SHORT Questions
1. Cyber Space
3. Internet Service Providers (ISPS )
4. Domain name
5, Hacking
9. Phishing
10. Encryption
11. Digital Signature Certificate
12. E-Banking
13. Source Code
14. Domain name disputes and WIPO
15. Legal recognition of electronic documents
16. Cyber terrorism
17. identity theft
18. E-Taxation
19. Hate speech in the internet
22. Net Extortion
23. In living/ Importance of IT
24. Data Protection.
27, E-Governance
29, Netizen
30、 UNCITRAL Model.
31. Cyber Security
34, Software piracy
35, Cyber stalking
36. Intermediaries
37, E-Commerce
38, Domain name disputes and WIPO
39. Cyber squating
42. Cyber obscenity
43 Ethics and characters in Cyber space
44. Wi-Fi
Long Questions
4. Define Cyber Crime and discuss the different kinds of cyber Crimes.
5. Explain the technical and legal provisions relating to Digital signatures.
8. How is the copyright protected in digital era? Explain with special reference to Fair Use defensc.
9. Who are intermediaries? Discuss the liability of intermediaries
10. Discuss the functions of controller and powers of Controller of Certifying Authorities
11. What was the need for the cnactment of the Information Technology Act.20007
12, Discuss the technical and legal aspects relating to Electronic Contracts and E-Commerce,
13. Enumerate and explain the offences punishable under the Information Technology Act,2000.
15 .What are the objects of the Information Technology Act 2000 as amended in 2008.
17, Is there any protection for digital signature in India? What method has the Act adopted7 Explain.
18. Explain the powers of Cyber Appellate Tribunal
20. With the help of decided cases discuss the impact of information technology on the proteetion of
22, How information technology has affected right to privacy? Discuss
Case Laws
- A pornographic content was made available- through the service of an Internet Service Provider (ISP). Discuss the liability of such ISP under the Information Technology Act, 2000,
- Uninvited emails are always unwanted. They must have a provision to subscribe. Many countries have enacted laws against such unsolicited or uninvited mails known as Anti Spam Laws. Does the Information Technology Act takes care of such a problem? Discuss
- Ram is a skilled professional and tries to enter into the privacy of Raghu’s space without his permission. Is Ram liable? Discuss.
- Two unknown persons from Calicut posted some offensive comments against some leaders on their face book group and took the defence of Right to expression. Discuss.
- “A” is studying 5th class in the Hyderabad city has involved in a cyber crime with Explain the law to deal the case
- Ramu is Buying and selling of goods and services on the internet, but once he Explain the available remedies to “X” a US based Company.felt deficiency of services?
- “X” is sending a secret cypher and decoding at his friend Y end? Explain the Law.
- Explain the case facts involved in Yahoo.inc Vs Akash Arora case
- Unsolicited emails are a menace. They should have a provision to unsubscribe them or they may not be sent Unless asked for. Many countries have enacted laws against unsolicited mail known as Anti Social laws. Is the Information Technology Act takes care of such a problem?
- ‘Dow Jones & Company Incorporated’ is the publisher of Wall Street Journal. It also publishes a magazine known as Barrons. This magazine is also put online on Servers maintained at New Jersey, USA it carried article ‘Unholy Gains’, which was alleged to be defamatory to Joseph Gutnick resident of Victoria Australia. He filed a suit for damages in Victoria. Preliminar y objection was raised as to the maintainability
in an Australian Court. Decide in the light of jurisdictional issues and law. - A customer contacted with a car park n machine representing the owner and he fed his money into received a claim ticket for the purpose of parking of his car. Is there a valid contract in this Transaction. Explain how the essentials of a valid contract are present in this transaction.
- A bank employee inserts a program, into a bank’s server, that deducts small amount of money, to say Rs. 2/- a month, from the account of every customer. NO account holder probably notice this unauthorized debit but The bank employee will make a sizable amount of money every month. Discuss how the Inform Technology Act handles such financial crimes
- Messages which are offensive to a particular religion, community, ethnic group or political party are posted in a blog BIO social networking site. Such messages might have the effect of either inciting hatred in the minds of the people or communal clashes between two groups. Is it an offence under the Information Technology Act, 2000? Examine.
- A computer scientist accepts online payments and allows paying customers to view or download pornographic pictures and videos from his website. Is it an offence punishable under the Information Technology Act, 2000? Discuss the nature of offence and the punishment for it.
- In an Engineering college, private version of software is used in the computer lab. Is there any violation of the Information Technology Act and the copyright Act? Examine
- The original home page of a website belonging to a Government Department is substituted with another page by a computer miscreant. Disturbing images and offensive phrases are displayed in the process. It
- Mr.X fraudulently acquires the sensitive information such as Passwords and credit card details, and misrepresents himself and uses the parameters for his personal purpose. What is the offence committed by Mr.X
- Two men from Mumbai posted offensive comments against some leaders on their face book group and took the defence of Right to expression. Discuss.
- Mr.A of Canada sends Indecent E-mail to Mr.B of Chandigarh on his E-mail address. Under which provision of Information Technology Act, 2000 Mr.A will be liable.
- Mr. ‘A’ steals computer source code used for Mr. ‘B’s computer. Is Mr.’A’ liable?
- Mr. X, with an intention to cause panic among the people, manipulated the computer network of Railway Signaling system maintained by South Central Railway. As a result, the incharge of the system could not give instructions to drivers of the trains, and thus resulting in a big rail way accident which killed 20 persons leaving 200 persons injured. What cyber crime Mr. X has committed?Decide.
- Mr. X has stolen his friend Mr. Y’s creative video film on heritage sites of Hyderabad from his classmate and uploaded the same on ‘You Tube’ in the internet. Mr. Y wrote to ‘You Tube’ people about the unlawful act and asked them to remove his film from internet. “You Tube’ has removed the film on the same day on which they received the request. Whether ‘You Tube’ is liable for contributing/assisting to the unlawful act of Mr.X
- ‘DIPCART” an E-commerce firm situated in Bangalore deals with consumer goods like mobile phones and other digital products. Basing upon the advertisement given by the ‘DICART n the internet, a number of people purchased mobile phones from the E-commerce firm. One Mr. X from Hyderabad received a defective mobile phone from the same lodge a complaint in consumer forum. Discuss whether Hyderabad District Consumer Forum has jurisdiction to entertain the complaint.
- Mr. X, an employee of a BPO company, disclosed the data of his company to an outsider so as to enable him to divert the clients of his company to that person. Is X guilty of committing any offence? Examine.