Osmania University LLB 3 YDC Information Technology Law [Important Questions]

it law 2000

SHORT Questions

1. Cyber Space

2. Electronic Evidence

3. Internet Service Providers (ISPS )

4. Domain name

5, Hacking

6. Kinds of Operating System

7, Search Engines

8. Electronic Signature

9. Phishing

10. Encryption

11. Digital Signature Certificate

12. E-Banking

13. Source Code

14. Domain name disputes and WIPO

15. Legal recognition of electronic documents

16. Cyber terrorism

17. identity theft

18. E-Taxation

19. Hate speech in the internet

20. Credit card frauds

21. Escrow agreements

22. Net Extortion

23. In living/ Importance of IT

24. Data Protection.

25, Protected system.

26. Child Pornography

27, E-Governance

28, Click wrap contract

29, Netizen

30、 UNCITRAL Model.

31.  Cyber Security

32. Electronic Record

33. Duties of Subscribers.

34, Software piracy

35, Cyber stalking

36. Intermediaries

37, E-Commerce

38, Domain name disputes and WIPO

39. Cyber squating 

40. Digital signature

 41. Electronic messages

 42. Cyber obscenity 

43 Ethics and characters in Cyber space

 44. Wi-Fi

Long Questions

1.1. Enumerating and Explaining Offences Punishable under the Information Technology Act, 2000 (with Latest Amendments)

2. What is E-Commerce? Explain how the Information Technology Act seeks to remedy most of the problems in the field of E-Commerce

3. Explain how the Information Technology Act articulates both Cyber ontraventions’ and ‘Cyber offences. OR Differentiate between cyber crimes and conventional crimes

4. Define Cyber Crime and discuss the different kinds of cyber Crimes.

5. Explain the technical and legal provisions relating to Digital signatures.

6. What is E-Governance? Explain how the provisions of the Information Technology Act facilitate E- Governance 

7. What is Cyber Space? What are the jurisdictional issues relating to Cyber space operations? OF Jurisdiction in Cyber Space and Jurisdiction traditional sense.

 8. How is the copyright protected in digital era? Explain with special reference to Fair Use defensc.

9. Who are intermediaries? Discuss the liability of intermediaries

10. Discuss the functions of controller and powers of Controller of Certifying Authorities

11. What was the need for the cnactment of the Information Technology Act.20007 

12, Discuss the technical and legal aspects relating to Electronic Contracts and E-Commerce,

13. Enumerate and explain the offences punishable under the Information Technology Act,2000.

14 . Explain the provisions relating to use of electronic records nd digital signatures in Government and its agency. Also discuss about legal recognitions of electronic records and digital sigatures. 

15 .What are the objects of the Information Technology Act 2000 as amended in 2008.

16. How Electronic Records and Electronic Signatures Are Secured Under the Information Technology Act, 2000?

17, Is there any protection for digital signature in India? What method has the Act adopted7 Explain.

18. Explain the powers of Cyber Appellate Tribunal

19, What is called ‘Domain Name’ and explain with the help of case laws the regulation of Domain Names in the Indian legal system?

20. With the help of decided cases discuss the impact of information technology on the proteetion of

21, What is the composition, powers and functions of Cyber Appelate Tribunal wíth related provisions. intellectual property rights.

22, How information technology has affected right to privacy? Discuss

23. How is controller or Certifying Authority appointed? What are his functions under the Information Technology Act?

24. Explain how the Information Technology Act articulates both Cyber ontraventions’ and ‘Cyber offences. OR Differentiate between cyber crimes and conventional crimes

