CYBER LAW NOTES (1)
CYBER LAW NOTES (1)
MODULE – 01
(1) EVOLUTION OF CYBER LAW:
INTRODUCTION:
The computer-generated world of internet is known as cyberspace and the laws prevailing
this area are known as Cyber laws and all the users of this space come under the ambit of
these laws as it carries a kind of worldwide jurisdiction. Cyber law can also be described as
that branch of law that deals with legal issues related to use of inter-networked information
technology. In short, cyber law is the law governing computers and the internet.
The growth of Electronic Commerce has propelled the need for vibrant and effective
regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to
the success of Electronic Commerce. All these governing mechanisms and legal structures
come within the domain of Cyber law.
Cyber law is important because it touches almost all aspects of transactions and activities
and on involving the internet, World Wide Web and cyberspace. Every action and reaction
in cyberspace has some legal and cyber legal angles.
CONCEPT OF CYBER SPACE:
Cyberspace refers to the virtual space in which all of IT-mediated communicated and actions
are taking place is often referred to as 'Cyber space'. Cyber space cannot be spatially
located. It is made up of intangible objects, such as your website, blog social networks,
email accounts, personal information and reputation, Cyberspace can be thought of as a
global electronic village with instantaneous communication and no geographical barriers".
CONCEPT OF INFORMATION TECHNOLOGY:
The technology relating to computer systems, their hardware, software and networks,
internet, and various applications running on the internet, is broadly referred to as
information technology of 'IT'. The Oxford Dictionary defines 'IT' as:
"The study or use of computers, telecommunication systems, and other devices for storing,
retrieving and transmitting information."
COMPUTER & WEB TECHNOLOGY:
Computer and Web technologies are fundamental components of the modern digital
landscape, enabling a wide range of activities from personal computing to global
communication and e-commerce.
S2 (1)(i), IT Act: Computer means any electronic, magnetic, optical or other high-speed data
processing device or system which performs logical, arithmetic, and memory functions by
manipulations of electronic, magnetic or optical impulses, and includes all input, output,
processing, storage, computer software or communication facilities which are connected or
related to the computer in a computer system or computer network.
In Whirlpool India Ltd v. Videocon Industries Ltd, the Bombay HC had to look into whether
a washing machine could be considered as a computer? It was observed that a washing
machine with a fuzzy logic system would now be accepted as a computer.
PROLIFERATION OF IT & THE NEED FOR REGULATION OF CYBER SPACE:
The proliferation of 'IT' has resulted in a concomitant proliferation of computer crime and
other forms of unauthorized access to computers, computer systems and computer data.
The protection of the integrity of all types and forms of lawfully created computers,
computer systems, and computer data is vital to the protection of the privacy of individuals
as well as to the well-being of financial institutions, business concerns, governmental
agencies, and others that lawfully utilize those computers, computer systems, and data. The
laws governing the physical world are, however, inept at governing transactions in cyber
space where the subject matter often is an intangible object such as one's email or
Facebook account or website or virtual currency or personal information. The regulation of
the cyber space, thus, requires specialized laws.
Traditional laws pose several constraints in dealing with cyber-crimes:
(i) Jurisdictional Issues:
Cyberspace has no geographic boundaries. A cybercrime may be committed using a
computer system or network located in another country. Where the Indian Penal Code 1860
provides for both territorial and extra-territorial jurisdiction. Its extra-territorial jurisdiction
is limited to offences committed by Indian citizens. This leaves ambiguity in the applicability
of the penal code to cyber offences that may be committed by foreign nationals overseas,
but, in a way their impact is felt in India. This 'transnational' element of cybercrime also
requires greater international cooperation investigation of offences in other countries and
arrest of cybercriminal of other nationalities will require established treaties and special
permissions.
(ii) Inapplicability of Conventional Definitions: Most crimes in cyberspace involve intangible
objects. This creates problems where conventional definitions of crime are involved. For
instance, the definition of trespass requires actual physical entry for conviction.
Constructive entry upon the property is not within the meaning of this section. In the case
of cyber trespass, or hacking where - there is no actual entry into the physical territory
where the computer is located this definition would fail. Similarly, the offence of theft is
made out when there exists an intent to remove for possession. Therefore, for data to be
stolen, it would have to be removed from possession of the owner. If the offender were to
simply copy the data onto a pen drive without erasing or modifying the original data in any
way, then it may not constitute 'theft' under the traditional definition of the term.
