“Perhaps, the greatest impact that IT has had is on blurring the time and geographical divide. Through one computer station installed in a part of the world we are able to connect and transact business across borders and physical territories. Huge amounts of data can be stored and processed and retrieved through use of computers. […]
Cyber Law Book Excerpt
“The quandary over application of traditional rules to online transactions has brought a common consensus on atleast few basic principles that are accepted worldwide to regulate the cyberspace. Firstly, equivalence of traditional and electronic transactions. Much of the legislative reform across nations is based on the UNCITRAL Model Law of Electronic Commerce 1996. Secondly, establishing […]
Cyber Law Book Excerpt
“In the last decade, India witnessed an unprecedented index of cyber crimes, inter alia, trojan attacks, salami attacks, e-mail bombing, DOS attacks, information theft, or the most common offence of hacking. Despite technological measures being adopted by corporate organisations and individuals, the frequency of cyber crimes has increased over the last decade. Reliable sources report […]
Cyber Law Book Excerpt
“India’s IT Act is comprehensive legislation, but contains many lacunae. The passage of the IT Amendment Act 2008 will resolve many practical difficulties faced in the implementation of the Act. The IT Amendment Bill 2008 aims to bring significant changes in extant cyber laws in India,inter alia, introducing legal recognition to electronic signatures, data protection […]
Cyber Law Book Excerpt
“With the enforcement of the Information Technology Amendment Act 2008, India would become technologically neutral due to adoption of electronic signatures as a legally valid mode of executing signatures. This includes digital signatures as one of the modes of signatures and is far broader in ambit covering biometrics and other new forms of creating electronic […]
Cyber Law Book Excerpt
“The magnetic stripe on the back of your card has all information about your card encoded on it. Sometimes, when the card is handed over, or gets out of sight of the cardholder, fraudsters will use small pager-size devices called ‘skimmers’ or readers/writers to copy the information on the magstripe of the card. This information […]
Cyber Law Book Excerpt
“Article 21 of the Constitution of India covers the right to privacy as a fundamental right to protect the autonomy interest. Further, the IT Amendment Bill 2008 introduces s 66E to specifically deal with menace of video voyeurism and MMS scams. According to this section, whoever intentionally or knowingly captures, publishes or transmits the image […]