As digital technologies evolve... As digital technologies evolve, cybercrime has become a growing threat to individuals, corporations, and governments worldwide. This paper explores the various fo...
Third-party data transfers in India need consent and contracts under the Digital Personal Data Protection Act, 2023 (DPDP Act). Cross-border data transfers are allowed unless restricted,...
With the rising influence of social media in India, there is increasing concern about its regulation to address issues like misinformation, privacy, and free speech. My article aims to tackle t...
In today's fast-evolving digital landscape, law firms find themselves standing at a critical juncture. While the digital transformation of legal services has brought about remarkable efficiency...
The increasing adoption of digital payments has coincided with a significant increase in cyber fraud, leaving many Indian victims unable to reclaim their misappropriated funds. Existing legal f...
The advent of the digital age has revolutionized the way individuals and organizations conduct business. Among the most significant changes is the emergence of electronic contracts or e-contrac...
The presence of Over-the-top (OTT) platforms like Amazon Prime has introduced a time of access to different and diverse content. However, this creative liberty accompanies an internal and exter...
This article explores the multifaceted phenomenon of deepfakes-AI-generated synthetic media that can convincingly imitate real people's voices, faces, and gestures. It examines the implications...
In an increasingly digitized world, cyber pornography-defined as the creation, distribution, and consumption of explicit sexual content via digital platforms-has become a pervasive yet contenti...
In the age of digital convenience, food arrives in minutes, cabs are summoned with a tap, and services come to our doorstep-thanks to gig workers. But while the tech platforms thrive, what legal ...
The application of Artificial Intelligence (AI) in legal research is revolutionizing the legal profession by saving time and altering conventional research patterns. AI applications, which can ...
Justice Isn't a Candle March: It's a Commitment We remember the man who didn't just write a Constitution but gave voice to the voiceless. Dr. B.R. Ambedkar was not only the father of the Indian ...
Cyber Crimes are unlawful demonstrations where the PC is utilized either as an instrument or an objective or both. The gigantic development in electronic business (online business) and online o...
Imagine waking up one morning and realizing that your company name-one you spent years cultivating—was registered by some individual and that they are charging you money to use it. This is no...
Data protection refers to a collection of laws, policies, and practices designed to reduce the impact on individual privacy resulting from the gathering, storage, and sharing of personal inform...
Understanding The Challenges In The Digital MarketplaceWith a rapid growth of e-commerce in India, online frauds have also taken a rise, affecting millions of consumers[1]. The main drawback whic...
In a world where your heartbeat can be used to open doors and DNA can be used to verify your identity, the line between privacy and security is getting blur. Imagine walking into a bank, hospit...
Authors of the research paper endeavor towards innovation in environmental monitoring and compliance through technology. Certainly, earth has changed significantly due to human inventions over ...
'The interface between Artificial Intelligence (AI) and the Copyright Law is a complex and evolving area of legal analysis. AI has the potential to generate creative works, but the question rem...
In today's digital marketplace, Clickwrap Arbitration Agreements are increasingly essential for e-commerce businesses seeking efficient legal dispute resolution. These agreements, integrated di...
AI (Artificial Intelligence) refers to the ability of a machine or computer system to perform tasks that typically require human intelligence, such as learning, reasoning, problem-solving, and ...
The Calcutta High Court, through notification No. 1913-RG issued on March 10, 2025, has implemented a significant procedural update concerning cyber fraud cases. This change empowers Magistrate...
Internet service providers' (ISPs') place in the digital world has grown in importance, although there is still debate in cyber law over their legal responsibility. This article explores the in...
As India moves rapidly toward a digital economy, cybersecurity has become a pressing concern. The rise in cybercrimes, data breaches, and digital fraud highlights the urgent need for a robust l...
The topic of freedom of expression and restrictions has once again come into a limelight with the recent controversy of the "India's Got Latent" Show which was aired on the Youtube, created by ...
Developing AI is really perplexing task for humans and for AI, is to understand us. However there have been several developments in this field and these developments are very tumultuous that go...
Cybercrime is the most disruptive threat for financial markets, but at the same time is the most underrated by both regulators and businesses. Cyber-attacks have already caused considerable dam...
"Childhood should be carefree, playing in the sun; not living a nightmare in the darkness of the soul." -- Dave Pelzer, A Child Called "It" Children are the most precious ...
In recent times, mostly human activities tend to rely more on technology, especially Information Technology (IT). We, human beings have the capability to think, analyse and act accordingly and ...
Privacy is not something that I'm merely entitled to, it's an absolute prerequisite." The Pegasus spyware scandal has ignited a global debate on privacy, surveillance, and the ethical u...
Corporate world being the pioneer in technological advancement carries most of its operation digitally, increasing it risk to succumb to cyber-attacks. The Pegasus spyware attack enhanced the n...
In today's interconnected world, where digital technology spread at every aspect of our lives, the threat of Cyber Crime is greater than ever before. As our reliance on digital technologies gro...
In the modern digital age, information and communication technology (ICT) has significantly transformed public administration through a concept known as electronic governance or e-governance. E...
The Food Safety and Standards Authority of India (FSSAI) is the regulatory frame accountable for ensuring the safety and great of food products. With the digitization of offerings, the FSSAI Ce...
International law plays a pivotal role in shaping cybersecurity and digital governance, especially as the digitalization of society continues to expand. This role is multi-faceted, encompassing...
The advent of quantum computing marks a paradigm shift in computational capabilities, with profound implications for cybersecurity. Quantum computers, capable of solving complex mathematical pr...
In an era where technological advancements permeate all aspects of life, the rise of technology-assisted crimes presents a significant challenge to individuals, businesses, and governments worl...
The social media is a big part of our lives today, and it raises important questions about how we communicate and how the law applies it. In the digital age, social media platforms have revolut...
In the age of rapid digital transformation, the rise of cybercrime has brought forth new and alarming threats. One such menace, often overlooked, is cyber kidnapping. While kidnapping has tradi...
Deepfakes, videos or audio recordings manipulated using artificial intelligence to depict someone saying or doing something they never did, are rapidly evolving from a novelty to a serious soci...
Orientation:The Indian e-commerce market has witnessed unprecedented growth in recent years, driven by increasing internet penetration, growing smartphone adoption, and a rising middle class wi...
In an era where digital technology reigns supreme, a sinister threat lurks in the shadows of our online world: deepfake cyberbullying. This insidious form of harassment combines the age-old pro...
In today's interconnected world, where communication transcends borders and information spreads at lightning speed, the digital landscape has also become a breeding ground for hostility and abu...
In the 21st century, digital advancements have transformed how societies function. With this transformation comes the growing tension between two essential priorities: the right to privacy and ...
Cyberbullying is a growing problem worldwide, especially in the digital age where the internet and social media platforms are central to communication. It involves using digital tools like soci...
"Protecting personal data is not just a chance or choice; it's a fundamental right in our present digital age." The "Digital Personal Data Protection Bill" was officially s...
Online Harassment: The variety of good things but on the other hand, it simply The Internet with its amazing property and plenty of resources offers provides a straightforward platform for com...
Life and personal liberty can be regarded as absolute rights which an individual possess by the fact of his being a human. These rights are essentially part of any dignified human existence. Ac...
The omnipresent internet which is a modern-day need, has democratized us even more by making data and information easily accessible. But still, it has also introduced new digital threats into o...
Artificial Intelligence (AI) is increasingly being integrated into various sectors, including the judiciary, to enhance efficiency and accuracy. The judicial system, often criticized for its de...
The significance of data protection in current digital or information age can't be ignored. A strong data protection system is much more required as technology develops and global communication...
The purpose of this paper is to analyze whether the emergence of digital banking is a boon or a bane or it is both. The transformation of the digital sector has brought significant convenience ...
The future is evolving digitally at an outstanding speed and the transition is day by day getting faster.The swift progress in AI has led to growth of many industries including healthcare,finan...
The Digital Personal Data Protection Act of 2023 received the President's assent on August 23, 2023, but has not been enforced yet in the country. This Act aims to provide for the protection of...
The quick and speedy development of A.I. is affecting various industries without any exception to the Legal Profession. The article further illustrates the vast impact which the A.I. is making ...
India is a hub of internet users. More than 900 million people in India have access to internet. Most of them also have their social media accounts, but are totally unaware of the increasing me...
In 2023, the Government Of India took a significant step by passing the Digital Personal Data Protection Act to establish a framework for data protection in India's rapidly evolving digital era...
The Information Technology (IT) Act, 2000, was enacted to provide a legal framework for electronic commerce, electronic governance, and cybersecurity. Over time, the rapid growth of digital tec...
Legal aspect of data privacy is a crucial topic in today's digital world. With increasing reliance on technology by today's generation whether it's for education, job or entertainment purpose c...
In India, human-driven technical development has the power to genuinely change people's attitudes and viewpoints. employing a human method can make you reasonably secure, but employing software...
International Criminal Police Organization' is an intergovernmental organisation. There are 195 member nations. By giving police across the globe access to and sharing information about crimes ...
In the recent past, online frauds have caused nearly five times more loss than conventional crimes like murder, theft, burglary, etc., with the metro cities having registered most of them as pe...
