WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS
ARAVIND - 09901366442 – 09902787224
CYBER LAW MANAGEMENT
1. Study the case carefully and
bring out its salient features
2. What do you understand by
the Corporate IT risk. Give your views based on the Case details.
3. What would be your
suggestion for better IT security for a company?
1. Study the case carefully and
bring out the relevant facts of the case.
2. Elaborate on the issues of
“Top Down” and “Bottom Up” approaches quoting suitable examples.
3. What did you learn in the
cyber law based on this study?
3. Consider the following two
proposals for defining personal jurisdiction in cyberspace:
1) Personal jurisdiction and
choice of law must be determined based on
where the server supporting
your web site is located. There are two exceptions to this rule:
(a) Consumer transactions are
not covered by this rule; and
(b) Assertion of jurisdiction
to vindicate some social values, such as prevention of child pornography, would
be exempt from this rule.
2) A proposal for determining
personal jurisdiction in cyberspace. Establish the Personal Jurisdiction
considering the above two proposals.
Given that Personal
jurisdiction should be based on an analysis of the following three factors
(a) Is the activity directed at
a particular forum? Does the forum have distinguishable and differentiated
claim over other forums?
(b) The nature of the activity
- is it illegal, socially undesirable and the like; and
(c) To what extent does the
threat of jurisdiction undermine the underlying activity in question, such as
electronic commerce?
CYBER
LAW
Q.1) Write short notes (any
two)
a) Privacy
on the Net
b) Age of
Cyber Crime
c) Business
on the Net
d) Cyber
crimes against government
Q.2) Explain
the important computer terminology defined in the information technology act
2000?
Q.3) Give an
over view of the information technology act 2000?
Q.4) Discuss
the World of Electronic Contracts?
Q.5) Discuss
the aims and objectives cyber laws in India
Q.6) What is
digital signature? Explain the procedure for verification of digital signature?
Q.7) What is
cyber crime? Explain different categories of cyber crime?
Q.8) Discuss
the civil liabilities, penalties and adjudication under information technology
act 2000 to following?
A} Penalty
for damages to computer, computer system {U/s43}
B} Penalty
for failure to furnish information. {U/s44}
CYBER
LAW
1. Neha, a desktop publishing
professional has made several authentic looking certificates
Of major indian and foreign
universities and has sold these counterfeit for large sums of money to at least
3 people in india. Neha had sent these certificates as email attachments
to prospective customers. Select the most appropriate answer keeping the said
facts in mind:
a. neha would be punished for
forgery for forging a document under the information technology act,2000
b. neha would be punished for
forgery for forging a document under the indian the penal code,1860
c. neha would be punished for
forgery for forging an electronic record under the indian penal code,1860
d. neha would be punished for
forgery for forging an electronic record under the information Act,2000
2.With regard to jurisprudence
relating to pornography, tick the most appropriate answer:
a. most jurisdictions punish
dissemination of pornography, in some
manner
b. all jurisdictions punish
dissemination of Publishing of child
pornography,
c. in some jurisdictions
dissemination and possession of actual child pornography as well as
dissemination of simulated computer animated images depicting child pornography
is penalized.
d. some jurisdictions punish
dissemination as well as possession of child
pornography
3. Rita is not sure how exactly
a digital signature system works. Help her to understand the process by
chossing the most appropriate statement.
a. A digital signature is
formed subsequent to a message digest.
b. A digital signature is
formed by signing a message digest with a private key
c. A digital signature is
formed by making a message interact with a one way hash been certified by a
certifying authority.
d. A digital signature is
verified by ausing hash function and public key
4.Select the most appropriate
statement about a recognized foreign certifying authirty (CA) in india
a. A recognized foreign CA is
recognized in india as a CA.
b. A recognized foreign CA is
CA for purpose of the IT Act.
c. A foreign CA is a CA
previously approved by the central government before being recognized by the controller and is required to be notified
in the official gazette.
e. A recognized foreign CA is a
CA recognized by the controller of certifying authorities and previously
approved by the central government.
