@ On computers and other networks by the cyber criminals using authorized or unauthorized entry
|
|
- Kory Berry
- 5 years ago
- Views:
Transcription
1 UNDERSTANDING CYBER CRIMES Introduction The advent of internet and the revolution of cyber space in communication, commerce and information is hailed as a paradigm shift in use of technology and its percolation to the masses. Along with its positive aspect of growth and development, the flip side is that of the phenomenon called cyber crimes. The impact of cyber crimes and the legal response is still a matter of debate and defies consensus and unified approach. Nevertheless the potential damage and the actual damage it has done warrants a speedy response from the legal system. Unlike the crime in a physical scenario and its containment, cyber crimes are technological in its essence, anonymous in its operation and untraceable in its getaway. The legal debate surrounding cyber crimes is two fold. The first challenge is to define what constitutes cyber crimes as opposed to physical crimes and the second challenge is that of the application of traditional criminal law and criminal justice administration on the cyber crimes. In the first debate on what constitutes cyber crimes there is some consensus. Legal analysts have a consensus that cyber crimes are those crimes perpetuated using computers and computer networks through the medium of internet to perpetuate various cyber crimes. Such crimes are On computers and other networks by the cyber criminals using authorized or unauthorized Such cyber crimes can be of various acts ranging from stalking to cyber Like physical crimes there are individuals or groups of persons behind such acts of cyber crimes. It is on the second aspect of analysis, whether cyber crimes need a different interpretation of the criminal law concepts, there are divergent views. Whether there should be a separate cyber crime laws or whether traditional criminal law is enough? How to assess and compute the damages in cyber crimes using the traditional analysis of criminal law used in the concept of physical crime and related issues. Additionally the nature of cyber crimes by virtue of the internet is a crime which poses challenge to international conduct and hence the need for an international dimension of cyber crimes which is considered as the international warfare of Information technology. On the regulation of the cyber crimes again there is a wide debate on how far one can regulate and what type of regulations should be in place. There could be consensus on the regulation of cyber crimes such as hacking, fraud, obscenity and related crimes, where as the human right activists, votaries of privacy and other activists accuse violations of the authority on the name of security and cyber crime where their civil rights are curbed, activities monitored and privacy intruded. The module will analyze the issues of what constitutes cyber crimes, the various types of cyber crimes, and the legislation in India on cyber crimes, the issues of civil rights and its protection on tackling cyber crimes. Defining Crime To understand cyber crimes and its ramifications in terms of the damage, the challenge to prosecution, the loopholes of the existing criminal justice system, the powers of regulation and its boundaries, it is essential to have look at the concept of crime itself.
2 The concept of Crime is treated differently in different societies and also undergoes drastic change during different time periods in the history of a society. Dowry was considered as a social status at a particular period, which today is a crime. Untouchability was an accepted social norm of a particular period in society in tune with caste hierarchy and today it is a crime under the constitution. Thus very many acts are crime today, which are not once, and some acts like homosexuality or lesbianism, which is a crime today, could change tomorrow. In essence the concept of crime is static in some aspects such as stealing, fraud, causing injury, murder etc and changing in certain aspects of social norms and relationship. Similarly crime in a society is not a crime in another society. What could be considered as obscenity in India could be viewed differently in Sweden. What could be contempt of court publication in India could be viewed differently in United States. Another aspect is that the liability or punishment for a crime could vary in different societies based on the Law reflecting values attached in such societies to certain acts. Capital punishment has been done away in many European countries and not so in India or in some states in US. The quantum of punishment for theft or vandalism could be lenient in some legal systems and could be extreme in Saudi Arabia. In essence the definition of crime is varied in different in legal systems. The punishment could vary in different legal systems. In the current context, the countries following the western jurisprudence and common law systems have a well-evolved criminal law and criminal justice administration to tackle the physical world of crimes. Such systems look at crime from the four elements of a) Mens Rea- the mental state of the person accused of a criminal act b) Actus Reus- committing an act or failing to do so when it is warranted resulting in a criminal act c) the attendant circumstances or conditions which define a criminal act and d) the result of an act considered as prohibited by the Law. A Criminal Act in the physical world is dealt on the above fundamentals. To illustrate - is that there is an altercation between A and B resulting in an injury to B to which, he succumbs and dies. In this case A had hit B who is an alcoholic with a liver damage, which resulted in the death of him. If A is aware of the fact of the liver damage of B and still punched him, one can infer that there is a Mens Rea on the part of A and also acted in a manner, which resulted in the injury and an Act prohibited by Law. If A is not aware of liver injury of B then there is no Mens Rea on the part of A but still will be liable on the count of Actus rea and other aspects for prosecution. Thus the penal provisions will act upon the application of the above basic elements in any crime in the physical world. The basics of such is in the first place, any legal system should first define certain acts as criminal which is harmful to the society and there upon the actions that are considered as crime will be subject to the scrutiny of the above elements of intention, conduct, circumstance and prohibited act to evoke the required penal provisions. The fundamental principle is that a conviction is possible only if there is a concrete proof beyond reasonable doubt that the act of a person is prohibited by the criminal law and such an act is also committed with an intention of causing the same. CRIME IN CONTEXT OF INTERNET The cyber world is defined as a virtual world which is different from that of the physical world. The cyber world though a virtual world is a reality which interconnects people, organizations, Governments. It transacts information at the basic level but also conducts the business of governments and private enterprises in a manner where no other technology could dream of. The cyber space is also a space where various types of crimes are perpetuated and the magnitude of such crimes could be unimaginable due its speed, anonymity and destruction has been amply recorded. The moot point is whether the same principles of criminal law can be applied to the cyber world crimes as applied to the world of physical crimes. The answer is divided.
