SlideShare uma empresa Scribd logo
1 de 31
UNCITRAL
Model Law
Rahul Gurnani
CDAC Certified Cyber Security Professional
MS Cyber Law & Information Security ,
Indian Institute of Information Technology-Allahabad
UNCITRAL Adopted on 30 January 1997
UNCITRAL : What is it ?
Why should we be aware about it ?
 Following the United Nations Commission on International
Trade Law (UNCITRAL) Model Law on E-Commerce, the
Government of India enacted the Information Technology Act in
June 2000.
 The Act facilitates E-commerce and E-Governance in the
country. The Act also establishes a regulatory framework and
lays down punishment regimes for different cyber crimes and
offences.
UNCITRAL : What is it ?
Why should we be aware about it ?
 Adopted on 30 January 1997
 It recommends inter alia that all States give
favorable consideration to the Model law when
they enact or revise their laws in view of the
need for uniformity of the law applicable to
alternatives to paper-cased methods of
communication and storage of information.
UNCITRAL : What is it ?
Why should we be aware about it ?
 Recognizing the necessity to give effect to
the Resolution, and
 with an objective of promoting efficient
delivery of government services by means
of reliable electronic records,
the Government of India enacted the
Information Technology Act in June 2000.
The UNCITRAL model law:
background
 in many countries the existing legislation governing
communication and storage of information were
inadequate or outdated because they did not
contemplate the use of electronic commerce. …
 many countries lacked in legislations for dealing
with E-commerce as a whole results in uncertainty
as to the legal nature and validity of information
presented in a form other than a traditional paper
document.…
 Inadequate legislation at the national level created
obstacles to international trade.
The UNCITRAL model law:
background
 The purpose of Model law was to offer National
legislators a set of internationally accepted rules as
to
 how a number of such legal obstacles may be
removed, and
 how a more secure legal environment may be
created for what has become known as electronic
commerce.…
What UNCITRAL Says ?
E-Commerce in the UNCITRAL
Model Law
 Objectives of the Model Law:
To facilitate rather than regulate electronic
commerce
To adapt existing legal requirements
To provide basic legal validity and raise
legal certainty
Basic Principles of the Model Law
 Functional equivalence
 Analyze purposes and functions of paper-based
requirements (“writing”, “record”, “signature”,
“original”)
 Consider criteria necessary to replicate those
functions and give electronic data the same level
of recognition as information on paper
Basic Principles of the Model Law
 Media and technology neutrality
Equal treatment of paper-based and
electronic transactions
Equal treatment of different
techniques (EDI, e-mail, Internet,
telegram, telex, fax)
Basic Principles of the Model Law
 Party autonomy
Primacy of party agreement on
whether and how to use e-commerce
techniques
Parties free to choose security level
appropriate for their transactions
Core Provisions of the UNCITRAL
Model Law
 Article 5 (Legal Recognition)
 Article 6 (Writing)
 Article 7 (Signature)
 Article 8 (Original)
 Article 9 (Evidence)
Recall Indian Laws
talk about all these
.. We will see
ahead
Core Provisions of the UNCITRAL Model
Law: Article 5 and 5 b is
 Information shall not be denied legal
effect, validity or enforceability solely
because:
it is in the form of a data message or
It is incorporated by reference
Core Provisions of the UNCITRAL
Model Law: Article 6 (Writing)
 Where the law requires information to
be in writing, that requirement is met by
a data message if the information
contained therein is accessible so as to
be usable for subsequent reference.
Core Provisions of the UNCITRAL
Model Law: Article 7 (Signature)
 Legal requirement is met in relation to a
data message if:
 a method is used to identify the signatory and
to indicate his approval of the information
contained in the data message; and
 that method is as reliable as was appropriate
for the purpose for which the data message
was generated or communicated.
Core Provisions of the UNCITRAL
Model Law: Article 8 (Original)
 Legal requirement is met by a data
message if:
 there exists a reliable assurance as to the
integrity of the information from the time when
it was first generated in its final form, as a data
message or otherwise; and information is
capable of being displayed to the person to
whom it is to be presented.
Core Provisions of the UNCITRAL
Model Law: Article 9 (Evidence)
 In any legal proceedings, nothing in the
rules of evidence shall apply so as to
deny the admissibility of a data
message in evidence solely because it
is a data message.
Other Provisions of the Model Law
 Article 11 (Use of data messages in contract
formation)
 Article 12 (Non-repudiation)
 Article 13 (Attribution of data messages)
 Article 14 (Acknowledgement of receipt)
 Article 15 (Time and place of dispatch and receipt)
 Articles 16 and 17 (Electronic commerce and
carriage of goods)
Article 15 (Time and place of
dispatch and receipt)
 A data message is deemed to be sent
when it enters an information system
outside the control of the originator.
Article 15 (Time and place of
dispatch and receipt)
 A data message is deemed to be received:
a) If the addressee has designated an information
system to receive the message, when the message
enters the designated system; or
b) If the message is sent to an information system
other than the designated system, when the
addressee retrieves the message.
Article 15 (Time and place of
dispatch and receipt)
 If the addressee has not designated an
information system, the message is deemed
to be received when it enters an information
system of the addressee.
 Data messages are deemed to be sent at the
place where the originator has its place of
business and received at the place where the
addressee has its place of business.
Overview of the Indian law
and it’s
Deviation from UNCITRAL Model
Overview of the Indian law
The objectives of the Information Technology Act, as
outlined in the preamble, are to
• provide legal recognition for E-commerce transactions,
facilitate Electronic Governance and
• amend the Indian Penal Code, Indian Evidence Act 1872,
the Bankers’ Book Evidence Act 1891 and the Reserve
Bank of India Act 1934.
The Act also establishes a regulatory framework for cyber
laws and lays down punishment regimes for different cyber
crimes and offences.
Overview of the Indian law
 Legal recognition for digital signatures.
 Electronic governance.
 Regulatory framework.
 Offences and penalties.
Some Deviations in Indian Law
 digital signatures and
 provisions relating to online
contracting.
Digital Signatures …. Deviations
 Model Law -- Article 7
 The Information Technology Act mandates certain
technical standards—
that is, an asymmetric cryptosystem commonly known as
‘public key encryption’ and ‘hash function’. [Section 3 of
the Act]
 Certifying Authorities ….
Deviations in provisions relating to
online contracting.
 Model Law -- Article 11
 the Indian Information Technology Act does not
have any express provision regarding the
validity or formation of online contracts.
 The Indian Contract Act 1872 deals with the
validity of contracts.
Deviations in provisions relating to
online contracting.
 It does not prescribe any particular method
for the communication of offer and
acceptance.
 Thus, there is no requirement of writing for
the validity of contracts, except in such
cases where the requirement of writing is
specifically mandated by law
References…..
 E-Commerce Law in Developing Countries: An
Indian Perspective ;
By - C. M. ABHILASH
 Raising confidence in E-commerce: the legal
framework ;
By - UNCITRAL Secretariat, Vienna, Austria
Roots of Indian IT ACT 2000-  UNCITRAL

