Você está na página 1de 3

Digitalization has rapidly transformed the ways of accessing and using the Information comment on the statement

What is E-Commerce? Trade over internet is called as e-Commerce; Trade whose life cycle starting from placing an order, paying and goods shipment

Branches of Law Procedural law provides the process that a case will go through (whether it goes to trial or not). The procedural law determines how a proceeding concerning the enforcement of substantive law will occur.

Substantive law defines how the facts in the case will be handled, as well as how the crime is to be charged. In essence, it deals with the substance of the matter. Even though both are affected by Supreme Court opinions and subject to constitutional interpretations, each serves a different function in the criminal justice system. What are the 3 main Source of Law?
1. 2. 3.

Legislative law Common Law or Case Law Custom Law


a) Sovereignty b) Territorial Enforcement c) Notion of property d) Paper based transactions e) Real relationships

What are the Primary assumptions of a legal system?

What is an injunction? What are the different types of injunctions?


An injunction is a preventive relief and is granted at the discretion of the court. The discretion of the court is not arbitrary but is guided by judicial principles. a. Temporary injunction: A temporary injunction is granted to continue until a specified period of time or until the time the court orders its continuation. The injunction can be granted at any time of the suit and is governed by the Code of civil procedure b. Permanent injunction: A permanent injunction is granted to prevent a breach of an obligation existing in favor of an applicant. A permanent injunction is granted by the court only after a hearing and on the merits of the case.

Explain the digital signature

A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signatory of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically timestamped List the different amendments to the Indian Penal Code
a. b. c. d. e. Offences against body Offences against property Offences against marriage Offences against public tranquility Offences against state

What are the factors around which the value of information revolves
a. b. c. d. e. f. The persons concerns and commitments; The persons capabilities; Availability of information resource to the person; Availability of information resource to other persons affected; Resource integrity; Time.

What are the remedies available for the breach of contract?


a. Damages, b. Specific performance of the contract c. Injunction d. Damages: When a contract has been broken, the party who suffers by such breach is entitled to receive, from the party who has broken the contract, compensation for any loss or damage caused to him thereby, being loss or damages which naturally arose in the usual course of things from such breach or which the parties knew, when they made the contract, to be likely to result from the breach of it. Specific performance: In certain special cases dealt with in the Specific Relief Act, 1963 the court may direct against the party in default "specific performance" of the contract, that is to say, the party may be directed to perform the very obligation which he has undertaken by the contract Injunction

Discuss the nature of the internet.


It is important to consider the common internet practice of caching copies of frequently accessed resources. In order to better to manage packet traffic, some internet servers will store partial or complete duplicates of the materials from frequently accessed sites; keeping copies on hand elevates the need to repeatedly request copies from the original server. An internet user who attempts to access the materials will never know the difference between the cached materials and the original. The materials displayed on the users machine will appear to come from the original source, whether they are actually transmitted from there or from a nearly cache. Nearby connotes logical proximity but not physical proximity.

What is P3P?

P3P - Platform for Privacy Preferences is an industry standard developed by the World Wide Web
Consortium that helps users control the amount of information that Web sites collects about them. P3P allows users to specify in advance the type of privacy they want for their personal information. This is done in P3P-enabled Web browsers. Upon entering a P3P-enabled Web site, the user's privacy preferences are compared against the privacy policy of the Web site. These privacy policies are specified in P3P formats. If there are privacy disagreements, the user may be alerted and can negotiate how privacy is to be handled. Alternatively, privacy may be negotiated between the Web browser and Web server automatically in the background based on predefined user preferences. If agreements are negotiated, these will be retained for future use.

Part B There is no nexus between cyber space and real space. Comment
Comparison between the real space and cyber space

Short notes on Patent Trademark Information Technology act Copyright Platform for privacy preferences project

Você também pode gostar