SlideShare una empresa de Scribd logo
1 de 31
UNCITRAL
Model Law
Rahul Gurnani
CDAC Certified Cyber Security Professional
MS Cyber Law & Information Security ,
Indian Institute of Information Technology-Allahabad
UNCITRAL Adopted on 30 January 1997
UNCITRAL : What is it ?
Why should we be aware about it ?
 Following the United Nations Commission on International
Trade Law (UNCITRAL) Model Law on E-Commerce, the
Government of India enacted the Information Technology Act in
June 2000.
 The Act facilitates E-commerce and E-Governance in the
country. The Act also establishes a regulatory framework and
lays down punishment regimes for different cyber crimes and
offences.
UNCITRAL : What is it ?
Why should we be aware about it ?
 Adopted on 30 January 1997
 It recommends inter alia that all States give
favorable consideration to the Model law when
they enact or revise their laws in view of the
need for uniformity of the law applicable to
alternatives to paper-cased methods of
communication and storage of information.
UNCITRAL : What is it ?
Why should we be aware about it ?
 Recognizing the necessity to give effect to
the Resolution, and
 with an objective of promoting efficient
delivery of government services by means
of reliable electronic records,
the Government of India enacted the
Information Technology Act in June 2000.
The UNCITRAL model law:
background
 in many countries the existing legislation governing
communication and storage of information were
inadequate or outdated because they did not
contemplate the use of electronic commerce. …
 many countries lacked in legislations for dealing
with E-commerce as a whole results in uncertainty
as to the legal nature and validity of information
presented in a form other than a traditional paper
document.…
 Inadequate legislation at the national level created
obstacles to international trade.
The UNCITRAL model law:
background
 The purpose of Model law was to offer National
legislators a set of internationally accepted rules as
to
 how a number of such legal obstacles may be
removed, and
 how a more secure legal environment may be
created for what has become known as electronic
commerce.…
What UNCITRAL Says ?
E-Commerce in the UNCITRAL
Model Law
 Objectives of the Model Law:
To facilitate rather than regulate electronic
commerce
To adapt existing legal requirements
To provide basic legal validity and raise
legal certainty
Basic Principles of the Model Law
 Functional equivalence
 Analyze purposes and functions of paper-based
requirements (“writing”, “record”, “signature”,
“original”)
 Consider criteria necessary to replicate those
functions and give electronic data the same level
of recognition as information on paper
Basic Principles of the Model Law
 Media and technology neutrality
Equal treatment of paper-based and
electronic transactions
Equal treatment of different
techniques (EDI, e-mail, Internet,
telegram, telex, fax)
Basic Principles of the Model Law
 Party autonomy
Primacy of party agreement on
whether and how to use e-commerce
techniques
Parties free to choose security level
appropriate for their transactions
Core Provisions of the UNCITRAL
Model Law
 Article 5 (Legal Recognition)
 Article 6 (Writing)
 Article 7 (Signature)
 Article 8 (Original)
 Article 9 (Evidence)
Recall Indian Laws
talk about all these
.. We will see
ahead
Core Provisions of the UNCITRAL Model
Law: Article 5 and 5 b is
 Information shall not be denied legal
effect, validity or enforceability solely
because:
it is in the form of a data message or
It is incorporated by reference
Core Provisions of the UNCITRAL
Model Law: Article 6 (Writing)
 Where the law requires information to
be in writing, that requirement is met by
a data message if the information
contained therein is accessible so as to
be usable for subsequent reference.
Core Provisions of the UNCITRAL
Model Law: Article 7 (Signature)
 Legal requirement is met in relation to a
data message if:
 a method is used to identify the signatory and
to indicate his approval of the information
contained in the data message; and
 that method is as reliable as was appropriate
for the purpose for which the data message
was generated or communicated.
Core Provisions of the UNCITRAL
Model Law: Article 8 (Original)
 Legal requirement is met by a data
message if:
 there exists a reliable assurance as to the
integrity of the information from the time when
it was first generated in its final form, as a data
message or otherwise; and information is
capable of being displayed to the person to
whom it is to be presented.
Core Provisions of the UNCITRAL
Model Law: Article 9 (Evidence)
 In any legal proceedings, nothing in the
rules of evidence shall apply so as to
deny the admissibility of a data
message in evidence solely because it
is a data message.
Other Provisions of the Model Law
 Article 11 (Use of data messages in contract
formation)
 Article 12 (Non-repudiation)
 Article 13 (Attribution of data messages)
 Article 14 (Acknowledgement of receipt)
 Article 15 (Time and place of dispatch and receipt)
 Articles 16 and 17 (Electronic commerce and
carriage of goods)
Article 15 (Time and place of
dispatch and receipt)
 A data message is deemed to be sent
when it enters an information system
outside the control of the originator.
Article 15 (Time and place of
dispatch and receipt)
 A data message is deemed to be received:
a) If the addressee has designated an information
system to receive the message, when the message
enters the designated system; or
b) If the message is sent to an information system
other than the designated system, when the
addressee retrieves the message.
Article 15 (Time and place of
dispatch and receipt)
 If the addressee has not designated an
information system, the message is deemed
to be received when it enters an information
system of the addressee.
 Data messages are deemed to be sent at the
place where the originator has its place of
business and received at the place where the
addressee has its place of business.
Overview of the Indian law
and it’s
Deviation from UNCITRAL Model
Overview of the Indian law
The objectives of the Information Technology Act, as
outlined in the preamble, are to
• provide legal recognition for E-commerce transactions,
facilitate Electronic Governance and
• amend the Indian Penal Code, Indian Evidence Act 1872,
the Bankers’ Book Evidence Act 1891 and the Reserve
Bank of India Act 1934.
The Act also establishes a regulatory framework for cyber
laws and lays down punishment regimes for different cyber
crimes and offences.
Overview of the Indian law
 Legal recognition for digital signatures.
 Electronic governance.
 Regulatory framework.
 Offences and penalties.
Some Deviations in Indian Law
 digital signatures and
 provisions relating to online
contracting.
Digital Signatures …. Deviations
 Model Law -- Article 7
 The Information Technology Act mandates certain
technical standards—
that is, an asymmetric cryptosystem commonly known as
‘public key encryption’ and ‘hash function’. [Section 3 of
the Act]
 Certifying Authorities ….
Deviations in provisions relating to
online contracting.
 Model Law -- Article 11
 the Indian Information Technology Act does not
have any express provision regarding the
validity or formation of online contracts.
 The Indian Contract Act 1872 deals with the
validity of contracts.
Deviations in provisions relating to
online contracting.
 It does not prescribe any particular method
for the communication of offer and
acceptance.
 Thus, there is no requirement of writing for
the validity of contracts, except in such
cases where the requirement of writing is
specifically mandated by law
References…..
 E-Commerce Law in Developing Countries: An
Indian Perspective ;
By - C. M. ABHILASH
 Raising confidence in E-commerce: the legal
framework ;
By - UNCITRAL Secretariat, Vienna, Austria
Roots of Indian IT ACT 2000-  UNCITRAL

