Unit 4.pptx-1
Unit 4.pptx-1
World
❑ Cybercrime is a complex, global challenge that requires a coordinated
response from governments, businesses, and individuals. While significant
progress has been made in establishing legal frameworks to combat
cybercrime, continuous efforts are needed to adapt to the rapidly
changing threat landscape and ensure that laws are harmonized and
effectively enforced across borders.
❑ The legal landscape surrounding cybercrime varies significantly across
different regions, with many countries enacting specific legislation to
combat this growing threat.
The U.S. has several laws addressing cybercrime, including the Computer
Fraud and Abuse Act (CFAA), the Electronic Communications Privacy Act
(ECPA), and the Digital Millennium Copyright Act (DMCA). Focus areas of
the U.S. legal framework covers hacking, unauthorized access, fraud, identity
theft, and intellectual property crimes, with severe penalties for offenders.
The European Union’s General Data Protection Regulation (GDPR) is one of
the most comprehensive data protection laws, addressing issues of data
security and breaches. Focus areas of the EU emphasizes data protection,
privacy, and the protection of critical infrastructure, with significant fines for
non-compliance under GDPR.
Cybercrime and the Legal Landscape around the World
A broad view on cybercrime Law Scenario in the Asia-Pacific Region
❑ The Asia-Pacific region presents a diverse landscape in terms of
cybercrime laws and regulations. While many countries have developed
robust legal frameworks, challenges remain in terms of enforcement,
international cooperation, and balancing cybersecurity with human
rights.
❑ As the region continues to experience rapid digital growth, ongoing
efforts to enhance legal frameworks and international collaboration will
be crucial in effectively combating cybercrime.
Japan has a robust legal framework to combat cybercrime, primarily
governed by the Act on the Prohibition of Unauthorized Computer Access and
the Act on the Protection of Personal Information (APPI). The Penal Code
also includes provisions for cyber offenses. Japan’s laws cover unauthorized
access, data breaches, and the protection of personal information. The country
has also been active in promoting international cooperation to combat
cybercrime.
Australia’s primary legal framework for cybercrime includes the Criminal
Code Act 1995, which criminalizes a wide range of cyber offenses, including
hacking, identity theft, and the distribution of malicious software. The Privacy
Act 1988 also plays a key role in data protection. Australia’s approach focuses
on protecting critical infrastructure, ensuring data privacy, and addressing
cyber threats to national security.
Cybercrime and the Legal Landscape around the World
Regional and International Cooperation
❑ ASEAN: The Association of Southeast Asian Nations (ASEAN) has been
active in promoting regional cooperation on cybersecurity. The ASEAN
Cybersecurity Cooperation Strategy aims to enhance the collective
cybersecurity posture of member states.
❑ APEC: The Asia-Pacific Economic Cooperation (APEC) has initiatives
focused on cybersecurity and data privacy, promoting cross-border
cooperation among its members.
❑ Budapest Convention: Several Asia-Pacific countries, including Japan
and Australia, are signatories to the Budapest Convention on Cybercrime,
which facilitates international cooperation in combating cybercrime.
Cybercrime and the Legal Landscape around the World
❑ Canada's approach to regulating spam and other electronic threats is
primarily governed by Canada's Anti-Spam Legislation (CASL), which is
one of the strictest anti-spam laws in the world.
❑ CASL was enacted to protect Canadians from spam, malware, phishing,
and other electronic threats, while ensuring that businesses can continue
to compete in the global marketplace.
Key Provisions of CASL
1. Commercial Electronic Messages (CEMs)
Definition: A CEM is any electronic message (e.g., email, SMS, social media
messages) that encourages participation in a commercial activity, regardless of
whether there is an expectation of profit.
Consent Requirement: CASL requires that businesses obtain express or
implied consent before sending CEMs. Express consent involves a clear and
affirmative action by the recipient, such as checking a box on a website.
Implied consent may arise from an existing business relationship or if the
recipient has conspicuously published their contact information without
indicating they do not wish to receive CEMs.
