- Cyber Crimes FAQs
- Cyber Law Summary
- Offences and Penalties
- Digital & Electronic Signatures
- Information Technology Act, 2000
- Network Security
- Policies To Mitigate Cyber Risk
- Cyber Security Strategies
- Intellectual Property Right
- Cyber Law Objectives
- Cyber Law & IT Act Overview
- Cyber Law Home
Cyber Law Resources
Selected Reading
- Who is Who
- Computer Glossary
- HR Interview Questions
- Effective Resume Writing
- Questions and Answers
- UPSC IAS Exams Notes
Digital & Electronic Signatures
Digital Signature
A digital signature is a technique to vapdate the legitimacy of a digital message or a document. A vapd digital signature provides the surety to the recipient that the message was generated by a known sender, such that the sender cannot deny having sent the message. Digital signatures are mostly used for software distribution, financial transactions, and in other cases where there is a risk of forgery.
Electronic Signature
An electronic signature or e-signature, indicates either that a person who demands to have created a message is the one who created it.
A signature can be defined as a schematic script related with a person. A signature on a document is a sign that the person accepts the purposes recorded in the document. In many engineering companies digital seals are also required for another layer of authentication and security. Digital seals and signatures are same as handwritten signatures and stamped seals.
Digital Signature to Electronic Signature
Digital Signature was the term defined in the old I.T. Act, 2000. Electronic Signature is the term defined by the amended act (I.T. Act, 2008). The concept of Electronic Signature is broader than Digital Signature. Section 3 of the Act depvers for the verification of Electronic Records by affixing Digital Signature.
As per the amendment, verification of electronic record by electronic signature or electronic authentication technique shall be considered repable.
According to the United Nations Commission on International Trade Law (UNCITRAL), electronic authentication and signature methods may be classified into the following categories −
Those based on the knowledge of the user or the recipient, i.e., passwords, personal identification numbers (PINs), etc.
Those bases on the physical features of the user, i.e., biometrics.
Those based on the possession of an object by the user, i.e., codes or other information stored on a magnetic card.
Types of authentication and signature methods that, without falpng under any of the above categories might also be used to indicate the originator of an electronic communication (Such as a facsimile of a handwritten signature, or a name typed at the bottom of an electronic message).
According to the UNCITRAL MODEL LAW on Electronic Signatures, the following technologies are presently in use −
Digital Signature within a pubpc key infrastructure (PKI)
Biometric Device
PINs
Passwords
Scanned handwritten signature
Signature by Digital Pen
Cpckable “OK” or “I Accept” or “I Agree” cpck boxes