over computer networks, particularly the internet. It then traces the origins and growth of e-commerce from its early roots in electronic data interchange in the 1970s to the popularization of online shopping and business-to-business transactions in the 1990s and 2000s through websites like Amazon and eBay. The document also examines some of the technologies and infrastructure required to enable e-commerce transactions.
E-commerce has led to greater globalization through increased international trade and integration. While globalization has positively impacted business-to-business e-commerce, which tends to be globally converged, business-to-consumer e-commerce remains more locally or domestically focused due to differences in consumer preferences. Overall, globalization has benefited firms through increased performance from business-to-business e-commerce transactions, outweighing any negative effects on business-to-consumer e-commerce. The future of e-commerce is expected to involve greater mobile commerce as smartphone and tablet usage increases worldwide.
This document provides an overview of e-marketing, including its past, present, and future. In the past (Web 1.0), organizations created content that users consumed. Today (Web 2.0), users are also content producers through social media and user-generated content. The future (Web 3.0) may include artificial intelligence and seamless social networking. E-marketing strategies have shifted power from sellers to buyers and require engaging users through content marketing, social media, and other inbound tactics. The internet provides opportunities for global reach, personalization, and measurable results but also challenges like media fragmentation.
This document provides an overview of e-marketing, including its past, present, and future. In the past (Web 1.0), the internet was used to create and distribute content to consumers. Today (Web 2.0), the power has shifted to consumers, who produce and share content via social media. The future (Web 3.0) may include artificial intelligence and seamless social networking. The document also discusses e-marketing strategies, models, metrics and provides examples to illustrate concepts like balanced scorecards. It outlines the e-marketing planning process and types of plans like napkin plans and venture capital plans.
E-commerce is growing fast in today's world. It has Multiple Applications. As such, it is difficult to name each and every one of them. These are few of the most commonly used applications.
This document discusses e-commerce, providing definitions and examples of different types. It begins by defining e-commerce as the buying and selling of goods and services over electronic networks like the internet. It then discusses the history and rise of e-commerce starting in the 1960s. Several types of e-commerce are described, including business-to-business, business-to-consumer, consumer-to-consumer, and others. Factors affecting the growth of e-commerce are also outlined, such as government support, economic conditions, infrastructure, and technology adoption rates.
Unit - 1 Chapter-1.pptx Introduction Ecommerceprachidabhi087
E-commerce refers to buying and selling of goods or services over the internet. It is a subset of e-business, which encompasses all business conducted online. There are several models of e-commerce including B2B, B2C, C2C, C2B, B2G, and G2B. E-commerce has developed in three waves since 1995, driven by improvements in internet technologies, the rise of mobile devices and social media, and greater participation of small businesses online.
This document discusses e-commerce, including its definition, history, types, advantages, and future. E-commerce involves the buying and selling of goods and services over the internet. It has grown significantly since the 1990s with companies like Amazon and eBay. There are different types of e-commerce models including business-to-business, business-to-consumer, and consumer-to-consumer. E-commerce provides advantages such as lower costs, 24/7 access, and a large customer reach. However, it also poses disadvantages like lack of personal interaction and product experience before purchase. The future of e-commerce is predicted to include technologies like biometric payments, social media marketing, faster delivery, and 3D printing of
The document defines e-commerce as the buying and selling of products over computer networks through electronic transactions. It provides a brief history of e-commerce from its origins in electronic data interchange in the 1960s to the development of web browsers in the 1990s. The document then describes the four main types of e-commerce: business-to-consumer, consumer-to-business, business-to-business, and consumer-to-consumer. It outlines some advantages like 24/7 operations and global reach, and disadvantages such as people's reluctance to use the internet for financial transactions. The conclusion is that while e-commerce faces challenges, its advantages have the potential to outweigh disadvantages with proper strategies to address issues.
The document discusses the history and development of the internet and e-commerce. It provides details on the origins of the internet starting in 1962 with DARPA and the development of packet switching. Important developments include ARPANET in 1969, TCP/IP in 1972-1973, the transition to TCP/IP in 1983, and the introduction of the World Wide Web in 1990. The document also discusses the origins of e-commerce, including early online shopping systems from 1979 onward and the rise of Amazon, eBay, and PayPal in the 1990s. It covers trends in social commerce, mobile commerce, and personalization.
This document summarizes a panel discussion on virtual worlds held at the 28th International Conference on Information Systems in December 2007. It discusses 5 perspectives presented by panelists: 1) barriers to virtual world adoption, 2) the role of trust and security in virtual commerce, 3) opportunities to enhance e-commerce through virtual worlds, 4) selecting an appropriate virtual world, and 5) closing comments on psychological, sociological and technological themes in virtual world research.
The document discusses key concepts relating to electronic commerce including defining electronic commerce and electronic business. It categorizes different types of e-commerce transactions and organizations. The dominant business models that emerged are described as well as common revenue models. Emerging trends in technology such as web 2.0 and social media are also summarized.
George konstantakis iot and product design360mnbsu
The Internet of Things (IoT) may be at the core of the next Industrial Revolution! The socioeconomic implications of IoT, in general, are astounding. As with all disruptive technology, there are threats and opportunities that must be understood by business leaders. How do these implications relate to the needs of manufacturing businesses and the human resources that are intertwined with them? How can Product Design address those needs? This closing session will explore these questions and offer solutions.
Digital Finance & Alternative Finance (1) (1).pptxAnharSharif
Md. Anhar Sharif Mollah will cover topics related to digital finance and alternative finance including a brief history of financial innovation, digitization of financial services, crowd funding, peer-to-peer lending, the rise of Chinese tech firms, and initial coin offerings. Key topics that will be discussed include digital finance, alternative finance, crowd funding, peer-to-peer lending, financial inclusion, fintech, regulatory technology or regtech, blockchain, and artificial intelligence in finance. Challenges that fintech companies face include data security, compliance with regulations, lack of mobile and tech expertise, user retention, and personalized services.
