LawBhoomi Logo

Cyber Law Notes and Study Materials

  • Cyber Law Blogs Subject-wise Law Notes
  • Aishwarya Agrawal
  • August 11, 2024

Cyber Law

Hello Readers!

This article provides comprehensive Cyber Law notes with case laws.

These Cyber Law notes can be used as a free, online, and self-paced course for learners , a perfect resource for Judicial Service Exams and UPSC CSE Law Optional aspirants , and a sufficient reference for readers who want to learn or research about Cyber Law.

For books on Cyber Law, click here .

We understand it’s difficult to find complete Cyber Law Notes in one place, hence we attempted to provide them all in one place.

We hope these Cyber Law Notes will suffice the purpose. If you think we missed anything or you just want to thank us,  fill this form.

Introduction

Cyber Law and Need for Data Protection in Cyberspace
Evolution of Cyber Law in India
Advantages of Cyber Laws
A Comparative Analysis: Cyber Laws vs Conventional Law
Cyber Contraventions: To what extent the IT Act, 2000 deals with it?
Challenges to Indian Law and Cyber Crime Scenario in India

Jurisdictional Aspects in Cyber Law

Concepts and Issues of Jurisdiction in Cyber Space  
– Issues of jurisdiction in cyberspace
– Types of Jurisdiction
– The Test evolved
– Effects Test and International Targeting
– Jurisdiction under IT Act, 200

Cyber Crimes & Legal Framework

Why Cyber Crimes take place?
Nature and Scope of Cyber Crime
An Introduction to various Cybercrimes
Juvenile Crimes In Social Networking And Mass Media
Cyber Squatting in India: A Critical Analysis
Identity Theft: An Overall Review
Laws Against Cyber Pornography in India – Saving Dignity or Curtailing Freedom?
Cybercrimes Relating To Unauthorised Access: A Critical Study
Cyber Offences v Cyber Contraventions: A Brief Analysis
Cyber Crimes and Challenges Faced by Judicial System
Cyber Investigation: Position in India
Cyber Defamation
Cyber Crime Against Property in India

Appropriate Bodies for Redressing Civil and Criminal Offence

Role of Adjudicating Officer under IT Act 2000
Role of the Controller Under IT Act-2000
Role of Certifying Authorities under IT Act 2000

Right to Privacy and Data Protection on Internet

Concept of Privacy and Threat to Privacy on Internet
Important Laws Dealing with Right to Privacy in India
How is breach of Privacy determined in Cyber Space?
Right Of Interception Under IT Act 2000
Data Protection and Privacy in India: An Overview of the Recommendations of the Srikrishna Committee

Electronic Signature and E Contracting

Understanding Digital Signature Vis-A-Vis Handwritten Signature
Are e-contracts Legal in India?
Online Privacy in Relation to E-Contracts
Click-Wrap , Shrink-Wrap And Browse-Wrap Contracts: A Critical Study
Legal Recognition of Digital Signature in India

E-Governance and E Commerce

E-Governance and E Commerce
Laws with E-Commerce in India

Intellectual Property Issues in Cyber Space

IP Issues and Cyber Law
Copyright Infringement in Cyberspace: A Critical Study
Trademark Issues in Cyberspace- An Analysis
Role of Arbitration in Resolving Domain Name Disputes: Position in India
Role of UDRP in Resolving Domain Name Disputes (with top 4 important case laws)

Important Points of Information Technology Act, 2000

Admissibility of Electronic Records
Decoding Section 66 of IT Act, 2000
A Critical Analysis of Sec.79 of IT Act 2000
Electronic Evidences and Admissibility in The Court

Related Articles

Right to Privacy and The Personal Data Protection Bill 2019: Still Needs To Go A Long Way
Right to access internet should be a fundamental right under Article 19

For notes on other subjects,  click here .

For case briefs and analysis,  click here .

We hope you found Cyber Law notes’ on every topic related to Cyber Law. If you think we missed anything, help us by mentioning the details in  this form.

Disclaimer:

We have done our best to provide the right information. However, we don’t claim the content to be genuine. We suggest readers to do check it.

cyber law case study pdf

You might like

International law

Characterisation in Private International Law

International Law

Choice of Jurisdiction in Private International Law

Environmental law

Environmental Law Notes and Study Materials

Leave a reply cancel reply.

Your email address will not be published. Required fields are marked *

Name  *

Email  *

Add Comment  *

Post Comment

Upgrad

Law News Aggregator

Cyber law – notes, case laws and study material.

cyber law case study pdf

Cyber law is fundamentally the branch of law that deals with legal issues related to the use of information technology. It essentially encompasses laws relating to electronic and digital signatures, cybercrime, cybersecurity, intellectual property, data protection and privacy. The governing mechanisms and legal structures that oversee electronic commerce in India also fall within the domain of cyber law.

As the number of internet users is on the rise, the need for cyber laws and their application has also gathered great momentum.

Legal Bites brings you the best study material to understand the fundamentals of cyber law. The course has been designed keeping in mind the requirements of budding cyber lawyers and cybersecurity experts. The three modules of this course will help readers master the technicalities of cyber and information technology laws. The study material also focuses on the key aspects of Intellectual Property Rights, e-contracts and e-governance.

