Notes Information Technology Law
Notes Information Technology Law
I nformationTechnology(IT)inITlawreferstotheuse,regulation,andgovernanceofdigital
and electronic systems for storing, transmitting, and processing data. IT law provides a legal
framework to ensure that technology and itsapplicationsareusedresponsibly,securely,andin
compliance with societal norms and ethical standards.
H
● ardware(physical devices like computers, servers,and networking equipment),
● Software(applications, operating systems, and tools),
● Communication technologies (internet, wireless networks, and telecommunication
systems), and
● Data (storage, processing, and transfer of informationin digital formats).
Objectives of IT Law
1. D ata Protection and Privacy: Safeguarding personal and sensitive information from
unauthorized access or misuse.
2. Cybersecurity: Ensuring systems and networks are secure from cyber threats like
hacking, phishing, and ransomware attacks.
3. E-Governance: Facilitating the digital transformationofpublicserviceswhileensuring
transparency, accountability, and accessibility.
4. Regulating E-Commerce: Providing a legal framework for online businesses, digital
contracts, and electronic transactions.
5. Intellectual Property Protection: Addressing issues like copyright infringement,
patents, and trademarks in the digital domain.
6. Prevention of Cybercrimes: Tackling offenses such asonlinefraud,identitytheft,and
defamation.
Challenges in IT Law
I n India, the aims and objectives of IT law are primarily governed by the Information
Technology Act, 2000 (amended in 2008)and relatedregulations.
● E stablishalegalframeworkforelectronicgovernance(e-Governance)anddigitizationof
government services.
● Recognize and regulate electronic records, signatures, and communications in business
and administrative dealings.
F
● acilitate secure online transactions to boost e-commerce.
● Legalize digital contracts and ensure the enforceability of electronic agreements.
● D efine offenses like hacking, identity theft, cyberstalking, data breaches, and phishing
under the IT Act.
● Impose penalties and establish mechanisms to combat cybercrimes effectively.
● P rotect digital intellectual property, including software, databases, and copyrighted
material, from unauthorized access or piracy.
A
● ddress issues like cyberterrorism and unauthorized access to sensitive government data.
● Empower authorities to monitor, intercept,anddecryptdataforsecuritypurposesunder
specific conditions.
E
● ncourage public awareness about cyber laws and responsible use of digital platforms.
● Facilitate training programs for law enforcement agencies on handling cybercrime cases.
hese objectives ensure that IT law in India provides a robust legal framework toaddressthe
T
challenges of an increasingly digital and interconnected world.
I nformation Technology (IT) law governs the use, security, and ethical implications of
technology,ensuringpropermanagementofdigitalsystems,data,andcommunicationnetworks.
While IT law provides numerous benefits, it also faces challenges and potential drawbacks.
● B enefit: IT laws grant legal validity to electronic documents and digital signatures,
facilitating e-commerce and online business.
● B enefit: IT laws criminalize activities like hacking, phishing, online fraud, and
cyberbullying, deterring offenders and offering legal recourse for victims.
● B enefit: IT laws support government initiatives to offer services online, such as tax
filing, passport applications, and grievance redressal.
● B enefit: IT laws mandate companies to implement robust cybersecurity measures,
reducing the risk of breaches and cyberattacks.
● B enefit:Aclearlegalframeworkbuildstrustintechnology,encouragingbusinessesand
individuals to adopt digital tools without fear of exploitation.
● B enefit:ITlawsprotectdigitalcontent,software,andtrademarksfromunauthorizeduse
and piracy.
● B enefit: IT laws enable countries to collaborate on transnational cybercrime cases,
ensuring offenders are brought to justice.
● B enefit:ITlawsregulateonlinemarketplacesandensureconsumerrightsareprotected,
fostering fair trade practices.
● C hallenge:Cyberspaceisglobal,andjurisdictionalconflictsarisewhenlawsofdifferent
countries overlap or contradict.
● Example:Acybercrimecommittedinonecountrybutaffectingusersgloballymayface
enforcement challenges.
● C hallenge: Many individuals and organizations lack awareness of IT laws, leading to
unintentional violations or underreporting of crimes.
● Example: Businesses may unknowingly violate data protectionlawsduetoinsufficient
knowledge.
● C hallenge: Technology evolves faster than laws can adapt, leaving gaps in legal
frameworks.
● Example: Laws may not fully address emerging technologies like deepfakes, quantum
computing, or autonomous vehicles.
● C hallenge:Excessiveorpoorlydesignedregulationscanhindertechnologicalinnovation
and increase compliance costs for businesses.
● Example:Strictdatalocalizationlawsmaydiscourageforeigninvestmentsintechnology
sectors.
● C hallenge: Implementing security measures, audits, and reporting systems to comply
with IT laws can be expensive, especially for small businesses.
● Example: GDPR compliance requires significant investment in data protection
infrastructure and training.
● C hallenge: IT laws may disproportionately benefit those with access to technology,
leaving marginalized communities behind.
● Example: Rural areas with limited internet access may not benefit from e-governance
initiatives.
● C hallenge: Tracking and prosecuting cybercriminals is difficult due to anonymity,
encrypted communications, and cross-border complexities.
● Example: Dark web activities often escape detectionand legal enforcement.
● C hallenge:CertaintermsinITlaws,like“obscenecontent”or“offensivespeech,”may
be vague, leading to misuse or arbitrary enforcement.
● Example:Section66AoftheITActinIndiawasstruckdownforbeingoverlybroadand
violating free speech rights.
● C hallenge: Striking a balance between individual privacy and national security is
difficult, leading to controversies.
● Example: Laws requiring data retention for surveillance purposes may conflict with
privacy rights.
Evolution of IT Law
he evolution of cyber law in India has been a response to the rapid advancement of
T
information technology, the increasing penetration of the internet, and the consequent rise of
cyber-relatedchallenges.ThedevelopmentofcyberlawinIndiacanbecategorisedintoseveral
phases, reflecting the country’s efforts to regulate and address the multifaceted issues arising
from cyberspace.
● I ncreasing use of computers for business transactions and communication.
● Rise in electronic data storage and transmission.
● Emergence of crimes like hacking, unauthorized access, and data breaches.
● Lack of legal recognition for electronic records and digital signatures.
TheInformation Technology Act, 2000was India’s firstdedicated cyber law, enacted to:
P
● rovide legal recognition to electronic records and digital signatures.
● Address cybercrimes and regulate electronic commerce.
I n addition to the IT Act, India introduced various policies to address evolving cyber
challenges:
Contemporary trends have also influenced the evolution of cyber law in India:
● R ise of AI and Blockchain: These technologies raise questions about intellectual
property, liability, and ethical use.
● IncreasedCybercrimes:Advancedphishing,ransomware,andfraudrequirecontinuous
legal updates.
● DigitalIndiaInitiative:Thegovernment’spushfordigitizationhashighlightedtheneed
for stronger laws to protect users and systems.
● Social Media Regulation: Platforms face scrutiny for content moderation,
misinformation, and privacy concerns.
Future Prospects
The evolution of cyber law in India is ongoing, with several areas requiring attention:
Jurisdiction
J urisdictionincyberspacereferstotheauthorityofalegalbody,suchasacourtorregulatory
agency, to hear and decide cases or enforce laws related to online activities and disputes.
Cyberspace poses unique challenges to traditional notions of jurisdiction due to its borderless
nature, the involvement of multiple parties across different countries, and the complexity of
identifying the location of online activities.
1. S ubject-MatterJurisdiction:Theauthorityofacourttohearcasesofaparticulartype
(e.g., civil, criminal, intellectual property).
2. Personal Jurisdiction: The authority of a court overthe parties involved in a dispute.
3. Territorial Jurisdiction: The geographic scope within which a legal body has authority.
yberspaceoperateswithoutphysicalboundaries,makingitdifficulttopinpointwhereanaction
C
occurs.
heinternetallowsuserstomasktheiridentitiesorusefalselocations,complicatingthetaskof
T
establishing jurisdiction over perpetrators of cybercrimes.
E-commerce transactions often involve parties from different countries, raising questions about:
W
● hich country's laws govern the contract.
● Where disputes should be resolved.
Legal systems worldwide have developed certain principles to address jurisdiction in cyberspace:
court has jurisdiction over actions or events occurring within its physical boundaries. For
A
cyberspace, this can be interpreted as:
T
● he location of the server.
