Digital signatures are like electronic “fingerprints.” In the form of a coded message, the digital signature securely associates a signer with a document in a recorded transaction.
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
Digital signatures provide a secure way to authenticate digital documents and messages. They use asymmetric encryption and digital certificates to verify identity and ensure document integrity. A digital signature is created by encrypting a hash of the message with the sender's private key, and can be verified by decrypting the signature with the sender's public key. This allows the recipient to confirm the identity of the sender and that the message content was not altered after signature.
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
Digital signatures provide a secure way to authenticate digital documents and messages. They use asymmetric encryption and digital certificates to verify identity and ensure document integrity. A digital signature is created by encrypting a hash of the message with the sender's private key, and can be verified by decrypting the signature with the sender's public key. This allows the recipient to confirm the identity of the sender and that the message content was not altered after signature. Digital signatures have legal standing and provide benefits like authentication, non-repudiation, and ensuring documents have not been tampered with.
The document discusses India's Information Technology Act of 2000. It was enacted to provide legal recognition for electronic commerce and transactions. Some key points:
- The Act recognizes electronic documents and digital signatures authenticated through asymmetric cryptographic techniques. It defines electronic signatures and establishes a framework for digital signature certificates.
- It aims to facilitate e-governance and outlines offenses related to illegal access or damage of computer systems, data theft, cyber terrorism, and cyber pornography.
- Certifying Authorities are licensed and regulated to issue digital signature certificates according to standards. Various cyber crimes are described along with their sections under the IT Act or IPC.
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
The document provides an overview of the Information Technology Act 2000 of India. Some key points:
- The IT Act was enacted in 2000, making India one of the first 12 countries to adopt cyber laws. It is based on the UNCITRAL Model Law on e-commerce.
- The objectives of the Act were to provide legal recognition for electronic transactions and facilitate e-governance. It amended several other Indian laws to include electronic records and digital signatures.
- The Act applies to cyber offenses committed in India or involving Indian systems. It defines important terms like electronic records, digital signatures, and secure electronic records using cryptography.
- Digital signatures use public key infrastructure for verification by relying parties
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
The document provides an overview of the Information Technology Act 2000 of India. Some key points:
- The IT Act was enacted in 2000, making India the 12th country to adopt cyber laws, and is based on UNCITRAL model law on e-commerce.
- The Act aims to provide legal recognition for electronic transactions and facilitate e-governance. It defines electronic records and digital signatures.
- A Controller of Certifying Authorities regulates and licenses Certifying Authorities to issue digital signature certificates using public key infrastructure.
- The Act recognizes electronic records and digital signatures as legally valid. It aims to facilitate electronic governance and commerce.
The Information Technology Act 2000 was enacted in India on May 17, 2000 to provide legal recognition to electronic commerce and transactions carried out by electronic data interchange and other means of electronic communication. The Act is based on a model law adopted by the UN on e-commerce. It aims to facilitate electronic governance and filing of documents. Some key components of the Act include provisions around digital signatures, duties of subscribers, penalties for offences, and protection for network service providers. It also defines important terms related to e-commerce and cyber security.
Whitepaper: What You Should Know About eSignature LawDocuSign
These days international borders are becoming less and less of a hurdle to conducting business. Particularly in industrialized countries, the law recognizes that business accelerators such as electronic signatures are essential to remaining competitive in the global economy. An understanding of the law regarding electronic signatures in the European Union and DocuSign’s strong adherence to these laws, as follows, provides businesses with the confidence to conduct business and get signatures electronically anywhere in the world.
This document discusses how to ensure trust in electronic transactions and reports. It covers using public key infrastructure (PKI) with digital signatures to authenticate senders, verify report integrity, and prevent repudiation. PKI allows individuals to obtain digital certificates to access public data in a trusted way. Archiving digitally signed transactions with their full context ensures a complete legal record that provides non-repudiation and can be trusted in court.
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The IT Act was enacted in 2000, making India the 12th country to adopt cyber laws, and is based on UNCITRAL model law on e-commerce.
- The objectives of the Act were to provide legal recognition for electronic transactions and documents, facilitate e-governance, and amend related laws to include electronic forms.
- It defines important terms like electronic records, digital signatures, and secure digital signatures verified using public key infrastructure.
