You are on page 1of 7

Certified Cyber Law Analyst

VS-1154
Certified Cyber Law Analyst
www.vskills.in


C CC Certified ertified ertified ertified Cyber Law Analyst Cyber Law Analyst Cyber Law Analyst Cyber Law Analyst
Certification Code Certification Code Certification Code Certification Code VS-1154
Vskills certification for Cyber Law Analyst assesses the candidate as per the companys
need for securin aainst internet related offenses! "he certification tests the candidates on
#arious areas in electronic sinature$ %&C'"(AL$ attribution$ acknowledement and
dispatch of electronic records$ certifyin authority$ ')( protection$ international
orani*ation$ C+,$ '" Act and -udicial re#iew!

.hy should one take this certifi .hy should one take this certifi .hy should one take this certifi .hy should one take this certification/ cation/ cation/ cation/
"his Course is intended for professionals and raduates wantin to e0cel in their chosen
areas! 't is also well suited for those who are already workin and would like to take
certification for further career proression!

,arnin Vskills Cyber Law Analyst Certification can help candidate differentiate in today1s
competiti#e -ob market$ broaden their employment opportunities by displayin their
ad#anced skills$ and result in hiher earnin potential!

.ho will benefit from takin this certification .ho will benefit from takin this certification .ho will benefit from takin this certification .ho will benefit from takin this certification/ // /
2ob seekers lookin to find employment in leal or '" departments of #arious companies$
students enerally wantin to impro#e their skill set and make their CV stroner and
e0istin employees lookin for a better role can pro#e their employers the #alue of their
skills throuh this certification!
"est 3etails "est 3etails "est 3etails "est 3etails
3uration4 3uration4 3uration4 3uration4 56 minutes
&o! of 7uestions4 &o! of 7uestions4 &o! of 7uestions4 &o! of 7uestions4 56
8a0imum marks4 8a0imum marks4 8a0imum marks4 8a0imum marks4 56$ )assin marks4 95 :56;<
"here is no neati#e markin in this module!
=ee Structure =ee Structure =ee Structure =ee Structure
(s! >$666?- :'ncludes all ta0es<
Companies that hire Companies that hire Companies that hire Companies that hire Vskills Vskills Vskills Vskills Cyber Law Analyst Cyber Law Analyst Cyber Law Analyst Cyber Law Analyst
Cyber Law Analysts are in reat demand! Companies speciali*in in leal or internet
related ser#ices or '" are constantly hirin skilled Cyber Law Analysts! Various public and
pri#ate companies also need Cyber Law Analysts for their leal or '" departments!





Certified Cyber Law Analyst
www.vskills.in

"able of Contents "able of Contents "able of Contents "able of Contents

1! 1! 1! 1! %nderstandin 'nternet and Cyber Laws %nderstandin 'nternet and Cyber Laws %nderstandin 'nternet and Cyber Laws %nderstandin 'nternet and Cyber Laws
1.1 Modem Era
1.2 Need for Cyber Laws
1.3 Historical Perspective
1.4 The Character and Use of Internet Technology

9! 9! 9! 9! Conceptual =ramework Conceptual =ramework Conceptual =ramework Conceptual =ramework
2.1 What is E-commerce?
2.2 Growth and Development of E-commerce
2.3 Various Modes of E-commerce
2.4 Mechanism Involved in the Operation of Internet
2.5 Types of Players in E-commerce
2.6 Web Development and Hosting Agreements
2.7 Web Hosting
2.8 The Problem of Internet Jurisdiction
2.9 Illustrative Cases
2.10 Type of Websites

3. "he (ole of "he (ole of "he (ole of "he (ole of ,lectronic Sinature ,lectronic Sinature ,lectronic Sinature ,lectronic Sinature
3.1 Indian Economy
3.2 Basic Laws
3.3 Authentication of Digital Signature and Electronic Records
3.4 UNCITRAL
3.5 Securing Electronic Transactions
3.6 Hash Function Basics
3.7 Digital Signatures Verification
3.8 Certifying Authorities and Electronic Signature under Indian Law
3.9 The Functions of Controller and Other Officers
3.10 Feasibility of Implementing Digital Signature
3.11 Security and Privacy of Digital Signatures
3.12 Private Key Escrow and Key Recovery System
3.13 Obligation of a Certifying Authority and Certificate Management
3.14 Security Threats
3.15 International Efforts
3.16 The Singapore Electronic Transaction Act, 1998
3.17 Different Approaches of Digital Signatures

4! 4! 4! 4! Leal Aspects of ,lectronic (ecords Leal Aspects of ,lectronic (ecords Leal Aspects of ,lectronic (ecords Leal Aspects of ,lectronic (ecords
4.1 Electronic Records Recognition
4.2 The Position in the US and Australia
4.3 Electronic Records Retention in India
4.4 UNCITRAL Model Law for Retention
4.5 Attribution, Acknowledgement and Dispatch in India
Certified Cyber Law Analyst
www.vskills.in

4.6 UNCITRAL on Attribution and Acknowledgement
4.7 Acknowledgement of Receipt in India

5! 5! 5! 5! Certifyin Authorities in 'ndia Certifyin Authorities in 'ndia Certifyin Authorities in 'ndia Certifyin Authorities in 'ndia
5.1 The Role of Certifying Authority (CA)
5.2 Functions and Appointment of Controller
5.3 License to Issue Digital Signature
5.4 Renewal and Suspension of CA License
5.5 Security Guidelines for CA
5.6 Surrender of License and Cessation as CA
5.7 CA and Disclosure of Information
5.8 Electronic Signature Certificate issuance and suspension by CA
5.9 Archiving and Revocation of Digital Signature Certificates
5.10 Rules of Compromise
5.11 Confidential Information and Access Rules
5.12 Duties of Subscribers

5! 5! 5! 5! ')( ')( ')( ')( )rotection )rotection )rotection )rotection in 'ndia in 'ndia in 'ndia in 'ndia
6.1 The Domain Name Relevance in IPR
6.2 Cyberspace Squatting
6.3 Bad Faith and Domain Name Infringement
6.4 Some Complaints from India before WIPO
6.5 Protection of Copying in Cyberspace
6.6 Rights of Software Copyright Owners
6.7 Infringement of Copyright
6.8 Linking, Hyper-Linking and Framing
6.9 Remedies for Infringement
6.10 The Liabilities of an Internet Services Provider (ISP)
6.11 Cyberspace and the Protection of Patents in India

@! @! @! @! 'nternational Cyberspace Laws 'nternational Cyberspace Laws 'nternational Cyberspace Laws 'nternational Cyberspace Laws
7.1 United Nations Commission on International Trade Law
7.2 The Organization for Economic Cooperation Development (OECD)
7.3 World Trade Organisation (WTO) and E-Commerce
7.4 The World Intellectual Property Organisation (WIPO) and E-commerce
7.5 The Internet Corporation for Assigned Name and Numbers (ICANN)
7.6 Asia Pacific Economic Cooperation (APEC)
7.7 US Agencies for E-commerce Law and Policy
7.8 Internet Law and Forum
7.9 International Chamber of Commerce
7.10 Singapore Electronic Transactions Guidelines

A! A! A! A! Council of ,uropes : Council of ,uropes : Council of ,uropes : Council of ,uropes :C+, C+, C+, C+,< << < Con#ention Con#ention Con#ention Con#ention
8.1 Domestic Measures on Child Pornography
8.2 Infringements of Copyrights and Related Rights Offences
8.3 Extradition under COE
Certified Cyber Law Analyst
www.vskills.in

8.4 Mutual Assistance between the States

B! B! B! B! '" Act and 2udicial (e#iew '" Act and 2udicial (e#iew '" Act and 2udicial (e#iew '" Act and 2udicial (e#iew
9.1 Penalty and Compensation for Damage
9.2 Compensation for Failure to Protect Data
9.3 Penalty for Failure to Furnish Information
9.4 Adjudication of Disputes under the IT Act
9.5 Cyber Appellate Tribunal
9.6 Compounding of Contraventions and Recovery of Penalty
9.7 Appeal to the High Court under the IT Act

