5 Security Legal and Ethical Issues in E-Commerce
5 Security Legal and Ethical Issues in E-Commerce
5 Security Legal and Ethical Issues in E-Commerce
Two major threats to availability problems are virus attacks and denial
of service.
Impact Upon the Business: All of these risks can have a significant
impact upon a business running an e-commerce service. The potential
business implications of a security incident include the following:-
The image presented by one s business together with the brands under
which one trade are valuable assets. Hence it is important to recognize
that the use of e-commerce creates new ways for both image and
brands.
Risks from Viruses, Trojans and Worms: Viruses, Trojan horses and
worms are all computer programs that can infect computers. They
spread across computers and networks by making copies of
themselves, usually without the knowledge of the computer user.
Enabling hackers to hijack one s system and use it for their own
purpose.
Using one s computer for malicious purposes, such as carrying out a
denial-ofservice attack on another website.
The real threat may not be the most obvious one. Attacks from
authorized users (such as a dissatisfied employee or partner) are far
more common than attacks by hackers.
Both types of firewall allow the user to define access policies for
inbound connections to the computers they are protecting.
Many also provide the ability to control what services the protected
computers are able to access on the Internet.
One s system may still become infected even if the above guidelines
are followed. Hence regular back-ups of the data and software should
be taken so that the infected files can be replaced with clean copies if
required.
Spyware: There are software available that scan the systems and
detect for known spyware programs. Spyware can then be removed or
quarantined. As with anti-virus software, it is important to keep this
software up-t0-date.
vii. Digital Identity & Digital Signature: Digital identity refers to the
aspect of digital technology that is concerned with the mediation of
people s experience of their own identity and the identity of other
people and things.
The more recent problem was the rlogin hole in the IBM RS-6000
workstations, which enabled a cracker (a malicious hacker) to create a
root shell or super user access mode. This is the highest level of
access possible and could be used to delete the entire file system, or
create a new account or password file resulting in incalculable
damage.
Problems like this are difficult to isolate once the system is setup and
running. Hence one should be carefully build the system with these
things in mind.
To reduce these security threats, over the years, several protection
methods have been developed:-
Typically, the device allows insiders to have full access to the services
on the outside networks but grants only selective access based on
login names, password, IP address or other identifiers to the outsiders.
How it Works: Assume you are going to send the draft of a contract to
your lawyer in another town and want to give him the assurance that it
is unchanged it is from you only.
Then use a private key that you have previously obtained from a
public-private key authority to encrypt the hash.
The encrypted hash becomes your digital signature of the message.
(note that it will be different each time you send a message).
Secure socket layer (SSL) protocols, which allow for the transmission
of encrypted data across the Internet by running above the traditional
TCP / IP protocols.
The technical means by which keys use hash tables to achieve the
encryption and decryption process.
Regulation of Certificate Authorities (CAs), Registration Authorities
that validate users as having been issued certificates and the
directories that store certificates, public keys and certificate
management information.
i. Privacy: Privacy means the right to be left alone and the right to be
free of unreasonable personal intrusions.
7. Use encryption.
ii. Cookies: Cookies are the piece of information that allows a Web site
to record the information coming in and going out. Through
cookies:-
To personalize information.
Time and place can carry different dates for the buyers and sellers
when they are across the ocean.
Is a digital signature legal everywhere?
Cyber Law in India: In May 2000, both the houses of the Indian
Parliament passed the Information Technology Bill. The Bill received
the assent of the President in August 2000 and came to be known as
the Information Technology Act, 2000. It was enacted on 7th June
2000 and was notified in the official gazette on 17th October 2000 and
is made applicable to the whole of India.
Aim: The Information Technology (IT) Act 2000 aims to provide a
legal and regulatory framework for promotion of e-Commerce and e-
Governance.
The Act also aims to provide for the legal framework so that legal
sanctity is accorded to all electronic records and other activities
carried out by electronic means.
From the perspective of e-commerce in India, the IT ACT 2000 and its
provisions contain many positive aspects.
Digital signatures have been given legal validity and sanction in the
Act.
The Act throws open the doors for the entry of corporate companies in
the business of being Certifying Authorities for issuing Digital
Signature Certificates.
The Act now allows Government to issue notification on the web thus
heralding e-governance.
The Act enables the companies to file any form, application or any
other document with any office, authority, body or agency owned or
controlled by the appropriate Government in electronic form by
means of such electronic form as may be prescribed by the
appropriate Government.
The IT Act also addresses the important issues of security, which are
so critical to the success of electronic transactions. The Act has given a
legal definition to the concept of secure digital signatures that would
be required to have been passed through a system of a security
procedure, as stipulated by the Government at a later date.
Under the IT Act 2000, it shall now be possible for corporates to have a
statutory remedy in case if anyone breaks into their computer systems
or network and causes damages or copies data. The remedy provided
by the Act is in the form of monetary damages, not exceeding Rs. 1
crore.
Contracting And Contract Enforcement: A legally binding contract
requires a few basic elements: offer, acceptance and consideration.
When the Contracting is performed electronically then these
requirements are difficult to establish.
There are various acts and laws are made for the contracting and
contract enforcement. Some of them are:-
The user is bound to the license by opening the package even though
he or she has not used the product or even read the agreement, which
has been a point of contention for some time.
The court felt that more information would provide more benefit to
the consumer given the limited space available on the exterior of the
package.
Click-Wrap Contracts:
The software vendor offers to sell or license the use of the software
according to the terms accompanying the software.
Power of police officers and other officers to enter into any public
place and search and arrest without warrant.
Electronic Governance.
Where the law requires the signature, digital signature satisfy the
requirement.
Uniformity of rules, regulations and standards regarding the
authentication and integrity of electronic records or documents.
Publication of official gazette in the electronic form.
Interception of any message transmitted in the electronic or
encrypted form.
Prevent Computer Crime, forged electronic records, international
alteration of electronic records fraud, forgery or falsification in
Electronic Commerce and Electronic Transaction.
Authentication of the electronic Records in IT Act 2000: Section
3(2) of the IT Act 2000 has provided that The authentication of the
electronic record shall be effected by the use of asymmetric
crypto system and hash function which envelop and transform
the initial electronic record into another electronic record .
That two electronic records can produce the same hash result using
the algorithm.
Digital Signature: The digital signature is an encryption and
decryption process allowing both the positive identification of the
author of an electronic message (Who wrote the message) and
verification of integrity of the message (Has the message been
tampered with during transmission).
Introduction of virus.
Negotiable instrument.
Power of Attorney.
Trust.
Will.