000 05558nam a2200205Ia 4500
999 _c28262
_d28262
003 OSt
005 20201222111800.0
008 160316s2010 xxu||||| |||| 00| 0 eng d
040 _cnls
082 _a343.099450
_bSOO-2
100 _aSood Vivek
245 _aCyber crimes, electronic evidence and investigation : Legal issues
260 _aNew Delhi
_bNabhi Publications
_c2010
300 _a428p
_cxi
365 _b Rs. 650
505 _aContents Forward; Abbreviations; Preface; 1. CYBER PORNOGRAPHY AND CRIMINAL LIABILITY OF SEARCH ENGINES, TELECOM SERVICE PROVIDERS, INTERNET SERVICE PROVIDERS & OTHER INTERMEDIARIES: A LEGAL DILEMMA; * PORNOGRAPHY LAW IN THE REAL WORLD; • Historical development of the law and the Hicklin test of obscenity; • Section 292 IPC; • Constitutional validity of Section 292 IPC; • Applicability of Section 292 IPC and the Hicklin Test: Some important cases; • SECTION 292 IPC VERSUS SECTION OF THE INFORMATION TECHNOLOGY ACT, 2000: A COMPARATIVE ANALYSIS; • LAW OF PORNOGRAPHY IN THE AGE OF THE INTERNET: A CRITIQUE; • SCOPE AND PRACTICAL APPLICATION OF SECTION 67 LT. ACT, 2000; • DPS 'MMS' Case : Critique; • LIABILITY OF INTERMEDIARIES AND IMMUNITY FROM LIABILITY: A CRITIQUE; • The Problem and Issues; • Status of Intermediaries under the LT. Act, 2000 as amended by the I.T. (Amendment) Act, 2008 and their functions/roles in the Cyber World; Internet Service Provider (ISP); Web-hosting Service Provider and Blog Service Provider; Telecom Service Provider; Network Service Provider (NSP); Search Engine; Payment Service Provider/Online Payment Sites; ; On-line auction sites; /' Cyber Cafe / Internet Café; ; Social Network Service Provider; • LIABILITY OF INTERMEDIARIES, FOR THE OFFENCE OF CYBER PORNOGRAPHY UNDER SECTION 67 OF THE LT. ACT, 2000 : A CRITICAL ANALYSIS; • LEGAL DEVELOPMENTS IN THE U.S. ON THE DUTIES AND LIABILITIES OF INTERMEDIARIES: A BRIEF ANALYSIS; 2. NATURE & TYPES OF CYBER CRIMES AND CRITICAL ANALYSIS OF CYBER CRIMES INSERTED IN THE I.T. ACT, 2000 BY THE I.T. (AMENDMENT) ACT, 2008; • COMPUTER CONTAMINANTS AND VIRUS: EVERY COMPUTER USER IS A VICTIM AND A CRIMINAL!; • FORGERY OF DIGITAL AND ELECTRONIC SIGNATURES: THE 'GREAT' CRIME AND THE 'GREATEST CRIMINAL'; • BLOGS, DEFAMATION, HATE SPEECH, RACIST AND XENOPHOBIC PROPAGANDA; • IDENTITY THEFT, DATA THEFT, BREACH OF TRUST, PHISHING AND OTHER CYBER FRAUDS; • HACKING; • SPAMAND CYBERSTALKING; • CYBER TERRORISM OR TERRORISM OF THE LAW!; • JURISDICTION OVER CYBER CRIMES: THE SILENT AMENDMENTS; • STRATEGIES TO CURB CYBER CRIMES: A CRITIQUE; 3. LEADING ELECTRONIC EVIDENCE IN THE COURT: CRITICAL ANALYSIS AND THE STEPWISE PROCESS; • CLASSIFICATION & NATURE OF ELECTRONIC EVIDENCE AND SHORTCOMINGS IN THE AMENDMENTS TO THE INDIAN EVIDENCE ACT, 1872; • LEADING ELECTRONIC EVIDENCE: THE STEPBY-STEP PROCESS; • Admissibility & Relevancy; • Proof of Electronic Records; • Authorship of Electronic Records; • PROOF OF DIGITAL SIGNATURES; • PROOF OF ELECTRONIC MAIL; • PROOF OF COMPUTER PROCESSES AND VALUE OF ELECTRONIC EVIDENCE; 4. ELECTRONIC EVIDENCE, CRIMINAL INVESTIGATION AND PRIVACY VERSUS SECURITY; • FINDING THE CRIMINAL THROUGH ELECTRONIC EVIDENCE; • IPA (Internet Protocol Address); • Media Access Control No. (MAC No,) and International Mobile Equipment Identification No. (IMEI No.) etc.; • Tracking of e-mails and web-sites; • The difficult terrain; • PRIVACY VERSUS SECURITY: INTERCEPTION OF ELECTRONIC CONTENT/ COMMUNICATION "FOR INVESTIGATION OF ANY OFFENCE"; • COLLECTING ELECTRONIC EVIDENCE FROM THE COMPUTER; • Electronic evidence is very sensitive; • Presence of computer / IT expert(s) in the investigation team; • Task assignment; • Planning the search and seizure operation; • Securing the place of search and element of surprise; • Documenting the place of search; • Enquiries from the occupants; • Seizing the computer system itself may not be practical in many cases; • Removal of the hard disk; • Apply the 'Write Blocking' software; • Need for forensic software on suspect media; • Preventive measures; • Packaging and transportation of electronic evidence; • Storing electronic evidence; • Chain of custody; • Preserving the original; • "Deletion" myths and digital forensics; 5. SHOULD INDIA SIGN THE CONVENTION ON CYBER CRIME?; • USE OF TERMS: CONVENTION VERSUS DOMESTIC LAW; • SUBSTANTIVE CRIMINAL LAW: CONVENTION VERSUS DOMESTIC LAW; • Article 2; • Article 3; • Article 4; • Article 5; • Article 6; • Article 7; • Article 8; • Article 9; • Article 10; • Article 11; • Articles 12 & 13; • PROCEDURAL LAW: CONVENTION VERSUS DOMESTIC LAW; • Article 14; • Article 15; • Article 16; • Article 17; • Article 18; • Article 19; • Articles 20 & 21; • ARTICLE 22: JURISDICTION UNDER THE CONVENTION; • CHAPTER III OF THE CONVENTION: INTERNATIONAL COOPERATION; • Article 23; • Article 24; • Articles 25 – 28; • Articles 29 – 35; • CONCLUSION; APPENDIX 1 : THE INFORMATION TECHNOLOGY (AMENDMENT) ACT, 2008 [10 OF 2009]; APPENDIX 2 : THE INFORMATION TECHNOLOGY ACT, 2000 [21 OF 2000]; APPENDIX 3 : CONVENTION ON CYBER CRIME; APPENDIX 4 : ADDITIONAL PROTOCOL TO THE CONVENTION ON CYBER CRIME; SUBJECT INDEX.
650 _a1. Cyber Laws - Cyber Crime 2. Electronic Commerce Laws3. Information Tecdhnology Law
700 _a
_a
942 _2ddc
_cBK