3 One school of thought advocate that it is possible to interpret the crimes perpetuated in the cyber world to that of the physical world and hence could apply the same principles to regulate them. To substantiate the following arguments are held forth: 1. Cyber Crimes are nothing but crimes of the physical world perpetuated in the world of computers and hence there is no difference in defining a crime in the cyber world and the physical world 2. As in the physical world the cyber world crimes are perpetuated by individuals or groups, where the medium is the only difference. 3. As the traditional principles of criminal law has tackled various technologies used in the past it is capable of analyzing and interpreting the new technology as well. 4. The cyber crimes in fact are lesser in scope than the physical crime like fraud, intrusion of privacy, data theft, damage to computers, cheating consumers etc where as physical injury or other crimes like rape, grievous hurt or bigamy cannot be perpetuated through the cyber crimes. 5. The technological advancement of the information technology itself is a deterrent and a tool in tracking and convicting the crimes. On the other hand there are advocates who say that cyber crimes cannot be tackled with the conventional principles of cyber crimes and thus need special laws to regulate them and they put forth the following arguments: 1. Cyber Crime is a crime which has a potential and uncontrollable damage which needs stricter regulations. A virus introduced can damage millions of computers before even finding the perpetuator. 2. The cyber crime is perpetuated by anonymous person who has to be skilled in opening the password and security systems and can vanish without a trace. 3. The cyber crimes are transnational in nature, which involves complex prosecution procedures to bring the culprits to the book. 4. The Cyber crime of obscenity and pornography has a potential moral depravity on generations which could push them into the physical world of crimes 5. The National Security and security in terms of safety like Airports, Railway systems are more vulnerable and could create chaos and economic loss by cyber crimes and hence special laws to apprehend, prosecute with stiffer penalties are needed in context of cyber crimes 6. The technology is a fast changing one and hence needs a different type of enforcement system to tackle the cyber crimes unlike the physical crimes. With the debate on the above lines continuing one thing is clear that cyber crimes has the potential to damage the economic aspects of a society and a nation due to technology where speed, ease of operation, defying boundaries are strengths and weaknesses at the same time. The legislations around the world are veering around to the view that cyber crimes warrant
4 stricter penalties due to its quantum of damage. There are also attempts to address the technology related issues by setting up of cyber tribunals. In Indian context, the IT Act of 2000 tries to address the question of cyber crimes by defining what is a damage in the context of the computers and the relevant penalties as follows: PENALTIES AND ADJUDICATION : S 43. Penalty for damage to computer, computer system, etc. If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network, - (a) accesses or secures access to such computer, computer system or computer network; (b) downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium; (c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; (d) damages or causes to be damaged any computer, computer system or computer network, data, computer database or any other programmes residing in such computer, computer system or computer network; (e) disrupts or causes disruption of any computer, computer system or computer network; (f) denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means; (g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made hereunder; (h) charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network, he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected. Explanation.- For the purposes of this section,- (i) "computer contaminant" means any set of computer instructions that are designed- (a) to modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or (b) by any means to usurp the normal operation of the computer, computer system, or computer network; (ii) "computer data base" means a representation of information, knowledge, facts, concepts or instructions in text, image, audio, video that are being prepared or have been prepared in a
5 formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network; (iii) "computer virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource; (iv) "damage" means to destroy, alter, delete, add, modify or rearrange any computer resource by any means. In this context the crimes which may not have found a definition under the Indian Penal Code has been amply clarified in the IT Act and there are other crimes which are committed hitherto in the physical world which if done through the medium of internet using computers will be brought as Cyber crimes and can be punished under the IPC. To this effect the term electronic record has been introduced in the IPC at relevant places : 1. After section 29, the following section shall be inserted, namely:- Electronic record. "29A. The words "electronic record" shall have the meaning assigned to them in clause (t) of sub- section (1) of section 2 of the Information Technology Act, 2000.". 2. In section 167, for the words "such public servant, charged with the preparation or translation of any document, frames or translates that document", the words "such public servant, charged with the preparation or translation of any document or electronic record, frames, prepares or translates that document or electronic record" shall be substituted. 3. In section 172, for the words "produce a document in a Court of Justice", the words "produce a document or an electronic record in a Court of Justice" shall be substituted. 4. In section 173, for the words "to produce a document in a Court of Justice", the words "to produce a document or electronic record in a Court of Justice" shall be substituted. 5. In section 175, for the word "document" at both the places where it occurs, the words "document or electronic record" shall be substituted. 6. In section 192, for the words "makes any false entry in any book or record, or makes any document containing a false statement", the words "makes any false entry in any book or record, or electronic record or makes any document or electronic record containing a false statement" shall be substituted. 7. In section 204, for the word "document" at both the places where it occurs, the words "document or electronic record" shall be substituted. 8. In section 463, for the words "Whoever makes any false documents or part of a document with intent to cause damage or injury", the words "Whoever makes any false documents or false electronic record or part of a document or electronic record, with intent to cause damage or injury" shall be substituted. 9. In section 464,-
