@ On computers and other networks by the cyber criminals using authorized or unauthorized entry

Size: px
Start display at page:

Download "@ On computers and other networks by the cyber criminals using authorized or unauthorized entry"

Transcription

1 UNDERSTANDING CYBER CRIMES Introduction The advent of internet and the revolution of cyber space in communication, commerce and information is hailed as a paradigm shift in use of technology and its percolation to the masses. Along with its positive aspect of growth and development, the flip side is that of the phenomenon called cyber crimes. The impact of cyber crimes and the legal response is still a matter of debate and defies consensus and unified approach. Nevertheless the potential damage and the actual damage it has done warrants a speedy response from the legal system. Unlike the crime in a physical scenario and its containment, cyber crimes are technological in its essence, anonymous in its operation and untraceable in its getaway. The legal debate surrounding cyber crimes is two fold. The first challenge is to define what constitutes cyber crimes as opposed to physical crimes and the second challenge is that of the application of traditional criminal law and criminal justice administration on the cyber crimes. In the first debate on what constitutes cyber crimes there is some consensus. Legal analysts have a consensus that cyber crimes are those crimes perpetuated using computers and computer networks through the medium of internet to perpetuate various cyber crimes. Such crimes are On computers and other networks by the cyber criminals using authorized or unauthorized Such cyber crimes can be of various acts ranging from stalking to cyber Like physical crimes there are individuals or groups of persons behind such acts of cyber crimes. It is on the second aspect of analysis, whether cyber crimes need a different interpretation of the criminal law concepts, there are divergent views. Whether there should be a separate cyber crime laws or whether traditional criminal law is enough? How to assess and compute the damages in cyber crimes using the traditional analysis of criminal law used in the concept of physical crime and related issues. Additionally the nature of cyber crimes by virtue of the internet is a crime which poses challenge to international conduct and hence the need for an international dimension of cyber crimes which is considered as the international warfare of Information technology. On the regulation of the cyber crimes again there is a wide debate on how far one can regulate and what type of regulations should be in place. There could be consensus on the regulation of cyber crimes such as hacking, fraud, obscenity and related crimes, where as the human right activists, votaries of privacy and other activists accuse violations of the authority on the name of security and cyber crime where their civil rights are curbed, activities monitored and privacy intruded. The module will analyze the issues of what constitutes cyber crimes, the various types of cyber crimes, and the legislation in India on cyber crimes, the issues of civil rights and its protection on tackling cyber crimes. Defining Crime To understand cyber crimes and its ramifications in terms of the damage, the challenge to prosecution, the loopholes of the existing criminal justice system, the powers of regulation and its boundaries, it is essential to have look at the concept of crime itself.

2 The concept of Crime is treated differently in different societies and also undergoes drastic change during different time periods in the history of a society. Dowry was considered as a social status at a particular period, which today is a crime. Untouchability was an accepted social norm of a particular period in society in tune with caste hierarchy and today it is a crime under the constitution. Thus very many acts are crime today, which are not once, and some acts like homosexuality or lesbianism, which is a crime today, could change tomorrow. In essence the concept of crime is static in some aspects such as stealing, fraud, causing injury, murder etc and changing in certain aspects of social norms and relationship. Similarly crime in a society is not a crime in another society. What could be considered as obscenity in India could be viewed differently in Sweden. What could be contempt of court publication in India could be viewed differently in United States. Another aspect is that the liability or punishment for a crime could vary in different societies based on the Law reflecting values attached in such societies to certain acts. Capital punishment has been done away in many European countries and not so in India or in some states in US. The quantum of punishment for theft or vandalism could be lenient in some legal systems and could be extreme in Saudi Arabia. In essence the definition of crime is varied in different in legal systems. The punishment could vary in different legal systems. In the current context, the countries following the western jurisprudence and common law systems have a well-evolved criminal law and criminal justice administration to tackle the physical world of crimes. Such systems look at crime from the four elements of a) Mens Rea- the mental state of the person accused of a criminal act b) Actus Reus- committing an act or failing to do so when it is warranted resulting in a criminal act c) the attendant circumstances or conditions which define a criminal act and d) the result of an act considered as prohibited by the Law. A Criminal Act in the physical world is dealt on the above fundamentals. To illustrate - is that there is an altercation between A and B resulting in an injury to B to which, he succumbs and dies. In this case A had hit B who is an alcoholic with a liver damage, which resulted in the death of him. If A is aware of the fact of the liver damage of B and still punched him, one can infer that there is a Mens Rea on the part of A and also acted in a manner, which resulted in the injury and an Act prohibited by Law. If A is not aware of liver injury of B then there is no Mens Rea on the part of A but still will be liable on the count of Actus rea and other aspects for prosecution. Thus the penal provisions will act upon the application of the above basic elements in any crime in the physical world. The basics of such is in the first place, any legal system should first define certain acts as criminal which is harmful to the society and there upon the actions that are considered as crime will be subject to the scrutiny of the above elements of intention, conduct, circumstance and prohibited act to evoke the required penal provisions. The fundamental principle is that a conviction is possible only if there is a concrete proof beyond reasonable doubt that the act of a person is prohibited by the criminal law and such an act is also committed with an intention of causing the same. CRIME IN CONTEXT OF INTERNET The cyber world is defined as a virtual world which is different from that of the physical world. The cyber world though a virtual world is a reality which interconnects people, organizations, Governments. It transacts information at the basic level but also conducts the business of governments and private enterprises in a manner where no other technology could dream of. The cyber space is also a space where various types of crimes are perpetuated and the magnitude of such crimes could be unimaginable due its speed, anonymity and destruction has been amply recorded. The moot point is whether the same principles of criminal law can be applied to the cyber world crimes as applied to the world of physical crimes. The answer is divided.

