Chapter V of the Information Technology Act 2000 Deals with Secure Electronic Records and Secure Electronic Records. Section 2(t) of the sa...

Law Notes for Law students. study materials for BSL,LLB, LLM, and Various Diploma courses.
Chapter V of the Information Technology Act 2000 Deals with Secure Electronic Records and Secure Electronic Records. Section 2(t) of the sa...
An electronic signature certificate is an electronic document that binds an identity to an electronic signature. It is used to verify ...
Computer-related offenses carry heavy punishments ranging from a fine to life imprisonment depending on the nature of actions. These m...
What is Cyber Terrorism Cyberterrorism is the use of computers and information technology to disrupt, damage, or destroy the systems of ...
When publishing or transmitting material depicting children in sexually explicit acts, you've committed a crime. This is because it...
Sending offensive messages through communication services could lead to big trouble. These days, there are several laws that protect th...
Violation of privacy - Violation of privacy is an invasion of an individual's right to the privacy of his or her personal informati...
1. According to the IT Act, 2008 is a person who sends, generates, stores or transmits any electronic message to be sent, generated, stored...
1. Cognizable offenses as described as___________ A. It is the offense in which a police officer can arrest the convict without a warrant. B...