Introduction Publishing or transmitting obscene material in electronic form refers to the act of distributing, sharing, or making ava...
What is Cyber Terrorism? Punishment for cyber terrorism (Section 66F)
What is Cyber Terrorism? Cyberterrorism refers to the use of digital technology and the internet to conduct attacks with the intent of ca...
Violation of privacy & Punishment for violation of privacy (Cyber Law)
Violation of privacy Violation of privacy refers to any unauthorized or unwarranted intrusion into an individual's personal affa...
Cheating by personation by using computer resource (Section 66D)
What is cheating by personation by using computer resources? Cheating by personation using computer resources, often referred to simply ...
Punishment for identity theft (Section 66C of Information Technology Act 2000)
What is Identity Theft? In simple language, Identity theft is a type of crime in which a person's personal information is stolen a...
Hacking with computer systems , Data Alteration (Section 66 of Information Technology Act 2000)
Introduction Hacking with the intent to alter data on computer systems is a serious and unlawful activity. It involves unauthorized acc...
Tampering with computer source Documents (Sec.65 of Infirmation Technology Act 2000)
Introduction - Tampering with computer source documents refers to the act of intentionally altering or modifying the original sourc...
Secure Electronic Records and Secure Electronic Signature (IT Act 2000)
Chapter V of the Information Technology Act 2000 Deals with Secure Electronic Records and Secure Electronic Records. Section 2(t) of the sa...
Electronic Signature Certificates (Information Technology Act 2000)
An electronic signature certificate is an electronic document that binds an identity to an electronic signature. It is used to verify ...
Punishment for Tampering with computer source documents and Computer related offences
Computer-related offenses carry heavy punishments ranging from a fine to life imprisonment depending on the nature of actions. These m...
Punishment for Cyber Terrorism
What is Cyber Terrorism Cyberterrorism is the use of computers and information technology to disrupt, damage, or destroy the systems of ...
Punishment for publishing or transmitting material depicting children in sexually explicit act, etc., in electronic form
When publishing or transmitting material depicting children in sexually explicit acts, you've committed a crime. This is because it...
Punishment for sending offensive messages through communication services
Sending offensive messages through communication services could lead to big trouble. These days, there are several laws that protect th...
Violation of privacy: Punishment for violation of privacy
Violation of privacy - Violation of privacy is an invasion of an individual's right to the privacy of his or her personal informati...
Cyber Law MCQ - 3 (Multiple Choice Questions with Answers)
1. According to the IT Act, 2008 is a person who sends, generates, stores or transmits any electronic message to be sent, generated, stored...
Cyber Law MCQ - 2 (Multiple Choice Questions with answer)
1. Cognizable offenses as described as___________ A. It is the offense in which a police officer can arrest the convict without a warrant. B...
See Also..
-
1) Consider the following statements : A) Every promise is an agreement. B) Every agreement is a contract. C) A contrac...
-
1) Which one of the following element is not necessary for a contract ? A) Competent parties B) Reasonable terms and condition...
-
1) Give correct answer : A) Void agreements are always illegal. B) Illegal agreements are always voidable . C) Illegal a...
-
Computer is an important part of an accounting system. Computerized accounting systems are important to business in various...
-
Advantages of Law - There are many Advantages of law... some of the them are as follows : 1) Uniformity and Certainty: ...