Search the Library Catalogue
| 000 -LEADER | |
|---|---|
| fixed length control field | 05558nam a2200205Ia 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20201222111800.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 160316s2010 xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | nls |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 343.099450 |
| Item number | SOO-2 |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Sood Vivek |
| 245 ## - TITLE STATEMENT | |
| Title | Cyber crimes, electronic evidence and investigation : Legal issues |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | New Delhi |
| Name of publisher, distributor, etc. | Nabhi Publications |
| Date of publication, distribution, etc. | 2010 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 428p |
| Dimensions | xi |
| 365 ## - TRADE PRICE | |
| Price amount | Rs. 650 |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Contents<br/>Forward;<br/>Abbreviations;<br/>Preface;<br/>1. CYBER PORNOGRAPHY AND CRIMINAL LIABILITY OF SEARCH ENGINES, TELECOM SERVICE PROVIDERS, INTERNET SERVICE PROVIDERS & OTHER INTERMEDIARIES: A LEGAL DILEMMA;<br/>* PORNOGRAPHY LAW IN THE REAL WORLD;<br/>• Historical development of the law and the Hicklin test of obscenity;<br/>• Section 292 IPC;<br/>• Constitutional validity of Section 292 IPC;<br/>• Applicability of Section 292 IPC and the Hicklin Test: Some important cases;<br/>• SECTION 292 IPC VERSUS SECTION OF THE INFORMATION TECHNOLOGY ACT, 2000: A COMPARATIVE ANALYSIS;<br/>• LAW OF PORNOGRAPHY IN THE AGE OF THE INTERNET: A CRITIQUE;<br/>• SCOPE AND PRACTICAL APPLICATION OF SECTION 67 LT. ACT, 2000;<br/>• DPS 'MMS' Case : Critique;<br/>• LIABILITY OF INTERMEDIARIES AND IMMUNITY FROM LIABILITY: A CRITIQUE;<br/>• The Problem and Issues;<br/>• Status of Intermediaries under the LT. Act, 2000 as amended by the I.T. (Amendment) Act, 2008 and their functions/roles in the Cyber World;<br/>Internet Service Provider (ISP);<br/>Web-hosting Service Provider and Blog Service Provider;<br/>Telecom Service Provider;<br/>Network Service Provider (NSP);<br/>Search Engine;<br/>Payment Service Provider/Online Payment Sites;<br/>; On-line auction sites;<br/>/' Cyber Cafe / Internet Café;<br/>; Social Network Service Provider;<br/>• LIABILITY OF INTERMEDIARIES, FOR THE OFFENCE OF CYBER PORNOGRAPHY UNDER SECTION 67 OF THE LT. ACT, 2000 : A CRITICAL ANALYSIS;<br/>• LEGAL DEVELOPMENTS IN THE U.S. ON THE DUTIES AND LIABILITIES OF INTERMEDIARIES: A BRIEF ANALYSIS;<br/>2. NATURE & TYPES OF CYBER CRIMES AND CRITICAL ANALYSIS OF CYBER CRIMES INSERTED IN THE I.T. ACT, 2000 BY THE I.T. (AMENDMENT) ACT, 2008;<br/>• COMPUTER CONTAMINANTS AND VIRUS: EVERY COMPUTER USER IS A VICTIM AND A CRIMINAL!;<br/>• FORGERY OF DIGITAL AND ELECTRONIC SIGNATURES: THE 'GREAT' CRIME AND THE<br/>'GREATEST CRIMINAL';<br/>• BLOGS, DEFAMATION, HATE SPEECH, RACIST AND XENOPHOBIC PROPAGANDA;<br/>• IDENTITY THEFT, DATA THEFT, BREACH OF TRUST, PHISHING AND OTHER CYBER FRAUDS;<br/>• HACKING;<br/>• SPAMAND CYBERSTALKING;<br/>• CYBER TERRORISM OR TERRORISM OF THE LAW!;<br/>• JURISDICTION OVER CYBER CRIMES: THE SILENT AMENDMENTS;<br/>• STRATEGIES TO CURB CYBER CRIMES: A CRITIQUE;<br/>3. LEADING ELECTRONIC EVIDENCE IN THE COURT: CRITICAL ANALYSIS AND THE STEPWISE PROCESS;<br/>• CLASSIFICATION & NATURE OF ELECTRONIC EVIDENCE AND SHORTCOMINGS<br/>IN THE AMENDMENTS TO THE INDIAN EVIDENCE ACT, 1872;<br/>• LEADING ELECTRONIC EVIDENCE: THE STEPBY-STEP PROCESS;<br/>• Admissibility & Relevancy;<br/>• Proof of Electronic Records;<br/>• Authorship of Electronic Records;<br/>• PROOF OF DIGITAL SIGNATURES;<br/>• PROOF OF ELECTRONIC MAIL;<br/>• PROOF OF COMPUTER PROCESSES AND VALUE OF ELECTRONIC EVIDENCE;<br/>4. ELECTRONIC EVIDENCE, CRIMINAL INVESTIGATION AND PRIVACY VERSUS SECURITY;<br/>• FINDING THE CRIMINAL THROUGH ELECTRONIC EVIDENCE;<br/>• IPA (Internet Protocol Address);<br/>• Media Access Control No. (MAC No,) and International Mobile Equipment Identification No. (IMEI No.) etc.;<br/>• Tracking of e-mails and web-sites;<br/>• The difficult terrain;<br/>• PRIVACY VERSUS SECURITY: INTERCEPTION OF ELECTRONIC CONTENT/ COMMUNICATION "FOR INVESTIGATION OF ANY OFFENCE";<br/>• COLLECTING ELECTRONIC EVIDENCE FROM THE COMPUTER;<br/>• Electronic evidence is very sensitive;<br/>• Presence of computer / IT expert(s) in the investigation team;<br/>• Task assignment;<br/>• Planning the search and seizure operation;<br/>• Securing the place of search and element of surprise;<br/>• Documenting the place of search;<br/>• Enquiries from the occupants;<br/>• Seizing the computer system itself may not be practical in many cases;<br/>• Removal of the hard disk;<br/>• Apply the 'Write Blocking' software;<br/>• Need for forensic software on suspect media;<br/>• Preventive measures;<br/>• Packaging and transportation of electronic evidence;<br/>• Storing electronic evidence;<br/>• Chain of custody;<br/>• Preserving the original;<br/>• "Deletion" myths and digital forensics;<br/>5. SHOULD INDIA SIGN THE CONVENTION ON CYBER CRIME?;<br/>• USE OF TERMS: CONVENTION VERSUS DOMESTIC LAW;<br/>• SUBSTANTIVE CRIMINAL LAW: CONVENTION VERSUS DOMESTIC LAW;<br/>• Article 2;<br/>• Article 3;<br/>• Article 4;<br/>• Article 5;<br/>• Article 6;<br/>• Article 7;<br/>• Article 8;<br/>• Article 9;<br/>• Article 10;<br/>• Article 11;<br/>• Articles 12 & 13;<br/>• PROCEDURAL LAW: CONVENTION VERSUS DOMESTIC LAW;<br/>• Article 14;<br/>• Article 15;<br/>• Article 16;<br/>• Article 17;<br/>• Article 18;<br/>• Article 19;<br/>• Articles 20 & 21;<br/>• ARTICLE 22: JURISDICTION UNDER THE CONVENTION;<br/>• CHAPTER III OF THE CONVENTION: INTERNATIONAL COOPERATION;<br/>• Article 23;<br/>• Article 24;<br/>• Articles 25 – 28;<br/>• Articles 29 – 35;<br/>• CONCLUSION;<br/>APPENDIX 1 : THE INFORMATION TECHNOLOGY (AMENDMENT) ACT, 2008 [10 OF 2009];<br/>APPENDIX 2 : THE INFORMATION TECHNOLOGY ACT, 2000 [21 OF 2000];<br/>APPENDIX 3 : CONVENTION ON CYBER CRIME;<br/>APPENDIX 4 : ADDITIONAL PROTOCOL TO THE CONVENTION ON CYBER CRIME;<br/>SUBJECT INDEX.<br/> |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | 1. Cyber Laws - Cyber Crime 2. Electronic Commerce Laws3. Information Tecdhnology Law |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | |
| -- | |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | BOOKs |
| Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Date last checked out | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| National Law School | National Law School | 30.05.2017 | 650.00 | 4 | 343.09945 SOO-2 | 25682 | 08.01.2024 | 30.12.2023 | 30.05.2017 | BOOKs |