Mais conteúdo relacionado

Mais procurados

Origin and development of equity
Origin and development of equityOrigin and development of equity
Origin and development of equityA K DAS's | Law
 
The Code of Civil Procedure, 1908
The Code of Civil Procedure, 1908The Code of Civil Procedure, 1908
The Code of Civil Procedure, 1908PRATHYUSHAP15
 
INTERPRETATION OF STATUTES - MEANING,NEED,OBJECT,KINDS AND RULES
INTERPRETATION OF STATUTES - MEANING,NEED,OBJECT,KINDS AND RULES  INTERPRETATION OF STATUTES - MEANING,NEED,OBJECT,KINDS AND RULES
INTERPRETATION OF STATUTES - MEANING,NEED,OBJECT,KINDS AND RULES KhushiGoyal20
 
Basics of Natural school of Jurisprudence
Basics of Natural school of JurisprudenceBasics of Natural school of Jurisprudence
Basics of Natural school of Jurisprudenceanjalidixit21
 
Comparative public law and System of Governance
Comparative public law and System of GovernanceComparative public law and System of Governance
Comparative public law and System of GovernanceNikhil kumar Tyagi
 
Classification of cause of action / characterisation
Classification of cause of action / characterisationClassification of cause of action / characterisation
Classification of cause of action / characterisationcarolineelias239
 