6 (a) for the portion beginning with the words "A person is said to make a false document" and ending with the words "by reason of deception practiced upon him, he does not know the contents of the document or the nature of the alteration", the following shall be substituted, namely:- "A person is said to make a false document or false electronic record- First-Who dishonestly or fraudulently- (a) makes, signs, seals or executes a document or part of a document; (b) makes or transmits any electronic record or part of any electronic record; (c) affixes any digital signature on any electronic record; (d) makes any mark denoting the execution of a document or the authenticity of the digital signature, with the intention of causing it to be believed that such document or part of document, electronic record or digital signature was made, signed, sealed, executed, transmitted or affixed by or by the authority of a person by whom or by whose authority he knows that it was not made, signed, sealed, executed or affixed; or Secondly- Who, without lawful authority, dishonestly or fraudulently, by cancellation or otherwise, alters a document or an electronic record in any material part thereof, after it has been made, executed or affixed with digital signature either by himself or by any other person, whether such person be living or dead at the time of such alteration; or Thirdly- Who dishonestly or fraudulently causes any person to sign, seal, execute or alter a document or an electronic record or to affix his digital signature on any electronic record knowing that such person by reason of unsoundness of mind or intoxication cannot, or that by reason of deception practiced upon him, he does not know the contents of the document or electronic record or the nature of the alteration. " ; (b) after Explanation 2, the following Explanation shall be inserted at the end, namely:- 'Explanation 3.- For the purposes of this section, the expression "affixing digital signature" shall have the meaning assigned to it in clause (d) of subsection (1) of section 2 of the Information Technology Act, 2000.'. 10. In section 466,- (a) for the words "Whoever forges a document", the words "Whoever forges a document or an electronic record" shall be substituted; (b) the following Explanation shall be inserted at the end, namely:- 'Explanation.-
7 For the purposes of this section, "register" includes any list, data or record of any entries maintained in the electronic form as defined in clause (r) of sub-section (1) of section 2 of the Information Technology Act, 2000.'. 11. In section 468, for the words "document forged", the words "document or electronic record forged" shall be substituted. 12. In section 469, for the words "intending that the document forged", the words "intending that the document or electronic record forged" shall be substituted. 13. In section 470, for the word "document" in both the places where it occurs, the words "document or electronic record" shall be substituted. 14. In section 471, for the word "document" wherever it occurs, the words "document or electronic record" shall be substituted. 15. In section 474, for the portion beginning with the words "Whoever has in his possession any document" and ending with the words "if the document is one of the description mentioned in section 466 of this Code", the following shall be substituted, namely: - "Whoever has in his possession any document or electronic record, knowing the same to be forged and intending that the same shall fraudulently or dishonestly be used as a genuine, shall, if the document or electronic record is one of the description mentioned in section 466 of this Code.". 16. In section 476, for the words "any document", the words "any document or electronic record" shall be substituted. 17. In section 477A, for the words "book, paper, writing" at both the places where they occur, the words "book, electronic record, paper, writing" shall be substituted. Though there is a debate whether the document in IPC prior to the amendment will include electronic document the current amendment makes such analysis redundant and does not leave scope for any other interpretation. One need to understand the types of cyber crimes in vogue to apply the existing IT Act or the IPC to regulate the same.
IT ACT Dr.V.C.Vivekanandan Dean & Professor of Law RGSOIPL IIT Kharagpur
IT ACT 2000 Dr.V.C.Vivekanandan Dean & Professor of Law RGSOIPL IIT Kharagpur vivekvc2001@yahoo.co.in Understanding the IT ACT 2000 Spin-offs Cyber Regulation Advisory Committee Cyber Regulations Appellate
More informationINFORMATION TECHNOLOGY (AMENDMENT) BILL. THE MINISTER OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (SHRI A. RAJA): Sir, I beg to move :
INFORMATION TECHNOLOGY (AMENDMENT) BILL THE MINISTER OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (SHRI A. RAJA): Sir, I beg to move : That the Bill further to amend the Information Technology Act, 2000,
More informationLegislative Brief The Information Technology (Amendment) Bill, 2006
Legislative Brief The Information Technology (Amendment) Bill, 2006 Highlights of the Bill The Bill was introduced in the Lok Sabha on 15 th December, 2006 and referred to the Standing Committee on Information
More informationInformation Technology (Amendment) Act, 2008
CHAPTER 10 Information Technology (Amendment) Act, 2008 Basic Concepts 1. The Act: In May 2000, both the houses of the Indian Parliament passed the Information Technology Bill. The Bill received the assent
More informationBar & Bench (
1 TO BE INTRODUCED IN LOK SABHA Bill No. 261 of 2018 THE AADHAAR AND OTHER LAWS (AMENDMENT) BILL, 2018 A BILL to amend the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services)
More informationChapter 10 Information Technology (Amendment) Act, 2008
Chapter 10 Information Technology (Amendment) Act, LEARNING OBJECTIVES : To know about IT Act 2000 (as Amended by Information Technology (Amendment) Act, ), and its objectives, to understand its scope
More informationGeorgia Computer System Protection Act
Georgia Computer System Protection Act Enacted by the 1991 Georgia General Assembly Effective 1 July 1991 INTRODUCTION The "Georgia Computer Systems Protection Act" is an act enacted by the 1991 Georgia
More informationTHE INFORMATION TECHNOLOGY (AMENDMENT) BILL, 2008
T This Act is in force from OCT 27,2009 THE INFORMATION TECHNOLOGY (AMENDMENT) BILL, 2008 A BILL further to amend the Information Technology Act, 2000. BE it enacted by Parliament in the Fifty-ninth Year
More informationINFORMATION TECHNOLOGY ACT, 2000 (as amended by Information Technology Act, 2008)
INFORMATION TECHNOLOGY ACT, 2000 (as amended by Information Technology Act, 2008) 1 Page No I. PRELIMINARY II. DIGITAL SIGNATURE AND ELECTRONIC SIGNATURE III. ELECTRONIC GOVERNANCE IV. ATTRIBUTION, ACKNOWLEDGMENT
More informationThis Bill contains 4 Parts and seeks to provide for the prevention and punishment of electronic crimes.