Identification: All CEMs must clearly identify the sender and provide accurate
contact information.
2. Installation of Computer Programs
Definition:
Cybercrime and the Legal Landscape around the World
Consent Requirement: CASL prohibits the installation of computer programs
on another person’s computer system without their express consent. This
includes software updates, toolbars, and other add-ons.
Disclosure: Businesses must clearly disclose the purpose of the software and
any key features, particularly if the software will collect personal information,
interfere with the user’s control over their device, or change device settings.
3. False or Misleading Representations
CASL also addresses the issue of false or misleading representations in
electronic communications. This includes deceptive subject lines, sender
information, and content within the message. Violating these provisions can
result in severe penalties under CASL
3. Harvesting and Unauthorized Use of Electronic Addresses
CASL prohibits the unauthorized collection of electronic addresses (email
harvesting) and the use of those addresses without consent. It also outlaws the
use of address-harvesting software.
❑ CASL imposes significant penalties for non-compliance, which can
include:
Monetary Penalties: Organizations can face penalties of up to $10 million
CAD per violation, while individuals can be fined up to $1 million CAD per
violation.
Cybercrime and the Legal Landscape around the World
Cybercrime and Federal Laws in the U.S.
❑ Computer Fraud and Abuse Act (CFAA) - 1986
The CFAA criminalizes unauthorized access to computers and networks,
particularly when such access leads to data theft, fraud, or damage.
Violations of the CFAA can result in significant penalties, including fines and
imprisonment, depending on the severity of the offense.
❑ Electronic Communications Privacy Act (ECPA) - 1986
ECPA prohibits the intentional interception of wire, oral, or electronic
communications unless authorized by law.
❑ Identity Theft and Assumption Deterrence Act (ITADA) - 1998
The ITADA specifically addresses identity theft, making it a federal crime to
knowingly use someone else’s personal information with the intent to commit
fraud or other illegal activities.
❑ Cybersecurity Information Sharing Act (CISA) - 2015
CISA was enacted to improve cybersecurity by promoting the sharing of
information about cyber threats between the government and the private
sector
Cybercrime and the Legal Landscape around the World
The EU Legal Framework for Information Privacy to Prevent Cybercrime
❑ The European Union (EU) has developed a robust legal framework for
information privacy and cybersecurity, heavily influenced by the Council
of Europe's (CoE) Convention on Cybercrime (also known as the Budapest
Convention).
❑ Under the convention, member states are obliged to criminalize:
1. Illegal access to computer system
2. Illegal interception of data to a computer system
3. Interfering with computer system without rights and intentional interference
with computer data without rights.
4. The use of inauthentic data with intent to put it across as authentic (data
forgery)
5. Infringement of copyright-related rights online
6. Interference with data or functioning of computer system
Why Do We Need Cyber Laws: The Indian Context
❑ In today's digital age, cyber laws have become a critical component of legal
systems worldwide, including in India. As technology permeates every
aspect of life—from commerce to communication, from governance to
personal interactions—cyber laws are essential to address the challenges
posed by the digital landscape.
❑ These laws help regulate the behavior of individuals and organizations
online, protect data and privacy, and ensure the security of information
systems.
❑ Reasons for the Enactment of Cyber Laws in India are summarized below:
Rapid Growth of Internet Usage: With the exponential increase in internet
penetration in India, more people are engaging in online activities such as
shopping, banking, and social networking. This surge has created new
opportunities for businesses but also posed significant risks related to data
breaches, fraud, and identity theft. Cyber laws are needed to regulate these
activities and protect users from online threats.
Protection Against Cybercrimes: The rise in cybercrimes, such as hacking,
phishing, online fraud, and cyberstalking, necessitates a legal framework to
deter, detect, and prosecute such offenses. Cyber laws in India provide the
legal basis for law enforcement agencies to take action against cybercriminals
and protect citizens from these threats.
Why Do We Need Cyber Laws: The Indian Context
Securing E-Commerce and Online Transactions: As e-commerce and online
banking become increasingly popular in India, ensuring the security of online
transactions has become crucial. Cyber laws help establish trust by setting out
rules for secure electronic transactions, protecting consumers and businesses
from fraud and data theft.
Data Protection and Privacy: With the growing amount of personal and
sensitive information being shared online, the need for robust data protection
laws has become paramount. Cyber laws in India aim to protect individuals'
privacy by regulating the collection, storage, and use of personal data by
organizations.
Legal Recognition of Digital Evidence: In the digital age, much of the evidence
related to crimes is electronic, such as emails, digital records, and social media
activity. Cyber laws provide the legal framework for recognizing and
admitting digital evidence in courts, ensuring that justice can be served in
cases involving cybercrimes.
Protection of Intellectual Property: In the digital age, the protection of
intellectual property (IP) has become more complex. Cyber laws address issues
related to the unauthorized use and distribution of digital content, such as
software, music, films, and books, ensuring that the rights of creators and
owners are protected.
The Indian IT Act
Indian Information Technology (IT) Act, 2000
❑ The Information Technology Act, 2000 (commonly referred to as the IT
Act) is the primary legislation in India governing cyber activities.
❑ It was enacted to provide a legal framework for electronic governance by
recognizing electronic records and digital signatures.
❑ The IT Act also addresses a wide range of cybercrimes and provides
mechanisms for handling them.
❑ Following sections of Chapter XI of the Indian IT Act focus on penalizing
various offenses related to the misuse of computers and digital
technologies, aiming to safeguard data integrity, privacy, and security in
the digital realm.
Section 65: Tampering with Computer Source Documents - This section
penalizes any act of intentionally or knowingly concealing, destroying, or
altering computer source code required to be maintained by law. The offense is
punishable by imprisonment of up to three years, or with a fine, or both.
Section 66: Computer-Related Offenses - Section 66 deals with various
computer-related offenses, including hacking, unauthorized access, and data
theft. The section prescribes penalties for anyone who, dishonestly or
fraudulently, causes harm through these activities. The punishment can
include imprisonment for up to three years and a fine.
The Indian IT Act
Section 67: Publishing Obscene Material in Electronic Form - This section
criminalizes the publication or transmission of obscene material in electronic
form. The first conviction can lead to imprisonment for up to three years and
a fine, with more severe penalties for subsequent convictions.
Section 71: Misrepresentation - Section 71 addresses the issue of
misrepresentation while applying for any license or digital signature
certificate. If found guilty, the individual could face imprisonment of up to two
years, a fine, or both.
Section 72: Breach of Confidentiality and Privacy - This section punishes any
person who, in the course of their duties, accesses electronic records or
information and then discloses it without the owner's consent. The punishment
includes imprisonment for up to two years, a fine, or both.
Section 73: Publishing Digital Signature Certificate False in Certain
Particulars - Section 73 imposes penalties on individuals who knowingly
publish a digital signature certificate that contains false information or
suppresses material facts. This offense is punishable by imprisonment of up to
two years, a fine, or both.
Section 74: Publication for Fraudulent Purpose - This section penalizes the act
of publishing a digital signature certificate for fraudulent purposes. The
punishment includes imprisonment for up to two years, a fine, or both.
The Indian IT Act
Summary of New Sections Added under 66A, 66B, 66C, 66D, 66E, and 66F in
the Indian IT Act (Amended in 2008)
❑ The IT (Amendment) Act, 2008 introduced several new sections under
Section 66, broadening the scope of punishable offenses related to
cybercrime. Here's a summary of these sections:
Section 66A: Punishment for Sending Offensive Messages through
Communication Service, etc. – Punishment for this offense is imprisonment
for up to three years, with or without a fine. However, this section was later
struck down by the Supreme Court of India in 2015 in the Shreya Singhal vs.
Union of India case, on the grounds that it violated freedom of speech and
expression under Article 19(1)(a) of the Indian Constitution.
