CYBER LÄW IN INDIA. (Law on Internet) Dr. Farooq Ahmad Reader, Department of Law University of Kashmir, Srinagar

Size: px
Start display at page:

Download "CYBER LÄW IN INDIA. (Law on Internet) Dr. Farooq Ahmad Reader, Department of Law University of Kashmir, Srinagar"

Transcription

1 CYBER LÄW IN INDIA (Law on Internet) Dr. Farooq Ahmad Reader, Department of Law University of Kashmir, Srinagar New Era Law Publications Law Book Publishers, 1159, Outrem Linea, DELHI

2 Contents Preface to Second Edition Preface to First Edition Table of Cases CHAPTER 1 Early Development of Digital Computer Evolution of Computer Industry Evolution of Internet I. Genesis of Internet II. Internet Functioning III. Internet Potential Internet Domain Survey, January 2001 Number of Hosts advertised in the DNS IV. Communication through Internet V. Modes of Communication List Serv Sharing of Information Databases Real Time Text Based Communications (Talk and IRC) Real-Time Remote Computer Utilization (Talnet) Remote Retrieval of Information Internet Challenges Problems CHAPTER 2 Potential and Problems CHAPTER 3 Genesis, Object and Scope of the IT Art Object of the Act (xi)

3 xii Cyber Law in India (Law on Internet) Scope of the Act CHAPTER 4 Encryption Meaning Mathematical Basis of Encryption Symmetrie or shared key Encryption Symmetrie Cryptosystem Limitations of Symmetrie Cryptosystem Data Encryption Standard (i) Triple DES (ii) SkipJACK Proprietary algorithms Data Integrity Shared Key Encrypted Communications in practice Hybrid encryption System or Digital Envelope Digital Cash Time Stamping Service Asymmetrie Cryptosystem Asymmetrie cryptosystem for confidentiality Asymmetrie cryptosystem For Authentication RSAAlgorithm Mathematical basis of RSA How Public Cryptosystem works in practice? Advantages of Public Key Encryption Relationship of the Quality of Cryptosystem and Key Length EHiptic Curve Digital Signature CHAPTER 5 Authentication of Electronic Records and Electronic Governance Introduction Authentication of the Electronic Records Digital Signature RSA Digital Signatures RSA Digital Signature Scheine Hash Function... 64

4 Contents Working of Digital Signatures Digital Signatures in Practice Digital Watermarking Secure Electronic Record and Secure Digital Signatures Electronic Governance Legal Recognition of Electronic Records Legal Recognition of Digital Signatures Use of Electronic Records and Digital Signatures in Government and its agencies Retention of Electronic Records Publication of Rules, Regulations, etc. in Electronic Gazette Power to Make Rules CHAPTER 6 Certifying Authorüies Need of Certifying Authority Functioning of the Certifying Authority Types of Certificates Identification Certificate Authorizing Certificate Transactional Certificate Digital Time Stamping Service Validity Period of Digital Signatures Certificate Chain Appointment of Controller Functions of Controller Controller to act as Repository Powers of the Controller Power to Recognise Foreign Certifying Authorities Power to issue Licence Power to Renew Licence Power to Suspend or Revoke Licence Power to Delegate and Investigate (a) Power regarding Discovery and Production of Evidence, etc (b) Power of Search and Seizure (c) Power to Requisition Books of Account, etc

5 xiv Cyber Law in India (Law on Internet) (d) Power to Call for Information (e) Power of Survey (f) Power to Collect Certain Information (g) Power to Inspect Registers of Companies Power to have Access to Computers and Data Power to issue Directions Power to Decrypt Information Power to Make Regulations Database of Certifying Authorities Who can be a Certifying Authority? Application for licence Certification Practice Statement Issuance of Licence Refusal of Licence Surrender of Licence Cross Certification Duties of Certifying Authorities Certifying Authority to follow Procedures Certifying Authority as an Indemnifier Disclosure of Certain Facts Commencement of Commercial Operation by Licensed Certifying Authorities Requirements prior to Cessation as Certifying Authority Digital Signature Certificates Digital Signature Certificate Digital Signature Certificate Standard Representations upon issuance of Digital Signature Certificate Generation of Digital Signature Certificate Issue of Digital Signature Certificate Lifetime of Certificate Suspension of Digital Signature Certificate Revocation of Digital Signature Certificate Certificate Revocation List (CRL) Compromise of Digital Signature Certificate Archival of Digital Signature Certificate Audit

6 Contents Confidential Information Duties of Subscribers Generating Key Pair Acceptance of Digital Signature Certificate Control of Private Key CHAPTER 7 Domain Name Disputes and Trademark Law Background of Domain Names : Where Lies the Dispute? Intersection of Internet Domain Names and the Trademark Law Commercial use of the Mark Similarity of mark With the Registered Mark Dilution of Trademark Likelihood of Consumer Confusion New Concepts In Trademark Jurisprudence Cyberquatting Reverse Hijacking Metatages Keyword Banners Hyperlinks Framing Grip Sites and Fan Sites Spamming Jurisdiction in Trademark Disputes Objectives of the UDRP : Representation by Domain Name Applicant Mandatory Administrative Proceeding Application of UDRP Evidence of Registration and Use in Bad Faith Rights and Legitimate Interests of a Domain Name Holder Initiation of Proceedings and Process Appointment of the Panel and Timing of Decision Powers of the Panel Available Remedies Panel Decisions Availability of Court Proceedings xv

7 xvi Cyber Law in India (Law on Internet) Cancellation, Transfers and Changes Ban on Transfers During a Dispute Policy Modifications Decisions under UDRP Judicial Trends in India Protection of Domain Names Standard of Consumer Confusion Standard of Confusion Basis of Liabüity CHAPTER 8 Electronic Commerce Contracts by Electronic Data Interchange Cyber Contracts World Wide Web (www) Validity of Electronic Transactions Dichotomy of Offer And Invitation to Treat Application of Mirror Image Rule Communication of Offer and Acceptance Revocation of Offer and Acceptance Incorporation of Terms By Reference Mistake in Electronic Commerce Place of Formation of Contract Jurisdiction Identity of Parties..'. 244 CHAPTER 9 Service Provider's Uability for Copyright Infringement Who is an Internet Service Provider? Basis of Liability Judicial Trends Legislative Measures Indian Scenario Service Provider's Liability for Defamation Judicial Trends Legislative Measures

8 Contents xvü Service Provider's Liability for Pornography Test of Obscenity Internet Obscenity Legislative Measures CHAPTER 10 Cyber Regulations Appellate Tribunal Establishment and Composition of Cyber Appellate Tribunal Qualifications for Presiding Officer Term of Office, Salary, AHowances and other Terms and Conditions of Service of Presiding Officer Resignation, Removal and Filling up of Vacancies Staff of the Cyber Appellate Tribunal Jurisdiction of Cyber Appellate Tribunal Adjudicating Officer Powers of the Adjudicating Officer Factors to be taken into account by the Adjudicating officer Power to Award Compensation Powers of the Adjudicating Officer to Impose Penalty Compounding of Contravention Appeal to Cyber Regulations Appellate Tribunal Procedure and Powers of the Cyber Appellate Tribunal Procedure for Filing Applications Contents of Application Powers, Functions and Duties of the Registrar Service of Notice of Application on the Respondents Filing of Reply and other documents by the Respondent Hearing on application Orders and Directions of the Tribunal Registration of Legal Practitioner's Clerks Jurisdiction of the Civil Court Barred Appeal to High Court Constitution of Advisory Committee CHAPTER 11 Cyber Crimes Classification of Cyber Crimes F-2

9 xviii Cyber Law in India (Law on Internet) Computer as target of the Crime Computer as an instrument of Crime Computer as incidental to the Crime (A) Inlernet Crime (B) Web based Crimes Target of Computer Crime Challenge of Cyber Crimes Indian Schcme of Offences and Punishment Datnage to Computer, Computer system, etc Unauthorised Access Packet Sniffing Tcmpest attack Password Cracking Butter Overflow Computer Contaminant or Computer Virus (a) Viruses (b) Logic Bomb (c) Worms (d) Trojan Horse Programme Stealth Virus Polymorphic Virus Macro Virus Companion Virus Fast and Slow viruses Virus hoax Sparse Virus Denial of Service..., 324 SYN Attack User Datagram Protocol (UDP) Attack Internet Control Message Protocol (ICMP) Attack Smurf Attack Mültipronged Denial of Service Attack Tampering with Computer Source Documents Hacking Passwords Firewalls

