Cheating by personation by using computer resource (Section 66D) What is cheating by personation by using computer resources? Cheating by personation using computer resources, often referred to simply as "…
Punishment for identity theft (Section 66C of Information Technology Act 2000) What is Identity Theft? In simple language, Identity theft is a type of crime in which a person's personal information is stolen and used w…
Dishonestly receiving stolen computer resource or communication device (Cyber Law) Dishonestly receiving stolen computer resource or communication device Introduction - "Dishonestly receiving stolen computer resource or…
Sending offensive messages through communication service, etc (Cyber Law) Introduction Sending offensive messages through communication services is a form of online harassment or cyberbullying. It involves using digit…
Hacking with computer systems , Data Alteration (Section 66 of Information Technology Act 2000) Introduction Hacking with the intent to alter data on computer systems is a serious and unlawful activity. It involves unauthorized access to co…
Tampering with computer source Documents (Sec.65 of Infirmation Technology Act 2000) Introduction - Tampering with computer source documents refers to the act of intentionally altering or modifying the original source code of…
What is Summons ? Meaning Definition and Essentials of Valid Summons A summons is a legal document that notifies a defendant that a lawsuit has been filed against them and requires them to appear in court. It is a…
Advantages and disadvantages of legal justice Legal justice is a broad topic which encompasses many different areas of law and the legal systems. Some specific areas of legal justice include…
What are the Sources of Law (Jurisprudence) There are several sources of law that are used to govern and regulate society. Examples - Custom Law, Legislation, Precedent etc What is Law?…