0% found this document useful (0 votes)
43 views6 pages

New Syllabus

Uploaded by

aryan batra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views6 pages

New Syllabus

Uploaded by

aryan batra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Annexure ‘CD – 01’

FORMAT FOR COURSE CURRICULUM

L T P/ SW/FW No. of TOTAL


S PSDA CREDIT
Course Title: Information Technology Law UNITS

3 0 0 0 0 3

Credit Units: 3

Course Level: UG Course Code: LAW 541


Course Objectives: This course aims to enable you to:
• Identify, contribute to and advance the key areas of debate, from a legal perspective, in respect of the internet and computers;
• Form a view on the relevancy and adequacy of law and alternatives in advancing these debates, including regarding enforcement and dispute resolution;
• Analyse the extent to which control over and liability in respect of hardware, software, data and website content can have negative consequences for individuals and corporations
and wider society.
• Appraise the roles of IP, competition, world trade law and regulation, human rights and ethics in the field of information control, and the implications for private, public and
corporate interests wherever situated;

Pre-requisites: The student ought to have the knowledge of Constitution, Contract and Evidence Law and general understanding about electronic transactions.

Course Contents/Syllabus:
Module I: Introduction to Information Technology Law Weightage (%)

Information Technology (use of computers to store, retrieve, transmit and manipulate data); 20%

Understanding cyberspace (borderless environment), Scope and regulation; Internet, e-mail and world wide web; Use – academics, e-
commerce (B2B,B2C,C2C), Issues of jurisdiction in cyberspace.

Interface of information technology and law; Current challenges – mobiles, cyber security, cloud computing and data privacy, Misuse of
social media, Cyber crimes

Evolution of the Information Technology Act, Genesis and Necessity.

a. International Perspective.
b. History of Cyber law in India.

Salient features of the Information Technology Act, 2000.

a. Various concepts (Definitions)


b. Purpose and Object of Information - Technology Act, 2000
Module II LEGAL RECOGNITION AND AUTHENTICATION OF ELECTRONIC RECORDS

UNCITRAL Model Law on Electronic Commerce, and E-signatures (1996 and 2001); 20%

• Legal Recognition under IT Act (ss,4-5);

Authentication of records (s.3) Digital signature (functional equivalent of paper based signatures) s.2(1)(p); Function (confidentiality,
authentication, integrity and non-repudiation); Authentication by use of asymmetric cryptosystem (s.2(1)(f)‘ , Key pair (s.2(1)(x), Public
key(2(1)zc), Private key(s.2(1)zd), Hash function (s.3), Electronic signatures (ss. S.2(1)ta and 3A), Affixing electronic signature S.2(1)(d);
Secured electronic record(s.14) and Secure electronic signature(s.15); s.85B(2)(a),

• The Evidence Act, 1872 (Presumptions to electronic record and electronic signatures);

S.67A and 73A the Evidence Act, 1872 (Proof as to electronic signature and proof of verification of digital signatures)

• Public key infrastructure and Hierarchy (ss.17-26); Role of certifying authorities, Electronic signature certificate es, its suspension and
revocation (ss.2(tb), 35-42);

• Originator, addressee , Attribution, Acknowledgment and Despatch of Electronic Records -ss. 11-13

Module III: E- CONTRACTS

Kinds of Contracts -email, web contracts, Standard form contracts 20%

Formation of E-contracts - application of The Contract Act, 1872 viz a viz ss.10A,11- 13 IT Act

United Nations Convention on the Use of Electronic Communications in International Contract 2005

Module IV: Civil Liabilities Under Information Technology Law

Dispute Resolution under IT Act - Adjudicating officer and cyber appellate tribunal under the Information Technology Act, 2000 (s.46 20%
and s.57)
Damage to computer and computer system - (s.43 read with s.66) – access/facilitates access, data theft, virus attacks, email bombings,
denial of service attack, damage to computer source code.

Data Protection (ss.43A r/w sensitive personal information rules, 45, 72, 72A) - Privacy issues-use of personal information- supplied to
commercial 3 sites, cookies, cloud computing; S,67C (preservation of information by intermediaries)

Intermediary(s.2(1)(w), cyber café (s. 2(1)n(a)), Exemption from liability, due diligence (s.79 r/w Intermediaries Guidelines Rules, 2011);
s.72A

Online defamation

Module V: Criminal Liabilities Under Information Technology Law 20%

Reasons for cyber crimes and cyber criminals

Cyber Crimes - financial frauds (money laundering, credit card frauds, social crimes -cyber stalking, pornography, identity theft, ipr
related crimes, cyber terrorism, defamation

Tampering with computer source code (s.65)

Hacking (s,43(a) read with s.66)

Identity Theft and cheating by Personation (ss.66C and 66D) (phishing, email spoofing, password theft etc.)

