Professional Documents
Culture Documents
1 Students will be able to understand the importance of information technology Laws in the present context.
2 To expose the students about the claims and procedure for the civil wrong and cyber crimes and appropriate punishment thereof with investigation knowledge.
Course Outcomes
3 Students will be able to analyse various lacuna and challenges in the implementation of information technology law in India.
4 Students will be able to understand the concept related to E-commerce and E-governance, digital signatures, E-contracts etc.
1 To impart knowledge of the conceptual and operational framework of the Information Communication Technology law
Course Objectives
2 To acquaint students with the recent challenges and developments in the Information Communication Technology law.
The aim and object of ICT Law is to depart special knowledge about the information and communication technology law to enhance their capacity in the field of ICT Law, of the student of ‘crime and criminology’ group in their honours course of the B.A/BB.A.LL.B. (Hons.) Programme. The subject
Catalog
tries to give them deep and wider knowledge related to information technology law governing at the international and domestic level. It also exposes them about the claims and procedure for the civil wrong, with authorities to decide the dispute concerning computer and information technology
Description
law along with the cyber crimes and appropriate punishment thereof with investigation knowledge. The course will discuss in detail about the types of cyber crimes, evidence, digital signature , e-commerce, e-governance etc.
1 Law Relating to Computers, Internet and E-Commerce Paperback – 2012 by Nandan Kamath
Text Books 3 Computers, Internet and New Technology Laws by Karnika Seth
Rachana C. R, The Role of Digital Signatures in Digital Information Management, International Monthly Refereed Journal of Research In Management & Technology ISSN – 2320-0073 Volume II, March’13, Page 103-
2
109
Reference 4 Information Technology and Green Governance in India: Some Legal Perspective, International Journal of Applied Research and Studies ISSN: 2278-9480 Volume 2, Issue 5 (May - 2013) Page 1-8
7 Krishna Pal Malik, Computer and Information Technology Law, Allahabad Law Agency, 1st Ed. 2010
1 http://www.iibf.org.in/documents/Cyber-Laws-chapter-in-Legal-Aspects-Book.pdf
2 http://www.cyberpolicebangalore.nic.in/pdf/Cyber%20law%20IPC.pdf
3 http://osou.ac.in/eresources/introduction-to-indian-cyber-law.pdf
5 https://rtionline.gov.in/
6 https://www.csc.gov.in/
7 http://meity.gov.in/content/state-wide-area-network-swan
Offences
• Section 65: Tampering with Computer Source Documents
Unit 2 • Section 66: Computer Related Offences
• Section 66A: Punishment for sending offensive messages through communication service, etc (Repealed)
• Section 66B: Punishment for dishonestly receiving stolen computer resource or communication device
• 66C- Punishment for identity theft
• 66D: Punishment for cheating by personation by using computer resource
• Section 66E- Violation of Privacy
• Cyber terrorism
• Publishing or transmitting obscene material or material containing sexually explicit act, etc.
• Material ‘depicting’ children
E-contracts
• Types of E-Contracts
• Regulation of E-Contract
• Recognition of E-Contracts under IT Act
• Attribution, Acknowledgement and Dispatch of Electronic Records
PPT Lecture Blended Learning Discussion
Pedagogy tools
Internal Assignment
(Workshop report +
Individual report)
CAT 1
CAT 2
Viva
Marks 60 15 5 10 10
Total Marks 60 40
counselling
social and
profession
negotiatio
al skills of
n needed
Students
students
students
students
students
Develop
will gain
develop
student
ethical,
and
will
will
will
will
the
wil
EEE101 Information and Communication Technology Law 1 3 4 5 6 7
Students will be able to understand the importance of information technology Laws in the present context. 2
1
To expose the students about the claims and procedure for the civil wrong and cyber crimes and appropriate punishment thereof with investigation knowledge. 2 3 4
2
Students will be able to analyse various lacuna and challenges in the implementation of information technology law in India. 4
3
Students will be able to understand the concept related to E-commerce and E-governance, digital signatures, E-contracts etc. 2
4
Instructional Plan 1/4
Topics to be discussed Pedagogy Approach Readings Activities CO
Concept of Information Technology and Cyber law Cyber Law by Anirudh Rastogi 1
Evolution of Cyber Law: Cyberspace, needs to control it Cyber Law by Anirudh Rastogi 1
