The UNCITRAL Model Law on Electronic Commerce, adopted in 1996 by the United Nations Commission on International Trade Law (UNCITRAL), provides a legal framework to […]
Author: Sunny Shettipalli
2. Netizen
A Netizen is a combination of the words “Internet” and “Citizen”. It refers to a person who actively uses the internet, especially someone who participates […]
3. Click wrap contract
A Click-Wrap Contract is a digital agreement where a user must click a button or checkbox indicating their acceptance of terms and conditions before accessing […]
4. E-Governance
E-Governance (Electronic Governance) refers to the use of information and communication technology (ICT) by the government to deliver services, share information, and engage with citizens, […]
5. Child Pornography
Under the Information Technology Act, 2000, child pornography is addressed explicitly through Section 67B, which prohibits: The Act classifies such activities as serious cyber offences […]
11. Protected system.
Under the Information Technology (IT) Act, 2000, a “Protected System” refers to any computer resource which the government designates as critical to national security, defense, […]
15. Data Protection.
Data Protection refers to the process and set of practices that ensure the privacy, integrity, and security of personal and sensitive data—whether it is stored, […]
19. In living/ Importance of IT
Information Technology (IT) has become an inseparable part of modern human life. From communication to education, business to healthcare, and governance to entertainment—IT influences almost […]
30. Net Extortion
Net Extortion (also called Cyber Extortion) is a form of cybercrime where an individual or group threatens to damage, steal, or expose sensitive digital information […]
39. Escrow agreements
An Escrow Agreement is a legal contract involving three parties: The escrow agent holds money, documents, or assets on behalf of the buyer and seller […]