10 Contents Encryption Digital Signatures Clipper Chip Routers or Gateways Operating System Publishing of Obscene Information in Electronic Form Test of Obscenity Prurient Interest Publication of Obscene Matter Knowledge of Obscenity Cyberstalking Internet Fraud Misuse Penalty for Misrepresentation Penalty for Breach of Confidentiality and Privacy Penalty for Publishing False Digital Signature Certificate Confiscation Penalties and Confiscation in addition to and not in Derogation of other Punishments Penalty for Failure to Furnish Information, return, etc. Residuary Penalty Extra Territorial Jurisdiction Investigation of Computer Crimes Offences by Companies Recovery of Penalties Power of Central Government to Make Rules Power of State Government to Make Rules APPENDICES 1. The Information Technology Act, The Information Technology (Certifying Authorities) Rules, 2000 ; 3. The Cyber Regulations Appellate Tribunal (Procedure) Rules, The Information Technology (Certifying Authority) Regulations, 2001 xix

11 xx Cyber Law in India (Law on Internet) 5. The Cyber Regulations Appellate Tribunal (Procedure for Investigation of Misbehaviour or Incapacity of Presiding Officer) Rules, The Information Technology (Other Powers of Civil Court Vested in Cyber Appellate Tribunal) Rules, The Information Technology (Other Standards) Rules, The Information Technology (Qualification and Experience of Adjudicating Officers and Manner of Holding Enquiry) Rules, The Cyber Regulations Appellate Tribunal (Salary, Allowances and other Terms and Conditions of Service of Presiding Officer) Rules, Bibliography Books Websites

STATUTORY INSTRUMENTS 2012 No. _

STATUTORY INSTRUMENTS 2012 No. _ STATUTORY INSTRUMENTS 2012 No. _ THE ELECTRONIC SIGNATURES REGULATIONS 2012 ARRANGEMENT OF REGULATIONS Regulation PART I-PRELIMINARY 1. Title. 2. Interpretation PART II - LICENSING AND RECOGNITION OF CERTIFICATION

More information

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches GFSU Certified Cyber Crime Investigator GFSU-CCCI 1. Internet Fundamentals 2. Cyber Crime Essentials 3. Cyber Investigation Essentials 4. Digital Evidence in Computer Devices 5. Cyber Forensics Essentials

More information

Vijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India

Vijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India Intellectual Property & Information Technology Laws Division Flat No 903, Indra Prakash Building, 21, Barakhamba Road, New Delhi 110001 (India) Phone: +91 11 42492532 (Direct) Phone: +91 11 42492525 Ext

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

CREDIT REPORTING BILL EXPLANATORY NOTES

CREDIT REPORTING BILL EXPLANATORY NOTES CREDIT REPORTING BILL EXPLANATORY NOTES INTRODUCTION These explanatory notes are intended as a guide to the proposed new Act. They are not meant as a substitute for a careful reading of the Bill itself.

More information

TERMS OF USE TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE

TERMS OF USE TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE TERMS OF USE FOR TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE Prior to the verification of the electronic certificate, or to access or use the certificate status information and other information contained

More information

India's Information Technology Act, 2000 (Jeevananda)

India's Information Technology Act, 2000 (Jeevananda) MINISTRY OF LAW, JUSTICE AND COMPANY AFFAIRS (Legislative Department) New Delhi, the 9th June, 2000/Jyaistha 19, 1922 (Saka) The following Act of Parliament received the assent of the President on the

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 6 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE Prior to the verification of the electronic certificate, or to access or use the certificate status information

More information

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224

By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224 COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist

More information

Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears.

Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES. 1. Definitions. In this regulation unless a contrary intention appears. Regulation 8.3.R2 COMPUTING AND NETWORK FACILITIES RULES 1. Definitions In this regulation unless a contrary intention appears Authority means (i) in relation to the central facilities and computing and

More information

LAWS OF BRUNEI CHAPTER 196 ELECTRONIC TRANSACTIONS ACT

LAWS OF BRUNEI CHAPTER 196 ELECTRONIC TRANSACTIONS ACT CHAPTER 196 ELECTRONIC TRANSACTIONS ACT S 93/00 REVISED EDITION 2008 B.L.R.O. 4/2008 Electronic Transactions 1 2008 Ed. CAP. 196 LAWS OF BRUNEI REVISED EDITION 2007 CHAPTER 197 ELECTRONIC TRANSACTIONS

