What is Cyber Terrorism? Cyberterrorism refers to the use of digital technology and the internet to conduct attacks with the intent of ca...
Showing posts with label Cyber crime. Show all posts
Showing posts with label Cyber crime. Show all posts
Violation of privacy & Punishment for violation of privacy (Cyber Law)
Violation of privacy Violation of privacy refers to any unauthorized or unwarranted intrusion into an individual's personal affa...
Punishment for identity theft (Section 66C of Information Technology Act 2000)
What is Identity Theft? In simple language, Identity theft is a type of crime in which a person's personal information is stolen a...
Dishonestly receiving stolen computer resource or communication device (Cyber Law)
Dishonestly receiving stolen computer resource or communication device Introduction - "Dishonestly receiving stolen computer re...
Labels:
Cyber crime,
Cyber Crimes,
Cyber Law,
Cyber Terrorism
Tampering with computer source Documents (Sec.65 of Infirmation Technology Act 2000)
Introduction - Tampering with computer source documents refers to the act of intentionally altering or modifying the original sourc...
The main Reasons for cyber crimes
The development in information technology and electronic media have given rise to a new variety of computer related crimes are commonl...
Subscribe to:
Posts (Atom)
See Also..
-
1) Consider the following statements : A) Every promise is an agreement. B) Every agreement is a contract. C) A contrac...
-
1) Which one of the following element is not necessary for a contract ? A) Competent parties B) Reasonable terms and condition...
-
1) Give correct answer : A) Void agreements are always illegal. B) Illegal agreements are always voidable . C) Illegal a...
-
Computer is an important part of an accounting system. Computerized accounting systems are important to business in various...
-
Advantages of Law - There are many Advantages of law... some of the them are as follows : 1) Uniformity and Certainty: ...