5. Digicert Ltd. Is a licensed
certifying authority in india. Digicert obtained its license from the
controller of certifying authority in 2001. However, business has not picked up
and the company has gone into losses. The management of digicert wants to quit
the business and wind up the company. Select the most appropriate statement
from the following:
a. Digicert can quit the
business and wind up the company.
b. Digicert has to notify the
controller before terminating operations as a certifying authority.
c. Digicert should notify the
controller, advertise and give adequate compensation where required before
ceasing to act as a certifying authority
d. the certifying authority has
to notify the controller, advertise and give adequate compensation where
required before ceasing to as a certifying authority .
6. computer software can be
a. copyrighted in india
b. patened in india
c. both copyrighted and
patented in india
d. both copyrighted abd
patented in the united states of americs
7. ICANN’s UDRP requires a domain registrant to
submit to mandatory administrative proceedings in case
a. the registrant’s domain name
is identical to a trademark in which a complaint has rights
b. the registrant has no rights
to the domain and has registered the domain in bad faith.
c. the registrant has a
deceptively similar trademark, has no rights to the domain and using the domain
in bad faith.
d. the registrant has
registsred the domain name for
disrupting the business of the competitor.
8. infecting someone’s computer
virus can make a person liable to pay damages by way compensation up to
a. A crore of rupees
b. Two crore rupees
c. three crore rupees
d. four crore rupees
9. Rakesh has been accused by
megaprogram corporation of reproducing and distributing their software
Programs illegally. Rakesh is
liable under:
a. Section 63B of the indian
copyright act 1957
b. Section 63 of the Indian
Copyright Act 1957
c. Section 66 of the
Information Technology Act 2000
d. Section 66 of the
Information Technology Act 2000 and Section 63 of copyright Act 1957
10. Hacking under the
Information Technology Act 2000 Means
a. Unauthorized access to
another person’s computer system
b. Deleting information stored
in another person’s computer System.
c. Knowingly or intentionally
deleting information stored in another person’s computer system
d. knowingly or intentionally
deleting valuable information stored in another person’s computer system.
01.
A young lady named ritika
adjania found her profile in an online community named “1worldcom” on its
website. Net. Her surprise turned to horror when she realized that the profile
pained her as a person of dubious character whose only interest was money. The
profile also “boasted” of her achievements which included defrauding a bank of
rs.10 lakh and getting away with it.
Ritika immediately informed “1worldcom” of the posting and requested them to
remove it. The posting was removed the next day but reappeared a week later. It
was again removed but reappeared two days later. Deeply hurt, Ritika filed a
suit for defamation against “1worldcom”. With reference to jurisprudence of
defamation cases, examine the liability of “1worldcom”. ( Marks – 10 )
02
Rakesh had an appointment with
Dr.Mina lahoti at the wockhardt hospital, Mumbai. While waiting for Dr.lahoti,
Rakesh remembered that he had to email a document (that he was carrying in a
floppy)to his office. As he looked around, he realized that there was a
computer at the reception desk, which was switched on. However, the receptionist
was nowhere to be seen. Rakesh immediately inserted the fooppy disk containing
the document into the floppy drive of
the computer at the reception desk. Just then, the receptionist entered and saw
rakesh at the computer she immediately called the security guards and intimated
the manager about the incident. The manager wants to take legal action against
rakesh unauthorized access. Advise the manager.(Marks – 15)
03
Pooja has been assigned a
project on “intellectual property rights associated with sami- condoctor
technology”. She conducts a search on google and comes across many articles on
the topic, she downloads the articles and uses them extensively in her project
without taking permission from the authors of the articles. Pooja insists that
since is using the articles for private use, she is not liable for any
infringement. Is she right? Discuss (Mark- 15 )
04
Section 29of the information
technology act2000 confers power upon the controller of certifying authorities
to investigate contraventions under the act. Section 78 confers power uupon a
police or above to investigate any offence under the act. Rashmi suspects
rakesh of creating and publishing digital signature certificates for fraudulent
purpose, but she is confused about whom to approach for investigating the
suspected crime. Clear rashmi confusion with detailed explanations (Marks – 15
)
WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS
ARAVIND - 09901366442 – 09902787224
No comments:
Post a Comment