More information

E-COMMERCE LAWS IN THE INDIAN PERSPECTIVE

E-COMMERCE LAWS IN THE INDIAN PERSPECTIVE E-COMMERCE LAWS IN THE INDIAN PERSPECTIVE Sumanjeet* Abstract Electronic commerce offers exceptional opportunities for the economic development of India, with its huge pool of technology skilled, English

More information

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers

More information

.bbva TLD Registration Policy

.bbva TLD Registration Policy .bbva TLD Registration Policy .bbva TLD Registration Policy 1. Eligibility Only BBVA and its Affiliates are eligible to register a Domain Name under the.bbva TLD. If the Registrant ceases to be eligible

More information

Act 7 Electronic Signatures Act 2011

Act 7 Electronic Signatures Act 2011 ACTS SUPPLEMENT No. 4 18th March, 2011. ACTS SUPPLEMENT to The Uganda Gazette No. 19 Volume CIV dated 18th March, 2011. Printed by UPPC, Entebbe, by Order of the Government. Act 7 Electronic Signatures

More information

Bangladesh National Parliament

Bangladesh National Parliament Bangladesh National Parliament Dhaka, 23 Ashwin, 1413/8 October, 2006 The following Act undertaken by the Parliament received approval from the President on 23 Ashwin, 1413 corresponding to 8 October 2006

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

Electronic Transactions Act, Act, 2008 2008 Act 772 ARRANGEMENT OF SECTIONS. Object and scope of the Act

Electronic Transactions Act, Act, 2008 2008 Act 772 ARRANGEMENT OF SECTIONS. Object and scope of the Act Electronic Transactions Act, Act, 2008 2008 Act 772 Section 1. Object of the Act 2. Application 3. Scope of Act 4. Exclusion ARRANGEMENT OF SECTIONS Object and scope of the Act Electronic transactions

More information

LOUISIANA STATE BAR ASSOCIATION PLAN OF LEGAL SPECIALIZATION

LOUISIANA STATE BAR ASSOCIATION PLAN OF LEGAL SPECIALIZATION LOUISIANA STATE BAR ASSOCIATION PLAN OF LEGAL SPECIALIZATION SECTION 1. PURPOSE AND OBJECTIVE 1.1 The objective of the Louisiana State Bar Association Plan of Legal Specialization ( Plan ) is to promote

More information

INSTRUCTIONS FOR COMPLETING THE USPTO CERTIFICATE ACTION FORM

INSTRUCTIONS FOR COMPLETING THE USPTO CERTIFICATE ACTION FORM INSTRUCTIONS FOR COMPLETING THE USPTO CERTIFICATE ACTION FORM The completed form should be sent to: Box EBC Washington D.C.20231 Block 1- Requestor Status The Certificate requester should check the appropriate

More information

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

ARTE TLD REGISTRATION POLICY

ARTE TLD REGISTRATION POLICY ARTE TLD REGISTRATION POLICY 1. ELIGIBILITY Only Association Relative à la Télévision Européenne G.E.I.E. (ARTE), its Affiliates or the Trademark Licensees could be eligible to register a Domain Name under

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

Cybercrime in Canadian Criminal Law

Cybercrime in Canadian Criminal Law Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime

More information

on the transfer of personal data from the European Union

on the transfer of personal data from the European Union on the transfer of personal data from the European Union BCRsseptembre 2008.doc 1 TABLE OF CONTENTS I. PRELIMINARY REMARKS 3 II. DEFINITIONS 3 III. DELEGATED DATA PROTECTION MANAGER 4 IV. MICHELIN GROUP

More information

TERMS OF USE FOR NOTARIAL PERSONAL REPRESENTATION CERTIFICATES FOR AUTHENTICATION

TERMS OF USE FOR NOTARIAL PERSONAL REPRESENTATION CERTIFICATES FOR AUTHENTICATION TERMS OF USE FOR NOTARIAL PERSONAL REPRESENTATION CERTIFICATES FOR AUTHENTICATION Prior to the verification of the electronic certificate, or to access or use the certificate status information and other

More information

Coverage is subject to a Deductible

Coverage is subject to a Deductible Frank Cowan Company Limited 75 Main Street North, Princeton, ON N0J 1V0 Phone: 519-458-4331 Fax: 519-458-4366 Toll Free: 1-800-265-4000 www.frankcowan.com CYBER RISK INSURANCE DETAILED APPLICATION Notes:

More information

INFORMATION TECHNOLOGY ACT, 2000 (21 of 2000)

