Certified Cyber Law Analyst

1. Understanding Internet and Cyber Laws

1.1 Modem Era
1.2 Need for Cyber Laws
1.3 Historical Perspective
1.4 The Character and Use of Internet Technology

2. Conceptual Framework

2.1 What is E-commerce?
2.2 Growth and Development of E-commerce
2.3 Various Modes of E-commerce
2.4 Mechanism Involved in the Operation of Internet
2.5 Types of Players in E-commerce
2.6 Web Development and Hosting Agreements
2.7 Web Hosting
2.8 The Problem of Internet Jurisdiction
2.9 Illustrative Cases
2.10 Type of Websites

3. The Role of Electronic Signature

3.1 Indian Economy
3.2 Basic Laws
3.3 Authentication of Digital Signature and Electronic Records
3.4 UNCITRAL
3.5 Securing Electronic Transactions
3.6 Hash Function Basics
3.7 Digital Signature’s Verification
3.8 Certifying Authorities and Electronic Signature under Indian Law
3.9 The Functions of Controller and Other Officers
3.10 Feasibility of Implementing Digital Signature
3.11 Security and Privacy of Digital Signatures
3.12 Private Key Escrow and Key Recovery System
3.13 Obligation of a Certifying Authority and Certificate Management
3.14 Security Threats
3.15 International Efforts
3.16 The Singapore Electronic Transaction Act, 1998
3.17 Different Approaches of Digital Signatures

4. Legal Aspects of Electronic Records

4.1 Electronic Records Recognition
4.2 The Position in the US and Australia
4.3 Electronic Records Retention in India
4.4 UNCITRAL Model Law for Retention
4.5 Attribution, Acknowledgement and Dispatch in India
4.6 UNCITRAL on Attribution and Acknowledgement
4.7 Acknowledgement of Receipt in India

5. Certifying Authorities in India

5.1 The Role of Certifying Authority (CA)
5.2 Functions and Appointment of Controller
5.3 License to Issue Digital Signature
5.4 Renewal and Suspension of CA License
5.5 Security Guidelines for CA
5.6 Surrender of License and Cessation as CA
5.7 CA and Disclosure of Information
5.8 Electronic Signature Certificate issuance and suspension by CA
5.9 Archiving and Revocation of Digital Signature Certificates
5.10 Rules of Compromise
5.11 Confidential Information and Access Rules
5.12 Duties of Subscribers

6. IPR Protection in India

6.1 The Domain Name Relevance in IPR
6.2 Cyberspace Squatting
6.3 Bad Faith and Domain Name Infringement
6.4 Some Complaints from India before WIPO
6.5 Protection of Copying in Cyberspace
6.6 Rights of Software Copyright Owners
6.7 Infringement of Copyright
6.8 Linking, Hyper-Linking and Framing
6.9 Remedies for Infringement
6.10 The Liabilities of an Internet Services Provider (ISP)
6.11 Cyberspace and the Protection of Patents in India

7. International Cyberspace Laws

7.1 United Nations Commission on International Trade Law
7.2 The Organization for Economic Cooperation Development (OECD)
7.3 World Trade Organisation (WTO) and E-Commerce
7.4 The World Intellectual Property Organisation (WIPO) and E-commerce
7.5 The Internet Corporation for Assigned Name and Numbers (ICANN)
7.6 Asia Pacific Economic Cooperation (APEC)
7.7 US Agencies for E-commerce Law and Policy
7.8 Internet Law and Forum
7.9 International Chamber of Commerce
7.10 Singapore Electronic Transactions Guidelines

8. Council of Europe’s (COE) Convention

8.1 Domestic Measures on Child Pornography
8.2 Infringements of Copyrights and Related Rights Offences
8.3 Extradition under COE
8.4 Mutual Assistance between the States

9. IT Act and Judicial Review

9.1 Penalty and Compensation for Damage
9.2 Compensation for Failure to Protect Data
9.3 Penalty for Failure to Furnish Information
9.4 Adjudication of Disputes under the IT Act
9.5 Cyber Appellate Tribunal
9.6 Compounding of Contraventions and Recovery of Penalty
9.7 Appeal to the High Court under the IT Act

10. Important Offences under the Cyberspace Law

10.1 Obscenity and Pornography
10.2 Hacking
10.3 Other Offences
10.4 Violation of the Right Privacy
10.5 Violation of Privacy, Breach of Confidentially and Privacy
10.6 Terrorism

11. Offences under the IT Act in India

11.1 Cyber crimes offence by Intermediaries
11.2 Power of the Controller
11.3 Directions for Monitoring of Information
11.4 Collecting Traffic Data
11.5 Protected System Offences
11.6 The Misrepresentation Offence
11.7 Electronic Signature Certificate with False Particulars
11.8 Confiscation as Penalty
11.9 Compounding of Offences under the IT Act
11.10 Cognizance of Offences and Bail under the IT Act
11.11 Punishment for Abetment and Attempt to Commit Offences
11.12 Commission of Offences by Companies under the IT Act
11.13 The Power of Police to Enter and Search
11.14 Protection of Action Taken in a Goods Faith
11.15 Amendments to IT Act

12. Electronic Evidence and the Miscellaneous Provisions of the IT Act

12.1 Indian Evidence Act
12.2 Examiner of Electronic Evidence
12.3 Amendments to the Indian Evidence Act 1872,
12.4 The Appointment of National Nodal Agency
12.5 Indian Computer Emergency Response Team (CERT)
12.6 Electronic Cheques Laws
12.7 Advisory Committee
12.8 Security Practices and Sensitive Personal Information

Share this post
[social_warfare]
Negotiation Manager Tutorials
Certified Criminal Procedure Code Analyst

Get industry recognized certification – Contact us

keyboard_arrow_up