Torts in Private international law
Torts in Private international lawTorts in Private international law
Torts in Private international lawcarolineelias239
 
Mandatory and directory provisions
Mandatory and directory provisionsMandatory and directory provisions
Mandatory and directory provisionsJEFIN
 
Internal aids to interpretation of law
Internal aids to interpretation of lawInternal aids to interpretation of law
Internal aids to interpretation of lawTejas Shah
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunalAnkita Sharma
 
The TN Land Reforms (Fixation of Ceiling on land) Act, 1961.pptx
The TN Land Reforms (Fixation of Ceiling on land) Act, 1961.pptxThe TN Land Reforms (Fixation of Ceiling on land) Act, 1961.pptx
The TN Land Reforms (Fixation of Ceiling on land) Act, 1961.pptxRoshiniSundarrasu
 
Legitimacy, Legitimation and Adoption under Private International Law
Legitimacy, Legitimation and Adoption under Private International LawLegitimacy, Legitimation and Adoption under Private International Law
Legitimacy, Legitimation and Adoption under Private International Lawcarolineelias239
 
Divorce in PIL.pdf
Divorce in PIL.pdfDivorce in PIL.pdf
Divorce in PIL.pdfHussain Shah
 
Principles of constitutional interpretation of list prepared by Rajashree J J...
Principles of constitutional interpretation of list prepared by Rajashree J J...Principles of constitutional interpretation of list prepared by Rajashree J J...
Principles of constitutional interpretation of list prepared by Rajashree J J...sundarsasane
 
TM Infringement- Rajeev Mandal.
TM Infringement- Rajeev Mandal.TM Infringement- Rajeev Mandal.
TM Infringement- Rajeev Mandal.Rajiv Mandal
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in indiaatuljaybhaye
 
Historical school of jurisprudence
Historical school of jurisprudenceHistorical school of jurisprudence
Historical school of jurisprudenceanjalidixit21
 

Mais procurados (20)

Origin and development of equity
Origin and development of equityOrigin and development of equity
Origin and development of equity
 
Uncitral model law
Uncitral model lawUncitral model law
Uncitral model law
 
The Code of Civil Procedure, 1908
The Code of Civil Procedure, 1908The Code of Civil Procedure, 1908
The Code of Civil Procedure, 1908
 
Private international law
Private international  lawPrivate international  law
Private international law
 
INTERPRETATION OF STATUTES - MEANING,NEED,OBJECT,KINDS AND RULES
INTERPRETATION OF STATUTES - MEANING,NEED,OBJECT,KINDS AND RULES  INTERPRETATION OF STATUTES - MEANING,NEED,OBJECT,KINDS AND RULES
INTERPRETATION OF STATUTES - MEANING,NEED,OBJECT,KINDS AND RULES
 
Basics of Natural school of Jurisprudence
Basics of Natural school of JurisprudenceBasics of Natural school of Jurisprudence
Basics of Natural school of Jurisprudence
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 
Comparative public law and System of Governance
Comparative public law and System of GovernanceComparative public law and System of Governance
Comparative public law and System of Governance
 
Classification of cause of action / characterisation
Classification of cause of action / characterisationClassification of cause of action / characterisation
Classification of cause of action / characterisation
 
Torts in Private international law
Torts in Private international lawTorts in Private international law
Torts in Private international law
 
Mandatory and directory provisions
Mandatory and directory provisionsMandatory and directory provisions
Mandatory and directory provisions
 
Internal aids to interpretation of law
Internal aids to interpretation of lawInternal aids to interpretation of law
Internal aids to interpretation of law
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
The TN Land Reforms (Fixation of Ceiling on land) Act, 1961.pptx
The TN Land Reforms (Fixation of Ceiling on land) Act, 1961.pptxThe TN Land Reforms (Fixation of Ceiling on land) Act, 1961.pptx
The TN Land Reforms (Fixation of Ceiling on land) Act, 1961.pptx
 
Legitimacy, Legitimation and Adoption under Private International Law
Legitimacy, Legitimation and Adoption under Private International LawLegitimacy, Legitimation and Adoption under Private International Law
Legitimacy, Legitimation and Adoption under Private International Law
 
Divorce in PIL.pdf
Divorce in PIL.pdfDivorce in PIL.pdf
Divorce in PIL.pdf
 
Principles of constitutional interpretation of list prepared by Rajashree J J...
Principles of constitutional interpretation of list prepared by Rajashree J J...Principles of constitutional interpretation of list prepared by Rajashree J J...
Principles of constitutional interpretation of list prepared by Rajashree J J...
 