A planned disruption of the internet or electronic communications to the point where they are either totally or partially inoperable or useless is sometimes referred to as an internet shutdown....
The use of the Internet has become a daily routine for most of the people for daily transactions. The number of Internet users has grown enormously, as has cybercrime. Cybercrime is the crime t...
The rapid growth of online platforms naturally causes huge disruptions to the traditional business models in most industries. With such technological leapfrogging and consumer preference shift ...
In this research paper we will try to investigate the relationship between cybercrime and infringement of intellectual property rights. People generally believe that they want everything for fr...
The digital revolution has brought about significant changes in the banking and financial sectors, offering unprecedented convenience to users. However, this convenience has also led to a rise ...
The dark web represents a concealed segment of the internet that facilitates anonymous communication and transactions, attracting both individuals seeking privacy and those engaged in illicit a...
Data privacy has become one of the most significant aspects of cyber law in today's digital world. As individuals and organizations store and share vast amounts of personal information online, ...
The digital age, characterized by unprecedented technological advancements and connectivity, has revolutionized the way individuals, businesses, and governments operate. However, this transform...
In today's interconnected world, the digitization of personal information has brought unparalleled convenience but has also introduced substantial cybersecurity risks. A notable example of thes...
Electronic contract is a contract which is formed through electronic communication. These can be entered either through e-mail or click wrap or browse wrap agreements. At present there is an in...
Deepfake technology, driven by artificial intelligence, is capable of producing highly real digital forgeries, and it often manipulates images, videos, and audio to impersonate individuals. Dee...
Privacy is a critical element for the development of human personalities. Previously, man owned personal property such as land and a house. As a result, his privacy was tied to his own property...
The use of social media as a tool for manipulation poses significant challenges worldwide, affecting public sentiment, intensifying divisions, and endangering democratic systems. This article i...
Identity theft has become a widespread issue especially with advancement in technological growth popularly referred to as post internet age. As individuals store services and their personal inf...
Legislation is constantly affecting the way in which software developers can create software systems, and deliver them to their users. This raises the need for methods and tools that support de...
The Indian digital revolution has put cybersecurity at such an important juncture in relation to national security, economic stability, and public trust. While digital technologies are being in...
These days, computers and the internet are almost necessities. Both individuals and society use them to make their lives simpler. Like keeping records, communicating, processing data, coordinat...
Since last 2 decades we as a society have been seeing the rapid growth of social media. May it be face book, Instagram, Whatsapp, and endless more such platforms which created a space for human...
Cybersquatting, often referred to as domain squatting, is the act of registering, selling, or utilizing domain names that closely resemble or are identical to the trademarks or brand names of e...
Cyberstalking, in laymen language can be defined as a form of harassment which is done electronically, such behaviors can include sending out harassing or threatening messages, emails, posting ...
Development in the technological sector has increased ease and accessibility manyfold. Many nations have also adopted the use of modern technology for national and legal purposes. The Indian go...
"Saying, 'I don't care about privacy because I have nothing to hide,' is like saying, 'I don't care about freedom of speech because I have nothing to say.' It's a fundamental principle of ...
Companies worldwide are grappling with the increasing significance of cybersecurity within tech-advanced societies today. Mostly, this concern arises from the heavy reliance on digital infrastr...
The Indian judiciary is one of the most critical pillars of democracy, playing a fundamental role in upholding the rule of law, safeguarding constitutional rights, and ensuring justice for all....
The Indian Evidence Act of 1872[1] was established to systematize rules for presenting evidence in court proceedings. Section 3 of the Act[2] defines 'evidence' to encompass both oral statement...
Data has become extremely important in the modern age with some of the industry specialists quoting data as new age money. In such case, the protection of data becomes extremely crucial for the...
Pre-Trial IncarcerationPre-trial incarceration/detention is the process of keeping a person who has been arrested in custody before conviction. Pre-trail incarceration/detention refers to detai...
What is Online Transactions Fraud?Online Transaction Fraud is any type of false or illegal transaction completed by a cybercriminal. The perpetrator deprives the victim of funds, personal prope...
Most cybercrime is an attack on information about individuals, corporations, or governments. take place on the personal or corporate virtual body which is given on internet. The people use soci...
The internet has been in existence since 1960's and the World Wide Web (WWW) since 1990's. The International Telecommunications Union estimates that almost 40% of the world's population and ove...
Cyber Crime What Is Cyber Crime? A cybercrime is defined as an offence where the Internet, computers and mobile devices are used to commit criminal misconduct. Some examples of this may be cy...
Digital India Act (2023)The Digital India Act, of 2023 is a proactive step by the Ministry of Electronics and Information Technology (MeitY) that is consistent with India's ambitious 'Digital I...
The advent of Artificial Intelligence (AI) has transformed various sectors, including cybersecurity and legal frameworks. This research paper delves into the intersection of AI and cyber law, e...
Crime is a marvel of society and economy alike. It predates human culture by a significant margin. Many ancient literature from before the times of fame, as well as folktales, have described cr...
Section 105 of the BNSS - Documenting Search and Seizure via Audio-Video Electronic Methods:When carrying out a search of a location or seizing any property, item, or object under this Section ...
Social media in today's generation plays a very crucial role in influencing an individual's thought process, and behaviour and actions. It has also emerged as a tool in the dissemination of ter...
Cybercrime has significantly increased in India lately, endangering the country's economy and culture. As digitalization and internet usage rise, cybercriminals have found new ways to exploit...
Malware: This refers to malicious software designed to cause harm to your computer systems or data. It can range from disrupting your system's functionality to stealing sensitive information. ...
Mobile forensics involves a range of techniques and concepts used to extract and analyze data from mobile devices. Here's a breakdown of key terms: Device Identification: IMEI (I...
India is one of the most diverse countries in the world. The country's population is equivalent to 17.76% of the total world population, which makes it number 1 on the list of country's populat...
Canary tokens, named after the 'canary in a coal mine' which warned miners of dangerous gases, are cybersecurity tools designed to detect unauthorized access or breaches. They function as tripw...
Banking system is one of the systems which have not only survived the test of time but have also successfully adopted technology to enhance its reach and services. In fact, no industry has been...
Social media is an intermediary (such as on websites for social networking and microblogging) through which users share information, ideas, personal messages, and other content (such as videos)...
As the digital landscape continues to expand at an unprecedented pace, e-commerce has emerged as a significant force in India's retail industry. With the advent of robust online marketplaces, c...
In the bustling streets of India's cities, where the hum of traffic meets the aroma of street food, a new workforce is silently shaping the future. These are the gig workers the delivery ...
The 2014 cyberattack on Sony Pictures Entertainment (SPE) serves as a stark reminder that even highly secure organizations are vulnerable to sophisticated attacks. This case study delves into t...
Cybersecurity insurance, also known as cyber liability or cyber insurance, is a policy that assists organizations in managing risk exposure by covering the costs associated with recovering from...
What is Artificial Intelligence?The capacity of a digital computer or computer-controlled robot to perform tasks typically associated with intelligent beings. AI systems function by ingesting v...
According to a recent study by the Institute for Ethics in AI, incidents involving AI-inflicted harm have risen by 300% in the past decade, raising pressing questions about accountability and l...
In today's digital world, safeguarding sensitive information is paramount, both for individuals and organizations. As cyber threats become increasingly sophisticated, proactive measures are ess...
Cybersecurity encompasses the comprehensive protection of digital systems and infrastructure from unauthorized access, sabotage, and theft. It involves implementing a wide array of technologies...
Cybersecurity is a constantly evolving landscape, with new threats and challenges emerging on a regular basis. Recent developments in 2024 have highlighted several key issues, including: ...
Artificial intelligence and criminal law both are major concerning part of society. In this evolving or technological era both of these concepts are gradually vasting their meaning and scope. C...
Identity theft is a sneaky crime that entails the unauthorized use of someone else's data for illicit gains. An individual's most private information, including their name, Social Security numb...
The term 'computer' is described in Section 2(i) of the Information Technology Act, 2000 which means any instrument and includes the output of information its processing and storing it in digit...
The advent of the digital era has propelled location data to the forefront, serving as a crucial resource for industries spanning from tailored marketing campaigns to life-saving emergency resp...
Artificial Intelligence, a powerful tool reshaping industries and our daily lives, comes with its own set of ethical challenges. One particularly alarming development is the rise of deepfake te...
In the digital era, Information Technology (IT) is pivotal, reshaping human life and introducing social, political, and ethical challenges, especially in cyberspace. Cybercrime, a significant c...
In recent years, e-commerce has undergone exponential growth. In 2016, the European e-commerce market exceeded the 500 billion threshold, with the United Kingdom contributing approximately 157 ...
The burgeoning melody of Artificial Intelligence (AI) promises a transformative symphony for India, yet its harmonious notes carry whispers of discord, potentially dissonant with fundamental ri...
The internet, a global network connecting billions, has transformed the way we access and share information. This vast digital landscape, however, presents a double-edged sword. As we navigate ...
Cyber stalking involves pervasive digital harassment by invading a victim's privacy and constantly monitoring their movements. This intrusion can induce fear, intimidation, and a profound sense...
What is cyber security?Cybersecurity is a security for technical devices seeks to protect individuals' and organisations' systems, apps, computing devices, sensitive data, and financial assets ...
