E Governance Vijeta Mam
E Governance Vijeta Mam
Lucknow
ASSIGNMENT ON
Lucknow. Roll.No-174140013
1
TABLE OF CONTENTS
1. INTRODUCTION
2. E – Governance
3. Electronic Record
4. Retention E R
6. Data Protection
7. Validity of contract
8. Electronic signature
9. Conclusion
10. Biliographhy
2
ACKNOWLEDGEMENT
project on the topic “E-Governance under It act 2000 ” which also helped
3
INTRODUCTION
The Government of India enacted The Information Technology Act with some major objectives
which are as follows −
To deliver lawful recognition for transactions through electronic data interchange (EDI)
and other means of electronic communication, commonly referred to as electronic
commerce or E-Commerce. The aim was to use replacements of paper-based methods
of communication and storage of information.
To facilitate electronic filing of documents with the Government agencies and further to
amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers' Books
Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected
therewith or incidental thereto.
The Information Technology Act, 2000, was thus passed as the Act No.21 of 2000. The I. T. Act
got the President’s assent on June 9, 2000 and it was made effective from October 17, 2000. By
adopting this Cyber Legislation, India became the 12th nation in the world to adopt a Cyber Law
regime.
E-Governance
4
According to the World Bank, E-Governance is when government agencies use information and
communication technologies to transform relations with citizens, businesses, and other
government agencies. One of the prime objectives of the IT Act, 2000 is the promotion of
electronic governance. In this article, we will talk about electronic records and e-governance.
In the IT Act, 2000, there are special provisions under Chapter III to grant legal recognition to
electronic records, signature, and also encourage the government and its agencies to use them.
Let’s say that a certain law requires a matter written, typewritten, or printed. Even in the case
of such a law, the requirement is satisfied if the information is rendered or made available in an
electronic form and also accessible for subsequent reference.
Let’s say that the law requires a person’s signature to authenticate some information or a
document. Notwithstanding anything contained in such law, if the person authenticates it with
a digital signature in a manner that the Central Government prescribes, then he satisfies the
requirement of the law.
For the purpose of understanding this, signature means a person affixing his handwritten
signature or a similar mark on the document.
a. the filing of a form, application, or any document with any Government-owned or controlled
office, agency, body, or authority
b. the grant or issue of any license, sanction, permit or approval in a particular manner
c. also, the receipt or payment of money in a certain way
5
Then, notwithstanding anything contained in any other law in force such as filing, grant, issue,
payment, or receipt is satisfied even if the person does it in an electronic form. The person
needs to ensure that he follows the Government-approved format.
a. the format and manner of filing, creating or issuing such electronic records
b. also, the manner and method of payment of any fees or charges for filing, creating or
issuing any such records
6
Publication of rules, regulations, etc., in Electronic Gazette (Section 8)
Let’s say that law requires the publishing of official regulation, rule, by-law, notification or any
other matter in the Official Gazette. In such cases, the requirement is also satisfied if such rule,
regulation, order, bye-law, notification or any other matter is published in the Official Gazette
or Electronic Gazette.
However, the date of publication of the rule, regulation, by-law, notification or any other
matter is the date of the Gazette first published in any form – Official or Electronic.
It is important to note that, nothing contained in Sections 6, 7, and 8 confer a right upon any
person to insist either the acceptance, issuance, creation or also retention of any document or
a monetary transaction in the electronic form from:
7
Data Protection
Let’s say that a body corporate which possesses, deals or handles any sensitive personal data or
information in a computer resource which it owns, controls or operates, is certainly negligent in
implementing and maintaining reasonable security practices and procedures leading to a
wrongful loss or gain to a person.
In such cases, the body corporate is liable to pay damages by way of compensation. Further,
these damages cannot exceed five crore rupees.
Further, the Government of India notified the Information Technology (Reasonable security
practices and procedures and sensitive personal data or information) Rules, 2011, under section
43A of the IT Act, 2000. These rules specifically pertain to sensitive personal information or data
and are applicable to all body corporates within India.
Section 10A
In The Information Technology Act, 2000
10A Validity of contracts formed through electronic means. -Where in a contract formation, the
communication of proposals, the acceptance of proposals, the revocation of proposals and
acceptances, as the case may be, are expressed in electronic form or by means of an electronic
record, such contract shall not be deemed to be unenforceable solely on the ground that such
electronic form or means was used for that purpose.
8
Authentication of electronic records.-
SECTION 3
(1) Subject to the provisions of this section, any subscriber may authenticate an electronic
record by affixing his digital signature.
(2) The authentication of the electronic record shall be effected by the use of asymmetric
crypto system and hash function which envelop and transform the initial electronic record into
another electronic record. Explanation.-For the purposes of this sub-section, "hash function"
means an algorithm mapping or translation of one sequence of bits into another, generally
smaller, set known as "hash result" such that an electronic record yields the same hash result
every time the algorithm is executed with the same electronic record as its input making it
computationally infeasible-
(a) to derive or reconstruct the original electronic record from the hash result produced by the
algorithm;
(b) that two electronic records can produce the same hash result using the algorithm.
(3) Any person by the use of a public key of the subscriber can verify the electronic record.
(4) The private key and the public key are unique to the subscriber and constitute a functioning
key pair.
9
Electronic signature. –(3A)
(1) Notwithstanding anything contained in section 3, but subject to the provisions of sub-
section (2), a subscriber may authenticate any electronic record by such electronic signature or
electronic authentication technique which-
(2) For the purposes of this section any electronic signature or electronic authentication
technique shall be considered reliable if-
(a) the signature creation data or the authentication data are, within the context in which they
are used, linked to the signatory or, as the case may be, the authenticator and to no other
person;
(b) the signature creation data or the authentication data were, at the time of signing, under
the control of the signatory or, as the case may be, the authenticator and of no other person;
(c) any alteration to the electronic signature made after affixing such signature is detectable;
(d) any alteration to the information made after its authentication by electronic signature is
detectable; and
(3) The Central Government may prescribe the procedure for the purpose of ascertaining
whether electronic signature is that of the person by whom it is purported to have been affixed
or authenticated.
(4) The Central Government may, by notification in the Official Gazette, add to or omit any
electronic signature or electronic authentication technique and the procedure for affixing such
signature from the Second Schedule: Provided that no electronic signature or authentication
technique shall be specified in the Second Schedule unless such signature or technique is
reliable.
(5) Every notification issued under sub-section (4) shall be laid before each House of Parliament.
CONCLUSION
10
The original Act contained 94 sections, divided into 13 chapters and 4 schedules. The laws apply
to the whole of India. If a crime involves a computer or network located in India, persons of
other nationalities can also be indicted under the law, .
The Act provides a legal framework for electronic governance by giving recognition to electronic
records and digital signatures. It also defines cyber crimes and prescribes penalties for them.
The Act directed the formation of a Controller of Certifying Authorities to regulate the issuance
of digital signatures. It also established a Cyber Appellate Tribunal to resolve disputes rising
from this new law. The Act also amended various sections of the Indian Penal Code, 1860, the
Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891, and the Reserve Bank of India
Act, 1934 to make them compliant with new technologies.
BIBLIOGRAPHY
11
BOOK
IT LAW AND PRACTICE (VAKUL SHARMA )
IT ACT 2000 (BARE ACT)
SYBER LAW (SINGHAL LAW PUBLICATION )
WEBSITE
ITACT.RESEARCH.COM
CYBER CRIME .COM
12