Page 297 - DMGT306_MERCANTILE_LAWS_II
P. 297
Mercantile Laws – II
Notes Key pair: “Key pair”, in an asymmetric crypto system, means a private key and its mathematically
related public key, which are so related that the public key can verify a digital signature created
by the private key.
14.11 Review Questions
1. What are the various cyber offences listed under the Act?
2. Is it true that majority of cyber offences have been made bailable?
3. What are computer related offences?
4. Whether sending offensive messages through communication service is an offence?
5. What is the punishment for identity theft prescribed under the Act?
6. What are the penalties under IT Act?
7. How does the adjudication procedure works under the IT Act?
8. Discuss the importance of IT Act in e-governance?
9. What are the objectives of the IT Act?
10. Explain the need for advancement in the record keeping phenomenon in the country and
how is it beneficial?
Answers: Self Assessment
1. True 2. True
3. True 4. True
5. True 6. True
7. True 8. True
9. True 10. Digital signature
11. Public key infrastructure 12. Adjudicating Officer
13. IX 14. Filing of documents
15. Offence
14.12 Further Readings
Books Becky Hogge – Barefoot into Cyberspace: Adventures in Search of Techno-Utopia
Berin Szoka & Adam Marcus (eds.) – The Next Digital Decade: Essays on the Future of
the Internet
Chris Marsden – Internet Co-Regulation: European Law, Regulatory Governance and
Legitimacy in Cyberspace
Eddan Katz & Ramesh Subramanian (Eds.) -The Global Flow of Information: Legal,
Social, and Cultural Perspectives
Evgeny Morozov – The Net Delusion: The Dark Side of Internet Freedom Micah
Sifry – WikiLeaks and the Age of Transparency
292 LOVELY PROFESSIONAL UNIVERSITY