- The Act provides for legal recognition of electronic records and digital signatures, and regulates the functions of the Controller of Certifying Authorities and licensed Cert
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
The document provides an overview of the Information Technology Act 2000 in India. It discusses key aspects of the act such as its objectives, definitions, provisions regarding electronic records and digital signatures. It also describes the role of the Controller of Certifying Authorities (CCA) in regulating and licensing Certifying Authorities, setting standards for public key infrastructure and digital signature certification processes. The CCA establishes a hierarchy with the government as the root of trust to help secure electronic communications and transactions through digital signatures certified by licensed Certifying Authorities.
This document provides an overview of digital signatures, including how they work and their legal aspects. It discusses how encryption scrambles messages and digital signatures verify authorship and document integrity. Digital signatures use public/private key pairs, where the private key is unique to the signer. To create a digital signature, a hash of the message and private key is computed. Verification involves recomputing the hash with the public key and signature to validate authenticity. Digital signatures provide evidence of authorship, represent a legal ceremony of approval, and make documents more efficient to process.
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
The document provides an overview of the Information Technology Act, 2000 of India. Some key points:
- The Act aims to provide legal recognition to electronic records and transactions carried out online. It defines electronic records and digital signatures.
- It establishes a Controller of Certifying Authorities to regulate and license Certifying Authorities to issue digital signature certificates.
- The Act recognizes electronic governance and gives legal validity to electronic records and digital signatures. It aims to facilitate electronic filing of documents.
- It defines offences related to cybercrime and provides penalties and adjudication process for contravention of the Act's provisions. Adjudicating officers are empowered to determine compensation in cases of loss or unfair advantage resulting
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The Act was enacted in 2000 to provide legal recognition to electronic records and digital signatures. It is based on the UNCITRAL Model Law on E-Commerce.
- The objectives are to facilitate electronic governance and commerce. It defines electronic records, digital signatures, secure systems, etc. and recognizes their legal validity.
- It applies to the whole of India and any offenses committed outside India involving computers in India. Various cybercrimes are punishable under the Act.
- It establishes provisions for public key infrastructure, digital signature certificates, duties of subscribers, and regulates certifying authorities to facilitate
Information Technology Act 2000 An OverviewAnubhav
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The Act aims to provide legal recognition for electronic transactions and facilitate e-filing/payments with the government.
- It defines important terms like electronic records, digital signatures, and security procedures. Digital signatures created using asymmetric cryptographic keys can verify electronic records.
- A public key infrastructure (PKI) allows parties without prior agreements to verify each other's identities through digital certificates issued by a certification authority.
- The Act lays out the legal processes for digital signatures to authenticate electronic records in a secure manner similar to physical signatures.
This document summarizes key aspects of India's Information Technology Act, including:
1) It defines digital signatures and electronic signatures, and outlines requirements for their use in authentication.
2) It establishes rules for electronic governance, electronic records, controllers who regulate certifying authorities, and adjudication of related offenses and compensation.
3) The case study discusses how information was retrieved from laptops of terrorists involved in a Parliament attack case, which revealed their motives and allowed for punishment under the law.
The document discusses cyber fraud and identity theft. It provides examples of common types of cyber fraud like internet fraud, phishing, and man-in-the-middle attacks. It emphasizes that identity loss from cybercrime can damage finances and reputation. The document also recommends ways to protect against cybercrime like using digital signature certificates, which provide authentication and security for electronic transactions. Victims of cybercrime can report incidents to local cyber crime police stations.
Similar to Comparision of Digital and Electronic SIGNATURES.pptx (20)
law needs to be understood from the point of view of its creator. Law as we seen today are majorly developed in Europe and spread through out the world except the islamic law. the source of law is different from the law.
Public international law, Draft article on State Responsibility, International Arbitration - attribution - Green Peace - Nuclear Explosion - precluding wrongfulness, reparation, repatriation ,
This document discusses persuasive advocacy and techniques for influencing a judge's decision-making process without coercion. It explains that persuasion aims to change someone's point of view or convince them to take action. An advocate should focus on psychologically processing legal information for the judge. Tools of persuasion mentioned include neuro-linguistic programming, conversational hypnosis, and subtle language choices to bypass the conscious mind and influence the subconscious. The document warns that persuasive advocacy is banned in many places and discusses strategies like repeating positive statements and disguising commands as requests to indirectly influence a judge's ruling.
