Power to issue directions for interception or monitoring or decryption of any information through any computer resource.-- (1) Where the ...
Punishment for Publishing or Transmitting Obscene Material in electronic form
Introduction Publishing or transmitting obscene material in electronic form refers to the act of distributing, sharing, or making ava...
What is Cyber Terrorism? Punishment for cyber terrorism (Section 66F)
What is Cyber Terrorism? Cyberterrorism refers to the use of digital technology and the internet to conduct attacks with the intent of ca...
Violation of privacy & Punishment for violation of privacy (Cyber Law)
Violation of privacy Violation of privacy refers to any unauthorized or unwarranted intrusion into an individual's personal affa...
Cheating by personation by using computer resource (Section 66D)
What is cheating by personation by using computer resources? Cheating by personation using computer resources, often referred to simply ...
Punishment for identity theft (Section 66C of Information Technology Act 2000)
What is Identity Theft? In simple language, Identity theft is a type of crime in which a person's personal information is stolen a...
Dishonestly receiving stolen computer resource or communication device (Cyber Law)
Dishonestly receiving stolen computer resource or communication device Introduction - "Dishonestly receiving stolen computer re...
Sending offensive messages through communication service, etc (Cyber Law)
Introduction Sending offensive messages through communication services is a form of online harassment or cyberbullying. It involves us...
Hacking with computer systems , Data Alteration (Section 66 of Information Technology Act 2000)
Introduction Hacking with the intent to alter data on computer systems is a serious and unlawful activity. It involves unauthorized acc...
See Also..
-
1) Consider the following statements : A) Every promise is an agreement. B) Every agreement is a contract. C) A contrac...
-
1) Which one of the following element is not necessary for a contract ? A) Competent parties B) Reasonable terms and condition...
-
Computer is an important part of an accounting system. Computerized accounting systems are important to business in various...
-
1) Give correct answer : A) Void agreements are always illegal. B) Illegal agreements are always voidable . C) Illegal a...
-
Advantages of Law - There are many Advantages of law... some of the them are as follows : 1) Uniformity and Certainty: ...