(iii) Creation of New Crimes: Cyber space has given birth to several new crimes which are
not recognized by conventional laws. For Example, a website can handle only a fixed
number of viewer or request (for information) at a given point of time. A cyber-criminal an
prevent the website from functioning by overloading it with requests (known as a denial of
service attack). This kind of attack can cause huge losses to an online business, but, there
would be no clear remedy under ordinary law. Similarly, the Act elevates the offence of
denial of access and introducing computer viruses with the intent of striking terror in a
section of people to the status of 'cyber-terrorism" and provides for significant punishment
for the same. Under section 66F the IT Act, the provision relating to cyber-terrorism, is
worded similar to Section 3 of the Prevention of Terrorism Act, 2002.
(iv) Issues with Gathering Evidence: The intangible nature of cyberspace and cybercrime
make traditional methods of gathering evidence inadequate. The 'scene of crime in
cyberspace is completely virtual and so is the object of the crime (data/information),
Additionally, this type of evidence can be modified very easily. For example, a criminal may
set up a program which erases all evidence from the computer if it is accessed by someone
other than himself. In this case, mere access to the computer may erase the evidence.
Therefore specific rules are required for extraction of evidence and maintaining its
authenticity.
(۷) Anonymity of Netizens: A cybercriminal can easily guard his identity. A cybercriminal can
use fake identities or create identify clones, for example. This makes gathering of evidence
difficult.
(vi) Monitoring of Crime: The sheer volume of information involved and being processed
every second makes monitoring and tracking of crime very difficult. Countries like United
States of America, including India, have put in place extensive internet surveillance
programmes to deal with this issue. However, such programmes can also be extremely
invasive in the personal lives of individuals, raising questions regarding the protection of
privacy.
(vii) Evidentiary value of Electronic Information: The extensive use of "IT" for
communication and documentation raised a new question on the admissibility of electronic
evidence. If a person was being stalked online, can copies of e-mails or screenshots of chat
room messages by the stalker be admissible as evidence? The pre-amended Indian Evidence
Act, 1872 recognised only two types of evidence, documentary evidence (i.e., paper based
evidence) and oral evidence (testimonials of witnesses).
(viii) Validity of Online Transactions: Traditional law does not deal with the validity of e-
contracts, digital signatures, e-commerce, etc. For example, is a contract entered into
through e-mails legally valid? Can be enforced in a court of law?
Thus, the need was felt to promulgate specialized laws to provide for the following:
Setting clear standards of behaviour for the use of computer devices;
(ii) Deterring perpetrators and protecting citizens;
(iii) Enabling law enforcement investigations while protecting individual privacy;
(iv) Providing fair and effective criminal justice procedures;
(v) Requiring minimum protection standards in areas such as data handling and retention;
and
(vi) Enabling cooperation between countries in criminal matters involving cybercrime and
electronic evidence.
EVOLUTION OF CYBER LAWS:
A. Early Cyber Laws:
The computer Misuse Act, 1990 of Great Britain
In the case of R.v.Gold & Schifreen (1988) the defendants had gained unauthorized access
to a computer network. The defendants were charged under the Forgery and Counterfeiting
Act, 1981 for 'defrauding by manufacturing a 'false instrument. It was held by the House of
Lords that:
"We have accordingly come to the conclusion that the language of an Act not designed to fit
them produced grave difficulties for both judge and jury which we would not wish to see
repeated. The appellants conduct amounted in essence, already stated, dishonestly gaining
access to the relevant Prestel data bank by a trick. That is not a criminal offence. If it ix
thought desirable to make it so, that is a matter for the legislature rather than the courts."
This judgment brought the possibilities of cyber-crime and the inadequacy of existing laws
to deal with them to the notice of the legislature of Great Britain. It led to the enactment of
the Computer Misuse Act, 1990. This was among the first cyber laws to be enacted. It
recognized the following offences:
(i) Unauthorized access to computer material.
(ii) Unauthorized access with intent to commit or facilitate commission
of further offences.
(iii) Unauthorized acts with intent to impair, or with recklessness as to impairing, operation
of computer, etc.
B. Uniform International Standards for Cyber Law:
UNCITRAL Model Law on Electronic Commerce, 1996 - With the globalisation of business
the international community felt a need for a law which would set uniform standards for
electronic commerce. This led to the adoption of the UNCITRAL Model Law on Electronic
Commerce by the U.N. General Assembly (the Model Law').
C. India's first cyber law:
The Information Technology Act, 2000 - In view of the international recognition of
electronic transactions and its growing use within India, the Indian legislature felt the need
for providing a legal framework for ecommerce and digital signatures. It led to the
enactment of the IT Act, 2000.
D. Uniform International Standards for Cyber Law: UNCITRAL Model Law on Electronic
Commerce, 1996.
With the globalization of business the international community felt a need for a law which
would set uniform standards for electronic commerce. This led to the adoption of the
UNCITRAL Model Law on Electronic Commerce by the U.N. General Assembly (the Model
Law').
This laid down the fundamental principles of e-commerce law:
(i) Non-discrimination: This principle requires the removal of any discrimination between a
physical document and an electronic one. It ensures that the document will not be denied
its' validity/enforceability solely on the grounds of it being in an electronic form.
(ii) Technological neutrality: This principle mandates that the provisions adopted in a law
should be neutral with respect to the technology involved. This ensures that the rapid pace
of development of technology does not lead to the law becoming redundant in no time.
(iii) Functional equivalence: Terms like 'writing', original', 'signed' etc. are specific to paper
based documents. This principle sets out the corresponding criteria for electronic
communication.
(2) INFORMATION TECHNOLOGY ACT, 2000:
In view of the international recognition of electronic transactions and its' growing use within
India, the Indian legislature felt the need for providing a legal framework for e-commerce
and digital signatures. It led to the enactment of India's first cyber legislation: the
information Technology Act, 2000 (the TT Act').
OBJECTIVES OF THE ACT:
(i) To give effect to the U.N. General Assembly's Resoluiton on the Model Law.
(ii) To provide legal recognition to e-commerce-transactions carried out by means of
electronic communication.
(iii) To facilitate electronic filings of documents with government agencies.
(iv) To amend the Indian Penal code, Indian Evidence Act, 1872, the Bankers' Books Evidence
Act, 1891, and the Reserve Bank of India. Act, 1934.
SCOPE OF IT ACT:
(i) To give effect to the U.N. General Assembly's Resolution on the Model Law.
(ii) To recognize filing of forms, issue of licenses, receipt of payment, etc. through electronic
means by the government.
(iii) To lay down rules in relation to electronic records- receipt, time of dispatch, etc.
(iv) To provide for a controller of Certifying Authorities in relation to issue of digital
signature certificates.
(v) To define offences and prescribes panelist.
(vii) To lay down liability of intermediaries.
(viii) To Prescribe extra territorial jurisdiction for cyber offences.
The provisions of this Act are not applicable to the following instruments:
(i) A negotiable instrument.
(ii) A power-of-attorney
(iii) A trust,
(iv) A will, including any other testamentary disposition.
(v) Any contract for the sale or conveyance of immovable property or any interest in such
property, and
(vi) Any such class of documents or transactions as may be notified by the Central
Government in the official Gazette.
IPC, 1860 amended by the Act: (BNSS, 2023):
Definition of electronic record was inserted. Extra-territorial jurisdiction of the IPC was
expanded to include all offences targeting computer resource in India. Sections relating to
false documents were amended to include false electronic records
Indian Evidence Act, 1872 amended: (BSA, 2023):
Definition of evidence was amended to include electronic records. Sections were inserted
with admissibility of e-records, proof and verification of digital signatures and presumptions
as to e-evidence
Banker's Book Evidence Act, 1891:
Definitions of banker's books and certified copies were amended to include data stored in
electronic devices and print outs were also inserted.
RBI Act 1934:
Powers to make regulations were amended to include regulations on fund transfer through
electronic means.
TECHNOLOGY & ITS IMPACTS ON SOCIETY AND POLITICS:
1. Positive impact on society:
A. Improved and quicker communication
B. Improved education and access to learning
C. Mechanised agriculture/labour
D. Easy to access information
2. Negative impact on society:
A. Increase in unemployment due to higher efficiency of machines
B. Increase in pollution, health and mental concerns
C. Increase in cybercrimes
D. Alienation of humans
E. Identity theft, gaming addiction, cyberbullying, defamation
3. Impact on politics:
A. Polarisation of groups: people leaning towards one policy will lean heavily towards it
and not be open to other ideas
B. Skillful use may make it a political weapon - depends on who wields it
C. Leaks and photoshops used to defame
D. Data privacy legislations
E. Tech giants make investments in political parties
GROWTH OF IT:
1. Information technology or IT is essential to the operation of the modern economy,
regardless of the industry.