Obscenity and Pornography (ss.66E, 67, 67A, 67B, s.292 IPC)

Cyber Stalking (ss.354D, 509 IPC)

Cyber Terrorism (s.66F)

IPR Related issues in Cyber Space.

Course Learning Outcomes:


1. Understand the response of Judiciary towards Cybercrimes with the analysis of case laws.
2. Analyze challenges of Cyber law to Indian jurisprudence and to create awareness about the newly emerging kinds of cybercrimes with their solution.
3. Identify the emerging trends in Cyber Law like e-Commerce, e-Governance, E-Contract and e-Signature etc.
4. Apply the IT Act 2000 provisions in a case pertaining to cyber crimes.

Pedagogy for Course Delivery:


The course will be delivered through a combination of theoretical and case study approach. Students will be motivated to get updated with recent business decisions
and changes being taken place through classroom discussions on newspaper clippings and articles. Students will be assigned projects to integrate theory with practical
aspects.

Lab/Practical details, if applicable:

List of Experiments:
NA

Assessment/ Examination Scheme:

Theory L/T (%) Lab/Practical/Studio (%)

100% NA

Theory Assessment (L&T):


Components (Drop Class Test Project Viva Attendance End-term Examination
down)

Weightage (%) 10% 10% 5% 5% 70%

Lab/ Practical/ Studio Assessment:

Continuous Assessment/Internal Assessment End Term Examination

(____ %) (____ %)

Components (Drop down NA NA NA NA NA NA NA


Weightage (%) NA NA NA NA NA NA NA

Mapping Continuous Evaluation components/PSDA with CLOs

Bloom’s Level > Understanding Applying Analyzing

Course Learning Understand the response Apply the IT Act 2000 provisions in a Analyze challenges of Cyber
Outcomes of Judiciary towards case pertaining to cyber crimes. law to Indian jurisprudence
Cybercrimes with the and to create awareness about
analysis of case laws. the newly emerging kinds of
cybercrimes with their
Identify the emerging solution.
trends in Cyber Law like
Assessment e-Commerce, e-
type/PSDA Governance, E-Contract
and e-Signature etc.

Class Test ✓ ✓ ✓
Project ✓ ✓ ✓
Viva ✓ ✓

Text Reading:

Kamath Nandan, Law Relating to Computers Internet & E-commerce - A Guide to Cyberlaws & The Information Technology Act, Rules, Regulations and
Notifications along with Latest Case Laws (2012)
• Karnika Seth, Computers Internet and New Technology Laws (2013)
• Kamlesh K Bajaj, Debjani Nag, E-commerce: the cutting edge of business, 2nd Ed. (2005)
• Apar Gupta Commentary on Information Technology Act (2016)
• Aparna Viswanathan, Cyber Law (Indian & International Perspectives on key topics including Data Security, E-commerce, Cloud Computing and Cyber Crimes)
(2012)
• Prashant Mali, Cyber Law and Cyber Crimes,2nd Ed.(2015).
Reference Books
1. Vakul Sharma, Information Technology Law & Practice (2014)
2. Chris Reed, Internet Law Text and Materials (2010)
3. Ferrera et al, Cyber Law Text and Cases 3rd Ed. (2012)
4. Internet Law and Practice by International Contributors, West Thomson Reuters, South Asian Edition (2013)
5. SK Verma and Raman Mittal (Eds.), Legal Dimensions of Cyberspace, (2004)
6. Lawrence Lessig, Code and Other Laws of Cyberspace 1999, Code version 2.0, Basic Books Publication (2006) .

WEB SOURCES
• Nishith Desai, E-commerce in India – Legal, tax and regulatory analysis available at
http://www.nishithdesai.com/fileadmin/user_upload/pdfs/Research%20Papers/ECommerce_in_India.pdf 7
2. Hemali Shah and Aashish Srivastavat ―Signature Provisions in the Amended Indian Information Technology Act 2000: Legislative Chaos‖, 43 Comm. L. World
Rev. 208 2014 available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2748441
3. Christopher Reed, ―Legally binding electronic documents: Digital Signatures and Authentication 35(1) International Lawyer 89-106 available at
http://www.jstor.org/stable/40707597
4. ―Cyber Laws of India‖, www.iibf.org.in/documents/Cyber-Laws-chapter-in-LegalAspects-Book.pdf(Book on IT security of IIBF published by Taxmann

You might also like