ELECTRONIC CRIMES BILL, 2013 EXPLANATORY NOTES This Bill contains 4 Parts and seeks to provide for the prevention and punishment of electronic crimes. PART I of the Bill, Clauses 1-4, deals with matters
More informationTHE INDIAN PENAL CODE (AMENDMENT) BILL, 2016
AS INTRODUCED IN LOK SABHA Bill No. 303 of 2016 45 of 1860. 5 THE INDIAN PENAL CODE (AMENDMENT) BILL, 2016 By SHRIMATI SUPRIYA SULE, M.P. A BILL further to amend the Indian Penal Code, 1860. BE it enacted
More informationTHE PREVENTION OF MONEY-LAUNDERING (AMENDMENT) BILL, 2009
Bill No. XXXI-F of 2008 THE PREVENTION OF MONEY-LAUNDERING (AMENDMENT) BILL, 2009 (AS PASSED BY THE HOUSES OF PARLIAMENT RAJYA SABHA ON 19TH FEBRUARY, 2009 LOK SABHA ON 24TH FEBRUARY, 2009) ASSENTED TO
More informationThe Protection of Children from Sexual Offences Act, 2012 (POCSO, 2012)
The Protection of Children from Sexual Offences Act, 2012 (POCSO, 2012) Need for POCSO Act, 2012: Existing laws (IPC, IT Act, 2000 and JJ Act, 2000) not enough to address sexual offences No specific provisions
More informationTHE INFORMATION TECHNOLOGY ACT, 2000 ARRANGEMENT OF SECTIONS
THE INFORMATION TECHNOLOGY ACT, 2000 ARRANGEMENT OF SECTIONS CHAPTER I PRELIMINARY SECTIONS 1. Short title, extent, commencement and application. 2. Definitions. 3. Authentication of electronic records.
More information1. Delete the words and registration. 3. Delete the word person and substitute therefor the word individual.
SENATE AMENDMENTS TO THE NATIONAL IDENTIFICATION AND REGISTRATION BILL, 2017 Provision Long title Amendment 1. Delete the words and registration. 2. Delete the words verification and the authentication
More informationTHE COMPETITION (AMENDMENT) BILL, 2007
1 TO BE INTRODUCED IN LOK SABHA Bill No. 70 of 2007 12 of 2003. THE COMPETITION (AMENDMENT) BILL, 2007 A BILL to amend the Competition Act, 2002. BE it enacted by Parliament in the Fifty-eighth Year of
More informationTitle 17-A: MAINE CRIMINAL CODE
Title 17-A: MAINE CRIMINAL CODE Chapter 18: COMPUTER CRIMES Table of Contents Part 2. SUBSTANTIVE OFFENSES... Section 431. DEFINITIONS... 3 Section 432. CRIMINAL INVASION OF COMPUTER PRIVACY... 4 Section
More informationDEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA
DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA Lawful Access: Legal Review Follow-up Consultations: Criminal Code Draft Proposals February-March 2005 For discussion purposes Not for further
More informationCounter Charge 498a
Counter Charge 498a Offence (legally) is the best form of defense. If you had waited for 11 years to get acquitted from 498a case which is so obviously false and blatantly misused, I am sure many of us
More informationCHAPTER I PRELIMINARY
THE FUGITIVE ECONOMIC OFFENDERS BILL, 2017 A Bill to provide for measures to deter economic offenders from evading the process of Indian law by remaining outside the jurisdiction of Indian courts, thereby
More informationTHE COMPETITION (AMENDMENT) BILL, 2007
1 AS PASSED BY LOK SABHA ON 6.9.2007 Bill No. 70-C of 2007 12 of 2003. THE COMPETITION (AMENDMENT) BILL, 2007 A BILL to amend the Competition Act, 2002. BE it enacted by Parliament in the Fifty-eighth
More informationNC General Statutes - Chapter 14 Article 60 1
Article 60. Computer-Related Crime. 14-453. Definitions. As used in this Article, unless the context clearly requires otherwise, the following terms have the meanings specified: (1) "Access" means to instruct,
More informationTHE FUGITIVE ECONOMIC OFFENDERS BILL, 2018
AS PASSED BY LOK SABHA ON 19.07.18 Bill No. 79-C of 18 THE FUGITIVE ECONOMIC OFFENDERS BILL, 18 ARRANGEMENT OF CLAUSES CHAPTER I PRELIMINARY CLAUSES 1. Short title, extent and commencement. 2. Definitions.
More informationIntroduction & Key Countries. UAE Egypt Saudi Arabia Jordan Morocco
Hatem Abdelghani Introduction & Key Countries UAE Egypt Saudi Arabia Jordan Morocco United Arab Emirates How does counterfeit come in UAE Enforcement Actions Applicable Laws Punishments Customs Recordation
More informationPLEASE READ THE TERMS OF USE, PRIVACY POLICY, AND PRIVACY PRACTICES FOUND ON THIS WEBSITE.
TERMS OF USE Effective Date: May 23, 2018 Last Revised: May 23, 2018 PLEASE READ THE TERMS OF USE, PRIVACY POLICY, AND PRIVACY PRACTICES FOUND ON THIS WEBSITE. BY USING THE SERVICES, YOU AGREE TO THE TERMS
More information1. Username and password: 2. Privacy: 3. Code of conduct: 4. Availability and Access: 5. Amendments:
TERMS AND CONDITIONS 1. Username and password: You may be required to register as a user of the Site to be able to access certain areas of the Site. In such a case, you will need to provide a username
More informationTHE MYANMAR EXTRADITION ACT.
