Introduction Publishing or transmitting obscene material in electronic form refers to the act of distributing, sharing, or making ava...

Law Notes for Law students. study materials for BSL,LLB, LLM, and Various Diploma courses.
Introduction Publishing or transmitting obscene material in electronic form refers to the act of distributing, sharing, or making ava...
What is Cyber Terrorism? Cyberterrorism refers to the use of digital technology and the internet to conduct attacks with the intent of ca...
Violation of privacy Violation of privacy refers to any unauthorized or unwarranted intrusion into an individual's personal affa...
What is cheating by personation by using computer resources? Cheating by personation using computer resources, often referred to simply ...
What is Identity Theft? In simple language, Identity theft is a type of crime in which a person's personal information is stolen a...
Dishonestly receiving stolen computer resource or communication device Introduction - "Dishonestly receiving stolen computer re...
Introduction Sending offensive messages through communication services is a form of online harassment or cyberbullying. It involves us...
Introduction Hacking with the intent to alter data on computer systems is a serious and unlawful activity. It involves unauthorized acc...
Introduction - Tampering with computer source documents refers to the act of intentionally altering or modifying the original sourc...
An electronic signature certificate is an electronic document that binds an identity to an electronic signature. It is used to verify ...
Computer-related offenses carry heavy punishments ranging from a fine to life imprisonment depending on the nature of actions. These m...
What is Cyber Terrorism Cyberterrorism is the use of computers and information technology to disrupt, damage, or destroy the systems of ...
When publishing or transmitting material depicting children in sexually explicit acts, you've committed a crime. This is because it...
Sending offensive messages through communication services could lead to big trouble. These days, there are several laws that protect th...
Violation of privacy - Violation of privacy is an invasion of an individual's right to the privacy of his or her personal informati...
1. According to the IT Act, 2008 is a person who sends, generates, stores or transmits any electronic message to be sent, generated, stored...
1. Cognizable offenses as described as___________ A. It is the offense in which a police officer can arrest the convict without a warrant. B...
1. Digital Signature Certificate is ____________ requirement under various applications A. Statutory B. Legislative C. Governmental D. Volu...
ln India information technology law is also called cyber law. It concerns the law of information technology, including computing and the...
The development in information technology and electronic media have given rise to a new variety of computer related crimes are commonl...