Important Articles and Study Material on Cyber And Information Technology Law – Click on the links to Read:

Module i: introduction to cyber space and cyber law.

  • Cyber Space: Meaning, Regulation and Scope
  • Distinction Between Conventional Crime And Cyber Crime
  • Cyber Law: The Information Technology Law and its Application
  • The Information Technology Law: Important Definitions
  • Jurisdictional Issues in Cyber Space

Module II: Electronic Contracts

  • E-Commerce and E-Contracts: Overview And Analysis
  • Technical and Legal issues in electronic contracts
  • Electronic Contracts: Enforceability, Security and Privacy Issues
  • Digital Signature: Concept, Object and Usage
  • A General Overview of Data Privacy in India

Module III: Intellectual Property Rights in Cyber Space

  • Trademark issues in Cyber Space
  • Copyright Issues in Cyberspace
  • Right to be Forgotten: Case Study: Google Spain v. AEPD and Mario Costeja Gonzalez
  • Copyright and its Subject Matter
  • Copyright Infringement
  • Doctrine of Fair Dealing: Meaning, importance and Case Laws
  • Copyright Protection in the Cyberspace within the IT Act, 2000

Module IV: Cyber Crime

  • Cyber Crimes and their types
  • International Legal Regime relating to Cyber Crimes
  • Cyberbullying Laws in India
  • Cyber Activism: An Infoxication
  • Child Pornography – A Menace
  • Plagiarism in the Cyberspace

Other Articles

Strengthening Cyber Security and Data Protection in India: An Analysis of Legal Frameworks and Case Studies

  • Information Technology Act, 2000 (with Amendments)
  • Digital Signature and Electronic Signature
  • E-Governance
  • Technology and Cyber Legal Challenges
Your valuable feedback in the form of comments or any desired inputs are encouraged and always welcome. Every contribution toward a goal is valuable, regardless of how small it may be.

Landmark Cyber Law cases in India

  • Post author By ashwin
  • Post date March 1, 2021

cyber law case study pdf

By:-Muskan Sharma

Introduction

Cyber Law, as the name suggests, deals with statutory provisions that regulate Cyberspace. With the advent of digitalization and AI (Artificial Intelligence), there is a significant rise in Cyber Crimes being registered. Around 44, 546 cases were registered under the Cyber Crime head in 2019 as compared to 27, 248 cases in 2018. Therefore, a spike of 63.5% was observed in Cyber Crimes [1] .

The legislative framework concerning Cyber Law in India comprises the Information Technology Act, 2000 (hereinafter referred to as the “ IT Act ”) and the Rules made thereunder. The IT Act is the parent legislation that provides for various forms of Cyber Crimes, punishments to be inflicted thereby, compliances for intermediaries, and so on.

Learn more about  Cyber Laws Courses with Enhelion’s Online Law Course ! 

However, the IT Act is not exhaustive of the Cyber Law regime that exists in India. There are some judgments that have evolved the Cyber Law regime in India to a great extent. To fully understand the scope of the Cyber Law regime, it is pertinent to refer to the following landmark Cyber Law cases in India:

  • Shreya Singhal v. UOI [2]

In the instant case, the validity of Section 66A of the IT Act was challenged before the Supreme Court.

Facts: Two women were arrested under Section 66A of the IT Act after they posted allegedly offensive and objectionable comments on Facebook concerning the complete shutdown of Mumbai after the demise of a political leader. Section 66A of the IT Act provides punishment if any person using a computer resource or communication, such information which is offensive, false, or causes annoyance, inconvenience, danger, insult, hatred, injury, or ill will.

The women, in response to the arrest, filed a petition challenging the constitutionality of Section 66A of the IT Act on the ground that it is violative of the freedom of speech and expression.

Decision: The Supreme Court based its decision on three concepts namely: discussion, advocacy, and incitement. It observed that mere discussion or even advocacy of a cause, no matter how unpopular, is at the heart of the freedom of speech and expression. It was found that Section 66A was capable of restricting all forms of communication and it contained no distinction between mere advocacy or discussion on a particular cause which is offensive to some and incitement by such words leading to a causal connection to public disorder, security, health, and so on.

Learn more about  Cyber Laws with Enhelion’s Online Law firm certified Course! 

In response to the question of whether Section 66A attempts to protect individuals from defamation, the Court said that Section 66A condemns offensive statements that may be annoying to an individual but not affecting his reputation.

However, the Court also noted that Section 66A of the IT Act is not violative of Article 14 of the Indian Constitution because there existed an intelligible difference between information communicated through the internet and through other forms of speech. Also, the Apex Court did not even address the challenge of procedural unreasonableness because it is unconstitutional on substantive grounds.

  • Shamsher Singh Verma v. State of Haryana [3]

In this case, the accused preferred an appeal before the Supreme Court after the High Court rejected the application of the accused to exhibit the Compact Disc filed in defence and to get it proved from the Forensic Science Laboratory.

The Supreme Court held that a Compact Disc is also a document. It further observed that it is not necessary to obtain admission or denial concerning a document under Section 294 (1) of CrPC personally from the accused, the complainant, or the witness.

