You are on page 1of 4

PRN 21010224147

Division ‘C’

Batch BBA LLB

Question 1 [10 Marks] Every legal database has many features, identify and answer accordingly:

i. What does it mean when you sort a list of cases that result after a search on SCC by option “Sort
by largest coram”? [1]

ii. What is difference between notation J and D in SCC online? [1]

iii. What is a True print document and how do you get the same in SCC online? [1]

iv. Does EBC reader provide a link to SCC online? [1]

v. What is neutral citation in Manupatra? [1]

vi. The Oyez feature in Hein Online is available for Journals or not? [1]

vii. When you make a search on Manupatra, in Judgments where Special Leave Petition (SLP) is
pending/disposed off, this icon will appear (Green) (Red). What does each mean? [2]

viii. When you pull up a statute in Westlaw, if you see a red or yellow flag, what does each mean? [2]

answer

i. it means the judgement has how many judges in it. Since coram means bench strength and no. in
the box represents it.

ii. J refers to the complete judgement and D refers to the digest notes of the cases.

iii. ‘True Copy’ to refer to a copy of a document that has been stamped by a Notary to certify that
the copy is a true copy of the original

Navigate your cursor to the PRINT icon as shown in the above image.

There are three options available under the print icon TRUEPRINT™, PRINT and PRINT WITH
HIGHLIGHTS.

iv. yes it provides link to scc online.

v. nuteral citation makes it easier to find judgement.

vi. Oyez feature is available for journels.

vii. the ‘green’ icon means the SLP is disposed off while the ‘red’ icon means the SLP is still pending.

viii. the ‘red’ for a statute means that it has either repealed or amended and ‘yellow’ flag indicates
other negative treatment.
Question 2 [5 Marks]

a. Share four best practices that you should follow to act as Human Firewall. The definition of a
human firewall is fairly straightforward. It is essentially a commitment of a group of employees or
students to follow security best practices to prevent as well as report any data breaches or
suspicious activity. [2]

answer

1 don’t share conferential data without confirming authentication or identity check.

2 keep a close eye on unauthorised user access on your as well as your colleague’s devices.

3 practice as minimal sharing of data as possible.

4 make use of stronger credentials like cryptic passwords

5 avoid using the same password to all accounts.

b. Ethical hacking holds importance in cybersecurity. Why is the statement correct? Mention types
of Ethical hackers [2]

answer

Ethical hacking is a process in which a hacker with the permission of the person tries to or hacks
system/network of that very person with the mind-set of a hacker so as to discover the
vulnerabilities in the programme which could be corrected.

Ethical hacking as compared to hacking is legal as it does not have the essential of mens rea
important for prosecution in criminal law and he could not be held liable in civil law as he has done
the hacking on being asked by the person himself.

1 ethical hackers which follow proper law when it comes to hacking into systems without the
permission of the owner and comply with the ‘responsible discloser laws’.

2 ethical hackers prioritise their own sense of righteousness. They ‘may’ have good intensions but
they don’t follow the procedure established by law. Might not disclose flaws for immediate fixes.

c. As legal advisor to a corporate, what are you responsibilities to ensure legal compliance for IT
security of that company? Mention any two. [1]

answer

Ensure employees follow procedures


1 develop digital signature for soft copy and online documents. digital signatures of different levels
can be made if the organisation is large and communicate the level of access to the clients and
partners so that others can’t impersonate them.

2 periodically check for the malware of other damage causing things in the systems, maintain a
robust firewall and company’s customers information and who has the access to sensitive
information which could be used to commit a cyber-crime should be monitored in accordance to the
laws.

Question 3 [5 Marks]

Write down search string using the Boolean search techniques syntax as acceptable in Hein Online,
Manu Patra and Westlaw Database. How to answer: The answer should contain three search queries
(one for Lexis Nexis, one for ManuPatra, one for WestLaw), marks for that question will be awarded
only if all three are correct:

S.No. Write a search Boolean Search Boolean Search Boolean Search


string using terms query for Lexis query for query for
& connectors to Nexis ManuPatra WestLaw
retrieve results
1 Where the phrase Reverse Reverse Reverse
" Reverse discrimination discrimination – Discrimination %
discrimination " NOT racial Racial
occurs but the racial discrimination Discrimination
phrase “racial discrimination
discrimination”,
does not
2 where the word Retirement /p Retirement Retirement /p
"retirement" benefit benefit /p Benefit
appears within the
same paragraph as
the word "benefit".
3 to find hearsay and Death /s poison Death Poison /s Death Poison /s
utterance, where
poison comes after Or Or
death in a sentence
or within 40 words. Death /40 poison Death Poison
/40
4 “corporate tax” Corporate tax Corporate Tax Corporate tax +6
preceding the “law” pre/6 law law @6 Law
by 6 terms
5 search string to Object! Object? Object!
retrieve results
matching object,
objected, objection,
objecting,
objectionable

You might also like