Preview

Sarkar

Powerful Essays
Open Document
Open Document
1580 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sarkar
[भाग II- ख ड 3(i)]

भारत का राजप

: असाधारण

NOTIFICATION New Delhi, the 11th April, 2011

G.S.R. 315(E).— In exercise of the powers conferred by clause (zg) of subsection (2) of section 87 read with sub-section (2) of section 79 of the Information Technology Act, 2000 (21 of 2000), the Central Government hereby makes the following rules, namely:—

1. Short title and commencement.— (1) These rules may be called the Information Technology (Guidelines for Cyber Cafe) Rules, 2011.

(2) They shall come into force on the date of their publication in the Official Gazette. 2. Definitions — (1) In these rules, unless the context otherwise requires,-(a) "Act" means the Information Technology Act, 2000 (21 of 2000); (b) "Appropriate Government" means the Central Government or the State Government or an Union Territory Administration; (c) "Cyber Cafe" means cyber cafe as defined in clause (na) of sub-section (1) of section 2 of the Act; (d) "computer resource" means a computer resource as defined in clause (k) of subsection (1) of section 2 of the Act; (e) "Data" means data as defined in clause (o) of sub-section (1) of section 2 of the Act; (f) "Information" means information as defined in clause (v) of sub-section (1) of section 2 of the Act; (g) "Intermediary" means an intermediary as defined in clause (w) of sub-section (1) of section 2 of the Act; (h) "Registration Agency" means an agency designated by the Appropriate Government to register cyber cafe for their operation; (i) "Log Register" - means a register maintained by the Cyber Cafe for access and use of computer resource;

1330 GI/11-4A

THE GAZETTE OF INDIA: EXTRAORDINARY

[ PART II-SEC. 3(i)]

(j) "User" means a person who avails or access the computer resource and includes other persons jointly participating in availing or accessing the computer resource in a cyber cafe. (2) All other words and expressions used and not defined in these rules but defined in the Act shall have the meanings

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1210 Chapter 1

    • 4800 Words
    • 20 Pages

    CHAPTER 1 INFORMATION TECHNOLOGY1.0 Introduction Information technology (IT) is the design, development, implementation, support, and management of computer hardware and software applications. An IT professional is knowledgeable about computer systems and operating systems. This chapter will review IT certifications and the components of a basic personal computer system.After completing this chapter, you will meet these objectives: * Explain IT industry certifications. * Describe a computer system. * Identify the names, purposes, and characteristics of cases and power supplies. * Identify the names, purposes, and characteristics of internal components. * Identify the names, purposes, and characteristics of ports and cables. * Identify…

    • 4800 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    LAW 723 Course Ouline

    • 3305 Words
    • 125 Pages

    COURSE OBJECTIVES On completion of this course, students who have participated fully should have: (1) a solid knowledge of intellectual property, its exploitation, its limits (2) an understanding of the interplay of law and technology (3) insight into the effect of technology on privacy, information and freedom of expression; and (3) an enhanced capacity for critical legal thinking with respect to information and technology law. Prerequisites and/or Exclusions: None Posting of Grades and Feedback on Work: Grades on assignments and tests will be posted on the Blackboard site for the course. Students will receive the results of their first test before the final deadline for dropping courses without academic penalty. All assignments submitted for grading will be handed back as soon as possible. E-­‐mail…

    • 3305 Words
    • 125 Pages
    Powerful Essays
  • Satisfactory Essays

    The Computer Misuse Act 1990 it is a law that does not allow certain activities when using computers, this include: hacking into other people's systems, misusing software or helping a person to gain access to protected files on someone's else's computer.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Sarwag

    • 751 Words
    • 4 Pages

    Addiction is more of a psychological dependence. Addiction can make an individual feel a compulsion for a substance regardless of any negative consequences. While dependence is more of a physical need to use, an ongoing need to use psychoactive drugs. The tissues of the body actually require the presence of alcohol or other drugs to act and feel normally; and in return physically build a tolerance to the substance or substances. Ultimately the addiction aspect is more of a psychological need for a substance while dependence is both a physical and psychological need to use.…

    • 751 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Proctor and Gamble

    • 2195 Words
    • 9 Pages

    • Rumours surfaced immediately after P&G introduced the tool free no. system to address customer complaints…

    • 2195 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Computer Fraud Act Essay