  • Syed Asifuddin and Ors. v. State of Andhra Pradesh and Anr. [4]

Facts: The subscriber purchased a Reliance handset and Reliance mobile services together under the Dhirubhai Ambani Pioneer Scheme. The subscriber was attracted by better tariff plans of other service providers and hence, wanted to shift to other service providers. The petitioners (staff members of TATA Indicom) hacked the Electronic Serial Number (hereinafter referred to as “ESN”). The Mobile Identification Number (MIN) of Reliance handsets were irreversibly integrated with ESN, the reprogramming of ESN made the device would be validated by Petitioner’s service provider and not by Reliance Infocomm.

Questions before the Court: i) Whether a telephone handset is a “Computer” under Section 2(1)(i) of the IT Act?

  • ii) Whether manipulation of ESN programmed into a mobile handset amounts to an alteration of source code under Section 65 of the IT Act?

Decision: (i) Section 2(1)(i) of the IT Act provides that a “computer” means any electronic, magnetic, optical, or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic, or optical impulses, and includes all input, output, processing, storage, computer software or communication facilities which are connected or related to the computer in a computer system or computer network. Hence, a telephone handset is covered under the ambit of “computer” as defined under Section 2(1)(i) of the IT Act.

(ii)  Alteration of ESN makes exclusively used handsets usable by other service providers like TATA Indicomm. Therefore, alteration of ESN is an offence under Section 65 of the IT Act because every service provider has to maintain its own SID code and give its customers a specific number to each instrument used to avail the services provided. Therefore, the offence registered against the petitioners cannot be quashed with regard to Section 65 of the IT Act.

  • Shankar v. State Rep [5]

Facts: The petitioner approached the Court under Section 482, CrPC to quash the charge sheet filed against him. The petitioner secured unauthorized access to the protected system of the Legal Advisor of Directorate of Vigilance and Anti-Corruption (DVAC) and was charged under Sections 66, 70, and 72 of the IT Act.

Decision: The Court observed that the charge sheet filed against the petitioner cannot be quashed with respect to the law concerning non-granting of sanction of prosecution under Section 72 of the IT Act.

  • Christian Louboutin SAS v. Nakul Bajaj & Ors . [6]

Facts: The Complainant, a Luxury shoes manufacturer filed a suit seeking an injunction against an e-commerce portal www.darveys.com for indulging in a Trademark violation with the seller of spurious goods.

The question before the Court was whether the defendant’s use of the plaintiff’s mark, logos, and image are protected under Section 79 of the IT Act.

Decision: The Court observed that the defendant is more than an intermediary on the ground that the website has full control over the products being sold via its platform. It first identifies and then promotes third parties to sell their products. The Court further said that active participation by an e-commerce platform would exempt it from the rights provided to intermediaries under Section 79 of the IT Act.

  • Avnish Bajaj v. State (NCT) of Delhi [7]

Facts: Avnish Bajaj, the CEO of Bazee.com was arrested under Section 67 of the IT Act for the broadcasting of cyber pornography. Someone else had sold copies of a CD containing pornographic material through the bazee.com website.

Decision: The Court noted that Mr. Bajaj was nowhere involved in the broadcasting of pornographic material. Also, the pornographic material could not be viewed on the Bazee.com website. But Bazee.com receives a commission from the sales and earns revenue for advertisements carried on via its web pages.

The Court further observed that the evidence collected indicates that the offence of cyber pornography cannot be attributed to Bazee.com but to some other person. The Court granted bail to Mr. Bajaj subject to the furnishing of 2 sureties Rs. 1 lakh each. However, the burden lies on the accused that he was merely the service provider and does not provide content.

  • State of Tamil Nadu v. Suhas Katti [8]

The instant case is a landmark case in the Cyber Law regime for its efficient handling made the conviction possible within 7 months from the date of filing the FIR.

Facts: The accused was a family friend of the victim and wanted to marry her but she married another man which resulted in a Divorce. After her divorce, the accused persuaded her again and on her reluctance to marrying him, he took the course of harassment through the Internet. The accused opened a false e-mail account in the name of the victim and posted defamatory, obscene, and annoying information about the victim.

A charge-sheet was filed against the accused person under Section 67 of the IT Act and Section 469 and 509 of the Indian Penal Code, 1860.

Decision: The Additional Chief Metropolitan Magistrate, Egmore convicted the accused person under Section 469 and 509 of the Indian Penal Code, 1860 and Section 67 of the IT Act. The accused was subjected to the Rigorous Imprisonment of 2 years along with a fine of Rs. 500 under Section 469 of the IPC, Simple Imprisonment of 1 year along with a fine of Rs. 500 under Section 509 of the IPC, and Rigorous Imprisonment of 2 years along with a fine of Rs. 4,000 under Section 67 of the IT Act.

  • CBI v. Arif Azim (Sony Sambandh case)

A website called www.sony-sambandh.com enabled NRIs to send Sony products to their Indian friends and relatives after online payment for the same.

In May 2002, someone logged into the website under the name of Barbara Campa and ordered a Sony Colour TV set along with a cordless telephone for one Arif Azim in Noida. She paid through her credit card and the said order was delivered to Arif Azim. However, the credit card agency informed the company that it was an unauthorized payment as the real owner denied any such purchase.

