130. INFORMATION TECHNOLOGY ACT 2000 (AMENDMENT – 2008) 1. Describe the general laws and procedures for cyber law in India. 2. (a) Explain how the verification of digital signature is performed. (b) Explain in detail about the legal recognition of records and digital signatures. 3. (a) Discuss the authentication of electronic records. (b) Explain how the electronic records and digital signatures are used in Government and its agencies. 4. (a) Describe about the retention of electronic records. (b) Write short notes on publication regulation. 5. (a) What are different types of penalties? Explain. (b) Describe about the tampering of computer source documents. 6. (a) Give a short note about the pornography. (b) List the powers of investigation officers. 7. (a) Discus the limitations of network service providers. (b) How a computer system is hacked? How it can be avoided? Explain. 8. What are the factors to be considered by the adjudicating officer? Explain. @@@@@
1. Explain in detail about general laws and procedures in India.
2. a) Discuss about legal recognition of digital signatures. b) How to secure the digital signatures.
3. a) Explain in detail abut legal recognition of records.
b) Discuss the power of central government in making rules respect to digital signatures.
4. Explain in detail about use of electronic records and digital signatures in
government. 5. Explain in detail about pornography. 6. a) Discuss about Hacking with computer system. b) Describe the retention of electronic records. 7. a) Write short notes on publication regulation. b) What are the limitations of network service provider?