NLSUI OPAC header image

Cyber crimes, electronic evidence and investigation : Legal issues (Record no. 28262)

MARC details
000 -LEADER
fixed length control field 05558nam a2200205Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20201222111800.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160316s2010 xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Transcribing agency nls
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 343.099450
Item number SOO-2
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Sood Vivek
245 ## - TITLE STATEMENT
Title Cyber crimes, electronic evidence and investigation : Legal issues
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New Delhi
Name of publisher, distributor, etc. Nabhi Publications
Date of publication, distribution, etc. 2010
300 ## - PHYSICAL DESCRIPTION
Extent 428p
Dimensions xi
365 ## - TRADE PRICE
Price amount Rs. 650
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Contents<br/>Forward;<br/>Abbreviations;<br/>Preface;<br/>1. CYBER PORNOGRAPHY AND CRIMINAL LIABILITY OF SEARCH ENGINES, TELECOM SERVICE PROVIDERS, INTERNET SERVICE PROVIDERS & OTHER INTERMEDIARIES: A LEGAL DILEMMA;<br/>* PORNOGRAPHY LAW IN THE REAL WORLD;<br/>• Historical development of the law and the Hicklin test of obscenity;<br/>• Section 292 IPC;<br/>• Constitutional validity of Section 292 IPC;<br/>• Applicability of Section 292 IPC and the Hicklin Test: Some important cases;<br/>• SECTION 292 IPC VERSUS SECTION OF THE INFORMATION TECHNOLOGY ACT, 2000: A COMPARATIVE ANALYSIS;<br/>• LAW OF PORNOGRAPHY IN THE AGE OF THE INTERNET: A CRITIQUE;<br/>• SCOPE AND PRACTICAL APPLICATION OF SECTION 67 LT. ACT, 2000;<br/>• DPS 'MMS' Case : Critique;<br/>• LIABILITY OF INTERMEDIARIES AND IMMUNITY FROM LIABILITY: A CRITIQUE;<br/>• The Problem and Issues;<br/>• Status of Intermediaries under the LT. Act, 2000 as amended by the I.T. (Amendment) Act, 2008 and their functions/roles in the Cyber World;<br/>Internet Service Provider (ISP);<br/>Web-hosting Service Provider and Blog Service Provider;<br/>Telecom Service Provider;<br/>Network Service Provider (NSP);<br/>Search Engine;<br/>Payment Service Provider/Online Payment Sites;<br/>; On-line auction sites;<br/>/' Cyber Cafe / Internet Café;<br/>; Social Network Service Provider;<br/>• LIABILITY OF INTERMEDIARIES, FOR THE OFFENCE OF CYBER PORNOGRAPHY UNDER SECTION 67 OF THE LT. ACT, 2000 : A CRITICAL ANALYSIS;<br/>• LEGAL DEVELOPMENTS IN THE U.S. ON THE DUTIES AND LIABILITIES OF INTERMEDIARIES: A BRIEF ANALYSIS;<br/>2. NATURE & TYPES OF CYBER CRIMES AND CRITICAL ANALYSIS OF CYBER CRIMES INSERTED IN THE I.T. ACT, 2000 BY THE I.T. (AMENDMENT) ACT, 2008;<br/>• COMPUTER CONTAMINANTS AND VIRUS: EVERY COMPUTER USER IS A VICTIM AND A CRIMINAL!;<br/>• FORGERY OF DIGITAL AND ELECTRONIC SIGNATURES: THE 'GREAT' CRIME AND THE<br/>'GREATEST CRIMINAL';<br/>• BLOGS, DEFAMATION, HATE SPEECH, RACIST AND XENOPHOBIC PROPAGANDA;<br/>• IDENTITY THEFT, DATA THEFT, BREACH OF TRUST, PHISHING AND OTHER CYBER FRAUDS;<br/>• HACKING;<br/>• SPAMAND CYBERSTALKING;<br/>• CYBER TERRORISM OR TERRORISM OF THE LAW!;<br/>• JURISDICTION OVER CYBER CRIMES: THE SILENT AMENDMENTS;<br/>• STRATEGIES TO CURB CYBER CRIMES: A CRITIQUE;<br/>3. LEADING ELECTRONIC EVIDENCE IN THE COURT: CRITICAL ANALYSIS AND THE