THE MYANMAR EXTRADITION ACT. CONTENTS. CHAPTER I. PRELIMINARY. Sections. 1. * * * * 2. Definitions. CHAPTER II. SURRENDER OF FUGITIVE CRIMINALS IN CASE OF FOREIGN STATES. 3. (1) Requisition for surrender.
More informationBahrain s Draft Law on Computer Crimes
Bahrain s Draft Law on Computer Crimes Dr. Jameel Al Alawi Economic Development Board Jameel.alalawi@bahrainedb.com Law is based on Cyber Crime Convention Based on Cyber-Crime Convention Advantages of
More informationStatistics Act, 2015 (1958)
Statistics Act, 2015 (1958) Date of Authentication Publication in the Nepal Gazette 2015.8.10 (25 Nov. 1958) 2015.8.18 (3 Dec. 1958) Amendments 1. Stattistics (Amendment) Act, 2018 (1961) 2. Some Nepal
More informationA FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME
A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME Lecturer Adrian Cristian MOISE, PhD. Spiru Haret University of Bucharest (ROMANIA) adriancristian.moise.@gmail.com. Abstract The Council
More informationAnti-Cyber Crime Law (8 Rabi / 26 March 2007)
Anti-Cyber Crime Law (8 Rabi 11428 / 26 March 2007) August 1, 2010 Kingdom of Saudi Arabia Bureau of Experts at the Council of Ministers Official Translation Department Translation of Saudi Laws Anti-Cyber
More informationMortgage Bankers Association-American Land Title Association Model Legislation for Remote Online Notarization Section-by-Section
Mortgage Bankers Association-American Land Title Association Model Legislation for Remote Online Notarization Section-by-Section Section 1: Definitions Appear or Personally Appear or In the presence of
More informationSection 66-A Punishment for sending offensive messages through communication service, etc.
Section 66-A Punishment for sending offensive messages through communication service, etc. Any person who sends, by means of a computer resource or a communication device,- a) any information that is grossly
More informationIT Act 2000 vs Implementation, Challenges, and the Role of Adjudicating Officers By
IT Act 2000 vs 2008- Implementation, Challenges, and the Role of Adjudicating Officers By Karnika Seth* Abstract In the year 2000, India enacted its first law on Information Technology namely, the Information
More informationLEGAL TERMS OF USE. Ownership of Terms of Use
LEGAL TERMS OF USE Ownership of Terms of Use These Terms and Conditions of Use (the Terms of Use ) apply to the Compas web site located at www.compasstone.com, and all associated sites linked to www.compasstone.com
More informationTerms of Use Terminated-Vested Cashout Website
Terms of Use Terminated-Vested Cashout Website This Terms of Use page provides important information regarding the scope, duration and terms of any service you may obtain from this website ( Service ),
More informationTHE PERSONAL DATA (PROTECTION) BILL, 2013
THE PERSONAL DATA (PROTECTION) BILL, 2013 [Long Title] [Preamble] CHAPTER I PRELIMINARY 1. Short title, extent and commencement. (1) This Act may be called the Personal Data (Protection) Act, 2013. (2)
More informationRoad Transport (Driver Licensing) Act 1998 No 99
New South Wales Road Transport (Driver Licensing) Act 1998 No 99 Contents Page Part 1 Preliminary 1 Name of Act 2 2 Commencement 2 3 Objects of Act 2 4 Definitions 3 5 Application of Commonwealth Acts
More informationEthical Hacking. Countermeasures Version 6. Hacking Laws
Ethical Hacking and Countermeasures Version 6 Module II Hacking Laws Module Objective This module will familiarize you with: SPY ACT U.S. Federal Laws United Kingdom s Cyber Laws European Laws Japan s
More informationAvon Eve Duet Campaign
Avon Eve Duet Campaign Terms and Conditions Please read these Terms and Conditions carefully before you take part in this Campaign. By participating, you are deemed to have accepted these Terms and Conditions
More information#MyIncredibleIndiaContest. Terms & Conditions
#MyIncredibleIndiaContest Terms & Conditions I. Contest Description Ministry of Tourism s #MyIncredibleIndiaContest (the Contest ) begins on April 2, 2018 at 09:00 hours, Indian Standard Time ( IST ) and
More informationInitial analysis of Government s Proposed Amendments to PECA: March 2015
General Comments: - - Definitions have been simplified, easier to read Major modifications and omissions in Chapter 1, 4 and 5 subverting due process, taking out safeguards that were built in 2. DEFINITIONS
More informationREPUBLIC OF SINGAPORE ACTS SUPPLEMENT. Published by Authority
1 of 15 27/04/2015 1:41 PM Protection from Harassment Act 2014 (No. 17 of 2014) Long Title Enacting Formula Part I PRELIMINARY 1 Short title and commencement 2 Interpretation Part II OFFENCES 3 Intentionally
More informationChapter 6. Disparagement of Property 8/3/2017. Business Torts and Online Crimes and Torts. Slander of Title Slander of Quality (Trade Libel) Defenses
Chapter 6 Business Torts and Online Crimes and Torts Disparagement of Property Slander of Title Slander of Quality (Trade Libel) Defenses Disparagement of Property Disparagement of property occurs when
More informationUOB BUSINESS APPLICATION TERMS AND CONDITIONS