3 One school of thought advocate that it is possible to interpret the crimes perpetuated in the cyber world to that of the physical world and hence could apply the same principles to regulate them. To substantiate the following arguments are held forth: 1. Cyber Crimes are nothing but crimes of the physical world perpetuated in the world of computers and hence there is no difference in defining a crime in the cyber world and the physical world 2. As in the physical world the cyber world crimes are perpetuated by individuals or groups, where the medium is the only difference. 3. As the traditional principles of criminal law has tackled various technologies used in the past it is capable of analyzing and interpreting the new technology as well. 4. The cyber crimes in fact are lesser in scope than the physical crime like fraud, intrusion of privacy, data theft, damage to computers, cheating consumers etc where as physical injury or other crimes like rape, grievous hurt or bigamy cannot be perpetuated through the cyber crimes. 5. The technological advancement of the information technology itself is a deterrent and a tool in tracking and convicting the crimes. On the other hand there are advocates who say that cyber crimes cannot be tackled with the conventional principles of cyber crimes and thus need special laws to regulate them and they put forth the following arguments: 1. Cyber Crime is a crime which has a potential and uncontrollable damage which needs stricter regulations. A virus introduced can damage millions of computers before even finding the perpetuator. 2. The cyber crime is perpetuated by anonymous person who has to be skilled in opening the password and security systems and can vanish without a trace. 3. The cyber crimes are transnational in nature, which involves complex prosecution procedures to bring the culprits to the book. 4. The Cyber crime of obscenity and pornography has a potential moral depravity on generations which could push them into the physical world of crimes 5. The National Security and security in terms of safety like Airports, Railway systems are more vulnerable and could create chaos and economic loss by cyber crimes and hence special laws to apprehend, prosecute with stiffer penalties are needed in context of cyber crimes 6. The technology is a fast changing one and hence needs a different type of enforcement system to tackle the cyber crimes unlike the physical crimes. With the debate on the above lines continuing one thing is clear that cyber crimes has the potential to damage the economic aspects of a society and a nation due to technology where speed, ease of operation, defying boundaries are strengths and weaknesses at the same time. The legislations around the world are veering around to the view that cyber crimes warrant

4 stricter penalties due to its quantum of damage. There are also attempts to address the technology related issues by setting up of cyber tribunals. In Indian context, the IT Act of 2000 tries to address the question of cyber crimes by defining what is a damage in the context of the computers and the relevant penalties as follows: PENALTIES AND ADJUDICATION : S 43. Penalty for damage to computer, computer system, etc. If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network, - (a) accesses or secures access to such computer, computer system or computer network; (b) downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium; (c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; (d) damages or causes to be damaged any computer, computer system or computer network, data, computer database or any other programmes residing in such computer, computer system or computer network; (e) disrupts or causes disruption of any computer, computer system or computer network; (f) denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means; (g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made hereunder; (h) charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network, he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected. Explanation.- For the purposes of this section,- (i) "computer contaminant" means any set of computer instructions that are designed- (a) to modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or (b) by any means to usurp the normal operation of the computer, computer system, or computer network; (ii) "computer data base" means a representation of information, knowledge, facts, concepts or instructions in text, image, audio, video that are being prepared or have been prepared in a

5 formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network; (iii) "computer virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource; (iv) "damage" means to destroy, alter, delete, add, modify or rearrange any computer resource by any means. In this context the crimes which may not have found a definition under the Indian Penal Code has been amply clarified in the IT Act and there are other crimes which are committed hitherto in the physical world which if done through the medium of internet using computers will be brought as Cyber crimes and can be punished under the IPC. To this effect the term electronic record has been introduced in the IPC at relevant places : 1. After section 29, the following section shall be inserted, namely:- Electronic record. "29A. The words "electronic record" shall have the meaning assigned to them in clause (t) of sub- section (1) of section 2 of the Information Technology Act, 2000.". 2. In section 167, for the words "such public servant, charged with the preparation or translation of any document, frames or translates that document", the words "such public servant, charged with the preparation or translation of any document or electronic record, frames, prepares or translates that document or electronic record" shall be substituted. 3. In section 172, for the words "produce a document in a Court of Justice", the words "produce a document or an electronic record in a Court of Justice" shall be substituted. 4. In section 173, for the words "to produce a document in a Court of Justice", the words "to produce a document or electronic record in a Court of Justice" shall be substituted. 5. In section 175, for the word "document" at both the places where it occurs, the words "document or electronic record" shall be substituted. 6. In section 192, for the words "makes any false entry in any book or record, or makes any document containing a false statement", the words "makes any false entry in any book or record, or electronic record or makes any document or electronic record containing a false statement" shall be substituted. 7. In section 204, for the word "document" at both the places where it occurs, the words "document or electronic record" shall be substituted. 8. In section 463, for the words "Whoever makes any false documents or part of a document with intent to cause damage or injury", the words "Whoever makes any false documents or false electronic record or part of a document or electronic record, with intent to cause damage or injury" shall be substituted. 9. In section 464,-

6 (a) for the portion beginning with the words "A person is said to make a false document" and ending with the words "by reason of deception practiced upon him, he does not know the contents of the document or the nature of the alteration", the following shall be substituted, namely:- "A person is said to make a false document or false electronic record- First-Who dishonestly or fraudulently- (a) makes, signs, seals or executes a document or part of a document; (b) makes or transmits any electronic record or part of any electronic record; (c) affixes any digital signature on any electronic record; (d) makes any mark denoting the execution of a document or the authenticity of the digital signature, with the intention of causing it to be believed that such document or part of document, electronic record or digital signature was made, signed, sealed, executed, transmitted or affixed by or by the authority of a person by whom or by whose authority he knows that it was not made, signed, sealed, executed or affixed; or Secondly- Who, without lawful authority, dishonestly or fraudulently, by cancellation or otherwise, alters a document or an electronic record in any material part thereof, after it has been made, executed or affixed with digital signature either by himself or by any other person, whether such person be living or dead at the time of such alteration; or Thirdly- Who dishonestly or fraudulently causes any person to sign, seal, execute or alter a document or an electronic record or to affix his digital signature on any electronic record knowing that such person by reason of unsoundness of mind or intoxication cannot, or that by reason of deception practiced upon him, he does not know the contents of the document or electronic record or the nature of the alteration. " ; (b) after Explanation 2, the following Explanation shall be inserted at the end, namely:- 'Explanation 3.- For the purposes of this section, the expression "affixing digital signature" shall have the meaning assigned to it in clause (d) of subsection (1) of section 2 of the Information Technology Act, 2000.'. 10. In section 466,- (a) for the words "Whoever forges a document", the words "Whoever forges a document or an electronic record" shall be substituted; (b) the following Explanation shall be inserted at the end, namely:- 'Explanation.-

