IT Law LLB 1st sem

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

LL.B.

Syllabus- School of Law, University of Kashmir

INFORMATION TECHNOLOGY LAW


(Cyber Law)
Paper VII [Code–LLB24107S] Max. Marks=100
Time Duration:3 Hours Theory =80
Continuous Assessment
=20
Note: The subject includes a comprehensive and up to date study of various aspects of Cyber
Law. The question paper shall be of 80 marks, spread over the whole syllabus, and shall
comprise of three sections. Section A (very short answer type questions in about10-20 words)
shall have 10 questions, two questions from each unit carrying 2 marks each. Section B (short
answer type questions in about 200-250 words) shall have 5 questions, one question from
each unit carrying 6 marks each. All questions from sections A and B have to be answered.
Section C (long answer type questions in about 400-500 words) shall have 5 questions, one
from each unit carrying 10 marks each. Any three questions out of 5 have to be answered
from this section. 30 percent of the questions will be problem based.
Objective: Persuasiveness of impact of internet in all the branches of legal jurisprudence
necessitated the inclusion of the cyber law in the curriculum as a full-fledged paper with an
object to make students to understand the legal implications of ecommerce and e-governance
and to prepare them to answer the legal challenges posed by constantly evolving new
generation of crimes popularly called cyber-crimes.
Unit-I: Development of Internet
1. History of Internet.
2. Genesis of Internet.
3. Internet Functioning.
4. Communication through Internet.
4.1 Modes of Access.
4.2 Modes of Communication.
5. Information Technology Act, 2000: History, Object and Scope.
Unit-II: Authentication of Electronic Records and Electronic Governance
1. Authentication of Electronic Records
1.1 Digital Signatures.
1.2 Hash Function.
1.3 Digital Signatures in Practice.
1.4 Secure Electronic Record and Secure Digital Signatures.
2. Electronic Signatures.
LL.B. Syllabus- School of Law, University of Kashmir

3. Electronic Governance.
3.1 Legal Recognition of Electronic Records.
3.2 Legal Recognition of Digital Signature & Electronic Signatures.
3.3 Use of Electronic Records and Digital Signatures in Government and
its Agencies.
3.4 Retention of Electronic Records.
Unit-III: Certifying Authorities
1. Need of Certifying Authority.
2. Functioning of the Certifying Authority.
3. Types of Certificates.
3.1Identification Certificate.
3.2Authorizing Certificate.
3.3Transactional Certificate.
3.4 Digital Time Stamping Service.
4. Validity Period of Digital Signatures.
5. Certificate Chain.
6. Appointment of Controller.
7. Functions of Controller.
8. Controller to act as a Repository.
9. Powers of Controller.
10. Powers of Central Government.
11. Data-base of Certifying Authorities.
12. Who can be a Certifying Authority?
13. Application for License.
14. Certification Practice Statement.
15. Issuance of License.
16. Refusal of License.
17. Surrender of License.
18. Cross Certification.
19. Duties of Certifying Authorities.
20. Certifying Authority as an Indemnifier.
21. Commencement of commercial operation by licensed Certifying Authorities.
22. Requirements prior to Cessation as Certifying Authority.
LL.B. Syllabus- School of Law, University of Kashmir

23. Representation up on Issuance of Digital Signature Certificate.


24. Certificate Life Time.
25. Suspension of Digital Signature Certificate.
26. Revocation of Digital Signature Certificate.
27. Certification Revocation List (CRL).
28. Duties of Subscribers.
Unit-IV-Electronic Commerce
1. Introduction.
2. Formation of Electronic Contracts.
2.1 Contract by Electronic Data Interchange.
2.2 Cyber Contracts.
3. Validity of Electronic Transactions.
4. Dichotomy of Offer and Invitation to Treat.
5. Application of Mirror Image Rule.
6. Communication of Offer and Acceptance.
7. Revocation of Offer and Acceptance.
8. Incorporation of Terms by Reference.
9. Attribution of Electronic Records.
10. Time and Place of Dispatch and Receipt of Electronic Record.
11. Mistake in Electronic Commerce
12. Jurisdiction.
Unit-V
1. Cyber Appellate Tribunal
1.1 Establishment of Cyber Appellate Tribunal and its merger with the
Telecom Dispute Settlement and Appellate Tribunal, (TDSAT).
1.2 Adjudicating Officer
1.3 Powers of the Adjudicating Officer
1.4 Factors to be taken into account by the Adjudicating Officer
1.5 Power to Award Compensation
1.6 Power of Adjudicating officer to impose penalty
1.7 Compounding of Contraventions
2. Computer Systems and Liability Issues (Cyber Crimes)
LL.B. Syllabus- School of Law, University of Kashmir

2.1 Definition of Cyber Crimes.


2.2 Classification of Cyber Crimes.
2.3 Target of Computer Crime.
2.4 Challenges of Cyber Crime.
2.5 Regulatory Framework
3. International Legal Regime relating to Cyber Crimes.
4. Indian Scheme of Offences and Punishment.
5. Virus, Logic Bomb,vWorms and Trojan Horse Programme
6. Cyber Security
7. Cyber Forensics

Recommended Readings:
1. Chris Reed Computer Law, Universal, New Delhi.
th
2. Farooq Ahmad, Cyber Law in India,4 Edition, 2011.
3. Krishna Kumar, Cyber Laws, Intellectual property an de-commerce Security, (2011)
Dominant Publishers and Distributors, New Delhi;
4. Markandey Katju, Law in the Scientific Era (2000),Universal, New Delhi.
5. Nandi Kamath, The Law Relating to Computers,
6. Rajan Nagia, Cyber Laws and Computer Crimes, (2009) Cyber Tech Publications, New
Delhi
7. Richard Raysmanand Peter Brown. Computer Law: Drafting and Negotiating Forms
and Agreements, by Law Journal Press, 1999–2008.
8. S. K. Bansal, Cyber Crime, APH Publishing Corporation, New Delhi
9. S.R. Sharma, Encyclopedia of Cyber Laws and Crime, Anmol Publications Pvt. Ltd.
New Delhi.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy