Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

BUSINESS ORGANISATION AND

MANAGEMENT

Assignment - 2
Topic : business laws IT ACT 2000

SUBMITTED BY : SUBMITTED TO:

NAME –MUSKAN MR. GHAZI SHANGDERPA


CLASS - BCOM (P) D
ROLL NO.- 3I
CONTENTS

1) write a note on -
• A) E-governance
• B) cyber security
• C) public key infrastructure
Q2) what is digital signature?
Q3) difference between cyber contraventions and cyber offence
Q4) How does the Information technology act brought revolutionary changes in particular to IT
sectors and India' economy in general. And elaborate role of internet
ELECTRONIC GOVERNANCE

Electronic governance or e-governance is the application of IT for delivering


government services, exchange of information, communication transactions,
integration of various stand-alone systems between government to citizen
(G2C), government-to-business (G2B), government-to-government (G2G),
government-to-employees (G2E) as well as back-office processes and
interactions within the entire government framework.[1] Through e-governance,
government services are made available to citizens in a convenient, efficient,
and transparent manner. The three main target groups that can be distinguished
in governance concepts are government, citizens, and businesses/interest groups.
In e-governance, there are no distinct boundaries.[2] finance and support.
CYBER SECURITY

Cyber security denotes the technologies and procedures intended to safeguard


computers, networks, and data from unlawful admittance, weaknesses, and
attacks transported through the Internet by cyber delinquents. ISO 27001
(ISO27001) is the international Cyber security Standard that delivers a model
for creating, applying, functioning, monitoring, reviewing, preserving, and
improving an Information Security Management System. The Ministry of
Communication and Information Technology under the government of India
provides a strategy outline called the National Cyber security Policy. The
purpose of this government body is to protect the public and private
infrastructure from cyber-attacks.
A PUBLIC KEY INFRASTRUCTURE

A public key infrastructure (PKI) is a set of roles, policies, hardware,


software and procedures needed to create, manage, distribute, use, store and
revoke digital certificates and manage public-key encryption. The purpose of
a PKI is to facilitate the secure electronic transfer of information for a range
of network activities such as e-commerce, internet banking and confidential
email. It is required for activities where simple passwords are an inadequate
authentication method and more rigorous proof is required to confirm the
identity of the parties involved in the communication and to validate the
information being transferred
DIGITAL SIGNATURE

A digital signature is a mathematical technique used to validate the


authenticity and integrity of a message, software or digital document. It's the
digital equivalent of a handwritten signature or stamped seal, but it offers far
more inherent security. A digital signature is intended to solve the problem of
tampering and impersonation in digital communications. Digital signatures
can provide evidence of origin, identity and status of electronic documents,
transactions or digital messages. Signers can also use them to acknowledge
informed consent.
PROCESS OF DIGITAL SIGNATURE

Using a mathematical algorithm, digital signing solution providers such as


Zoho Sign will generate two keys: a public key and a private key. When a
signer digitally signs a document, a cryptographic hash is generated for the
document. That cryptographic hash is then encrypted using the sender's private
key, which is stored in a secure HSM box. It is then appended to the document
and sent to the recipients along with the sender's public key. The recipient can
decrypt the encrypted hash with the sender's public key certificate .A
cryptographic hash is again generated on the recipient's end. Both
cryptographic hashes are compared to check its authenticity. If they match, the
document hasn't been tampered with and is considered valid.
CYBER CONTRAVENTIONS VS CYBER OFFENCES
EFFECTS OF CYBER CRIME

1.Increased Costs Companies that want to protect themselves from online thieves have to pull out their
wallets to do so. Firms may incur any number of outlays, including:
• Cyber security technology and expertise
• Notifying affected parties of a breach
• Insurance premiums

2. Operational Disruption In addition to actual financial damages, companies often face indirect costs
from
cyberattacks, such as the possibility of a major interruption to operations that can result in lost revenue.

3. Altered Business Practices Cybercrime can impact businesses in more than just financial ways.
Companies
have to rethink how they collect and store information to ensure that sensitive information isn't
vulnerable.
IT ACT BROUGHT REVOLUTIONARY CHANGES

 IT Act, 2000 Act now allows Government to issue notification on the web thus heralding e-governance.
▪ The Act enables the companies to file any form, application or any other document with any office,
authority, body or agency owned or controlled by the appropriate Government in electronic form by means
of such electronic form as maybe prescribed by the appropriate
Government.
▪ The IT Act also addresses the important issues of security, which are so critical to the success of electronic
transactions. The Act has given a legal definition to the concept of secure digital signatures that would
require to have passed through a system of a security procedure, as stipulated by the Government at a later
date.
▪ Under the IT Act, 2000, it shall now be possible for corporate to have a statutory remedy in case if anyone
breaks into their computer systems or network and causes damages or copies data. The remedy provided by
the Act is in the form of monetary damages, not exceeding Rs. 1 crore.
▪ Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by
the Act.
▪ Digital signatures have given legal validity and sanction in the Act.
ECONOMY IN TERMS OF GDP

Indian information technology industry has grown manifold during the period 1991-92 to 2015- 16
as shown in table 1. The industry has contributed significantly to the economy in terms of GDP,
foreign exchange earnings and employments. Majority of the Fortune 500 and Global 2000
corporations are sourcing IT-ITES from India. There are around 600 centers setup by Indian IT
companies in 78 countries catering to the IT related requirements of people in over 200 cities. They
are performing very well and showing remarkable double digit growth in terms of national GDP
(NASSCOM analysis reports). In the financial year 2015-16, our revenues have grown from 1.2 per
cent to nearly 9.3 percent. The IT sourcing market of India has grown from 52% in 2012 to about
56% in 2016. By 2020, this sector is expected to reach USD 225 billion target. India is becoming
one of the most preferred destinations for business process outsourcing (BPO) as far as IT enabled
services are concerned. These services are boosting Indian economy and this is evident in their
contributions to national gross domestic product (GDP).
ROLE OF INTERNET

1. Uses of the Internet in Education


The Internet is a great platform for students to learn throughout their lifetime. They can use the internet to learn new things
and even acquire degrees through online education programs. Teachers can also use the internet to teach students around the
world.

2. Internet Use to Speed Up Daily Tasks


The Internet is very much useful in our daily routine tasks. For example, it helps us to see our notifications and emails. Apart
from this, people can use the internet for money transfers, shopping order online food, etc.

3. Use of the Internet for Shopping


With the help of the internet, anybody can order products online. The increase in online shopping has also resulted in
companies offering a huge discount for their customers.

4. Internet for Research & Development


The Internet plays a pivotal role in research and development as it is propelled through internet research. The benefit of the
internet is enjoyed by small businessmen to big universities.
5.Business Promotion and Innovation
The Internet is also used to sell products by using various e-Commerce solutions. The result is new services and
businesses starting every day thereby creating job opportunities and reducing unemployment.

6.Communication
Without a doubt, the internet is the most powerful medium of communication at present. It connects people across
different parts of the world free and fast.

7. Digital Transactions
The internet facilitates internet banking, mobile banking, and e-wallets. Since all digital transactions are stored in a
database, it helps the government to track income tax details or income reports in the ITR.

8. Money Management
The internet can also be used to manage money. Now, there are many websites, applications, and other tools that help
us in daily transactions, transfers, management, budget, etc.

9. Tour & Travel


During tour and travel, the use of the internet is highly effective as it serves as a guide. People browse the internet
before they start visiting the places. Tour bookings can also be done using the internet

You might also like