Cyber Laws Notes
Adv. Ravindra T. Jadhav
Book referred :- A Practical Guide to Information Technology Act, 2000 Author : Nitant P. Trilokekar
Publisher : Snow White
Information Technology Act, 2000 at Glance
This Act is result of a resolution passed at the UNO Since jurisdiction is always the stumbling block in the prosecution of internet crimes, co-operation is sought from member countries by the United Nations.
The Act has introduced a concept of Digital Signature. Each technique having varying degrees of security and ease of operation.
Futures of Internet affecting daily lives
2. Surfing for information
3. Net Telephone
1. Computer network beak-ins
2. Industrial espionage
3. Copyrighyt piracy
4. Software piracy
5. Child pornography
6. E-mail bombing
7. Password snuffers
9. Credit card fraud
10. Cyber squatting
11. Misleading search words
Some of the important Definition:
Adjudication Officer: (S. 2.c)
Adjudication officer means adjudication officer appointed under sub section 1 of section 46.
1. For the purpose of adjudging under this Chapter when any person has committed a contravention of any of the provision of this Act or any rule, regulation , direction or order made by Central Government .
2. To conduct the inquiry
3. shall have the power of a civil court
Appointment qualification :
No person shall be appointed as an adjudication officer unless he possesses such experience in the field of Information Technology and legal or Judicial experience as may be prescribed by the Central Government. Central Government shall appointed by order.
Asymmetric crypto system :
It means a system of a security key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature
Certifying Authority :
Means a person who has been granted a license to issue a Digital...
Please join StudyMode to read the full document