Winfield defined Tort as "Tortious liability"[1] arises from a breach of duty primarily fixed by law; This duty is towards persons generally, and its breach is redressible by an action for unli...
In an increasingly digital world where information flows freely and connectivity knows no bounds, the importance of cyber law cannot be overstated. As technology continues to evolve at a rapid ...
Social media has become a cornerstone of contemporary life, connecting people globally and fostering unprecedented communication and idea exchange. This interconnected world, however, has also ...
In an era defined by digital transformation, the landscape of scholarly communication is undergoing profound changes, particularly within the humanities and social sciences. As traditional mo...
Cyber law, sometimes referred to as Internet law or IT law, is an important area of law that regulates the digital environment. It covers issues related to information security, e-commerce, leg...
What is AI?Artificial intelligence is the simulation of human intelligence performed by machines like computer systems. Artificial Intelligence has transformed our ordinary lives in ways we m...
Spear phishing, a highly targeted cyberattack, aims to deceive specific individuals into divulging sensitive data, such as login credentials or financial information. It masquerades as a legiti...
This legal article aims to bring to light the emerging issue of organized financial crimes on the internet, both in India and globally In the past decade, India has embarked on its digital fina...
In an increasingly digital age, the intersection of cybersecurity and human rights has become a critical issue. As more and more aspects of daily life move online, from personal communications ...
Recently UP Board Class 10 examinations topper faced severe trolling on social media over her facial hair. During a recent interview with BBC News Hindi, she said, "When I saw that people were ...
In the vast expanse of the digital world, where every click and scroll holds the potential for contractual obligation, browse wrap agreements quietly establish the terms and conditions governin...
Cyberbullying is a widespread problem that impacts millions of people globally, especially young people who use social media. A rising number of people are interested in creating artificial int...
The metaverse is a virtual space where humans, disregarding any geographical barriers, can interact with each other and represent themselves through their customized avatars. It can be asserted...
In recent years, the legal industry has witnessed a significant transformation driven by the emergence of legal technology startups. These startups, often referred to as "LegalTech" c...
As Artificial Intelligence (AI) continues to advance rapidly, concerns about its alignment with legal and ethical frameworks become increasingly relevant. This essay analyses the intricate issu...
Cyber vandalism, also known as electronic vandalism, is the malicious act of deliberately disrupting, damaging, or defacing electronic systems, networks, or digital assets. This encompasses a b...
Social media is becoming a vital part of everyday life in this high-tech era, and most young people these days choose to use it to share their ideas, opinions, and thoughts. Users may easily ac...
As the name implies, biometric technology is technology that is based on a person's particular bodily traits. It allows a person to distinguish himself from other people and/or create a unique ...
Traditionally, trademarks have been associated with words, names, symbols, and logos that distinguish goods and services in the marketplace. However, with the evolving dynamics of business and ...
Digital technology has transformed entertainment, offering us access to vast archives of content at our fingertips. But this digital renaissance also comes with its own downside - digital pirac...
Privacy literally means to being let alone and the right to privacy refers to the right to be alone. Privacy is something which can be stated as when as long as the people, organizations or ins...
Artificial Intelligence (AI) has been around since the early 1950s and has become the buzz of the tech world. AI is not based on human-like carbon-based tissues, but rather silicon-based chipse...
With the advancements in technology and the advent of the digital era, Artificial Intelligence (AI) has delved into various facets of the society. The application of AI in various fields have b...
In the field of artificial intelligence, there has been a notable transition from primarily cognitive tasks to a more comprehensive comprehension of human behaviour. One intriguing development ...
In today's digital era, the intersection of privacy and media has become a pressing concern for individuals, corporations, and governments alike. With the rapid advancement of technology, the b...
The digital age has ushered in an era of unprecedented connectivity and entertainment, revolutionizing the way individuals across the globe engage with leisure activities. In India, the realm o...
Artificial Intelligence (AI) has emerged as a transformative force with the potential to revolutionize various aspects of society, including the labour force. As AI technology continues to adva...
The constitutional right to privacy is a fundamental pillar of individual freedom and autonomy. In India, this right was explicitly recognized by the Supreme Court in a landmark judgment in 201...
Cyber Security plays an important role in the field of information technology securing the information have become one of the biggest challenges in the present day. When ever we think about the...
In this rapidly changing world, the Internet has changed mainly every dimension of our lives involving the legal domain. As many advancements have been made in technology, the legal sector has ...
The digital lending landscape in India has undergone a major shift, incorporating technological innovation with traditional banking services. This evolution of traditional banking services for ...
"There exists a significant difference between amour de soi and amour propre" - - Jean Jacques Rousseau According to Rousseau, "amour de soi" is a type of love that is instinctual and not se...
In a dynamic society that we live in technology and interpersonal connections are two things which keep on evolving. This article seeks to bring to light the small intricacies between social me...
Photo Of Bathing Categorized As Explicit Child Abuse: Neel Shukla a 24 year old computer engineer uploaded his photo to his Google drive, one showed him bath when he was two years old. It was a ...
Voice Cloning:The process of voice cloning, also known as speech synthesis, revolves around producing an artificial reproduction of an individual's voice using advanced deep learning methods. T...
Cybersecurity has become a critical global concern in today's hyperconnected world, with cyber threats posing significant risks to national security. The present paper delves into the multiface...
The 'Data Protection Bill' refers to legislation or a legal framework that regulates the safeguarding and administration of persons data by businesses and governments. A Data Protection Bill...
"It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it" -- Stephane Nappo The digital well-interconnected world is a dynamic realm offering immense opportuni...
In an era where the digital landscape is an integral part of our daily lives, the Indian government has taken a significant stride to protect consumer rights. Recognizing the escalating risks o...
Hacking: Unauthorized access to computer systems or networks is the main focus of hacking, a broad range of activities. A hacker, the individual responsible for these actions, may alter system...
Privacy is a fundamental human right that is enshrined in the Universal Declaration of Human Rights and other international human rights instruments. With the rapid advancement of technology an...
In the modern world, the contours of warfare have expanded beyond the traditional battlefield. The digital realm has emerged as a critical theater of operations, influencing not just military e...
Cyber law is a field that is constantly changing thanks to the Internet. Cyber law covers internet commerce, freedom of speech, intellectual property rights, jurisdiction and choice of law, and...
Mr. Ravi Shankar Prasad, Minister of Electronics and Information Technology, presented the Personal Data Protection Bill, 2019, in Lok Sabha on December 11, 2019 the bill was referred by standi...
The Metaverse, the successor to today's internet, stands as a beacon of the future, promising an immersive, 3D virtual world. It embodies the dream of a future with endless potential. However, ...
An important piece of legislation in India that covers a range of legal issues pertaining to the use of information technology and Internet commerce is the Information Technology Act, of 2000 (...
In recent years, India has witnessed a significant surge in cybercrime, posing a growing threat to its economy and society. With the rapid digitization and widespread internet penetration, cybe...
This explores the intricate relationship between Artificial Intelligence (AI) and liability laws. In the dynamic landscape of AI deployment, questions of responsibility arise in cases of uninte...
The term cyber crime is not defined in any of the Act or statue passed by the Indian legislature but in simple way it can be define the Cyber crime is a crime which is committed or carried out ...
In the contemporary digital era, IT acts play a pivotal role in shaping and governing the landscape of electronic transactions, data security, and the combat against cybercrimes. Nepal and Indi...
Legal Measures To Prevent Manipulation Social media refers to online platforms and websites that enable users to create, share, and exchange content with others. These platforms are designed to ...
The field of artificial intelligence (AI) is growing quickly. It is anticipated that in the ensuing ten years, AI technology will become widely available in homes, workplaces, businesses, and t...
"The digital age has brought countless benefits, but with it comes the dark side of cybercrime. Cyber kidnapping has emerged as a significant threat, putting individuals, organizations, an...
This explores the intricate relationship between Artificial Intelligence (AI) and liability laws. In the dynamic landscape of AI deployment, questions of responsibility arise in cases of uninte...
In the twenty-first century, the use of technology has grown rapidly on a global scale. Technology has become an essential part of modern living. It is vital to evaluate the enormous influence ...
This research paper will talk about a new emerging danger of cybercrime which is becoming more and more prevalent in today's time as the new advancement in the e-commerce industry and the techn...
Cyber is a prefix that is used to identify anything as belonging to the information and computer age. Cyber law includes all of these governing systems and legal structures. In cyberspace, ever...
Artificial intelligence and the Internet of ThingsArtificial Intelligence (AI) and the Internet of Things (IoT) are revolutionary technologies of today's time. Let us understand one by one. AI...
What is Cyber SecurityCyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as informati...
The Digital Personal Data Protection Act, 2023 (DPDP Act) marks a significant milestone in India's journey towards safeguarding individual privacy in the digital age. This Act, passed after yea...
Music industry has gone through tremendous changes from its start to the present day online streaming. At the very beginning of audio industry there are Gramophones in fashion which lasted for ...
The proliferation of cyberpornography has become a significant global concern, particularly in India, as a result of the rapid advancements in digital technology and the internet. Given the com...
