Sei sulla pagina 1di 16

Seminar on IT Acts

Secure Electronic Records and


Secure Electronic Signatures

Submitted To:Mr. Loveleen Tak

Presented By:
Name: - Lokesh Kumar
Roll No: - 27
IV-C

Poornima College Of Engineering

Table of Contents
This Presentation will include the following Topics of
chapter-V of IT Acts:

Electronic Record

Electronic Signature

Security Procedure

What is Electronic Record ?

Any combination of text, graphics, data, audio,


pictorial, or other information representation in
digital form that is created, modified, maintained,
archived, retrieved, or distributed by a computer
system.

Electronic Record - Examples

Electronic Record-Security
Risks

Hacking By unauthorized Agencies

Long term data management problem

Loss of privacy

Data Loss in Hazards

Secure Electronic Record

Any electronic record where any security


procedure has been applied to an electronic record
at a specific point of time, then such record shall
be deemed to be a secure electronic record from
such point of time to the time of verification.

Procedures to Make
Electronic Records Secure
1. Symmetric Key Cryptography
2. Asymmetric Key Cryptography

Symmetric Key Cryptography

Asymmetric Key Cryptography

What is Electronic Signature?

The term 'electronic signature' means an


electronic sound, symbol, or process, attached to
or logically associated with a contract or other
record and executed or adopted by a person with
the intent to sign the record.

Benefits of Electronic
Signature

Time and
money
saved

Faster
results

Increased
efficiency

Legally
binding
documents

Flexibility
to work on
the go

What is Secure Electronic


Signature?
A Electronic Signature is said to be Secure if:

is unique to the person making the signature.

the technology or process used to make the signature is


under the sole control of the person making the signature.

the technology or process can be used to identify the


person using the technology or process.

the electronic signature can be linked with an electronic


document in such a way that it can be used to determine
whether the electronic document has been changed since
the electronic signature was incorporated in, attached to
or associated with the electronic document.

Security Procedures
The Central Government shall for the purpose of this Act
prescribe the security procedure having regard to commercial
circumstances prevailing at the time when the procedure was
used, including

the nature of the transaction.

the level of sophistication of the parties with reference to


their technological capacity.

the volume of similar transactions engaged in by other parties.

the availability of alternatives offered to but rejected by any


party.

the cost of alternative procedures.

the procedures in general use for similar types of transactions


or communications.

Conclusion
Learning of This Presentation are:

Secure Electronic Record

Secure Electronic Signature

Security Procedures

ANY QUERIES?

Potrebbero piacerti anche