Beruflich Dokumente
Kultur Dokumente
Out of many issues, the term digital signature play an important role in e-contract.
This technique is similar to locker key in a bank. The customer keeps 'private key'
and bank manager keeps public key. The locker does not open unless both the keys
do not match.
Any person by use of public key of subscriber can verify the electronic record and
according the private key and the public key are unique to the subscriber and
constitutes a functioning key pair.
Section 40. Generating key pair.-Where any Digital Signature Certificate, the
public key of which corresponds to the private key of that subscriber which is to
be listed in the Digital Signature Certificate has been accepted by a subscriber,
the subscriber shall generate that key pair by applying the security procedure.
Section 41. Acceptance of digital signature certificate.-(1) A subscriber shall be
deemed to have accepted a Digital Signature Certificate if he publishes or
authorises the publication of a Digital Signature Certificate(a) to one or more persons;
(b) in a repository; or
otherwise demonstrates his approval of the Digital Signature Certificate in any
manner.
(2) By accepting a Digital Signature Certificate the Subscriber certifies to all who
reasonably rely on the information contained in the Digital Signature Certificate
that(a) the subscriber holds the private key corresponding to the public key listed in
the Digital Signature Certificate and is entitled to hold the same;
(b) all representations made by the subscriber to the Certifying Authority and all
material relevant to the information contained in the Digital Signature Certificate
are true;
(c) all information in the Digital Signature Certificate that is within the knowledge
of the subscriber is true.
Section 42. Control of private keys.-(l) Every subscriber shall exercise reasonable
care to retain control of the private key corresponding to the public key listed in
his Digital Signature Certificate and take all steps to prevent its disclosure.
2) If the private key corresponding to the public key listed in the Digital Signature
Certificate has been compromised, then, the subscriber shall communicate the
same without any delay to the Certificate Authority in such manner as may be
specified, by the regulations.
Safescrypt
NIC
IDRBT
TCS
MTNL
(n)Code Solution CA (GNFC)
e-Mudhra
(2) The authentication of the electronic record shall be effected by the use of
asymmetric crypto system and hash function which envelop and transform the
initial electronic record into another electronic record.
Cryptography
Where any law provides that information or any other matter shall be in writing or
Where any law provides that information or any other matter shall be
authenticated by affixing the signature or any document shall be signed or bear
the signature of any person, then,
notwithstanding anything contained in such law, such requirement shall be deemed
to have been satisfied, if such information or matter is authenticated by means of
digital signature affixed in such manner as may be prescribed by the Central
Government.
Where any law provides that documents, records or information shall be retained
for any specific period, then, that requirement shall be deemed to have been
satisfied if such documents, records or information are retained in the electronic
from, if--(a) the information contained therein remains accessible so as to be usable for a
subsequent reference;
(b)the electronic record is retained in the format in which it was originally
generated, sent or received or in format which can be demonstrated to represent
accurately the information originally generated, sent or received;
(c) the details which will facilitate the identification of the origin, destination date
and time of despatch or receipt of such electronic record are available in the
electronic record.
(1)Where the originator has not agreed with the addressee that the
acknowledgements of receipt of electronic record be given in a particular form or
by a particular method, an acknowledgement may be given by(a) any communication by the addressee, automated or otherwise; or
(b) any conduct of the addressee, sufficient to indicate to the originator that the
electronic record has been received.
(2)Where the originator has stipulated that the electronic record shall be binding
only on receipt of an acknowledgement of such electronic record by him, then,
unless acknowledgement has been so received, the electronic record shall be
deemed to have been never sent by the originator.
(3) Where the originator has not stipulated that the electronic record shall be
binding only on receipt of such acknowledgements,
and the acknowledgement has not been received by the originator within the time
specified or agreed or, if no time has been received by him and specifying a
reasonable time,
then the originator may give notice to the addressee stating that no
acknowledgement has been received by him and specifying a reasonable time by
which the acknowledgement must be received, by him
and if no acknowledgement is received within the aforesaid time limit he may after
giving notice to the addressee, treat the electronic record as though it has never
been sent.
Section 14. Secure electronic record.-Where any security procedure has been
applied to an electronic record at a specific point of time, then such record shall be
deemed to be a secure electronic record from such point of time to the time of
verification.
Section 15. Secure digital signature.-If, by application of a security procedure
agreed to by the parties concerned, it can be verified that a digital signature, at
the time it was affixed, was(a) unique to the subscriber affixing it;
(b) capable of identifying such subscriber;
(c) created in a manner or using a means under the exclusive control of the
subscriber and is linked to the electronic record to which it relates in such a
manner that if the electronic record was altered the digital signature would be
invalidated.
then such digital signature shall be deemed to be a secure digital signature.
