0% found this document useful (0 votes)
171 views4 pages

Brief Outline of UNIT 1, Cyber Law

Uploaded by

anonymous
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
171 views4 pages

Brief Outline of UNIT 1, Cyber Law

Uploaded by

anonymous
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Cyber Laws (Including Information Technology Act, 2000)

UNIT 1 (15 Lectures)


(1) INTRODUCTION

1. Etymology of ‘Cyber’ Greek Kubernētēs, cybernetics- Norbert Weiner


1948)

2. Origin and meaning of Cyberspace;

 Who coined the term – {William Gibson (Burning Chrome


(short story 1982), Neuromancer (1984, Sci-Fi novel)}

 Definition -dictionary meaning, defn. in National Cyber


Security Policy 2013

 Layers of cyberspace -Physical Layer, Logical Layer,


Information/Content Layer, People/Social Layer

 Inherent characteristics of cyberspace – borderless, speed


(expansion, instant mode of transaction), anonymity,
interconnectedness,

3. Cyberspace vs. Physical space

4. Concept of regulation w.r.t. Cyberspace, Need of Regulation for Cyberspace


-Law of The Horse - Justice Frank H. Easterbrook, A Declaration of the
Independence of Cyberspace by John Perry Barlow.
5. Different Models of Cyberspace Regulation

 No regulation
 Govt, /state regulation
 Self-regulation
 Technological regulation

Lawrence Lessig -Code and Other Laws of Cyberspace (book)


Computer code ("West Coast Code", referring to Silicon Valley)
Legal Code (or "East Coast Code", referring to Washington, D.C.) 
Pathetic Dot Theory/New Chicago School theory,
Law, norm, market, code.

Page 1 of 4
Criticisms of Lawrence Lessig.

6. Legal Issues in Cyberspace

Authenticity of Electronic Documents and its Transaction

-Jurisdictional issues
Types of jurisdiction- Prescribe, Adjudicate, Enforce

Statutory Laws -IT Act (section 1(2) & 75), IPC (sec 3 & 4), certain

provisions of Cr.P.C.

Judicial interpretation – Minimum Contact Theory, Sliding Scale

Principle, Effect Test, Targeted Audience Test etc.

-IP issues
(Copyright issues- fundamental notion of copyright, copyright in digital
issues, WCT & WPPT, TRIPS, DRM, Copyright protection in India sec 65
A, 65 B, online copyright infringements -linking, framing, caching, piracy
etc.)

(Trademark issues -Function, trademark vs domain name, Passing Off,


domain name disputes-cybersquatting, typo squatting, reverse domain name
hijacking, cyber twins, cyber smearing etc. WIPO, UDRP, Trademark
protection in India)

Page 2 of 4
Contractual issues - Challenging fundamental notions of contract,
clickwrap/shrink-wrap/browse wrap contracts, its legal validities etc.
Electronic evidence -meaning, concerns, sources, admissibility of electronic
evidence, section 65 A, 65 B of Indian evidence Act, issues of digital
certificate judicial interpretation.
Cyber offence –
 Meaning, reason, difference from conventional crime, types, legal
measures etc.

Surveillance, privacy and security (panopticon view of Bentham, Michel


Foucault, Gorge Orwell -1984), recent judgments.

Social networking issues

SUGGESTED READINGS:
 Cyberspace and International Relations Toward an Integrated System Nazli Choucri,
David Clark , Available at http://studylib.net/doc/13670802/cyberspace-and-international-
relations--toward-an-integra...
 From Cyberspace to Cyber power: Defining the Problem
Daniel T. Kuehl, Cyber power and National Security, Franklin D. Kramer, Stuart H. Starr
Larry K. Wentz
 The Dependence of Cyberspace - Amy Lynne Bomse
Available at http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1118&context=dlj
 What Larry Doesn't Get: Code, Law, and Liberty in Cyberspace Author(s): David G.
Post, Stanford Law Review, Vol. 52, No. 5, Symposium: Cyberspace and Privacy: A
New Legal Paradigm? (May, 2000), pp. 1439-1459 ,Available at
http://www.jstor.org/stable/1229518?seq=1&cid=pdf-reference#references_tab_contents
 The Zones of Cyberspace, Author(s): Lawrence Lessig, Stanford Law Review, Vol. 48,
No. 5 (May, 1996), pp. 1403-1411 ,Available at
http://www.jstor.org/stable/1229391?
seq=1&cid=pdfreference#fndtnreferences_tab_contents
 A Declaration of the Independence of Cyberspace by John Perry Barlow , Available at
https://www.eff.org/cyberspace-independence
 Evolving Strategies for the Enforcement of Cyber laws by Karnika Seth , Available at
http://www.karnikaseth.com/evolving-strategies-for-the-enforcement-of-cyberlaws.html
 Usage and Challenges of Cyberspace https://www.scribd.com/document/347504617/1

Page 3 of 4
Page 4 of 4

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy