E-Contract Laws With Contractual Formation & Challenges
E-Contract Laws With Contractual Formation & Challenges
E-Contract Laws With Contractual Formation & Challenges
Challenges
Abstract
______________________________________________________________________
_________________
Name- Prof.N.P.Ghadge (BSL,LLM.DLL,DCL,PhD Regd.)
Designation- MBA Faculty,Asst.Training & Placement officer.
Office Add.- YSPMS,YTC,Satara,Maharashtra.
Home Add.- 5,Aashirwad,A/P-Khindwadi,T/D.-Satara,Maharashtra.
E-mail add - 1) [email protected],
2) [email protected]
Mo.No. 9881543555
It is quite unlikely for most computer literate people in India that a day
has passed without him or her coming across a point while dealing with
computers where he or she did not had to manifest his or her assent to some
terms .In case of surfing the Internet, it is generally done by clicking on some
icon like "I Agree" and in cases of installing a software, assent is generally shown
by the conduct of tearing the CD package and using it. Most of us do it as just
another "necessary evil" to get our job done. However miniscule it may seem to
a lay man, these actions of ours is of immense importance because it leads to a
valid and enforceable contract and those terms, that we hardly even bother to
read, can be strictly enforced against us.
Definition of E-Contract:
These contracts used in trade transactions which enables the transfer of data
from one computer to another in such a way that each transaction in the trading
cycle (for example, commencing from the receipt of an order from an overseas
buyer, through the preparation and lodgment of export and other official
documents, leading eventually to the shipment of the goods) can be processed
with virtually no paperwork. Here unlike the other two there is exchange of
information and completion of contracts between two computers and not an
individual and a computer.
Social Media & Indian Cyber Law
Researcher has find out social media & Indian cyber law approach that, In India,
there has been a lot of controversy over the last few months over Section 66A of
the Indian Cyber law being the amended Indian Information Technology Act,
2000 on different occasions. In Professor Amices Mahapatra case, Professor
Amices Mahapatra was arrested on account of forwarding of caricature/cartoons
on Face book. Further, Ravi Srinivasan Twitter case showed how on a complaint,
a persons tweets could be brought within the ambit of Section 66A of the
amended Indian Information Technology Act, 2000. In K V Rao case, two men K.V.
Rao and Mayank from Mumbai were arrested for allegedly posting offensive
comments against some leaders on their Face book group.
In India, there has been a lot of controversy over the last few months
over Section 66A of the Indian Cyber law being the amended Indian Information
Technology Act, 2000 on different occasions. In Professor Amices Mahapatra
case, Professor Amices Mahapatra was arrested on account of forwarding of
caricature/cartoons on Face book. Further, Ravi Srinivasan Twitter case showed
how on a complaint, a persons tweets could be brought within the ambit of
Section 66A of the amended Indian Information Technology Act, 2000.
Statute of Frauds
There are already many research is going on for various email clients to control the spams by
using filters. In doing so we have examined the definition of spam, the users requirements and the
role of the spam filter as according to our need and specific requirements. There are comparisons are
not easy, as benchmarks, measures, and methods for evaluating spam filters are still evolving. We
survey these efforts, and their results. In spite of recent development in evaluation methodology,
many uncertainties still remain which effect on filtering spam techniques and check the validity of
spam filter evaluation techniques. Here we are going to advocate several prevalent filtering
techniques and propose our work to acknowledge them. So the next time you uninterestingly click on
an "I agree" button without even caring to see the terms or hurriedly tear the wrap of software CD
being least interested about the terms typed on it "Think Twice"! They are all are valid contracts and
you could be made liable for the terms and conditions laid down there.
Jurisdiction
Conclusion
There are already many research is going on for various email clients to control
the spams by using filters. In doing so we have examined the definition of spam, the
users requirements and the role of the spam filter as according to our need and
specific requirements. There are comparisons are not easy, as benchmarks,
measures, and methods for evaluating spam filters are still evolving. We survey
these efforts, and their results.
Reference
1. Bakshi P.M & Suri R.K, Cyber and E-commerce Laws, Bharat Publishing House, edn 1, 2002.
2. Ryder D.Rodney, Guide to Cyber Laws, Wadhwa & Co. Publishers, edn.1, 2001.
3. www.legalserviceindia.com
4. www.asianlaws.org