Professional Documents
Culture Documents
IT Law CPJ
IT Law CPJ
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
UNIT 1
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Revolution must thus be employed with some care. It is used below to describe
an extraordinary quickening in the rate of growth and change and, more
particularly, to describe the first 150 years of this period of time, as it will be
convenient to pursue the developments of the 20th century separately.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Power technology
Windmills
Steam engines
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Electricity
Petroleum
The economic potential for the internal-combustion engine lay in the need for a
light locomotive engine. This could not be provided by the gas engine,
depending on a piped supply of town gas, any more than by the steam engine,
with its need for a cumbersome boiler; but, by using alternative fuels derived
from oil, the internal-combustion engine took to wheels, with momentous
consequences. Bituminous deposits had been known in Southwest Asia from
antiquity and had been worked for building material, illuminants, and medicinal
products.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Development of industries
Metallurgy
Another industry that interacted closely with the power revolution was that
concerned with metallurgy and the metal trades. The development of techniques
for working with iron and steel was one of the outstanding British achievements
of the Industrial Revolution. The essential characteristic of this achievement
was that changing the fuel of the iron and steelindustry from charcoal to coal
enormously increased the production of these metals. It also provided another
incentive to coal production and made available the materials that were
indispensable for the construction of steam engines and every other
sophisticated form of machine.
The result of this series of innovations was that the British iron and steel
industry was freed from its reliance upon the forests as a source of charcoal and
was encouraged to move toward the major coalfields. Abundant cheap iron thus
became an outstanding feature of the early stages of the Industrial Revolution in
Britain. Cast iron was available for bridge construction, for the framework of
fireproof factories, and for other civil-engineering purposes such as Thomas
Telford’s novel cast-iron aqueducts.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Low-grade ores
The transition to cheap steel did not take place without technical problems, one
of the most difficult of which was the fact that most of the easily available low-
grade iron ores in the world contain a proportion of phosphorus, which proved
difficult to eliminate but which ruined any steel produced from them.
Textiles
The industry that, probably more than any other, gave its character to
the British Industrial Revolution was the cotton-textile industry. The traditional
dates of the Industrial Revolution bracket the period in which the processes of
cotton manufacture in Britain were transformed from those of a small-scale
domestic industry scattered over the towns and villages of the South Pennines
into those of a large-scale, concentrated, power-driven, mechanized, factory-
organized, urban industry.
Chemicals
In Britain the growth of the textile industry brought a sudden increase of interest
in thechemical industry, because one formidablebottleneck in the production of
textiles was the long time that was taken by natural bleaching techniques,
relying on sunlight, rain, sour milk, and urine. The modern chemical industry
was virtually called into being in order to develop more rapid bleaching
techniques for the British cotton industry. Its first success came in the middle of
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
the 18th century, when John Roebuck invented the method of mass
producing sulfuric acid in lead chambers.
Agriculture
Steam locomotive
First was the evolution of the railroad: the combination of the steam locomotive
and a permanent travel way of metal rails. Experiments in this conjunction in
the first quarter of the 19th century culminated in the Stockton & Darlington
Railway, opened in 1825, and a further five years of experience with steam
locomotives led to theLiverpool and Manchester Railway, which, when it
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
opened in 1830, constituted the first fully timetabled railway service with
scheduled freight and passenger traffic relying entirely on the steam locomotive
for traction.
Road locomotive
The second form in which steam power was applied to transport was that of the
road locomotive. There is no technical reason why this should not have enjoyed
a success equal to that of the railway engine, but its development was so
constricted by the unsuitability of most roads and by the jealousy of other road
users that it achieved general utility only for heavy traction work and such
duties as road rolling. The steam traction engine, which could be readily
adapted from road haulage to power farm machines, was nevertheless a
distinguished product of 19th-century steam technology.
Working Conditions
Living Conditions
Urbanization
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Since the Industrial Revolution was so new at the end of the 18th century, there
were initially no laws to regulate new industries. For example, no laws
prevented businesses from hiring seven-year-old children to work full time in
coal mines or factories. No laws regulated what factories could do with their
biohazard waste.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
humans move and how they transport their goods from place to another. Also,
developing countries are getting funds from wealthy countries to improve their
road transport which has resulted in the development of rural remote areas.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Resource Depletion
Increased Population
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
birth control methods, this has helped them balance their population in relation
to natural resources and other opportunities which come with a planned
population. This is different in developing countries, the rate at which people
produce is very high, the mortality rate is high, food is scarce and health care is
poor.