● The geographic location of the victim or perpetrator.
● Where the consequences of the online activity are felt.
countrymayclaimjurisdictioniftheeffectsofanactionarefeltwithinitsterritory,evenifthe
A
act occurred elsewhere. For example:
J urisdiction is based on whether the website, service, or content specifically targets users in a
particular jurisdiction. Factors considered include:
L
● anguage and currency used on the website.
● Shipping and payment options available.
● Advertisements directed toward a particular country.
omecountriesextendjurisdictiontotheirnationals,regardlessofwheretheoffenseoccurs.For
S
example:
● A citizen of Country A engaging in illegal online activities while abroad may still be
subject to Country A’s laws.
J urisdiction in cyberspace remains a complex and evolving issue. As the internet continuesto
grow and influence all aspects of life, legal frameworks must adapt to address the unique
challenges of cyberspace. Cooperation between nations, harmonization of laws, and
technological solutions are essentialtoensureeffectivegovernanceandenforcementoflawsin
the digital age.
Computer
Computer Network
● D
efinition (Section 2(j)):
A "computer network" refers to the interconnection of one or more computers through:
○ T he use of satellite, m
icrowave, terrestrial line, wire, wireless, or other
communication media.
○ Terminals or complex networks facilitating communication among connected
devices.
Computer Resource
● D
efinition (Section 2(k)):
A "computer resource" encompasses:
○ A computer.
○ A computer system.
○ A computer network.
○ Any data or database accessible through a computer or computer network.
○ Software, firmware, or microcode stored in a computer.
Computer System
● D
efinition (Section 2(l)):
A "computer system" means:
○ A device or combination of devices.
○ Including input and output support devices.
○ Connected or unconnected.
○ Operating together or independently to perform data processing usingcomputer
programs or instructions.
● D
efinition (Section 2(f)):
An "asymmetric crypto system" refers to a system of securing electronic records and
communication using:
○ Pair of Keys:A private key and a corresponding publickey.
○ Purpose: To authenticate and verify the sender's identity and secure data
transmission.
○ Widely used indigital signaturesto ensure data integrity and authenticity.
Virus
● Not explicitly defined in the IT Act, 2000, but generally understood as:
○ A malicious program or code designedtodisrupt,damage,orgainunauthorized
access to a computer, system, or network.
○ Common characteristics include self-replication, unauthorized execution, and
corruption of files or programs.
○ O
ften addressed under cybercrimes like data breaches and unauthorized access
(Sections 43 and 66 of the IT Act).
Concept of E-Commerce
-Commerce (short for Electronic Commerce) refers to the buying, selling, exchanging of
E
goods and services, or the transfer of funds and data over electronic networks, primarily the
internet. It encompasses all commercial transactions conducted online and has revolutionized
how businesses and consumers interact.
-Commerce is the practice of conducting business transactions through digital platforms,
E
eliminating the need for physical interaction. It enables individuals and organizations to
purchase, sell, or provide services online, making commerce accessible globally and 24/7.
● O nline Platforms: Websites, mobile apps, or marketplaces (e.g., Amazon, eBay) that
facilitate transactions.
● Digital Payments: Payment gateways and services (e.g., PayPal, Google Pay,
credit/debit cards) for seamless online payments.
● Logistics and Fulfillment: Efficient delivery systems for physical products, often
integrated with e-commerce platforms.
● Customer Support: Digital tools like chatbots, email, and online customer service to
address consumer needs.
● Technology Infrastructure:Internet,software,andcloudcomputingenablethesmooth
functioning of e-commerce systems.
E-commerce can be classified based on the nature of the transactions and the parties involved:
B
● usinesses sell products or services directly to consumers.
● Example: Buying a laptop from Amazon.
C
● onsumers sell directly to other consumers through platforms.
● Example: Selling pre-owned items on eBay or OLX.
C
● onsumers offer products or services to businesses.
● Example: Freelancers providing services on platforms like Fiverr.
G
● overnment entities provide services to citizens via digital platforms.
● Example: Paying taxes or applying for government documents online.
● lobal Reach:E-commerce connects buyers and sellersacross the world.
G
● Convenience:Customers can shop anytime, anywhere.
● Personalization:Tailored experiences based on userdata and preferences.