7 For the purposes of this section, "register" includes any list, data or record of any entries maintained in the electronic form as defined in clause (r) of sub-section (1) of section 2 of the Information Technology Act, 2000.'. 11. In section 468, for the words "document forged", the words "document or electronic record forged" shall be substituted. 12. In section 469, for the words "intending that the document forged", the words "intending that the document or electronic record forged" shall be substituted. 13. In section 470, for the word "document" in both the places where it occurs, the words "document or electronic record" shall be substituted. 14. In section 471, for the word "document" wherever it occurs, the words "document or electronic record" shall be substituted. 15. In section 474, for the portion beginning with the words "Whoever has in his possession any document" and ending with the words "if the document is one of the description mentioned in section 466 of this Code", the following shall be substituted, namely: - "Whoever has in his possession any document or electronic record, knowing the same to be forged and intending that the same shall fraudulently or dishonestly be used as a genuine, shall, if the document or electronic record is one of the description mentioned in section 466 of this Code.". 16. In section 476, for the words "any document", the words "any document or electronic record" shall be substituted. 17. In section 477A, for the words "book, paper, writing" at both the places where they occur, the words "book, electronic record, paper, writing" shall be substituted. Though there is a debate whether the document in IPC prior to the amendment will include electronic document the current amendment makes such analysis redundant and does not leave scope for any other interpretation. One need to understand the types of cyber crimes in vogue to apply the existing IT Act or the IPC to regulate the same.

IT ACT Dr.V.C.Vivekanandan Dean & Professor of Law RGSOIPL IIT Kharagpur

IT ACT Dr.V.C.Vivekanandan Dean & Professor of Law RGSOIPL IIT Kharagpur IT ACT 2000 Dr.V.C.Vivekanandan Dean & Professor of Law RGSOIPL IIT Kharagpur vivekvc2001@yahoo.co.in Understanding the IT ACT 2000 Spin-offs Cyber Regulation Advisory Committee Cyber Regulations Appellate

More information

INFORMATION TECHNOLOGY (AMENDMENT) BILL. THE MINISTER OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (SHRI A. RAJA): Sir, I beg to move :

INFORMATION TECHNOLOGY (AMENDMENT) BILL. THE MINISTER OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (SHRI A. RAJA): Sir, I beg to move : INFORMATION TECHNOLOGY (AMENDMENT) BILL THE MINISTER OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (SHRI A. RAJA): Sir, I beg to move : That the Bill further to amend the Information Technology Act, 2000,

More information

Legislative Brief The Information Technology (Amendment) Bill, 2006

Legislative Brief The Information Technology (Amendment) Bill, 2006 Legislative Brief The Information Technology (Amendment) Bill, 2006 Highlights of the Bill The Bill was introduced in the Lok Sabha on 15 th December, 2006 and referred to the Standing Committee on Information

More information

Information Technology (Amendment) Act, 2008

Information Technology (Amendment) Act, 2008 CHAPTER 10 Information Technology (Amendment) Act, 2008 Basic Concepts 1. The Act: In May 2000, both the houses of the Indian Parliament passed the Information Technology Bill. The Bill received the assent

More information

Bar & Bench (

Bar & Bench ( 1 TO BE INTRODUCED IN LOK SABHA Bill No. 261 of 2018 THE AADHAAR AND OTHER LAWS (AMENDMENT) BILL, 2018 A BILL to amend the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services)

More information

Chapter 10 Information Technology (Amendment) Act, 2008

Chapter 10 Information Technology (Amendment) Act, 2008 Chapter 10 Information Technology (Amendment) Act, LEARNING OBJECTIVES : To know about IT Act 2000 (as Amended by Information Technology (Amendment) Act, ), and its objectives, to understand its scope

More information

Georgia Computer System Protection Act

Georgia Computer System Protection Act Georgia Computer System Protection Act Enacted by the 1991 Georgia General Assembly Effective 1 July 1991 INTRODUCTION The "Georgia Computer Systems Protection Act" is an act enacted by the 1991 Georgia

More information

THE INFORMATION TECHNOLOGY (AMENDMENT) BILL, 2008

THE INFORMATION TECHNOLOGY (AMENDMENT) BILL, 2008 T This Act is in force from OCT 27,2009 THE INFORMATION TECHNOLOGY (AMENDMENT) BILL, 2008 A BILL further to amend the Information Technology Act, 2000. BE it enacted by Parliament in the Fifty-ninth Year

More information

INFORMATION TECHNOLOGY ACT, 2000 (as amended by Information Technology Act, 2008)

INFORMATION TECHNOLOGY ACT, 2000 (as amended by Information Technology Act, 2008) INFORMATION TECHNOLOGY ACT, 2000 (as amended by Information Technology Act, 2008) 1 Page No I. PRELIMINARY II. DIGITAL SIGNATURE AND ELECTRONIC SIGNATURE III. ELECTRONIC GOVERNANCE IV. ATTRIBUTION, ACKNOWLEDGMENT

More information

This Bill contains 4 Parts and seeks to provide for the prevention and punishment of electronic crimes.

This Bill contains 4 Parts and seeks to provide for the prevention and punishment of electronic crimes. ELECTRONIC CRIMES BILL, 2013 EXPLANATORY NOTES This Bill contains 4 Parts and seeks to provide for the prevention and punishment of electronic crimes. PART I of the Bill, Clauses 1-4, deals with matters

More information

THE INDIAN PENAL CODE (AMENDMENT) BILL, 2016

THE INDIAN PENAL CODE (AMENDMENT) BILL, 2016 AS INTRODUCED IN LOK SABHA Bill No. 303 of 2016 45 of 1860. 5 THE INDIAN PENAL CODE (AMENDMENT) BILL, 2016 By SHRIMATI SUPRIYA SULE, M.P. A BILL further to amend the Indian Penal Code, 1860. BE it enacted

More information

THE PREVENTION OF MONEY-LAUNDERING (AMENDMENT) BILL, 2009

THE PREVENTION OF MONEY-LAUNDERING (AMENDMENT) BILL, 2009 Bill No. XXXI-F of 2008 THE PREVENTION OF MONEY-LAUNDERING (AMENDMENT) BILL, 2009 (AS PASSED BY THE HOUSES OF PARLIAMENT RAJYA SABHA ON 19TH FEBRUARY, 2009 LOK SABHA ON 24TH FEBRUARY, 2009) ASSENTED TO

More information

The Protection of Children from Sexual Offences Act, 2012 (POCSO, 2012)

The Protection of Children from Sexual Offences Act, 2012 (POCSO, 2012) The Protection of Children from Sexual Offences Act, 2012 (POCSO, 2012) Need for POCSO Act, 2012: Existing laws (IPC, IT Act, 2000 and JJ Act, 2000) not enough to address sexual offences No specific provisions

More information

THE INFORMATION TECHNOLOGY ACT, 2000 ARRANGEMENT OF SECTIONS

THE INFORMATION TECHNOLOGY ACT, 2000 ARRANGEMENT OF SECTIONS THE INFORMATION TECHNOLOGY ACT, 2000 ARRANGEMENT OF SECTIONS CHAPTER I PRELIMINARY SECTIONS 1. Short title, extent, commencement and application. 2. Definitions. 3. Authentication of electronic records.

