Power to issue directions for interception or monitoring or decryption of any information through any computer resource.-- (1) Where the ...

Law Notes for Law students. study materials for BSL,LLB, LLM, and Various Diploma courses.
Power to issue directions for interception or monitoring or decryption of any information through any computer resource.-- (1) Where the ...
Introduction Publishing or transmitting obscene material in electronic form refers to the act of distributing, sharing, or making ava...
What is Cyber Terrorism? Cyberterrorism refers to the use of digital technology and the internet to conduct attacks with the intent of ca...
Violation of privacy Violation of privacy refers to any unauthorized or unwarranted intrusion into an individual's personal affa...
What is cheating by personation by using computer resources? Cheating by personation using computer resources, often referred to simply ...
What is Identity Theft? In simple language, Identity theft is a type of crime in which a person's personal information is stolen a...
Dishonestly receiving stolen computer resource or communication device Introduction - "Dishonestly receiving stolen computer re...
Introduction Sending offensive messages through communication services is a form of online harassment or cyberbullying. It involves us...
Introduction Hacking with the intent to alter data on computer systems is a serious and unlawful activity. It involves unauthorized acc...