Object and Application under the ActThe Information Technology Act, 2000 (IT Act) is an important piece of legislation in India that addresses various aspects of the digital and cyber domain, i...
Abstract: The surge in cybercrimes presents serious risks to national security as the globe grows more interconnected. The usefulness of cyber laws in reducing cybercrimes and defending nationa...
In the late 1990s, amid the evolving landscape of the digital age, two research organizations within the US Department of Defence embarked on a mission to create a clandestine network designed ...
In this era, when technology is turning this whole world into a global village making the world witness a proliferation of cybercrime and the dissemination of explicit content through the cyber...
Artificial Intelligence (AI) has taken the world by storm. It is a revolutionary technology that can do almost everything that humans can do, or more efficiently than humans. The first upsurge ...
The Internet has changed the world and society more than ever. It has given a stage to new freedoms through advancement. Web has cultivated the incomparability of thoughts instead of capital. I...
In the era of the digital age, social media has become an integral part of our lives, providing a platform for people to connect and interact. However, it has also given rise to concerning issu...
India's Constitution recognizes privacy as a fundamental right in Article 21 . Since there was no legislation pertaining to data protection at first, there were claims of violations of private ...
The Digital Personal Data Protection Bill, 2022 ("PDP Bill") was framed with an aim to protect the personal data of individuals, to regulate the processing of digital personal data while protec...
The Digital India Act, 2023 (DIA), is being formulated with an aim to replace the existing Information Technology ("IT Act"). The DI Act seeks to transform the internet landscape toda...
The Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (hereinafter called "SPDI Rules") provides for the regulation of...
The advancement of technology has made man dependent on internet for all his needs. Internet has given man access to everything while sitting at one place. Social networking, online shopping, o...
Data Protection and Digital Rights in India: Safeguarding Privacy in the Digital sphere Data Protection is the process of protecting individual's personal information which is collected, proce...
As the world is in a fast moving track and in today's digitally connected world, there is a generation of various amount of data by several entities. This data contains a significant value and ...
Privacy has always been a fundamental aspect of human existence, safeguarding personal space, autonomy, and the ability to control one's own information. However, in the digital age, the concep...
Introduction The primary cybercrime in India involves sharing explicit content online, against the law under Section 67 of the Information Technology Act, 2000. Hacking ranks second, punishabl...
Art and culture are two essential elements of human society that reflect the collective values, beliefs, and attitudes of a particular community. In India, the freedom of expression, including ...
This article seeks to elucidate the objectives, rights, and obligations of individuals and corporations under the California Privacy Rights Act, 2020 in light of its importance for Indian bus...
Blockchain technology is an advanced database mechanism that allows transparent information sharing within a business network. A blockchain database stores data in blocks that are linked togeth...
General Data Protection Regulation (GDPR), formulated by the European Union and applicable in the EU and the European Economic Areas. It is a regulation in EU law for data privacy and protectio...
Facial Recognition Technology and Its Violations of Human RightsA way forward into the vicissitudes of technology, its applications, and implications in the legal sphere. Introduction Technol...
The rise of Over-the-Top (OTT) platforms is writing a revolutionary chapter in the history of media. The landscape of content consumption has undergone a significant transformation, upending lo...
The Pegasus spyware incident that came to light in 2021 sparked a global debate about surveillance, privacy, and security. In the Indian context, where concerns about privacy have been a recurr...
On November 18, 2022, the Indian government announced a fresh draught Digital Personal Data Protection Bill,2022 (the "Draught Bill").The Draught Bill is now available for public comm...
"If liberty means anything at all it means the right to tell people what they do not want to hear." - George Orwell Ever since the Information Technology (Guidelines for Intermediaries and Dig...
On August 3rd 2023, when the Bill was passed it was intended to cover the processing of digital personal data that is collected in India, whether it is done so online or off. If the processing ...
Is Social media installing democratic values in Indian Citizens?Social media can have both positive and negative impacts on democratic values in Indian citizens. On one hand, social media provide...
"The Internet is becoming the town square for the global village of tomorrow"-Bill Gates As the use of social media and the internet has increased, cyberbullying has become a significant probl...
The Law field demands an exceptional expertise in the skill of legal research, for one to reach the top levels. The methodology of legal research has evolved over the years. It has become much ...
The collection of personal data at a large scale has become a common practice in India, with employers, shop owners, schools, government, and other entities collecting and processing personal d...
Technology which is revolutionising every aspect of our lives, has also revolutionised education which is an important aspect of every human's life. Digital Education has emerged as a powerful ...
In the realm of crafting compelling content, two vital elements take centre stage: "perplexity" and "burstiness." Perplexity, the gauge of textual intricacy, and burstiness, the spectrum of sen...
Information and communication mean of survival of modern living, for our well-being it's very important to us realise that how well and how fast we build and distribute in the society whi...
The future of cybercrime is a topic of rising concern as our world becomes increasingly digitized and interconnected. The rapid evolution of technology has not only brought numerous benefits bu...
Artificial Intelligence (AI) has made significant advancements in different sectors. In today's constantly evolving world, the intersection between technology and various industries has become ...
Online fraud utilizing fake identities presents a complex legal landscape characterized by a convergence of criminal, civil, and regulatory aspects. This analysis examines the legal dimensions ...
Introduction Cryptocurrency, a fusion of "crypto" and "currency," is a form of digital money. "Crypto" signifies secrecy, while "currency" pertains to mon...
In an era where data is the new oil, nations across the world are rigorously enacting regulations to ensure the privacy and protection of their citizen's data. India, a burgeoning digital econo...
Right to PrivacyThe right to privacy is inextricably bound up with all exercises of human liberty both as it is specifically enumerated across Part III, and as it is guaranteed in the residue u...
Cryptocurrencies have increasingly become a prime target for cybercriminals, drawn to the notion that fraudulent transactions cannot be reversed, providing them with a false sense of security f...
Harassment via phone calls, through messages, and other communication platforms is a very common way of abuse. These days, it has become quite common for people to receive harassing phone calls...
In an increasingly digitalized world, where data has become a precious commodity, safeguarding individuals' privacy and personal information has become paramount. As data breaches and privacy c...
"The DPDP Bill achieves a crucial balance between upholding users' rights and encouraging innovation in digital enterprises. Some of its most beneficial elements for business include the abolit...
In the globe, cybercrime is a "relatively recent form of crime. Any unlawful activity that takes place on or using technology that is acknowledged by the "Information Technology Act1,"...
SECTION 1 In the globe, cybercrime is a "relatively recent form of crime. Any unlawful activity that takes place on or using technology that is acknowledged by the "Information Technology...
Cybercrime is the technological offence which is increasing rapidly in this era. Increasing development and electronic generation is consist of both pros and cons. It generally harms the privac...
Shreya Singhal vs UOI is one of the high-profile digital rights cases in which the supreme court invalidated section 66A of the IT act in its entirety in order to protect the freedom of speech ...
The IOS hack involving Pegasus was found in August 2016. A text message offering "secrets" about torture in UAE prisons was sent to Ahmed Mansoor, an Arab human rights activist. The U...
With 130 million players, India has become the fantasy sports industry's largest market. An online game is a game accessible via the Internet and can be played by a user through a computer/smar...
Artificial Intelligence (AI), known by a few as the industrial revolution (IR) 4.0, is getting to alter not as it were the way we do things, how we relate to others, but moreover what we know a...
Most People unknowingly accepted clickwrap agreements numerous times, such as after downloading an app, creating an online account, or electronically signing paperwork. Clickwraps are a quick w...
The Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 ("Intermediary Rules") provides for the due diligence required to be followed by the Intermediarie...
Social media has transformed modern civilization, changing communication, connectivity, and information consumption."Social media" are computer-mediated technologies that make it easier to shar...
The world without the internet is unimaginable, one of the significant invention of all times. Internet is an only tool which drives you throughout the day. The internet can be defined as a glo...
The term artificial intelligence (AI) is prominent in the today's world of technology. In so many ways, it is still a developing science in light of the problems presented by the twenty-first c...
The need to advance and enhance current technologies has always pushed man towards bettering computer network systems. Advances in cyberspace have resulted in significant growth, which has serv...
We live in a world where, for our amusement and necessity, we have converted several things into virtual form, but there are major things which cannot partake physical things. ...
Cybercrime has become a significant issue and a real-time threat in the recent decades. Vulnerability towards digital infrastructure has been observed due to the rampant use of technology and i...
In recent years, India has witnessed a significant surge in cybercrime, posing a growing threat to its economy and society. With rapid digitization and widespread internet penetration, cybercri...
Crime is not new to the world it is as old as the human society with the passage of time. The society has changed and so has the effect of crime with the emergence of development in the new era...
The current state of cyberspace is one of extraordinary change and upheaval. Technology is developing at a breakneck pace; newer innovations and improvements appear before the ones that are alr...
In this context, we will discuss on meaning and concept of cyber space, cyber space and virtual world and position of right to internet under the fundamental right as well as right to education...
These days cyber bullying is becoming more rampant as people spend most of their time using technology to keep in touch with the world. There are many different ways in which cyberbullies can rea...
Artificial Intelligence (AI) has become an increasingly popular tool in law enforcement and criminal justice systems. While AI has the potential to revolutionise the way we approach crime preve...
been taken from Latin term 'privatus' which means' separated from the rest' deprived of something, especially office, participation in the government' and from 'privo' which means 'to deprive',...