A complaint was therefore lodged with CBI and further, a case under Sections 418, 419, and 420 of the Indian Penal Code, 1860 was registered. The investigations concluded that Arif Azim while working at a call center in Noida, got access to the credit card details of Barbara Campa which he misused.

The Court convicted Arif Azim but being a young boy and a first-time convict, the Court’s approach was lenient towards him. The Court released the convicted person on probation for 1 year. This was one among the landmark cases of Cyber Law because it displayed that the Indian Penal Code, 1860 can be an effective legislation to rely on when the IT Act is not exhaustive.

  • Pune Citibank Mphasis Call Center Fraud

Facts: In 2005, US $ 3,50,000 were dishonestly transferred from the Citibank accounts of four US customers through the internet to few bogus accounts. The employees gained the confidence of the customer and obtained their PINs under the impression that they would be a helping hand to those customers to deal with difficult situations. They were not decoding encrypted software or breathing through firewalls, instead, they identified loopholes in the MphasiS system.

Decision: The Court observed that the accused in this case are the ex-employees of the MphasiS call center. The employees there are checked whenever they enter or exit. Therefore, it is clear that the employees must have memorized the numbers. The service that was used to transfer the funds was SWIFT i.e. society for worldwide interbank financial telecommunication. The crime was committed using unauthorized access to the electronic accounts of the customers. Therefore this case falls within the domain of ‘cyber crimes”. The IT Act is broad enough to accommodate these aspects of crimes and any offense under the IPC with the use of electronic documents can be put at the same level as the crimes with written documents.

The court held that section 43(a) of the IT Act, 2000 is applicable because of the presence of the nature of unauthorized access that is involved to commit transactions. The accused were also charged under section 66 of the IT Act, 2000 and section 420 i.e. cheating, 465,467 and 471 of The Indian Penal Code, 1860.

  • SMC Pneumatics (India) Pvt. Ltd. vs. Jogesh Kwatra [9]

Facts: In this case, Defendant Jogesh Kwatra was an employee of the plaintiff’s company. He started sending derogatory, defamatory, vulgar, abusive, and filthy emails to his employers and to different subsidiaries of the said company all over the world to defame the company and its Managing Director Mr. R K Malhotra. In the investigations, it was found that the email originated from a Cyber Cafe in New Delhi. The Cybercafé attendant identified the defendant during the enquiry. On 11 May 2011, Defendant was terminated of the services by the plaintiff.

Decision: The plaintiffs are not entitled to relief of perpetual injunction as prayed because the court did not qualify as certified evidence under section 65B of the Indian Evidence Act. Due to the absence of direct evidence that it was the defendant who was sending these emails, the court was not in a position to accept even the strongest evidence. The court also restrained the defendant from publishing, transmitting any information in the Cyberspace which is derogatory or abusive of the plaintiffs.

The Cyber Law regime is governed by the IT Act and the Rules made thereunder. Also, one may take recourse to the provisions of the Indian Penal Code, 1860 when the IT Act is unable to provide for any specific type of offence or if it does not contain exhaustive provisions with respect to an offence.

However, the Cyber Law regime is still not competent enough to deal with all sorts of Cyber Crimes that exist at this moment. With the country moving towards the ‘Digital India’ movement, the Cyber Crimes are evolving constantly and new kinds of Cyber Crimes enter the Cyber Law regime each day. The Cyber Law regime in India is weaker than what exists in other nations.

Hence, the Cyber Law regime in India needs extensive reforms to deal with the huge spike of Cyber Crimes each year.

[1] “Crime in India – 2019” Snapshots (States/UTs), NCRB, available at: https://ncrb.gov.in/sites/default/files/CII%202019%20SNAPSHOTS%20STATES.pdf (Last visited on 25 th Feb; 2021)

[2] (2013) 12 SCC 73

[3] 2015 SCC OnLine SC 1242

[4] 2005 CriLJ 4314

[5] Crl. O.P. No. 6628 of 2010

[6] (2018) 253 DLT 728

[7] (2008) 150 DLT 769

[8] CC No. 4680 of 2004

[9] CM APPL. No. 33474 of 2016

  • Tags artificial intelligence courses online , aviation law courses india , best online law courses , business law course , civil courts , civil law law courses online , civil system in india , competition law , corporate law courses online , covaxin , covid vaccine , diploma courses , diploma in criminal law , drafting , fashion law online course , how to study law at home , indian law institute online courses , innovation , Intellectual Property , international law courses , international law degree online , international law schools , introduction to law course , invention , knowledge , labour law course distance learning , law , law certificate courses , law certificate programs online , law classes , law classes online , law college courses , law courses in india , law firms , law schools , lawyers , learn at home , legal aid , legal courses , online law courses , online law courses in india , pfizer , pleading , space law courses , sports law , sports law courses , study criminal law online , study later , study law at home , study law by correspondence , study law degree online , study law degree online australia , study law distance education , study law distance learning , study law online , study law online free , study law online uk , study legal studies online , teach law online , technology law courses , trademark