Increased Pollution
Pollution affects the land we grow crops on, the water we drink and the air we
breathe. The increased demand for new technologies andadvancement of
technologies has resulted in many manufacturing and processing factories. As
they work so hard to create the best technologies for both society and business,
they release harmful chemicals and gasses which have polluted our environment
and this has resulted in climate changes (global warming). So the more
technology we enjoy, the more we harm our environment. Experts have tried to
implement ways of reducing this impact by encouraging factories to go green, to
a small extent, this has been achieved through the development of green
technologies like; green cars, green computers, but a great effort is still needed
to reduce the pollution of the air and the earth.
Technology society and life or technology and culture refers to cyclical co-
dependence, co-influence, and co-production of technology and society upon
the other (technology upon culture, and vice versa). This synergistic relationship
occurred from the dawn of humankind, with the invention of simple tools and
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
continues into modern technologies such as the printing press and computers.
The academic discipline studying the impacts of science, technology, and
society, and vice versa is called science and technology studies.
Effects:
Technology has become a huge part in society and day-to-day life. When
societies know more about the development in a technology, they become able
to take advantage of it. When an innovation achieves a certain point after it has
been presented and promoted, this technology becomes part of the
society. Digital technology has entered each process and activity made by
the social system. In fact, it constructed another worldwide communication
system in addition to its origin.[3]
A 1982 study by The New York Times described a technology assessment study
by theInstitute for the Future, "peering into the future of an electronic world".
The study focused on the emerging videotex industry, formed by the marriage
of two older technologies, communications and computing. It estimated that 40
percent of American households will have two-way videotex service by the end
of the century. By comparison, it took television 16 years to penetrate 90
percent of households from the time commercial service was begun.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Funding
Technology has frequently been driven by the military, with many modern
applications developed for the military before they were adapted for civilian
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
use. However, this has always been a two-way flow, with industry often
developing and adopting a technology only later adopted by the military.
Private funding
Values
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
influenced by values. There are (at least) three major, interrelated values that
inform, and are informed by, technological innovations:
Efficiency: A value, originally applied only to machines, but now applied to all
aspects of society, so that each element is expected to attain a higher and higher
percentage of its maximal possible performance, output, or ability.
Social progress: The belief that there is such a thing as social progress, and that,
in the main, it is beneficent. Before the Industrial Revolution, and the
subsequent explosion of technology, almost all societies believed in a cyclical
theory of social movement and, indeed, of all history and the universe.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
The rise of very large organizations: e.g., governments, the military, health
and social welfare institutions, supranational corporations.
International
Globalization of ideas
Embeddedness of values
Population growth and control
Environment
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
versus the disvalues of waste products and pollution. Some technologies are
designed specifically with the environment in mind, but most are designed first
for economic or ergonomic effects. Historically, the value of a clean
environment and more efficient productive processes has been the result of an
increase in the wealth of society, because once people are able to provide for
their basic needs, they are able to focus on less-tangible goods such as clean air
and water.
Virtues are general patterns of behavior, emotion, and attitudes that permeate all
areas of life.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Moral integrity is maintained when virtues are manifested across the bounds of
both personal and professional life.
An engineer is not simply a part in a machine. Machine parts can’t think; being
human carries the special obligation to think.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Ethical Egoism does provide guidance for behavior, but it denies the more
global notion of moral behavior.
But, Socrates asked, in effect, “Why does God make certain commands? Are the
commands of God based on whim? Surely not, God is (morally) good.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Utilitarianism is the view that we ought to produce the most good for the most
people, giving equal consideration to everyone affected.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Brandt: Rule-Utilitarianism
Moral rules are primary (as opposed to right action). We ought to act on those
rules which, if generally followed, would produce the most good for the most
people. Individual actions are right (moral) when they conform to those rules.
Rules should be considered in sets that Brandt calls “moral codes”. A moral
code is justified when it consists of a set of rules which, if adopted and
followed, would produce the most overall good. Such a code is said to be
optimal. Code sets may be very general, or highly specific (like engineering
codes of ethics).
John Rawls tries to formulate general principles that can be ranked in order of
importance without having to rely on intuitive judgments.