Early Cyber Laws: The Computer Misuse Act, 1990 of Great Britain Cyber Law by Anirudh Rastogi 1
Unit 1
Uniform International Standards for Cyber Law: UNCITRAL Model Law on Electronic Commerce, 1996 Computers, Internet and New Technology Laws by Karnika Seth quiz 1
India’s First Cyber Law: The Information Technology Act, 2000 An Introduction to cyber laws and cyber crime by Prof. R. K. Chaubey 1
Important Definitions under Information Technology Act,2000 An Introduction to cyber laws and cyber crime by Prof. R. K. Chaubey quiz 1
Digital signature and Electronic Signature An Introduction to cyber laws and cyber crime by Prof. R. K. Chaubey practical 4
Domain Name Dispute Resolution
Instructional Plan 2/4
Topics to be discussed Pedagogy Approach Readings Activities CO
Meaning, Nature and Scope of Cyber-Crime An Introduction to cyber laws and cyber crime by Prof. R. K. Chaubey 2
Types of cyber crimes A to Z of Cyber Crime book by Asian School of Cyber Laws. practical 2
Cyber Contraventions and Cyber Offences under the IT Act An Introduction to cyber laws and cyber crime by Prof. R. K. Chaubey 2
Offences An Introduction to cyber laws and cyber crime by Prof. R. K. Chaubey quiz 2
Unit 2
Section 66E- Violation of Privacy Cyber Laws by Justice Yatindra Singh discussion 2
Cyber terrorism Cyber Laws by Aparna Vishwanathan discussion 2
Publishing or transmitting obscene material or material containing sexually explicit act, etc. An Introduction to cyber laws and cyber crime by Prof. R. K. Chaubey 2
Material ‘depicting’ children Cyber Laws by Justice Yatindra Singh 2
Adjudication under the IT Act Computers, Internet and New Technology Laws by Karnika Seth quiz 2
Instructional Plan 3/4
Topics to be discussed Pedagogy Approach Readings Activities CO
Recognition of Electronic Documents Cyber Laws by Aparna Vishwanathan 3
Legal Recognition under the Model Law An Introduction to Cyber Laws by Dr. J P Mishra 3
Legal Recognition under the IT Act An Introduction to cyber laws and cyber crime by Prof. R. K. Chaubey 3
Admissibility of Electronic Evidence Computers, Internet and New Technology Laws by Karnika Seth 3
Unit 3
Admissibility of Electronic Evidence prior to the IT Act: Tape Recorded Conversations Computers, Internet and New Technology Laws by Karnika Seth 3
Electronic Evidence as Documentary Evidence under the Indian Evidence Act, 1872 Computers, Internet and New Technology Laws by Karnika Seth quiz 3
Admissibility of Electronic Records Computers, Internet and New Technology Laws by Karnika Seth discussion 3
Proof of Digital Signature Computers, Internet and New Technology Laws by Karnika Seth practical 3
Presumptions under the Evidence Act Computers, Internet and New Technology Laws by Karnika Seth class test 3
Instructional Plan 4/4
Topics to be discussed Pedagogy Approach Readings Activities CO
Meaning of e-commerce and e-governance An Introduction to Cyber Laws by Dr. J P Mishra 4
Advantages and Disadvantages of e-commerce Cyber Laws by Aparna Vishwanathan discussion 4
E-Governance Provisions under the IT Act An Introduction to Cyber Laws by Dr. J P Mishra 4
Some E-Governance Initiatives in India
• National Portal of India https://www.india.gov.in/
• RTI Portal https://rtionline.gov.in/
Unit 4
Name. ……………………………….
Printed Pages:01
School of Law
End Term Examination (ETE), May-2018, Semester, 2017-18
[Programme:BAL/BBL] [Semester: 7th] [Batch: 4th yr]
Course Title: Information and Communication Technology Law Max Marks: 100
4 Discuss in brief the Uniform International Standards for Cyber Law laid down in UNCITRAL Model Law on Electronic Commerce, 1996. CO1 5
5 Critically analyze the admisibility of electronic evidences under Indian Evidence Act, 1882. Discuss whether facebook messages can be admissible as evidence in a court of law. CO3 20
7 Describe the concept of e-commerce and examine the advantages and disadvantages of e-commerce. CO4 10
8 In Hasbro, Inc. v. Internet entertainment group, Ltd (1996 U.S Dist) the court issued an order prohibiting the one party from using the domain name. Keeping in mind the above case discuss domain name dispute and why protecting domain name is important for a business. CO1 20
Xixcus” posted obscene, defamatory and annoying message about a divorcee woman in the Yahoo message group. E-mails were forwarded to the victim for information by the accused through a false e- mail account opened by him in the name of the victim. These postings resulted in annoying phone
9 CO2 20
calls to the lady. Discuss the crime committed by “Xixcus” and with help of cases decided maximum punishment what “Xixcus” can get in this case.
