The Act enables the companies to file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in electronic form by means of such electronic form as may be prescribed by the appropriate Government. Order is issued in the interest of the sovereignty or integrity of India, the security of the State, friendly relations with foreign States, public order or preventing incitement for commission of a cognizable offence Person in charge of the computer resource fails to extend all facilities and technical assistance to decrypt the information-punishment up to 7 years. The Certifying Authority has the power to suspend or revoke Digital Signature Certificate. Firstly, the implications of these provisions for the e-businesses would be that email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. Publishing Digital Signature Certificate for fraudulent purposes Section 74 : This section provides that whoever knowingly creates, publishes or otherwise makes available a Digital Signature Certificate for any fraudulent or unlawful purpose or knowingly publishes or makes it available for any such purpose, commits an offence under the I. .
To provide facility of filling document online relating to school admission or registration in employment exchange. It is the duty of subscriber to accept that all information in digital signature certificate that is within his knowledge is true. Hacking Section 66 : The essential ingredients of the hacking are intention to cause wrongful loss or damage to any person by unlawful means or having knowledge that information residing in a computer resource document if concealed, destroyed or altered would cause damage to any person. Act prohibits making available a Digital Signature Certificate with the knowledge that— a The Certifying Authority listed in the certificate has not issued it; or b The subscriber listed in the certificate has not accepted it; or c The certificate has been revoked or suspended. Due to increasing crime in cyber space, Govt. The Act recognizes the need for recognizing foreign Certifying Authorities and it further details the various provisions for the issue of license to issue Digital Signature Certificates.
If they are the same, then the relying party knows that the message has not been altered after it was signed. Act 2000, any company can store their data in electronic storage. Act 2000 or its main provisions:- There are 13 chapters in law and all provision is included in this chapters. The Information Technology Act, 2000, came into force with effect from 17th October, 2000. This marriage later ended in divorce and the accused started contacting her once again. The Information Technology Act, 2000 also aims to provide for the legal framework so that legal sanctity is accorded to all electronic records and other activities carried out by electronic means. For violation of privacy Imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both.
Business environment may be defined as the set of external and internal factors which affects the decisions of business. The Macro Environment of Business Macro environment of business means all exte…. No changes have been applied to the text. . In case of applying for a digital signature certificate, a person is required to fill in the form prescribed by Rule 23 with complete information about himself. Certifying Authorities Rules, 2000 giving full details about himself.
In view of the growth in transactions and communications carried out through electronic records, the Act seeks to empower government departments to accept filing, creating and retention of official documents in the digital format. The penalties for damage to computer, computer systems etc. In case bank, the verification of digital signature can be on the basis of key pair. Basis of Decisions One of main objective of the study of business environment that it can provide all the information which is needed for taking good decisions. Except in the case of an application made under section 31, a document or instrument in respect of which no entry has been made in the register in accordance with the provisions of sub-sections 1 and 2 shall not be admitted in evidence in any court in proof of the title to copyright in a design or to any interest therein, unless the court, for reason to be recorded in writing, otherwise directs.
Act is silent on taxation. Knowledge of Information By studying the business environment, we can know the changes of business. The Certifying Authority has to ensure that the subscriber i. It has been amended in 2008 and the Amended Act is effective from February 5, 2009. .
The case is under investigation. Tempering computer source department 2 10 10 11 21 0 10 8 2 6 2. The National Nodal Agency so appointed, shall be called the Indian Computer Emergency Response Team Section 70-B. Act 2000 to give legal recognition to any transaction which is done by electronic way or use of internet. Obscenity Ingredients Publishing or transmitting or causing to be published in the electronic form, Obscene material Punishment On first conviction imprisonment of either description up to five years and fine up to Rs. If they are the same, then the relying party knows that the message has not been altered after it was signed.
The duties of subscribers are also enshrined in the said Act. It shall come into force on such date1 as the Central Government may, by notification, in the Official Gazette, appoint; and different dates may be appointed for different provisions of this Act, and any reference in any such provision to the commencement of this Act shall be construed as a reference to the coming into force of that provision. It also set of rules and regulations which apply on any electronic business transaction. So, there will no benefit of business environment in these cases. If he signs the electronic agreement by digital signature. At the current time any known changes or effects made by subsequent legislation have been applied to the text of the legislation you are viewing by the editorial team.
The offences in respect of computer source documents codes are to be kept or maintained by law include knowingly or intentionally i concealing; ii destroying; iii altering; iv causing another to conceal; v causing another to destroy; vi causing another to alter the computer source code. Digital signatures have been given legal validity and sanction in the Act. The private key is applied to the message digest text using a mathematical algorithm. A person while applying for a licence has to fill in the form as required by Rule 10 of the I. Article shared by Essay on the Salient Features of the Information Technology Act, 2000. The Act provides legal recognition to e-commerce, which facilitates commercial e-transactions.