Defining Cyberstalking The concept of cyberstalking can be defined as a crime committed by someone who stalks someone using the internet or another electronic device. The terms "cyberstalki...
"As technology advances, so must our laws and our ability to enforce them."- Senator Dianne Feinstein Cyberspace is the term for the online environment created by computer networks ...
Cryptocurrency also referred to as crypto is a digital currency that has no physical existence and unlike any other currency cannot be used in any kind of transactions physically, moreover the ...
Cybersecurity refers to the protection of computer systems, networks, and electronic devices from theft, damage, or unauthorized access. With the increasing dependence on technology in today's ...
This research paper aims to present the drawbacks and inefficiencies of the I.T. Act, 2000, and the amendment of 2008 and further suggests solutions to overcome these fallacies. Cyber law in In...
"I like the line: Nothing can stop an idea whose time has come. And that idea, for now, is blockchain. Crypto and Web 3.0 are the applications of blockchain technology. In the future, most of t...
In 2022, Lakhs of people watched South Indian, thriller movie named, "Enemy" wherein a fictional Union Minister was about to be assassinated via terrorist cyberattack on her pacemaker. While th...
We belong to a generation where one does not have complete control over their personal privacy or it might be said that privacy no longer exists with the presence of internet. As the technology...
The increasing plethora of Digital Devices across the world has emerged the issue of digital security and thereby increasing the huge number of crimes in the cyber world. Digital Forensics is...
A DAO is an approach built by rules encoded like a computer program, for a community led by no central authority, rather controlled by it's organization's members. It is a system which is compl...
One of the most crucial stages of a trial is the recording of the evidence. Indian courts and tribunals prefer the physical method of recording witness testimony, but as we all know, there are ...
E-commerce transactions have gained immense popularity in India in recent years. With the widespread availability of internet connectivity and increasing smartphone usage, more and more people ...
Brief History of Data Protection Laws for Children in the USA and EUData protection laws have a long history, and the protection of children's personal data is a relatively new development. In th...
Cybercrime is a crime that is committed online. In essence, it is an offence to use a computer or the internet with the intention of libellous behaviour against a person or group of people or t...
Data PrivacyData privacy, occasionally also appertained to as information privacy, is an area of data protection that concerns the proper running of sensitive data including, especially, partic...
With its extensive property and wealth of resources, the Internet offers a simple setting for criminal activity. One such crime that has developed over the past 20 years is cyber stalking. As l...
The rate of global terrorism expansion is increasing, Nowadays, terrorism has widespread and includes terrorism in the cybersphere, or the virtual world, as opposed to just terrorism that cause...
The Internet with its amazing property and plenty of resources offers a variety of good things but on the other hand, it simply provides a straightforward platform for committing offenses. Hara...
There have been multiple attempts to use movies, and documentaries to depict the power and usage of Artificial Intelligence in the future. But now we seem much closer to reality. ChatGPT took t...
Identity theft has become a widespread and growing concern in recent years, as technological advancements have made it easier for criminals to access and misuse personal information. Identity t...
Technology has been evolving at an unprecedented pace, and it has become an integral part of our lives. It has made our lives easier, faster, and more efficient. From smartphones to laptops, fr...
Cyber Feminism is a women's activist methodology which close the relationship between the internet, the cyber space, and innovation. It tends to be utilized to allude to a way of thinking, proc...
The counteraction of unapproved or unexpected admittance to, change of, or obliteration of information put away on PCs, as well as projects, organizations, and other computerized resources, is ...
The rise of digital technology has brought many benefits to society, but it has also created new challenges, particularly in the area of cybersecurity. Cybercrime has become an increasingly pre...
It's not just about bombs and missiles, countries are now using computers and the power of the internet to attack their enemies. Cyberspace is the new battleground and cyberattacks are the new...
The word 'crypto' is derived from the Ancient Greek word "krupt's" which means 'hidden, secret' and the word currency is derived from the Latin word "currēns" which means 'to flow.' Hence, ...
The Digital Personal Data Protection Bill, 2022 ("DP Bill") draught was made public by the Ministry of Electronics and Information Technology on November 18, 2022, and interested part...
In today's modern era social media plays a very crucial /vital role in everyone's life, most of the people uses this medium to communicate to others or share their views, opinions and ideas thr...
On 25th February, 2021, government of India had framed Information technology act (Guidelines for Intermediaries and Digital Media Ethics Code), 2021[1]. This rule have been framed in exercise ...
Jamtara is new district created by separating from Dumka district. It is bounded by Deoghar district in north, Dumka and West Bengal in the east, Dhanbad and West Bengal in the south and Giridi...
In a country which is speeding up on becoming a paperless economy and Digital banking becoming the new normal, receiving an unsigned business letter/Receipt/Advice/invoice bearing particulars "...
In a developing nation like India in past two decades there has been seen a rapid growth not only in the Cyber World but also in all other sectors, with latest technologies and high speed inter...
Center's Ministry of Electronic and Information Technology recently tabled another version of data protection bill called Digital Personal Data Protection Bill, 2022. This is the fourth instanc...
Online shopping has picked up a desirable pace in this growing digital world. The concept of digital India has certainly opened manifold opportunities, and platforms for e-commerce businesses a...
Cyberwarfare is a type of network- or computer-based conflict in which one nation-state targets another nation-state with politically motivated attacks. Nation-state actors engage in these type...
We are living in the age where we don't have to put more effort for money transfer from banks or we don't have to stand in line for long hours for bank works and even these days we can get any ...
Introduction In this era of rapid digitization and growing reliance on the Internet in areas like as trade, business, security, communication, and education, among other things, the topic of "...
A company called Global Science Research developed an app called 'This is Your Digital Life' in 2013 with an aim of targeting Facebook users. It collected their online data and maintained track...
What is Catfishing or Duping?Duping or Catfishing is the point at which somebody utilizes pictures and data (frequently taken from others social media accounts) to make another character on the...
New draft of Data Protection Bill is 'toothless' To ensure data protection, some persistent gaps need to be closed. The Union Government has released a new version of the Personal Data Protecti...
How HTTP Cookies are being used to gather data HTTP is used by browsers and helps developers create your personalized and accessible site. Cookies store information about your browsing. ...
What is a Electricity Bill Scam?In a electricity bill scam, somebody pretend to be from a respectable electricity organization and lets you know that you need to pay a past-due electricity or g...
The prevention of unauthorised or unintentional access to, modification of, or destruction of data stored on computers, as well as programmes, networks, and other digital assets, is the process...
What is Blockchain?We as a whole understand what an information base is. A data set is an assortment of tables that have related information coordinated as lines. A data set is commonly put awa...
Under 10 years subsequent to assisting the Partnered powers with winning The Second Great War by breaking the Nazi encryption machine Puzzle, mathematician Alan Turing changed history a second ...
"Rs 30,000 has been credited to your account. Click on the link below and enter details to update the amount in your account". This is a typical malicious claim devised by cyber fraud...
Founder's Agreement is nothing but a foundation forStartups. It is the first and foremost document for the startup. Founder Agreement: To have a detailed Founder Agreement is what lays the f...
What are Virtual Currencies?A virtual Currency is a digital representation of value that is only available in electronic form. It is stored and transacted through designated software, mobile, o...
This research draft analyses the Personal Data Protection Bill presented by the Ministry of Electronics and Information Technology (MeiTY), in 2019. The bill was brought up on the recommendatio...
The cyber crime is different from any other crime happening in the society. The cyber crime define to criminal activity in which computers or computer networks are a tool a target or a place of...
Digital markets are an integral part of the economy and have become a critical component of competition law enforcement. These markets have changed rapidly in recent years, with new platforms a...
"Every decision is owned by algorithms which are moral decadence" According to research firm IDC, the Artificial Intelligence market is anticipated to expand at a five-year compound ...
Over time, the legal framework around the right to privacy changed. Since 1800, when the British were in charge of India, the idea of a right to privacy has been there. Right to Privacy has ...
Digital Technology has taken control over everything around us and it's a part of our daily life, without which it is next to impossible to connect with the people and cope up with the modern w...
Cyber law is the branch of law to deal with the legal issues related to the internet, technological and electronic elements, communication technology, including computer, software, hardware, an...
Both cybercrime and cybercriminals have developed at a rapid pace, while the law has progressed at best at a snail's pace, and even that is usually only a knee-jerk reaction. Technology, partic...
The word Patent was derived from the Latin term Patere, which means to lay open. Patent simply means a right given to anyone who invents something new, useful, and non-obvious. It is one of the...
Phishing attacks are those attacks whereby false or fraudulent communication is sent to different users of internet through e-mails/corrupted links for collecting sensitive data or information ...
Cyber Fraud and Abuse: An AnalysisIndia's ambition is to convert its society into an information society by implementing 'Digital India'. Government, private sector, and even the entire individ...
"Courage is fire, and bullying is smoke." - Benjamin Disraeli Cyberbullying refers to the bullying or harassment on media platforms. It is the misuse of technology to harass, humilia...