Section 66B: Punishment for Dishonestly Receiving Stolen Computer
Resource or Communication Device - Punishment for this offense is
imprisonment for up to three years, along with a fine of up to ₹1 lakh.
Section 66C: Punishment for Identity Theft - Section 66C addresses identity
theft, which involves fraudulently or dishonestly using another person’s
electronic signature, password, or any other unique identification feature.
Punishment for this offense is imprisonment for up to three years, along with a
fine of up to ₹1 lakh.
The Indian IT Act
Section 66D: Punishment for Cheating by Personation by Using Computer
Resource - This section penalizes cheating by personation through the use of
any computer resource, such as creating fake profiles, impersonating others
online, or conducting fraudulent activities by pretending to be someone else.
Punishment for this offense is imprisonment for up to three years, along with a
fine of up to ₹1 lakh.
Section 66E: Punishment for Violation of Privacy – This section makes it an
offense to intentionally capture, publish, or transmit the image of a private
area of any person without their consent, in circumstances violating their
privacy. Punishment for this offense is imprisonment for up to three years,
along with a fine of up to ₹2 lakh.
Section 66F: Punishment for Cyber Terrorism - This section defines and
criminalizes cyber terrorism. It covers acts committed with the intent to
threaten the unity, integrity, security, or sovereignty of India or to strike terror
among people by disrupting computer systems, data, or networks. Punishment
for this offense is imprisonment, which may extend to life imprisonment.
Summary of Significant Changes in the Indian IT Act by the IT Amendment
Bill 2008
❑ Apart from the Section 66 as discussed above the Information Technology
(Amendment) Act, 2008 has also brought some other significant changes to
the original IT Act of 2000, addressing emerging challenges in the rapidly
evolving digital landscape. Here are the key changes:
The Indian IT Act
❑ Enhanced Focus on Data Protection and Privacy:
Data Breach and Privacy Protection (Section 43A): Companies handling
sensitive personal data were mandated to implement reasonable security
practices. They can be held liable to pay compensation in case of negligence
leading to data breaches.
Breach of Confidentiality (Section 72A): The amendment introduced penalties
for the unauthorized disclosure of personal information by service providers.
❑ Expanded Definitions and Scope:
Widening of “Communication Device” Definition: The definition of
"communication device" was broadened to include mobile phones and
personal digital assistants, reflecting the increased use of these devices for
online activities.
Inclusion of “Intermediaries” (Section 2(w)): The role and responsibilities of
intermediaries, such as internet service providers, social media platforms, and
online marketplaces, were clarified. This included their obligation to remove
unlawful content when notified.
❑ Legal Recognition of Electronic Signatures:
Electronic Signature (Section 3A): The concept of electronic signatures was
introduced, providing legal recognition to electronic authentication methods
beyond the previously recognized digital signatures.
The Indian IT Act
❑ Increased Penalties and Imprisonment:
The amendment increased the penalties and imprisonment terms for various
offenses, ensuring a stronger deterrent effect against cybercrimes.
❑ Clarification of Cyber Crime Jurisdiction:
Jurisdictional Issues (Section 75): The amendment clarified the applicability of
the IT Act to offenses committed outside India, ensuring that cybercrimes
affecting Indian citizens or resources could be prosecuted regardless of the
perpetrator's location.
❑ Inclusion of New Technologies:
The amendment recognized the rapid evolution of technology, such as the
increased use of wireless devices and internet-enabled services, and adjusted
the legal framework to address crimes related to these technologies.
The Indian IT Act
Positive Aspects of the IT Act, 2000
❑ The Information Technology Act, 2000 (ITA 2000) was a landmark
legislation in India, introduced to address the growing importance of
electronic commerce and the need for a legal framework to support it.
❑ Here are some of the positive aspects of the ITA 2000:
Prior to the enactment of the ITA 2000 even an E-Mail was not accepted under
the prevailing statutes of India as an accepted legal form of communication
and as evidence in a court of law. But the ITA 2000 changed this scenario by
legal recognition of the electronic format.
