• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
View the IT Act 2000
Preliminary
Digital Signature
Electronic Governance
Attribution, Acknowledgement and Dispatch of Electronic Records
Secure Electronic Records and Secure Digital Signatures
Regulation of Certifying Authorities
Digital Signature Certificates
Duties of Subscribers
Penalties and Adjudication
The Cyber Regulations Appellate Tribunal
Offences
Network Service Providers Not to be Liable in Certain Cases
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
View the IT Act 2000
Preliminary
Digital Signature
Electronic Governance
Attribution, Acknowledgement and Dispatch of Electronic Records
Secure Electronic Records and Secure Digital Signatures
Regulation of Certifying Authorities
Digital Signature Certificates
Duties of Subscribers
Penalties and Adjudication
The Cyber Regulations Appellate Tribunal
Offences
Network Service Providers Not to be Liable in Certain Cases
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
Information Technology Act 2000: Introduction to Cyber Law in India, Importance of Cyber Law, E-Commerce, Paperless Society, Digital Signatures, Cybercrimes, Salient features of IT Act 2000, Recent amendments of IT Act 2008.
Right to Information Act 2005: Objectives of the RTI Act, Scope, Suo motu disclosure, Method of seeking information, Who is eligible to get information, Authorities, RTE 2008 and its features.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxOmGod1
Precedent, or stare decisis, is a cornerstone of common law systems where past judicial decisions guide future cases, ensuring consistency and predictability in the legal system. Binding precedents from higher courts must be followed by lower courts, while persuasive precedents may influence but are not obligatory. This principle promotes fairness and efficiency, allowing for the evolution of the law as higher courts can overrule outdated decisions. Despite criticisms of rigidity and complexity, precedent ensures similar cases are treated alike, balancing stability with flexibility in judicial decision-making.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxshweeta209
transfer of the P.I.L filed by lawyer Ashwini Kumar Upadhyay in Delhi High Court to Supreme Court.
on the issue of UNIFORM MARRIAGE AGE of men and women.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
3. The Information Technology Act, 2000 is an Act of
the Indian Parliament notified on 17 October 2000.
It is the primary law in India dealing with cybercrime
and electronic commerce.
It is based on the United Nations Model Law on
Electronic Commerce 1996 (UNCITRAL Model)
recommended by the General Assembly of United
Nations by a resolution dated 30 January 1997.
4. Objectives of the IT Act
To provide legal recognition for transactions:-
Carried out by means of electronic data interchange, and
other means of electronic communication, commonly
referred to as “electronic commerce”
To facilitate electronic filing of documents with
Government agencies and E-Payments
To amend the Indian Penal Code, Indian Evidence
Act,1872, the Banker’s Books Evidence Act 1891,Reserve
Bank of India Act ,1934
5. SCOPE AND APPLICATIONS
(a) a negotiable instrument (Other than a cheque) as defined in
section 13 of the Negotiable Instruments Act, 1881;
(b) a power-of-attorney as defined in section 1A of the Powers-of-
Attorney Act, 1882;
(c) a trust as defined in section 3 of the Indian Trusts Act, 1882;
(d) a will as defined in clause (h) of section 2 of the Indian
Succession Act, 1925 including any other testamentary disposition
(e) any contract for the sale or conveyance of immovable property
or any interest in such property;
(f) any such class of documents or transactions as may be notified
by the Central Government
6. AMENDMENTS
A major amendment was made in 2008
It introduced the Section 66A which penalised sending of
"offensive messages“
It also introduced the Section 69, which gave authorities the
power of "interception or monitoring or decryption of any
information through any computer resource“
It also introduced penalties for child porn, cyber terrorism
and voyeurism.
