With the rise of e-governance, online banking, e-commerce, and paperless communication, digital signatures have become an essential tool in ensuring authenticity, integrity, and non-repudiation of […]
Author: Sunny Shettipalli
1. UNCITRAL Model.
The UNCITRAL Model Law on Electronic Commerce, adopted in 1996 by the United Nations Commission on International Trade Law (UNCITRAL), provides a legal framework to […]
2. Netizen
A Netizen is a combination of the words “Internet” and “Citizen”. It refers to a person who actively uses the internet, especially someone who participates […]
3. Click wrap contract
A Click-Wrap Contract is a digital agreement where a user must click a button or checkbox indicating their acceptance of terms and conditions before accessing […]
4. E-Governance
E-Governance (Electronic Governance) refers to the use of information and communication technology (ICT) by the government to deliver services, share information, and engage with citizens, […]
5. Child Pornography
Under the Information Technology Act, 2000, child pornography is addressed explicitly through Section 67B, which prohibits: The Act classifies such activities as serious cyber offences […]
11. Protected system.
Under the Information Technology (IT) Act, 2000, a “Protected System” refers to any computer resource which the government designates as critical to national security, defense, […]
15. Data Protection.
Data Protection refers to the process and set of practices that ensure the privacy, integrity, and security of personal and sensitive data—whether it is stored, […]
19. In living/ Importance of IT
Information Technology (IT) has become an inseparable part of modern human life. From communication to education, business to healthcare, and governance to entertainment—IT influences almost […]
30. Net Extortion
Net Extortion (also called Cyber Extortion) is a form of cybercrime where an individual or group threatens to damage, steal, or expose sensitive digital information […]