More information

1. Delete the words and registration. 3. Delete the word person and substitute therefor the word individual.

1. Delete the words and registration. 3. Delete the word person and substitute therefor the word individual. SENATE AMENDMENTS TO THE NATIONAL IDENTIFICATION AND REGISTRATION BILL, 2017 Provision Long title Amendment 1. Delete the words and registration. 2. Delete the words verification and the authentication

More information

THE COMPETITION (AMENDMENT) BILL, 2007

THE COMPETITION (AMENDMENT) BILL, 2007 1 TO BE INTRODUCED IN LOK SABHA Bill No. 70 of 2007 12 of 2003. THE COMPETITION (AMENDMENT) BILL, 2007 A BILL to amend the Competition Act, 2002. BE it enacted by Parliament in the Fifty-eighth Year of

More information

Title 17-A: MAINE CRIMINAL CODE

Title 17-A: MAINE CRIMINAL CODE Title 17-A: MAINE CRIMINAL CODE Chapter 18: COMPUTER CRIMES Table of Contents Part 2. SUBSTANTIVE OFFENSES... Section 431. DEFINITIONS... 3 Section 432. CRIMINAL INVASION OF COMPUTER PRIVACY... 4 Section

More information

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA Lawful Access: Legal Review Follow-up Consultations: Criminal Code Draft Proposals February-March 2005 For discussion purposes Not for further

More information

Counter Charge 498a

Counter Charge 498a Counter Charge 498a Offence (legally) is the best form of defense. If you had waited for 11 years to get acquitted from 498a case which is so obviously false and blatantly misused, I am sure many of us

More information

CHAPTER I PRELIMINARY

CHAPTER I PRELIMINARY THE FUGITIVE ECONOMIC OFFENDERS BILL, 2017 A Bill to provide for measures to deter economic offenders from evading the process of Indian law by remaining outside the jurisdiction of Indian courts, thereby

More information

THE COMPETITION (AMENDMENT) BILL, 2007

THE COMPETITION (AMENDMENT) BILL, 2007 1 AS PASSED BY LOK SABHA ON 6.9.2007 Bill No. 70-C of 2007 12 of 2003. THE COMPETITION (AMENDMENT) BILL, 2007 A BILL to amend the Competition Act, 2002. BE it enacted by Parliament in the Fifty-eighth

More information

NC General Statutes - Chapter 14 Article 60 1

NC General Statutes - Chapter 14 Article 60 1 Article 60. Computer-Related Crime. 14-453. Definitions. As used in this Article, unless the context clearly requires otherwise, the following terms have the meanings specified: (1) "Access" means to instruct,

More information

THE FUGITIVE ECONOMIC OFFENDERS BILL, 2018

THE FUGITIVE ECONOMIC OFFENDERS BILL, 2018 AS PASSED BY LOK SABHA ON 19.07.18 Bill No. 79-C of 18 THE FUGITIVE ECONOMIC OFFENDERS BILL, 18 ARRANGEMENT OF CLAUSES CHAPTER I PRELIMINARY CLAUSES 1. Short title, extent and commencement. 2. Definitions.

More information

Introduction & Key Countries. UAE Egypt Saudi Arabia Jordan Morocco

Introduction & Key Countries. UAE Egypt Saudi Arabia Jordan Morocco Hatem Abdelghani Introduction & Key Countries UAE Egypt Saudi Arabia Jordan Morocco United Arab Emirates How does counterfeit come in UAE Enforcement Actions Applicable Laws Punishments Customs Recordation

More information

PLEASE READ THE TERMS OF USE, PRIVACY POLICY, AND PRIVACY PRACTICES FOUND ON THIS WEBSITE.

PLEASE READ THE TERMS OF USE, PRIVACY POLICY, AND PRIVACY PRACTICES FOUND ON THIS WEBSITE. TERMS OF USE Effective Date: May 23, 2018 Last Revised: May 23, 2018 PLEASE READ THE TERMS OF USE, PRIVACY POLICY, AND PRIVACY PRACTICES FOUND ON THIS WEBSITE. BY USING THE SERVICES, YOU AGREE TO THE TERMS

More information

1. Username and password: 2. Privacy: 3. Code of conduct: 4. Availability and Access: 5. Amendments:

1. Username and password: 2. Privacy: 3. Code of conduct: 4. Availability and Access: 5. Amendments: TERMS AND CONDITIONS 1. Username and password: You may be required to register as a user of the Site to be able to access certain areas of the Site. In such a case, you will need to provide a username

More information

THE MYANMAR EXTRADITION ACT.

THE MYANMAR EXTRADITION ACT. THE MYANMAR EXTRADITION ACT. CONTENTS. CHAPTER I. PRELIMINARY. Sections. 1. * * * * 2. Definitions. CHAPTER II. SURRENDER OF FUGITIVE CRIMINALS IN CASE OF FOREIGN STATES. 3. (1) Requisition for surrender.

More information

Bahrain s Draft Law on Computer Crimes

Bahrain s Draft Law on Computer Crimes Bahrain s Draft Law on Computer Crimes Dr. Jameel Al Alawi Economic Development Board Jameel.alalawi@bahrainedb.com Law is based on Cyber Crime Convention Based on Cyber-Crime Convention Advantages of

More information

Statistics Act, 2015 (1958)

Statistics Act, 2015 (1958) Statistics Act, 2015 (1958) Date of Authentication Publication in the Nepal Gazette 2015.8.10 (25 Nov. 1958) 2015.8.18 (3 Dec. 1958) Amendments 1. Stattistics (Amendment) Act, 2018 (1961) 2. Some Nepal

More information

A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME

A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME Lecturer Adrian Cristian MOISE, PhD. Spiru Haret University of Bucharest (ROMANIA) adriancristian.moise.@gmail.com. Abstract The Council

More information

Anti-Cyber Crime Law (8 Rabi / 26 March 2007)

Anti-Cyber Crime Law (8 Rabi / 26 March 2007) Anti-Cyber Crime Law (8 Rabi 11428 / 26 March 2007) August 1, 2010 Kingdom of Saudi Arabia Bureau of Experts at the Council of Ministers Official Translation Department Translation of Saudi Laws Anti-Cyber

More information

Mortgage Bankers Association-American Land Title Association Model Legislation for Remote Online Notarization Section-by-Section

Mortgage Bankers Association-American Land Title Association Model Legislation for Remote Online Notarization Section-by-Section Mortgage Bankers Association-American Land Title Association Model Legislation for Remote Online Notarization Section-by-Section Section 1: Definitions Appear or Personally Appear or In the presence of

More information

Section 66-A Punishment for sending offensive messages through communication service, etc.