INFORMATION TECHNOLOGY ACT, 2000 (21 of 2000) INFORMATION TECHNOLOGY ACT, 2000 (21 of 2000) [9th June, 2000] An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication,

More information

Our Customer Relationship Agreement HOSTING & DOMAINS SERVICE DESCRIPTION

Our Customer Relationship Agreement HOSTING & DOMAINS SERVICE DESCRIPTION Our Customer Relationship Agreement HOSTING & DOMAINS SERVICE DESCRIPTION iinet Limited ACN 068 628 937 Phone: 13 22 58 Westnet Pty Ltd ACN 086 416 908 Phone: 1300 786 068 Adam Internet Pty Ltd ACN 055

More information

Acceptable Use Policy

Acceptable Use Policy Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)

More information

AGENCY MANAGEMENT FRAMEWORK FOR INSURANCE AGENT

AGENCY MANAGEMENT FRAMEWORK FOR INSURANCE AGENT GENERAL INSURANCE ASSOCIATION OF SINGAPORE AGENCY MANAGEMENT FRAMEWORK FOR INSURANCE AGENT APPENDIX B1 OF GIARR General Insurance Association of Singapore 180 Cecil Street, #15-01 Bangkok Bank Building

More information

.IBM TLD Registration Policy

.IBM TLD Registration Policy I. Introduction These registration conditions govern the rights and obligations of the Registry Operator, International Business Machines Corporation ( Registry Operator or IBM ), and the accredited registrars,

More information

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill

More information

Electronic Documents Law

Electronic Documents Law Disclaimer: The English language text below is provided by the Translation and Terminology Centre for information only; it confers no rights and imposes no obligations separate from those conferred or

More information

ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM )

ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM ) ADDENDUM TO THE BLACKBERRY SOLUTION LICENSE AGREEMENT FOR BLACKBERRY BUSINESS CLOUD SERVICES FOR MICROSOFT OFFICE 365 ( the ADDENDUM ) IMPORTANT NOTICES: In order to access and/or use this Cloud Service

More information

National ElectricIty (Victoria) BIll

National ElectricIty (Victoria) BIll National ElectricIty (Victoria) BIll EXPLANATORY MEMORANDUM PART I-PRELIMINARY Clause 1 Clause 2 Clause 3 Clause 4 Clause 5 is formal. It states the purpose of the Act, being to make provision for the

More information

ARTL PKI. Certificate Policy PKI Disclosure Statement

ARTL PKI. Certificate Policy PKI Disclosure Statement ARTL PKI Certificate Policy PKI Disclosure Statement Important Notice: This document (PKI Disclosure Statement, PDS) does not by itself constitute the Certificate Policy under which Certificates governed

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

SECTION.0100 - GENERAL ADMINISTRATION

SECTION.0100 - GENERAL ADMINISTRATION 1 1 1 1 1 1 0 1 0 1 SECTION.00 - GENERAL ADMINISTRATION.01 HOW TO CONTACT THE ELECTRONIC COMMERCE SECTION The North Carolina Department of the Secretary of State administers the Electronic Commerce Act.

More information

DATA PROTECTION LAWS OF THE WORLD. India

DATA PROTECTION LAWS OF THE WORLD. India DATA PROTECTION LAWS OF THE WORLD India Date of Download: 6 February 2016 INDIA Last modified 27 January 2016 LAW IN INDIA There is no specific legislation on privacy and data protection in India. However,

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12. Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and

More information

562 DIGITAL SIGNATURE ACT

562 DIGITAL SIGNATURE ACT Digital Signature 1 LAWS OF MALAYSIA REPRINT Act 562 DIGITAL SIGNATURE ACT 1997 Incorporating all amendments up to 1 January 2006 PUBLISHED BY THE COMMISSIONER OF LAW REVISION, MALAYSIA UNDER THE AUTHORITY

More information

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX )

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

Domain Name Registration Agreement

Domain Name Registration Agreement Domain Name Registration Agreement This Domain Name Registration Agreement ("Agreement") is by and between Global Domains International, Inc. a California corporation, ("GDI") and you, your heirs, agents,

More information

1.3 By requesting us to register or manage a domain names or names on your behalf, you agree to:

1.3 By requesting us to register or manage a domain names or names on your behalf, you agree to: SPECIAL TERMS AND CONDITIONS FOR DOMAIN NAME MANAGEMENT SERVICES (DOMAIN PORTFOLIO MANAGEMENT SERVICE, LOCAL PRESENCE SERVICES AND ANONYMOUS REGISTRATION SERVICES) 1. Services 1.1 These Special Terms and

