The Personal Data Protection Act 2010 and The Digital Signature Act 1997

The Personal Data Protection Act 2010 and The Digital Signature Act 1997

Length: 1882 words (5.4 double-spaced pages)

Rating: Term Papers

Open Document

Essay Preview

We will be discussing two the Cyber-laws the Personal Data Protection Act 2010 and the Digital Signature Act 1997 and how they apply to this case study. “The Personal Data Protection Act 2010 applies to any person who processes and any person who has control over or authorizes the processing of any personal data in respect of commercial transactions. It also provides protection on the rights of data subject/data users” (Mohamed, D., & Abdul Jalil, J. 2010). “The Digital Signature Act 1997 aims to provide security protection to on-line transactions. It regulates the use of digital signatures and governs certification authorities through issuance of valid licenses. It only legalizes one form of digital signature technology, namely private key-public key Cryptography” (Mohamed, D., & Abdul Jalil, J. 2010).

The VL Bank could implement the two cyber-laws to help enhance the the operations at an enterprise and banking level. Since VL Bank is going through this horrible financial dismay and fraudulent transfers adapting this cyber-laws would help prevent future fraudulent activities, financial embezzlement and customer fraud. We believe that the two standards must be implemented to help mitigate any further violations of fraud and security.

VL Bank has a civic duty not just to its customers but its own reputation as well, regarding industry wide safeguards to and report recent incidents and transactions dealing with unauthorized money transfers and deposits. The Personal Data Protection Act 2010 is supposed to protect the privacy of persons having accounts at the institution. Customer’s data should not be automatically available to individuals or organizations.

The Digital Signature Act 1997 was written in order to help with en...


... middle of paper ...


... frauds and unauthorized access are established and up to date. This will help to regain its position in the financial industry as well and gain the confidence of customers.


References

Douglas, T. and Loader, B. D. (2000). Cybercrime: Security and Surveillance in the Information Age. Routledge. Retrieved from: http://books.google.com/books?id=3Pn6wRQFw9AC&pg=PA162&dq=cybercrime+laws&hl=en&sa=X&ei=o4QoUafUA6en0AX_-4GYBg&ved=0CC8Q6AEwAQ#v=onepage&q=cybercrime%20laws&f=false. Retrieved on: 23- 2- 2013

Mohamed, D., & Abdul Jalil, J. (2010). Violation of cyberlaws and computer ethics: the consequences and potential legal actions.

Woodman, P. (2007). Business continuity management. London: Chartered Management Institute.

Williamson, G. D., & Money–America’s, G. E. (2006). Enhanced authentication in online banking (Doctoral dissertation, Utica College).

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Digital Multimedia Broadcasting Essay

- 1. Changes in the trend of media industry Media consumption patterns are slowly but steadily changing the digital home, and wireless connectivity enables similar changes outside the home. Disruptive technologies liberalized content release windows, regulatory changes, and a myriad of factors could dramatically change current trend lines of the customers. Before we start, let me first explain about the historical media disruptors. Firstly, the television forces radio out of national spotlight into locally based medium and then came the cable television, which evolves from relaying distant signals to narrow casting medium....   [tags: Media Broadcasting]

Free Essays
1278 words (3.7 pages)

The Budget Act Of 1997 Essay

- CHIP was created by the Balanced Budget Act of 1997. The program was created to help children whose families’ yearly income was too high to qualify for Medicaid coverage. Unfortunately for most, their yearly income could not afford private insurance either. One of the main reasons many children live without insurance today is the result of most incomes exceeding the guidelines for public insurance, like Medicaid or Medicare. The program is funded by the federal government, state governments, and also from the premiums of the individuals enrolled in the program....   [tags: Health insurance, Health care, Medicaid, Medicare]

Term Papers
1314 words (3.8 pages)

Tort Law: Harassment Act 1997 Essay

- INTRODUCTION The main purpose of this Essay is to advise the parties as to any potential liability in tort and under the protection from Harassment Act 1997, also to find out the particulars of the case and list the points that are necessary in order for someone to be found guilty. In Caroline and Nicole, A minor must be responsible for his or her own torts. However the issue here is whether Nicole’s actions amounted to a battery. Battery: To make a claim, Caroline must establish that Nicole intentionally caused an offensive contact with her....   [tags: harassment, assesment, offensive contact]