Section 66-A Punishment for sending offensive messages through communication service, etc. Section 66-A Punishment for sending offensive messages through communication service, etc. Any person who sends, by means of a computer resource or a communication device,- a) any information that is grossly

More information

IT Act 2000 vs Implementation, Challenges, and the Role of Adjudicating Officers By

IT Act 2000 vs Implementation, Challenges, and the Role of Adjudicating Officers By IT Act 2000 vs 2008- Implementation, Challenges, and the Role of Adjudicating Officers By Karnika Seth* Abstract In the year 2000, India enacted its first law on Information Technology namely, the Information

More information

LEGAL TERMS OF USE. Ownership of Terms of Use

LEGAL TERMS OF USE. Ownership of Terms of Use LEGAL TERMS OF USE Ownership of Terms of Use These Terms and Conditions of Use (the Terms of Use ) apply to the Compas web site located at www.compasstone.com, and all associated sites linked to www.compasstone.com

More information

Terms of Use Terminated-Vested Cashout Website

Terms of Use Terminated-Vested Cashout Website Terms of Use Terminated-Vested Cashout Website This Terms of Use page provides important information regarding the scope, duration and terms of any service you may obtain from this website ( Service ),

More information

THE PERSONAL DATA (PROTECTION) BILL, 2013

THE PERSONAL DATA (PROTECTION) BILL, 2013 THE PERSONAL DATA (PROTECTION) BILL, 2013 [Long Title] [Preamble] CHAPTER I PRELIMINARY 1. Short title, extent and commencement. (1) This Act may be called the Personal Data (Protection) Act, 2013. (2)

More information

Road Transport (Driver Licensing) Act 1998 No 99

Road Transport (Driver Licensing) Act 1998 No 99 New South Wales Road Transport (Driver Licensing) Act 1998 No 99 Contents Page Part 1 Preliminary 1 Name of Act 2 2 Commencement 2 3 Objects of Act 2 4 Definitions 3 5 Application of Commonwealth Acts

More information

Ethical Hacking. Countermeasures Version 6. Hacking Laws

Ethical Hacking. Countermeasures Version 6. Hacking Laws Ethical Hacking and Countermeasures Version 6 Module II Hacking Laws Module Objective This module will familiarize you with: SPY ACT U.S. Federal Laws United Kingdom s Cyber Laws European Laws Japan s

More information

Avon Eve Duet Campaign

Avon Eve Duet Campaign Avon Eve Duet Campaign Terms and Conditions Please read these Terms and Conditions carefully before you take part in this Campaign. By participating, you are deemed to have accepted these Terms and Conditions

More information

#MyIncredibleIndiaContest. Terms & Conditions

#MyIncredibleIndiaContest. Terms & Conditions #MyIncredibleIndiaContest Terms & Conditions I. Contest Description Ministry of Tourism s #MyIncredibleIndiaContest (the Contest ) begins on April 2, 2018 at 09:00 hours, Indian Standard Time ( IST ) and

More information

Initial analysis of Government s Proposed Amendments to PECA: March 2015

Initial analysis of Government s Proposed Amendments to PECA: March 2015 General Comments: - - Definitions have been simplified, easier to read Major modifications and omissions in Chapter 1, 4 and 5 subverting due process, taking out safeguards that were built in 2. DEFINITIONS

More information

REPUBLIC OF SINGAPORE ACTS SUPPLEMENT. Published by Authority

REPUBLIC OF SINGAPORE ACTS SUPPLEMENT. Published by Authority 1 of 15 27/04/2015 1:41 PM Protection from Harassment Act 2014 (No. 17 of 2014) Long Title Enacting Formula Part I PRELIMINARY 1 Short title and commencement 2 Interpretation Part II OFFENCES 3 Intentionally

More information

Chapter 6. Disparagement of Property 8/3/2017. Business Torts and Online Crimes and Torts. Slander of Title Slander of Quality (Trade Libel) Defenses

Chapter 6. Disparagement of Property 8/3/2017. Business Torts and Online Crimes and Torts. Slander of Title Slander of Quality (Trade Libel) Defenses Chapter 6 Business Torts and Online Crimes and Torts Disparagement of Property Slander of Title Slander of Quality (Trade Libel) Defenses Disparagement of Property Disparagement of property occurs when

More information

UOB BUSINESS APPLICATION TERMS AND CONDITIONS

UOB BUSINESS APPLICATION TERMS AND CONDITIONS UOB BUSINESS APPLICATION TERMS AND CONDITIONS Access to and the use of this Application are granted by United Overseas Bank Limited (hereinafter known as "UOB") subject to the following conditions. By

More information

NATIONAL FFA ORGANIZATION 2016 CHAPTER T-SHIRT DESIGN CONTEST OFFICIAL RULES

NATIONAL FFA ORGANIZATION 2016 CHAPTER T-SHIRT DESIGN CONTEST OFFICIAL RULES NATIONAL FFA ORGANIZATION 2016 CHAPTER T-SHIRT DESIGN CONTEST OFFICIAL RULES NO PURCHASE IS NECESSARY TO ENTER OR WIN A PRIZE. National FFA Organization ("FFA") is offering local chapters of chartered

More information

THE NEGOTIABLE INSTRUMENTS (AMENDMENT AND MISCELLANEOUS PROVISIONS) BILL, 2002

THE NEGOTIABLE INSTRUMENTS (AMENDMENT AND MISCELLANEOUS PROVISIONS) BILL, 2002 THE NEGOTIABLE INSTRUMENTS (AMENDMENT AND MISCELLANEOUS PROVISIONS) BILL, 2002 A BILL further to amend the Negotiable Instruments Act, 1881, the Bankers' Books Evidence Act, 1891 and the Information Technology

More information

1 PROPOSED DRAFT BILL

1 PROPOSED DRAFT BILL 1 THE NATIONAL IDENTIFICATION AUTHORITY OF INDIA BILL, 2010 A Bill to provide for the establishment of the National Identification Authority of India for the purpose of issuing identification numbers to