2. This technology facilitates the transfer of information from one device to another,
making it essential for businesses to invest in it.
3. .Information technology is the use of computer, network and data management
systems to store, process, manipulate and retrieve information.
4. Information technology or IT is an integral component of most business functions,
without which communication and collaboration within and outside businesses and
organisations aren't possible.
SIGNIFICANCE OF IT:
A. Facilitates communication
IT has revolutionised the way people communicate with each other. Due to the Internet,
social media and smart devices, sharing information globally now takes seconds.
B. Improves data storage and management
The information technology industry has also changed the way businesses and individuals
store and manage their data. Due to advances in technology, many businesses now use
digital databases, which take less space, are cheaper to operate and are relatively protected
from physical damage.
C. Protects critical systems
A branch of information technology helps to secure computer systems, networks and
databases. IT security protects infrastructure from attacks and helps retrieve data after
technological disasters.
D. Boosts productivity and efficiency
A major importance of IT is that it helps boost productivity and efficiency. With digital
systems, people can perform tasks faster compared to manual methods.
E. Supports flexible work arrangements
Information technology is also changing how people work by providing the infrastructure to
support flexible arrangements, such as remote work and telecommuting.
FEATURES OF IT ACT:
MODULE – 02
(1) CONSTITUTIONAL & HUMAN RIGHTS ISSUES IN CYBERSPACE:
INTRODUCTION:
Day in and day out we find human rights violations and privacy of an individual is at stake
with the recent advancements in the cyber space. A sincere effort is made to focus on the
asserted boundlessness of cyber space in order to examine how and to what extent the
activities are centred round.
FREEDOM OF SPEECH & EXPRESSION IN CYBER SPACE:
In the case of Indian Express Newspapers (Bombay) Private Ltd. And Ors. v. Union of India,
the Court highlighted that ‘the freedom of expression serves four broad social purposes:
With steady development in the Artificial Intelligence (AI) many software applications like
Facebook, Google etc. have developed which,
collect
store the personal data of the user
can also further process the data for any other purpose.
In the year 2018, the case of Cambridge Analytica has raised the eyes of many states over
the protection of personal data of their citizens.
Information about the data misuse was disclosed in 2018 by Christopher Wylie, a former
Cambridge Analytica employee, in interviews with The Guardian and The New York Times. In
response, Facebook apologised for their role in the data harvesting. CEO Mark Zuckerberg
testified in front of Congress.
There are about 80 countries around the world who have implemented various privacy
policies like,
IT Act, 2000
Digital personal data protection act, 2023
Under S.43A of the IT Act, a body corporate who is
MODULE – 03:
(1) UNCITRAL MODEL LAW:
Uniform International Standards for Cyber Law: UNCITRAL Model Law on Electronic
Commerce, 1996 - With the globalization of business the international community felt a
need for a law which would set uniform standards for electronic commerce. This led to the
adoption of the UNCITRAL Model Law on Electronic Commerce by the U.N. General
Assembly (the Model Law').
This laid down the fundamental principles of e-commerce law:
(1) Non-discrimination: This principle requires the removal of any discrimination between a
physical document and an electronic one. It ensures that the document will not be denied
its' validity/enforceability solely on the grounds of it being in an electronic form.
For example, Article 5 of the Model Law states that the legality of information shall not be
denied merely because it is contained in an electronic document.
(ii) Technological neutrality: This principle mandates that the provisions adopted in a law
should be neutral with respect to the technology involved. This ensures that the rapid pace
of development of technology does not lead to the law becoming redundant in no time.
For examples, Article 7 of the Model Law which lays down rules regarding a valid signature
of an electronic document prescribes a reliable 'method' which is used to indicate that
person's approval. Since the method has not been specified, the rule is not restricted to the
currently accepted method, which is digital signatures, and the law would continue to apply
regardless of any new development.
(iii) Functional equivalence: Terms like 'writing', original', 'signed' etc. are specific to paper
based documents. This principle sets out the corresponding criteria for electronic
communication.
For examples, the law of evidence generally required that the original document should be
presented as evidence. For a paper based document, if would mean a document that was
actually issued, or with original signatures, or which is not a photocopy or fax of another
document. Article 8 describes an original electronic document to be one where the
information if contains is the same as that when it was first generated in its final form.
India's First Cyber Law: The information Technology Act, 2000 This Resolution
recommended that. 'All states give favourable consideration is the UNCITRAL. Model law an
Electronic Commerce when they enact or revise their laws, in view of the need for
uniformity of the law applicable to alternatives to paper based forms of communication and
strange of information'.
(2) ADMISSIBILITY OF E-RECORDS:
According to Section 61 of BSA, electronic or digital records are explicitly deemed
admissible in evidence, challenging any denial solely on the grounds of their electronic
nature. Hence, it can be said that the enforceability of electronic records are at par with
traditional documents. Section 62 of BSA specifies the process for proving the contents of
electronic records in accordance with Section 63.
Conditions for Admissibility:
Section 63 of BSA outlines the conditions that must be satisfied for the admissibility of
electronic records. It states that information contained in an electronic record, when
produced by a computer or communication device, is considered a document. This
electronic document is then admissible in proceedings without requiring the original
document, provided certain conditions are met.
Conditions for Electronic Record Admissibility:
Section 63(2) details the conditions for admissibility of a computer output, which includes:
Section 59 of the IT Act states that all facts, except the contents of electronic
records, can be proved by oral evidence.
Section 65-A of the IT Act provides a special procedure for proving the contents of
electronic records.
Arjun Pandit Rao v. Kailash Kushanrao (July 2020):
Apex court, in a recent judgment, ruled that, it is essential to admit the electronic record as
evidence. The certificate submitted under this provision constitutes particulars of that
electronic records and identity inclusive of authorized signature of a person having official
responsibility in relation to the management and operation of the relevant device.
Anvar P.V. v. P.K. Basheer & Others (2014):
The Apex Court has given a landmark judgment in this case. It had ruled and helped to
resolve the conflicts judgements of various High Courts on the manner of the admissibility
of the Electronic (record) evidence. The Supreme Court ruled that secondary data in
CD/DVD/Pen Drive are admissible only with certificate. Oral evidence cannot prove the
electronic evidence, certificate is essential to prove that. Also, the opinion of the expert
under the act is not an escaping gate to bypass the procedure.
(3) CONCEPT OF PUBLIC & PRIVATE KEY:
Cryptography as a field emphasizes the need to guarantee secure communication and data
privacy. There are mainly two approaches available to perform this operation: – Private Key
Cryptography (RIC or Symmetric Key Cryptography) and Public Key Cryptography (PKE or
Asymmetric Key Cryptography). Although they are used to protect information, they work
differently and have certain benefits and drawbacks. In this article, the key focus is on
understanding the key aspects of a private and public key as well as the advantages and
disadvantages of using them.
Cryptography is the science of secret writing to keep the data secret. Cryptography is
classified into symmetric cryptography, asymmetric cryptography, and hashing.
What is a Private Key?
Private Key Encryption, also termed as symmetric Key Encryption requires the key that is
used to lock and the key used to unlock the message. This key must be kept concealed
between the two communicating entities to have reasonable security.
Advantages of Private Key Encryption:
Speed: These algorithms are faster as compared to asymmetric encryption algorithms and
hence used for encrypting large volumes of data.
Less Computational Power: In another way, it is advantageous since it requires fewer
calculations which makes it suitable for real-time use.
Limitations of Private Key Encryption:
Key Distribution Problem: The first and perhaps the major limitation is how to securely
transfer the said key among the parties. The problem with this event is that the key is
useless if it is intercepted, meaning that the security is lost.
Scalability Issues: That is why as the number of the users raises key management becomes
more complicated and thus it is not very scalable for large systems.
What is Public Key?
Public Key Encryption, or Asymmetric Encryption, involves a pair of keys: There is the public
key that is relatively known and the private key which is kept secret. While the public key
where everyone can get it from the internet is for encoding or encryption, the private key is
employed for decoding, decryption.
Advantages of Public Key Encryption:
Enhanced Security: The application of two keys means that there is no problem of secure
key distribution since with the public key anyone can encrypt the message while the private
key can only be known by the recipient.
Digital Signatures: The use of public key cryptography is employed to back up the concept
of digital signatures hence ensuring true and complete message.
Disadvantages of Public Key Encryption
Slower Performance: Asymmetric algorithms generally are slower and considerably more
resource-hungry as compared to symmetric algorithms.
Complexity: Another disadvantage that has been agreed upon is that the management and
application of public key infrastructure can be complicated.
(4) CRYPTO SYSTEM:
A cryptosystem is a structure or scheme consisting of a set of algorithms that converts
plaintext to ciphertext to encode or decode messages securely. The term cryptosystem is
shorthand for "cryptographic system" and refers to a computer system that employs
cryptography, a method of protecting information and communications with codes so only
those for whom the information is intended can read and process it.
To keep data secure, cryptosystems incorporate the algorithms for key generation,
encryption and decryption techniques. At the heart of cryptographic operations is a
cryptographic key, a string of bits used by a cryptographic algorithm to transform plaintext
into ciphertext or the reverse. The key is part of the variable data provided as input to a
cryptographic algorithm to execute this sort of operation. The cryptographic scheme's
security depends on the security of the keys used.
Cryptosystems are used for sending messages in a secure manner over the internet, such as
credit card information and other private data. In another application of cryptography, a
system for secure email might include methods for digital signatures, cryptographic hash
functions and key management techniques.
Components of a cryptosystem:
A basic cryptosystem includes the following:
Plaintext: Unencrypted information that needs protection.
Ciphertext: The encrypted, or unreadable, version of the plaintext information.
Encryption algorithm: The mathematical algorithm that takes plaintext as the input and
encrypts to ciphertext. It also produces the unique encryption key for that text.
Decryption algorithm: The mathematical algorithm that takes ciphertext as the input and
decodes it into plaintext. It also uses the unique decryption key for that text.
Encryption key: The value known to the sender that is used to compute the ciphertext for
the given plaintext.
Decryption key: The value known to the receiver that is used to decode the given ciphertext
into plaintext.
Types of cryptosystems:
Cryptosystems are categorized by the method they use to encrypt data, either
symmetrically or asymmetrically.
Symmetric key encryption:
The cryptosystem uses the same key for both encryption and decryption. In this method,
keys are shared with both parties prior to transmission and are changed regularly to prevent
any system attacks.
Asymmetric key encryption:
The cryptosystem uses different keys for encryption and decryption. The keys are
mathematically related, however. In this method, each party has its own pair of keys that is
exchanged during transmission.
(5) HASH FUNCTION:
Hash functions are used in digital signatures to guarantee the integrity of an electronic
record. It has been defined under the explanation to S.3 of the Act which is as follows:
"Hash function" means an algorithm mapping or translation of one sequence of bits into
another, generally smaller, set known as "Hash Result" such that an electronic record yields
the same hash result every time the algorithm is executed with the same electronic record
as its input making it computationally infeasible.
to drive or reconstruct the original electronic record from the hash result produced
by the algorithm
that two electronic records can produce the same result using the algorithm.
The hash function uses a method that is very similar to the process of encryption used in the
asymmetric crypto system. It consists of a simpler form of encoding and decoding that
converts information of one length to information of a smaller length using a mathematical
algorithm. For a given hash function, the smaller length to which the information is to be
converted is fixed. This means that a given 'hash function' will always produce a hash result
of the same length, regardless of the length of the information to which it is applied.
Therefore, the hash function consists of many translations in comparison with encryption,
which uses a 1:1 translation. Even a slight change in the document will produce a
completely different hash result. Therefore, the application of a hash function to an
electronic record produces a hash result that is completely unique to the record. This
guarantees the integrity of the document, since, even the slightest modification to the
document can be detected by an application the same has function to the information.
Another important feature of a hash result is that unlike in encryption, a hash result cannot
be 'decrypted to produce the original result. This guarantees the confidentiality of a
message that is sent, ensuing that no person who obtains access to the hash result of a
document will be able to derive the original information from it.
To sign any electronic record or any other piece of information, the person who is
signing first has to apply the hash function in the signer’s software (It is a function
used to map data of an arbitrary size into data of a fixed size). Values returned by
this function are known as hash codes, digests or hash values.
This function computes a hash result of standard length unique to the record present
electronically.
Signer’s software will convert this hash result using the private key of the signer in a
digital signature.