"Right to privacy v. Infringement of cyber laws" Introduction The right to privacy is one of the most essential element of several legal systems that aim to restrain governmental and private ...
The word cyber crime has become a well-known word these days because of the increase in cybercrime incidents. The word cyber crime is a combination of two words, cyber and crime. The word cyber...
Amazon, Flikarts, Indiamart etc are the new age e-marketing platforms which provide lots of easy options for the sellers to sell their products. These e-marketing platforms are also getting p...
After one article already published in the platform of Informatics in this subject. This is here what I have to write about Dark Web. my ambition is to provide adequate information to the gener...
With 554 internet shutdowns since 2012, half of which were imposed after 2019 India has earned the title of internet shutdown capital of the world. With 320 shutdowns, the state of Jammu and Ka...
There is a great power on the Internet. The power to make or destroy someone. The power to influence the policies and decisions of the world. To change the world. But as Uncle Benjamin Parker w...
Pornography is a depiction of erotic behavior which has the intention to rose the sexual excitement. It is represented in books, pictures, videos etc. Printing technology had advanced enough to...
Computers and the internet are becoming an essential part of this modern era. They are being used by individuals and societies to make their life easier. Like storing information, sending and r...
Cyberspace is the name given to the computer-generated world of the internet, and cyber laws are the regulations that apply there. Due to the fact that this space has a form of universal jurisd...
Privacy has no definite boundaries and it has different meanings for different people. It is the ability of an individual or a group to keep their lives and personal affairs out of public...
When a person or entity willfully avoids paying their true tax obligations, this is prohibited. People who are discovered evading taxes face serious penalties and criminal prosecution.. People ...
This research paper talks about "Cyberstalking and Its Impact on Vulnerable Group: Women and Minors." Today being the era of modernization, digitization and networking are at its peak...
From an outright ban on cryptocurrencies in 2016 to an upcoming Bill for regulations. Over the past few years the Government's stance on digital assets has changed. Currently, there is no regul...
Research Objectives: To find out the history and emergence of data privacy laws. To compare and analyze the data privacy laws in India and other countries. To research the need and effec...
In computing, phishing is a form of social engineering, characterized by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a ...
Today we are living in a digital world so we can't avoid the use of internet from our day today life especially in this covid pandemic situation. Earlier Internet was used for governmental purp...
When it comes to territorial conflicts, Indian-Chinese ties have traditionally made headlines. Chinese troops entered Indian territory unlawfully and attempted to seize the disputed area, which...
Before discussing on the given topic and expressing our views on it, we should be well versed with the terms 'Artificial Intelligence' and 'Legal Personhood'. The ability of a robot controll...
One may very easily get absorbed in the lives of others as one scrolls through a Facebook news feed, Instagram images, or even Snapchat tales, which are all readily available to see. With its o...
Assuming we fabricate a rundown of things that are forbidden in India, we'll track down a great deal of things, however the restriction on over digital media material would be an inquisitive ex...
A History Of Cyber CrimeWe have learnt to place a great deal of faith in computer systems since they have become a vital part of the everyday operations of corporations, organisations, governme...
In the 1960s, the development of the internet was a watershed moment. Although the internet was originally designed for military objectives, we had no idea that it would grow swiftly and become...
India as we all know is the second most populous country in the world with population around 138 cores and out of which millions and millions of internet subscribers. According to telecom regul...
What is Aarogya Setu? Aarogya Setu, a COVID-19 tracking Indian app developed by the National Informatics Centre under the Ministry of Electronics and Information Technology, was launched on 2 Apr...
What does web security vulnerability mean?Computer Vulnerability is a cyber security term which refers to any defect or weakness in a computer system or network that can leave it open to attack b...
Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems. Artificial intelligence (AI) is intelligence demonstrated by machines, as opp...
Pegasus, a type of malicious software commonly referred to as spyware, was recently discovered to have been used to covertly monitor and spy on a number of public figures in India. Its purpose ...
In the present world of technology, we are used to hearing that somebody hacked the profile or made a profile of someone using his/her details and sent some vulgar or derogatory messages, all s...
Digital Rupee - It's UnderstandingCentral Bank Digital Currency (CBDC), as per the Reserve Bank of India (RBI), is a digital representation of legal tender money issued by a central bank. It is a...
Electoral democracy and integrity are indispensable facets of any democratic nation and for a voter's trust and liability. Democracy is a governance system in which sovereign power is entrusted...
Introduction About The Cyber Attacks And What They Do Why do cyber-attacks happen? In addition to cybercrime, cyber attacks can also be associated with cyber warfare or cyber terrorism, like h...
The new millennium saw a transition in the form of internet culture - a new way of living. The internet has become an integral part of our daily lives, providing new avenues for communication, ...
The internet has brought a revolution which can be equaled with the industrial revolution of the 19th century. The internet was launched as a communication tool for the masses but, within a few...
The PRC Civil Code (the Civil Code) was recently passed by China's top legislature, the National People's Congress, and has come into effect on January 1, 2021. This is the first time codified ...
The Internet and social media networks are the most useful and powerful things in today's world or we can say it as a god's gift for our generation. India is in the top 5 countries with 560,000...
What are Certifying Authority and their legal standing?Certifying Authority (CA) is a third-party organization that issues an electronic document also called a digital certificate to validate the...
Cybercrime, as the name suggests, is a type of crime committed in the cyber world. This crime is a new type of crime that has spread its roots to almost every aspect of internet users' lives. O...
CryptocurrencyCryptocurrency is any currency that virtually exists. Cryptocurrency uses cryptography to secure and maintain transactions. The legal validity of cryptocurrency is still not decla...
The question or debate in society today is what marital rape is and whether it should be criminalized. To understand it, you have to separate marital rape into two words. Marital and rape. Mari...
Do you ever ask yourself the question 'Am I at Cyber Risk?' Even if you don't, the unfortunate answer is, everyone is. Characteristic of the culture of computers, information technology, and vi...
With the increasing use of computers in society, cybercrime has become a major problem. Advances in technology have made humans dependent on the Internet for all their needs. The Internet has g...
Data protection is considered to be the most debatable topic rolling in today's world especially in Indian context. Although it is the most crucial topic but sadly it is nether being safeguard ...
In recent years, cybercrime has increased throughout the world. In India, in the last year alone, there was a 16 percent increase in the number of cyberattacks recorded by the police. Cybercrim...
As we hear the term cryptocurrency and data mining, thoughts of it being illegal strikes our minds. Most people are ignorant of the reality that cryptocurrency isn't always unlawful, shopping f...
Hackers utilise computer technology to obtain personal and professional information or documents belonging to an individual or an organisation for malicious or wicked purposes, making cybercrim...
Nowadays new terms have popped up like E-Commerce, E-Governance, Q-Commerce and if future new terms would pop-up like E-Family, G-Relation, E-Space, E-Tour, etc.. Great everything is coming vir...
We are all living in the digital era. All our daily activities either partially or totally depend on digital devices or Internet. Every Organization whether it is government or non-government a...
The internet has now embellished as an integral part of everyone's daily routine. It has taken over the world, from basic communications to online shopping. Companies have also chosen to carry ...
Right to Self-Defense in Cyber WarfareWith the sudden proliferation of cyber-attacks at global level, the absence of particular legal structure in order to curb the menace of cyberspace render th...
Technology is now a part of us. Neither in professional nor in personal life we can function without technology. Even you are reading this paper through technology. Technology is the advent mainl...
In today's era internet is a part of our life that has connected us with the whole world. Through the internet/social media we came to know what is going around us and all over the world. Durin...
India, is a vast country with a population of over 138 crores it has millions of internet users. There are over 572.2M active users of internet in India and their monthly average data consumpti...
Research conducted has to be published or documented; otherwise, it is rendered undone or incomplete. Publication of paper is critical for the evolution of various fields as discussed above and...
The Internet, which connects loosely held networks all over the world, has made data and information transfer between them simpler. Security concerns have been a big worry in recent years as da...
Freedom of expression is sanctioned by article-19 of the International covenant on civil and political rights (ICCPR) and further, universal declaration of the human right (UDHR), India is a si...
We are all leaving in a world of technology that not only makes things more accessible but also creates a daily challenge to compete in the market through a transformation within and around us....
Online shopping in India comes with certain risks especially because you have to make a purchase without seeing or testing the product, whether it's clothing, cosmetics, personal care items, sh...
Apps have changed the digital platform in every working area with the aid of computers, mobile phones, and software. For businesses and customers, usage of computers in the creation, transmissi...
The more we enter into the Era of Digitization, the uses of AI, Big Data, Internet of Things, and Machine Learning is getting increase day by day. A small data published by Gartner in 2019 show...
The kind of unfettered display of Nudity, Violence and Foul Language through OTT platform is accessible to a teenager now a days, was not available just few years ago. What kind of future we a...
Today data have become utmost priority for most individuals and companies. And when it has become the utmost priority, protecting it from being compromised also becomes equally important. Many ...
Personal Data And Data Theft Over a single day, we visit multiple websites online. We are all familiar with the cookie/ privacy policy notification that pop-ups on our screen while we browse t...
Nowadays, by 2021, more than half the world's population is predicted to be on-line, victimization web site for a spread of functions on a usual. To be ready to supply content while no...