Más contenido relacionado

La actualidad más candente

Torts in Private international law
Torts in Private international lawTorts in Private international law
Torts in Private international lawcarolineelias239
 
Validity of marriage formal validity
Validity of marriage  formal validityValidity of marriage  formal validity
Validity of marriage formal validityKanchan40
 
Streamlining section 125, crpc on maintenance
Streamlining section 125, crpc on maintenanceStreamlining section 125, crpc on maintenance
Streamlining section 125, crpc on maintenancemohakumar
 
Basics of Natural school of Jurisprudence
Basics of Natural school of JurisprudenceBasics of Natural school of Jurisprudence
Basics of Natural school of Jurisprudenceanjalidixit21
 
Extenal aids to construction of Law
Extenal aids to construction of LawExtenal aids to construction of Law
Extenal aids to construction of LawTejas Shah
 
Movable Property in Private International Law
Movable Property in Private International LawMovable Property in Private International Law
Movable Property in Private International Lawcarolineelias239
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspaceDr. Arun Verma
 
Code of civil procedure 1908 miscellaneous, interest,cost, exemption from app...
Code of civil procedure 1908 miscellaneous, interest,cost, exemption from app...Code of civil procedure 1908 miscellaneous, interest,cost, exemption from app...
Code of civil procedure 1908 miscellaneous, interest,cost, exemption from app...Dr. Vikas Khakare
 
7118910 interpretation-of-statutes
7118910 interpretation-of-statutes7118910 interpretation-of-statutes
7118910 interpretation-of-statutesAditya Singh
 
Code of civil procedure 1908 res subjudice and res judicata
Code of civil procedure 1908 res subjudice and res judicataCode of civil procedure 1908 res subjudice and res judicata
Code of civil procedure 1908 res subjudice and res judicataDr. Vikas Khakare
 
Domicile of special categories and dependents in Private international law
Domicile of special categories and dependents in Private international lawDomicile of special categories and dependents in Private international law
Domicile of special categories and dependents in Private international lawcarolineelias239
 
Enforceability of foreign_judgments_and_foreign_awards
Enforceability of foreign_judgments_and_foreign_awardsEnforceability of foreign_judgments_and_foreign_awards
Enforceability of foreign_judgments_and_foreign_awardsLegalServicesDelhi
 
The concept of Marriage under Private International Law
The concept of Marriage under Private International LawThe concept of Marriage under Private International Law
The concept of Marriage under Private International Lawcarolineelias239
 
Law as an instrument of social change | Law and Social Transformation
Law as an instrument of social change | Law and Social TransformationLaw as an instrument of social change | Law and Social Transformation
Law as an instrument of social change | Law and Social TransformationNishkaPrajapati
 
Immovable Property in Private international Law
Immovable Property in Private international LawImmovable Property in Private international Law
Immovable Property in Private international Lawcarolineelias239
 
Rules of statutory Interpretation
Rules of statutory Interpretation Rules of statutory Interpretation
Rules of statutory Interpretation sundarsasane
 

La actualidad más candente (20)

Torts in Private international law
Torts in Private international lawTorts in Private international law
Torts in Private international law
 
Validity of marriage formal validity
Validity of marriage  formal validityValidity of marriage  formal validity
Validity of marriage formal validity
 
Streamlining section 125, crpc on maintenance
Streamlining section 125, crpc on maintenanceStreamlining section 125, crpc on maintenance
Streamlining section 125, crpc on maintenance
 
Basics of Natural school of Jurisprudence
Basics of Natural school of JurisprudenceBasics of Natural school of Jurisprudence
Basics of Natural school of Jurisprudence
 
Extenal aids to construction of Law
Extenal aids to construction of LawExtenal aids to construction of Law
Extenal aids to construction of Law
 
Movable Property in Private International Law
Movable Property in Private International LawMovable Property in Private International Law
Movable Property in Private International Law
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Code of civil procedure 1908 miscellaneous, interest,cost, exemption from app...
Code of civil procedure 1908 miscellaneous, interest,cost, exemption from app...Code of civil procedure 1908 miscellaneous, interest,cost, exemption from app...
Code of civil procedure 1908 miscellaneous, interest,cost, exemption from app...
 
7118910 interpretation-of-statutes
7118910 interpretation-of-statutes7118910 interpretation-of-statutes
7118910 interpretation-of-statutes
 
Code of civil procedure 1908 res subjudice and res judicata
Code of civil procedure 1908 res subjudice and res judicataCode of civil procedure 1908 res subjudice and res judicata
Code of civil procedure 1908 res subjudice and res judicata
 
Domicile of special categories and dependents in Private international law
Domicile of special categories and dependents in Private international lawDomicile of special categories and dependents in Private international law
Domicile of special categories and dependents in Private international law
 
Doctrin of Renvoi
Doctrin of RenvoiDoctrin of Renvoi
Doctrin of Renvoi
 
Enforceability of foreign_judgments_and_foreign_awards
Enforceability of foreign_judgments_and_foreign_awardsEnforceability of foreign_judgments_and_foreign_awards
Enforceability of foreign_judgments_and_foreign_awards
 
The concept of Marriage under Private International Law
The concept of Marriage under Private International LawThe concept of Marriage under Private International Law
The concept of Marriage under Private International Law
 
UNCITRAL_BY_AVINASH_MURKUTE
UNCITRAL_BY_AVINASH_MURKUTEUNCITRAL_BY_AVINASH_MURKUTE
UNCITRAL_BY_AVINASH_MURKUTE
 
Law as an instrument of social change | Law and Social Transformation
Law as an instrument of social change | Law and Social TransformationLaw as an instrument of social change | Law and Social Transformation
Law as an instrument of social change | Law and Social Transformation
 