More information

THE CRIMINAL LAW (AMENDMENT) BILL, 2010 BILL

THE CRIMINAL LAW (AMENDMENT) BILL, 2010 BILL DRAFT 31.3.2010 THE CRIMINAL LAW (AMENDMENT) BILL, 2010 A BILL Further to amend the Indian Penal Code, the Code of Criminal Procedure, 1973 and the Indian Evidence Act, 1872. BE it enacted by Parliament

More information

The Business Network: Terms of Use

The Business Network: Terms of Use The Business Network: Terms of Use Please read these online terms and conditions (the Agreement ) carefully. By accessing, using or downloading materials from this Web Site, you agree to be bound by these

More information

THE TAMIL NADU GROUNDWATER (DEVELOPMENT AND MANAGEMENT) ACT, 2003

THE TAMIL NADU GROUNDWATER (DEVELOPMENT AND MANAGEMENT) ACT, 2003 THE TAMIL NADU GROUNDWATER (DEVELOPMENT AND MANAGEMENT) ACT, 2003 (Tamil Nadu Act 3 of 2003) This document is available at www.ielrc.org/content/e0302.pdf An Act to protect groundwater resources to provide

More information

LIMITED CIRCULATION DRAFT FOR NATIONAL ASSEMBLY STANDING COMMITTEE. PEC Bill as on

LIMITED CIRCULATION DRAFT FOR NATIONAL ASSEMBLY STANDING COMMITTEE. PEC Bill as on PEC Bill as on 17.09.2015 A Bill to make provisions for prevention of electronic crimes and matters related thereto. CHAPTER I PRELIMINARY 1. Short title, extent, application and commencement.- (1) This

More information

California Criminal Law Review Volume 4, June 2001

California Criminal Law Review Volume 4, June 2001 California Criminal Law Review Volume 4, June 2001 Is There Such a Thing as "Virtual Crime"? Susan W. Brenner [1] I. Virtual [2] Crime: The Issues Cite as 4 Cal. Crim. Law Rev. 1 Pincite using paragraph

More information

Appendix H Title 18 Crimes and Criminal Procedure, U. S. Code

Appendix H Title 18 Crimes and Criminal Procedure, U. S. Code Title 18 Crimes and Criminal Procedure, U. S. Code Part I Crimes Chapter 113 Stolen Property * * * * * * * 2318 Trafficking in counterfeit labels, illicit labels, or counterfeit documentation or packaging1

More information

ELECTION OFFENCES ACT

ELECTION OFFENCES ACT LAWS OF KENYA ELECTION OFFENCES ACT NO. 37 OF 2016 Revised Edition 2017 Published by the National Council for Law Reporting with the Authority of the Attorney-General www.kenyalaw.org [Rev. 2017] No.

More information

Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017

Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017 Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017 No. 15 of 2017 Second Session Eleventh Parliament Republic of Trinidad and Tobago HOUSE OF REPRESENTATIVES BILL

More information

DEPOSITORIES ACT, 1996 [As amended by the Securities Laws(Amendment) Act, 2014]

DEPOSITORIES ACT, 1996 [As amended by the Securities Laws(Amendment) Act, 2014] DEPOSITORIES ACT, 1996 [As amended by the Securities Laws(Amendment) Act, 2014] SECTIONS CHAPTER I PRELIMINARY 1. Short title, extent and commencement 2. Definitions CHAPTER II CERTIFICATE OF COMMENCEMENT

More information

QUALITY CONTROL AND PREVENTION OF FOOD ADULTERATION ACT: CRITICAL APPROACH

QUALITY CONTROL AND PREVENTION OF FOOD ADULTERATION ACT: CRITICAL APPROACH QUALITY CONTROL AND PREVENTION OF FOOD ADULTERATION ACT: CRITICAL APPROACH AUTHOR LIDVIN FRANCIS. C BBA.LLB (HONS) V.R.KRISHNAN EZHUTHACHAN LAW COLLEGE UNDER THE GUIDENCE OF ASST.PROF.VIJAYALAKSHMI V.R.KRISHNAN

More information

BYTELINE STUDIO TERMS AND CONDITIONS TEMPLATE

BYTELINE STUDIO TERMS AND CONDITIONS TEMPLATE Document Title: BYTELINE STUDIO TERMS AND CONDITIONS TEMPLATE Document Subject: This document is used to outline the terms and conditions that are accepted by the user of www.bytelinestudio.com, owned

More information

ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC.

ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC. 페이지 1 / 34 ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC. Article 1 (Purpose) The purpose of this Act is to contribute to the improvement of citizens

More information

Website Standard Terms and Conditions of Use

Website Standard Terms and Conditions of Use Website Standard Terms and Conditions of Use 1. Acceptance of Terms of Use 2. Modification of Terms 3. Privacy Policy 4. Disclaimers 5. Registration 6. Contributor 7. Limitation of Liability 8. Third Party

More information

Digital Signature and DIN

Digital Signature and DIN Digital Signature and DIN 1. Requirement as to Digital Signature Certificate and Director Identification Number (DIN) The most primary thing required to incorporate any company is to obtain a valid Digital

More information

in relation to the credit worthiness, business or financial situation of any person; or in respect of any content, service, product, material or

in relation to the credit worthiness, business or financial situation of any person; or in respect of any content, service, product, material or Terms of Use Access to this website is granted by Validus Capital Pte. Ltd. ( Validus, we, our or us ) subject to these Terms of Use and our Privacy Policy. Please read these Terms of Use carefully. By

More information

(2) It shall come into force at once.

(2) It shall come into force at once. 1 THE CRIMINAL LAW (AMENDMENT) ORDINANCE, 2013 Promulgated by the President in the Sixty-fourth Year of the Republic of India. An Ordinance further to amend the Indian Penal Code, the Code of Criminal

More information

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN TASMANIA

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN TASMANIA LEGAL GUIDE TO APPREHENDED DOMESTIC VIOLENCE ORDERS LEGAL GUIDES TASMANIA : Women s technology safety, legal resources, research & training LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN TASMANIA Introduction

More information

TERMS AND CONDITIONS

TERMS AND CONDITIONS TERMS AND CONDITIONS The following are the Terms and Conditions for entrance and participation in the Virtual Reality/Augmented Reality Innovation Lab (the " Lab") sponsored by Stanford University School

More information

List of Laws Protecting Women & Children in India - GK Notes in PDF for SSC, Bank & Railway Exams

List of Laws Protecting Women & Children in India - GK Notes in PDF for SSC, Bank & Railway Exams List of Laws Protecting Women & Children in India - GK Notes in PDF for SSC, Bank & Railway Exams Knowing the basic government laws and rules can help you score good marks in your general awareness section.