ITA 2000 provided legal recognition to electronic records and digital
signatures, which facilitated e-commerce, e-governance, and paperless
transactions. This was a crucial step in transitioning from paper-based to
digital systems, promoting efficiency and reducing costs.
By giving legal validity to electronic contracts and digital signatures, the IT
Act boosted the confidence of businesses and consumers in conducting online
transactions. This, in turn, fostered the growth of e-commerce in India,
contributing to economic development.
ITA 2000 introduced a legal framework to define and penalize various
cybercrimes, such as hacking, identity theft, and the dissemination of obscene
content online. This provided law enforcement with tools to combat and deter
cybercrimes, which were becoming increasingly prevalent.
The Indian IT Act
The Act laid the foundation for electronic governance by recognizing
electronic documents and enabling their use in government services. This
allowed for the digitalization of public services, improving accessibility and
convenience for citizens.
The IT Act created a conducive environment for digital innovation by
providing legal clarity and security for businesses and entrepreneurs operating
in the technology space. This helped foster the growth of India’s IT industry
and digital economy.
ITA 2000 included provisions for the protection of sensitive personal data,
laying the groundwork for data privacy and security in India. Though limited
in scope initially, it set the stage for future enhancements and more
comprehensive data protection laws.
The IT Act aligned India’s cyber laws with global standards and practices,
facilitating cross-border digital trade and cooperation in combating
cybercrime. This alignment helped India integrate into the global digital
economy.
Weak Areas of the IT Act, 2000
❑ While the Information Technology Act, 2000 (ITA 2000) was a significant
step forward for India's digital landscape, it had several weaknesses and
limitations. Here are some of the key weak areas:
The Indian IT Act
The ITA 2000 is likely to cause a conflict of jurisdiction especially in cases
involving cross-border cybercrimes. The Act did not clearly define the
jurisdictional boundaries for prosecuting cybercrimes that involved multiple
countries, making it difficult to enforce the law in such cases.
E-Commerce is based on the system of domain names. The ITA 2000 does not
even touch on the issues relating to domain names. Domain names have not
been defined and the rights and liabilities of domain names owners do not find
any mention in the law. The law does not address the rights and liabilities of
domain name holders.
The ITA 2000 does not deal with issues concerning the protection of
Intellectual Protection Rights (IPR) in the context of the online environment.
Certain sections of the ITA 2000, such as those dealing with cyber offenses,
were vaguely worded, leading to broad interpretations. This created
uncertainty and potential misuse of the law.
The ITA 2000 did not adequately address newer forms of cybercrimes such as
cyberstalking, phishing, identity theft, and cyberbullying. The rapid evolution
of technology and online behavior led to the emergence of these crimes, which
were not comprehensively covered in the initial legislation.
The ITA 2000 had limited provisions for data protection and privacy. It did
not provide comprehensive guidelines for safeguarding personal data, leaving
gaps in the protection of user privacy.
The Indian IT Act
The ITA 2000 is not explicit about regulation of electronic payments and
avoids applicability of IT Act to Negotiable instruments. The Information
Technology Act stays silent over the regulation of electronic payments
gateway. This way have major effect on the growth of E-Commerce in India.
ITA 2000 does not touch upon antitrust issues.
The most serious concern about the Indian Cyberlaw relates to its
implementation. The ITA 2000 does not lay down parameters for its
implementation.
Challenges to Indian Law and Cybercrime Scenario in India
❑ India, with its rapidly growing digital ecosystem, faces several challenges
in the domain of cybercrime and its regulation. The legal framework, while
evolving, still struggles to keep pace with the complexities and
fast-changing landscape of cyber threats. Here are some of the primary
challenges:
Many cybercrimes go unreported because they fear it might invite a lot of
harassment, fear of reputational damage, or distrust in the law enforcement
process. Under-reporting leads to an underestimation of the scale of
cybercrime, which in turn affects the allocation of resources and the
development of policies to combat these crimes effectively.
