Sie sind auf Seite 1von 31

E- Tendering

the electronic publishing, communicating, accessing, receiving


and submitting of all tender related information and
documentation via the internet, thereby replacing the
traditional paperbased tender processes, and achieving a
more efficient and effective business process for all party
involved.
Chained and timestamped contract terms and its negotiations,
and tendering activities will improve the system reliability,
reduce disputes, and increase individual accountability.
This can be designed to automatically generate legally
admissible time sequenced evidence for formal report writing,
and to draw up formal contract evidence.
Access control and security audit trails increase system
security for accountability. Etendering systems can also
formalise the tendering process to overcome staff discipline

Users in the etendering system are the principal, tenderers


and trusted third parties. Electronic media are communication
media and databases.
The major actions involved in etendering are documentation,
assessment, document handling and communications.

Advantages for contracting authorities

Advantages for tenderers

Larger target group accessible


Integration in procurement software
Format of document isnt disrupted
Electronic document dispatch
Automated notification of changes to
tenderers
Reduced handling and processing costs

Easier access to and greater quantity


of announcements
More rapid receipt of award
documents
Format of document isnt disrupted
Integration in spreadsheet software
Reduced handling and processing
costs

Out of many issues, the term digital signature play an important role in e-contract.

Any subscriber may authenticate an electronic record by affixing his digital


signature.
It means "authentication of any electronic record by a subscriber by means of an
electronic method or procedure in accordance with the provisions of section 2(q) of
the Information Technology Act of 2000.
The Affixing "digital signature" with its grammatical sense and cognate meaning
refers to the adoption of any methodology and procedure by a person for the
purpose of authenticating an electronic record by means of digital signature as
provided in section 2(1)(d) of the Information Technology Act of 2000.
According to this provision any person by use of public key of subscriber can verify
the electronic record and according the private key and the public key are unique to
the subscriber and constitutes a functioning key pair.

This technique is similar to locker key in a bank. The customer keeps 'private key'
and bank manager keeps public key. The locker does not open unless both the keys
do not match.
Any person by use of public key of subscriber can verify the electronic record and
according the private key and the public key are unique to the subscriber and
constitutes a functioning key pair.

Section 40. Generating key pair.-Where any Digital Signature Certificate, the
public key of which corresponds to the private key of that subscriber which is to
be listed in the Digital Signature Certificate has been accepted by a subscriber,
the subscriber shall generate that key pair by applying the security procedure.
Section 41. Acceptance of digital signature certificate.-(1) A subscriber shall be
deemed to have accepted a Digital Signature Certificate if he publishes or
authorises the publication of a Digital Signature Certificate(a) to one or more persons;
(b) in a repository; or
otherwise demonstrates his approval of the Digital Signature Certificate in any
manner.
(2) By accepting a Digital Signature Certificate the Subscriber certifies to all who
reasonably rely on the information contained in the Digital Signature Certificate
that(a) the subscriber holds the private key corresponding to the public key listed in
the Digital Signature Certificate and is entitled to hold the same;

(b) all representations made by the subscriber to the Certifying Authority and all
material relevant to the information contained in the Digital Signature Certificate
are true;
(c) all information in the Digital Signature Certificate that is within the knowledge
of the subscriber is true.
Section 42. Control of private keys.-(l) Every subscriber shall exercise reasonable
care to retain control of the private key corresponding to the public key listed in
his Digital Signature Certificate and take all steps to prevent its disclosure.
2) If the private key corresponding to the public key listed in the Digital Signature
Certificate has been compromised, then, the subscriber shall communicate the
same without any delay to the Certificate Authority in such manner as may be
specified, by the regulations.

Who Issues Digital Certificates?


Certifying Authority (CA) issues the digital certificates
There are 7 CAs in India who in turn report to the Controller of Certifying
Authorities (CCA)
The licensed CAs in India are:

Safescrypt
NIC
IDRBT
TCS
MTNL
(n)Code Solution CA (GNFC)
e-Mudhra

Section 3. Authentication of electronic records.-(1)Subject to the provisions of


this section, any subscriber may authenticate an electronic record by affixing his
digital signature.