Valid principles of duty are those that would be voluntarily agreed upon by all
rational persons in a “contracting” situation.
A rational person
1. Lacks all specific knowledge of himself.
2. Has general knowledge of human societies and science.
3. Has a rational concern for his long-term interests.
4. Seeks to negotiate a principles all will voluntarily follow.
All rational people will (according to Rawls) agree to abide by two basic
principles, namely,
1. Each person is entitled to the most extensive amount of freedom compatible
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
could not otherwise be achieved. The goods are said to be internal goods
because they are the results of the workings of the practice. External goods,
fame, fortune, prestige, etc., can be gained in many ways; internal goods are the
result of practice.
UNIT - 2
Model law of e-commerce
Introduction
The United Nations Commission on International Trade Law (UNCITRAL)
Model Law on Electronic Commerce was promulgated in 1996 (and amended
in 1998) to assist countries in the framing of legislation which would enable and
facilitate electronic commerce and electronic government. Surprisingly, it
makes no reference to the Internet.
establishes rules and norms that validate and recognize contracts formed
through electronic means,
sets rules for forming contracts and governing electronic contract
performance,
defines the characteristics of valid electronic writing and of an original
document,
provides for the acceptability of electronic signatures for legal and
commercial purposes, and
supports the admission of computer evidence in courts
and arbitration proceedings.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
with transmission and receipt of messages and contracts for the carriage
of goods. It does not address jurisdictional or conflict of laws issues.
Purpose
Why is it relevant?
The MLEC was the first legislative text to adopt the fundamental principles of
non-discrimination, technological neutrality and functional equivalence that are
widely regarded as the founding elements of modern electronic commerce law.
The principle of non-discrimination ensures that a document would not be
denied legal effect, validity or enforceability solely on the grounds that it is in
electronic form. The principle of technological neutrality mandates the adoption
of provisions that are neutral with respect to technology used. In light of the
rapid technological advances, neutral rules aim at accommodating any future
development without further legislative work. The functional equivalence
principle lays out criteria under which electronic communications may be
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Online contracting
Electronic contracts (contracts that are not paper based but rather in electronic
practise) are born out of the need for speed, suitability and efficiency. Imagine a
contract that an Indian exporter and an American importer wish to enter into.
One option would be that one party first pulls up two copies of the contract,
signs them and couriers them to the other, who in turn signs both copies and
couriers one copy back. The other option is that the two parties meet someplace
and sign the contract.
In the electronic age, the whole contract can be completed in seconds, with both
parties simply attaching their digital signatures to an electronic copy of the
contract. There is no need for delayed couriers and additional travelling costs in
such a situation.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
In many contacts (whether online or conventional) the offer is not made directly
one-on-one. The consumer ‘browses’ the available goods and services showed
on the seller’s website and then chooses what he would like to purchase. The
offer is not made by website showing the items for sale at a particular price.
This is essentially an invitation to offer and hence is revocable at any time up to
the time of acceptance. The offer is made by the customer on introduction the
products in the virtual ‘basket’ or ‘shopping cart’ for payment.
As stated earlier, the acceptance is usually assumed by the business after the
offer has been made by the consumer in relation with the invitation to offer. An
offer is revocable at any time until the acceptance is made.
II. Web Site Forms: The seller can offer goods or services (e.g. air tickets,
software etc.) through his website. The customer places an order by completing
and communicating the order form provided on the website. The goods may be
actually delivered later (e.g. in case of clothes, music CDs etc.) or be directly
delivered electronically (e.g. e-tickets, software, mp3 etc.).
III. Online Agreements: Users may need to take an online agreement in order
to be able to avail of the services e.g. clicking on “I accept” while connecting
software or clicking on “I agree” while signing up for an email account.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Any contract to be enforceable by law must have legal consideration, i.e., when
both parties give and receive something in return. Therefore, if an auction site
eases a contract between two parties where one Ecommerce – Legal Issues such
as a person provides a pornographic movie as consideration for purchasing an
mp3 player, then such a contract is void.
Contracts by minors, lunatics etc. are void. All the parties to the contract must
be lawfully competent to enter into the contract.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
A valid contract presumes a lawful object. Thus a contract for selling narcotic
drugs or pornography online is void.