UOB BUSINESS APPLICATION TERMS AND CONDITIONS Access to and the use of this Application are granted by United Overseas Bank Limited (hereinafter known as "UOB") subject to the following conditions. By
More informationNATIONAL FFA ORGANIZATION 2016 CHAPTER T-SHIRT DESIGN CONTEST OFFICIAL RULES
NATIONAL FFA ORGANIZATION 2016 CHAPTER T-SHIRT DESIGN CONTEST OFFICIAL RULES NO PURCHASE IS NECESSARY TO ENTER OR WIN A PRIZE. National FFA Organization ("FFA") is offering local chapters of chartered
More informationTHE NEGOTIABLE INSTRUMENTS (AMENDMENT AND MISCELLANEOUS PROVISIONS) BILL, 2002
THE NEGOTIABLE INSTRUMENTS (AMENDMENT AND MISCELLANEOUS PROVISIONS) BILL, 2002 A BILL further to amend the Negotiable Instruments Act, 1881, the Bankers' Books Evidence Act, 1891 and the Information Technology
More information1 PROPOSED DRAFT BILL
1 THE NATIONAL IDENTIFICATION AUTHORITY OF INDIA BILL, 2010 A Bill to provide for the establishment of the National Identification Authority of India for the purpose of issuing identification numbers to
More informationTHE CRIMINAL LAW (AMENDMENT) BILL, 2010 BILL
DRAFT 31.3.2010 THE CRIMINAL LAW (AMENDMENT) BILL, 2010 A BILL Further to amend the Indian Penal Code, the Code of Criminal Procedure, 1973 and the Indian Evidence Act, 1872. BE it enacted by Parliament
More informationThe Business Network: Terms of Use
The Business Network: Terms of Use Please read these online terms and conditions (the Agreement ) carefully. By accessing, using or downloading materials from this Web Site, you agree to be bound by these
More informationTHE TAMIL NADU GROUNDWATER (DEVELOPMENT AND MANAGEMENT) ACT, 2003
THE TAMIL NADU GROUNDWATER (DEVELOPMENT AND MANAGEMENT) ACT, 2003 (Tamil Nadu Act 3 of 2003) This document is available at www.ielrc.org/content/e0302.pdf An Act to protect groundwater resources to provide
More informationLIMITED CIRCULATION DRAFT FOR NATIONAL ASSEMBLY STANDING COMMITTEE. PEC Bill as on
PEC Bill as on 17.09.2015 A Bill to make provisions for prevention of electronic crimes and matters related thereto. CHAPTER I PRELIMINARY 1. Short title, extent, application and commencement.- (1) This
More informationCalifornia Criminal Law Review Volume 4, June 2001
California Criminal Law Review Volume 4, June 2001 Is There Such a Thing as "Virtual Crime"? Susan W. Brenner [1] I. Virtual [2] Crime: The Issues Cite as 4 Cal. Crim. Law Rev. 1 Pincite using paragraph
More informationAppendix H Title 18 Crimes and Criminal Procedure, U. S. Code
Title 18 Crimes and Criminal Procedure, U. S. Code Part I Crimes Chapter 113 Stolen Property * * * * * * * 2318 Trafficking in counterfeit labels, illicit labels, or counterfeit documentation or packaging1
More informationELECTION OFFENCES ACT
LAWS OF KENYA ELECTION OFFENCES ACT NO. 37 OF 2016 Revised Edition 2017 Published by the National Council for Law Reporting with the Authority of the Attorney-General www.kenyalaw.org [Rev. 2017] No.
More informationLegal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017
Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017 No. 15 of 2017 Second Session Eleventh Parliament Republic of Trinidad and Tobago HOUSE OF REPRESENTATIVES BILL
More informationDEPOSITORIES ACT, 1996 [As amended by the Securities Laws(Amendment) Act, 2014]
DEPOSITORIES ACT, 1996 [As amended by the Securities Laws(Amendment) Act, 2014] SECTIONS CHAPTER I PRELIMINARY 1. Short title, extent and commencement 2. Definitions CHAPTER II CERTIFICATE OF COMMENCEMENT
More informationQUALITY CONTROL AND PREVENTION OF FOOD ADULTERATION ACT: CRITICAL APPROACH
QUALITY CONTROL AND PREVENTION OF FOOD ADULTERATION ACT: CRITICAL APPROACH AUTHOR LIDVIN FRANCIS. C BBA.LLB (HONS) V.R.KRISHNAN EZHUTHACHAN LAW COLLEGE UNDER THE GUIDENCE OF ASST.PROF.VIJAYALAKSHMI V.R.KRISHNAN
More informationBYTELINE STUDIO TERMS AND CONDITIONS TEMPLATE
Document Title: BYTELINE STUDIO TERMS AND CONDITIONS TEMPLATE Document Subject: This document is used to outline the terms and conditions that are accepted by the user of www.bytelinestudio.com, owned
More informationACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC.
페이지 1 / 34 ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC. Article 1 (Purpose) The purpose of this Act is to contribute to the improvement of citizens
More informationWebsite Standard Terms and Conditions of Use
Website Standard Terms and Conditions of Use 1. Acceptance of Terms of Use 2. Modification of Terms 3. Privacy Policy 4. Disclaimers 5. Registration 6. Contributor 7. Limitation of Liability 8. Third Party
More informationDigital Signature and DIN
Digital Signature and DIN 1. Requirement as to Digital Signature Certificate and Director Identification Number (DIN) The most primary thing required to incorporate any company is to obtain a valid Digital
More informationin relation to the credit worthiness, business or financial situation of any person; or in respect of any content, service, product, material or
Terms of Use Access to this website is granted by Validus Capital Pte. Ltd. ( Validus, we, our or us ) subject to these Terms of Use and our Privacy Policy. Please read these Terms of Use carefully. By
More information(2) It shall come into force at once.