(2) The authentication of the electronic record shall be effected by the use of
asymmetric crypto system and hash function which envelop and transform the
initial electronic record into another electronic record.

Explanation.-For the purposes of this sub-section, "hash function", means an

algorithm mapping or translation of one sequence of bits into another, generally


smaller, set known as "hash result" such that an electronic record yields the same
hash result every time the algorithm is executed with the same electronic record
as its input making it compositionally infeasible(a) to derive or reconstruct the original electronic record from the hash result
using the result produced by the algorithm;
(b) that two electronic records can produce the same hash result using the
algorithm.
(3) Any person by the use of a public key of the subscriber can verify the
electronic record.
(4) The private key and the public key are unique to the subscriber and constitute a
functioning key pair.

Cryptography

Section 4. Legal recognition of electronic records.-

Where any law provides that information or any other matter shall be in writing or

in the typewritten or printed form, then, notwithstanding anything contained in


such law, such , requirement shall be deemed to have been satisfied if such
information or matter is-

(a) rendered or made available in an electronic form; and


(b) accessible so as to be usable for a subsequent reference.

Section 5. Legal recognition of digital signatures.-

Where any law provides that information or any other matter shall be
authenticated by affixing the signature or any document shall be signed or bear
the signature of any person, then,
notwithstanding anything contained in such law, such requirement shall be deemed
to have been satisfied, if such information or matter is authenticated by means of
digital signature affixed in such manner as may be prescribed by the Central
Government.

Section 7. Retention of electronic records.-(1)

Where any law provides that documents, records or information shall be retained
for any specific period, then, that requirement shall be deemed to have been
satisfied if such documents, records or information are retained in the electronic
from, if--(a) the information contained therein remains accessible so as to be usable for a
subsequent reference;
(b)the electronic record is retained in the format in which it was originally
generated, sent or received or in format which can be demonstrated to represent
accurately the information originally generated, sent or received;
(c) the details which will facilitate the identification of the origin, destination date
and time of despatch or receipt of such electronic record are available in the
electronic record.

Accordingly unless there is a contrary or specific provision in law electronic record


is acceptable.
If it is found in the contract or agreement and the law compels that the
information shall be authenticated by affixing the signature, then such requirement
should have to be made available.
It is also clear fact that if the contracting parties agree each other that the
digital signature can be verified at the time of its affixing and it is followed then
such digital signature shall be deemed to be a secure digital signature.
Such digital signature can be held to be a digital signature.

Section 11. Attribution of electronic records.-An electronic record shall be


attributed to the originator,(a) if it was sent by the originator himself;
(b) by a person who has the authority to act on behalf of the originator in
respect of that electronic record; or
(c)by an information system programmed by or on behalf of the originator to
operate automatically.

Section 12. Acknowledgement of receipt.-

(1)Where the originator has not agreed with the addressee that the
acknowledgements of receipt of electronic record be given in a particular form or
by a particular method, an acknowledgement may be given by(a) any communication by the addressee, automated or otherwise; or
(b) any conduct of the addressee, sufficient to indicate to the originator that the
electronic record has been received.
(2)Where the originator has stipulated that the electronic record shall be binding
only on receipt of an acknowledgement of such electronic record by him, then,
unless acknowledgement has been so received, the electronic record shall be
deemed to have been never sent by the originator.

(3) Where the originator has not stipulated that the electronic record shall be
binding only on receipt of such acknowledgements,
and the acknowledgement has not been received by the originator within the time
specified or agreed or, if no time has been received by him and specifying a
reasonable time,

then the originator may give notice to the addressee stating that no
acknowledgement has been received by him and specifying a reasonable time by
which the acknowledgement must be received, by him
and if no acknowledgement is received within the aforesaid time limit he may after
giving notice to the addressee, treat the electronic record as though it has never
been sent.