TM Infringement- Rajeev Mandal.
TM Infringement- Rajeev Mandal.TM Infringement- Rajeev Mandal.
TM Infringement- Rajeev Mandal.
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
Historical school of jurisprudence
Historical school of jurisprudenceHistorical school of jurisprudence
Historical school of jurisprudence
 

Semelhante a Roots of Indian IT ACT 2000- UNCITRAL

Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptxLaw & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptxssuser32bd0c
 
Industrial revolution and notions of technology .pptx
Industrial revolution and notions of technology .pptxIndustrial revolution and notions of technology .pptx
Industrial revolution and notions of technology .pptxVishweshSingh16
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008Mohit Goswami
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in indiaatuljaybhaye
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 

Semelhante a Roots of Indian IT ACT 2000- UNCITRAL (20)

Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptxLaw & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
 
Industrial revolution and notions of technology .pptx
Industrial revolution and notions of technology .pptxIndustrial revolution and notions of technology .pptx
Industrial revolution and notions of technology .pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in india
 
It act 2000
It act 2000It act 2000
It act 2000
 
Manoj 1
Manoj 1Manoj 1
Manoj 1
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Cyber Law and Cyber Crime
Cyber Law and Cyber Crime Cyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 

Último

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 

Último (20)

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 

Roots of Indian IT ACT 2000- UNCITRAL

  • 1. UNCITRAL Model Law Rahul Gurnani CDAC Certified Cyber Security Professional MS Cyber Law & Information Security , Indian Institute of Information Technology-Allahabad
  • 2. UNCITRAL Adopted on 30 January 1997
  • 3. UNCITRAL : What is it ? Why should we be aware about it ?  Following the United Nations Commission on International Trade Law (UNCITRAL) Model Law on E-Commerce, the Government of India enacted the Information Technology Act in June 2000.  The Act facilitates E-commerce and E-Governance in the country. The Act also establishes a regulatory framework and lays down punishment regimes for different cyber crimes and offences.
  • 4. UNCITRAL : What is it ? Why should we be aware about it ?  Adopted on 30 January 1997  It recommends inter alia that all States give favorable consideration to the Model law when they enact or revise their laws in view of the need for uniformity of the law applicable to alternatives to paper-cased methods of communication and storage of information.
  • 5. UNCITRAL : What is it ? Why should we be aware about it ?  Recognizing the necessity to give effect to the Resolution, and  with an objective of promoting efficient delivery of government services by means of reliable electronic records, the Government of India enacted the Information Technology Act in June 2000.
  • 6. The UNCITRAL model law: background  in many countries the existing legislation governing communication and storage of information were inadequate or outdated because they did not contemplate the use of electronic commerce. …  many countries lacked in legislations for dealing with E-commerce as a whole results in uncertainty as to the legal nature and validity of information presented in a form other than a traditional paper document.…  Inadequate legislation at the national level created obstacles to international trade.
  • 7. The UNCITRAL model law: background  The purpose of Model law was to offer National legislators a set of internationally accepted rules as to  how a number of such legal obstacles may be removed, and  how a more secure legal environment may be created for what has become known as electronic commerce.…
  • 9. E-Commerce in the UNCITRAL Model Law  Objectives of the Model Law: To facilitate rather than regulate electronic commerce To adapt existing legal requirements To provide basic legal validity and raise legal certainty
  • 10. Basic Principles of the Model Law  Functional equivalence  Analyze purposes and functions of paper-based requirements (“writing”, “record”, “signature”, “original”)  Consider criteria necessary to replicate those functions and give electronic data the same level of recognition as information on paper
  • 11. Basic Principles of the Model Law  Media and technology neutrality Equal treatment of paper-based and electronic transactions Equal treatment of different techniques (EDI, e-mail, Internet, telegram, telex, fax)
  • 12. Basic Principles of the Model Law  Party autonomy Primacy of party agreement on whether and how to use e-commerce techniques Parties free to choose security level appropriate for their transactions