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

CYBER CRIMES: A CASE STUDY OF LEGISLATION IN PAKISTAN IN THE LIGHT OF OTHER JURISDICTIONS

Profile image of Mahboob  Usman

This thesis appraise that cyber legislation has become a constant dilemma of Pakistan. Cyber crimes cause a great loss to national and international business community. Every day more and more digital crimes are being committed, while causing billions of dollar loss to corporations and individuals. Existing legislation does not cope with the advancement of technology. In most of the cases courts fail to find significant proof or suitable legislation to punish the criminals, eventually offenders are released. Extreme demand is emerging from Pakistani society to protect them from cyber crimes and to punish the offenders. So far, Pakistan does not have sufficient legislation to deal with such offenders. First chapter of this research will be based on general concepts of cyber crimes, such as definition, origin of the internet and evolution of it, kinds, jurisdiction issue, cyber crimes in developing and developed countries. Second chapter will be based on role of Pakistan and International community in the cyber world, further the forensic science will also be discussed in this chapter. In third chapter, the legislation of U.S will be compared with Pakistani legislation and at the end of this chapter findings will be given. On the basis of previous chapters recommendations will be given in chapter four. Electronic crimes can only be stopped if existing laws are amended and new legislation is introduced. Therefore, it is important to bring existing legislation conformity with International standards to enable law enforcement agencies to tackle different kind of criminals and bring them before the competent court of justice for punishments.

Related Papers

Marwah Obaid , Muhammad Amir

The growth of internet in Pakistan is exceptional; it reached to the heights of popularity for an ever changing medium of information and communication in a major conservative society. This brings freedom of expression, communication and information across the country which struggled to provide free speech and information access to its people. The internet penetration is increasing very rapidly; it is very important to observe the impact of it on the society; especially when the government is constantly trying to formulate the regulation for controlling the cyber space. A well regulated cyber space leads to the expansion of information technology services speedily. This paper focuses on the prevailing development of governance policies for cyber space and defies among the agencies and information technology venders. Moreover, the case study of national bank of Pakistan and other cyber crime survey shows that a lot of law making is needed in order to reduce the chances of cyber crime.

cyber law case study pdf

Pakistan’s Multidisciplinary Journal for Arts & Science

shaharyar sabiri

The study discussed the cyber laws in Pakistan and how these laws are preventing cybercrimes and how much these laws are up to date along with this the study also studied the legality of pirated softwares in Pakistan and internationally. Two research objectives were focused about the pirated softwares and the cyber laws of Pakistan. The study was a systematic review in which 25 articles from journals along with PECA 2016, electronic transition ordinance 2002 and cyber laws dragged in 2007 were reviewed to know the legality of pirated softwares and how these pirated softwares were treated around the globe. Concluded that there was made of laws related to cyber-crimes and up to date technologies in order to cope with the cyber-crimes that were conducted by the use of these modern devices so that the cybercriminals could be arrested and can be punished. All this should be done in order to protect the identity and privacy of the people who are using these technologies. The study concluded that there is a requirement for new laws which are up to date so that these laws can protect the country and its people and their online life so that their privacy and identity cannot be stolen.

SSRN Electronic Journal

Sabahat Akhtar 435-FSL/LLMIL/S21

Assessing the Cybercrime Legislation in Pakistan: a Comparative Study of European Union and Pakistani Cybercrime Laws 63 Pages Posted: 6 Sep 2023 Sabahat Akhtar International Islamic University Date Written: August 29, 2023 Abstract Background: With the recent development in the field of information technology, people are able to communicate in a more efficient way in cyberspace. As this efficient way of communication is used by almost everyone in this era so the interactions and the reasons for these interactions are also increased. In a normal society, disputes arise due to which laws are framed similarly in cyberspace as well these disputes are in large numbers across the world and these need well-framed laws. From this perspective, it is obvious that with the passage of time, the need for laws and proper enforcement mechanisms becomes necessary. For this purpose, the EU has made a number of cybercrime legal frameworks. Method: The research work is aimed at focusing on a comparative study of the cyber Crimes legislation in the European Union and Pakistan. The doctrinal method of research is used to critically analyze the cybercrime laws of the EU and Pakistan. This method is used in legal research to examine laws. The research design for this work is of comparative nature. This research work analyzes the EU legislation which is related to cybersecurity. It mentions all the relevant EU regulations. The second part of this study discusses the kinds of crimes which are committed in cyberspace. The third part of this research work focuses on cybercrimes in Pakistan. It focuses on the relevant cybercrime laws in Pakistan. It also comparatively analyzes the EU cybercrime laws and Pakistani cybercrime laws. It mentions a number of cases in this regard from both regions. Conclusion: It can be observed that there is a presence of lacunas in the smooth delivery of Cyber security in Pakistan as compared to the EU and there are some suggestions for pragmatic solutions to the matter regarding cybersecurity issues faced by Pakistan. This research work has helped in observing the loopholes in the Pakistani legal system. It has observed the ways in which changes in Pakistani legal framework related to cyber laws can be made so that it is in accordance with modern needs of cybersecurity. Systematic review and analysis of this data aims to highlight that updated legislation plays an important role in countering cybercrimes and that legislation should be strengthened, enhanced, and made up to mark the rapid advancement of technology in order to address the rising number of cybercrimes. It concludes that there is a need for more refined and precise cybercrime laws in Pakistan along with the need of staying updated with the changing needs of the time Keywords: Cybercrime laws, Pakistan, UK, Cybersecurity, EU Legislation

