Professional Documents
Culture Documents
It Law1 Mt0044
It Law1 Mt0044
Benefits of e-commerce
Use of e-commerce technologies helps speed up the flow of information and to eliminate
unnecessary human intervention; the computer can now accomplish what computers do better
than people – process routine business transactions quickly and accurately, 24 hours a day. This
in turn, frees up people to handle tasks that computers may never be able to do –exercising
judgment, creativity, and experience to manage exceptions, solve problems and continually
improve business processes.
E-commerce is growing in importance and means unprecedented opportunities for everyone.
When a business takes advantage of the power of e-commerce, it will be able to.
(i) Increase customer satisfactions
The Internet is always open, even on holidays; business is thus always open, 24 hours a day, 7
days a week and 365 days a year. Customers will appreciate the extra access to product
updates, shipping details, billing information and more. And since the internet knows no
boundaries, customers can shop from home, work, or anywhere they can make a connection.
Besides, by connecting the e-commerce and shipping systems, it would be possible to ship
products faster and for less money.
(ii) Increase sales volumes
The Internet is a new channel to reach new channel to reach new customers. With a Web site, a
company can automatically become a global provider of goods and services, with an edge over
even the largest competitors. Interactive selling is advantageous because a company is no
longer limited by shelf-space or inventory concerns but instead offer all products to suit the
customers’ exact specifications.
(iii) (iii) Decrease costs of doing business
E-commerce helps cut out or streamline processes that eat away profits.
For instance exchange of information from advertising to availability updates, can add to the
cost of a sale. However, the web site can be an efficient, cost-effective communication vehicle.
Customers can find timely accurate information in one place when they need it. By using e-
commerce, everything from purchase orders to funds transfer can be handled faster and more
efficiently. Even payment processing and bookkeeping are easier.
2
3. Write a note on Adoption of security standards by the industry
Adoption of security standards by the industry business thrives on safety, security and trust
whether it is offline or online.
The Internet being an open, integrated and public system requires far better security coverage
than its offline counterpart. It needs an ‘encryption’ technology that provides
(i) Confidentiality (ii) authentication (iii) integrity (iv) non-repudiation and of electronic
transactions.
i. Confidentiality
The idea is that the information should be protected from unauthorized internal as well as
external users by making it undecipherable. It uses encryption technology to ‘encrypt’ the
information in such a way that only an intended user could ‘decrypt’ the information.
ii. Authentication
It means use of encryption technology to identify the sender or originator of the information.
Similarly it should be possible to ensure that the message is sent to the person for whom it is
meant.
iii. Integrity
It is to verify that the information, which is received, has not been manipulated during its
transmission. On retrieval or receipt at the other end of a communication network the
information should appear exactly as it was stored or sent by the sender or originator.
iv. Non-repudiation
It is to ensure that the sender or originator cannot disown information at a later date. Encryption
technologies make it possible to bind messages and message acknowledgements with their
originators.
3
4. What is Cyber law? Explain why cyber law in India
Definition of cyber law
Internet is believed to be full of anarchy and a system of law and regulation therein seems
contradictory. However cyberspace is governed by a system of law and regulation called Cyber
law. There is no single exhaustive definition of the term “Cyber law”. The definition of Cyber
law which is broadly accepted is as follows:-
Simply speaking, Cyber law is a generic term which refers to all the legal and regulatory
aspects of Internet and the World Wide Web. Anything concerned with or related to or
emanating from any legal aspects or issues concerning any activity of citizens and others, in
Cyberspace comes within the ambit of Cyclone,
4
5. Write a note on Secure Digital signature
Secure digital signature
If, by application of a security procedure agreed to by the parties concerned, it can be verified
that a digital signature, at the time it was affixed, was –
(a) unique to the subscriber affixing it;
(b) capable of identifying such subscriber;
(c) created in a manner or using a means under the exclusive control of the subscriber and is
linked to the electronic record to which it relates in such a manner that if the electronic
record was altered the digital signature would be invalidated, then such digital signature
shall be deemed to be a secure digital signature.
Section 15 gives the definition of a secure digital signature. The requirements of section 15
have to be satisfied before the digital signature in question can be termed as secure. The section
mandates that in a secure digital signature, there must be an application of security procedure
agreed to by the concerned parties. In the present case, the legislature has thought fit not to
prescribe any specific security procedure in usage at large but has left the same to the
subjective will and discretion of the concerned parties.
However, the application of the security procedure should result in the factum of verification.
The verification should be to the effect that the digital signature, at the time when it was
affixed, was unique to the subscriber affixing the same. Verification is also required to show
that a digital signature, at the time it was affixed, was created in a manner or using a means or
process under the exclusive control of the subscriber and that the same is linked to the
electronic record to which it relates. However, it is necessary that the linking must be such that
in case there was any alteration of the electronic record, the digital signature would be
invalidated. If these mandatory conditions of law were fulfilled, the digital signature would be
termed as a secure digital signature in the eyes of law within the meaning of Section 15.
5
6