Mediation and conflict resolution: Training CourseRitu Gautam
Course of content on mediation and conflict resolution by Dr. Ritu Gautam, Mediation Training Expert, Family dispute resolution clinic Coordinator, Legal professional
Sigmund Freud was an Austrian neurologist who founded psychoanalysis. He developed theories about the structure of the human mind and stages of psychosexual development. Freud proposed that the mind is divided into the id, ego, and superego, which are constantly in conflict. He believed unconscious motives and childhood experiences shape adult behavior. Freud made major contributions through his theories of dreams, defense mechanisms, and the importance of sexuality in development. Though influential, Freud's theories are also subject to some criticism regarding emphasis on childhood and sexuality as motivators.
This document provides an overview of Muslim marriage law. It defines an Islamic marriage as a civil contract between a Muslim male and female witnessed by at least two males or a male and two females. The formalities of a valid marriage include uttering offer and acceptance words in the presence of witnesses and identifying the bride by name if not present. For a marriage to be valid it must be witnessed by at least two males or one male and two females. The document also discusses the pre-Islamic context of Arabian society and women's varied status between tribes.
Brief Introduction of Constitutional Law- By Ritu GautamRitu Gautam
The document provides an overview of the history and development of the Constitution of India from ancient times to the present. It discusses:
1) The earliest principles established by Emperor Ashoka in the 3rd century BC.
2) The role of the British East India Company and British rule between the 16th-20th centuries in shaping constitutional reforms.
3) Key acts and agreements that gradually increased self-governance for Indians, such as the Government of India Acts of 1919 and 1935.
4) The drafting and adoption of the formal Constitution of India on November 26, 1949 that came into effect on January 26, 1950, establishing independent India as a sovereign democratic republic.
The document discusses the legal remedy of "restitution of conjugal rights" under Section 9 of the Hindu Marriage Act in India. It was introduced by the British for social reforms and allows the aggrieved spouse to petition a district court if the other spouse withdraws from the marriage without reasonable excuse. The key points covered include: the historical background of this remedy; the essential conditions for filing a petition; what constitutes reasonable withdrawal; valid defenses; the burden of proof; and consequences if the spouses do not cohabit after a decree is granted.
This document discusses Indian juvenile justice laws and principles. It defines a "child in conflict with law" as any person under 18 who has allegedly or actually committed an offense. Those between 16-18 who commit serious ("heinous") offenses may be tried as adults. The document examines how age of the offense and age at apprehension are treated under the law. It also discusses principles like presumption of innocence, dignity, and best interests of the child that guide the juvenile justice system. Statistics are presented showing trends in juveniles apprehended from 2013-2014 with more older juveniles (16-18) apprehended.
This document discusses Indian juvenile justice laws and principles. It defines a "child in conflict with law" as any person under 18 who has allegedly or actually committed an offense. Those between 16-18 who commit serious ("heinous") offenses may be tried as adults. The document outlines how different acts define a child's age and discusses scenarios where a child commits a crime before 18 but is apprehended later. It also discusses philosophies like "parens patriae" and tests for criminal responsibility. Statistics on juvenile apprehensions in India from 2013-2014 are provided. Finally, the document lists principles of the juvenile justice system like the presumption of innocence and prioritizing the child's best interests and rehabilitation.
The document discusses online dispute resolution (ODR) as an effective tool for resolving consumer grievances in India. It notes that ODR provides a quicker, less costly, and more flexible alternative to traditional consumer courts. ODR uses technology to facilitate arbitration, mediation, negotiation or a combination to resolve cross-border disputes online within 90 days. The document recommends promoting ODR awareness, establishing uniform ODR standards and rules, and providing government and institutional support to effectively address consumer protection challenges in e-commerce.
This document summarizes many important laws and rights for women in India. It outlines legislation related to dowry, domestic violence, sexual harassment, and more. It also describes legal rights for women regarding filing police reports, healthcare access, and protections for rape victims. Additionally, it covers rights in live-in relationships, harassment, stalking, cruelty, and maintenance and benefits related to marriage, children, and maternity leave.
सुप्रीम कोर्ट ने यह भी माना था कि मजिस्ट्रेट का यह कर्तव्य है कि वह सुनिश्चित करे कि अधिकारी पीएमएलए के तहत निर्धारित प्रक्रिया के साथ-साथ संवैधानिक सुरक्षा उपायों का भी उचित रूप से पालन करें।
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Massimo Talia
This guide aims to provide information on how lawyers will be able to use the opportunities provided by AI tools and how such tools could help the business processes of small firms. Its objective is to provide lawyers with some background to understand what they can and cannot realistically expect from these products. This guide aims to give a reference point for small law practices in the EU
against which they can evaluate those classes of AI applications that are probably the most relevant for them.
This document briefly explains the June compliance calendar 2024 with income tax returns, PF, ESI, and important due dates, forms to be filled out, periods, and who should file them?.
Business law for the students of undergraduate level. The presentation contains the summary of all the chapters under the syllabus of State University, Contract Act, Sale of Goods Act, Negotiable Instrument Act, Partnership Act, Limited Liability Act, Consumer Protection Act.
The Future of Criminal Defense Lawyer in India.pdfveteranlegal
https://veteranlegal.in/defense-lawyer-in-india/ | Criminal defense Lawyer in India has always been a vital aspect of the country's legal system. As defenders of justice, criminal Defense Lawyer play a critical role in ensuring that individuals accused of crimes receive a fair trial and that their constitutional rights are protected. As India evolves socially, economically, and technologically, the role and future of criminal Defense Lawyer are also undergoing significant changes. This comprehensive blog explores the current landscape, challenges, technological advancements, and prospects for criminal Defense Lawyer in India.
Genocide in International Criminal Law.pptxMasoudZamani13
Excited to share insights from my recent presentation on genocide! 💡 In light of ongoing debates, it's crucial to delve into the nuances of this grave crime.
What are the common challenges faced by women lawyers working in the legal pr...lawyersonia
The legal profession, which has historically been male-dominated, has experienced a significant increase in the number of women entering the field over the past few decades. Despite this progress, women lawyers continue to encounter various challenges as they strive for top positions.
Receivership and liquidation Accounts
Being a Paper Presented at Business Recovery and Insolvency Practitioners Association of Nigeria (BRIPAN) on Friday, August 18, 2023.
3. • Cyberspace is "the notional environment in which
communication over computer networks occurs.
• The parent term of cyberspace is "cybernetics",
derived from the Ancient Greek κυβερνήτης
• a word introduced by Norbert Wiener for his
pioneering work in electronic communication and
control science
• This word first appeared in the novel Neuromancer
by William Gibson (Page 4, Phantasia Press Edition,
Bloomfield, MI, 1986), one of the first cyberpunk
hardbacks published.
Ritu Gautam
5. As a social experience, individuals can
interact, exchange ideas, share information,
provide social support, conduct business,
direct actions, create artistic media, play
games, engage in political discussion, and so
on, using this global network. They are
sometimes referred to as cybernauts. The
term cyberspace has become a conventional
means to describe anything associated with
the Internetand the diverse Internet culture.
Ritu Gautam
6. Fundamentals of cyber laws
• Inventions, discoveries, and new technologies
widen the scientific horizon but pose new
challenges for the legal world. The information
technology (brought about by computers, Internet
and cyberspace) has opened new dimensions but
has also created problems in all aspects of law. We
are finding solutions for them. These
solutions―statutory or otherwise―providing
answers to the problems are loosely referred to as
‘Computer Laws’ or ‘Information Technology Laws’
or simply ‘cyber Laws’.
Ritu Gautam
7. Jurisprudence of Cyber Law
Jurisprudence studies the concepts of law and
the effect of social norms and regulations on
the development of law.
Jurisprudence refers to two different things.
• 1. The philosophy of law, or legal theory
• 2. Case Law
Ritu Gautam
8. Legal theory studies questions such as
1. What is law and legal system?
2. What is the relationship between law and power?
3. What is the relationship between law and justice or
morality?
4. Does every society have a legal system?
5. How should we understand concepts like legal rights
and legal obligations or duties?
6. What is the proper function of law?
7. What sort of acts should be subject to punishment, and
what sort of punishments should be permitted?
8. What rights do we have?
9. What value does the rule of law have?
Ritu Gautam
9. Case Law
Case law is the law that is established
through the decisions of the courts and
other officials.
Case law assumes even greater significance
when the wordings of a particular law are
ambiguous. The interpretation of the Courts
helps clarify the real objectives and meaning
of such laws.
Ritu Gautam
14. What is Commerce
• According to Dictionary.com
• Commerce is a division of trade or
production which deals with the exchange
of goods and services from producer to final
consumer
• It comprises the trading of something of
economic value such as goods, services,
information, or money between two or
more entities.
Ritu Gautam
15. What is E-Commerce
• Commonly known as Electronic Marketing.
• “It consist of buying and selling goods and
services over an electronic systems Such as the
internet and other computer networks.”
• “E-commerce is the purchasing, selling and
exchanging goods and services over computer
networks (internet) through which transaction
or terms of sale are performed Electronically.
Ritu Gautam
20. • 1970s: Electronic Funds Transfer (EFT)
– Used by the banking industry to exchange account
information over secured networks
• Late 1970s and early 1980s: Electronic Data
Interchange (EDI) for e-commerce within
companies
– Used by businesses to transmit data from one business
to another
• 1990s: the World Wide Web on the Internet
provides easy-to-use technology for information
publishing and dissemination
– Cheaper to do business (economies of scale)
– Enable diverse business activities (economies of scope
Ritu Gautam
22. • A consumer uses Web browser to connect to
the home page of a merchant's Web site on the
Internet.
• The consumer browses the catalog of products
featured on the site and selects items to
purchase. The selected items are placed in the
electronic equivalent of a shopping cart.
• When the consumer is ready to complete the
purchase of selected items, she provides a bill-
to and ship-to address for purchase and
delivery
Ritu Gautam
23. • When the merchant's Web server receives
this information, it computes the total cost
of the order--including tax, shipping, and
handling charges--and then displays the
total to the customer.
• The customer can now provide payment
information, such as a credit card number,
and then submit the order.
Ritu Gautam
24. • When the credit card number is validated
and the order is completed at the Commerce
Server site, the merchant's site displays a
receipt confirming the customer's purchase.
• The Commerce Server site then forwards
the order to a Processing Network for
payment processing and fulfillment.
Ritu Gautam
26. Business-to-business (B2B)
B2B stands for Business to Business. It consists of
largest form of Ecommerce. This model defines that
Buyer and seller are two different entities. It is
similar to manufacturer issuing goods to the retailer
or wholesaler.
E.g.:-Dell deals computers and other associated accessories
online but it is does not make up all those products. So, in
govern to deal those products, first step is to purchases
them from unlike businesses i.e. the producers of those
products. Ritu Gautam
27. Business-to-consumer (B2C):
• It is the model taking businesses and
consumers interaction. The basic concept
of this model is to sell the product online
to the consumers.
• B2c is the direct trade between the
company and consumers. It provides
direct selling through online. For example:
if you want to sell goods and services to
customer so that anybody can purchase
any products directly from supplier’s
website.
Ritu Gautam
28. Business-to-Employee (B2E)
(B2E) electroniccommerce uses an
intrabusiness network which allows
companies to provide products
and/or services to their employees.
Typically, companies use B2E
networks to automate employee-
related corporate processes.
Ritu Gautam
29. Consumer-to-consumer (C2C)
• There are many sites
offering free classifieds,
auctions, and forums where
individuals can buy and sell
thanks to online payment
systems like PayPal where
people can send and receive
money online with ease.
eBay's auction service is a
great example of where
person-to-person
transactions take place
everyday since 1995.