Contemporary Challenges of Digital World and Cyber Crime and Management Solutions in the light of Cyber Crime Bill 2016 of Pakistan and Islamic Management Perspective

Rabia Aamir , Dr. Umer Riaz Abbasi

A computer and a network are all that is needed for any criminal activity of cybercrime. A vigorous cybercrime legislation has, therefore, become a necessity in today’s digital age. Many nation-states take great measures to draft the inclusive laws regarding this legislation. The government of Pakistan is also working hard to amend the present laws which pursue to make sure the regulation with regards to the cyber security. Digital technology has many advantages but also has a dark side. Unfortunately, its dark side is paid much heed to which does not sit well with any code of ethics. The existence of Islam in the cyber world has created an opportunity for dialogue besides forming a new method of learning for mental and physical health The Electronic Transactions Ordinance ETO 2002 in the Islamic Republic of Pakistan forbade the illegitimate and unauthorized accessibility towards the information. It preceded the declaration of Prevention of Electronic Crimes Act PECA 2016. The Act lays down the laws for cyber- terrorist crimes which are conducted with the intent of committing terrorism. The penalty for this offense is based on the 14-year term of custody or a charge of Rs 5 million, which makes up to US $47,450. Understanding the Islamic perspective in this regard can be helpful for the betterment of the lives. Islam strictly forbids a spread of fake news through news sourcing which has increasingly become rampant in today’s cyber world which can lead towards malpractices. Thus, this research aims at sharing all the contemporary challenges with regards to the cybercrimes and possible solutions in the light of constitution in Pakistan.

Babar Saeed

The term 'Information Technology' evolved in the 1970s and if we consider a medium or large company providing goods or services, its information technology department will be responsible for storing, protecting, processing, retrieving and transmitting the information. Information Technology (IT) is a wide and varied sector, and is represented in some form in almost all the industries. It is a blend of computers and communication technology where IT professionals perform variety of duties, ranging from development and installation of applications to designing complex computer networks and databases. Although, the term 'Information Technology' is becoming more familiar to the common man some people still wonder, what is information technology? As a concept, it has evolved from the basic usage of computers, internet and processing of information in any industry. In Pakistan use of internet is growing rapidly day by day. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. It is very much obvious that there are two sides to a coin; Internet also has its own advantages and disadvantages. One of the major disadvantages is Cyber-crime or misuse of Information and Technology– illegal activity committed on the internet. The internet, along with its advantages, which has made the world into a ‘Global Village’ in return, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spam, software piracy and so on, which invade our privacy and offend our senses. Criminal activities in the cyberspace are on the rise. In this study we would give suggestions and means with which effective enforcement of Cyber Laws in Pakistan would be implemented.

Kamran Adil

Dr. Ghulam Muhammad Kundi

mohankumar.m kumar

Each crime has its effect particularly on society, country, and the world to the immense degree. By th observation of cybercrime and its wonder, it is uncovered that like previous violations it has severely influenced social existence of people. To comprehend the impact of cybercrime, it is important to consider the effect of two things PC innovation and Web on individuals as cybercrime is most likely starting out of these. This article depicts the distinctions of the Indian point of view and Europe viewpoint in Digital Crimes.

International Journal of Information and Electronics Engineering

Hossein Taji

Journal of Information Engineering and Applications

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

Tayyab Haneef

Aqa Raza , Mukesh Dwivedi

BANGLADESH RESEARCH PUBLICATIONS JOURNAL

Dr. Md. Nayem Alimul Hyder

Mazenismaeel Ghareb , Falah Mustafa

Fahd Saif , Muhammad N Brohi

Laith AL-KHALILI

Kader Bangsa Law Review

Ade Ayu Saputri

International Journal of Innovative Research in Engineering and Management (IJIREM)

IJIREM JOURNAL

International Journal of Academic Research in Progressive Education and Development

Faqih Ibrahim

abdul syatar

IJCSMC Journal

Bhartiya Shodh

Cyberpolitik Journal

Umair Pervez Khan

Danish ashraf Khan

International Journal of Advanced Research

C.E Dr Sumanta Bhattacharya M.Tech,PhD,P.E,Ch.E

International Journal IJRITCC

Sreeramana Aithal

IJCSIS Vol 17 No 11 November Issue

Journal of Computer Science IJCSIS

Muhammad Waqar Anwar , Umair Pervez Khan

Evon Abu-Taieh

International Journal of Digital Law

Ikenga Oraegbunam

International Journal of Engineering and Applied Sciences

Shrikant Sarda

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Legal Bites

Cyber Law - Notes, Case Laws And Study Material

Cyber law is fundamentally the branch of law that deals with legal issues related to the use of information technology..