Term Papers
1560 words (4.5 pages)

Essay on Analog-to-Digital Conversion of Audio

- I. INTRODUCTION (HEADING 1) Digital signals have transformed the world today, and in few areas is it as prevalent as it is in the music industry. Today’s analog-to-digital converters allow us to accurately store the physical, analog phenomena of sound as digital data, with high fidelity and perfect reproduction quality [1]. Digital audio storage is far more practical than analog audio storage for both the consumer and the professional alike. Digital audio is not vulnerable to noise, unlike analog audio where noise is not only prevalent but machine-indistinguishable from the original message [NEED CITE]....   [tags: music, sound, digital data, technology, storing]

Term Papers
2914 words (8.3 pages)

Essay about The Balanced Budget Act of 1997

- The Balanced Budget Act of 1997 In 1997 the Clinton Administration signed into law the Balanced Budget Act. One of the key provisions of this act was reduction in Medicare payments to health care providers. The reductions threw a health care system that was essentially in equilibrium into turmoil. “Let me describe the BBA’s phase-out methodology in this way. Imagine a grocery store buys a gallon of milk from their wholesaler for $4.00, but the law allows the purchaser to buy that same gallon of milk for $3.00....   [tags: Papers]

Free Essays
938 words (2.7 pages)

The Security Of Digital Data Essay

- 1.0 Introduction Each day, billions of people worldwide depend on the security of digital systems. From medical history and test results at a hospital, to financial information and account statements at a bank, or social connections and personal messages on a smart phone, nearly every facet of a person’s life has some component of personal data associated with it that is stored on a computer. Furthermore, new forms of personal data to collect are being identified, gathered, analyzed, and stored all the time....   [tags: Cryptography, Encryption, Cipher, Key]

Term Papers
778 words (2.2 pages)

Computer Forensics And Digital Data Essay

- computer, ranging from child pornography to data interception and theft. An investigator needs to ensure that the appropriate tools are utilized (US-Cert, 2008). There are several reasons as to why the appropriate tools must be utilized by investigators. Some of these reasons involve the deletion, damaging, or encryption of files. To prevent further damages as they seek to recover these files, the investigator must be knowledgeable of the array of methods and software available. There are two essential types data collected in computer forensics and the bulk of this exploratory research was devoted to data, cybersecurity, and cybercrimes as it relates to computer forensics and digital data....   [tags: Computer security, Information security, Security]

Term Papers
854 words (2.4 pages)

Government Surveillance in the Digital Age Essay

- Government Surveillance in the Digital Age Imagine walking along a busy street in the middle of a sunny day. Also imagine that someone is following you around, videotaping everything you do. Disturbing thought. Even more disturbing is the fact that the United States government is already doing this, and it's perfectly legal. According to Robert Trigaux, a reporter for the St. Petersburg times, until August of 2014, in Ybor City, Florida, the Tampa Police Department used fourty-six surveillance cameras that scanned faces of all people walking around the entertainment district....   [tags: Privacy in the Digital Age]

Term Papers
2364 words (6.8 pages)

Data Input, Output and Storage Essay examples

- DATA INPUT METHODS: Printed questionnaires – Depending on the type of questionnaires some form of optical data reading dives would be the best method. An OMR or Optical Mark Reader can be used in conjunction with special paper called mark sense form in order to easily input data from questionnaires where people just simply mark their answer from an already defined set of answers to a question. Another type of optical data reading that can be used with questionnaires is called OCR or optical character reader....   [tags: Data]

Free Essays
1570 words (4.5 pages)

Digital Data Essay

- In today’s world, people tend to run majority of their daily errands through the internet. It is easy, convenient, and it saves a lot of time. In one hour someone can make a deposit in his personal bank account, order a medical prescription, pay bills, apply for a loan, get some shopping, and more. All it takes for a customer to be able to do this is having an account with each of this company’s websites. Creating an account is usually a very simple process where the person provides some information and creates a user name and a password to be able to return to the website....   [tags: Security Information Internet Storing]

Free Essays
1153 words (3.3 pages)