  • 13. Core Provisions of the UNCITRAL Model Law  Article 5 (Legal Recognition)  Article 6 (Writing)  Article 7 (Signature)  Article 8 (Original)  Article 9 (Evidence) Recall Indian Laws talk about all these .. We will see ahead
  • 14. Core Provisions of the UNCITRAL Model Law: Article 5 and 5 b is  Information shall not be denied legal effect, validity or enforceability solely because: it is in the form of a data message or It is incorporated by reference
  • 15. Core Provisions of the UNCITRAL Model Law: Article 6 (Writing)  Where the law requires information to be in writing, that requirement is met by a data message if the information contained therein is accessible so as to be usable for subsequent reference.
  • 16. Core Provisions of the UNCITRAL Model Law: Article 7 (Signature)  Legal requirement is met in relation to a data message if:  a method is used to identify the signatory and to indicate his approval of the information contained in the data message; and  that method is as reliable as was appropriate for the purpose for which the data message was generated or communicated.
  • 17. Core Provisions of the UNCITRAL Model Law: Article 8 (Original)  Legal requirement is met by a data message if:  there exists a reliable assurance as to the integrity of the information from the time when it was first generated in its final form, as a data message or otherwise; and information is capable of being displayed to the person to whom it is to be presented.
  • 18. Core Provisions of the UNCITRAL Model Law: Article 9 (Evidence)  In any legal proceedings, nothing in the rules of evidence shall apply so as to deny the admissibility of a data message in evidence solely because it is a data message.
  • 19. Other Provisions of the Model Law  Article 11 (Use of data messages in contract formation)  Article 12 (Non-repudiation)  Article 13 (Attribution of data messages)  Article 14 (Acknowledgement of receipt)  Article 15 (Time and place of dispatch and receipt)  Articles 16 and 17 (Electronic commerce and carriage of goods)
  • 20. Article 15 (Time and place of dispatch and receipt)  A data message is deemed to be sent when it enters an information system outside the control of the originator.
  • 21. Article 15 (Time and place of dispatch and receipt)  A data message is deemed to be received: a) If the addressee has designated an information system to receive the message, when the message enters the designated system; or b) If the message is sent to an information system other than the designated system, when the addressee retrieves the message.
  • 22. Article 15 (Time and place of dispatch and receipt)  If the addressee has not designated an information system, the message is deemed to be received when it enters an information system of the addressee.  Data messages are deemed to be sent at the place where the originator has its place of business and received at the place where the addressee has its place of business.
  • 23. Overview of the Indian law and it’s Deviation from UNCITRAL Model
  • 24. Overview of the Indian law The objectives of the Information Technology Act, as outlined in the preamble, are to • provide legal recognition for E-commerce transactions, facilitate Electronic Governance and • amend the Indian Penal Code, Indian Evidence Act 1872, the Bankers’ Book Evidence Act 1891 and the Reserve Bank of India Act 1934. The Act also establishes a regulatory framework for cyber laws and lays down punishment regimes for different cyber crimes and offences.
  • 25. Overview of the Indian law  Legal recognition for digital signatures.  Electronic governance.  Regulatory framework.  Offences and penalties.
  • 26. Some Deviations in Indian Law  digital signatures and  provisions relating to online contracting.
  • 27. Digital Signatures …. Deviations  Model Law -- Article 7  The Information Technology Act mandates certain technical standards— that is, an asymmetric cryptosystem commonly known as ‘public key encryption’ and ‘hash function’. [Section 3 of the Act]  Certifying Authorities ….
  • 28. Deviations in provisions relating to online contracting.  Model Law -- Article 11  the Indian Information Technology Act does not have any express provision regarding the validity or formation of online contracts.  The Indian Contract Act 1872 deals with the validity of contracts.
  • 29. Deviations in provisions relating to online contracting.  It does not prescribe any particular method for the communication of offer and acceptance.  Thus, there is no requirement of writing for the validity of contracts, except in such cases where the requirement of writing is specifically mandated by law
  • 30. References…..  E-Commerce Law in Developing Countries: An Indian Perspective ; By - C. M. ABHILASH  Raising confidence in E-commerce: the legal framework ; By - UNCITRAL Secretariat, Vienna, Austria