The Personal Data Protection Act 2010 and The Digital Signature Act 1997

1882 Words4 Pages

We will be discussing two the Cyber-laws the Personal Data Protection Act 2010 and the Digital Signature Act 1997 and how they apply to this case study. “The Personal Data Protection Act 2010 applies to any person who processes and any person who has control over or authorizes the processing of any personal data in respect of commercial transactions. It also provides protection on the rights of data subject/data users” (Mohamed, D., & Abdul Jalil, J. 2010). “The Digital Signature Act 1997 aims to provide security protection to on-line transactions. It regulates the use of digital signatures and governs certification authorities through issuance of valid licenses. It only legalizes one form of digital signature technology, namely private key-public key Cryptography” (Mohamed, D., & Abdul Jalil, J. 2010).

The VL Bank could implement the two cyber-laws to help enhance the the operations at an enterprise and banking level. Since VL Bank is going through this horrible financial dismay and fraudulent transfers adapting this cyber-laws would help prevent future fraudulent activities, financial embezzlement and customer fraud. We believe that the two standards must be implemented to help mitigate any further violations of fraud and security.

VL Bank has a civic duty not just to its customers but its own reputation as well, regarding industry wide safeguards to and report recent incidents and transactions dealing with unauthorized money transfers and deposits. The Personal Data Protection Act 2010 is supposed to protect the privacy of persons having accounts at the institution. Customer’s data should not be automatically available to individuals or organizations.

The Digital Signature Act 1997 was written in order to help with en...

... middle of paper ...

... frauds and unauthorized access are established and up to date. This will help to regain its position in the financial industry as well and gain the confidence of customers.

References

Douglas, T. and Loader, B. D. (2000). Cybercrime: Security and Surveillance in the Information Age. Routledge. Retrieved from: http://books.google.com/books?id=3Pn6wRQFw9AC&pg=PA162&dq=cybercrime+laws&hl=en&sa=X&ei=o4QoUafUA6en0AX_-4GYBg&ved=0CC8Q6AEwAQ#v=onepage&q=cybercrime%20laws&f=false. Retrieved on: 23- 2- 2013

Mohamed, D., & Abdul Jalil, J. (2010). Violation of cyberlaws and computer ethics: the consequences and potential legal actions.

Woodman, P. (2007). Business continuity management. London: Chartered Management Institute.

Williamson, G. D., & Money–America’s, G. E. (2006). Enhanced authentication in online banking (Doctoral dissertation, Utica College).

More about The Personal Data Protection Act 2010 and The Digital Signature Act 1997

Open Document