The Indian IT Act
There is a general lack of awareness among the public, law enforcement, and
even the judiciary about the nuances of cybercrime and the technical aspects
involved. This results in ineffective investigation, prosecution, and
adjudication of cybercrime cases, as well as a lack of preventive measures.
The IT Act, even with amendments, is outdated in certain areas. It was drafted
at a time when the internet landscape was very different, and it does not fully
address newer forms of cybercrime such as social media-related offenses,
cyberbullying, ransomware attacks, AI-based frauds and deepfakes. The fast
pace of technological innovations, such as blockchain, artificial intelligence,
and the Internet of Things (IoT), outstrips the current legal provisions. These
new and sophisticated cybercrimes are difficult to prosecute under existing
laws, leading to gaps in enforcement.
The infrastructure for cyber forensics in India is still underdeveloped. There is
a shortage of skilled professionals and advanced tools necessary to investigate
and analyze digital evidence. This hampers the timely and accurate
investigation of cybercrimes, often leading to delays in justice or even
wrongful acquittals.
India lacks a robust and comprehensive data protection law. The current
provisions under the IT Act related to data protection are insufficient and do
not cover all aspects of data privacy and security. This leaves personal and
sensitive data vulnerable to breaches and misuse, with limited legal recourse
for victims.
Digital Signatures and the Indian IT Act
Public-Key Certificates:
❑ In the context of digital signatures under the Indian IT Act, 2000,
public-key certificates play a crucial role in ensuring the authenticity,
integrity, and non-repudiation of electronic transactions
❑ A public-key certificate, also known simply as a digital certificate, is an
electronic document used to prove the ownership of a public key. The
certificate includes information about the key, the identity of its owner, and
the digital signature of an entity that has verified the certificate's contents.
❑ Public-key certificates are essential for establishing trust in electronic
communications. They link a public key to an individual or entity, thereby
allowing others to verify the authenticity of a digital signature created
using the corresponding private key.
❑ Role in the Indian IT Act:
The Indian IT Act, 2000, provides legal recognition to digital signatures based
on asymmetric cryptography (public-key cryptography). Under this
framework, digital signatures are considered valid and enforceable if they are
created using a private key and verified using a corresponding public key
listed in a valid public-key certificate.
Digital Signatures and the Indian IT Act
The IT Act also establishes the role of Certifying Authorities (CAs), which are
trusted entities responsible for issuing public-key certificates. These
certificates are necessary for individuals and organizations to legally use
digital signatures in India.
❑ A public-key certificate typically includes the following information:
X.509 version information: The X.509 standard defines the format of
public-key certificates. These certificates are widely used in various
applications, including SSL/TLS for secure web browsing, email encryption,
and digital signatures.
A unique serial number assigned to the certificate by the issuing CA. This
number helps distinguish the certificate from others issued by the same CA.
Public Key: The public key itself, which is used to verify the digital signature.
It is mathematically linked to the corresponding private key, which is kept
secret by the certificate holder.
Name and Identity: The name and identification information of the individual
or organization to whom the public key belongs.
Certificate Holder’s Information: Often included to provide contact
information for the certificate holder. If the certificate is for an organization,
the organization’s name, address, and other relevant details are included.
Issuer Name: The name of the Certifying Authority that issued the certificate.
CA’s Digital Signature: The digital signature of the CA, which certifies the
authenticity of the public-key certificate.
Digital Signatures and the Indian IT Act
CA's Public Key Information: Details about the CA’s public key, which can be
used to verify the CA's signature.
Start and Expiry Dates: The dates between which the certificate is valid. After
the expiry date, the certificate is no longer considered trustworthy.
Information about the cryptographic algorithm used to create the digital
signature associated with the certificate (e.g., RSA, SHA-256).
Usage Guidelines: The certificate may include specific policies or guidelines on
how it can be used. For example, it may specify whether the certificate is
intended for personal use, e-commerce transactions, or other purposes.