More information

TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )

TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide

More information

.Brand TLD Designation Application

.Brand TLD Designation Application .Brand TLD Designation Application Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program Staff RE: Application

More information

SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS

SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS These terms of use govern your use of our site. Please read the whole of these terms in full before you use this Website. If you do not accept these terms, please do not use this Website. Your continued

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

Training and Skills Development Act 2008

Training and Skills Development Act 2008 Version: 1.7.2015 South Australia Training and Skills Development Act 2008 An Act relating to higher education, vocational education and training, adult community education, and education services for

More information

PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.

PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES. Brightcore Consulting Moodle Hosting Service Agreement Last Revised: September 30, 2013 PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.

More information

GEOSURE PROTECTION PLAN

GEOSURE PROTECTION PLAN GEOSURE PROTECTION PLAN I. SCOPE/INTRODUCTION The GeoSure Protection Plan is designed to provide protection against economic loss resulting from specific types of risks associated with certain SSL Certificates

More information

KINGDOM OF SAUDI ARABIA. Capital Market Authority CREDIT RATING AGENCIES REGULATIONS

KINGDOM OF SAUDI ARABIA. Capital Market Authority CREDIT RATING AGENCIES REGULATIONS KINGDOM OF SAUDI ARABIA Capital Market Authority CREDIT RATING AGENCIES REGULATIONS English Translation of the Official Arabic Text Issued by the Board of the Capital Market Authority Pursuant to its Resolution

More information

Short title 1. This Act may be cited as the Accountants Act. Interpretation 2. In this Act, unless the context otherwise requires "accounting

Short title 1. This Act may be cited as the Accountants Act. Interpretation 2. In this Act, unless the context otherwise requires accounting Short title 1. This Act may be cited as the Accountants Act. Interpretation 2. In this Act, unless the context otherwise requires "accounting corporation" means a company approved as an accounting corporation

More information

How To Use A College Computer System Safely

How To Use A College Computer System Safely 1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.

More information

Application of the Electronic Communications and Transactions Act to Online Merchants From Other Jurisdictions

Application of the Electronic Communications and Transactions Act to Online Merchants From Other Jurisdictions Northwestern Journal of Technology and Intellectual Property Volume 1 Issue 1 Spring Article 7 Spring 2003 Application of the Electronic Communications and Transactions Act to Online Merchants From Other

More information

Wave s High-Speed Internet Service Acceptable Use Policy

Wave s High-Speed Internet Service Acceptable Use Policy Wave s High-Speed Internet Service Acceptable Use Policy Introduction. It is Wave's intent to provide our customers with the best Internet service possible. In order to accomplish this task, we have adopted

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

This compilation was prepared on 1 July 2006 taking into account amendments up to Act No. 34 of 2006

This compilation was prepared on 1 July 2006 taking into account amendments up to Act No. 34 of 2006 Bankruptcy Act 1966 Act No. 33 of 1966 as amended This compilation was prepared on 1 July 2006 taking into account amendments up to Act No. 34 of 2006 Volume 2 includes: Table of Contents Sections 154A

More information

9 Summary of California Law (10th), Corporations

9 Summary of California Law (10th), Corporations 9 Summary of California Law (10th), Corporations I. INTRODUCTION A. In General. 1. [ 1] Nature of Corporation. 2. [ 2] Reserved Legislative Power Over Corporation Law. 3. [ 3] Statutory Development. 4.

More information

BE IT ENACTED by the Queen s Most Excellent Majesty, by

BE IT ENACTED by the Queen s Most Excellent Majesty, by At a Tynwald held in Douglas, Isle of Man, the 21st day of October in the fifty-seventh year of the reign of our Sovereign Lady ELIZABETH THE SECOND by the Grace of God of the United Kingdom of Great Britain

More information

Certification Practice Statement (ANZ PKI)

Certification Practice Statement (ANZ PKI) Certification Practice Statement March 2009 1. Overview 1.1 What is a Certification Practice Statement? A certification practice statement is a statement of the practices that a Certification Authority