1 THE CRIMINAL LAW (AMENDMENT) ORDINANCE, 2013 Promulgated by the President in the Sixty-fourth Year of the Republic of India. An Ordinance further to amend the Indian Penal Code, the Code of Criminal
More informationLEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN TASMANIA
LEGAL GUIDE TO APPREHENDED DOMESTIC VIOLENCE ORDERS LEGAL GUIDES TASMANIA : Women s technology safety, legal resources, research & training LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN TASMANIA Introduction
More informationTERMS AND CONDITIONS
TERMS AND CONDITIONS The following are the Terms and Conditions for entrance and participation in the Virtual Reality/Augmented Reality Innovation Lab (the " Lab") sponsored by Stanford University School
More informationList of Laws Protecting Women & Children in India - GK Notes in PDF for SSC, Bank & Railway Exams
List of Laws Protecting Women & Children in India - GK Notes in PDF for SSC, Bank & Railway Exams Knowing the basic government laws and rules can help you score good marks in your general awareness section.
More informationPriori Legal Interview Contest Official Rules
Priori Legal Interview Contest Official Rules 1. GENERAL: No purchase necessary. MAKING A PURCHASE WILL NOT INCREASE YOUR CHANCES OF WINNING. Void where prohibited or restricted by law. This Contest is
More informationNumber 22 of 1998 CHILD TRAFFICKING AND PORNOGRAPHY ACT 1998 REVISED. Updated to 30 June 2017
Number 22 of 1998 CHILD TRAFFICKING AND PORNOGRAPHY ACT 1998 REVISED Updated to 30 June 2017 This Revised Act is an administrative consolidation of the. It is prepared by the Law Reform Commission in accordance
More informationH 7502 SUBSTITUTE A ======== LC004302/SUB A ======== S T A T E O F R H O D E I S L A N D
01 -- H 0 SUBSTITUTE A ======== LC000/SUB A ======== S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 01 A N A C T RELATING TO STATE AFFAIRS AND GOVERNMENT -- NOTARIES PUBLIC
More informationDATA PROTECTION LAWS OF THE WORLD. Egypt
DATA PROTECTION LAWS OF THE WORLD Egypt Downloaded: 21 July 2018 EGYPT Last modified 26 January 2017 LAW Egypt does not have a law which regulates protection of personal data. However, there are some piecemeal
More informationKRISHAN COMMERCE
KRISHAN COMMERCE LASSES 8 YEARS OF EXCELLENCE M.N 9888745849 The Code of Criminal Procedure, 1973 The Code of Criminal Procedure creates the necessary machinery forapprehending the criminals, investigating
More informationArticle. Fraud Reporting - Time To Act Now! Arundhuthi Bose Corporate Law Services Group
Article Fraud Reporting - Time To Act Now! Arundhuthi Bose Corporate Law Services Group arundhuthi@vinodkothari.com corplaw@vinodkothari.com 17 nd February, 2016 Check at: http://india-financing.com/staff-publications.html
More informationMendocino Community Network Services Contract
Mendocino Community Network Services Contract This agreement (this Agreement ) by and between the individual or entity listed below in the signature block ( Subscriber ) and the Mendocino Community Network
More informationBurma Extradition Act, 1904
Burma Extradition Act, 1904 CHAPTER I - PRELIMINARY. 1. [Omitted.] 2. Definitions In this Act, unless there is anything repugnant in the subject or context: (a) "extradition offence" means any such offence
More informationREVISOR PMM/NB A
1.1 Senator... moves to amend S.F. No. 893 as follows: 1.2 Delete everything after the enacting clause and insert: 1.3 "ARTICLE 1 1.4 REVISED UNIFORM LAW ON NOTARIAL ACTS 1.5 Section 1. [358.51] SHORT
More informationPakistan Anti-Terrorism (Amendment) Ordinance, 1999 Whereas it is expedient to amend the Anti-terrorism Act, (XXVII of 1997), for the purposes
Pakistan Anti-Terrorism (Amendment) Ordinance, 1999 Whereas it is expedient to amend the Anti-terrorism Act, (XXVII of 1997), for the purposes hereinafter appearing; And whereas the National Assembly is
More informationProject on Cybercrime
Project on Cybercrime www.coe.int/cybercrime Version January 2010 Cybercrime legislation country profile MALAYSIA This profile has been prepared within the framework of the Council of Europe s capacity
More informationElectronic Transactions Act, Act, Act 772 ARRANGEMENT OF SECTIONS. Object and scope of the Act
Electronic Transactions Act, Act, 2008 2008 Act 772 Section 1. Object of the Act 2. Application 3. Scope of Act 4. Exclusion ARRANGEMENT OF SECTIONS Object and scope of the Act Electronic transactions
More informationModel Law on Electronic Evidence
Model Law on Electronic Evidence Office of Civil and Criminal Justice Reform Model Law on Electronic Evidence Commonwealth Secretariat 2017 All rights reserved. This publication may be reproduced, stored
More informationThis Act may be cited as the Mutual Assistance in Criminal and Related Matters Act 2003.