Employment Contracts
Consultant Agreements
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
The normal requirements of Indian Contracts Act of 1872 will apply on any
consultant agreement. But particularly in Information Technology industry
where the infrastructure to function is low and connectivity is very high
consultancy with experience marketing and business development and
technology development is a very dominant mode of contract. Here proper care
to be taken in Consultant agreements where issues of Intellectual Property
Rights, privacy will play an important role. If care is not taken it may lead to
cost of business and loss of clients.
Contractor Agreements
Non-Disclosure Agreements
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
importance in an industry which is purely knowledge based and one which can
be easily repeated ruining the business.
Digital signature
Purpose
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Password - The use of a user name and password provide the most common
form of authentication. You enter your name and password when prompted by
the computer. It checks the pair against a secure file to confirm. If either the
name or password do not match, then you are not allowed further access.
Checksum - Probably one of the oldest methods of ensuring that data is correct,
checksums also provide a form of authentication since an invalid checksum
suggests that the data has been compromised in some fashion. A checksum is
determined in one of two ways.
Private key encryption -Private key means that each computer has a secret key
(code) that it can use to encrypt a packet of information before it is sent over the
network to the other computer. Private key requires that you know which
computers will talk to each other and install the key on each one. Private key
encryption is essentially the same as a secret code that the two computers must
each know in order to decode the information. The code would provide the key
to decoding the message. Think of it like this. You create a coded message to
send to a friend where each letter is substituted by the letter that is second from
it. So "A" becomes "C" and "B" becomes "D". You have already told a trusted
friend that the code is "Shift by 2". Your friend gets the message and decodes it.
Anyone else who sees the message will only see nonsense.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
must use the public key provided by the originating computer and it's own
private key.
The key is based on a hash value. This is a value that is computed from a base
input number using a hashing algorithm. The important thing about a hash value
is that it is nearly impossible to derive the original input number without
knowing the data used to create the hash value. Here's a simple example:
You can see how hard it would be to determine that the value of 1525381 came
from the multiplication of 10667 and 143. But if you knew that the multiplier
was 143, then it would be very easy to calculate the value of 10667. Public key
encryption is much more complex than this example but that is the basic idea.
Public keys generally use complex algorithms and very large hash values for
encrypting: 40-bit or even 128-bit numbers. A 128-bit number has a possible
2128 different combinations. That's as many combinations as there are water
molecules in 2.7 million olympic size swimming pools. Even the tiniest water
droplet you can image has billions and billions of water molecules in it!
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
information that says the Web server is trusted by an independent source known
as a Certificate Authority. The Certificate Authority acts as the middleman
that both computers trust. It confirms that each computer is in fact who they say
they are and then provides the public keys of each computer to the other.
1. Added security
A digital signature offers more security than an electronic signature. The unique
identifying “fingerprint” data in a digital signature remains permanently
embedded within a document. Signs that someone has tampered with or altered a
document after signing it can be easily detected.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
2. A high standard
The PKI standard is common to DocuSign and its peer companies in the digital
signature industry. PKI offers an algorithmically based protocol in which a
vendor generates two “keys,” the lengthy numbers that define the signature. One
of the keys is private and the other is public.
The PKI standard mandates that vendors make and save keys in a safe and
secure fashion. The standard generally also states that the services of a
trustworthy Certificate Authority be used to ensure such security.
The standard works in this way: At the time that a signatory signs a document
electronically, the vendor facilitates the creation of a signature based on the
signer’s private key. Each signer has safe and secure access to his or her own
key. The algorithm works as an encrypted code to produce data that match the
“hash” — the signed document in question — and then to encrypt the same data.
The long-term security of the data, the document, and the signature are
supported by the fact that any alterations to the original document will invalidate
it. In addition, each signature includes a date stamp to verify the time of signing.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Many European, Asian, and South American nations have different requirements
than North America, Australia, and the United Kingdom in regards to the use of
electronic and digital signatures. The latter group of countries adheres to a
technology-neutral set of regulations in an open environment, whereas the
former promotes a tiered model of e-signature implementation tied to regional
standards.
0 0
code is justified when it consists of a set of rules which, if adopted and
followed, would produce the most overall good. Such a code is said to be
optimal. Code sets may be very general, or highly specific (like engineering
codes of ethics).