Ritu Gautam
32. • No checkout queues
• Reduce prices
• You can shop anywhere in the world
• Easy access 24 hours a day
• Wide selection to cater for all consumers
Ritu Gautam
34. • Unable to examine products personally
• Not everyone is connected to the Internet
• There is the possibility of credit card
number theft
• On average only 1/9th of stock is available
on the net
Ritu Gautam
35. Future of E-commerce in India
• According to business world estimate near
about Sixty thousand new jobs will be
created for the internet world alone in the
next two years
• e-Commerce transactions are expected to
cross the Rs. 3500 crore milestone in
2010-11, a jump of around 350 percent
from the 2008-09 figure of Rs. 1000 crore
• eBay said that consumers were trading
goods worth almost three crore rupees
everyday, across the globe.
Ritu Gautam
37. Introduction
• India is a vast country and the need of good
governance for India’s development is widely accepted.
The challenges are to look for ways to achieve it
• E-Governance can turn out to be the significant enabler
for this endeavor
Q : What is Governance ?
The term governance may be described as the process by
which society steers itself.
Q : What is E – Governance ?
The above mentioned process is conditioned and
modified through the influence of Information and
Communication Technologies (ICTs).
Ritu Gautam
38. Continue..
• In past humans were employed to do the jobs that now a days
computers are doing (Calculations, Assessments, keeping
records, communications etc.)
• Then came mechanical machines like typewriters and
calculators followed by a number of electronic computers,
mainframe computers, minicomputers, and supercomputers
• The release of personal computer (PC) (with MS-DOS operating
system) by IBM in 1981 brought the computer within the reach
of individuals
• India joined the select club of U.S., Japan, Israel and China
when it launched Param Padma series of supercomputers on
January 1, 2003, indigenously developed by its Pune-based
Centre for Advanced Computing (C-DAC)
Ritu Gautam
39. Continue..
• Fast and reliable means of communication connecting distant places have
always been important to governments worldwide
• The Internet, the global interconnected network of computer networks,
was invented as the Advanced Research Projects Agency Network
(ARPANET) in the U.S. in 1969
• Internet was made available to public in India on August 14, 1995
Definitions:
World Bank :- It is the use of ICT to improve the efficiency,
effectiveness, transparency, and accountability of government.
Wikipedia :- The use of information and communications
technologies by governments to enhance the range and quality of
information and services provided to citizens, businesses, civil
society organizations, and other government agencies.
Ritu Gautam
40. Emergence of E-Governance in India
• Recognizing the increasing importance of electronics,
the Government of India established the Department
of Electronics in 1970
• National Informatics center (NIc) in 1977 was the first
major step towards e-Governance in India followed by
launching of NIcNET in 1987.
• AKSHAYA was the first venture of e-Governance in
India which started in Kerala
• Countries which are in the race of e-governance
implementation are UK, USA, New Zealand, Brazil etc
Ritu Gautam
41. 4 Pillars of E-Governance
• Connectivity
• Knowledge
• Data Content
• Capital
Ritu Gautam
45. E- Governance in Rural India
• Agriculture
• Land Record Management
• Disaster management
• Local information
• Panchayat
Ritu Gautam
46. E-Governance in Urban India
• Transportation
• Online Payments and Taxations
• Information and Public Relation Key
Services
• Municipal Services
• Roads and Traffic Management
Ritu Gautam
47. Phases of E-Governance
• Gartner, an international consultancy firm, has
formulated four-phase e-governance model
• The design and purpose of each step would have to
serve the relevant needs of all G2C, G2B, G2E and G2G
sectors
Phase I – Presence
Phase II – Interaction
Phase III – Transaction
Phase IV – Transformation
Ritu Gautam
49. Challenges in E-Governance
Technical
Challenges
• Interoperabilit
y
• Privacy
• Security
• Multiservice
Interaction
Ritu Gautam
Organizational
Challenges
• Lack of
Integrated
Services
• Lack of Key
Persons
• Population
• Different
Languages
Economical
Challenges
• Cost
• Maintainabili
ty
• Reusability
• Portability
50. Case Study: Suwidha
• State wide project implemented in
Punjab
• Objectives
– Provide friendly and efficient interface
between government and citizens
– Provide transparency in government
operations
– Provide timely and efficient service delivery
– Improve quality of government services
• Falls in the government to citizensRitu Gautam
52. Continue..
• A citizen's concerns
– Different branches for different services
– Not familiar with the procedures
– Unaware of the schemes being implemented
– Not aware of source of information
– Has to frequently visit the branch to ensure
movement of the case and to enquire the status
– Services are not delivered as scheduled
– Has to visit many offices for a single service
– Small payments require visiting banks for services
Ritu Gautam
53. Continue..
• Solution in the form of Suwidha
– The citizen approaches SUWIDHA Queue Counter and gets
the Queue Token number.
– On his turn at SUWIDHA Service Counter, he files his
application.
– She/he is issued a receipt cum token number, which
specifies the date of delivery of services. Each type of
service has a pre-defined delivery time and system
automatically calculates the service delivery date.
– All kind of payments for the fees etc can be made at the
SUWIDHA counter.
– The application/case is then sent to the branch for action.
– In between the citizen can track the case with the help of
SUWIDHA Token number through DialCITI (which is IVR
based system) or website.
– The delivery of documents/processed case is made on the
specified date. The delivery of the documents is also from
SUWIDHA Delivery Counter.Ritu Gautam
54. Continue..
• Other Suwidha features
– On the spot photograph capture wherever
required
– Information on schemes and procedures
– Application forms available
– Provision of on the spot delivery of services
in cases where verification can be ensured
based on the data available in the databases
– Implemented in all 17 DC offices and 54 SDM
offices of Punjab
Ritu Gautam
56. Continue..
Q : Why Suwidha succeeded?
• Government process re-engineering
– Increased accountability
– Power through information
– Ease of access
– Localization
• http://suwidha.nic.in
Ritu Gautam
57. Future Scopes
• To make E-Governance more efficient
and powerful, two technologies can be
boon to it. These technologies are Open
Source Software and Cloud Computing.