Case Laws

  1. A pornographic content was made available- through the service of an Internet Service Provider (ISP). Discuss the liability of such ISP under the Information Technology Act, 2000,
  2.  Uninvited emails are always unwanted. They must have a provision to subscribe. Many countries have enacted laws against such unsolicited or uninvited mails known as Anti Spam Laws. Does the Information Technology Act takes care of such a problem? Discuss
  3. Ram is a skilled professional and tries to enter into the privacy of Raghu’s space without his permission. Is Ram liable? Discuss.
  4. Two unknown persons from Calicut posted some offensive comments against some leaders on their face book group and took the defence of Right to expression. Discuss.
  1. “A” is studying 5th class in the Hyderabad city has involved in a cyber crime with Explain the law to deal the case
  2. Ramu is Buying and selling of goods and services on the internet, but once he Explain the available remedies to “X” a US based Company.felt deficiency of services?
  3.  “X” is sending a secret cypher and decoding at his friend Y end? Explain the Law.
  4. Explain the case facts involved in Yahoo.inc Vs Akash Arora case
  5. Unsolicited emails are a menace. They should have a provision to unsubscribe them or they may not be sent  Unless asked for. Many countries have enacted laws against unsolicited mail known as Anti Social laws. Is the Information Technology Act takes care of such a problem?
  6. ‘Dow Jones & Company Incorporated’ is the publisher of Wall Street Journal. It also publishes a magazine known as Barrons. This magazine is also put online on Servers maintained at New Jersey, USA it carried article ‘Unholy Gains’, which was alleged to be defamatory to Joseph Gutnick resident of Victoria Australia. He filed a suit for damages in Victoria. Preliminar y objection was raised as to the maintainability

    in an Australian Court. Decide in the light of jurisdictional issues and law.
  7. A customer contacted with a car park n machine representing the owner and he fed his money into received a claim ticket for the purpose of parking of his car. Is there a valid contract in this Transaction. Explain how the essentials of a valid contract are present in this transaction
  8. A bank employee inserts a program, into a bank’s server, that deducts small amount of money, to say Rs. 2/- a month, from the account of every customer. NO account holder probably notice this unauthorized debit but The bank employee will make a sizable amount of money every month. Discuss how the Inform Technology Act handles such financial crimes
  9. Messages which are offensive to a particular religion, community, ethnic group or political party are posted in a blog BIO social networking site. Such messages might have the effect of either inciting hatred in the minds of the people or communal clashes between two groups. Is it an offence under the Information Technology Act, 2000? Examine. 
  10. A computer scientist accepts online payments and allows paying customers to view or download pornographic pictures and videos from his website. Is it an offence punishable under the Information Technology Act, 2000? Discuss the nature of offence and the punishment for it.
  11. In an Engineering college, private version of software is used in the computer lab. Is there any violation of the Information Technology Act and the copyright Act? Examine
  12. The original home page of a website belonging to a Government Department is substituted with another page by a computer miscreant. Disturbing images and offensive phrases are displayed in the process. It
  13. Mr.X fraudulently acquires the sensitive information such as Passwords and credit card details, and misrepresents himself and uses the parameters for his personal purpose. What is the offence committed by Mr.X
  14. Two men from Mumbai posted offensive comments against some leaders on their face book group and took the defence of Right to expression. Discuss.
  15. Mr.A of Canada sends Indecent E-mail to Mr.B of Chandigarh on his E-mail address. Under which provision of Information Technology Act, 2000 Mr.A will be liable.
  16. Mr. ‘A’ steals computer source code used for Mr. ‘B’s computer. Is Mr.’A’ liable?
  17. Mr. X, with an intention to cause panic among the people, manipulated the computer network of Railway Signaling system maintained by South Central Railway. As a result, the incharge of the system could not give instructions to drivers of the trains, and thus resulting in a big rail way accident which killed 20 persons leaving 200 persons injured. What cyber crime Mr. X has committed?Decide.
  18. Mr. X has stolen his friend Mr. Y’s creative video film on heritage sites of Hyderabad from his classmate and uploaded the same on ‘You Tube’ in the internet. Mr. Y wrote to ‘You Tube’ people about the unlawful act and asked them to remove his film from internet. “You Tube’ has removed the film on the same day on which they received the request. Whether ‘You Tube’ is liable for contributing/assisting to the unlawful act of Mr.X
  19. ‘DIPCART” an E-commerce firm situated in Bangalore deals with consumer goods like mobile phones and other digital products. Basing upon the advertisement given by the ‘DICART n the internet, a number of people purchased mobile phones from the E-commerce firm. One Mr. X from Hyderabad received a defective mobile phone from the same lodge a complaint in consumer forum. Discuss whether Hyderabad District Consumer Forum has jurisdiction to entertain the complaint.
  20. Mr. X, an employee of a BPO company, disclosed the data of his company to an outsider so as to enable him to divert the clients of his company to that person. Is X  guilty of committing any offence? Examine.

Leave a Reply

Your email address will not be published. Required fields are marked *