Download SRDLawNotes App Install App
Cyber Crimes

What is Cyber Terrorism? Punishment for cyber terrorism (Section 66F)

What is Cyber Terrorism?    Cyberterrorism refers to the use of digital technology and the internet to conduct attacks with the intent of causing sig…

Cheating by personation by using computer resource (Section 66D)

What is cheating by personation by using computer resources?     Cheating by personation using computer resources, often referred to simply as "…

Dishonestly receiving stolen computer resource or communication device (Cyber Law)

Dishonestly receiving stolen computer resource or communication device   Introduction -       "Dishonestly receiving stolen computer resource or…

Sending offensive messages through communication service, etc (Cyber Law)

Introduction      Sending offensive messages through communication services is a form of online harassment or cyberbullying. It involves using digit…

Hacking with computer systems , Data Alteration (Section 66 of Information Technology Act 2000)

Introduction      Hacking with the intent to alter data on computer systems is a serious and unlawful activity. It involves unauthorized access to co…

Electronic Signature Certificates (Information Technology Act 2000)

An electronic signature certificate is an electronic document that binds an identity to an electronic signature. It is used to verify the authe…

Punishment for Tampering with computer source documents and Computer related offences

Computer-related offenses carry heavy punishments ranging from a fine to life imprisonment depending on the nature of actions. These may involv…

Punishment for Cyber Terrorism

What is Cyber Terrorism     Cyberterrorism is the use of computers and information technology to disrupt, damage, or destroy the systems of a governm…

Punishment for publishing or transmitting material depicting children in sexually explicit act, etc., in electronic form

When publishing or transmitting material depicting children in sexually explicit acts, you've committed a crime. This is because it is illeg…

Punishment for sending offensive messages through communication services

Sending offensive messages through communication services could lead to big trouble. These days, there are several laws that protect the person …

Violation of privacy: Punishment for violation of privacy

Violation of privacy -      Violation of privacy is an invasion of an individual's right to the privacy of his or her personal information, which…

Cyber Law MCQ - 3 (Multiple Choice Questions with Answers)

1. According to the IT Act, 2008 is a person who sends, generates, stores or transmits any electronic message to be sent, generated, stored or trans…

Cyber Law MCQ - 2 (Multiple Choice Questions with answer)

1. Cognizable offenses as described as___________ A. It is the offense in which a police officer can arrest the convict without a warrant. B. It is a…

Cyber Law MCQ - 1(Multiple Choice Questions with answer)

1.  Digital Signature Certificate is ____________ requirement under various applications A. Statutory B. Legislative C. Governmental D. Voluntary 👉C…

What is Cybercrime? and what are Types of Cyber Crimes

ln India information technology law is also called cyber law. It concerns the law of information technology, including computing and the internet…

Salient Features of The Information Technology Act, 2000

The Information Technology Act, 2000 was enacted for prevention and control of cyber crimes. The Information Technology Act is based on UNCI…
SRDLegal Support Welcome to WhatsApp chat
Howdy! How can we help you today?
Type here...