PERSUASION OF VULNERABLE CHILD IN THE INFINITE CYBER SPACE SUBLIMINAL ADVERTI...Dr. Kannan Kunnathully
This document discusses the vulnerability of children to subliminal advertising in cyberspace. It defines cyberspace and notes that children are born literate in using technology but are still developing cognitively. Subliminal ads can exploit this by influencing children without their conscious awareness. While advertising has legal protections, subliminal ads target children in indirect and undetectable ways. Most other countries have laws against this practice, but India lacks even judicial acknowledgement of the issue. The document concludes that as adults cannot perceive what messages children receive, the state must take action to protect vulnerable children in cyberspace from exploitation by subliminal advertising.
This document discusses the psychology of the classroom from the perspectives of students and faculty. It notes that each student's thinking, information processing, receptiveness, and prior knowledge determines their performance. Faculty may have stagnated teaching approaches or barriers like command of the classroom. The document argues there is a need for psychologists in educational institutions to help students balance academic and personal lives, and assist with issues not addressed by family or faculty. It also explores standardizing classroom experiences, different states of awareness like trance versus sleep, and the faculty's role in inducing trance for more effective teaching.
The document discusses the Christian belief that God created the world. The author argues that creation must have been motivated by God's own selfish desires, as there were no souls before creation that could benefit from it. God felt inadequate before creation because his glory was not fully shining or appreciated. Therefore, creation was done to augment God's glory and have souls praise him, rather than for the benefit of the souls themselves. The author concludes creation was a selfish act motivated by God's own sense of inadequacy and desire to remove limitations, not an unselfish one.
This presentation covers the fundamental principles of taxation law, focusing on the provisions within the Indian Constitution (Articles 264-289) that deal with finance, contracts, and property. It outlines the need for government finance, details the Income Tax Act of 1961, and discusses the distribution of revenues between the union and states. The presentation also delves into the structure of income tax, including its determination, exemptions, deductions, and the categorization of income. Additionally, it explores the residential status for tax purposes and distinguishes between capital and revenue receipts and expenditures.
What are the Conditions for Obtaining British Citizenship by Descent?BridgeWest.eu
The formalities for obtaining UK citizenship can be explained by our experts in immigration. Information and contact details can be found here:
https://uk-immigration.lawyer/citizenship-by-descent-in-the-uk/
What is a Felony? Definition with Its Legal Implicationscontactgetlegal
GetLegal offers comprehensive insights on what is a felony and its implications within the legal system, making it an invaluable resource for anyone seeking to understand this serious category of crime. A felony is typically defined as a crime punishable by more than one year in prison, and it encompasses a wide range of offenses from severe theft to violent crimes. Our platform provides in-depth analysis and detailed explanations that break down the complexities of felony classifications, helping you navigate the legal definitions and their real-world applications.
Understanding the legal consequences of a felony conviction is crucial, as it extends beyond imprisonment. Felonies often result in significant long-term repercussions, including loss of civil rights such as voting and firearm ownership, difficulties in securing employment, and challenges in obtaining housing. GetLegal is dedicated to helping you stay informed about these consequences, offering expert analysis that elucidates the lasting impact a felony conviction can have on your life. Our content is meticulously researched and crafted to ensure you have access to accurate and practical information.
At GetLegal, we prioritize empowering you with knowledge about your rights and the legal processes you may encounter. Whether you are personally facing a felony charge, supporting a loved one, or simply looking to educate yourself about the legal system, GetLegal is your go-to resource for all things legal. Our commitment to providing clear, accessible, and reliable legal information makes us a trusted guide in navigating the complexities of felony laws and their broader implications. Stay informed and prepared with GetLegal's expert guidance and resources.
How to get Cambridge FCE Certificate online?GlethDanold
Website: https://www.fakediplomamaker.shop/
Email: diplomaorder2003@gmail.com
Telegram: @fakeidiploma
skype: diplomaorder2003@gmail.com
wechat: jasonwilliam2003
buy bachelor degree from https://www.fakediplomamaker.shop/ to be competitive. Even if you are not already working and you havve just started to explore employment opportunities buy UK degree, buy masters degree from USA, buy bachelor degree from Australia, fake Canadian diploma where to buy diploma in Canada, It's still a great idea to purchase your degree and get a head start in your career. While many of the people your age will enlist in traditional programs and spend years learning you could accumulate valuable working experience. By the time they graduate you will have already solidified a respectable resume boasting both qualification and experience.
Body Corporates Beware: Defamation in Sectional Title SchemesAshwini Singh
Defamation in Body Corporates of Sectional Title Schemes (South Africa)
Examples of Slander in a Body Corporate:
- Unit Owner A makes a false statement that Unit Owner J is being sequestrated and foreclosed at an Annual General Meeting.
