cyber forensics cyber lawyer computer forensics section 65b evidence act cyber law digital forensic forensic examiner section 65b information technology act cyber offenses contravention other laws ‘secure/target deletion’. forensic analysis right of defence interception device wiretapping ’dharmbir v’s cbi’ ‘kundan singh v’s state’ lemf voice logger cd data telephonic interception mobile interception authenticity of intercepted recordings article 21 mirror image ‘forensic duplication’ admissibility of intercepted calls call detail record indian evidence act 1872 admissbility of mobile recording audio video voice recording mobile phone memory card recording section 65b of indian evidence act right to defence authenticity/reliability of evidence admissibility of electronic evidence criminal trials hashing collisions forensic science laboratories integrity of digital evidence hashing algorithm sha-i cyber challenges section 65b(2) 1872 indian evidence act admissibility of electronic documents information technology act 2000 window forensic forensic training forensic expert network forensic tool monkey mobile forensic computer forensic cloud forensic mac forensic uncategorized cyber forensic click monkey electronic record evidence act whistleblowing legislations indian whistleblowing legislation corrupt practices whistleblower protection act whistle blowing what is whistleblowing whistleblowers whistleblower legislation in india cyberspace a new front of war individual privacy legislation to protect sebi should promote transparency in bourses by imp cases-says delhi high court state cannot claim sovereign immunity in motor acc the legislative response to grossly offensive or menacing emails and sms ex- director held liable for misappropriation of t cert-in to serve as national agency for incident r doctrine of sovereign immunity case study of bpo data theft case blatant misuse of information technology act forensic accountant reliability & admissibility as unique case of extortion through internet embezzlement of telephonic minutes a case study on fraudulent online share transactions by hacking hi tech peeping toms a man with tiny digicam had dhc upheld the time limit of six months for invoki securities fraud dabba trading applicability of engineer held for creating fake obscene orkut prof the citibank hacking traced via traffic on isps pr fake social networking profiles still big problem cbi taking the lead role in fighting software infr money circulation scheme or money cheating scheme 2008 notified wef 27102009 it amendment act the domestic violence act- are the female responde ghaziabad changing room incident shines spotlight mobile without valid imei number are a threat to n attorney general over sovereign immunity delhi high court seeks opinion from delhi police cyber criminal arrested through digital footp
See more