4 Discuss the evolution of cyber laws and its need in the present emerging cyber world. CO1 10
5 Distinguish between Digital Signature and Electronic Signature. Compare the functional aspect of the two in providing authenticity in the anonymous web-world. CO1 10
Discuss in detail the data-related crimes along by citing illustrations and also the below mentioned problems.
In this problem, Nissan (defendant) used his surname “Nissan” as a trade name for various businesses since 1995. In 2002, he formed Nissan Computer Corporation and registered the domain name “nissan.com” in 2005 and “nissan.net” in 2008. Both these websites were offering computer related
services. In 2010 plaintiff Nissan Motor Co sent a letter to defendant containing the objection raised for the use of word “Nissan” in its domain name but no further action was taken at that time. In August 2013, defendant modified its website to include “Nissan computer” logo which was identical to
6 CO2 15
plaintiff logo and also included various banner advertisements linking to number of automobile related websites.
Explain the liability of the defendant in this case under Indian Penal Code 1860 and Information Technology Act 2000.
Instructions:
1 Only 5 questions are to be asked in CAT.
2 Question 1 can be divided into subparts, but all subparts should map same CO.
3 An alternative question will be asked in question number 4 with OR option with the same serial number and alternative question must map with same CO
4 The two tables given below must be filled by the paper setter.
Table 1
Unit Questions Numbers Total Marks
1 1, 2, 3, 6 30
2 4, 5 20
3
4
Table 2
Knowledge level Questions Numbers COs Total Marks
K2 1,3,4 CO1 20
K3 6 CO2 15
K4 2, 5 CO1, CO2 15
1 Type the questions into this template and RENAME THE FILE with the subject code and date in the format ECE101_YYMMDD
2 Unit/chapter number can be considered for the syllabus if the same are not in modular form.
3 Font to be used for CAT is “Times New Roman” and the text size is 11.
Basic requirements:
i. Group of 5 students. (Team Building Exercise)
ii. Workshop in an Institution, College, University, School, etc. (Spreading the name of School of law, Galgotias University at other places)
iii. Minimum audience of 50 people required. (Organizational Skills)
iv. Submission of photos and videos of the workshop mandatory. (Proof of role of every member of the group in conducting the Workshop)
v. No leave from classes for Workshop related work except on the day of the Workshop. (Use Sundays and Mondays)
Submission Timeline:
• Creation of groups and Submission of names of group members – 3rd August 2018
• Submission and Approval of Workshop Topics – 10th August 2018
• Submission and Approval of PPT’s – 21st August 2018
• Submission of Final Workshop Report – 5th October 2018
• Submission of Individual analysis and observation Report – 16th October 2018
• Individual Viva – 25th October 2018
Pedagogy of Teaching:
• Lecture Method
• PPT’s
• Blended Learning
• Discussions
• Case Study
Pedagogy
Instructional Plan 1/4
Topics to be discussed Pedagogy Approach
Concept of Information Technology and Cyber law Lecture
Evolution of Cyber Law: Cyberspace, needs to control it Discussion
Early Cyber Laws: The Computer Misuse Act, 1990 of Great Britain PPT
Unit 1
Uniform International Standards for Cyber Law: UNCITRAL Model Law on Electronic Commerce, 1996 Lecture
India’s First Cyber Law: The Information Technology Act, 2000 Lecture
Important Definitions under Information Technology Act,2000 Lecture
Digital signature and Electronic Signature Blended Learning
Domain Name Dispute Resolution PPT
Instructional Plan 2/4
Topics to be discussed Pedagogy Approach
Meaning, Nature and Scope of Cyber-Crime Lecture
Types of cyber crimes Blended Learning
Cyber Contraventions and Cyber Offences under the IT Act Lecture
Offences PPT
Unit 2
Admissibility of Electronic Evidence prior to the IT Act: Tape Recorded Conversations Lecture
Electronic Evidence as Documentary Evidence under the Indian Evidence Act, 1872 Lecture and Case Study
Admissibility of Electronic Records Blended Learning
Proof of Digital Signature Blended Learning
Presumptions under the Evidence Act Lecture and Case Study
Instructional Plan 4/4
Topics to be discussed Pedagogy Approach
Meaning of e-commerce and e-governance Lecture
Advantages and Disadvantages of e-commerce Discussion
E-Governance Provisions under the IT Act Lecture
Some E-Governance Initiatives in India
• National Portal of India
• RTI Portal Blended Learning
Unit 4