Ritu Gautam
58. Open Source System in E- Governance
• Open Source Software (OSS) is software
made available in both source code and
binary form, under a license which
allows users to freely use, modify and
redistribute the software without the
need to pay royalties to the original
software author
Ritu Gautam
60. Cloud Computing in E- Governance
• Cloud computing allows computer e-
governance users to conveniently rent access
to fully featured applications. Cloud computing
also provides software development and
deployment environments, and computing
infrastructure assets such as network-
accessible data storage and processing model
Ritu Gautam
70. CYBER LAW IN INDIA
• In India, cyber laws are contained in the Information
Technology Act, 2000 ("IT Act") which came into force on
October 17, 2000.
• The main purpose of the Act is to provide legal recognition to
electronic commerce and to facilitate filing of electronic
records with the Government.
The following Act, Rules and Regulations are covered under
cyber laws:
• 1. Information Technology Act, 2000
• 2. Information Technology (Certifying Authorities) Rules,
2000
• 3. Information Technology (Security Procedure) Rules, 2004Ritu Gautam
71. Information Technology Act, 2000
• Information Technology Act, 2000 is India’s
mother legislation regulating the use of
computers, computer systems and
computer networks as also data and
information in the electronic format. This
legislation has touched varied aspects
pertaining to electronic authentication,
digital (electronic) signatures, cyber crimes
and liability of network service providers.
Ritu Gautam
72. • The Preamble to the Act states that it aims
at providing legal recognition for
transactions carried out by means of
electronic data interchange and other
means of electronic communication,
commonly referred to as "electronic
commerce", which involve the use of
alternatives to paper-based methods of
communication and storage of information
and aims at facilitating electronic filing of
documents with the Government agencies.
Ritu Gautam
73. • This Act was amended by Information
Technology Amendment Bill, 2008 which
was passed in Lok Sabha on 22nd December,
2008 and in Rajya Sabha on 23rd December,
2008. It received the assent of the President
on 5th February 2009 and was notified with
effect from 27/10/2009.
Ritu Gautam
74. Amendments-2008
• A major amendment was made in 2008. It introduced the
Section 66A which penalised sending of "offensive
messages".
• It also introduced the Section 69, which gave authorities
the power of "interception or monitoring or decryption of
any information through any computer resource“.
• It also introduced penalties for child porn, cyber
terrorism andvoyeurism.
• It was passed on 22 December 2008 without any debate in
Lok Sabha. The next day it was passed by the Rajya Sabha.
It was signed by the then President (Pratibha Patil) on 5
February 2009
Ritu Gautam
75. Ritu Gautam
• Crime committed using a computer and the internet to steal
a person’s identity or illegal imports or malicious programs.
Cybercrime is nothing but where the computer used as an
object or subject of crime.
76. Ritu Gautam
• The first recorded cyber crime took place in the year 1820
That is not surprising considering the fact that the abacus,
which is thought to be the earliest form of a computer, has
been around since 3500 B.C.
77. Ritu Gautam
• The Computer as a Target : using a computer to attack
other computers.
• The computer as a weapon : using a computer to
commit real world crimes.
78. Classification of cyber crime
• Cyber crime can be further classified into
the following categories:-
• Crime Against Individuals
• Crime Against Society
• Crime Against Government
• Crime Against Companies
Ritu Gautam
79. Ritu Gautam
Types of Cyber attacks, by percentage (source-
FBI)
– Financial fraud:
– Sabotage of data/networks:
– Theft of proprietary information:
– System penetration from the outside:
– Denial of service:
– Unauthorized access by insiders:
– Employee abuse of internet privileges
– Viruses:
80. Ritu Gautam
• “ If you experienced computer system intrusions
by someone from outside your organization,
indicate the type of activity performed by the
intruder.”
Manipulate data integrity
Installed a sniffer
Stole password files
Proving/scanning systems
Trojan logons
IP spoofing
Introduced virus
Denied use of services
CYBER CRIME
82. Phishing is a Offence ,when someone
with the intetion to defraud other for
money or any other benifit on
Internet. Phishing refers to the receipt
of unsolicited emails by customers of
Financial Institutions, requesting
them to enter their Username,
Password or other personal
information to access their Account
for some reason.
The fraudster then has access to the
customer's online bank account and
to the funds contained in that account.Ritu Gautam
83. Cyber Stalking is use of the
Internet or other electronic means
to stalk someone. This term is used
interchangeably with online
harassment and online abuse.
Stalking generally involves
harassing or threatening behaviour
that an individual engages in
repeatedly, such as following a
person, appearing at a person's
home or place of business, making
harassing phone calls, leaving
written messages or objects, or
vandalizing a person's property.Ritu Gautam
84. Vishing is the criminal practice of using
social engineering and Voice over IP
(VoIP) to gain access to private personal
and financial information from the
public for the purpose of financial
reward. The term is a combination of
“Voice" and phishing. Vishing exploits
the public's trust in landline telephone
services.
Vishing is typically used to steal credit
card numbers or other information
used in identity theft schemes from
individuals.
VISHING
Ritu Gautam
85. Ritu Gautam
• Hacking in simple terms
means an illegal intrusion
into a computer system
and/or network. It is also
known as CRACKING.
Government websites are
the hot targets of the
hackers due to the press
coverage, it receives.
Hackers enjoy the media
coverage.
86. Ritu Gautam
• The Internet is being highly used by its abusers to reach and
abuse children sexually, worldwide. As more homes have
access to internet, more children would be using the internet
and more are the chances of falling victim to the aggression of
pedophiles.
87. Ritu Gautam
• This is an act by the criminal, who floods the bandwidth of the
victims network or fills his e-mail box with spam mail
depriving him of the services he is entitled to access or
provide
88. Ritu Gautam
• Malicious software that attaches itself to other software or
computer system and then propagates itself to other
computers via networks or disks. (virus, worms, Trojan Horse,
web jacking, e-mail bombing etc)
90. Ritu Gautam
• Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism. Transmitting virus:
These are programs that attach themselves to a file and then
circulate .