STEPWISE PROCESS;<br/>• CLASSIFICATION & NATURE OF ELECTRONIC EVIDENCE AND SHORTCOMINGS<br/>IN THE AMENDMENTS TO THE INDIAN EVIDENCE ACT, 1872;<br/>• LEADING ELECTRONIC EVIDENCE: THE STEPBY-STEP PROCESS;<br/>• Admissibility & Relevancy;<br/>• Proof of Electronic Records;<br/>• Authorship of Electronic Records;<br/>• PROOF OF DIGITAL SIGNATURES;<br/>• PROOF OF ELECTRONIC MAIL;<br/>• PROOF OF COMPUTER PROCESSES AND VALUE OF ELECTRONIC EVIDENCE;<br/>4. ELECTRONIC EVIDENCE, CRIMINAL INVESTIGATION AND PRIVACY VERSUS SECURITY;<br/>• FINDING THE CRIMINAL THROUGH ELECTRONIC EVIDENCE;<br/>• IPA (Internet Protocol Address);<br/>• Media Access Control No. (MAC No,) and International Mobile Equipment Identification No. (IMEI No.) etc.;<br/>• Tracking of e-mails and web-sites;<br/>• The difficult terrain;<br/>• PRIVACY VERSUS SECURITY: INTERCEPTION OF ELECTRONIC CONTENT/ COMMUNICATION "FOR INVESTIGATION OF ANY OFFENCE";<br/>• COLLECTING ELECTRONIC EVIDENCE FROM THE COMPUTER;<br/>• Electronic evidence is very sensitive;<br/>• Presence of computer / IT expert(s) in the investigation team;<br/>• Task assignment;<br/>• Planning the search and seizure operation;<br/>• Securing the place of search and element of surprise;<br/>• Documenting the place of search;<br/>• Enquiries from the occupants;<br/>• Seizing the computer system itself may not be practical in many cases;<br/>• Removal of the hard disk;<br/>• Apply the 'Write Blocking' software;<br/>• Need for forensic software on suspect media;<br/>• Preventive measures;<br/>• Packaging and transportation of electronic evidence;<br/>• Storing electronic evidence;<br/>• Chain of custody;<br/>• Preserving the original;<br/>• "Deletion" myths and digital forensics;<br/>5. SHOULD INDIA SIGN THE CONVENTION ON CYBER CRIME?;<br/>• USE OF TERMS: CONVENTION VERSUS DOMESTIC LAW;<br/>• SUBSTANTIVE CRIMINAL LAW: CONVENTION VERSUS DOMESTIC LAW;<br/>• Article 2;<br/>• Article 3;<br/>• Article 4;<br/>• Article 5;<br/>• Article 6;<br/>• Article 7;<br/>• Article 8;<br/>• Article 9;<br/>• Article 10;<br/>• Article 11;<br/>• Articles 12 & 13;<br/>• PROCEDURAL LAW: CONVENTION VERSUS DOMESTIC LAW;<br/>• Article 14;<br/>• Article 15;<br/>• Article 16;<br/>• Article 17;<br/>• Article 18;<br/>• Article 19;<br/>• Articles 20 & 21;<br/>• ARTICLE 22: JURISDICTION UNDER THE CONVENTION;<br/>• CHAPTER III OF THE CONVENTION: INTERNATIONAL COOPERATION;<br/>• Article 23;<br/>• Article 24;<br/>• Articles 25 – 28;<br/>• Articles 29 – 35;<br/>• CONCLUSION;<br/>APPENDIX 1 : THE INFORMATION TECHNOLOGY (AMENDMENT) ACT, 2008 [10 OF 2009];<br/>APPENDIX 2 : THE INFORMATION TECHNOLOGY ACT, 2000 [21 OF 2000];<br/>APPENDIX 3 : CONVENTION ON CYBER CRIME;<br/>APPENDIX 4 : ADDITIONAL PROTOCOL TO THE CONVENTION ON CYBER CRIME;<br/>SUBJECT INDEX.<br/>
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element 1. Cyber Laws - Cyber Crime 2. Electronic Commerce Laws3. Information Tecdhnology Law
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name
--
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type BOOKs
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Date last checked out Price effective from Koha item type
        National Law School National Law School   30.05.2017 650.00 4 343.09945 SOO-2 25682 08.01.2024 30.12.2023 30.05.2017 BOOKs