Professional Documents
Culture Documents
CYBER LAW - VIII Sem - Lesson Plan
CYBER LAW - VIII Sem - Lesson Plan
SEMESTER VIII
B.A.LL.B/B.B.A.LL.B/B.Sc. LL.B.
(2018-2023 Admitted Batch)
PRINCIPAL TEACHERS
Course Outcome: The first and foremost object of the course is to introduce the student to the
general principles of Information & Communication Technology Law and then help them in
understanding the nuances and its application. In other words the chief object of the course is
learning & understanding the fundamental principles of Internet Law.
Module Objective: In this module students will learn different national and international
principles for establishing Jurisdiction in Cyberspace.
Cases References:
International Shoe Co. Vs State of Washington, 326 US 310 (316) (1945)
Bensussan Restaurant Vs. King 937 F. Supp. 295 (SDNY, 1996)
Panavision International vs. Toepen 141 F.3d 1316
Zippo manufacturing v Zippo dot. com 952 F.Supp.1119
Calder v. Jones 465 U.S. 783 (1984)
Banyan Tree Holdings Limited vs Mr. M. Murali Krishna Reddy & Anr. CS (OS)
894/2008
Licra Vs. Yahoo (2000)
Essential Readings:
https://repository.law.umich.edu/cgi/viewcontent.cgi?article=1163&context=mttlr
https://cis-india.org/internet-governance/publications/jurisdictional-issues
Class Exercise:
The plaintiff Justin, sued the defendants, the National Enquirer, its distributor, the writer of the article, and
Selina, the editor-in-chief of the magazine, over an October 9, 1979 article in which the Enquirer alleged that
Justin was an alcoholic. Justin lived in Huston, and although the Enquirer article had been written and edited
in Boston, Justin filed his lawsuit in Huston state court. Selina asserted that the court had jurisdiction based on
the large circulation Enquirer enjoyed in Huston - selling over 600,000 copies each week out of a total national
circulation of about 5,000,000 copies per week. Decide on the above based facts where will the personal
jurisdiction lie. Justify your answer using the appropriate test.
Module Objective: To understand and analyze the major cyber crimes across globe and with
specific reference to Indian context.
Class Exercise:
Exercise:
Module Objective: The students will be developing knowledge and understanding about
implementation of Digital and Electronic Signature in India.
Class Exercise:
In public key encryption system if A encrypts a message using his private key and sends it to B
A. if B knows it is from A he can decrypt it using A’s public key
B.Even if B knows who sent the message it cannot be decrypted
C.It cannot be decrypted at all as no one knows A’s private key
D. A should send his public key with the message
Electronic Signature has been defined___ under Information Technology Act 2000.
A. Section 2(1)(ta)
B.Section 2(1)(x)
C.Section 2
D. Not defined
The contracts are web-based contracts that require the user’s consent or consent through the “I
Accept,” or “OK” button are called as:
(a)Click Wrap Contracts
(b)Agreements
(c )Contracts for Sale
(d)Contracts of Indemnity
The contracts which are usually a licensing agreement for software purchases are called as :
(a)Shrink Wrap Contracts
(b)Click Wrap Contracts
(c )Browse Wrap Contracts
(d )Contract of Guarantee
Cases:
Ticket Master vs. Ticket.com
Playboy Enterprises Inc. Vs. Calvin designer Lab 985 F. Supp. 1218 (1997)
Satyam Infoway vs Sifynet Soln. Ltd; 2004(3)AWC 2366 SC
Avnish Bajaj v. State 2008
Amway India Enterprises Pvt Ltd v 1Mg Technologies Pvt Ltd & Anr. 2019
Which of the following is not an examples of Top Level Domain (TLD) name
(a).com
(b).org
(c).ac
(d).uk