NLSUI OPAC header image
Amazon cover image
Image from Amazon.com

Commentary on the information technology act : Along with rules, regulations, orders, guidelines, reports and policy documents

By: Contributor(s):
Publication details: Harayana Lexis Nexis 2016Description: 974p lxxISBN:
  • 9789351437116
Subject(s): DDC classification:
  • 343.099450 GUP
Contents:
Overview: The Information Technology Act, 2000 was enacted to give effect to the United Nations General Assembly resolution adopting the Model Law on Electronic Commerce. It was enacted with a view to give a fillip to the growth of electronic transactions, to provide a legal framework, and to prevent computer based crimes in India. The IT Act was amended in 2008 to address contemporary issues and changing nature of cyber-crimes such as publishing sexually explicit material in electronic form, video voyeurism, leakage of data by intermediary, phishing and identity theft. Section 66A dealing with punishment for sending offensive messages, which was introduced through the 2008 Amendment, was recently declared unconstitutional by the Supreme Court in its judgment in Shreya Singhal v. Union of India, (2015) 5 SCC 1. In addition to discussing this judgment, the present 3rd edition of the commentary meticulously captures all the legislative and judicial developments. New Rules framed under the Act such as the Information Technology (National Critical Information Infrastructure Protection Centre and Manner of Performing Function and Duties) Rules, 2013, and the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Function and Duties) Rules, 2013 have been included. Relevant policy documents and committee reports including the National Cyber Security Policy (2013), the 12th Plan Report on Cyber Security, the 52nd Report of Standing Committee on Information Technology as well as the 31st Report of Committee on Subordinate Legislation have also been covered in the Appendices. This book is an essential reference work for lawyers practicing in the field of cyber-law, business houses which conduct transactions electronically or are considering doing so, Internet Service Providers, IT and Information Technology Enabled Services (ITES) sectors, members of the Cyber Appellate Tribunal, the TDSAT, central and state judicial academies, and advanced students of cyber law.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
BOOKs BOOKs National Law School 343.09945 GUP (Browse shelf(Opens below)) Available 33978

Overview:
The Information Technology Act, 2000 was enacted to give effect to the United Nations General Assembly resolution adopting the Model Law on Electronic Commerce. It was enacted with a view to give a fillip to the growth of electronic transactions, to provide a legal framework, and to prevent computer based crimes in India. The IT Act was amended in 2008 to address contemporary issues and changing nature of cyber-crimes such as publishing sexually explicit material in electronic form, video voyeurism, leakage of data by intermediary, phishing and identity theft. Section 66A dealing with punishment for sending offensive messages, which was introduced through the 2008 Amendment, was recently declared unconstitutional by the Supreme Court in its judgment in Shreya Singhal v. Union of India, (2015) 5 SCC 1. In addition to discussing this judgment, the present 3rd edition of the commentary meticulously captures all the legislative and judicial developments.

New Rules framed under the Act such as the Information Technology (National Critical Information Infrastructure Protection Centre and Manner of Performing Function and Duties) Rules, 2013, and the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Function and Duties) Rules, 2013 have been included. Relevant policy documents and committee reports including the National Cyber Security Policy (2013), the 12th Plan Report on Cyber Security, the 52nd Report of Standing Committee on Information Technology as well as the 31st Report of Committee on Subordinate Legislation have also been covered in the Appendices.

This book is an essential reference work for lawyers practicing in the field of cyber-law, business houses which conduct transactions electronically or are considering doing so, Internet Service Providers, IT and Information Technology Enabled Services (ITES) sectors, members of the Cyber Appellate Tribunal, the TDSAT, central and state judicial academies, and advanced students of cyber law.

There are no comments on this title.

to post a comment.