Immovable Property in Private international Law
Immovable Property in Private international LawImmovable Property in Private international Law
Immovable Property in Private international Law
 
Estoppel and Its Kind
Estoppel and Its KindEstoppel and Its Kind
Estoppel and Its Kind
 
E contract
E  contractE  contract
E contract
 
Rules of statutory Interpretation
Rules of statutory Interpretation Rules of statutory Interpretation
Rules of statutory Interpretation
 

Similar a Roots of Indian IT ACT 2000- UNCITRAL

Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptxLaw & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptxssuser32bd0c
 
Industrial revolution and notions of technology .pptx
Industrial revolution and notions of technology .pptxIndustrial revolution and notions of technology .pptx
Industrial revolution and notions of technology .pptxVishweshSingh16
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008Mohit Goswami
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in indiaatuljaybhaye
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...Rajesh Sakhare
 

Similar a Roots of Indian IT ACT 2000- UNCITRAL (20)

Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptxLaw & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptx
 
Industrial revolution and notions of technology .pptx
Industrial revolution and notions of technology .pptxIndustrial revolution and notions of technology .pptx
Industrial revolution and notions of technology .pptx
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in india
 
It act 2000
It act 2000It act 2000
It act 2000
 
Manoj 1
Manoj 1Manoj 1
Manoj 1
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Cyber Law and Cyber Crime
Cyber Law and Cyber Crime Cyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 
The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...The government of india enacted its information technology act 2000 with the ...
The government of india enacted its information technology act 2000 with the ...
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Último (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Roots of Indian IT ACT 2000- UNCITRAL