91. Ritu Gautam
Terrorist attacks on the Internet is by distributed denial of
service attacks, hate websites and hate emails, attacks on
sensitive computer networks, etc. Technology savvy terrorists
are using 512-bit encryption, which is impossible to decrypt.
92. Ritu Gautam
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of products
intended to pass for the original.
93. Ritu Gautam
• Internet security is a branch
of computer security specifically
related to the Internet.
• It's objective is to establish rules
and measure to use against attacks
over the Internet.
95. Ritu Gautam
• Use antivirus software’s
• insert firewalls
• uninstall unnecessary software
• maintain backup
• check security settings
• Stay anonymous - choose a genderless screen name
• Never give your full name or address to strangers
96. Ritu Gautam
• Learn ‘Etiquette' - follow it and expect it from others
• Don't respond to harassing or negative messages
(flames)
• Get out of uncomfortable or hostile situations quickly
• Save offending messages
• Learn more about Internet privacy
97. Ritu Gautam
• The cyber security will defend us from critical attacks.
• It helps us to browse the safe website.
• Internet security process all the incoming and outgoing data
on our computer.
98. Ritu Gautam
• Security will defend from hacks and virus.
• The application of cyber security used in our PC needs update
every week.
• The security developers will update their database every
week once. Hence the new virus also deleted
99. “Technology is like a fish. The longer it
stays on the shelf, the less desirable it
becomes.”
Technology is destructive only in the hands
of people who do not realize that they are
one and the same process as the universe.
Alan Watts
Ritu Gautam
101. Under section 43
• Destroys, Deletes or Alters any Information residing in a computer
resource or diminishes its value or utility or affects it injuriously
by any means;
• Steals, conceals, destroys or alters or causes any person to steal,
conceal, destroy or alter any computer source code used for a
computer resource with an intention to cause damage;
• “If any person, dishonestly, or fraudulently, does any act referred
to in section 43, he shall be punishable with imprisonment for a
term which may extend to two three years or with fine which may
extend to five lakh rupees or with both.” [S.66]
Ritu Gautam
102. Section 65. Tampering with computer
source documents:
•
Whoever knowingly or intentionally conceals, destroys
or alters or intentionally or knowingly causes another
to conceal, destroy or alter any computer source code
used for a computer, computer Programme, computer
system or computer network, when the computer
source code is required to be kept or maintained by
law for the being time in force, shall be punishable
with imprisonment up to three year, or with fine
which may extend up to two lakh rupees, or with
both.
Ritu Gautam
103. Section66. Hacking with the computer
system:
(1) Whoever with the intent to cause or
knowing that he is likely to cause wrongful loss
or damage to the public or any person destroys
or deletes or alters any information residing in
a computer resource or diminishes its value or
utility or affects it injuriously by any means,
commits hacking.
(2) Whoever commits hacking shall be
punished with imprisonment up to three years,
or with fine which may extend up to two lakh
rupees, or with both.
Ritu Gautam
104. Under section 66(A)
• S.66A - Punishment for sending offensive messages through
communication service, etc
Any person who sends, by means of a computer resource or a
communication device;
Any information that is grossly offensive or has menacing character; or
Any information which he knows to be false, but for the purpose of
causing annoyance, inconvenience, danger, obstruction, insult, injury,
criminal intimidation, enmity, hatred, or ill will, persistently makes by
making use of such computer resource or a communication device
Any electronic mail or electronic mail message for the purpose of
causing annoyance or inconvenience or to deceive or to mislead the
addressee or recipient about the origin of such messages
• Shall be punishable with imprisonment for a term which may extend to
three years and with fine.
Ritu Gautam
105. • S. 66C - Punishment for identity theft
• “Whoever, fraudulently or dishonestly make use of the electronic
signature, password or any other unique identification feature of any
other person, shall be punished with imprisonment of either description
for a term which may extend to three years and shall also be liable to fine
which may extend to rupees one lakh”
• S. 66D - Punishment for cheating by personation by using computer
resource
• “Whoever, by means of any communication device or computer
resource cheats by personation, shall be punished with imprisonment of
either description for a term which may extend to three years and shall
also be liable to fine which may extend to one lakh rupees. “
Ritu Gautam
106. • S. 66C - Punishment for identity theft
• “Whoever, fraudulently or dishonestly make use of the electronic
signature, password or any other unique identification feature of any
other person, shall be punished with imprisonment of either
description for a term which may extend to three years and shall also
be liable to fine which may extend to rupees one lakh”
• S. 66D - Punishment for cheating by personation by using
computer resource
• “Whoever, by means of any communication device or computer
resource cheats by personation, shall be punished with imprisonment
of either description for a term which may extend to three years and
shall also be liable to fine which may extend to one lakh rupees. “
Ritu Gautam
107. S. 66E - Punishment for violation of privacy.
“Whoever, intentionally or knowingly captures, publishes or transmits the
image of a private area of any person without his or her consent, under
circumstances violating the privacy of that person, shall be punished with
imprisonment which may extend to three years or with fine not exceeding
two lakh rupees, or with both”
S. 67 A - Punishment for publishing or transmitting of material
containing sexually explicit act, etc. in electronic form
“Whoever publishes or transmits or causes to be published or transmitted in
the electronic form any material which contains sexually explicit act or
conduct shall be punished on first conviction with imprisonment of either
description for a term which may extend to five years and with fine which
may extend to ten lakh rupees”
Ritu Gautam
108. Section 67. Publishing of obscene
information in electronic form:
•
Whoever publishes or transmits or causes to be published
in the electronic form, any material which is lascivious or
appeals to the prurient interest or if its effect is such as to
tend to deprave and corrupt persons who are likely, having
regard to all relevant circumstance, to read see or hear the
matter contained or embodied in it, shall be punished on
first conviction with imprisonment of either description for
a term which may extend to five years and with fine which
may extend to one lakh rupees and in the event of a second
or subsequent conviction with imprisonment of either
description for a term which may extend to ten years and
also with fine which may extend to two lakh rupees.