MUTUAL ASSISTANCE IN CRIMINAL AND RELATED MATTERS ACT 2003 Act 35 of 2003 15 November 2003 P 29/03; Amended 34/04 (P 40/04); 35/04 (P 39/04); 14/05 ARRANGEMENT OF SECTIONS PART I - PRELIMINARY 1. Short
More informationTERMS OF USE. 1. Background
TERMS OF USE 1. Background 1.1. www.loconav.com ( Website ) and the LocoNav Application ( App ) is owned, registered and operated by BT Techlabs Private Limited ("Company"), a company incorporated under
More informationJames Phelps Australian Heist Competition
Terms and Conditions James Phelps Australian Heist Competition General 1. The Promoter is Nationwide News Pty Ltd (ABN 98 008 438 828) of 2 Holt Street, Surry Hills, NSW 2010. Telephone number 02 9288
More informationOFFICIAL RULES. of the 2017 COBB EMC T-SHIRT CONTEST
OFFICIAL RULES of the 2017 COBB EMC T-SHIRT CONTEST NO PURCHASE NECESSARY. YOU MUST BE AT LEAST 18 YEARS OF AGE OR OLDER AND A LEGAL RESIDENT OF THE UNITED STATES TO PARTICIPATE. (If you are under 18,
More informationCRIMINAL LAW AMENDMENT ACT
WESTERN AUSTRALIA CRIMINAL LAW AMENDMENT ACT No. 101 of 1990 AN ACT to amend The Criminal Code, the Bush Fires Act 1954, the Coroners Act 1920, the Justices Act 1902 and the Child Welfare Act 1947. [Assented
More information#IMTPETS HASHTAG MONTHLY CONTEST OFFICIAL RULES
#IMTPETS HASHTAG MONTHLY CONTEST OFFICIAL RULES CONTEST ENTRY PERIOD: The #imtpets Hashtag Contest ( The Contest ) continues on a monthly basis until otherwise notified by IMT Residential (hereinafter
More informationThe Tamil Nadu Presevation of Private Forest Act, 1949
The Tamil Nadu Presevation of Private Forest Act, 1949 This document is available at ielrc.org/content/e4901.pdf For further information, visit www.ielrc.org Note: This document is put online by the International
More informationEOH 000 ICT TAC 01 Website Terms and Conditions of Use
1. Introduction 1.1. This web site www.eoh.co.za (the Site") is owned and operated by EOH Holdings (Pty) Ltd, a company registered in South Africa with company registration number 1998/014669/06, and its,
More informationCYBERCRIMES AND CYBERSECURITY BILL
REPUBLIC OF SOUTH AFRICA CYBERCRIMES AND CYBERSECURITY BILL (As introduced in the National Assembly (proposed section 75); explanatory summary of Bill published in Government Gazette No. 40487 of 9 December
More informationBusiness Law Chapter 9 Handout
Major Differences: 2 Felonies Serious crimes, punishable by Death or prison for more than one (1) year. Misdemeanors Non-serious (petty) crimes punishable by jail for less than one(1) year and/or by fines.
More informationJ U D G M E N T. impugned order dated , passed by the High Court. of Judicature at Madras, Madurai Bench in Criminal Revision
Reportable IN THE SUPREME COURT OF INDIA CRIMINAL APPELLATE JURISDICTION CRIMINAL APPEAL NOS. 359-360 OF 2010 SHEILA SEBASTIAN VERSUS APPELLANT(S) R. JAWAHARAJ & ANR. ETC. RESPONDENT(S) J U D G M E N T
More informationLEGAL KNOWLEDGE. Administrative Law How the (administration) government will perform it's functions Administrative Law - Droid Administrative (France)
LEGAL KNOWLEDGE International Law Term coined by - Jeremy Bentham (18 th Century) Relations b/w States a.k.a Law of Nations Prize Law Regulates practices of capture of ships and cargo in wartime Established
More informationA short notes on crime
A short notes on crime Denasar Boro LLB. Final Semester, ULCGU Crime is an act or omission which is prohibited or forbidden by law which affects the society or public at large and it always committed against
More informationOBJECTS AND REASONS
2014-09-25 OBJECTS AND REASONS This Bill makes provision for the strengthening and improvement of the corporate regulatory framework in Barbados by amending the enactments set out in the Schedule. 2 Arrangement
More informationVIRGIN ISLANDS BVI BUSINESS COMPANIES (AMENDMENT) ACT, 2015 ARRANGEMENT OF SECTIONS
No. of 2015 VIRGIN ISLANDS BVI BUSINESS COMPANIES (AMENDMENT) ACT, 2015 ARRANGEMENT OF SECTIONS Section 1... Short title and commencement 2... Section 2 amended. 3... Section 38 amended. 4... Section 41
More informationKENYA GAZETTE SUPPLEMENT
SPECIAL ISSUE Kciivci Gazette Supplement No. 91 (National A.scenthIv BilLs No. 29) $ REPUBLIC OF KENYA KENYA GAZETTE SUPPLEMENT NATIONAL ASSEMBLY BILLS, 2017 NAIROBI, 13th June, 2017 CONTENT Hill for Introduction
More informationRwanda: Proposed media law fails to safeguard free press
STATEMENT Rwanda: Proposed media law fails to safeguard free press ARTICLE 19 05 Jan 2012 A revised media law promised by the Rwandan government prior to and during its Universal Periodic Review at the
More informationImported Food Control Act 1992
Imported Food Control Act 1992 No. 221, 1992 Compilation No. 22 Compilation date: 21 October 2016 Includes amendments up to: Act No. 61, 2016 Registered: 7 November 2016 Prepared by the Office of Parliamentary
More informationTERMS & CONDITIONS 1. DEFINITIONS 2. AGREEMENT 3. PLACING AN ORDER 4. PRICING AND PAYMENT
TERMS & CONDITIONS Please read these terms and conditions ("Agreement") carefully: they govern your use of the website www.sunfire-music.com, and/or collaborating partners and associated webshops ( Website
More informationSecurity Video Surveillance Policy
Security Video Surveillance Policy Policy Statement The Municipality of Central Elgin (the Municipality) recognizes the need to balance an individual s right to privacy and the need to ensure the safety
More information