More information

Priori Legal Interview Contest Official Rules

Priori Legal Interview Contest Official Rules Priori Legal Interview Contest Official Rules 1. GENERAL: No purchase necessary. MAKING A PURCHASE WILL NOT INCREASE YOUR CHANCES OF WINNING. Void where prohibited or restricted by law. This Contest is

More information

Number 22 of 1998 CHILD TRAFFICKING AND PORNOGRAPHY ACT 1998 REVISED. Updated to 30 June 2017

Number 22 of 1998 CHILD TRAFFICKING AND PORNOGRAPHY ACT 1998 REVISED. Updated to 30 June 2017 Number 22 of 1998 CHILD TRAFFICKING AND PORNOGRAPHY ACT 1998 REVISED Updated to 30 June 2017 This Revised Act is an administrative consolidation of the. It is prepared by the Law Reform Commission in accordance

More information

H 7502 SUBSTITUTE A ======== LC004302/SUB A ======== S T A T E O F R H O D E I S L A N D

H 7502 SUBSTITUTE A ======== LC004302/SUB A ======== S T A T E O F R H O D E I S L A N D 01 -- H 0 SUBSTITUTE A ======== LC000/SUB A ======== S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 01 A N A C T RELATING TO STATE AFFAIRS AND GOVERNMENT -- NOTARIES PUBLIC

More information

DATA PROTECTION LAWS OF THE WORLD. Egypt

DATA PROTECTION LAWS OF THE WORLD. Egypt DATA PROTECTION LAWS OF THE WORLD Egypt Downloaded: 21 July 2018 EGYPT Last modified 26 January 2017 LAW Egypt does not have a law which regulates protection of personal data. However, there are some piecemeal

More information

KRISHAN COMMERCE

KRISHAN COMMERCE KRISHAN COMMERCE LASSES 8 YEARS OF EXCELLENCE M.N 9888745849 The Code of Criminal Procedure, 1973 The Code of Criminal Procedure creates the necessary machinery forapprehending the criminals, investigating

More information

Article. Fraud Reporting - Time To Act Now! Arundhuthi Bose Corporate Law Services Group

Article. Fraud Reporting - Time To Act Now! Arundhuthi Bose Corporate Law Services Group Article Fraud Reporting - Time To Act Now! Arundhuthi Bose Corporate Law Services Group arundhuthi@vinodkothari.com corplaw@vinodkothari.com 17 nd February, 2016 Check at: http://india-financing.com/staff-publications.html

More information

Mendocino Community Network Services Contract

Mendocino Community Network Services Contract Mendocino Community Network Services Contract This agreement (this Agreement ) by and between the individual or entity listed below in the signature block ( Subscriber ) and the Mendocino Community Network

More information

Burma Extradition Act, 1904

Burma Extradition Act, 1904 Burma Extradition Act, 1904 CHAPTER I - PRELIMINARY. 1. [Omitted.] 2. Definitions In this Act, unless there is anything repugnant in the subject or context: (a) "extradition offence" means any such offence

More information

REVISOR PMM/NB A

REVISOR PMM/NB A 1.1 Senator... moves to amend S.F. No. 893 as follows: 1.2 Delete everything after the enacting clause and insert: 1.3 "ARTICLE 1 1.4 REVISED UNIFORM LAW ON NOTARIAL ACTS 1.5 Section 1. [358.51] SHORT

More information

Pakistan Anti-Terrorism (Amendment) Ordinance, 1999 Whereas it is expedient to amend the Anti-terrorism Act, (XXVII of 1997), for the purposes

Pakistan Anti-Terrorism (Amendment) Ordinance, 1999 Whereas it is expedient to amend the Anti-terrorism Act, (XXVII of 1997), for the purposes Pakistan Anti-Terrorism (Amendment) Ordinance, 1999 Whereas it is expedient to amend the Anti-terrorism Act, (XXVII of 1997), for the purposes hereinafter appearing; And whereas the National Assembly is

More information

Project on Cybercrime

Project on Cybercrime Project on Cybercrime www.coe.int/cybercrime Version January 2010 Cybercrime legislation country profile MALAYSIA This profile has been prepared within the framework of the Council of Europe s capacity

More information

Electronic Transactions Act, Act, Act 772 ARRANGEMENT OF SECTIONS. Object and scope of the Act

Electronic Transactions Act, Act, Act 772 ARRANGEMENT OF SECTIONS. Object and scope of the Act Electronic Transactions Act, Act, 2008 2008 Act 772 Section 1. Object of the Act 2. Application 3. Scope of Act 4. Exclusion ARRANGEMENT OF SECTIONS Object and scope of the Act Electronic transactions

More information

Model Law on Electronic Evidence

Model Law on Electronic Evidence Model Law on Electronic Evidence Office of Civil and Criminal Justice Reform Model Law on Electronic Evidence Commonwealth Secretariat 2017 All rights reserved. This publication may be reproduced, stored

More information

This Act may be cited as the Mutual Assistance in Criminal and Related Matters Act 2003.

This Act may be cited as the Mutual Assistance in Criminal and Related Matters Act 2003. MUTUAL ASSISTANCE IN CRIMINAL AND RELATED MATTERS ACT 2003 Act 35 of 2003 15 November 2003 P 29/03; Amended 34/04 (P 40/04); 35/04 (P 39/04); 14/05 ARRANGEMENT OF SECTIONS PART I - PRELIMINARY 1. Short

More information

TERMS OF USE. 1. Background

TERMS OF USE. 1. Background TERMS OF USE 1. Background 1.1. www.loconav.com ( Website ) and the LocoNav Application ( App ) is owned, registered and operated by BT Techlabs Private Limited ("Company"), a company incorporated under

More information

James Phelps Australian Heist Competition

James Phelps Australian Heist Competition Terms and Conditions James Phelps Australian Heist Competition General 1. The Promoter is Nationwide News Pty Ltd (ABN 98 008 438 828) of 2 Holt Street, Surry Hills, NSW 2010. Telephone number 02 9288

