Professional Documents
Culture Documents
E Marketing Unit 4
E Marketing Unit 4
E Marketing Unit 4
Introduction
With the advanced and increased use of online media, online business is becoming a fast
emerging trend. Every five in eight companies are operating online, conducting E-Commerce
business. But being functional online doesn’t mean you can escape legal matters. E-
Commerce is understood to mean the production, distribution, marketing, sale or delivery of
goods and services by electronic means. Over the past few years, global trade has expanded
due to the explosive growth of electronic commerce.
There are various legal issues associated with E-Commerce businesses. If these issues are
not taken care of in time, they can lead to serious problems for a business. Described below
are some of the common legal issues an E-Commerce business faces.
Incorporation Problem
If the company has operated merely via a website, not being incorporated is a crucial
problem. Any purchase and selling activity related to the products will be considered illegal
and you can’t claim your right in case of any fraud and corruption. Without incorporation,
the business has no shelter.
Transaction Issues
If we do not abide by the rules, we can get into serious law violation problems. If the
business fails to provide clear and complete description of the product, cost and purchase
details, information about delivery i.e. when the customer will receive products and other
information related to exchange and refunds, Consumer Law can impose penalties on the
business.
Privacy Issues
When it comes to online businesses, privacy is the major issue that can create problems both
for the business and customers. Consumers share information with businesses online and
they expect the sellers to keep their information confidential. By just one minor mistake and
leakage of valuable information of a customer, we will not only lose our potential customer
but the image and reputation will become a question mark.
Conclusion
The bursting of the dotcom bubble has made several companies realise that doing business
on the Internet is not as easy as it sounds. Undoubtedly, the power of the Internet to reach
any part of the world holds tremendous potential for enhancing international trade and
boosting global economy. However, just as every coin has a flip side, we have seen that
doing business on the Internet also has risks and legal issues associated with it. The rapid
pace of E-Commerce development has generally left the legal system struggling to keep up.
In much the same way as companies doing E-Commerce must invent new business
procedures and rules, the legal system is trying to adapt existing laws to fit new settings
where it is simply unclear how these laws will apply. In the midst of this legal confusion,
India is one of the few countries across the globe that has enacted an E-Commerce
legislation.
eCommerce security is the guideline that ensures safe transactions through the internet. It
consists of protocols that safeguard people who engage in online selling and buying goods and
services. You need to gain your customers’ trust by putting in place eCommerce security
basics. Such basics include:
Privacy
Integrity
Authentication
Non-repudiation
1. Privacy
Privacy includes preventing any activity that will lead to the sharing of customers’ data with
unauthorized third parties. Apart from the online seller that a customer has chosen, no one else
should access their personal information and account details.
A breach of confidentiality occurs when sellers let others have access to such information. An
online business should put in place at least a necessary minimum of anti-virus, firewall,
encryption, and other data protection. It will go a long way in protecting credit card and bank
details of clients.
2. Integrity
Integrity is another crucial concept of eCommerce Security. It means ensuring that any
information that customers have shared online remains unaltered. The principle states that the
online business is utilizing the customers’ information as given, without changing anything.
Altering any part of the data causes the buyer to lose confidence in the security and integrity of
the online enterprise.
3. Authentication
The principle of authentication in eCommerce security requires that both the seller and the
buyer should be real. They should be who they say they are. The business should prove that it
is real, deals with genuine items or services, and delivers what it promises. The clients should
also give their proof of identity to make the seller feel secure about the online transactions. It
is possible to ensure authentication and identification. If you are unable to do so, hiring an
expert will help a lot. Among the standard solutions include client login information and credit
card PINs.
4. Non-repudiation
Repudiation means denial. Therefore, non-repudiation is a legal principle that instructs players
not to deny their actions in a transaction. The business and the buyer should follow through on
the transaction part that they initiated. eCommerce can feel less safe since it occurs in
cyberspace with no live video. Non-repudiation gives eCommerce security another layer. It
confirms that the communication that occurred between the two players indeed reached the
recipients. Therefore, a party in that particular transaction cannot deny a signature, email, or
purchase.
1. Firewall
A Firewall can be simply explained as a barrier built between a network of users and the
external environment that establishes a common security policy between the connected users
and the outside world which consists of possible intruders. Firewalls help in building up trust
on the network between multiple users and with the advent of the internet in all major spheres
of life in recent years, the popularity and importance of Firewalls have increased in multiple
folds.
The requirement of Firewalls increases since a major part of the currently existing operating
systems does not essentially hold security-oriented designs and was devised under the
assumption of an everlasting trust between users and machines. Let us look at the importance
and role of firewall.
Therefore, the system of Firewalls is built to avoid any sort of unauthorized access to or from a
private network that can be implemented in hardware and software, or even a combination of
both. Under the system of Firewall security, all the messages entering or leaving the internet
will have to pass through the security network that will assess every passing message and
block those that do not meet the security standards. One might wonder what the role of a
personal Firewall is or what is the role of a Firewall in computer security.
2. E-locking
An electronic lock (or electric lock) is a locking device which operates by means of electric
current. Electric locks are sometimes stand-alone with an electronic control assembly mounted
directly to the lock. Electric locks may be connected to an access control system, the
advantages of which include: key control, where keys can be added and removed without re-
keying the lock cylinder; fine access control, where time and place are factors; and transaction
logging, where activity is recorded. Electronic locks can also be remotely monitored and
controlled, both to lock and to unlock.
3. Encryption
Encryption secures digital data using one or more mathematical techniques known as
cryptography. The information input becomes unreadable through encryption as
an algorithm converts the original text, known as plaintext, into an alternative form known
as ciphertext.
When an authorized user needs to read the data, they may decrypt the data using a binary
key or password. This will convert ciphertext back to plaintext so that the user can access
the original information.
Lawmakers have executed cyber law legal protections with the following objectives. The
following features of cyber law are making the internet a much safer place to explore.
The Information Technology Act, 2000 was enacted for prevention and control of cyber
crimes. The Information Technology Act is based on UNCITRAL ( United Nation's
Commission on International Trade Law)
The Information Technology Act, 2000 , came into force with effect from 17th October,
2000 it has been amended in 2008 and the amended act is effective from February 5, 2009.
The rules under the Amended Act have also been framed, which became effective from
October 27, 2009.
The salient features of the information technology Act, 2000 may briefly be stated
as follows :--
2. It recognises records kept in electronic form like any other documentary records. In this
way, at brings electronic transactions at per with paper transactions in documentary form.
3. The act also provides legal recognition to digital signatures which need to be duly
authenticated by the certifying authorities.
4. Cyber law appellate tribunal has been set up to hear appeal against adjudicating
authorities.
5. The provisions of the I.T. Act have no application to negotiable instruments, power of
attorney, trust, will and any contract for sale or conveyance of immovable property.
2. Lack of expertise: Law enforcement agencies in India often lack the technical
expertise to effectively investigate and prosecute cybercrime cases.
4. Lack of clear guidelines: There is a lack of clear guidelines for the investigation and
prosecution of cybercrime cases in India, which can result in inconsistent
enforcement and a low rate of conviction.
5. Lack of awareness: There is limited awareness among the general public and law
enforcement agencies about the various forms of cybercrime, and how to prevent
and respond to them.
Overall, the limitations of cyber laws in India highlight the need for a more comprehensive
and up-to-date legislative framework to effectively address the growing threat of
cybercrime in the country.