Sexual exploitation is a global problem which is like cancer existing everywhere, in all developed developing, and underdeveloped countries. Sexual exploitation is done in several different for...
Post A2Z is a modern social media platform for sharing media content, an analogue of social networks. It is an Ultimate Hypertext Preprocessor (PHP) based Platform that supports a 'friends syst...
Abstract This article talks about the emergence of content being online, what made this world digital and available online. This piece of content also talks about how beneficial and important...
Privacy law is the body of law that includes rules & regulations and deals with storing, and using individually identifiable Information i.e. IIP, personal healthcare information, and finan...
Digital technology and new communication systems have made dramatic and drastic changes in our lives as most business transactions are being made with the help of computers. The business communit...
Privacy is need which is a double edged sword in the hands of the right people it's a need so they can live in peace because they then have at least the peace of my mind that even the minute pa...
"The internet is becoming the town square for the global village of tomorrow"-Bill Gates ...
Key Concerns that need to be addressed by an International Media Tribunal: Addressing gaps in coverage Addressing new technologies Managing cross-border data transfers Balancing surveil...
With the advancement in technology, we come across a lot of features, we come across a lot of flaws and we also come across lot of threats arising out of it. Smartphones and apps had made our l...
Cyber-Security is much more than a matter of IT - Stephane Nappo Abstract The "Internetwork" gained traction and commercialization in the late 1990s. Via the interconnection between ...
"When you tear out a men's tongue, you are not proving him a liar, You're only telling the world that you fear what he might say" Abstract In this article, I talked about various aspects of Inte...
The Indian government in the wake of the on-going tensions between India and China on the Line of Actual Control (LAC) in Ladhak banned 59 Chinese apps. According to the Ministry of Information...
With great power comes great responsibility a popular phrase from the Spiderman storylines aptly reflects the dilemma of technological use and its probable misuse. Societal preferences regardi...
Hard cases make bad law. Black's Law Dictionary defines a 'hard case' as a law suit involving equities that tempt a Judge to stretch or even disregard a principle of law at issue. The costs of...
India has been slowly awakening to the generality of violence against ladies within the online sphere. Whereas it lacks a nationwide comprehensive study on the difficulty, the widespread preval...
The uprising of the “Digital India Programme†together with India being one of the largest internet users felt the urgent need to strengthen the legal framework to make the social med...
The World Wide Web has been evolving and yielding day – by – day. The occurrence of Novel Corona Virus as a global pandemic has amassed a major of the offline assignments and spadew...
The article will endow with Cyber crimes are a new period of crimes to India speedily growing as it should be to massive consumption of Internet. Dishonest and greedy fill with draw plus of unco...
I value discretion and privacy in a world when everyone displays and tells everything. Cybercrime has skyrocketed as social networking services have grown in popularity. With the advancement of ...
The main idea of this research paper is to study some applications of quantum computation and to examine the interplay between quantum theory and AI. For the people who are not aware of quantum c...
Recently WhatsApp updated its privacy policy in India which will allow it to share the business data on WhatsApp with Facebook. After the announcement there has been a situation of panic amon...
India recorded a total of 44,546 cybercrimes, with Karnataka as the worst effect state of all and costed a data breach of 2 Million US Dollars.[1] Cybercrime can start with a financial fraud, w...
Internet is a system of inter-connected computer networks and is today’s significant platform of information and transmission. Its far-flung utilisation has led to its entrance in the sphere of...
Forgery is the creation of a document which one knows is not genuine and yet projects the same as if it is genuine. In common parlance, it is used more in terms of affixing somebody else's sign...
Jurisdiction, as applied to a particular claim or controversy, is the power to hear and determine that controversy. The term imports authority to expound or apply the laws, and excludes the id...
Media gets the opportunity of the press under Article 19(1) (a)[1] of the constitution of India which gives for the right to speak freely of discourse and articulation , by the righteousness of...
Pornography literally means, Writings, pictures or films designed to be sexually exciting. Developing, distributing and propagating the same over the Internet is termed as cyber Pornography. This...
A cryptocurrency, crypto-currency, or crypto is a digital currency that can be used to buy goods and services, digital asset created and designed to function as a medium of trade in which speci...
Personal space can be defined as region or a surrounding of a person which they consider as psychologically theirs. And from this we get to know that invading into someone's privacy is the new ...
Internet has become an inseparable part of our life. Just imagine , if on a particular day , internet connectivity is lost, then how our life is going to be miserable. Gone are the day when one...
With the COVID-19 pandemic, we are living through a global crisis the likes of which haven't been experienced in a century. The enormous scale of the crisis is profoundly affecting life around th...
The very notion of right to be let alone and to enjoy a personal space free from interference along with scrutiny can simply be known as privacy. Privacy is also defined as the right to selective...
What is contemptible for a person might be admirable for another. Even after learning the same laws, people interpret them in different ways. Then, how can a law-enforcing agency arbitrarily de...
Indian Government has turned no stone unturned to resort to vigilantism against social media, news reporting agency and now the newly loved OTT platforms, the main source of entertainment for t...
What Is Internet Censorship? Internet censorship is basically control or restriction on what information can be publicized or viewed on the internet. Governments and other organizations commonly ...
COVID-19 has no doubt pushed all the countries more towards digitalization. From online classes, webinars, work from home to electronic contracts has become a new normal. The expeditious emerge...
Twitter India recently blocked several twitter accounts like – Caravan India, Kisan ekta morcha and 250 other such accounts which sparked a controversy. Ministry of electronics and informatio...
Rights of owner of intellectual property on the Web This article provides information to the reader about the rights available and security of an Intellectual Property owned by an original creator...
India is an emerging and developing country (EDC) located in southern Asia. It is the world's largest democracy, and is one of the fastest growing economies. In a country with such a large popu...
Introduction to Cyber Law:Cyber Law as we all know is the law that deals with crimes done with the help of modern technology that is mainly through computers. The Parliament of India passed its...
With the increasing use of computers in society, cybercrime has become a major issue. The advancement of technology has made man dependent on internet for all his needs. Internet has given man ...
First, we need to understand What Is Cyber Crime? By the word we get to know it's a computer-oriented crime, where a computer and a network plays a vital role. These types of crimes are mainly ...
Digital Forensics is defined as the process of preservation, identification, extraction, and documen- tation of computer evidence which can be used by the court of law. It is a science ...
The use of internet in India started in 1995 and since several decades our lives have been fused directly and indirectly with the use of the internet and the virtual world. Internet has facilit...
There are so many examples through which the advent of Artificial Intelligence (AI) in our daily lives is indicated, such as introduction of robots by Kerala police is a shocking yet true news,...
The digital age has been considered as one of the greatest development in the world. In the past three decades it has been evolving at much higher rate and the biggest reasons are the never sto...
It is gradually worrying that technological progress may be as problematic as it can be. With the article in this unique question, we are attempting to diagram the challenges and opportunities ...
The law to amend in equal footing as the development of technology. After the proliferation of internet usage in smartphones options of gathering evidence for investigative agencies also incr...
In this techno-savvy world, where everything is in your computer. It became much easy to get almost any information which we want. We can connect to a person from any country within a second. ...
Cybercrime comprise of criminal acts that involve computers and networks. Thus, Cybercrime is a wide term that describes/explain everything from electronic hacking to denial-of-service attacks ...
Have you ever clicked on I Agree for accepting terms & conditions of a mobile application or on any website like Facebook, Amazon, Netflix? I am sure, everyone has but did you know when you click ...
Threat is a mirror of security gaps. Cyber-threat is mainly a reflection of our weakness. An accurate vision of digital and behavioural gaps is crucial for a consistent cyber- resilience - Step...
In contemporary times, we are stepping towards an era of Digital Data Transfer. We are exchanging our sensitive information globally. The security of this sensitive information has become a cha...
They say we die twice. Once when the breath leaves our body, and once when the last person we know says our name- Al Pacino. The rule of privacy is encapsulated with the phrase Right to be Le...
Now along comes the potential creative destruction brought by a different distribution methodology, the Internet. ...
Ticketmaster Corporation, an Illinois corporation, Plaintiff, v/s Microsoft Corporation, a Washington corporation, ...
Introduction To Online Violence Against Women In India With the passage of time, internet has become a major part of lifestyle. From using social networking sites for updating about life events ...
The progression of the innovation and the dynamism of lawful world gives viewpoint of data protection and information insurance issues during this ongoing period. Security is turning into a nee...
OTT or Over-the-top, services refer to the content that is streamed/downloaded via the internet without having to subscribe to a traditional cable network [1] like Netflix, Amazon Prime, Voot etc...
MIETY fast-tracks work on funds for India's software products infrastructure, The Indian Government approved the National Policy on Software Products on 28th February 2019. The policy is aimed at...
According to the Webster dictionary, surveillance means keeping a watch or look at somebody or something. Its nature is legal or not is totally depends on the different matters or factors of st...
Innovators seldom steer into a road taken. They make their own path and achieve success Abstract The Article on BotChain Technology aims to surface those technological advancements that are...
The Application Infringes Privacy Privacy is of paramount importance in the days of technological advancements as any person can gain access to the personal information of a person online and ...