Ritu Gautam
109. S. 67 C - Preservation and Retention of information by
intermediaries.
“(1) Intermediary shall preserve and retain such information as
may be specified for such duration and in such manner and
format as the Central Government may prescribe.
(2) Any intermediary who intentionally or knowingly
contravenes the provisions of sub section (1) shall be punished
with an imprisonment for a term which may extend to three
years and shall also be liable to fine.”
Ritu Gautam
111. Establishment
• Cyber Appellate Tribunal has been established under the
Information Technology Act, 2000.
• The first and the only Cyber Appellate Tribunal in the country
have been established by the Central Government in accordance
with the provisions contained under Section 48(1) of the
Information Technology Act, 2000.
• The Tribunal initially known as the Cyber Regulations Appellate
Tribunal (C.R.A.T.), started functioning from October 2006 in a
portion of the D.I.T. building at C.G.O. Complex, Lodhi Road, New
Delhi. At present the Tribunal is functioning at the Jeevan Bharti
(L.I.C.) Building, Connaught Place, New Delhi.
Ritu Gautam
112. Purpose
• The Cyber Appellate Tribunal has, for the purposes of
discharging its functions under the I.T. Act, the same powers as
are vested in a civil court under the Code of Civil Procedure,
1908. However, the procedure laid down by the Code of Civil
Procedure, 1908 applies but at the same time the Tribunal is
guided by the principles of natural justice.
• The Cyber Appellate Tribunal has powers to regulate its own
procedure including the place at which it has its sittings. Every
proceeding before the Cyber Appellate Tribunal shall be deemed
to be a judicial proceeding within the meaning of sections 193
and 228, and for the purposes of section 196 of the Indian Penal
Code and the Cyber Appellate Tribunal shall be deemed to be a
civil court for the purposes of section 195 and Chapter XXVI of
the Code of Criminal Procedure, 1973.
Ritu Gautam
113. Composition of cyber Appellate
Tribunal (49)
• Clause (1)
The Cyber Appellate Tribunal shall consist of a
Chairperson and such number of other Members, as the
Central Government may, by notification in the Official
Gazette, appoint: Provided that the person appointed as
the Presiding Officer of the Cyber Appellate Tribunal
under the provisions of this Act immediately before the
commencement of the Information Technology
(Amendment) Act, 2008 shall be deemed to have been
appointed as the Chairperson of the said Cyber Appellate
Tribunal under the provisions of this Act as amended by
the Information Technology (Amendment) Act, 2008.
Ritu Gautam
114. Clause (2)
• (2) The selection of Chairperson and
Members of the Cyber Appellate Tribunal
shall be made by the Central Government in
consultation with the Chief Justice of India.
Ritu Gautam
115. Clause (3)
• Subject to
• (a) the jurisdiction, powers and authority of the Cyber Appellate
Tribunal may be exercised by the Benches thereof;
• (b) a Bench may be constituted by the Chairperson of the Cyber
Appellate Tribunal with one or two Members of such Tribunal as
the Chairperson may deem fit;
• (c) the Benches of the Cyber Appellate Tribunal shall sit at New
Delhi and at such other places as the Central Government may, in
consultation with the Chairperson of the Cyber Appellate
Tribunal, by notification in the Official Gazette, specify;
• (d) the Central Government shall, by notification in the Official
Gazette, specify the areas in relation to which each Bench of the
Cyber Appellate Tribunal may exercise its jurisdiction
Ritu Gautam
116. Clause (4)
• Notwithstanding anything contained in sub-
section (3), the Chairperson of the Cyber
Appellate Tribunal may transfer a Member
of such Tribunal from one Bench to another
Bench.
Ritu Gautam
117. Clause(5)
• If at any stage of the hearing of any case or matter it
appears to the Chairperson or a Member of the
Cyber Appellate Tribunal that the case or matter is
of such a nature that it ought to be heard by a Bench
consisting of more Members, the case or matter may
be transferred by the Chairperson to such Bench as
the Chairperson may deem fit. ] "49. Composition of
Cyber Appellate Tribunal. -A Cyber Appellate
Tribunal shall consist of one person only
(hereinafter referred to as the Presiding Officer of
the Cyber Appellate Tribunal) to be appointed, by
notification, by the Central Government.
Ritu Gautam
118. Procedure and powers of the Cyber
Appellate Tribunal (U/S 58)
• (1) The Cyber Appellate Tribunal shall not be
bound by the procedure laid down by the Code of
Civil Procedure, 1908 (5 of 1908), but shall be
guided by the principles of natural justice and,
subject to the other provisions of this Act and of
any rules, the Cyber Appellate Tribunal shall have
powers to regulate its own procedure including
the place at which it shall have its sittings.
Ritu Gautam
119. • 2) The Cyber Appellate Tribunal shall have, for the
purposes of discharging its functions under this Act,
the same powers as are vested in a civil court under
the Code of Civil Procedure, 1908 (5 of 1908), while
trying a suit, in respect of the following matters,
namely:
• (a) summoning and enforcing the attendance of any
person and examining him on oath;
• (b) requiring the discovery and production of
documents or other electronic records;
• (c) receiving evidence on affidavits;
• (d) issuing commissions for the examination of
witnesses or documents;
• (e) reviewing its decisions;
Ritu Gautam
120. • f) dismissing an application for default or deciding it
ex parte;
• (g) any other matter which may be prescribed.
• (3) Every proceeding before the Cyber
Appellate Tribunal shall be deemed to be a
judicial proceeding within the meaning of
section 193 and 228, and for the purposes of
section 196 of the Indian Penal Code(45 of
1860) and the Cyber Appellate Tribunal shall
be deemed to be a civil court for the purposes
of section 195 and Chapter XXVI of the Code of
Criminal Procedure, 1973 (2 of 1974).
