E Marketing Unit 4

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Legal Issues Faced By E-Commerce Businesses

Introduction
With the advanced and increased use of online media, online business is becoming a fast
emerging trend. Every five in eight companies are operating online, conducting E-Commerce
business. But being functional online doesn’t mean you can escape legal matters. E-
Commerce is understood to mean the production, distribution, marketing, sale or delivery of
goods and services by electronic means. Over the past few years, global trade has expanded
due to the explosive growth of electronic commerce.
There are various legal issues associated with E-Commerce businesses. If these issues are
not taken care of in time, they can lead to serious problems for a business. Described below
are some of the common legal issues an E-Commerce business faces.

Incorporation Problem
If the company has operated merely via a website, not being incorporated is a crucial
problem. Any purchase and selling activity related to the products will be considered illegal
and you can’t claim your right in case of any fraud and corruption. Without incorporation,
the business has no shelter.

Trademark Security Problem


Not getting trademark protected is one of the main legal issues in the field of E-Commerce.
Since trademark is the company’s logo and symbol, the representation of  business all over
the web, it must be protected. If it is not secure , it won’t take long before you realize your
trademark is being infringed upon. This is very common legal issue and can become a deadly
threat to  e-business.
With the hackers on loose and cybercrime so common, trademark infringement of the
business or by your business can be a serious legal matter and may hinder the business’s
progress.

Copyright Protection Issue


While publishing content for  E-Commerce website, using content of any other company can
be a severe legal problem. This might mark an end to your e-business. There are many sites
online which are royalty free and allow you to access their content and images. You may use
those sites for creating web content for your business site. Even if you unintentionally used
copyrighted content, the other party can easily sue your business.

Transaction Issues
If we do not abide by the rules, we can get into serious law violation problems. If the
business fails to provide clear and complete description of the product, cost and purchase
details, information about delivery i.e. when the customer will receive products and other
information related to exchange and refunds,  Consumer Law can impose penalties on the
business.

Privacy Issues
When it comes to online businesses, privacy is the major issue that can create problems both
for the business and customers. Consumers share information with businesses online and
they expect the sellers to keep their information confidential. By just one minor mistake and
leakage of valuable information of a customer, we will not only lose our potential customer
but the image and reputation will become a question mark.

Conclusion
The bursting of the dotcom bubble has made several companies realise that doing business
on the Internet is not as easy as it sounds. Undoubtedly, the power of the Internet to reach
any part of the world holds tremendous potential for enhancing international trade and
boosting global economy. However, just as every coin has a flip side, we have seen that
doing business on the Internet also has risks and legal issues associated with it. The rapid
pace of E-Commerce development has generally left the legal system struggling to keep up.
In much the same way as companies doing E-Commerce must invent new business
procedures and rules, the legal system is trying to adapt existing laws to fit new settings
where it is simply unclear how these laws will apply. In the midst of this legal confusion,
India is one of the few countries across the globe that has enacted an E-Commerce
legislation. 

electronic commerce security?

eCommerce security is the guideline that ensures safe transactions through the internet. It
consists of protocols that safeguard people who engage in online selling and buying goods and
services. You need to gain your customers’ trust by putting in place eCommerce security
basics. Such basics include:

 Privacy
 Integrity
 Authentication
 Non-repudiation

1. Privacy

Privacy includes preventing any activity that will lead to the sharing of customers’ data with
unauthorized third parties. Apart from the online seller that a customer has chosen, no one else
should access their personal information and account details.

A breach of confidentiality occurs when sellers let others have access to such information. An
online business should put in place at least a necessary minimum of anti-virus, firewall,
encryption, and other data protection. It will go a long way in protecting credit card and bank
details of clients.

2. Integrity

Integrity is another crucial concept of eCommerce Security. It means ensuring that any
information that customers have shared online remains unaltered. The principle states that the
online business is utilizing the customers’ information as given, without changing anything.
Altering any part of the data causes the buyer to lose confidence in the security and integrity of
the online enterprise.

3. Authentication

The principle of authentication in eCommerce security requires that both the seller and the
buyer should be real. They should be who they say they are. The business should prove that it
is real, deals with genuine items or services, and delivers what it promises. The clients should
also give their proof of identity to make the seller feel secure about the online transactions. It
is possible to ensure authentication and identification. If you are unable to do so, hiring an
expert will help a lot. Among the standard solutions include client login information and credit
card PINs.