The resulting Digital Signature will be unique to both electronic record and also the
private key used to create the digital signature.
This Digital Signature will be attached to its electronic record and stored or
transmitted with the Digital Signature’s electronic record.
Verification of a Digital Signature:
Recipient will receive the Digital Signature and the original message. After it the following
two steps have to be followed:
By applying the hash result a new message digest is to be recovered from the
original message.
Signer’s public key will be applied to the digital signature which the recipient
receives and as the outcome of it another message digest will be recovered.
And if both the message digests prove to be identical it will conclude that the
message has not been altered.
Rule 5 of Information Technology (Certifying Authorities) Rules, 2000 talks about the
method of verification of a digital signature:
“The verification of a Digital Signature shall be attained by computing a new hash result of
the original electronic record by means of a hash function used to create a Digital Signature
and by using the new hash result and the public key”.
Digital Signature Certificate (DSC):
It is a method to prove the electronic document’s authenticity and can be presented
electronically to access information, to prove the identity or sign the documents digitally.
Controller of Certifying Authorities appointed by the Central Government grants a license to
the Certifying Authorities in order to issue digital signature certificates to subscriber. A
Digital Signature Certificate is valid up to a maximum of three years period.
Elements of DSC:
Under this rule, the affixation of a digital signature involves two steps:
Creation and
Verification.
This is done using cryptography, which involves the conversion of the message into an
unintelligible form and vice-versa. The method of cryptography that is adopted here is
'public key cryptography, which involves two keys, one which converts the information into
an unintelligible form, and the other which reconverts it into the original form. The first key,
the private key, creates the digital signature, while the second, the public key, verifies it. The
explanation defines "asymmetric cryptography to refer to the computer software and
equipment which is involved with the use of the public key cryptography.
Creation of Digital Signature - Rule 3 of the CA Rules describes the process of creation of
the digital signature.
Transmission of the Record:
The process of transmission of the electronic record is described in the last part of
Rule 4 of the CA Rules.
After the digital signature is created, it is attached to the original electronic record.
Thereafter, both the original electronic record in plain text and the digital signature
are transmitted to the recipient.
Verification of Digital Signature:
Rule 5 of the CA Rules describes the process of verification of a digital signature:
"The verification of a Digital Signature shall be accomplished by computing a new hash
result of the original electronic record by means of the hash function used to create a Digital
Signature and by using the public key and the new hash result, the verifier shall check-
(i) if the Digital Signature was created using the corresponding private key, and
(ii) if the newly computed hash result matches the original result which was transformed
into Digital Signature during the singing process.
Upon receipt of the digital signature and the original record, the recipient will need
to verify the digital signature. For this purpose, the public key will have to be made
available to the recipient, either, prior to sending the digital signature, or along with
the record with the digital signature, or made publicity available for use by any
recipient.
The Process of verification involves the following steps:
- Creation of a New Hash Result: The first step in the process of verification is the
application of the same hash function to the electronic record received by the recipient. This
results in the creation of a new hash result.
- Application of Public Key: Thereafter, the public key will be applied to the digital
signature that is attached with the electronic record received. This application will decrypt
the cipher text, to produce the hash result that was generated by the sender. The successful
application of the public key to produce the hash result indicates that the digital signature
was indeed created by the application of the sender's corresponding private key.
- Comparison of the Hash Results: The next step is the comparison of the hash result
obtained by the recipient with the hash result obtained by the sender. Electronic records
can very easily be modified or tampered with once in transit As mentioned earlier, even a
slight change in the document will produce a completely different hash result; thus,
indicating that the electronic document has been compromised with. On the other hand,
the obtaining of a hash function that is identical to the one obtained by the sender indicates
that the record received by the recipient was identical to the one that was sent by the
sender.
- A comparison of the hash result therefore, completes the verification of the digital
signature. With this, the process of authentication of the electronic record is complete.
Process of Authentication by a Digital Signature:
The steps for the affixation of a digital signature under S.3 of the Act read with Rules 3, 4
and 5 of the CA Rules can therefore be summarised as follows:
A digital signature, therefore, guarantees the following with respect to the record:
Authenticity:
The asymmetric crypto system guarantees the authenticity of the source of the electronic
document, i.e., it guarantees that the document was sent by the sender himself. Since the
private key is known only to the subscriber, the affixation of the digital signature onto the
document is evidence that it was affixed by the subscriber and no one else.
