Cyber Law

Topics: Digital signature, Certificate authority, Public-key cryptography Pages: 4 (821 words) Published: April 10, 2011
Cyber Laws Notes
Adv. Ravindra T. Jadhav
Book referred :- A Practical Guide to Information Technology Act, 2000 Author : Nitant P. Trilokekar
Publisher : Snow White

Information Technology Act, 2000 at Glance
This Act is result of a resolution passed at the UNO Since jurisdiction is always the stumbling block in the prosecution of internet crimes, co-operation is sought from member countries by the United Nations.

The Act has introduced a concept of Digital Signature. Each technique having varying degrees of security and ease of operation.

Futures of Internet affecting daily lives
1. E-mail
2. Surfing for information
3. Net Telephone
4. Chat
5. Shopping
6. Banking

Cyber Crimes
1. Computer network beak-ins
2. Industrial espionage
3. Copyrighyt piracy
4. Software piracy
5. Child pornography
6. E-mail bombing
7. Password snuffers
8. Spoofing
9. Credit card fraud
10. Cyber squatting
11. Misleading search words

Some of the important Definition:

Adjudication Officer: (S. 2.c)
Adjudication officer means adjudication officer appointed under sub section 1 of section 46.

1. For the purpose of adjudging under this Chapter when any person has committed a contravention of any of the provision of this Act or any rule, regulation , direction or order made by Central Government .

2. To conduct the inquiry

3. shall have the power of a civil court

Appointment qualification :
No person shall be appointed as an adjudication officer unless he possesses such experience in the field of Information Technology and legal or Judicial experience as may be prescribed by the Central Government. Central Government shall appointed by order.

Asymmetric crypto system :
It means a system of a security key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature

Certifying Authority :
Means a person who has been granted a license to issue a Digital...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cyber Law Essay
  • Cyber Law Essay
  • Cyber Law Essay
  • cyber law Essay
  • Ethics Of Cyber Law Essay
  • Online Harassment & and Cyber Mobs Essay
  • Essay on thisis
  • Cyber bullying Essay

Become a StudyMode Member

Sign Up - It's Free