1. Facts of the Case Mr. A, a resident of Canada, sends an indecent and offensive email to Mr. B, who resides in Chandigarh, India. […]
Archives
16. The original home page of a website belonging to a Government Department is substituted with another page by a computer miscreant. Disturbing images and offensive phrases are displayed in the process. It
1. Facts of the Case A government department’s official website, which serves as a public information portal, was illegally accessed by a cyber miscreant. The […]
17. Mr.X fraudulently acquires the sensitive information such as Passwords and credit card details, and nisrepresents himself and uses the parameters for his personal purpose. What is the offence committed by Mr.X
1. Facts of the Case Mr. X fraudulently acquired sensitive personal information, including passwords, credit card numbers, and authentication credentials, by misrepresenting his identity. He […]
15. In an Engineering college, private version of software is used in the computer lab. Is there any violation of the Information Technology Act and the copyright Act? Examine
1. Facts of the Case An engineering college runs a computer laboratory for teaching programming, CAD/CAM and other technical subjects. Instead of purchasing licensed copies, the […]
13. Messages which are offensive to a particular religion, community, ethnic group or political party are posted in a blog BIO social networking site. Such messages might have the effect of either inciting hatred in the minds of the people or communal clashes between two groups. Is it an offence under the Information Technology Act, 2000? Examine.
1. Facts of the Case A user on a popular blogging or social networking platform posts content that is deeply offensive to a specific religion, […]
14. A computer scientist accepts online payments and allows paying customers to view or download pornographic pictures and videos from his website. Is it an offence punishable under the Information Technology Act, 2000? Discuss the nature of offence and the punishment for it
1. Facts of the Case A computer scientist has developed and operates a commercial website that accepts online payments and allows users, upon payment, to […]
11. A customer contacted with a car park n machine representing the owner and he fed his money into received a claim ticket for the purpose of parking of his car. Is there a yalid contract in this Transaction. Explain how the essentials of a valid contract are present in this transaction.
1. Facts of the Case A customer approached a self-operating car parking machine installed by a parking facility. The machine, acting on behalf of the […]
12. A bank employee nserts a program, into a bank’s server, that deducts small amount of money, to say Rs. 2/- a month, from the account of every customer. NO account holder probably notice this unauthorized debit but The bank employee will make a sizable amount of money every month. Discuss how the Inform Technology Act handles such financial crimes
1. Facts of the Case A bank employee, leveraging his access to the bank’s internal systems, clandestinely inserts a program into the bank’s central server. […]
10. ‘Dow Jones & Company Incorporated’ is the publisher of Wall Street Journal. It also publishes a magazine known as Barrons. This magazine is also put online on Servers maintained at New Jersey, USA it carried article ‘Unholy Gains’, which was alleged to be defamatory to Joseph Gutnick resident of Victoria Australia. He filed a suit for damages in Victoria. Preliminar y objection was raised as to the maintainabiliin an Australian Court. Decide in the light of jurisdictional issues and law.
1. Facts of the Case Dow Jones & Company Inc., a U.S.-based publisher of the Wall Street Journal, also publishes a financial magazine called Barron’s, […]
9. Unsolicited emails are a menace. They should have a provision to unsubscribe them or they may not be sent Unless asked for. Many countries have enacted laws against unsolicited mail known as Anti Social laws. Is the Information Technology Act takes care of such a problem?
Unsolicited emails—commonly known as spam—are more than just an inconvenience. They clog inboxes, waste time, and in many cases, pose serious cyber threats like phishing […]