- Body Corporate Chairman O makes a false statement that a
registered Professional Land Surveyor has committed fraud at an Annual General Meeting.
Examples of Libel in a Body Corporate:
- Former Trustee A makes false statements via email (sent to multiple other owners) that Unit Owner J is illegally parking on common property, when Unit Owner J is parked within a registered Exclusive Use Area.
- Unit Owner A makes false statements via email (sent to multiple other owners) that accuse specific owners and occupants of creating network names that Unit Owner A finds offensive.
Case Law: Body Corporate of Sunnyside Gardens v Perreira
Union Budget 2024 presented by Nirmala Sitharaman – LIVE.pdfTheBharatWeekly
The Union Budget 2024, presented by Finance Minister Nirmala Sitharaman on July 23, 2024, has garnered significant attention for its focus on infrastructure, income tax reforms, and economic growth. This budget aims to address various sectors, including railways, healthcare, education, and more, with a vision of making India a developed nation by 2047.
UILA - Red Cross Webinar Series - Criminal Law - ENG.pptxirishredcross1
Do you have questions about criminal law in Ireland?
Do you know what your rights are if you victim of a crime?
Do you want to know how criminal law works in Ireland?
Do you know where to go if you wish to report a crime?
THE MAHARASHTRA RENT CONTROL ACT, 1999.pdfNitin Chalwadi
Understanding the Maharashtra Rent Control Act, 1999, is essential for both landlords and tenants in Maharashtra. The Act ensures that rental practices are fair, transparent, and regulated, fostering a harmonious relationship between landlords and tenants.
The Russian Spy Embedded in the World of Embedded FinanceVladislav Solodkiy
When Vladimir Putin launched his full-scale invasion of Ukraine in February 2022, the world responded with a swift and unprecedented wave of sanctions. Within months, the financial landscape for Russian companies, particularly those associated with oligarchs supporting Putin and his war, underwent a seismic shift. Access to foreign banking services, once taken for granted, became a scarce and highly sought-after commodity. The Wirecard scandal and the involvement of Jan Marsalek have highlighted stark differences in how Singapore and Russia, under Vladimir Putin's leadership, approach fintech and its potential use for money laundering and espionage. Catherine Belton's (FT, WSJ) book "Putin's People" provides numerous examples and insights into the behavior patterns of Putin-related oligarchs, especially the tendency to say one thing and do another (including the Wirecard-like scandal schemes). This duplicity is a recurring theme in the behavior of many Putin-era oligarchs, reflecting their background and strategies derived from KGB practices. Despite these settlements, both Fridman and Abramovich have been sanctioned by the US and UK for their connections to Putin and alleged support for his activities, including the invasion of Ukraine. This juxtaposition highlights the pattern of public denial and legal action against accusations while simultaneously being implicated by international authorities for their close ties to the Kremlin and support for Putin's regime. In many instances, Putin-related oligarchs would verbally justify actions like canceling deals using strategic reasons (such as ROFR?). However, their written communications would often cite absurd or unrelated reasons (such as "the inability to attract financing"?) without logically explaining how this related to their actual strategic maneuvers. This pattern of giving one explanation verbally and another in writing creates a veil of confusion and obscures their true intentions and actions. Belton's extensive research and interviews with key players reveal a consistent theme of manipulation and strategic deception, characteristic of the ex-Soviet oligarchs' approach to consolidating power and wealth under Putin's regime. These are just a few examples of the far-reaching consequences of the sanctions and the ongoing efforts to combat money laundering and financial crime associated with the Russian regime. The situation continues to evolve as governments and international organizations tighten the screws on those who seek to evade accountability and profit from war and corruption.
2. DIGITAL SIGNATURE
Section 2 (1) (p) ―digital signature‖ means
authentication of any electronic record by a
subscriber by means of an electronic method or
procedure in accordance with the provisions of
section 3; (IT Act.2000)
Subscriber use it for authentication of
electronic record
By using an electronic method or
Procedure as mentioned under section 3 of
the Act.
3. ELECTRONIC SIGNATURE
Section 2 (1) (ta) ―electronic signature‖ means
authentication of any electronic record by a
subscriber by means of the electronic technique
specified in the Second Schedule and includes
digital signature; (IT Act.2000)
Authentication of electronic record by a
subscriber.
By electronic techniques mentioned in second
schedule
It included digital signature also.
4. Reliable Electronic signature
Section 3 A (2) (a to e) specifically mentions what are reliable electronic
signature
If the signatures are linked to the signatory or authenticator, they are
considered reliable.
If the signatures are under the control of the signatory at the time of
signing.
Any alteration to such a signature must be detectable after fixation or
alteration.
The alteration done to any information which is authenticated by the
signature must be detectable.
It must also fulfill any other conditions as specified by the Central
Government.
5. COMPARISON
Digital Signature Electronic signature
A digital signature relies on public key infrastructure which
authenticates the electronic signature
An electronic signature is simply a legally valid electronic
replacement of a handwritten signature.
Digital signatures carry a user's information along with electronic
signatures.
Electronic signatures do not contain any authentication attached
to them.
A digital signature secures a document. An electronic signature verifies the document.
Digital signatures are validated by licensed certifying authorities
such as eMudhra.
Electronic signatures are not validated by licensed certifying
authorities.
Digital signatures come with encryption standards. Electronic signatures do not come with encryption standards.
A digital signature consists of various security features and is less
prone to tampering.
An electronic signature is less secure and is more vulnerable to
tampering.
A digital signature acts as an electronic fingerprint that consists of
a person's identification.
An electronic signature can be a file, image, or symbol attached to
a document to give consent for a signature.
A digital signature is created via cryptographic algorithms.
An electronic signature offers lower security and no cryptographic
algorithms are used in creating a simple electronic signature.
A digital signature is authenticated using a digital signature
certificate.
An electronic signature is authenticated using a phone number,
SMS, etc.
6. COMPARISON
An electronic signature includes a digital signature.
This means electronic signature has a broader meaning to
include digital signature as well.
Both are used to authenticate an electronic record.
The burden is always on the subscriber to prove that the
signature does not belong to him (in the case of conflict).
Presumption is that the signature is genuine unless and
until the contrary is proved.
7. Benefits of Digital signature
Confidentiality
Paperless – reduce environmental impact compared to paper
back documents.
Higher security for the responsible people who are vigilant in
using it.
Legal compliance – IT Act and the Companies Act demands for
Digital signature. (legal validity).
Time Saving – Faster application
Cost saving
Easy application of the digital signature.
Presumption of authentic electronic record.
Efficiency in business
Minimising the white collar crime like fraud.
Trustworthiness for the customers – provide a reasonable
solution for cyber security issues.
8. Draw backs of digital signature
Pair key can be stolen.
Should have gadgets, software and other
technology to use it.
Limited to the technology and not scope to adapt
to the technological advancement in the future.
Complex process
Less acceptances from the public.
Prone to cyber attack.
9. Purpose of signature
Electronic signature – intends to inform who
signed the e content, the procedure to place the
signature and the related relevant information to
be passed including the contract agreed.
Digital Signature – secure the content of the
document and protect sensitive data. Provide a
secrecy to the document transferred through the
cyber platform
10. e - filing
The government and its agencies demand for the
electronic record to be signed through a procedure
specifically mentioned by them. Section 3 of the IT Act
2000.
Used for the purpose of licenses, permit and approval from
the government agencies.
Used for the tax purposes filings
Used for the payment and receipt in the electronic form.
For the e contracts. (validating)
For e-court proceedings.
For the purpose of electronic ID, Passport or travel
document, Visa and other similar records and data
11. Tampering
The offences are defined to deter the tampering of
signature.
Identity theft – unauthorised used of signature of
other person – punishable with fine and imprisonment
for 3 years
Misrepresentation by misuse of signature – 2 year
imprisonment and fine
Publication of or providing false electronic signature
certificate – punishable for 2 years and fine.
12. Key words
Pair key (Private key + Public key)
Public key
Private key
Asymmetric crypto system
Hash function
Encoded and decoded
Click wrap (I accept, I agree).
Shrink wrap
Browse wrap
Digital Signature Certificate. (section 23 of the rules, 2000)
Electronic Data Interchange
Personal Identification Number (PIN)
Wrapping Attacks - https://www.wati.com/the-silent-assassins-understanding-
signature-wrapping-attacks/
13. Reference book
Cyber Laws, Justice Yatindra Singh, 6th edition, Universal publications
(LexisNexis). page 8 – 12,
Information Technology Act, 2000.
The Information Technology (certifying authorities) Rules. 2000.