Professional Documents
Culture Documents
Division ‘C’
Question 1 [10 Marks] Every legal database has many features, identify and answer accordingly:
i. What does it mean when you sort a list of cases that result after a search on SCC by option “Sort
by largest coram”? [1]
iii. What is a True print document and how do you get the same in SCC online? [1]
vi. The Oyez feature in Hein Online is available for Journals or not? [1]
vii. When you make a search on Manupatra, in Judgments where Special Leave Petition (SLP) is
pending/disposed off, this icon will appear (Green) (Red). What does each mean? [2]
viii. When you pull up a statute in Westlaw, if you see a red or yellow flag, what does each mean? [2]
answer
i. it means the judgement has how many judges in it. Since coram means bench strength and no. in
the box represents it.
ii. J refers to the complete judgement and D refers to the digest notes of the cases.
iii. ‘True Copy’ to refer to a copy of a document that has been stamped by a Notary to certify that
the copy is a true copy of the original
Navigate your cursor to the PRINT icon as shown in the above image.
There are three options available under the print icon TRUEPRINT™, PRINT and PRINT WITH
HIGHLIGHTS.
vii. the ‘green’ icon means the SLP is disposed off while the ‘red’ icon means the SLP is still pending.
viii. the ‘red’ for a statute means that it has either repealed or amended and ‘yellow’ flag indicates
other negative treatment.
Question 2 [5 Marks]
a. Share four best practices that you should follow to act as Human Firewall. The definition of a
human firewall is fairly straightforward. It is essentially a commitment of a group of employees or
students to follow security best practices to prevent as well as report any data breaches or
suspicious activity. [2]
answer
2 keep a close eye on unauthorised user access on your as well as your colleague’s devices.
b. Ethical hacking holds importance in cybersecurity. Why is the statement correct? Mention types
of Ethical hackers [2]
answer
Ethical hacking is a process in which a hacker with the permission of the person tries to or hacks
system/network of that very person with the mind-set of a hacker so as to discover the
vulnerabilities in the programme which could be corrected.
Ethical hacking as compared to hacking is legal as it does not have the essential of mens rea
important for prosecution in criminal law and he could not be held liable in civil law as he has done
the hacking on being asked by the person himself.
1 ethical hackers which follow proper law when it comes to hacking into systems without the
permission of the owner and comply with the ‘responsible discloser laws’.
2 ethical hackers prioritise their own sense of righteousness. They ‘may’ have good intensions but
they don’t follow the procedure established by law. Might not disclose flaws for immediate fixes.
c. As legal advisor to a corporate, what are you responsibilities to ensure legal compliance for IT
security of that company? Mention any two. [1]
answer
2 periodically check for the malware of other damage causing things in the systems, maintain a
robust firewall and company’s customers information and who has the access to sensitive
information which could be used to commit a cyber-crime should be monitored in accordance to the
laws.
Question 3 [5 Marks]
Write down search string using the Boolean search techniques syntax as acceptable in Hein Online,
Manu Patra and Westlaw Database. How to answer: The answer should contain three search queries
(one for Lexis Nexis, one for ManuPatra, one for WestLaw), marks for that question will be awarded
only if all three are correct: