Page 297 - DMGT306_MERCANTILE_LAWS_II
P. 297

Mercantile Laws – II




                    Notes          Key pair: “Key pair”, in an asymmetric crypto system, means a private key and its mathematically
                                   related public key, which are so related that the public key can verify a digital signature created
                                   by the private key.

                                   14.11 Review Questions

                                   1.  What are the various cyber offences listed under the Act?
                                   2.  Is it true that majority of cyber offences have been made bailable?

                                   3.  What are computer related offences?
                                   4.  Whether sending offensive messages through communication service is an offence?
                                   5.  What is the punishment for identity theft prescribed under the Act?
                                   6.  What are the penalties under IT Act?
                                   7.  How does the adjudication procedure works under the IT Act?

                                   8.  Discuss the importance of IT Act in e-governance?
                                   9.  What are the objectives of the IT Act?
                                   10.  Explain the need for advancement in the record keeping phenomenon in the country and
                                       how is it beneficial?

                                   Answers: Self  Assessment

                                   1.  True                              2.   True
                                   3.  True                              4.   True
                                   5.  True                              6.   True

                                   7.  True                              8.   True
                                   9.  True                              10.  Digital signature
                                   11.  Public key infrastructure        12.  Adjudicating Officer
                                   13.  IX                               14.  Filing of documents

                                   15.  Offence

                                   14.12 Further Readings




                                   Books       Becky Hogge – Barefoot into Cyberspace: Adventures in Search of Techno-Utopia
                                               Berin Szoka & Adam Marcus (eds.) – The Next Digital Decade: Essays on the Future of
                                               the Internet

                                               Chris Marsden – Internet Co-Regulation: European Law, Regulatory Governance and
                                               Legitimacy in Cyberspace
                                               Eddan Katz & Ramesh Subramanian (Eds.) -The Global Flow of Information: Legal,
                                               Social, and Cultural Perspectives
                                               Evgeny Morozov – The  Net  Delusion: The  Dark Side  of Internet  Freedom Micah
                                               Sifry – WikiLeaks and the Age of Transparency



          292                               LOVELY PROFESSIONAL UNIVERSITY
   292   293   294   295   296   297   298   299   300