● Speed and Efficiency:Instant transactions and fastdelivery systems.
● Cost-Effective: Reduces overhead costs for businesses by eliminating the need for
physical stores.
For Businesses:
● xpanded market reach.
E
● Lower operating costs.
● Data-driven insights for decision-making.
● Improved customer engagement.
For Consumers:
● ide variety of products and services.
W
● Price comparison and better deals.
● Convenience of home delivery.
● Access to reviews and product details.
6. Technologies Driving E-Commerce
● rtificial Intelligence (AI):Used for personalizationand chatbots.
A
● Blockchain:Ensures secure transactions and preventsfraud.
● Cloud Computing:Provides scalable platforms and datastorage.
● Mobile Commerce (M-Commerce):Shopping via mobileapps.
● Internet of Things (IoT):Smart devices enabling automaticreordering of supplies.
O
● nline Marketplaces:Amazon, Flipkart, Alibaba.
● Service Platforms:Uber, Airbnb, Fiverr.
● Digital Products:Spotify, Netflix, Kindle eBooks.
● ybersecurity Threats:Risk of data breaches and fraud.
C
● Logistics Issues:Ensuring timely delivery, especiallyin remote areas.
● Competition:High competition in the digital market.
● Trust Building:Convincing customers about product quality and service reliability.
lectronic Contracts (e-contracts) are legally binding agreements formed and executed
E
digitally,withouttheneedforphysicalpaperworkorin-personsignatures.Thesecontractsarean
essential part of e-commerce and digital transactions, offering convenience, speed, and global
reach.
n e-contract is an agreement created, communicated, and signed through electronic means
A
(e.g., emails, web forms, orelectronicplatforms).Itislegallyrecognizedinmostjurisdictions,
provideditsatisfiesessentialcontractlawprincipleslikeoffer,acceptance,lawfulconsideration,
and intention to create legal relations.
Examples include:
C
● licking "I Agree" on a website’s terms and conditions.
● Signing documents electronically using digital signature software.
2. Characteristics of E-Contracts
● aperless:Entirely digital, no need for physicaldocuments.
P
● Instant Formation:Offers, acceptances, and paymentscan occur in real-time.
● Global Reach:Parties from different parts of theworld can form contracts.
● Legally Valid:Recognized under IT laws in most countries.
● Secure:Digital signatures and encryption ensure authenticityand integrity.
T
● he Indian IT Act, 2000(India)
● The Electronic Signatures in Global and National Commerce Act (E-SIGN), 2000
(USA)
● The Uniform Electronic Transactions Act (UETA), 1999(USA)
● UNCITRAL Model Law on E-Commerce (Global framework) provide legal
recognition to e-contracts and electronic signatures.
● U sers indicate their acceptance by clicking on a button (e.g., "I Agree") or ticking a
checkbox.
● Commonly used in software installations, e-commerce websites, and online subscriptions.
● Example:Agreeing to terms of service before creating an account on Instagram.
Key Features:
T
● erms and conditions are explicitly presented.
● Requires user action (e.g., clicking or ticking).
● Legally enforceable if terms are clear and accessible.
Key Features:
T
● erms are usually linked at the bottom of the page.
● No explicit consent is required.
● May face challenges in enforcement if users are unaware of the terms.
Key Features:
P
● hysical or digital product must be opened or accessed to view the terms.
● Acceptance is implied by using the product.
● A greements formed through email exchanges where the parties negotiate and finalize
terms electronically.
● Example:A service provider and a client agreeingto project details via email.
Key Features:
R
● equires a clear offer and acceptance via email.
● Retaining email records is critical for enforceability.
● C ontracts signed using electronic signatures or digital signature platforms (e.g.,
DocuSign, Adobe Sign).
● Example:Signing a rental agreement using an onlinesignature tool.
Key Features:
U
● ses encryption and authentication to validate the signature.
● Provides high security and traceability.
.
1 ffer:One party makes an offer via electronic means(e.g., a product listing online).
O
2. Acceptance:The other party accepts electronically(e.g., clicking "Buy Now").
3. Consideration:Exchange of value, such as paymentin return for goods/services.
4. Intention:Both parties must intend to create a legallybinding agreement.
5. Capacity:Both parties must be legally capable ofentering into a contract.
● onvenience:Easily executed from anywhere.
