• +91 9810155766
  • karnika@sethassociates.com
  • FAQ
  • Online Query

KarnikaSeth.com

  • Home

  • Profile

  • Work Contribution

  • Representative Tasks

  • Media

  • Seminars

  • Publications

  • Articles

  • Books

  • Testimonials

Cyber Law Book Excerpt

Posted by admin in Wednesday, January 6th 2010   
Topics: book excerpt    
No Comment

“With the enforcement of the Information Technology Amendment Act 2008, India would become technologically neutral due to adoption of electronic signatures as a legally valid mode of executing signatures. This includes digital signatures as one of the modes of signatures and is far broader in ambit covering biometrics and other new forms of creating electronic […]

How does one combat Child Pornography?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

With the advent of internet pornography, particularly child pornography is become a major problem faced by nations. Many countries have attempted legislative measures to control this problem for example Section 67 of the IT Act makes publishing of any obscene information online as a punishable offence. There is Section 67B in the ITAct,2000 to combat […]

What is Cyber Terrorism?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

Cyber Terrorism denotes unlawful attacks and threats of attack against computers, network and information stored therein to intimidate or coerce a government or its people for propagating hidden political or unlawful social and religious motives. These attacks could result in violence against persons or property or cause public unrest. Few examples could be explosions, plane […]

What is Money Laundering and Tax Evasion:

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

On the Internet, anonymous ecash would allow for anonymous purchases of real and personal property. This fact yields at least two separate, but interrelated problems. First, the launderer or drug dealer will be able to discretely use illegally obtained profits to legitimately purchase property. However, currently, the opportunity to spend thousands of dollars of digital […]

What is Computer Forgery and Counterfeiting?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

Offences of computer forgery and counterfeiting have become rampant as it is very easy to counterfeit a document like birth certificate and use the same to perpetuate any crime. The authenticity of electronic documents hence needs to be safeguarded by making forgery with the help of computers abs explicit offence punishable by law. When a […]

What is a Logic Bomb ?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

A logic bomb[7] is a program, or portion of a program, which lies dormant until a specific piece of program logic is activated. In this way, a logic bomb is very analagous to a real-world land mine.The most common activator for a logic bomb is a date. The logic bomb checks the system date and […]

What is Cyberstalking?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

Cyberstalking, which is simply an extension of the physical form of stalking, is where the electronic mediums such as the Internet are used to pursue, harass or contact another in an unsolicited fashion. Most often, given the vast distances that the Internet spans, this behaviour will never manifest itself in the physical sense but this […]

What is the Love bug virus?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. See ‘What is a computer virus ?’ Published: October 23, 2006 This new bug is distributed as an attachment to an e-mail message entitled, “I Love You.” […]

Cyber Law Book Excerpt

Posted by admin in Wednesday, January 6th 2010   
Topics: book excerpt    
No Comment

“The magnetic stripe on the back of your card has all information about your card encoded on it. Sometimes, when the card is handed over, or gets out of sight of the cardholder, fraudsters will use small pager-size devices called ‘skimmers’ or readers/writers to copy the information on the magstripe of the card. This information […]

What is a Trojan Horse ?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses[3]do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. The term comes from the […]

Newer Entries »
« Older Entries
The Book - Potection of children on internet by Karnika Seth
Computers, Internet and New Technology Laws by Karnika Seth
Video Gallery
Press Room
Blog
Blog
Books & e-Books
  • Profile
  • Work Contribution
  • Representative Tasks
  • Media
  • Seminars
  • Disclaimer
  • Privacy Policy
  • FAQ
  • Testimonials

Contact Us

KARNNIKA A SETH
Cyberlaw Expert
Chairperson, Lex cyberia
Managing Partner, Seth Associates

CORPORATE LAW OFFICE

721, Tower-B, Advant Navis Business Park,
Plot No. 7, Sector 142, Expressway, NOIDA-201301 (U.P.),India
Tel: +91 (120) 4585437,
+91 9810155766
Email: karnika@sethassociates.com
Websites:
www.sethassociates.com
www.lexcyberia.com
www.karnikaseth.com

  • +91 9810155766
  • karnika@sethassociates.com
  • 721, Tower-B, Advant Navis Business Park, Plot No. 7, Sector 142, Expressway, NOIDA-201301 (U.P.),India
Copyright 2007-2026 Karnika Seth - Cyberlawyer & Expert