E Commerce
E Commerce
E Commerce
CHARACTERISTICS OF E-COMMERCE:
1. Online presence
2. Electronic Transactions
3. Wide Product Range
4. Personalization/Customization
5. Real-time transactions
6. Increased efficiency
7. Competitive Pricing
8. Global Reach
9. Convenience
SCOPE OF E-COMMERCE:
1. Omnichannel presence and support (24/7 services through chatbots)
2. Customer experience (rating and feedback)
3. High levels of personalization
4. Mobile friendliness
5. Image recognition turned product recognition.
• Information Technology Act, 2000 ("IT Act")- Section 43A (Compensation for
failure to protect data), Section 84A (Modes or methods for encryption), Information
Technology (Reasonable security practices and procedures and sensitive personal data
or information) Rules, 2011 and Information Technology (Guidelines for Intermediaries
and Digital Media Ethics Code) Rules, 2021. Laws governing electronic signatures,
electronic records, and electronic transactions establish legal frameworks for
conducting business electronically, ensuring the validity and enforceability of
electronic contracts and transactions such as in the IT Act, of 2000.
• Consumer Protection Act, 2019 and Consumer Protection (E-Commerce) Rules,
2020: The E-Commerce Rules provide a framework to regulate the marketing, sale, and
purchase of goods and services online. Various laws protect consumers engaging in e-
commerce transactions, such as laws governing online sales contracts, consumer rights
to refunds or cancellations, and regulations related to product safety and labeling.
• Data Protection and Privacy Laws: E-commerce businesses must comply with data
protection and privacy laws governing the collection, processing, and storage of
personal data. The Digital Personal Data Protection Act (DPDP) of 2023 is a landmark
legislation that provides a comprehensive framework for personal data protection.
• Taxation Laws: E-commerce businesses must adhere to tax laws applicable to online
sales, including requirements for collecting and remitting sales tax, value-added tax
(VAT), and other taxes based on the jurisdiction of the buyer and seller.
• VIRUS: Effect of Threat: A virus is a piece of code that, when loaded onto a computer,
is capable of attaching itself to other files and repeatedly replicating itself, usually
without user knowledge. Some viruses can lie dormant until activated by a trigger such
as a date (for example, logic bombs). Measures of Protection: Anti-virus software
protects against infection. Exercise caution with unsolicited emails, especially if they
have attachments. When in doubt, delete.
• WORM: Effect of Threat: A worm is a type of malware or malicious software that
exploits vulnerabilities in your security software to steal sensitive information, install
backdoors that can be used to access the system, corrupt files, and do other kinds of
harm. Worms consume large volumes of memory, as well as bandwidth. Unlike a virus,
a worm doesn’t need human action to propagate once inside a network. It replicates
itself and can spread to different computers via Network. Measures of Protection:
Most Anti-Virus software will stop worms or help fix the computer after infection.
Exercise other precautionary measures as for viruses generally.
• TROJAN HORSE: Effect of Threat: A Trojan Horse Virus is a type of malware that
downloads onto a computer disguised as a legitimate program. The delivery method
typically sees an attacker use social engineering to hide malicious code within
legitimate software to try and gain users' system access with their software. A simple
way to answer the question “What is Trojan” is it is a type of malware that typically
gets hidden as an attachment in an email or a free-to-download file, and then transfers
onto the user’s device. Once downloaded, the malicious code will execute the task the
attacker designed it for, such as gaining backdoor access to corporate systems, spying
on users’ online activity, or stealing sensitive data. Measures of Protection: Most Anti-
Virus software will stop Trojan Horse viruses or help fix the computer after infection.
Exercise other precautionary measures for viruses generally.
• DENIAL OF SERVICE (DOS) ATTACK: Effect of Threat: A Denial of Service
(DoS) attack is a malicious attempt to disrupt the normal functioning of a targeted
server, service, or network by overwhelming it with a flood of traffic or requests. The
goal of a DoS attack is to render the target inaccessible to its intended users, thereby
denying them access to the services provided by the system. Such as the number of pop-
ups during a Black Friday sale to disrupt the use of e-commerce websites. Measures of
Protection: Anti-DoS attack software programs are available to assist in securing
networks.
• PORT SCANNING: Effect of Threat: Port scanning is like checking the doors and
windows of a house to see which ones open and which ones are closed. In computer
terms, it's a way for someone to see which communication pathways (called "ports") on
a computer or network are open and can be accessed. Just like a thief might check
different entry points to see if they can get into a house, someone conducting a port
scan might check different ports on a computer or network to see if they can gain access
or find vulnerabilities. Port scanning can be used for both legitimate purposes, like
checking the security of a network, and for malicious purposes, like trying to find weak
spots to attack. Measures of Protection: Firewalls can protect computers and servers
from port scanning.
• PHISHING: Effect of Threat: Phishing happens when an unsuspecting victim
responds to fraudulent requests that demand action. This action can include
downloading an attachment, clicking a link, filling out a form, updating a password,
calling a phone number, or using a new Wi-Fi hotspot. Measures of Protection: Ensure
that you report phishing whenever come across such a threat and users should carefully
inspect URLs before clicking on links in emails or messages, paying attention to
misspellings, unusual domain names, or suspicious redirects.
TECHNOLOGY SOLUTIONS