Monday, July 15, 2002 |
|
Book
Review |
|
Know more about the
IT Act
Ali Hasnain
Handbook on Cyber Laws by Vakul Sharma, Macmillan India Limited, Rs.195 (hard-bound edition) |
TECHNOLOGY
and law are like legendary hare and the tortoise. Whatever lead start
technology may take, the law somehow manages to catch up with it. What
does it mean for the end user? Just when we thought he had triumphed
over all technical jargon and concepts floating around for his limited
purpose, he finds himself accosted with a litany of legal gibberish,
which in this case happens to be the Information Technology Act of 2000.
No need to despair!
This is where Vakul Sharma, the enterprising legal consultant from
Chandigarh comes to your rescue with his Handbook on Cyber Laws.
The book is effective
for rudimentary and basic understanding of cyber laws. It is divided
into 10 chapters most of which deal with different facets of the
Internet and the inherent legal repercussions of each.
Sharma races through
the important provisions of the Act in a plain and simple manner, which
would probably draw appreciation from the average Netizens with no
background in law.
The book offers
pointers for budding Net entrepreneurs suggesting necessary clauses for
"back end" contracts like Domain Name Registration, Web
Designing, Content Development, Server Hosting, Web Hosting agreements
etc. A table of e-business models is also available chalking out the
benefits to both companies and customers.
The various terms and
conditions of Websites on which we never condescend to waste our Net
hours make interesting reading. All those who have taken so eagerly to
Net banking, Net trading etc. may want to reconsider their actions after
going through some of the disclaimers and terms and conditions. Although
one is left wondering whether using Web services would bind the end-user
to a legally valid contract. If the service is an electronic version of
an existing physical world business, the end user's acceptance of the
terms and conditions can easily be made out by their actions (a good
example would be using the baazi.com site to buy and sell goods). On the
other hand, where a Website is being used for a specific service
provided on the Net itself without any physical world ramifications, a
valid contract may only be made out where the Net identity can tally
with the person's physical world identity. The same may be easy to prove
once digital signatures become the norm.
By far the most popular
service on the Net is electronic mail. How secure is this as a means of
communication? Is it tamper-proof? No it's not. Not just that your
e-mail may not be as private as you may like to believe. So what is the
answer? Cryptography may help.
The chapter on
cryptography (symmetric and asymmetric) is very informative. Sharma
takes pains to explain Key pairs, the difference between symmetric and
asymmetric cryptography, message validation etc. The chapters on
privacy, cyber crimes and copyright violations are well researched and
exhaustive. The
absence of a chapter on e-taxation is slightly surprising and perhaps
jurisdictional issues could have done with a chapter for themselves.
The more serious student
of law may not feel satiated. The book is unpretentious and does not
claim to be a precise, detailed and exhaustive commentary on cyber law.
All in all it's a good book for the uninitiated a "do it yourself
guide" as the author suggests.
|