4. Non-repudiation

Repudiation means denial. Therefore, non-repudiation is a legal principle that instructs players
not to deny their actions in a transaction. The business and the buyer should follow through on
the transaction part that they initiated. eCommerce can feel less safe since it occurs in
cyberspace with no live video. Non-repudiation gives eCommerce security another layer. It
confirms that the communication that occurred between the two players indeed reached the
recipients. Therefore, a party in that particular transaction cannot deny a signature, email, or
purchase.

Security issues of e commerce:

1. Firewall

A Firewall can be simply explained as a barrier built between a network of users and the
external environment that establishes a common security policy between the connected users
and the outside world which consists of possible intruders. Firewalls help in building up trust
on the network between multiple users and with the advent of the internet in all major spheres
of life in recent years, the popularity and importance of Firewalls have increased in multiple
folds.

The requirement of Firewalls increases since a major part of the currently existing operating
systems does not essentially hold security-oriented designs and was devised under the
assumption of an everlasting trust between users and machines. Let us look at the importance
and role of firewall.

Therefore, the system of Firewalls is built to avoid any sort of unauthorized access to or from a
private network that can be implemented in hardware and software, or even a combination of
both. Under the system of Firewall security, all the messages entering or leaving the internet
will have to pass through the security network that will assess every passing message and
block those that do not meet the security standards. One might wonder what the role of a
personal Firewall is or what is the role of a Firewall in computer security.

2. E-locking

An electronic lock (or electric lock) is a locking device which operates by means of electric
current. Electric locks are sometimes stand-alone with an electronic control assembly mounted
directly to the lock. Electric locks may be connected to an access control system, the
advantages of which include: key control, where keys can be added and removed without re-
keying the lock cylinder; fine access control, where time and place are factors; and transaction
logging, where activity is recorded. Electronic locks can also be remotely monitored and
controlled, both to lock and to unlock.

3. Encryption

Encryption secures digital data using one or more mathematical techniques known as
cryptography. The information input becomes unreadable through encryption as
an algorithm converts the original text, known as plaintext, into an alternative form known
as ciphertext.

When an authorized user needs to read the data, they may decrypt the data using a binary
key or password. This will convert ciphertext back to plaintext so that the user can access
the original information.

Encryption is an important way for individuals and companies to protect sensitive


information from hacking. For example, websites that transmit credit card and bank account
numbers encrypt this information to prevent identity theft and fraud.

Cyber Law (IT Law) in India

Cyber Law also called IT Law is the law regarding Information-technology including


computers and the internet. It is related to legal informatics and supervises the digital
circulation of information, software, information security, and e-commerce. 
IT law does not consist of a separate area of law rather it encloses aspects of contract,
intellectual property, privacy, and data protection laws. Intellectual property is a key
element of IT law. The area of software license is controversial and still evolving in
Europe and elsewhere. 

Objectives/Aims of Cyber Law

Lawmakers have executed cyber law legal protections with the following objectives. The
following features of cyber law are making the internet a much safer place to explore.

 To be a safety net against online data predators.


 To ensure justice for cybercrime victims
 To prevent debit card or credit card fraud. Many people have switched to digital
paying methods. Cyber law tries to make sure that victims do not have to go through
the additional agony of long procedures.
 To block transactions when there is any unusual activity such as the input of an
incorrect password.
 To ensure the safety of protected data. By knowing what cyber law is, one can easily
adopt preventative measures.
 To ensure national security.

Importance of Cyber Law: 


1. It covers all transactions over the internet. 
2. It keeps eye on all activities over the internet. 
3. It touches every action and every reaction in cyberspace. 

Salient Features of The Information Technology Act, 2000

The Information Technology Act, 2000 was enacted for prevention and control of cyber
crimes. The Information Technology Act is based on UNCITRAL ( United Nation's
Commission on International Trade Law)
     The Information Technology Act, 2000 , came into force with effect from 17th October,
2000 it has been amended in 2008 and the amended act is effective from February 5, 2009.
The rules under the Amended Act have also been framed, which became effective from
October 27, 2009.
       The salient features of the information technology Act, 2000 may briefly be stated
as follows :--

1. The act provides legal recognition to e-commerce, which facilities commercial e-


transactions.

2. It recognises records kept in electronic form like any other documentary records. In this
way, at brings electronic transactions at per with paper transactions in documentary form.

3. The act also provides legal recognition to digital signatures which need to be duly
authenticated by the certifying authorities.

