1. Facts of the Case Mr. ‘A’ gains unauthorized access to a computer system belonging to Mr. ‘B’ and steals the source code used in […]
Author: Sunny Shettipalli
19. Mr.A of Canada sends Indecent E-mail to Mr.B of Chandigarh on his E-mail address. Under which provision of Information Technology Act, 2000 Mr.A will be liable.
1. Facts of the Case Mr. A, a resident of Canada, sends an indecent and offensive email to Mr. B, who resides in Chandigarh, India. […]
16. The original home page of a website belonging to a Government Department is substituted with another page by a computer miscreant. Disturbing images and offensive phrases are displayed in the process. It
1. Facts of the Case A government department’s official website, which serves as a public information portal, was illegally accessed by a cyber miscreant. The […]
13. Messages which are offensive to a particular religion, community, ethnic group or political party are posted in a blog BIO social networking site. Such messages might have the effect of either inciting hatred in the minds of the people or communal clashes between two groups. Is it an offence under the Information Technology Act, 2000? Examine.
1. Facts of the Case A user on a popular blogging or social networking platform posts content that is deeply offensive to a specific religion, […]
12. A bank employee nserts a program, into a bank’s server, that deducts small amount of money, to say Rs. 2/- a month, from the account of every customer. NO account holder probably notice this unauthorized debit but The bank employee will make a sizable amount of money every month. Discuss how the Inform Technology Act handles such financial crimes
1. Facts of the Case A bank employee, leveraging his access to the bank’s internal systems, clandestinely inserts a program into the bank’s central server. […]
9. Unsolicited emails are a menace. They should have a provision to unsubscribe them or they may not be sent Unless asked for. Many countries have enacted laws against unsolicited mail known as Anti Social laws. Is the Information Technology Act takes care of such a problem?
Unsolicited emails—commonly known as spam—are more than just an inconvenience. They clog inboxes, waste time, and in many cases, pose serious cyber threats like phishing […]
3. Ram is a skilled professional and tries to enter into the privacy of Raghu’s space without his permission. Is Ram liable? Discuss.
Privacy is a fundamental right in today’s fast-paced digital and social world. Whether it’s our personal data, home, or social relationships, privacy has become a […]
2. What is E-Commerce? Explain how the Information Technology Act seeks to remedy most of the problems in the field of E-Commerce
Electronic Commerce (E-Commerce) is the buying and selling of goods and services, the transfer of funds, or the exchange of data over the Internet. It […]
5. Explain the technical and legal provisions relating to Digital signatures.
In the digital age, where electronic records and online communication have replaced traditional paper-based documentation, the need for secure and reliable authentication mechanisms has become […]
12. Discuss the technical and legal aspects relating to Electronic Contracts and E-Commerce,
With the rise of the internet and digital technologies, electronic contracts (e-contracts) and e-commerce have revolutionized the way business is conducted in India. From buying […]