Ritu Gautam
122. International Conventions on Cyber
Law
• Budapest Convention
• Convention on Cybercrime (CET)
• 185Signed
• 23 November 2001
• Location- Budapest
• Effective- 1 July 2004
• Ratification by - 3 Council of Europe States
• Signatories 50 Parties
Ritu Gautam
123. Objective
• The Convention is the first international
treaty on crimes committed via the Internet
and other computer networks, dealing
particularly with infringements of
copyright, computer-related fraud, child
pornography, hate crimes, and violations
of network security.[6] It also contains a
series of powers and procedures such as the
search of computer networks and lawful
interception.
Ritu Gautam
125. Intellectual Property Right
What is an IPR ?
Intellectual property (IP) is a legal term that refers to
creations of the mind.
IPR are legal rights, which result from intellectual activity in
industrial, scientific, literary and artistic fields etc.
Protected IP rights like other property can be a matter of trade,
which can be owned, sold or bought
Types / Tools of IPRs :-
1. Patents
2. Copy right and related rights
3. Trademark
4. Industrial designs
Ritu Gautam
127. Ownership of rights
• Literary – author
• Drama – Dramatist
• Music – Composer
• Artistic work – Artist e.g. Painter, Sculptor,
Architect
• Photograph – Photographer
• Author of Computer Programmer – Person who
causes the work to
be created
• Cinematograph film – producer
• Sound Recording - producer
Ritu Gautam
128. Duration of copyright
• Literary, Dramatic, Musical and Artistic Works
published during life time of author . Life + 60 years
• All Other Works: 60 years from date of publication
– Posthumous, Anonymous Works
– Works of Government and Organizations
– Cinema and Sound Recording
– Photograph
Ritu Gautam
129. Patent
• What is a Patent ?
• Patent is protected through the Patents Act, 1970 (amended
in 1999, 2002, 2005) amended in by the Industrial Policy &
Promotion .
• A patent is an exclusive right granted for an invention,
which is a product or a process that provides a new way of
doing something, or offers a new technical solution to a
problem.
• It provides protection for the invention to the owner of the
patent.
• The protection is granted for a limited period, i.e. 20 years.
Ritu Gautam
130. Continue…
• Patent protection means that the invention can not be commercially made,
used, distributed or sold without the patent owner’s consent.
• The patent owner may give permission to, or license, other parties to use
the invention on mutually agreed terms.
Ritu Gautam
131. GRANT OF PATENT
Patents are granted by national patent offices
after publication and substantial examination
of the applications.
In India provisions exist for pre-grant and post
grant opposition by others.
They are valid within the territorial limits of
the country.
Foreigners can also apply for patents.
Ritu Gautam
132. What is not registrable?
• A design which is not new or original.
• A design which has been disclosed to the public
anywhere in the world prior to the filing.
• A design which is not significantly distinguishable
from known designs or combination of known
designs.
• A design which comprises or contains scandalous or
obscene matter.
• A design which is contrary to public order or
morality
Ritu Gautam
133. Trademark
A trademark is a distinctive sign that
identifies certain goods or services as those produced
or provided by a specific person or enterprise.
• It may be one or a combination of words, letters, and
numerals.
• Registration of trademark is prima facie proof of
its ownership giving statutory right to the proprietor.
• Trademark rights may be held in perpetuity.
E.g., LUX, Godrej, TVS , Coca Cola,555, APPLE,
etc.
Ritu Gautam
134. Continue…
• What can be protected as a trademark ?
– Names (such as company names, product names)
– Domain names if they label a product or service
– Images
– Symbols
– Logos
– Slogans or phrases
– Product design
– Product packaging (known as trade dress)
Ritu Gautam
135. Registration of trademark
• Trademarks are registered by national
trademark registries and are valid in that
country
• Registration is made after examination
and publication
• Period of registration is for 10 years but
can be renewed indefinitely
Ritu Gautam
136. Trademark
• Service Marks include banking, education,
finance, insurance, real estate ,entertainment,
repairs, transport, conveying news and
information, advertising etc.
• Certification Trade marks: Certified by the
Proprietor as having characteristics like
geographical origin, ingredients, quality e.g.
AGMARK, WOOLMARK Certification mark
cannot be used as a trade mark.
Ritu Gautam
137. Domain name
• Domain Name System (DNS), in computer communications, a method
of translating Internet addresses so that computers connected in the
Internet can find each other. A DNS server translates a numerical
address assigned to a computer (such as 207.46.228.91) into a
sequence of words, and vice versa.
• A domain name, written in lowercase letters with words separated by
periods, takes the form of username@computer.zonename (for
example: president@whitehouse.gov).
• Username is the name or account number used to log on. The
hostname (Whitehouse in the example above) is the name of the
computer or Internet provider; it may consist of several parts.
Zonename indicates the type of organization. Common zone names
include com (commercial organization), edu (educational), gov
(government), and net (networking organization).
Ritu Gautam
138. Difference between Domain name and
Trademark
• Trademark Infringement Issues
—Cyber squatting /Typo squatting
—How is the domain name used? What is the
posted content?
—Domain Name Watch Services Available
Ritu Gautam
139. Uniform domain name dispute
resolution policy
• URDP is a policy adopted by ICANN that provides a
mechanism for trademark owners to obtain domain
names from cyber squatters.
• All domain name registrars have the power to grant
“.com”, “.net”, and “.org” generic generic top-level
domains domains must follow the UDRP.
•
• Domain name registrar will cancel, suspend, or
transfer a domain name that is the subject of a
trademark-based dispute, it must have an agreement
signed by the parties, a court order.
Ritu Gautam
140. Cyber Squatting
• It is a malicious practice of registering and
acquiring for domain name(s) those names that are
associated or linked with other people’s interests,
such as trade marks or personal names.
• Cyber squatter acquire those names for variety of
reasons, including:
• – Blocking a business competitor/rival from
acquiring certain names for their domain name.
• – Disrupting other’s business
• – Confusing public by representing a website that
may look like originating from other people.
Ritu Gautam