  • 1. UNCITRAL Model Law Rahul Gurnani CDAC Certified Cyber Security Professional MS Cyber Law & Information Security , Indian Institute of Information Technology-Allahabad
  • 2. UNCITRAL Adopted on 30 January 1997
  • 3. UNCITRAL : What is it ? Why should we be aware about it ?  Following the United Nations Commission on International Trade Law (UNCITRAL) Model Law on E-Commerce, the Government of India enacted the Information Technology Act in June 2000.  The Act facilitates E-commerce and E-Governance in the country. The Act also establishes a regulatory framework and lays down punishment regimes for different cyber crimes and offences.
  • 4. UNCITRAL : What is it ? Why should we be aware about it ?  Adopted on 30 January 1997  It recommends inter alia that all States give favorable consideration to the Model law when they enact or revise their laws in view of the need for uniformity of the law applicable to alternatives to paper-cased methods of communication and storage of information.
  • 5. UNCITRAL : What is it ? Why should we be aware about it ?  Recognizing the necessity to give effect to the Resolution, and  with an objective of promoting efficient delivery of government services by means of reliable electronic records, the Government of India enacted the Information Technology Act in June 2000.
  • 6. The UNCITRAL model law: background  in many countries the existing legislation governing communication and storage of information were inadequate or outdated because they did not contemplate the use of electronic commerce. …  many countries lacked in legislations for dealing with E-commerce as a whole results in uncertainty as to the legal nature and validity of information presented in a form other than a traditional paper document.…  Inadequate legislation at the national level created obstacles to international trade.
  • 7. The UNCITRAL model law: background  The purpose of Model law was to offer National legislators a set of internationally accepted rules as to  how a number of such legal obstacles may be removed, and  how a more secure legal environment may be created for what has become known as electronic commerce.…
  • 9. E-Commerce in the UNCITRAL Model Law  Objectives of the Model Law: To facilitate rather than regulate electronic commerce To adapt existing legal requirements To provide basic legal validity and raise legal certainty
  • 10. Basic Principles of the Model Law  Functional equivalence  Analyze purposes and functions of paper-based requirements (“writing”, “record”, “signature”, “original”)  Consider criteria necessary to replicate those functions and give electronic data the same level of recognition as information on paper
  • 11. Basic Principles of the Model Law  Media and technology neutrality Equal treatment of paper-based and electronic transactions Equal treatment of different techniques (EDI, e-mail, Internet, telegram, telex, fax)
  • 12. Basic Principles of the Model Law  Party autonomy Primacy of party agreement on whether and how to use e-commerce techniques Parties free to choose security level appropriate for their transactions
  • 13. Core Provisions of the UNCITRAL Model Law  Article 5 (Legal Recognition)  Article 6 (Writing)  Article 7 (Signature)  Article 8 (Original)  Article 9 (Evidence) Recall Indian Laws talk about all these .. We will see ahead
  • 14. Core Provisions of the UNCITRAL Model Law: Article 5 and 5 b is  Information shall not be denied legal effect, validity or enforceability solely because: it is in the form of a data message or It is incorporated by reference
  • 15. Core Provisions of the UNCITRAL Model Law: Article 6 (Writing)  Where the law requires information to be in writing, that requirement is met by a data message if the information contained therein is accessible so as to be usable for subsequent reference.
  • 16. Core Provisions of the UNCITRAL Model Law: Article 7 (Signature)  Legal requirement is met in relation to a data message if:  a method is used to identify the signatory and to indicate his approval of the information contained in the data message; and  that method is as reliable as was appropriate for the purpose for which the data message was generated or communicated.
  • 17. Core Provisions of the UNCITRAL Model Law: Article 8 (Original)  Legal requirement is met by a data message if:  there exists a reliable assurance as to the integrity of the information from the time when it was first generated in its final form, as a data message or otherwise; and information is capable of being displayed to the person to whom it is to be presented.
  • 18. Core Provisions of the UNCITRAL Model Law: Article 9 (Evidence)  In any legal proceedings, nothing in the rules of evidence shall apply so as to deny the admissibility of a data message in evidence solely because it is a data message.
  • 19. Other Provisions of the Model Law  Article 11 (Use of data messages in contract formation)  Article 12 (Non-repudiation)  Article 13 (Attribution of data messages)  Article 14 (Acknowledgement of receipt)  Article 15 (Time and place of dispatch and receipt)  Articles 16 and 17 (Electronic commerce and carriage of goods)
  • 20. Article 15 (Time and place of dispatch and receipt)  A data message is deemed to be sent when it enters an information system outside the control of the originator.
  • 21. Article 15 (Time and place of dispatch and receipt)  A data message is deemed to be received: a) If the addressee has designated an information system to receive the message, when the message enters the designated system; or b) If the message is sent to an information system other than the designated system, when the addressee retrieves the message.
  • 22. Article 15 (Time and place of dispatch and receipt)  If the addressee has not designated an information system, the message is deemed to be received when it enters an information system of the addressee.  Data messages are deemed to be sent at the place where the originator has its place of business and received at the place where the addressee has its place of business.
  • 23. Overview of the Indian law and it’s Deviation from UNCITRAL Model
  • 24. Overview of the Indian law The objectives of the Information Technology Act, as outlined in the preamble, are to • provide legal recognition for E-commerce transactions, facilitate Electronic Governance and • amend the Indian Penal Code, Indian Evidence Act 1872, the Bankers’ Book Evidence Act 1891 and the Reserve Bank of India Act 1934. The Act also establishes a regulatory framework for cyber laws and lays down punishment regimes for different cyber crimes and offences.
  • 25. Overview of the Indian law  Legal recognition for digital signatures.  Electronic governance.  Regulatory framework.  Offences and penalties.
  • 26. Some Deviations in Indian Law  digital signatures and  provisions relating to online contracting.
  • 27. Digital Signatures …. Deviations  Model Law -- Article 7  The Information Technology Act mandates certain technical standards— that is, an asymmetric cryptosystem commonly known as ‘public key encryption’ and ‘hash function’. [Section 3 of the Act]  Certifying Authorities ….
  • 28. Deviations in provisions relating to online contracting.  Model Law -- Article 11  the Indian Information Technology Act does not have any express provision regarding the validity or formation of online contracts.  The Indian Contract Act 1872 deals with the validity of contracts.
  • 29. Deviations in provisions relating to online contracting.  It does not prescribe any particular method for the communication of offer and acceptance.  Thus, there is no requirement of writing for the validity of contracts, except in such cases where the requirement of writing is specifically mandated by law
  • 30. References…..  E-Commerce Law in Developing Countries: An Indian Perspective ; By - C. M. ABHILASH  Raising confidence in E-commerce: the legal framework ; By - UNCITRAL Secretariat, Vienna, Austria