More information

Data protection and outsourcing industry - A study. By Kumar Mihir

Data protection and outsourcing industry - A study. By Kumar Mihir Data protection and outsourcing industry - A study By Kumar Mihir Scientia Potenti Est- Knowledge is power. The said maxim is apt to describe the primary business model in the 21 st century when information

More information

THE ELECTRONIC TRANSACTIONS LAW,

THE ELECTRONIC TRANSACTIONS LAW, CAYMAN ISLANDS Supplement No.2 published with Gazette No.19 dated Monday 11 th September, 2000 THE ELECTRONIC TRANSACTIONS LAW, 2000 (LAW 7 OF 2000) 2 THE ELECTRONIC TRANSACTIONS LAW, 2000 ARRANGEMENT

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

.ME. Rules for Uniform Domain Name Dispute Resolution Policy (the "Rules") (As approved by domen on November 13, 2015)

.ME. Rules for Uniform Domain Name Dispute Resolution Policy (the Rules) (As approved by domen on November 13, 2015) .ME Rules for Uniform Domain Name Dispute Resolution Policy (the "Rules") (As approved by domen on November 13, 2015) Administrative proceedings for the resolution of disputes under the Uniform Dispute

More information

Chapter 673 1999 EDITION. Accountants; Tax Consultants and Preparers

Chapter 673 1999 EDITION. Accountants; Tax Consultants and Preparers Chapter 673 1999 EDITION Accountants; Tax Consultants and Preparers ACCOUNTANTS (Generally) 673.010 Definitions for ORS 673.010 to 673.457 673.015 Statement of public interest in regulating practice of

More information

Digital Signatures & the Indian law

Digital Signatures & the Indian law Digital Signatures & the Indian law This document is an extract from the book Ecommerce - Legal Issues authored by Rohas Nagpal. This book is available as courseware for the Diploma in Cyber Law and PG

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy 1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines

More information

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION I. DEFINITIONS For the purpose of this Service Description, capitalized terms have the meaning defined herein. All other capitalized

More information

The Hearing Aid Sales and Service Act

The Hearing Aid Sales and Service Act 1 HEARING AID SALES AND SERVICE c. H-2.01 The Hearing Aid Sales and Service Act being Chapter H-2.01 of The Statutes of Saskatchewan, 2001 (effective March 10, 2006) as amended by the Statutes of Saskatchewan,

More information

DIVISION OF CORPORATIONS, BUSINESS AND PROFESSIONAL LICENSING

DIVISION OF CORPORATIONS, BUSINESS AND PROFESSIONAL LICENSING Statutes and Regulations Public Accountancy October 2014 (Centralized Statutes and Regulations not included) DEPARTMENT OF COMMERCE, COMMUNITY, AND ECONOMIC DEVELOPMENT DIVISION OF CORPORATIONS, BUSINESS

More information

Property Management Services Bill. Contents

Property Management Services Bill. Contents C2717 Property Management Services Bill Contents Clause Page Part 1 Preliminary 1. Short title and commencement... C2727 2. Interpretation... C2727 3. Property management services... C2733 4. Disciplinary

More information

THIRD SUPPLEMENT TO THE GIBRALTAR GAZETTE No. 4,167 of 7th May, 2015

THIRD SUPPLEMENT TO THE GIBRALTAR GAZETTE No. 4,167 of 7th May, 2015 THIRD SUPPLEMENT TO THE GIBRALTAR GAZETTE No. 4,167 of 7th May, 2015 B. 13/15 Clause PRIVATE TRUST COMPANIES BILL 2015 1. Short title and commencement. 2. Interpretation. 3. Registration of Private Trust

More information

Building Work Contractors Act 1995

Building Work Contractors Act 1995 Version: 21.11.2015 South Australia Building Work Contractors Act 1995 An Act to regulate building work contractors and the supervision of building work; and for other purposes. Contents Part 1 Preliminary

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND

More information

COUNSEL S CHAMBERS LIMITED

COUNSEL S CHAMBERS LIMITED COUNSEL S CHAMBERS LIMITED CCL s Acceptable Use Policy Policy for the use of CCL Network A. APPLICATION 1. This policy sets out terms and conditions on which Users may access and use CCL s Network. Please

More information

Communications Internet Acceptable Use Policy

Communications Internet Acceptable Use Policy Communications Internet Acceptable Use Policy Introduction Xact Associates, LLC dba Xact Communications and its affiliates and subsidiaries ("Xact," "we," or "us") appreciate the opportunity to provide