John Rawls tries to formulate general principles that can be ranked in order of
importance without having to rely on intuitive judgments.
Valid principles of duty are those that would be voluntarily agreed upon by all
rational persons in a “contracting” situation.
A rational person
1. Lacks all specific knowledge of himself.
2. Has general knowledge of human societies and science.
3. Has a rational concern for his long-term interests.
4. Seeks to negotiate a principles all will voluntarily follow.
All rational people will (according to Rawls) agree to abide by two basic
principles, namely,
1. Each person is entitled to the most extensive amount of freedom compatible
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
UNIT - 2
Model law of e-commerce
Introduction
The United Nations Commission on International Trade Law (UNCITRAL)
Model Law on Electronic Commerce was promulgated in 1996 (and amended
in 1998) to assist countries in the framing of legislation which would enable and
facilitate electronic commerce and electronic government. Surprisingly, it
makes no reference to the Internet.
establishes rules and norms that validate and recognize contracts formed
through electronic means,
sets rules for forming contracts and governing electronic contract
performance,
defines the characteristics of valid electronic writing and of an original
document,
provides for the acceptability of electronic signatures for legal and
commercial purposes, and
supports the admission of computer evidence in courts
and arbitration proceedings.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
with transmission and receipt of messages and contracts for the carriage
of goods. It does not address jurisdictional or conflict of laws issues.
Purpose
Why is it relevant?
The MLEC was the first legislative text to adopt the fundamental principles of
non-discrimination, technological neutrality and functional equivalence that are
widely regarded as the founding elements of modern electronic commerce law.
The principle of non-discrimination
0 0ensures that a document would not be
denied legal effect, validity or enforceability solely on the grounds that it is in
electronic form. The principle of technological neutrality mandates the adoption
of provisions that are neutral with respect to technology used. In light of the
rapid technological advances, neutral rules aim at accommodating any future
development without further legislative work. The functional equivalence
principle lays out criteria under which electronic communications may be
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Online contracting
Electronic contracts (contracts that are not paper based but rather in electronic
practise) are born out of the need for speed, suitability and efficiency. Imagine a
contract that an Indian exporter and an American importer wish to enter into.
One option would be that one party first pulls up two copies of the contract,
signs them and couriers them to the other, who in turn signs both copies and
couriers one copy back. The other option is that the two parties meet someplace
and sign the contract.
In the electronic age, the whole contract can be completed in seconds, with both
parties simply attaching their digital signatures to an electronic copy of the
contract. There is no need for delayed couriers and additional travelling costs in
such a situation.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
In many contacts (whether online or conventional) the offer is not made directly
one-on-one. The consumer ‘browses’ the available goods and services showed
on the seller’s website and then chooses what he would like to purchase. The
0 0 the items for sale at a particular price.
offer is not made by website showing
This is essentially an invitation to offer and hence is revocable at any time up to
the time of acceptance. The offer is made by the customer on introduction the
products in the virtual ‘basket’ or ‘shopping cart’ for payment.
As stated earlier, the acceptance is usually assumed by the business after the
offer has been made by the consumer in relation with the invitation to offer. An
offer is revocable at any time until the acceptance is made.
II. Web Site Forms: The seller can offer goods or services (e.g. air tickets,
software etc.) through his website. The customer places an order by completing
and communicating the order form provided on the website. The goods may be
actually delivered later (e.g. in case of clothes, music CDs etc.) or be directly
delivered electronically (e.g. e-tickets, software, mp3 etc.).
III. Online Agreements: Users may need to take an online agreement in order
to be able to avail of the services e.g. clicking on “I accept” while connecting
software or clicking on “I agree” while signing up for an email account.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Any contract to be enforceable by law must have legal consideration, i.e., when
both parties give and receive something in return. Therefore, if an auction site
eases a contract between two parties where one Ecommerce – Legal Issues such
as a person provides a pornographic movie as consideration for purchasing an
mp3 player, then such a contract is void.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
A valid contract presumes a lawful object. Thus a contract for selling narcotic
drugs or pornography online is void.
Employment Contracts
0 0
Consultant Agreements
Contractor Agreements
Non-Disclosure Agreements
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
importance in an industry which is purely knowledge based and one which can
be easily repeated ruining the business.
