1. Facts of the Case Mr. X, with the malicious intent to create panic and disrupt public infrastructure, illegally accessed and manipulated the computer network […]
Tag: IT Act
20. Mr. ‘A’ steals computer source code used for Mr. ‘B’s computer. Is Mr.’A’ liable?
1. Facts of the Case Mr. ‘A’ gains unauthorized access to a computer system belonging to Mr. ‘B’ and steals the source code used in […]
19. Mr.A of Canada sends Indecent E-mail to Mr.B of Chandigarh on his E-mail address. Under which provision of Information Technology Act, 2000 Mr.A will be liable.
1. Facts of the Case Mr. A, a resident of Canada, sends an indecent and offensive email to Mr. B, who resides in Chandigarh, India. […]
16. The original home page of a website belonging to a Government Department is substituted with another page by a computer miscreant. Disturbing images and offensive phrases are displayed in the process. It
1. Facts of the Case A government department’s official website, which serves as a public information portal, was illegally accessed by a cyber miscreant. The […]
13. Messages which are offensive to a particular religion, community, ethnic group or political party are posted in a blog BIO social networking site. Such messages might have the effect of either inciting hatred in the minds of the people or communal clashes between two groups. Is it an offence under the Information Technology Act, 2000? Examine.
1. Facts of the Case A user on a popular blogging or social networking platform posts content that is deeply offensive to a specific religion, […]
12. A bank employee nserts a program, into a bank’s server, that deducts small amount of money, to say Rs. 2/- a month, from the account of every customer. NO account holder probably notice this unauthorized debit but The bank employee will make a sizable amount of money every month. Discuss how the Inform Technology Act handles such financial crimes
1. Facts of the Case A bank employee, leveraging his access to the bank’s internal systems, clandestinely inserts a program into the bank’s central server. […]
9. Unsolicited emails are a menace. They should have a provision to unsubscribe them or they may not be sent Unless asked for. Many countries have enacted laws against unsolicited mail known as Anti Social laws. Is the Information Technology Act takes care of such a problem?
Unsolicited emails—commonly known as spam—are more than just an inconvenience. They clog inboxes, waste time, and in many cases, pose serious cyber threats like phishing […]
5.A” is studying 5th class in the Hyderabad city has involved in a cyber crime with Explain the law to deal the case
1. Facts of the Case 2. Issues in the Case 3. Legal Principles Covered to Support Case Proceedings and Judgements a. Indian Penal Code (IPC), […]
2. Uninvited emails are always unwanted. They must have a provision to subscribe. Many countries have enacted laws against such unsolicited or uninvited mails known as Anti Spam Laws. Does the Information Technology Act takes care of such a problem? Discuss
1. Facts of the Case In the digital era, emails have become a primary mode of communication for individuals and businesses. However, this advancement has […]
A pornographic content was made available- through the service of an Internet Service Provider (ISP). Discuss the liability of such ISP under the Information Technology Act, 2000
Introduction The explosion of digital content has brought with it a serious challenge — the spread of illegal or inappropriate materials online. Among the most […]