Cyber Law - Notes, Case Laws And Study Material

Cyber law is fundamentally the branch of law that deals with legal issues related to the use of information technology. It essentially encompasses laws relating to electronic and digital signatures, cybercrime, cybersecurity, intellectual property, data protection and privacy. The governing mechanisms and legal structures that oversee electronic commerce in India also fall within the domain of cyber law.

As the number of internet users is on the rise, the need for cyber laws and their application has also gathered great momentum.

Legal Bites brings you the best study material to understand the fundamentals of cyber law. The course has been designed keeping in mind the requirements of budding cyber lawyers and cybersecurity experts. The three modules of this course will help readers master the technicalities of cyber and information technology laws. The study material also focuses on the key aspects of Intellectual Property Rights, e-contracts and e-governance.

Important Articles and Study Material on Cyber And Information Technology Law – Click on the links to Read:

Module i: introduction to cyber space and cyber law.

  • Cyber Space: Meaning, Regulation and Scope
  • Distinction Between Conventional Crime And Cyber Crime
  • Cyber Law: The Information Technology Law and its Application
  • The Information Technology Law: Important Definitions
  • Jurisdictional Issues in Cyber Space

Module II: Electronic Contracts

  • E-Commerce and E-Contracts: Overview And Analysis
  • Technical and Legal issues in electronic contracts
  • Electronic Contracts: Enforceability, Security and Privacy Issues
  • Digital Signature: Concept, Object and Usage
  • A General Overview of Data Privacy in India

Module III: Intellectual Property Rights in Cyber Space

  • Trademark issues in Cyber Space
  • Copyright Issues in Cyberspace
  • Right to be Forgotten: Case Study: Google Spain v. AEPD and Mario Costeja Gonzalez
  • Copyright and its Subject Matter
  • Copyright Infringement
  • Doctrine of Fair Dealing: Meaning, importance and Case Laws
  • Copyright Protection in the Cyberspace within the IT Act, 2000

Module IV: Cyber Crime

  • Cyber Crimes and their types
  • International Legal Regime relating to Cyber Crimes
  • Cyberbullying Laws in India
  • Cyber Activism: An Infoxication
  • Child Pornography – A Menace
  • Plagiarism in the Cyberspace

Other Articles

Strengthening Cyber Security and Data Protection in India: An Analysis of Legal Frameworks and Case Studies

  • Information Technology Act, 2000 (with Amendments)
  • Digital Signature and Electronic Signature
  • E-Governance
  • Technology and Cyber Legal Challenges
Your valuable feedback in the form of comments or any desired inputs are encouraged and always welcome. Every contribution toward a goal is valuable, regardless of how small it may be.

Admin Legal Bites

Admin Legal Bites

Legal Bites Study Materials correspond to what is taught in law schools and what is tested in competitive exams. It pledges to offer a competitive advantage, prepare for tests, and save a lot of money.

Related News

sidekick

Cybercrime and Cybercriminals: A Comprehensive Study

  • International Journal of Computer Networks and Communications Security 4:165-176.

Regner Sabillon at Athabasca University

  • Athabasca University

Jeimy J. Cano M. at Universidad de los Andes

  • Universidad de los Andes

Jordi Serra-Ruiz at Universitat Oberta de Catalunya

  • Universitat Oberta de Catalunya

Víctor Cavaller at Universitat Oberta de Catalunya

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations

Tichaona Chikore

  • Adam At Thur Jasson Cassidy
  • Muhammad Ulil Abshor As Shofy

M.Robinson Joel

  • Abdurrahman Al Akhdloriy
  • Chalik Mawardi Aiyub
  • Indra Rahmatullah
  • Erlisa Akhlakul Karimah

Ajoy Pb

  • Ugah John Otozi

Ephraim Bernard

  • Mamah Chukwurah Hyginus

Ebenezer Veemaraj

  • Deepak Mandali

Robinson Tombari Sibe

  • Mohd Azeem Bin Adzmi

Thomas Gross

  • Iii Mcquade
  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

IMAGES

  1. (PDF) A STUDY ON TYPES OF CYBER CRIMES AND CYBER ATTACKS IN INDIA

    cyber law case study pdf

  2. "Information Brochure

    cyber law case study pdf

  3. (PDF) Types of Cyber Crimes & Cyber Law in India

    cyber law case study pdf

  4. IMPORTANT CASE-LAWS ON CYBER LAW WITH THEIR ANSWERS

    cyber law case study pdf

  5. (PDF) Cybersecurity Law and Regulation

    cyber law case study pdf

  6. (PDF) Internet Regulation vs. Freedom of Speech: A Cyberlaw Case Study

    cyber law case study pdf

COMMENTS

  1. PDF A Case Study of the Capital One Data Breach

    A Case Study of the Capital One Data Breach Nelson Novaes Neto, Stuart Madnick, Anchises Moraes G. de Paula, Natasha Malara Borges Working Paper CISL# 2020-07 ... New data protection and privacy laws and recent cyber security regulations, such as the General Data Protection Regulation (GDPR) that went into effect in Europe in 2018, ...

  2. Cybercrime Investigation Case Studies: An Excerpt from Placing the

    Case in Point. FBI Anthrax Investigation (Arredondo, 2008) Doctor Bruce Ivins, a biodefense researcher at the US Army Medical Research Institute of Infectious Diseases, was suspected of mailing anthrax-contaminated letters causing 5 deaths and injury to dozens of more people.