    • 549 Words
    • 3 Pages

    exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or…

    • 549 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Regulation of Internet

    • 680 Words
    • 3 Pages

    The usage of computer, internet, smart phones and other related devices are now an integral part of our daily lives. With the exponential raise in technology, there is also a corresponding rise in Crimes specific to new technologies. The laws prevailing till 1999 proved to be inadequate to address the growing threat of the new realm of crimes in cyber space. Therefore, the Information Technology Act, 2000 came to be enacted. This Act was further amended in 2008.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information Technology

    • 765 Words
    • 4 Pages

    The act was implemented in Federal Reserve Board Regulation E which outlined the responsibilities of the customer and of the financial institution. When an EFT error has occurred the responsibility of the customer include:…

    • 765 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    ©Lessig 1998: This essay was presented at the Taiwan Net ’98 conference, in Taipei, March, 1998.…

    • 6041 Words
    • 25 Pages
    Powerful Essays
  • Satisfactory Essays

    Now the Internet grows at unprecedented rates, it has resulted in not only the increasing in the amount of available knowledge but also the increasing in the problems about the usage and distribution. The growth of www creates some new questions that older laws cannot answer. So the computer ethic has emerged Computer ethics is concerned with standards of conduct as they pertain to computers. Two pressing concerns in computer ethics are questions of copyright and privacy, all of which are discussion in detail in the following sections. Other problem exists as well, such as censorship, computer crime. Within the following content will include:…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Pemra Rules

    • 6279 Words
    • 26 Pages

    GOVERNMENT OF PAKISTAN MINISTRY OF INFORMATION AND BROADCASTING NOTIFICATION Islamabad, the 12th December, 2009 S.R.O.-1120(I)/2009.- In exercise of the powers conferred by sub-section (1) of section 39 of the Pakistan Electronic Media Regulatory Authority Ordinance, 2002 (XIII of 2002), the Pakistan Electronic Media Regulatory Authority, with the approval of the Federal Government, is pleased to make the following rules, namely:1. Short title and commencement.- (1) These rules shall be called the Pakistan Electronic Media Regulatory Authority Rules, 2009. (2) They shall come into force at once. 2. Definitions.- (1) In these rules, unless there is anything repugnant in the subject or context,(a) “application form" means the application form as may be prescribed by the Authority for grant of a licence; (b) “applicable licence fee” means the licence fee prescribed by the Authority or where applicable, determined through bidding by Authority; (c) “authorized officer” means the Chairman or a member, or any member of staff, expert, consultant, adviser, other officer or employee of the Authority to whom the Authority has by general or special order delegated its powers, responsibilities or functions under the Ordinance for carrying out the purposes of the Ordinance, rules or regulations made thereunder; (d) “cable television operator” means any person who owns, controls, manages or runs any cable television system and includes local loop holder; (e) “cable TV system” means any system consisting of closed transmission paths and associated signal generation, control and distribution equipment, designed to receive and re-transmit television channels or programs for reception by multiple subscribers; (f) “code" means the code of conduct for media broadcasters and cable TV operators specified in Schedule-A; (g) “Council” means the Council of Complaints established under the Ordinance; (h) “eligible channel” means a TV channel licensed by the Authority or otherwise declared to…

    • 6279 Words
    • 26 Pages
    Better Essays
  • Powerful Essays

    (2) It shall come into force on such date as the Central Government may, by notification…

    • 3012 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    In contrast, cybercrime is becoming a threat to government itself. Due to lack of necessary legislation to tackle such type of crime, cyber criminals are almost in the safe side to commit such crime. In the Information and Communication Technology Act.2006, there are several clauses against cybercrime. But this Information and Communication Technology act is not the concert one. By enacting this act, there is a chance to become safe side after committing crimes. So, considering these facts a comprehensive Cybercrime Protection Act should be imposed.…

    • 7199 Words
    • 29 Pages
    Powerful Essays
  • Powerful Essays

    Pndt Act

    • 5013 Words
    • 21 Pages

    (3) It shall come into force on such date as the Central Government may, by notification in the Official Gazette, appoint.…

    • 5013 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Welebir, B. and Kleiner,B.H.(2005),"How to write a proper Internet usage policy", Journal of Management ResearchNews, Vol. 28 Iss: 2 pp. 80 – 87.…

    • 5923 Words
    • 24 Pages
    Powerful Essays