Extensions: Optional fields that may include additional information such as
the certificate holder's rights, limitations, or extended validation data.
Representation of Digital Signatures in the Indian IT Act, 2000
❑ Asymmetric Cryptography (Public-Key Infrastructure - PKI):
Digital signatures in ITA 2000 are based on asymmetric cryptography, where a
pair of keys (a public key and a private key) is used. The private key is kept
confidential by the signer, while the public key is available to anyone who
needs to verify the signature.
When a document is signed digitally, a hash value of the document is created
and encrypted using the signer's private key. This encrypted hash, along with
the public key, forms the digital signature. The recipient can then decrypt the
hash using the public key to verify the integrity and authenticity of the
document.
Digital Signatures and the Indian IT Act
❑ Digital Signature Certificate (DSC):
To use a digital signature, a person must obtain a Digital Signature Certificate
(DSC) from a Certifying Authority (CA) licensed by the Controller of
Certifying Authorities (CCA) under the ITA 2000.
Impact of Oversights in the Indian IT Act, 2000 Regarding Digital Signatures
❑ Limited Technological Flexibility:
The ITA 2000 primarily focused on a specific type of digital signature
technology—Public-Key Infrastructure (PKI)—and did not explicitly
recognize other forms of electronic signatures or emerging technologies.
This lack of flexibility limited innovation and the adoption of alternative
secure electronic signature methods, such as biometric signatures, which could
have been beneficial in certain contexts. It also created a barrier for
international transactions where other forms of electronic signatures might be
more commonly accepted.
❑ Insufficient Infrastructure and Awareness:
The Act did not fully address the need for a robust infrastructure to support
the widespread use of digital signatures, including the availability of
Certifying Authorities (CAs) across the country and public awareness
programs.
The slow development of the necessary infrastructure, coupled with low public
awareness, hindered the adoption of digital signatures, particularly in rural
areas and among small businesses.
Digital Signatures and the Indian IT Act
Cryptographic Perspective on the Indian IT Act
❑ Non-Repudiation refers to the assurance that someone cannot deny the
validity of something. In digital communications, it ensures that the sender
of a message or the signer of a document cannot later claim they did not
send the message or sign the document.
❑ In the context of the Indian IT Act, 2000 (ITA 2000), non-repudiation is a
critical feature of digital signatures. The Act uses digital signatures to
ensure that electronic records are authenticated in a manner that provides
non-repudiation. This is accomplished through the use of asymmetric
cryptography, where a private key is used to sign a document and a
corresponding public key is used to verify the signature.
❑ How Digital Signatures Provide Non-Repudiation:
Private Key Usage: The signer uses their private key to create a digital
signature. Since the private key is unique to the signer and is kept secret, only
the signer could have generated the signature.
Signature Verification: The recipient or any third party can use the signer’s
public key to verify the digital signature. If the verification is successful, it
proves that the signature was indeed created by the holder of the
corresponding private key.
Audit Trail: Digital signatures typically include a timestamp and other
metadata, creating an audit trail that further strengthens non-repudiation.
This trail can be used as evidence that the signature was applied at a specific
time.
Digital Signatures and the Indian IT Act
❑ Legal Significance Under ITA 2000:
The ITA 2000 gives digital signatures the same legal status as handwritten
signatures. Non-repudiation ensures that a party cannot dispute their
involvement in a transaction that they digitally signed.
Digital Signature Certificates (DSCs): Issued by Certifying Authorities (CAs)
under the ITA 2000, DSCs bind the identity of the signer to their public key.
This binding is legally recognized and contributes to non-repudiation by
providing proof of the signer’s identity.
❑ Implications for Electronic Transactions:
Non-repudiation builds trust in electronic transactions. Parties involved in
digital transactions can trust that the other party cannot later deny their
actions.
Dispute Resolution: In case of disputes, the presence of a digital signature,
backed by a DSC, serves as strong evidence in legal proceedings.