More information

REFERENCE TITLE: accountancy board; certified public accountants HB 2218. Introduced by Representative Thorpe AN ACT

REFERENCE TITLE: accountancy board; certified public accountants HB 2218. Introduced by Representative Thorpe AN ACT REFERENCE TITLE: accountancy board; certified public accountants State of Arizona House of Representatives Fifty-second Legislature First Regular Session HB Introduced by Representative Thorpe AN ACT AMENDING

More information

Queensland NURSING ACT 1992

Queensland NURSING ACT 1992 Queensland NURSING ACT 1992 Act No. 55 of 1992 Queensland NURSING ACT 1992 TABLE OF PROVISIONS Section Page PART 1 PRELIMINARY 1 Short title..................................................... 10 2 Commencement................................................

More information

Terms and Conditions of Domain Name Registration

Terms and Conditions of Domain Name Registration Terms and Conditions of Domain Name Registration These conditions apply to all domain names administered by Nominet, and registrars are required to make their customers aware of them prior to registration

More information

MAURITIUS FINANCIAL SERVICES ACT, 2007. (as amended, 2010) ARRANGEMENT OF SECTIONS PART I PRELIMINARY PART II THE FINANCIAL SERVICES COMMISSION

MAURITIUS FINANCIAL SERVICES ACT, 2007. (as amended, 2010) ARRANGEMENT OF SECTIONS PART I PRELIMINARY PART II THE FINANCIAL SERVICES COMMISSION MAURITIUS FINANCIAL SERVICES ACT, 2007 (as amended, 2010) ARRANGEMENT OF SECTIONS PART I PRELIMINARY 1. Short title 2. Interpretation 3. Establishment of Commission 4. The Board 5. Objects of Commission

More information

Trustis FPS PKI Glossary of Terms

Trustis FPS PKI Glossary of Terms Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

APPROVED JANUARY 8, 2002

APPROVED JANUARY 8, 2002 AN ACT AMENDING THE GENERAL BUSINESS LAW, TITLE 14 OF THE LIBERIAN CODE OF LAWS REVISED, BY ADDING THERETO CHAPTER 13 TO FACILITATE THE USE OF ELECTRONIC TRANSACTIONS FOR COMMERCIAL AND OTHER PURPOSES,

More information

Federal Electronic Signature Law. (Signature Law - SigG)

Federal Electronic Signature Law. (Signature Law - SigG) Federal Electronic Signature Law (Signature Law - SigG) Section l Purpose and definitions Purpose and scope 1. (1) The present federal law sets out the legal framework governing the creation and use of

More information

CHAPTER-II TAX AUTHORITIES AND APPELLATE TRIBUNAL

CHAPTER-II TAX AUTHORITIES AND APPELLATE TRIBUNAL CHAPTER-II TAX AUTHORITIES AND APPELLATE TRIBUNAL 3. Delegation of powers by the Commissioner. Subject to the provisions of the Act and rules made there under, the Commissioner may, by notification in

More information

WEB HOSTING AGREEMENT

WEB HOSTING AGREEMENT WEB HOSTING AGREEMENT This agreement is entered into as of the day of , BETWEEN WHEREAS TOTAL WEBSITE SOLUTIONS INC (hereafter known as Provider ) with its place of business for the

More information

Domain Name Registration Agreement (081310)

Domain Name Registration Agreement (081310) Domain Name Registration Agreement (081310) This Domain Name Registration Agreement ("Agreement") is by and between Tantum Technologies, LLC ("Tantum Technologies"), a Nevada Limited Liability Company,

More information

Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms of Service is mandatory for Hosting signing up or using our services.

Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms of Service is mandatory for Hosting signing up or using our services. WEB HOSTING AGREEMENT AND TERMS OF SERVICE Shortcut Solutions, llc. --June 2007-- Acceptable Use Policy and Web Hosting Terms of Service Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms

More information

Build Your Own Security Lab

Build Your Own Security Lab Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers

More information

ACT. of 15 March 2002

ACT. of 15 March 2002 215 ACT of 15 March 2002 on electronic signature and on the amendment and supplementing of certain acts as amended by Act No. 679/2004 Coll., Act No. 25/2006 Coll., Act No. 275/2006 Coll., Act No. 214/2008

More information

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON Introduction to Computer Security International Edition Michael T. Goodrich Department of Computer Science University of California, Irvine Roberto Tamassia Department of Computer Science Brown University

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information