4. Cyber law appellate tribunal has been set up to hear appeal against adjudicating
authorities.
5. The provisions of the I.T. Act have no application to negotiable instruments, power of
attorney, trust, will and any contract for sale or conveyance of immovable property.

Area of Cyber Law: 


Cyber laws contain different types of purposes. Some laws create rules for how
individuals and companies may use computers and the internet while some laws protect
people from becoming the victims of crime through unscrupulous activities on the internet.
The major areas of cyber law include:  
1. Fraud: 
Consumers depend on cyber laws to protect them from online fraud. Laws are made to
prevent identity theft, credit card theft, and other financial crimes that happen online. A
person who commits identity theft may face confederate or state criminal charges.
They might also encounter a civil action brought by a victim. Cyber lawyers work to
both defend and prosecute against allegations of fraud using the internet. 
 
2. Copyright: 
The internet has made copyright violations easier. In the early days of online
communication, copyright violations were too easy. Both companies and individuals
need lawyers to bring an action to impose copyright protections. Copyright violation is
an area of cyber law that protects the rights of individuals and companies to profit from
their creative works. 
 
3. Defamation: 
Several personnel uses the internet to speak their mind. When people use the internet to
say things that are not true, it can cross the line into defamation. Defamation laws are
civil laws that save individuals from fake public statements that can harm a business or
someone’s reputation. When people use the internet to make statements that violate
civil laws, that is called Defamation law. 
 
4. Harassment and Stalking: 
Sometimes online statements can violate criminal laws that forbid harassment and
stalking. When a person makes threatening statements again and again about someone
else online, there is a violation of both civil and criminal laws. Cyber lawyers both
prosecute and defend people when stalking occurs using the internet and other forms of
electronic communication. 
 
5. Freedom of Speech: 
Freedom of speech is an important area of cyber law. Even though cyber laws forbid
certain behaviors online, freedom of speech laws also allows people to speak their
minds. Cyber lawyers must advise their clients on the limits of free speech including
laws that prohibit obscenity. Cyber lawyers may also defend their clients when there is
a debate about whether their actions consist of permissible free speech. 
 
6. Trade Secrets: 
Companies doing business online often depend on cyber laws to protect their trade
secrets. For example, Google and other online search engines spend lots of time
developing the algorithms that produce search results. They also spend a great deal of
time developing other features like maps, intelligent assistance, and flight search
services to name a few. Cyber laws help these companies to take legal action as
necessary to protect their trade secrets. 
 
7. Contracts and Employment Law: 
Every time you click a button that says you agree to the terms and conditions of using a
website, you have used cyber law. There are terms and conditions for every website
that are somehow related to privacy concerns. 
 
Advantages of Cyber Law:
 Organizations are now able to carry out e-commerce using the legal infrastructure
provided by the Act. 
 
 Digital signatures have been given legal validity and sanction in the Act. 
 
 It has opened the doors for the entry of corporate companies for issuing Digital
Signatures Certificates in the business of being Certifying Authorities. 
 
 It allows Government to issue notifications on the web thus heralding e-governance.  
 
 It gives authority to the companies or organizations to file any form, application, or any
other document with any office, authority, body, or agency owned or controlled by the
suitable Government in e-form using such e-form as may be prescribed by the suitable
Government. 
 
 The IT Act also addresses the important issues of security, which are so critical to the
success of electronic transactions. 
 
 Cyber Law provides both hardware and software security.

There are several limitations of cyber laws in India, including:

1. Outdated legislation: The primary legislation governing cybercrime in India, the


Information Technology Act, 2000, was enacted before the widespread use of
smartphones and social media and is considered outdated by many experts.

2. Lack of expertise: Law enforcement agencies in India often lack the technical
expertise to effectively investigate and prosecute cybercrime cases.

3. Limited international cooperation: India has limited international cooperation with


other countries on cybercrime matters, which can make it difficult to track and
prosecute cybercriminals who operate across borders.

4. Lack of clear guidelines: There is a lack of clear guidelines for the investigation and
prosecution of cybercrime cases in India, which can result in inconsistent
enforcement and a low rate of conviction.
5. Lack of awareness: There is limited awareness among the general public and law
enforcement agencies about the various forms of cybercrime, and how to prevent
and respond to them.

Overall, the limitations of cyber laws in India highlight the need for a more comprehensive
and up-to-date legislative framework to effectively address the growing threat of
cybercrime in the country.

You might also like