  3. Cybercrime and the Law: Computer Fraud and Abuse Act (CFAA) and the

    The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030, is a civil and criminal cybercrime law prohibiting a variety of computer-related conduct. Although sometimes described as an anti-hacking law, the CFAA is much broader in scope. Indeed, it prohibits seven categories of conduct including, with certain exceptions and conditions: R46536.

  4. PDF Cybercrime and Analysis of Laws: a Case Study of Zanzibar Legal ...

    research. It concerns critical assessment of the laws governing cybercrime practices. in Zanzibar. .2. Research Design. The study methodology is qualitative. The data obtained through interview of legal. staffs and stakeholder to enable a suitable role in the study and analysed legislation.

  5. PDF THE LAW OF CYBER-ATTACK

    First, the Article clarifies what cyber-attacks are and how they relate to existing bodies of law, including the law of war,8 recent international efforts to directly regulate cyber-attacks, international bodies of law that may be used to indirectly regulate cyber-attacks, and domestic criminal law.

  6. (PDF) Cyber Laws in India: An Overview

    1. Introduction. Cybercrime is a relatively new type of crime in the world. Any illegal behaviour that occurs on. or via the medium of computers, the internet, or other technology recognised by ...

  7. PDF Cyber Crime Law and Practice

    %PDF-1.6 %âãÏÓ 435 0 obj > endobj 453 0 obj >/Filter/FlateDecode/ID[1F81BA36C2B84C46B4C834803808E815>1F81BA36C2B84C46B4C834803808E815>]/Index[435 30]/Info 434 0 R ...

  8. Cybersecurity Law

    A definitive guide to cybersecurity law Expanding on the author's experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information safeguarding, law enforcement surveillance, cybercriminal combat, privacy, and many ...

  9. Cyber Law Notes and Study Materials

    Cyber Law Notes and Study Materials. Hello Readers! This article provides comprehensive Cyber Law notes with case laws. These Cyber Law notes can be used as a free, online, and self-paced course for learners, a perfect resource for Judicial Service Exams and UPSC CSE Law Optional aspirants, and a sufficient reference for readers who want to ...

  10. Cyber Law

    Posted on September 3, 2023 By Legal 60. Cyber law is fundamentally the branch of law that deals with legal issues related to the use of information technology. It essentially encompasses laws relating to electronic and digital signatures, cybercrime, cybersecurity, intellectual property, data protection and privacy.

  11. Landmark Cyber Law cases in India

    To fully understand the scope of the Cyber Law regime, it is pertinent to refer to the following landmark Cyber Law cases in India: Shreya Singhal v. UOI [2] In the instant case, the validity of Section 66A of the IT Act was challenged before the Supreme Court. Facts: Two women were arrested under Section 66A of the IT Act after they posted ...

  12. PDF Cyber Crimes and Law in India: a Critical Analysis

    phrase "Cyber Law" introduced. We can characterize cyber law as a subset of the systems of law that address the Internet, cyberspace, and with the judicial matters. 1. INTRODUCTION The development of computers has improved human lives. Consequently, it has been used for a variety of reasons by individuals and major businesses worldwide.

  13. (Pdf) Cyber Crimes: a Case Study of Legislation in Pakistan in The

    Two research objectives were focused about the pirated softwares and the cyber laws of Pakistan. The study was a systematic review in which 25 articles from journals along with PECA 2016, electronic transition ordinance 2002 and cyber laws dragged in 2007 were reviewed to know the legality of pirated softwares and how these pirated softwares ...

  14. PDF Cybercrime: an Analysis of Current Legislation in South Africa

    outh Africans a year, with an annual cost of $3.7 billion.45 Based on the brief indication of the above findings it is evident that there is a. eed for improved and more robust laws to deal with cybercrime. With that being said the question one should ask is what was or what is South Africa's position regardi.

  15. Cyber Law

    The course has been designed keeping in mind the requirements of budding cyber lawyers and cybersecurity experts. The three modules of this course will help readers master the technicalities of cyber and information technology laws. The study material also focuses on the key aspects of Intellectual Property Rights, e-contracts and e-governance.

  16. PDF Cybercrime TEACHING GUIDE

    cybercrime investigation. The Modules cover cybercrime trends, theories, perspectives, laws, measures, and practices through. multidisciplinary lens. The Teaching Guide and 14 Modules are the result of collaborative work from leading experts and academics from over 25 countries on.

  17. (PDF) Cybercrime and Cybercriminals: A Comprehensive Study

    Available online at: www.ijcncs.org. E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Cybercrime and Cybercriminals: A Co mprehensive Study. REGNER SABILLON, JEIMY CANO, VICTOR CAVALLER, JORDI ...

  18. PDF Introduction to Indian Cyber Law

    This book is available as courseware for the Diploma in Cyber Law and PG Program in Cyber Law conducted by Asian School of Cyber Laws. www.asianlaws.org. 1. Jurisprudence of Cyber Law. Jurisprudence studies the concepts of law and the effect of social norms and regulations on the development of law. Jurisprudence refers to two different things.