Digital signature
Purpose
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Owing to the fast reproduce on new storage media like Hard-disk, CD-ROMS,
Pen- Drives, etc. it proves as a fast means of its distribution.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
who are likely, having regard to all relevant circumstances, to read, see or
hear the matter contained or embodied in it, shall be punished on first
conviction with imprisonment of either description for a term which may
extend to five years and with fine which may extend to one lakh rupees
and in the event of a second or subsequent conviction with imprisonment
of either description for a term which may extend to ten years and also
with fine which may extend to two lakh rupees.
[(2)] Whoever—
(a) sells, lets to hire, distributes, publicly exhibits or in any manner puts
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
(b) imports, exports or conveys any obscene object for any of the
purposes aforesaid, or knowing or having reason to believe that such
object will be sold, let to hire, distributed or publicly exhibited or in any
manner put into circulation, or
(c) takes part in or receives profits from any business in the course of
which he knows or has reason to believe that any such obscene objects
are for any of the purposes aforesaid, made, produced, purchased, kept,
imported, exported, conveyed, publicly exhibited or in any manner put
into circulation, or
(d) advertises or makes known by any means whatsoever that any person
is engaged or is ready to engage in any act which is an offence under this
section, or that any such obscene object can be procured from or through
any person, or
(e) offers or attempts to do any act which is an offence under this section,
shall be punished [on first conviction with imprisonment of either
description for a term which may extend to two years, and with fine
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
which may extend to two thousand rupees, and, in the event of a second
or subsequent conviction, with imprisonment of either description for a
term which may extend to five years, and also with fine which may
extend to five thousand rupees].
Cyber Jurisdiction
The internet can be seen as a multi jurisdictional because of the ease
which a user can access of website anywhere in the world. It can be even
viewed as a jurisdictional in the sense that from the user‘s perspective
that the state and national borders are essentially transparent. For courts
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Cyber jurisdictional cases have been dealt with primarily in civil courts.
Since the advent of US v. Thomas, infra and Minnesota v. Granite gate
resort,
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
The AABBS content approximately 14000 gif files. These files should be
easily accessed or retrieved or download by one who possessed a
password. 1994, a US magistrate judge issued a search warrant which led
to authorizing the confiscation of the defendant computers. The defendant
was convicted in the district courts against which they appealed. The
court held that the statute must be construed to affect the intent of the
Congress which was to prevent any obscene matter. ―D argued that the
internet environment provides broad ranging connections among people
in cyberspace. As such that notion obscenity tied to geographical local
would put a chill on protected speech.
The court ruled out that the D had pre existing method of screening
potential members by pre-screening their members; they could protect
themselves from being subjected to liability in jurisdiction with less
tolerant standards. This could be further said that D was to tailor their
message on as selective to the communities it should to serve so there no
need to develop any definition.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
The Convention itself does not demand ‘dual criminality’ per se. However, the
adoption of the Convention demands harmonization of national legislations and
results in reciprocal criminalization. This is crucial as the Convention has
mutual assistance and extradition provisions, both easier to process when dual
criminality is established between the requesting and assisting parties.
The Cybercrime Convention Committee (T-CY) was setup to represent the
interests of and foresee regular consultations between state parties to the
Convention. The biannual plenaries conducted by the T-CY and working groups
discuss developments, shortcomings, grievances and possible amendments of
the Budapest Convention.
Significant Drawbacks of the Convention
The Convention on Cybercrime has also come under severe criticism for both
its specific provisions that fail to protect rights of individuals and states, and its
general inadequacy in sufficing to ensure a cyberspace free of criminal activity.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
The 12th Plenary of the T-CY (at page 123) concluded that the mutual legal
assistance facilitated by the Convention was too complex and lengthy, rendering
it inefficient in practice. The outdated nature of provisions of the Convention
clearly fail to cater to the needs of modern investigation.
The provisions of the Convention have been critiqued for supposedly infringing
on state sovereignty. In particular, Article 32 has been contentious as it allows
local police to access servers located in another country’s jurisdiction, even
without seeking sanction from authorities of the country. In order to enable
quick securing of electronic evidence, it allows trans-border access to stored
computer data either with permission from the system owner (or service
provider) or where publically available. As Russia finds this provision to be an
intolerable infringement of its sovereignty (amongst other things),[3] it has
categorically refused to sign the Convention in its current state. However, it is
important to note that the claim that provisions infringe on sovereignty has been
addressed and countered by the T-CY in its guidance note on Article 32.
