Power to issue directions for interception or monitoring or decryption of any information through any computer resource.-- (1) Where the ...
Showing posts with label IT Act 2000. Show all posts
Showing posts with label IT Act 2000. Show all posts
What is Cyber Terrorism? Punishment for cyber terrorism (Section 66F)
What is Cyber Terrorism? Cyberterrorism refers to the use of digital technology and the internet to conduct attacks with the intent of ca...
Violation of privacy & Punishment for violation of privacy (Cyber Law)
Violation of privacy Violation of privacy refers to any unauthorized or unwarranted intrusion into an individual's personal affa...
Sending offensive messages through communication service, etc (Cyber Law)
Introduction Sending offensive messages through communication services is a form of online harassment or cyberbullying. It involves us...
Labels:
Cyber Crimes,
Cyber Law,
IT Act,
IT Act 2000
Tampering with computer source Documents (Sec.65 of Infirmation Technology Act 2000)
Introduction - Tampering with computer source documents refers to the act of intentionally altering or modifying the original sourc...
Secure Electronic Records and Secure Electronic Signature (IT Act 2000)
Chapter V of the Information Technology Act 2000 Deals with Secure Electronic Records and Secure Electronic Records. Section 2(t) of the sa...
Subscribe to:
Posts (Atom)
See Also..
-
1) Consider the following statements : A) Every promise is an agreement. B) Every agreement is a contract. C) A contrac...
-
1) Which one of the following element is not necessary for a contract ? A) Competent parties B) Reasonable terms and condition...
-
1) Give correct answer : A) Void agreements are always illegal. B) Illegal agreements are always voidable . C) Illegal a...
-
Computer is an important part of an accounting system. Computerized accounting systems are important to business in various...
-
Advantages of Law - There are many Advantages of law... some of the them are as follows : 1) Uniformity and Certainty: ...