Power to issue directions for interception or monitoring or decryption of any information through any computer resource.-- (1) Where the ...

Law Notes for Law students. study materials for BSL,LLB, LLM, and Various Diploma courses.
Power to issue directions for interception or monitoring or decryption of any information through any computer resource.-- (1) Where the ...
What is Cyber Terrorism? Cyberterrorism refers to the use of digital technology and the internet to conduct attacks with the intent of ca...
Violation of privacy Violation of privacy refers to any unauthorized or unwarranted intrusion into an individual's personal affa...
Introduction Sending offensive messages through communication services is a form of online harassment or cyberbullying. It involves us...
Introduction - Tampering with computer source documents refers to the act of intentionally altering or modifying the original sourc...
Chapter V of the Information Technology Act 2000 Deals with Secure Electronic Records and Secure Electronic Records. Section 2(t) of the sa...