Section 14. Secure electronic record.-Where any security procedure has been
applied to an electronic record at a specific point of time, then such record shall be
deemed to be a secure electronic record from such point of time to the time of
verification.
Section 15. Secure digital signature.-If, by application of a security procedure
agreed to by the parties concerned, it can be verified that a digital signature, at
the time it was affixed, was(a) unique to the subscriber affixing it;
(b) capable of identifying such subscriber;
(c) created in a manner or using a means under the exclusive control of the
subscriber and is linked to the electronic record to which it relates in such a
manner that if the electronic record was altered the digital signature would be
invalidated.
then such digital signature shall be deemed to be a secure digital signature.

1. Formation and Validity of E-contract

The United Nations General Assembly Resolution No. A/RES/51/162, dated 30th
January 1997, Chapter III and specifically Article 11 sets about the formations
and validity of E-contract. These Articles of the resolution reads as follows: COMMUNICATION OF DATA MESSAGES
Formation and validity of Contracts
1. Article 11-In the context of contract formations, unless otherwise agreed by
the parties, an offer and the acceptance of an offer may be expressed by
means of data messages.
Where a data message is used in the formation of a contract, that contract
shall not be denied validity or enforceability on the sole ground that a data
message was used for that purpose.
2. The provisions of this article do not apply to the following: [ ... ].

Article 12-1.

As between the originator and the addressee of a data message, a declaration of


will or other statement shall not be denied legal effect, validity or enforceability
solely on the grounds that it is in the form of a data message.
2. The provisions of this article do not apply to the following:
[ ... ].
According to the UNCITRAL Model Law Article 11 is not intended to interfere with
the law on formation of contracts but rather to promote international trade by
providing increased legal certainty as to the conclusion of contracts by electronic
means.

2. Data Message and Electronic Data Interchange (EDI) "Data message"

According the United Nations Model Law Data Message on EDI are as follows:
30. The notice of "data message" is not limited to communication but is also
intended to encompass computer-generated records that are not intended for
communication.
Thus, the notice of "message" includes the notion of "record". However, a definition
of "record" in line with the characteristic elements of "writing" in article 6 may be
added in jurisdictions where that would appear to be necessary.
31. The reference to "similar means" is intended to reflect the fact that the Model
Law was not intended only for application in the context of existing communication
techniques but also to accommodate foreseeable technical developments.
The aim of the definition of "data message" is to encompass all types of messages
that are generated, stored, or communicated in essentially paperless form.

For that purpose, all means of communication and storage of information that might
be used to perform functions parallel to the functions performed by the means
listed in the definition are intended to be covered by the reference to "similar
means",
although, for example, "electronic" and "optical" means of communication might not
be, strictly speaking, similar.
For the purposes of the Model Law, the word "similar" connotes "functionally
equivalent.

The definition of "data message" is also intended to cover the case of revocation or
amendment. A data message is presumed to have fixed information content but it
may be revoked or amended by another data message.

"Electronic Data Interchange (ED])"


The Model Law does not settle the question whether the definition of EDI
necessarily implies that EDI messages are communicated electronically from
computer to computer, or whether that definition, while primarily covering
situations where data' messages' are communicated through a telecommunications
system, would also cover exceptional or incidental types of situation where data
structured in the communicated by means that do not involve telecommunications
systems,
for example, the case where magnetic disks containing EDI messages would be
delivered to the addressee by courier. However, irrespective of whether digital
data transferred manually is covered by the definition of "EOI", it should be
regarded as. covered by the definition of "data message" under the Model Law.

"

"Information system"
The definition of "information system" is intended to cover the entire range of
technical means used for transmitting, receiving and storing information.
For example, depending on the factual situation, the notion of "information
system" could be indicating a communications network, and in other instances could
include an electronic mailbox or even a telecopier.
The Model Law does not address the question of whether the information system
is located on the premises of the addressee or on other premises, since location of
information system is not an operative criterion under the Model Law.