In today's world, data has become Property of every person. Data[1] includes personal data (name, age, date of birth etc.) and sensitive personal data[2] (passwords, financial information, health...
Now a days, the world has become easily accessible in one single click. This is because of all the social media platforms made available to us. All these platforms have become so beneficent esp...
A nine-judge bench of the Supreme Court headed by Chief Justice JS Khehar, ruled on August 24, 2017 that the Right to Privacy is a fundamental right for Indian citizens under the Constitution o...
Traditional bullying has evolved because of the pervasiveness and easy accessibility of electronic media. The nation’s school playgrounds, bathrooms, and locker rooms are no longer the only b...
Today is the Era of Technology in which computers and mobiles are crucial resources for any kind of business as well as for personal individuals. Nowadays people are more dependent on technology,...
With the advent of technology and easy access to the internet, the world has been confronted with a new form of kidnapping termed as online kidnapping also called as digital kidnapping or virtu...
Internet and computer networks are the most widely used in the current era of technology worldwide. Usage of internet particularly, use of social media has crossed about 200 millions in India. ...
The first question arises after hearing the topic name is What Is Social Media? Let's break the word in two terms social and media Media word used for the communication and social word means rel...
The invention of computer and computer networks has made the life easier and above all the internet is proved to be a cherry on the cake. The usage internet of technology has turned the world int...
This document discusses the Reasons why Indian Government banned Tiktok and 58 other apps, these apps were removed Lawfully under IT Act,2000 and the other motive of removing such Apps is to redu...
As we enter into the emerging era of software technology and the ever-growing sphere of the internet and world wide web, protection of data and the importance of copyright protection has taken ...
Access to Computers and the Internet has become a basic need for education in our society.-Kent Conrad In the past few years India had gone through several violence occurred as a result of certa...
The advancement in e-commerce and e-business has led to an important concern to the companies and organisations to protect their intellectual property rights online. Nowadays, cyber crimes do not...
The internet is one of the fastest growing areas of technical area infrastructure development. Today information and communication technologies are omnipresent and trend towards digitization is g...
A fool and his money are soon parted. As we step into the outer world, we are fascinated by a lot of things, most of which comprises of materialistic assets. We are always in a haste to become...
Protection of Action taken in Good Faith in Personal Data Protection Bill, 2019 - A Comparative Analysis with Indian and International Jurisprudence Privacy, as an essential human right recognize...
Nowadays we can't survive the Internet because we are severely addicted to the internet. No one can deny to this fact that the internet has not only made our lives better but smooth as well. Tho...
As we are living in the computer era, it is easy to store our information in the computer. A coin has two sides. Likewise, the development in the technology also has two sides as positive and neg...
What is cyber crime?Any illegal or unethical activity through internet use or using computer as a tool can be a cyber crime. Cyber crime is done by cyber criminals who try to exploit broken softw...
Our Planet mother nature is not danger. Rather the human being are.Mother Earth was with or without the human being had exists. She also survived the evolution. She made the dinosaur fits in an...
A journey of thousand sites begins with a single click With the escalation in technology Internet portray a significant role, so a primitive question arises that: whether access to internet ...
In this allied, information lavish, and data-affluent world, access to the data by the government authorities and other organizations are fundamental but at the same time the mechanism for seekin...
Data protection is a new age concept that arose as the technology grew and synced with people on various numbers of data that they had generated like the passwords, their lifestyle activities, sh...
Cyber law is an emerging field of law. It has been continuously evolving since its origin in a realm of law. However, due to advent advent of new technologies and with new technological paradigms...
Data is something that surrounds everyone around and is generated virtually in everything we perform. We share the data deliberately and when we do something, the data is generated. For example,...
The e in e governance stands for electronic Governance refers to lawful rules for management, control and administration. E governance is a public sector, use of information and communication tec...
The modern era has become severely riddled with cyber-crimes, and other offenses related to identity theft and data protection have gained impetus in the passing years. Where at one hand, the d...
About Artificial Intelligence Artificial intelligence is that branch of computer science which is connected with the machines and can perform task which actually require the human intelligence. I...
The internet, an effective means of social interaction that inevitably altered human life is the new normal. Its utility to humankind could not be overemphasized as much as its inherent peril c...
Enabling Good Governance through ICTsThe emergence of Information and Communications Technologies (ICTs) are rapidly transforming the way citizens interact not only with each other but also with ...
Banking is the growth engine of an economy. It provides numerous facilities to the enterprises, government and the common man therefore one cannot undermine the importance of a sound banking syst...
Coronavirus: the most frequently used term in today's date. This infectious disease has posed an unprecedented threat all over the world. To control the spread of this disease and to prevent ...
In this case there were two girls named as Shaheen Dhada and Rinu Srinivasan lived in Thane, Mumbai. In year 2012, when the Shivsena leader Bal Thackrey died, there was bandh in the city....
Cybercrime can be defined as the crime where there is use of a computer as an instrument for committing fraud, trafficking in child pornography, intellectual property, stealing identities or vi...
The term Bullying, in itself, denotes a genus, whereas Cyber Bullying forms its specie. Before elaborating upon the latter, we should look into the terminological relevance and essence of the i...
The Supreme Court rejected three Writ Petitions filed by Foundation For Media Professionals, Private Schools Association of J&K & Soayib Qureshi, seeking the restoration of 4G Internet Services i...
In technically driven society, people use various devices to make life simple. Globalization results in connecting people all around the world. The increasing access to and continuous use of tech...
Child pornography is multifaceted international concern, and what institutes child pornography is unexpectedly multipart. Even if we confine ourselves, to a legal definition of child pornography,...
In present era, Internet is the most advance mode of communication because of its most important feature of independence from geographical boundaries. Many of other characteristic features of Int...
Cyber offences and POSCO Act - Legal Provisions Protection of Children from Sexual Offences Act (POCSO) Act is specially designed to protect the children from either online or offline offences. T...
Court Proceeding Taken and Exchanges Of Highly Sensitive Information On Video Or Audio Conferencing Through With The Help Of Zoom Cloud Meeting: A Sign Of Massive Cyber AttackA wider perspectiv...
The right to privacy is a fundamental right embodied in many constitutions across the world. Right to privacy is a multifaceted concept. Right to privacy has been recognised in the eyes of law an...
Scientia Est Potentia Greater the power, more dangerous is the abuse.- Edmund Burke On account of controlling the ongoing pandemic crisis due to the highly contagious COVID-19 virus, India too ...
Privacy is becoming priceless in the present world where people crave for the exhibition of others' personal space. Revenge pornography or non-consensual dissemination of intimate images has emer...
Information Technology is the use of computers to store, retrieve, transmit, and manipulate data or information. An information technology system (IT system) is generally an information system, ...
Supreme Court in a landmark judgment struck down section 66A of the Information Technology Act, 2000 which provided provisions for the arrest of those who posted allegedly offensive content on th...
Identity thieves make a lot of money a typical headline that we read almost every day. What is the true picture? It’s not where an individual steals an identity but the same individual usi...
Obscenity is a global and complex issue because it involves other related issues like decency and morality which varies from society to society. Cyber Obscenity is a threat to the internet users ...
The concept of cyber security has itself undergone huge transformation in the wake of 'modern technologies' and increasing influence of 'social medias' such as facebook and twitter etc. It has as...
Declaring that access to the Internet is a constitutionally protected right under Article 19 (1)(a) of Constitution of India, the Supreme Court ordered the Jammu & Kashmir Administration to revie...
The advancement of technology has made man dependent on internet for all his needs. Internet has given man easy access to everything while sitting at one place. Social networking, online shopping,...
A presentation on Empowerment of Women, this presentation highlights on: Cyber Space and Social media Relevant Legal Provisions in Information Technology (IT) Act Awareness Creation Cyberspace ...
The importance to understand the world of crime in the Cyber Space and Technology had been given a priority in India as the crime busted unexpectedly in the Cyber Space and as the criminals becam...
Stalking is any repeated and unwanted contact with you that makes you feel unsafe. You can be stalked by a stranger, but most stalkers are people you know even an intimate partner. Stalking may g...
Aim And Objectives: Cyber Defamation is one of the worst forms of cybercrime which engulfs all walks of life into its fold and endangers and causes damages upon the individual and institutionâ...
Your Privacy Policy describes how you collect, use and disclose information of your mobile app or website users and what choices your users have with respect to the information. Privacy Policy T...
According to a Data Security Council of India (DSCI) report in May, India saw the second-highest number of cyber-attacks in 2016-2018. Further, the average cost for a data breach in the country h...
The computer-generated world of internet is known as cyberspace and the laws prevailing this area are known as Cyber laws and all the users of this space come under the ambit of these laws as it ...
So as our topic of discussion is on steps to curb raising cyber crime related to banking fraud in Gurugram, before discussing that firstly we have to know what is cyber crime? Cyber crime is a cr...
The word pornography comes from the Greek pornographic literally meaning writing about prostitutes. One of the commonly accepted definitions of pornography in modern times def...
Cyber Crime Cyber crime is any criminal activity that involves a computer, networked device or a network. While most cyber crimes are carried out in order to generate profit for the Cyber crim...
Cyber crime is a very wide term which involves offences related to computers or the computer networks for the purpose of communication and to transfer the information to another person in a very ...