Mobile phone crime
Why is mobile a tool of crime ?
The creativity and Innovation of the great master Sir Martin Cooper ha s
made a drastic change in the current generation of the world’s most
interactive beings. Mobile phones in today’s world have completely
replaced a personal computer or a laptop and is made smart for people to
do things faster and smarter. Mobile Phones ha ve changed the history of
the technological world by bringing in a combination of techniques, to
fulfill the basic necessity of today’s generation.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
The Mobile phone has become a key role playing component in the life of a
common man. Starting from 16 to 60’s without any age limit, the present
generation has carved a everlasting path in the skilled growth of the mobile
industry creating a boom in the electronic sector. The usage of mobile
devices paved a path for the successful growth in the electronic indus try.
Vishing :
Vishing is the act of using the telephone in an attempt to scam the user into
surrendering private information that will be used for identity theft. The
scammer usually pretends to be a legitimate business, and fools the victim
into thinking he or she will profit.
Smishing :
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Lottery Scams :
Blue Jacking :
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Blue Snarfing :
Bluesnarfing is the theft of data from a Bluetooth phone. The attacker, just
by running the right software on their laptop, can discover the nearby
phone, connect to it without confirmation and download confidential data.
Even by turning off the Bluetooth a potential victim cannot be safe from
being Bluesnarfed. As a device in hidden state may also be Bluesnarfable
by guessing the device’s MAC address via a brute force attack.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
UNIT 4
Narco-Analysis
The term Narco-Analysis is derived from the Greek word narkç (meaning
"anesthesia" or "torpor") and is used to describe a diagnostic and
psychotherapeutic technique that uses psychotropic drugs, particularly
barbiturates, to induce a stupor in which mental elements with strong associated
affects come to the surface, where they can be exploited by the therapist. The
term narco-analysis was coined by Horseley. Narco analysis first reached the
mainstream in 1922, when Robert House, a Texas obstetrician used the drug
scopolamine on two prisoners.
The search for effective aids to interrogation is probably as old as man’s need to
obtain information from an uncooperative source and as persistent as his
impatience to shortcut any tortuous path. In the annals of police investigation,
physical coercion has at times been substituted for painstaking and time
consuming inquiry in the belief that direct methods produce quick results.
Development of new tools of investigation has led to the emergence of scientific
tools of interrogation like the narco analysis test. Such tests are a result of
advances in science but they often raise doubts regarding basic human rights
and also about their reliability. Legal questions are raised about their validity
with some upholding its validity in the light of legal principles and others
rejecting it as a blatant violation of constitutional provisions.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
This test was developed and patented in 1995 by neurologist Dr. Lawrence A.
Farwell, Director and Chief Scientist “Brain Wave Science”, IOWA. In this
method, called the “Brain-wave finger printing”; the accused is first interviewed
and interrogated to find out whether he is concealing any information. Then
sensors are attached to the subject’s head and the person is seated before a
computer monitor. He is then shown certain images or made to hear certain
sounds. The sensors monitor electrical activity in the brain and register P300
waves, which are generated only if the subject has connection with the stimulus
i.e. picture or sound. The subject is not asked any questions. Dr. Farwell has
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
The main provision regarding crime investigation and trial in the Indian
Constitution is Art. 20(3). It deals with the privilege against self-incrimination.
It has its equivalents in the Magna Carta, the Talmud, and the law of almost
every civilized country. The privilege against `self incrimination is a
fundamental canon of Common law criminal jurisprudence.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
All the three ingredients must necessarily coexist before the protection of Art
20(3) can be claimed. If any of these ingredients is missing, Art. 20(3) cannot be
invoked.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Section 45 of the Indian Evidence Act, 1872 does allow experts’ opinions in
certain cases. It reads:
“When the court has to form an opinion upon a point of foreign law, or of
science, or art, or as to identity of handwriting or finger impression, the
opinions upon that point or persons especially skilled in such foreign law, or of
science, or art, or as to identity of handwriting or finger impressions are
relevant.”
However this section is silent on other aspects of forensic evidence that can be
admissible in court in criminal proceedings.