C
● Speed:Instant communication and execution.
● Cost-Effective:Reduces paperwork and administrativecosts.
● Eco-Friendly:Eliminates the need for physical documents.
● Secure:Advanced encryption protects the contract’sintegrity.
A
● uthentication Issues:Verifying the identity of thecontracting parties can be complex.
● Enforceability of Browsewrap Agreements: Lack of explicit consent may make
enforcement difficult.
● Data Security and Privacy:Risk of cyberattacks orunauthorized access.
● Jurisdictional Issues: Determining applicable laws in cross-border e-contracts can be
challenging.
● Digital Divide: Not everyone has access to the technology required to participate in
e-contracts.
rovision: This section states that if any law requires a document tobeinwritten,printed,or
P
typewritten form, such a requirement is deemed fulfilled if the document is in an electronic
format, provided it is accessible for future reference.
Significance:
G
● rants legal recognition to electronic records, enabling paperless governance.
● Ensures that digital documents are treated at par with physical documents.
rovision: This section states that wherever a law requires authenticationbysignature,sucha
P
requirementismetifthedocumentisauthenticatedusingadigitalsignatureinaccordancewith
prescribed rules.
Significance:
D
● igital signatures replace physical signatures in electronic documents.
● Ensures secure and legally valid electronic authentication.
ection 6 – Use of Electronic Records and Digital Signatures in Government and Its
S
Agencies
A
● ccept electronic records and digital signatures in official documents.
● Use electronic means for filing forms, applications, and notices.
● Maintain electronic documents instead of physical records.
Significance:
● F acilitates online transactions and applications in government services (e.g., tax filing,
online tenders).
● Encourages digital transformation in public administration.
Section 6A of the IT Act, 2000 in Simple Terms
his section allows the government to authorize private or public service providers to offer
T
electronic servicesto the public. It also sets rulesfor charging fees for these services.
● T he government can officially appoint service providers (like private companies,
individuals, or agencies) to set up, manage, and upgrade digital facilities for public
services.
● Theseservicescanincludeonlinepayments,e-governanceportals,digitalcertificates,
etc.
● E ven if a specific rule or law doesn’t mention service charges, this section allows
authorized service providers tocollect and keep servicefeesfor e-services.
T
● hegovernmentwill set the fee structure throughanofficial notificationin theGazette.
● Different services may havedifferent charges, dependingon their nature.
rovision:Ifanylawrequiresthatrecordsberetainedforaspecifiedperiod,theycanbestored
P
electronically, provided:
Significance:
E
● ncourages digital record-keeping in government and private sectors.
● Reduces physical storage costs and increases efficiency.
Section 7A of the IT Act, 2000
Section 7A
● J ust like paper documents, digital records (such as online transactions, e-receipts, or
digital contracts) must also bechecked and verifiedas per existing laws.
● P reventsfraudandmanipulationofelectronicdocumentsbyensuringtheyareregularly
checkedlike physical records.
● I fanyexistinglawrequiresanaudit,thissectionmakessurethatelectronicrecordsare
included automatically.
rovision: This section allows the government to publish laws, rules, and notifications
P
electronically instead of in a physical gazette.
Significance:
E
● nsures faster dissemination of government regulations.
● Promotes eco-friendly and cost-effective governance.
Significance:
● E nsures that electronic records are not mandatory where physical documentation is
necessary.
● Provides flexibility in implementing e-Governance.
Section 10 – Power of the Central Government to Make Rules for Electronic Signatures
his sectiongivestheCentralGovernmenttheauthoritytocreaterulesandguidelinesrelated
T
toelectronic signaturesto ensure their security,authenticity, and legal validity.
1. T ypes of Electronic Signatures – Deciding what kinds of electronic signatures are
allowed (e.g., digital signatures, biometric-based signatures).
2. How to Apply Electronic Signatures – The correct method and format for affixing
electronic signatures on documents.
3. Identifying the Signer – Ensuring a process exists to verifywhosignedthedocument
electronically.
4. Security and Integrity of Electronic Records – Implementing security measures to
protect digital documents and transactions from tampering, fraud, or unauthorized access.
5. Other Necessary Rules – Making any additional rules needed to legally recognize
electronic signatures.
his section ensures that electronic contracts (e.g., agreements made through emails, online
T
forms, or digital platforms) arelegally valid.