7. Digital Signatures
The authentication to be affected by use of asymmetric
crypto system and hash function
The private key and the public key are unique to the
subscriber and constitute functioning key pair
Verification of electronic record possible
8. ELECTRONIC GOVERNANCE
LEGAL RECOGNITION OF ELECTRONIC
RECORDS(SEC4)
LEGAL RECOGNITION OF DIGITAL SIGNATURE(SEC 5)
USE OF ELECTRONIC RECODS AND DIGITAL
SIGNATURE (SEC 6)
RETNTION OF ELECTRONIC RECORDS(SEC 7)
PUBLICATION OF RULES AND REGULATION (SEC 8)
POWER TO MAKE RULES BY CENTRAL
GOVERNMENT(SEC10)
9. ATTRIBUTION, ACKNOWLEDGMENT
AND DISPATCH OF ELECTRONIC
RECORDS
ATTRIBUTION OF ELECTRONIC RECORDS(SEC 11)
ACKNOWLEDGEMENT OF RECEIPT(SEC 12)
TIME AND PLACE OF DESPATCH AND RECEIPT OF
ELECTRONIC RECORD(SEC 13)
10. SECURE ELECTRONIC RECORDS AND
SECURE ELECTRONIC SIGNATURES
SECURE ELECTRONIC RECORD(SEC 14)
SPECIFIC ELECTRONIC SIGNATURE (SEC 15)
SECURITY PROCEDURE AND PRACTICES (SEC 16)
11. REGULATION OF CERTIFYING AUTHORITIES
APPOINTMENT OF CONTROLLER AND OTHER
OFFICERS (SEC 17)
FUNCTIONS OF CONTROLLER(SEC 18)
RECOGNITION OF FOREIGN CERTIFYING AUTHORITIES
(SEC 19)
POWER TO DELEGATE(SEC27)
POWER TO INVSTIGATE CONTRAVENTIONS(SEC28)
12. GRANTING LICENCE
LICENCE TO ISSUE DIGITAL SIGNATURE CERTIFICATE(SEC 21)
APPLICATION FOR LICENCE(SEC22)
RENEWAL OF LICENCE(SEC23)
PROCEDURE FOR GRANT OR REJECTION OF LICENSE(SEC 24)
SUSPENSION OF LICENCE(SEC25)
NOTICE OF SUSPENSION OR REVOCATION OF LICENCE(SEC 26)
CERTIFYING AUTHORITY TO FOLLOW CERTAIN PROCEDURES(SEC30)
CERTIFYING AUTHORITY TO ENSURE COMPLIANCE OF THE ACT (SEC31)
DISPLAY OF LICENCE(SEC 32)
SURRENDER OF LICENCE(SEC33)
DISCLOSURE (SEC 34)
13. ELECTRONIC SIGNATURE
CERTIFICATES
CERTIFYING TO ISSUE ELECTRONIC SIGNATURE
CERTIFICATE(SEC35)
REPRESENTATIONS UPON ISSUANCE OF DIGITAL
SIGNATURE CERTIFICATE(SEC 36)
SUSPENSION OF DIGITAL SIGNATURE CERTIFICATE (SEC
37)
REVOCATION OF ELECTRONIC SIGNATURE
CERTIFICATE(SEC 38)
NOTICE OF SUSPENSION OR REVOCATION(SEC 39)
14. DUTIES OF SUBSCRIBERS
GENERATING KEY PAIRS (SEC 40)
ACCEPTANCE OF DIGITAL SIGNATURE CERTIFICATE
(SEC41)
CONTROL OF PRIVATE KEY(SEC 42)
15. PENALITIES COMPENSATION AND
ADJUDICATION
PENALITY AND COMPENSATION FOR DAMAGE TO
COMPUTER, COMPUTER SYSTEM(SEC 43)
PENALITY FOR FAILURE TO FURNISH
INFORMATION,RETURN(SEC 44)
RESIDUARY PENALITY(SEC45)
POWER TO ADJUDICATE(SEC 46)
FACTORS TO BE TAKEN INTO ACCOUNT BY THE
ADJUDICATING OFFICER