More information

OFFICIAL RULES. of the 2017 COBB EMC T-SHIRT CONTEST

OFFICIAL RULES. of the 2017 COBB EMC T-SHIRT CONTEST OFFICIAL RULES of the 2017 COBB EMC T-SHIRT CONTEST NO PURCHASE NECESSARY. YOU MUST BE AT LEAST 18 YEARS OF AGE OR OLDER AND A LEGAL RESIDENT OF THE UNITED STATES TO PARTICIPATE. (If you are under 18,

More information

CRIMINAL LAW AMENDMENT ACT

CRIMINAL LAW AMENDMENT ACT WESTERN AUSTRALIA CRIMINAL LAW AMENDMENT ACT No. 101 of 1990 AN ACT to amend The Criminal Code, the Bush Fires Act 1954, the Coroners Act 1920, the Justices Act 1902 and the Child Welfare Act 1947. [Assented

More information

#IMTPETS HASHTAG MONTHLY CONTEST OFFICIAL RULES

#IMTPETS HASHTAG MONTHLY CONTEST OFFICIAL RULES #IMTPETS HASHTAG MONTHLY CONTEST OFFICIAL RULES CONTEST ENTRY PERIOD: The #imtpets Hashtag Contest ( The Contest ) continues on a monthly basis until otherwise notified by IMT Residential (hereinafter

More information

The Tamil Nadu Presevation of Private Forest Act, 1949

The Tamil Nadu Presevation of Private Forest Act, 1949 The Tamil Nadu Presevation of Private Forest Act, 1949 This document is available at ielrc.org/content/e4901.pdf For further information, visit www.ielrc.org Note: This document is put online by the International

More information

EOH 000 ICT TAC 01 Website Terms and Conditions of Use

EOH 000 ICT TAC 01 Website Terms and Conditions of Use 1. Introduction 1.1. This web site www.eoh.co.za (the Site") is owned and operated by EOH Holdings (Pty) Ltd, a company registered in South Africa with company registration number 1998/014669/06, and its,

More information

CYBERCRIMES AND CYBERSECURITY BILL

CYBERCRIMES AND CYBERSECURITY BILL REPUBLIC OF SOUTH AFRICA CYBERCRIMES AND CYBERSECURITY BILL (As introduced in the National Assembly (proposed section 75); explanatory summary of Bill published in Government Gazette No. 40487 of 9 December

More information

Business Law Chapter 9 Handout

Business Law Chapter 9 Handout Major Differences: 2 Felonies Serious crimes, punishable by Death or prison for more than one (1) year. Misdemeanors Non-serious (petty) crimes punishable by jail for less than one(1) year and/or by fines.

More information

J U D G M E N T. impugned order dated , passed by the High Court. of Judicature at Madras, Madurai Bench in Criminal Revision

J U D G M E N T. impugned order dated , passed by the High Court. of Judicature at Madras, Madurai Bench in Criminal Revision Reportable IN THE SUPREME COURT OF INDIA CRIMINAL APPELLATE JURISDICTION CRIMINAL APPEAL NOS. 359-360 OF 2010 SHEILA SEBASTIAN VERSUS APPELLANT(S) R. JAWAHARAJ & ANR. ETC. RESPONDENT(S) J U D G M E N T

More information

LEGAL KNOWLEDGE. Administrative Law How the (administration) government will perform it's functions Administrative Law - Droid Administrative (France)

LEGAL KNOWLEDGE. Administrative Law How the (administration) government will perform it's functions Administrative Law - Droid Administrative (France) LEGAL KNOWLEDGE International Law Term coined by - Jeremy Bentham (18 th Century) Relations b/w States a.k.a Law of Nations Prize Law Regulates practices of capture of ships and cargo in wartime Established

More information

A short notes on crime

A short notes on crime A short notes on crime Denasar Boro LLB. Final Semester, ULCGU Crime is an act or omission which is prohibited or forbidden by law which affects the society or public at large and it always committed against

More information

OBJECTS AND REASONS

OBJECTS AND REASONS 2014-09-25 OBJECTS AND REASONS This Bill makes provision for the strengthening and improvement of the corporate regulatory framework in Barbados by amending the enactments set out in the Schedule. 2 Arrangement

More information

VIRGIN ISLANDS BVI BUSINESS COMPANIES (AMENDMENT) ACT, 2015 ARRANGEMENT OF SECTIONS

VIRGIN ISLANDS BVI BUSINESS COMPANIES (AMENDMENT) ACT, 2015 ARRANGEMENT OF SECTIONS No. of 2015 VIRGIN ISLANDS BVI BUSINESS COMPANIES (AMENDMENT) ACT, 2015 ARRANGEMENT OF SECTIONS Section 1... Short title and commencement 2... Section 2 amended. 3... Section 38 amended. 4... Section 41

More information

KENYA GAZETTE SUPPLEMENT

KENYA GAZETTE SUPPLEMENT SPECIAL ISSUE Kciivci Gazette Supplement No. 91 (National A.scenthIv BilLs No. 29) $ REPUBLIC OF KENYA KENYA GAZETTE SUPPLEMENT NATIONAL ASSEMBLY BILLS, 2017 NAIROBI, 13th June, 2017 CONTENT Hill for Introduction

More information

Rwanda: Proposed media law fails to safeguard free press

Rwanda: Proposed media law fails to safeguard free press STATEMENT Rwanda: Proposed media law fails to safeguard free press ARTICLE 19 05 Jan 2012 A revised media law promised by the Rwandan government prior to and during its Universal Periodic Review at the

More information

Imported Food Control Act 1992

Imported Food Control Act 1992 Imported Food Control Act 1992 No. 221, 1992 Compilation No. 22 Compilation date: 21 October 2016 Includes amendments up to: Act No. 61, 2016 Registered: 7 November 2016 Prepared by the Office of Parliamentary

More information

TERMS & CONDITIONS 1. DEFINITIONS 2. AGREEMENT 3. PLACING AN ORDER 4. PRICING AND PAYMENT

TERMS & CONDITIONS 1. DEFINITIONS 2. AGREEMENT 3. PLACING AN ORDER 4. PRICING AND PAYMENT TERMS & CONDITIONS Please read these terms and conditions ("Agreement") carefully: they govern your use of the website www.sunfire-music.com, and/or collaborating partners and associated webshops ( Website

More information

Security Video Surveillance Policy

Security Video Surveillance Policy Security Video Surveillance Policy Policy Statement The Municipality of Central Elgin (the Municipality) recognizes the need to balance an individual s right to privacy and the need to ensure the safety

More information