I. In a 2006 judgment Dinesh Dalmia v. State, the Madras High Court held that
subjecting an accused to narco analysis is not tantamount to testimony by
compulsion. The court said about the accused: "he may be taken to the
laboratory for such tests against his will, but the revelation during such tests is
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
quite voluntary." There are two fallacies in this reasoning. First, if narco
analysis is all that it is made out to be by the Bangalore FSL, the accused will
involuntarily answer questions posed to him during the interview. The second
fallacy is that it is incorrect to say that the accused is merely taken to the lab
against his will. He is then injected with substances. The breaking of one's
silence, at the time it is broken, is always technically `voluntary.' Similarly, it
can be argued that after being subject to electric shocks, a subject `quite
voluntarily' divulges information. But the act or threat of violence is where the
element of coercion is housed. In narco analysis, the drug contained in the
syringe is the element of compulsion. The rest is technically voluntary.
Lawyers are divided on whether the results of Narco Analysis and P300 tests are
admissible as evidence in courts. "Confessions made by a semi-conscious
person is not admissible in court. A Narco Analysis Test report has some
validity but is not totally admissible in court, which considers the circumstances
under which it was obtained and assess its admissibility," advocate P. R Vakil
told rediff.com. "Under certain circumstance, a person may hold a certain belief.
By repeatedly thinking about an issue in a particular way, he begins to believe
that what he is thinking is right. But it need not necessarily be the truth," Vakil
explained.” Results of such tests can be used to get admissible evidence, can be
collaborated with other evidence or to support other evidence.
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
Conclusion-
Law is a living process, which changes according to the changes in society,
science, and ethics and so on. The Legal System should imbibe developments
and advances that take place in science as long as they do not violate
fundamental legal principles and are for the good of the society. The criminal
justice system should be based on just and equitable principles. The issue of
using narco analysis test as a tool of interrogation in India has been widely
debated. The extent to which it is accepted in our legal system and our society is
something, which will be clearer in the near future. In a situation where narco
analysis is gaining judicial acceptances and supports despite being an
“unreliable & doubtful” science, we have to seriously rethink about its legal and
constitutional validity from human rights perspective.
DNA Profiling
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
and floral populations and has revolutionized the fields of zoology, botany, and
agriculture
The Indian Evidence (Amendment) Bill, 2003 has been proposed on the
recommendation of the 185th Law Commission Report. The bill provides for
DNA tests in paternity disputes. DNA Fingerprinting is one of the latest forms
of forensic evidence, which uses substance from which chromosomes are made
to recognize individuals positively. DNA, is the most trustworthy technique for
establishing the identity of a creature with a virtually 100 percent certainty.
DNA fingerprinting is based on the principle that the genetic makeup of every
individual is different from the others and is unique and idiosyncratic to an
individual. DNA fingerprinting is the only definite, positive and permanent
identification method of a person as one’s DNA never changes during one’s
lifetime. But number of times even this robust piece of evidence failed in the
court of law because of the following reasons:
(1) Because as according to the Indian law no one can be forced to give blood
sample for testing
(2) It has not yet been included in the Evidence Act. It is therefore, left to the
discretion of the judges whether the DNA tests under Section 45 of the Indian
Evidence Act is to be accepted or not
(3) It has not been given the status of the “conclusive proof”
0 0
Chanderprabhu Jain College of Higher Studies
&
School of Law
An ISO 9001:2008 Certified Quality Institute
(Recognized by Govt. of NCT of Delhi, Affiliated to GGS Indraprastha University, Delhi)
(4) Many times it has been contended that such a testing would be considered as
violation of Article 20(3) of the constitution, which protects every citizen from
providing self-incriminating evidence
(5) Section 112 of the Evidence Act has not been appropriately amended in light
of the scientific developments
(7) Because of the absence of guidelines for analyzing DNA fingerprints for
courts to accept this as evidence.
The development of DNA technology furthers the search for truth by helping
police and prosecutors in the fight against violent crime. Through the use of
DNA evidence, prosecutors are often able to conclusively establish the guilt of a
defendant.
In Frye v. United States (1923), it was held that scientific evidence would be
admissible only after the thing from which the deduction is made had been
sufficiently established to have gained general acceptance in the particular field
in which it belongs. This decision was the birth of what ultimately became
known alternatively as the Frye test or the general acceptance test. The Frye test
would, by the end of the 1990’s, become the majority test for the admissibility
of novel scientific evidence.
0 0