1. Facts of the Case ‘DIPCART’ is an e-commerce company based in Bangalore, Karnataka, dealing in digital products, including mobile phones, tablets, and accessories. The […]
Author: Sunny Shettipalli
21. Mr. X, with an intention to cause panic among the people, manipulated the computer network of Railway Signaling system maintained by South Central Railway. As a result, the incharge of the system could not give instructions to drivers of the trains, and thus resulting in a big rail way accident which killed 20 persons leaving 200 persons injured. What yber crime Mr. X has committed?Decide.
1. Facts of the Case Mr. X, with the malicious intent to create panic and disrupt public infrastructure, illegally accessed and manipulated the computer network […]
20. Mr. ‘A’ steals computer source code used for Mr. ‘B’s computer. Is Mr.’A’ liable?
1. Facts of the Case Mr. ‘A’ gains unauthorized access to a computer system belonging to Mr. ‘B’ and steals the source code used in […]
19. Mr.A of Canada sends Indecent E-mail to Mr.B of Chandigarh on his E-mail address. Under which provision of Information Technology Act, 2000 Mr.A will be liable.
1. Facts of the Case Mr. A, a resident of Canada, sends an indecent and offensive email to Mr. B, who resides in Chandigarh, India. […]
16. The original home page of a website belonging to a Government Department is substituted with another page by a computer miscreant. Disturbing images and offensive phrases are displayed in the process. It
1. Facts of the Case A government department’s official website, which serves as a public information portal, was illegally accessed by a cyber miscreant. The […]
13. Messages which are offensive to a particular religion, community, ethnic group or political party are posted in a blog BIO social networking site. Such messages might have the effect of either inciting hatred in the minds of the people or communal clashes between two groups. Is it an offence under the Information Technology Act, 2000? Examine.
1. Facts of the Case A user on a popular blogging or social networking platform posts content that is deeply offensive to a specific religion, […]
12. A bank employee nserts a program, into a bank’s server, that deducts small amount of money, to say Rs. 2/- a month, from the account of every customer. NO account holder probably notice this unauthorized debit but The bank employee will make a sizable amount of money every month. Discuss how the Inform Technology Act handles such financial crimes
1. Facts of the Case A bank employee, leveraging his access to the bank’s internal systems, clandestinely inserts a program into the bank’s central server. […]
9. Unsolicited emails are a menace. They should have a provision to unsubscribe them or they may not be sent Unless asked for. Many countries have enacted laws against unsolicited mail known as Anti Social laws. Is the Information Technology Act takes care of such a problem?
Unsolicited emails—commonly known as spam—are more than just an inconvenience. They clog inboxes, waste time, and in many cases, pose serious cyber threats like phishing […]
3. Ram is a skilled professional and tries to enter into the privacy of Raghu’s space without his permission. Is Ram liable? Discuss.
Privacy is a fundamental right in today’s fast-paced digital and social world. Whether it’s our personal data, home, or social relationships, privacy has become a […]
2. What is E-Commerce? Explain how the Information Technology Act seeks to remedy most of the problems in the field of E-Commerce
Electronic Commerce (E-Commerce) is the buying and selling of goods and services, the transfer of funds, or the exchange of data over the Internet. It […]