Section 13 of Information Technology Act


Section 13. Time and place of dispatch and receipt of electronic record.(1)Save as otherwise agreed to between the originator and the addressee, the

dispatch of an electronic record occurs when ,it enters a computer resource


outside the control of the originator.

2) Save as otherwise agreed between the originator and the addressee, the time of
receipt of an electronic records shall be determined as follows, namely:
(a) if the addressee has designated a computer resource for the purpose of
receiving electronic records,~
(i) receipt occurs at the time when the electronic record enters the designated
computer resource; or
(ii) if the electronic record is sent to a computer resource of the addressee that is
not the designated computer resource, receipt occurs at the time when the
electronic record is retrieved by the addressee;
(b) if the addressee has not designated a computer resource along with specified
timings, if any, receipt occurs when the electronic record enters the computer
resource of the addressee.
3) Save as otherwise agreed to between the originator and the addressee, an
electronic record is deemed to be dispatched at the place where the originator has
his place of business, and is deemed to be received at the place where the
addressee has his place of business.

(4) The provisions of sub-section (2) shall apply notwithstanding that the place
where the computer resource is located may be different from the place where the
electronic record is deemed to have been received under sub-section (3).
(5) For the purposes of this section-

(a) if the originator or the addressee has more than one place of business, the
principal place of business, shall be the place of business;
(b) if the originator or the addressee does not have a place of business, his usual
place of residence shall be deemed to be place of business;
(c) "usual place of residence", in relation to a body corporate, means the ,place
where it is registered

4. Supreme Court on Contract over Telephone

[1] where the acceptance is fully heard and understood


[2]where the telephone fails as a machine and the proposer does not hear
the acceptor and the acceptor knows that his acceptance has not been
transmitted;
[3] where owing to some fault at the porposers end the acceptance is not
heard by him and he does not ask the acceptor to repeat his acceptance
has not been heard by the proposer and he informs the acceptor about this
and asks him, to repeat his works.
Where the speech is fully heard and understood there is a binding
contract and in such a case the only question is as to the place where the
contract can be said to be completed.
When the communication fails and the acceptance is not heard, and the
acceptor knows about it, there is no contract between the parties at all
because communications means an effective communication or a
communication reasonable in the circumstances.

In the third case, the acceptor transmits his acceptance but the same
does not reach the proposer and the proposer does not ask the acceptor to
repeat his message. According to Lord Denning the proposer is bound
because of his default. As there is no reception at the porposers end,
logically the contract must be held to be completed at the proposers end.
Under the terms of section 3 of our act such communication is good
because the acceptors intends to communicate his acceptance and follows a
usual and reasonable manner and puts his acceptance in the course of
transmission to the proposer. He does not know that it has not reached..
In the fourth case if the acceptor is told by the offeror that his speech
cannot be heard there will be no contract because communication must be
effective communication and, the act of acceptor has no effect of
communicating it and he cannot claim that he acted reasonably.

5. Contractual Obligation in Cyberspace

In India there is the Contract Act of the year 1872 for the rules regulating the
general contract in the visible world.
On the contrary in the age of super computer and the internet there is no specified
e-contract or electronics contract in the world of electronics.
If such a law is provided then the formation of the electronic contracts viz.,
digital signature system can have a complete legal space in space where the
contracts or agreements are made and concluded in computer base or
electronically.
On the other hand it can be remembered that when a sender transmits the
message through e-mail or other mode of electronic messaging it is held that the
message has been transmitted, sent or received.
But such message enters a system where the sender or transmiter loses his power
to take return.

And same message is held to be received when it enters into the system or mailbox.

If the computer problem comes between two then these become a problem for
either or both the parties.
The important point is to be remembered about the authentication of the
electronic contract through the Information Technology Law and rules made there
under though there is no special provision for e-contract or click-wrap agreements.

Das könnte Ihnen auch gefallen