Download SRDLawNotes App Install App
IT Act 2000

Power to issue directions for interception or monitoring or decryption of any information through any computer resource. (Section 69 IT Act 2000)

Power to issue directions for interception or monitoring or decryption of any information through any computer resource.--  (1) Where the Central G…

What is Cyber Terrorism? Punishment for cyber terrorism (Section 66F)

What is Cyber Terrorism?    Cyberterrorism refers to the use of digital technology and the internet to conduct attacks with the intent of causing sig…

Violation of privacy & Punishment for violation of privacy (Cyber Law)

Violation of privacy         Violation of privacy refers to any unauthorized or unwarranted intrusion into an individual's personal affairs, comm…

Sending offensive messages through communication service, etc (Cyber Law)

Introduction      Sending offensive messages through communication services is a form of online harassment or cyberbullying. It involves using digit…

Tampering with computer source Documents (Sec.65 of Infirmation Technology Act 2000)

Introduction -         Tampering with computer source documents refers to the act of intentionally altering or modifying the original source code of…

Secure Electronic Records and Secure Electronic Signature (IT Act 2000)

Chapter V of the Information Technology Act 2000 Deals with Secure Electronic Records and Secure Electronic Records. Section 2(t) of the said Acy de…
SRDLegal Support Welcome to WhatsApp chat
Howdy! How can we help you today?
Type here...