CERTIFYING AUTHORITIES
Chapter VI of the IT Act, 2000, which deals with theRegulation of Certifying Authorities:
nder the Information Technology Act, 2000 (IT Act 2000) in India, Certifying Authorities
U
(CAs) are responsible for issuing digital certificates that verify the identity of individuals,
organizations, or devices in electronic transactions. These certificates are essential for secure
online communication, digital signatures, and encryption.
● T he Central Government appoints a Controller of Certifying Authorities (CCA) to
oversee digital certification in India.
● ThegovernmentcanalsoappointDeputyControllers,AssistantControllers,andother
officersas needed.
● TheControllerworks under theguidance and controlof the government.
● Deputy and Assistant Controllershelp the Controllerin carrying out duties.
● Thegovernmentdecidesthequalifications,experience,andserviceconditionsofthese
officers.
● The main office and branch offices of the Controller can be established anywhere as
specified by the government.
● TheController's office has an official sealto authenticate documents.
Section 18: Functions of the Controller
● T he Controller can recognize foreign Certifying Authorities (CAs) withgovernment
approval.
● Theelectronic signatures issued by such CAswill be valid in India.
● If a foreign CA violates rules, itsrecognition canbe revoked.
● A nyonewantingtoissueelectronicsignaturecertificatesmustapplyforalicensefrom
the Controller.
● To get a license, an applicant must have:
○ Necessaryqualifications and expertise.
○ Sufficientfinancial and technical resources.
● Alicense is not transferableand must follow governmentregulations.
A
● CA must applyat least 45 days beforethe licenseexpires.
● Arenewal fee(maximum ₹5,000) must be paid.
T
● he Controllerreviews applicationsand canapproveor rejectthem.
● If rejected, the applicantmust be given a chanceto present their case.
● T he Controller can delegate their powers to Deputy Controllers, Assistant
Controllers, or other officers.
T
● he Controller or an authorized officer caninvestigate any violationof the Act.
● They have thesame powers as Income Tax authoritiesfor conducting investigations.
Section 29: Access to Computers and Data
● sesecure hardware and software.
U
● Maintainreliable and secure services.
● Followsecurity proceduresto protect users’ data.
● Be therepositoryof all issued certificates.
● Publish detailsabout their certificates and securitypractices.
● Every CA must ensure that all its employeesfollowthe IT Act and related rules.
● ACA must display its licenseat aprominent placein its office.
CHAPTER II
he Information Technology (IT) Act, 2000 provides a legal framework for the use of
T
electronic signatures and digital signatures to authenticate electronic records, ensuring
security, authenticity, and legal validity.
Definition
he IT Act, 2000 originally recognized only digital signatures (based on asymmetric
T
cryptography). However, after the 2008 amendment,theActintroducedthebroaderconceptof
electronic signatures, allowing multiple technologiesfor authentication.
Electronic Signature
● T hetermElectronicSignaturewasintroducedintheIT(Amendment)Act,2008,which
replaced the earlier term "Digital Signature" to cover a broader range of electronic
authentication methods.
● As perSection 2(ta)of the IT Act, an electronicsignature is:
"Authentication of any electronic record by a subscriber by means of an electronic
technique specified in the Second Schedule and includes a digital signature."
● Thismeansthatdigitalsignaturesareatypeofelectronicsignature,butnotallelectronic
signatures are digital signatures.
Digital Signature
● A Digital Signature is a specific type of electronic signature that uses cryptographic
techniques to authenticate electronic records.
● AsperSection3oftheITAct,2000,adigitalsignatureiscreatedusinganasymmetric
cryptosystem and a hash function to ensure security and authenticity.
NOTE- Public Key Infrastructure (PKI)
ublic Key Infrastructure (PKI) is a framework that enables secure electronic
P
communication,authentication,anddataintegrityusingcryptographickeypairs(publicand
private keys). It is the backbone of digital signatures, SSL/TLS encryption, and secure
online transactions.
KIconsistsofseveralessentialcomponentsthatworktogethertoestablishtrustandsecurity
P
in digital transactions:
P
● ublic Key: Shared openly and used to encrypt dataor verify a digital signature.
