Preview

Cyber Law

Good Essays
Open Document
Open Document
821 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Law
Cyber Laws Notes
Adv. Ravindra T. Jadhav
Book referred :- A Practical Guide to Information Technology Act, 2000
Author : Nitant P. Trilokekar
Publisher : Snow White

Information Technology Act, 2000 at Glance
This Act is result of a resolution passed at the UNO Since jurisdiction is always the stumbling block in the prosecution of internet crimes, co-operation is sought from member countries by the United Nations.

The Act has introduced a concept of Digital Signature. Each technique having varying degrees of security and ease of operation.

Futures of Internet affecting daily lives 1. E-mail 2. Surfing for information 3. Net Telephone 4. Chat 5. Shopping 6. Banking

Cyber Crimes
1. Computer network beak-ins
2. Industrial espionage
3. Copyrighyt piracy
4. Software piracy
5. Child pornography
6. E-mail bombing
7. Password snuffers
8. Spoofing
9. Credit card fraud
10. Cyber squatting
11. Misleading search words

Some of the important Definition:

Adjudication Officer: (S. 2.c)
Adjudication officer means adjudication officer appointed under sub section 1 of section 46.

Power:
1. For the purpose of adjudging under this Chapter when any person has committed a contravention of any of the provision of this Act or any rule, regulation , direction or order made by Central Government .

2. To conduct the inquiry

3. shall have the power of a civil court

Appointment qualification :
No person shall be appointed as an adjudication officer unless he possesses such experience in the field of Information Technology and legal or Judicial experience as may be prescribed by the Central Government. Central Government shall appointed by order.

Asymmetric crypto system :
It means a system of a security key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature

Certifying Authority :
Means a person who has been granted a license to issue a Digital Signature

You May Also Find These Documents Helpful

  • Satisfactory Essays

    There are certain laws which are applied by the judge regarding this case in order to take decision:The regulations…

    • 504 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The Issue of this case was to determine whether or not Signature 's claimed invention the “056 Patent”, a data processing system, is drawn to statutory subject topic under 35 U.S.C 101. The Court ruling holds that the '056 Patent is directed to non-statutory subject matter under 35 U.S.C 101 and is therefore invalid. A unanimous Federal Circuit panel of Judges named Rich, Plager and Bryson overturned The Massachusetts District Courts…

    • 2418 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Adjudication – individual, past conduct, resolution of dispute, based upon facts of dispute, determines compliance or sanctions…

    • 3128 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Cyberlaw Outline

    • 3821 Words
    • 16 Pages

    - Use of Brookfield’s MovieBuff trademark by West Coast as a domain name was infringement.…

    • 3821 Words
    • 16 Pages
    Good Essays
  • Good Essays

    Robinson, E. (2012, September 20). What is a computer hacker [Blog post]. Retrieved from http://blog.lifestore.aol.com/2012/09/20/what-is-a-hacker/…

    • 853 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Is3230 Lab 1 PKI Analysis

    • 851 Words
    • 4 Pages

    The digital signature process results in a bit string that allows a recipient of a message to verify the identity of the signer of the message and the integrity of the message. Any one of several digital signature algorithms can generate the bit string. These algorithms have the generic characteristic that private information is used to make a signature and public information is used to verify signatures. A private key should be unique to its owner. If the owner of a private key uses it to encrypt a digital document, that encryption may be assumed to have the same meaning as a paper signature. It is a like a mark on the document that only the owner could have…

    • 851 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Study Guide for Business Law

    • 2585 Words
    • 11 Pages

    Policy makers, users, and posters are all concerned about the degree to which we need to impose the force of law on Internet activities.…

    • 2585 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Book Review - Cyberethics: Morality and Law in Cyberspace, 4th Edition by Richard Spinello, Sudbury, MA: Jones and Bartlett Publishers, 2003…

    • 1813 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Webster’s dictionary defines diversity as, “the condition of being different: variety.” The United States of America is very diverse. We have had some influential people that have helped steer us in the ways that we know diversity today. Dr. Martin Luther King Jr. was very influential in changing the way many white Americans looked at African- Americans during the 1960’s. Long before Dr. King marched on Selma, Alabama and gave his “I Have a Dream” speech in Washington, D.C., Abraham Lincoln tried to change the culture of America by freeing the slaves in 1865 with the Emancipation Proclamation. However, one hundred years later, African-Americans still did not have the same rights as white Americans. They could not ride in the front of the bus, enter the same door of a restaurant, drink from the same water fountain, or attend the same schools as whites. Because of Dr. King’s determination and leadership, the culture of America began to change. In 2008, we saw the greatest example of this change with the election of the first African-American President of the United States, Barack Obama.…

    • 504 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A digital signature is the term used for marking or signing an electronic document, by a process meant to be equivalent to paper signatures, but which makes use of a technology known as public-key cryptography. Additional security properties are required of signatures in the electronic world. This is because the probability of disputes rises dramatically for electronic transactions without face-to-face meetings, and in the presence of potentially undetectable modifications to electronic documents. Digital signatures address both of these concerns, and offer far more security than paper signatures. Compared to all other forms of signatures, digital signatures are by far the most easily verified and the most reliable with respect to…

    • 782 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    (Siegel, Introduction to Criminal Justice, 2011) I had no idea that pornography and prostitution was mentioned along with copyright infringement. The second cybercrime mentioned is cyber vandalism. Cyber vandalism is a malicious attacks, disrupting-defacing, and destroying technology. This crime is motivated by malice not greed. (Siegel, Introduction to Criminal Justice, 2011) Some examples of cyber vandalism are:…

    • 741 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Warrants

    • 388 Words
    • 2 Pages

    The law provides suspects with a right to privacy as well as a safeguard to illegal search and seizures in the form of search warrants. While traditional search warrants must specify what can be searched, which makes everything else off limits without obtaining additional warrants, it creates a problem for cyber-related searches. In the case of cyber warrants, just as with traditional warrants, there must be probable cause to issue a warrant. If the probable cause can be established, such as an advertisement concerning the suspect for illegal activity such as child pornography, then the warrant can be issued for a search and seizure of the suspect’s computer. While in this case, it is legal within the constraints of the warrant to obtain the…

    • 388 Words
    • 2 Pages
    Good Essays
  • Good Essays

    I declare that the thesis entitled “A Comparative study on different forms of ADR in India – A study” submitted by me for the degree of Master of Laws in ADR LAW from Osmania University College Law Hyderabad, is original and has not been submitted previously in part or in full to this or any other college or university, for any degree.…

    • 30173 Words
    • 121 Pages
    Good Essays
  • Good Essays

    This pie chart shows the market shares of a fast food industry that the McDonald’s corporation has 13% share, Yum! Brand’s Inc. 10%, Doctor’s Association Inc. 9%, and Wendy’s have 4% of shares. While the other’s has 64% of share, including the share of a Tropical Hut.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Infrastructure (PKI) which international networks such as S.W.I.F.T. are now planning to implement ; v Commencement of Certification Authority (CA) functions of the IDRBT for ensuring that electronic banking transactions get the requisite legal protection…

    • 5990 Words
    • 24 Pages
    Better Essays