The United Nations General Assembly Resolution No. A/RES/51/162, dated 30th
January 1997, Chapter III and specifically Article 11 sets about the formations
and validity of E-contract. These Articles of the resolution reads as follows: COMMUNICATION OF DATA MESSAGES
Formation and validity of Contracts
1. Article 11-In the context of contract formations, unless otherwise agreed by
the parties, an offer and the acceptance of an offer may be expressed by
means of data messages.
Where a data message is used in the formation of a contract, that contract
shall not be denied validity or enforceability on the sole ground that a data
message was used for that purpose.
2. The provisions of this article do not apply to the following: [ ... ].
Article 12-1.
According the United Nations Model Law Data Message on EDI are as follows:
30. The notice of "data message" is not limited to communication but is also
intended to encompass computer-generated records that are not intended for
communication.
Thus, the notice of "message" includes the notion of "record". However, a definition
of "record" in line with the characteristic elements of "writing" in article 6 may be
added in jurisdictions where that would appear to be necessary.
31. The reference to "similar means" is intended to reflect the fact that the Model
Law was not intended only for application in the context of existing communication
techniques but also to accommodate foreseeable technical developments.
The aim of the definition of "data message" is to encompass all types of messages
that are generated, stored, or communicated in essentially paperless form.
For that purpose, all means of communication and storage of information that might
be used to perform functions parallel to the functions performed by the means
listed in the definition are intended to be covered by the reference to "similar
means",
although, for example, "electronic" and "optical" means of communication might not
be, strictly speaking, similar.
For the purposes of the Model Law, the word "similar" connotes "functionally
equivalent.
The definition of "data message" is also intended to cover the case of revocation or
amendment. A data message is presumed to have fixed information content but it
may be revoked or amended by another data message.
"
"Information system"
The definition of "information system" is intended to cover the entire range of
technical means used for transmitting, receiving and storing information.
For example, depending on the factual situation, the notion of "information
system" could be indicating a communications network, and in other instances could
include an electronic mailbox or even a telecopier.
The Model Law does not address the question of whether the information system
is located on the premises of the addressee or on other premises, since location of
information system is not an operative criterion under the Model Law.
2) Save as otherwise agreed between the originator and the addressee, the time of
receipt of an electronic records shall be determined as follows, namely:
(a) if the addressee has designated a computer resource for the purpose of
receiving electronic records,~
(i) receipt occurs at the time when the electronic record enters the designated
computer resource; or
(ii) if the electronic record is sent to a computer resource of the addressee that is
not the designated computer resource, receipt occurs at the time when the
electronic record is retrieved by the addressee;
(b) if the addressee has not designated a computer resource along with specified
timings, if any, receipt occurs when the electronic record enters the computer
resource of the addressee.
3) Save as otherwise agreed to between the originator and the addressee, an
electronic record is deemed to be dispatched at the place where the originator has
his place of business, and is deemed to be received at the place where the
addressee has his place of business.
(4) The provisions of sub-section (2) shall apply notwithstanding that the place
where the computer resource is located may be different from the place where the
electronic record is deemed to have been received under sub-section (3).
(5) For the purposes of this section-
(a) if the originator or the addressee has more than one place of business, the
principal place of business, shall be the place of business;
(b) if the originator or the addressee does not have a place of business, his usual
place of residence shall be deemed to be place of business;
(c) "usual place of residence", in relation to a body corporate, means the ,place
where it is registered
In the third case, the acceptor transmits his acceptance but the same
does not reach the proposer and the proposer does not ask the acceptor to
repeat his message. According to Lord Denning the proposer is bound
because of his default. As there is no reception at the porposers end,
logically the contract must be held to be completed at the proposers end.
Under the terms of section 3 of our act such communication is good
because the acceptors intends to communicate his acceptance and follows a
usual and reasonable manner and puts his acceptance in the course of
transmission to the proposer. He does not know that it has not reached..
In the fourth case if the acceptor is told by the offeror that his speech
cannot be heard there will be no contract because communication must be
effective communication and, the act of acceptor has no effect of
communicating it and he cannot claim that he acted reasonably.
In India there is the Contract Act of the year 1872 for the rules regulating the
general contract in the visible world.
On the contrary in the age of super computer and the internet there is no specified
e-contract or electronics contract in the world of electronics.
If such a law is provided then the formation of the electronic contracts viz.,
digital signature system can have a complete legal space in space where the
contracts or agreements are made and concluded in computer base or
electronically.
On the other hand it can be remembered that when a sender transmits the
message through e-mail or other mode of electronic messaging it is held that the
message has been transmitted, sent or received.
But such message enters a system where the sender or transmiter loses his power
to take return.
And same message is held to be received when it enters into the system or mailbox.
If the computer problem comes between two then these become a problem for
either or both the parties.
The important point is to be remembered about the authentication of the
electronic contract through the Information Technology Law and rules made there
under though there is no special provision for e-contract or click-wrap agreements.