Non-repudiation:
The asymmetric crypto system also guarantees non- repudiation of the document, i.e., once
the digital signature has been affixed by the sender and verified by the recipient, the sender
cannot deny having sent the document.
Integrity:
The hash function guarantees the integrity of the record, i.e., the record has not been
altered while being transmitted to the recipient.
if the addressee has designated a computer resource for the purpose of receiving
electronic records.
if the addressee has not designated a computer resource along with specified
timings, if any, receipt occurs when the electronic record enters the computer
resource of the addressee.
(3) Save as otherwise agreed to between the originator and the addressee, an
electronic record is deemed to be dispatched at the place where the originator has his place
of business, and is deemed to be received at the place where the addressee has his place of
business.
(4) The provisions of sub-section (2) shall apply notwithstanding that the place where
the computer resource is located may be different from the place where the electronic
record is deemed to have been received under sub-section (3).
(9) ELECTRONIC HEALTH RECORDS:
The Ministry of Health and Family Welfare notified the Electronic Health Record (EHR)
Standards for India in September 2013. ‘Electronic Health Record’ is a collection of various
medical records that are generated during any clinical encounters or events. It is a digitised
version of the patient’s medical history and contains patient-centred information in real-
time and is easily accessible to medical professionals.
S.3(21) of the Personal Data Protection Bill 2019 defines ‘health data’ as related to the
state of physical or mental health of the data principal.
Such electronic health records can collectively provide a summary of the various healthcare
events in the life of a person digitally which is a much better option to avoid all hassles
arising from tons of paperwork. Such a system is created with the aim that any person can
go to any health service provider/practitioner, any diagnostic centre or any pharmacy and
be able to access and have fully integrated health records in electronic format at any time.
Apart from this, there are many benefits for the collection of medical records such as
evidence-based care,
increasingly faster and accurate diagnosis,
avoid repetition of unnecessary tests,
improved health policy decisions,
improved personal and public health
The government has also introduced the Digital Information Security in Healthcare Act
(DISHA) which aims to standardise and regulate the process related to storing, transmission
and use of ‘digital health data’ to ensure
A. reliability,
B. data privacy,
C. confidentiality and
D. security of digital health data along with the establishment of ‘National Digital
Health Authority’ and ‘Health Information Exchanges’.
In Balu Gopalakrishnan v. State of Kerala, the Kerala High Court while dealing with the
protection of the personal data of individuals who were COVID-19 positive passed an
interim order focusing on the breach of confidentiality issue. It stated that it is the duty of
the state government that all the information must be anonymized before sharing it with
the third party and the specific consent of the citizens is a must.
In Indian Medical Association v. V.P. Shanta, the Supreme Court held that medical services
would come within the purview of the Consumer Protection Act, 2019. Therefore, the
Negligence of the hospital or the doctor's lack of due care in maintaining electronic records
could be made liable under the nuances of the Consumer Protection Act, 2019.
(10) E-GOVERNANCE & E-RECORDS:
Chapter III of the IT Act deals with Electronic Governance. It is from S4 to S10A
S4: Legal recognition of electronic records:
Where any law provides that information or any other matter shall be in writing or in the
typewritten or printed form, then, notwithstanding anything contained in such law, such
requirement shall be deemed to have been satisfied if such information or matter is–
(a) rendered or made available in an electronic form; and
(b) accessible so as to be usable for a subsequent reference.
S6: Use of electronic records and electronic signatures in Government and its agencies:
S7: Retention of electronic records:
S7A: Audit of documents, etc., maintained in electronic form:
Where in any law for the time being in force, there is a provision for audit of documents,
records or information, that provision shall also be applicable for audit of documents,
records or information processed and maintained in the electronic form
S10A: Validity of contracts formed through electronic means:
Where in a contract formation, the communication of proposals, the acceptance of
proposals, the revocation of proposals and acceptances, as the case may be, are expressed
in electronic form or by means of an electronic records, such contract shall not be deemed
to be unenforceable solely on the ground that such electronic form or means was used for
that purpose
(11) EVIDENTARY VALUE OF E-RECORDS (SECTION.04):
Electronic records per S.2(1)(t) means: data, record or data generated, image or sound
stored, received or sent in an electronic form or microfilm or computer generated
microfiche. S.4 of the IT act gives legal recognition for electronic records