The document discusses various issues related to the Information Technology Act of India. It addresses questions about unsolicited emails, defamation in online publications, the essential elements of a valid contract in a car parking transaction, financial crimes like unauthorized bank account debits, offensive online messages that could incite hatred or violence, punishments for hosting pornographic content online, software piracy, hacking of government websites, fraudulently acquiring sensitive information, hacking offenses by foreign nationals, and circumventing technological access controls for research purposes. The document examines these scenarios in the context of the relevant sections of the Information Technology Act.
Original Description:
Original Title
10th Semester - Information Technology Law -Part C
The document discusses various issues related to the Information Technology Act of India. It addresses questions about unsolicited emails, defamation in online publications, the essential elements of a valid contract in a car parking transaction, financial crimes like unauthorized bank account debits, offensive online messages that could incite hatred or violence, punishments for hosting pornographic content online, software piracy, hacking of government websites, fraudulently acquiring sensitive information, hacking offenses by foreign nationals, and circumventing technological access controls for research purposes. The document examines these scenarios in the context of the relevant sections of the Information Technology Act.
The document discusses various issues related to the Information Technology Act of India. It addresses questions about unsolicited emails, defamation in online publications, the essential elements of a valid contract in a car parking transaction, financial crimes like unauthorized bank account debits, offensive online messages that could incite hatred or violence, punishments for hosting pornographic content online, software piracy, hacking of government websites, fraudulently acquiring sensitive information, hacking offenses by foreign nationals, and circumventing technological access controls for research purposes. The document examines these scenarios in the context of the relevant sections of the Information Technology Act.
Part C 1. Unsolicited emails are a menace. They should have a provision to unsubscribe them or they may not be sent unless asked for. Many countries have enacted laws against unsolicited mail known as Anti spam laws. Is the information technology act takes care of such a problem? Discuss. 2. 'Dow Jones & Company incorporated' is the publisher of Wall street Journal. It also publishes a magazine known as Barrons. This magazine is also put online on servers maintained at New Jersey, USA. It carried an article 'Unholy Gains", which was alleged to be defamatory to joseph Gutnick resident of Victoria, Australia. He filed a suit for damages in Victoria. Preliminary objection was raised as to the maintainability of the case in an Australian Court. Decide in the light of jurisdictional issues and law. 3. A customer contacted with a car park machine representing the owner and he fed his money into it and received a claim ticket for the purpose of parking of his car. Is there a valid contract in this transaction? Explain how the essentials of a valid contract are present in this transaction. 4. A bank employee inserts a program, into a bank's server, that deducts a small amount of money, to say Rs.2/- a month, from the account of every customer. No account holder probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month. Discuss how the information technology act handles such financial crimes. 5. Messages which are offensive to a particular religion, community, ethnic group or political party are posted in a blog or a social networking site. Such messages might have the effect of either inciting hatred in the minds of the people or communal clashes between 2 groups. Is it an offence under the information technology act 2000? Examine. 6. A computer scientist accepts online payments and allows paying customers to view or download pornographic pictures and videos from his website. Is it an offence punishable under the information technology act,2000? Discuss the nature of offence and the punishment for it. 7. In an Engineering college, private version of software is used in the computer lab. Is there any violation of the Information technology act and the copyright act? Examine. 8. The original homepage of a website belonging to a Government department is substituted with another page by a computer miscreant. Disturbing images and offensive phrases are displayed in the process. It affected the image of the Government department. Are there adequate provisions under the information technology act for counteracting this kind of problem? Examine. 9. Mr.'X' fraudulently acquires the sensitive information such as passwords and credit card details and misrepresents himself and uses the parameters for his personal purpose. What is the offence committed by Mr.X. 10. MR.X, a French national, sitting in paris hacked the computer system of M/S.Y corporation India situated in Hyderabad. Whether Mr.X, a foreign national, can be tried in India for the offence of hacking under the information technology act, 2000. Discuss the legal position. 11. Mr.X, a research scholar,is pursuing his research after Ph.D. in law in Hyderabad. For the purpose of his research he circumvents (unlocks) the technological measures (locks) of an online database maker who deals with various E-Journals online by 'Pay for use' method. Whether Mr.X is liable for committing any offence. 12.
A Book On Criminal Breach of Trust, Cheating and Cheque Dishonor Litigation by Nayeem Firoz (A Judge Working As The Member of Bangladesh Judicial Service)
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<HTML><HEAD><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<TITLE>ERROR: The requested URL could not be retrieved</TITLE>
<STYLE type="text/css"><!--BODY{background-color:#ffffff;font-family:verdana,sans-serif}PRE{font-family:sans-serif}--></STYLE>
</HEAD><BODY>
<H1>ERROR</H1>
<H2>The requested URL could not be retrieved</H2>
<HR noshade size="1px">
<P>
While trying to process the request:
<PRE>
TEXT http://www.scribd.com/titlecleaner?title=CyberCrime+Report.docx HTTP/1.1
Host: www.scribd.com
Proxy-Connection: keep-alive
Accept: */*
Origin: http://www.scribd.com
X-CSRF-Token: ea5b3d74fc35283c15ef440947b36a61b715cffd
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.64 Safari/537.31
X-Requested-With: XMLHttpRequest
Referer: http://www.scribd.com/upload-document
Accept-Encoding: gzip,defl