You are on page 1of 2

Roll No.

SAP ID
UNIVERSITY OF PETROLEUM AND ENERGY STUDIES
Mid Semester Examination, March 2023

Course: Information Technology Law Course Code: CLCC 4006


Programme: BA/BBA/BCOM/BSc LLB Semester: X

Time: 02 hrs. Max. Marks: 100 (weightage 20% in the grade sheet)

Instructions: Answer Question No 1 which is compulsory and any 2 from the rest.

S. No. Marks CO
1 “As per Section 18 of The Information Technology Act, 2000 provides the required
legal sanctity to the digital signatures based on asymmetric cryptosystems. The
digital signatures are now accepted at par with handwritten signatures and the
electronic documents that have been digitally signed are treated at par with paper
documents. The IT Act provides for the Controller of Certifying Authorities (CCA)
to license and regulate the working of Certifying Authorities. The Certifying 40 1
Authorities (CAs) issue digital signature certificates for electronic authentication of
users.”
In the light of the above paragraph, analyse in detail the role of the Controller in
carrying out their functions vis-à-vis the Information Technology Act, 2000
especially in relation to electronic signature and digital signature.

Ans.

2 “The computer generated world of internet is known as cyberspace and the laws
prevailing in this area are known as cyber laws and all the users of this space come
under the ambit of these laws as it carries a kind of worldwide jurisdiction. Cyber
law can also be described as that branch of law that deals with legal issues related to 30 3
the use of inter networked information technology.” In the light of the above
statement, discuss four important legal issues in Information Technology law.

Ans.
3 “The use of cyberspace in the public domain became common from the decade of the 30 2
1990s. The start of the new millennium in 2000 cemented the increasing use of
internet in the various day to day activities of mankind. The use of internet has
become so pervasive today that there is no conceivable area of human activity be it
social, political or economic which is not carried out through the use of internet
based applications and devices. This growth also lead to questions whether internet
should be regulated and if so to what extent in relation to the social, political and
other activities carried out through the cyberspace.”
Citing real world examples from the social, political, economic and
crime related domains justify the need for regulating the cyberspace through relevant
laws.
Ans.
4 Keta, a tech giant company from outside India, has recently rolled out a compulsory
membership fee for all its users. People have been using its messenger service, social
media services for last ten years. It is a dominant market player in the industry. The
government of India is planning to introduce their own messenger service and put a 30 4
ban on foreign messenger service Keta. This has sparked an academic debate over
free and fair use of internet and cyberspace. In the light of the above fact situation,
discuss the UNCITRAL Model Rules on E Commerce.
Ans.

You might also like