● Private Key: Kept secret and used to decrypt dataor create a digital signature.
● One-wayrelationship:Dataencryptedwiththepublickeycanonlybedecryptedwith
the corresponding private key.
● A trustedthirdpartythatissuesandmanagesDigitalCertificates(alsocalledPublic
Key Certificates).
● Examples:eMudhra, Sify, NIC, Verisign, DigiCert.
● Ensures that the public key belongs to the correct person or organization.
A
● cts as anintermediarybetween users and the CertifyingAuthority.
● Verifies the applicant's identity before forwarding the request to the CA.
A
● document issued by a CAthat binds a user’sidentitywith theirpublic key.
● Typically follows theX.509 standardand contains:
○ Owner’s name
○ Public key
○ Issuer (CA) details
○ Expiry date
○ Unique serial number
e) Certificate Revocation List (CRL) & Online Certificate Status Protocol (OCSP)
C
● RL: A list of revoked or expired certificates, publishedby the CA.
● OCSP: A real-time verification system that checksif a certificate is valid.
Key Provisions:
A
● digital signatureis created usingasymmetric cryptosystemandhash functions.
● It ensures:
1. Authentication– Verifies the sender’s identity
2. Integrity– Ensures that the document has not beenaltered
3. Non-repudiation– Prevents the sender from denyingthe transaction.
How It Works:
Key Provisions:
● igital Signatures (PKI-based)
D
● Biometric Signatures (fingerprint, iris scan)
● OTP-based Signatures (Aadhaar e-sign)
● Clickwrap Agreements (checkbox-based online consent)
E
● lectronic signatures and digital signatures are legally validunder Indian law.
● Anydocumentsigneddigitally/electronicallyisconsideredequivalenttoahandwritten
signaturein court.
● C ertifying Authorities (CAs) are licensed entities that issue Digital Signature
Certificates (DSCs).
● Controller of Certifying Authorities (CCA)supervisesCAs.
● CAs ensure that signatures aresecure and verified.
Chapter V: Secure Electronic Records and Secure Electronic Signatures (IT Act, 2000)
his chapter focuses on ensuring the security and authenticity of electronic records and
T
electronic signatures. It establishes when an electronic record or signature can be considered
secure and the role of the government in prescribing security standards.
● A nelectronicrecord(suchasadigitaldocument,contract,oremail)becomessecureifit
has undergone a security procedure at a specific time.
● Once secured,the record remains secure until it isverified.
● This ensures that the document has not been altered or tampered with during that time.
n electronic signature(suchasadigitalsignatureorAadhaar-basedeSign)isconsidered
A
secure if:
1. T hepersonsigning(signatory)hadexclusivecontroloverthesignaturecreationdata
(such as a private key or biometric authentication) at the time of signing.
2. Thesignature was stored and affixed in a secure way,as per prescribed standards.
● I n digital signatures, the signature creation data refers to the private key of the person
signing the document.
● The private key is uniquetothesignerandisusedtoencryptandauthenticatethe
signature.
● T he Central Government has the power to define the security procedures and
standards for electronic records and signatures.
● These procedures mustconsidercommercialneeds,thenatureoftransactions,andother
relevant factors.
● The goal is to ensure that electronic records and signatures are tamper-proof and
reliable.
Chapter VII: Electronic Signature Certificates (IT Act, 2000)
his chapter outlines the process for issuing, suspending, and revoking Electronic Signature
T
Certificates (previously called Digital Signature Certificates or DSCs). These certificates are
issued by Certifying Authorities (CAs) and serve as legally valid proof of identity for online
transactions.CertifyingAuthorities(CAs)areentitiesthatissuedigitalsignaturesandelectronic
certificatestoverifytheauthenticityandintegrityofelectronictransactions.Theyplayacrucial
role in ensuring secure electronic communication and e-governance. A Certifying Authority
(CA) is an organization or entitylicensedbytheControllerofCertifyingAuthorities(CCA)to
issue Digital Signature Certificates (DSCs) under the IT Act, 2000.
● A ny person (individual, company, or organization) can apply for an Electronic
Signature Certificateby submitting an applicationto aCertifying Authority (CA).
● The application must be in a form prescribed by theCentral Government.
● T heCentralGovernmentdecidesthefeeforobtainingthecertificate,withamaximum
cap of₹25,000.
● Different fees can be charged based on applicant type (individuals, businesses,
government agencies, etc.).
Application Requirements
● T he application must include a certification practice statement (a document
explaining how the applicant will use the certificate securely).
● If the applicant does not have this statement, they must provide required detailsasper
government regulations.
T
● heCertifying Authoritywill review the applicationand supporting documents.
● If the applicant meets all requirements, the authority willissue the certificate.
● If the authority rejects the application, it must provide written reasons and give the
applicant an opportunity to explain before final rejection.
Responsibilities of Certifying Authorities When Issuing a Certificate (Section 36)
.
1 I t follows theIT Act and related regulations.
2. The certificate ispublished or made availabletopeople who need to verify it.
3. Thesubscriber (certificate holder) has accepted thecertificate.
4. The subscriber holds aprivate keythat matches thepublic keylisted in the certificate.
5. The public key can be used to verify thedigital signaturecreated by the subscriber.
6. The subscriber’spublic and private keys work togethercorrectly.
7. Theinformation in the certificate is accurate.
8. The authority has no hidden information that could affect the reliability of the
certificate.
. T
1 hecertificate holder requests it.
2. Someoneauthorized by the certificate holderrequestsit.
3. The Certifying Authority believes the suspension isnecessary for public interest.
● A certificatecannotbesuspendedformorethan15daysunlessthecertificateholderis
given a chance to be heard.
● The Certifying Authority mustinform the certificate holderabout the suspension.
A
● certificatecannot be revoked without giving the holder a chance to explain.
● The Certifying Authority mustinform the certificate holderonce it has been revoked.
● I facertificateissuspendedorrevoked,theCertifyingAuthoritymustpublishanotice
in therepository (a publicly accessible database)where such certificates are stored.
● If multiple repositoriesexist,thenoticemustbepublishedinallofthemtoinformthe
public.
Landmark Case: K.S. Puttaswamy v. Union of India (2017)
● J ustice K.S. Puttaswamy, a retired judge of the Karnataka High Court, filed a case in
2012 before the Supreme Court of India challenging the Aadhaar scheme, which was
introduced by the government to provide a unique identification number to Indian
citizens.
● HearguedthattheAadhaarschemeviolatedtheRighttoPrivacy,asitrequiredcitizensto
submit biometric and personal data to the government.
● The case was referred to a nine-judge benchtodeterminewhethertheRighttoPrivacy
was a fundamental right under the Constitution of India.
● T heRighttoPrivacyisanintegralpartofArticle21(RighttoLifeandPersonalLiberty)
and other fundamental rights such as Articles 14, 19, and 21.
● Thegovernmentcollectingbiometricandpersonaldatawithoutclearsafeguardsviolates
personal liberty.
● Previous Supreme Court judgments in M.P. Sharma (1954) and Kharak Singh (1962),
which held that privacy is not a fundamental right, should be reconsidered.
● Various international conventions, such as the Universal Declaration of Human Rights
(UDHR) and International Covenant on Civil and Political Rights (ICCPR), recognize
privacy as a human right.
Respondent’s Arguments (Government of India)
● T he Right to Privacy is not an absolute right and should be subject to reasonable
restrictions in public interest.
● Aadhaar ensures efficient distribution of government benefits andpreventsleakageand
fraud in welfare schemes.
● M.P.Sharma(1954)andKharakSingh(1962)rulingsstillholdprecedent,andprivacyis
not explicitly mentioned as a fundamental right in the Constitution.
● Privacy should be protected through legislation, not as a fundamental right.
● T henine-judgebenchoftheSupremeCourtunanimouslyheldthattheRighttoPrivacyis
a Fundamental Right under the Constitution of India.
● The court overruled the judgments in M.P. Sharma (1954) and Kharak Singh (1962).
● TheRighttoPrivacyisprotectedunderArticles14,19,and21,forminganintegralpart
of the Golden Triangle of rights.
● Privacy includes aspects such as:
○ Personal autonomy
○ Data protection
○ Freedom from government surveillance
○ Bodily integrity
● However, the Right to Privacy is not absolute and can be restricted under reasonable
conditions, such as:
○ Legitimate state interest
○ Proportionality principle
○ Public safety and welfare