16! 16! 16! 16! 'mportant +ffences under the Cyberspace Law 'mportant +ffences under the Cyberspace Law 'mportant +ffences under the Cyberspace Law 'mportant +ffences under the Cyberspace Law
10.1 Obscenity and Pornography
10.2 Hacking
10.3 Other Offences
10.4 Violation of the Right Privacy
10.5 Violation of Privacy, Breach of Confidentially and Privacy
10.6 Terrorism

11! 11! 11! 11! +ffences under the +ffences under the +ffences under the +ffences under the '" '" '" '" Act in 'ndia Act in 'ndia Act in 'ndia Act in 'ndia
11.1 Cyber crimes offence by Intermediaries
11.2 Power of the Controller
11.3 Directions for Monitoring of Information
11.4 Collecting Traffic Data
11.5 Protected System Offences
11.6 The Misrepresentation Offence
11.7 Electronic Signature Certificate with False Particulars
11.8 Confiscation as Penalty
11.9 Compounding of Offences under the IT Act
11.10 Cognizance of Offences and Bail under the IT Act
11.11 Punishment for Abetment and Attempt to Commit Offences
11.12 Commission of Offences by Companies under the IT Act
11.13 The Power of Police to Enter and Search
11.14 Protection of Action Taken in a Goods Faith
11.15 Amendments to IT Act

19! 19! 19! 19! ,lectronic ,#idence and the 8iscellaneous )ro#isions of the '" Act ,lectronic ,#idence and the 8iscellaneous )ro#isions of the '" Act ,lectronic ,#idence and the 8iscellaneous )ro#isions of the '" Act ,lectronic ,#idence and the 8iscellaneous )ro#isions of the '" Act
12.1 Indian Evidence Act
12.2 Examiner of Electronic Evidence
12.3 Amendments to the Indian Evidence Act 1872,
12.4 The Appointment of National Nodal Agency
12.5 Indian Computer Emergency Response Team (CERT)
12.6 Electronic Cheques Laws
12.7 Advisory Committee
12.8 Security Practices and Sensitive Personal Information

Certified Cyber Law Analyst
www.vskills.in

Sample Cuestions Sample Cuestions Sample Cuestions Sample Cuestions
1! 1! 1! 1! .hich of the followin crimes .hich of the followin crimes .hich of the followin crimes .hich of the followin crimes is done usin a computer as the instrument/ is done usin a computer as the instrument/ is done usin a computer as the instrument/ is done usin a computer as the instrument/
A! Computer manipulation
D! 8oney launderin
C! 3ata alteration
3! "heft of ser#ices

9 99 9! ! ! ! .hich of the followin crimes tarets a computer/ .hich of the followin crimes tarets a computer/ .hich of the followin crimes tarets a computer/ .hich of the followin crimes tarets a computer/
A! 3enial of ser#ice
D! 8oney launderin
C! "heft of ser#ices
3! 'ntellectual property #iolations

> >> >! ! ! ! .hich of the followin best defines computer abuse/ .hich of the followin best defines computer abuse/ .hich of the followin best defines computer abuse/ .hich of the followin best defines computer abuse/
A! 3enial of ser#ice
D! 8oney launderin
C! An illeal act in which knowlede of computer technoloy is used to commit the act
3! An intentional act in#ol#in a computer in which the perpetrator may ha#e ained at the
#ictims e0pense

4 44 4! ! ! ! .hat is a EFackti#istG/ .hat is a EFackti#istG/ .hat is a EFackti#istG/ .hat is a EFackti#istG/
A! )olitically moti#ated hacker
D! 3enial of ser#ice attacker
C! A proponent of &apster
3! A person enain in an intentional act in#ol#in a computer in which the person may
ha#e ained at the #ictims e0pense

5 55 5! ! ! ! .hich of the followin is a computer crime that depri#es the leitimate owner of .hich of the followin is a computer crime that depri#es the leitimate owner of .hich of the followin is a computer crime that depri#es the leitimate owner of .hich of the followin is a computer crime that depri#es the leitimate owner of
a tanible asset/ a tanible asset/ a tanible asset/ a tanible asset/
A! Fackin
D! 8oney launderin
C! 8anipulatin the price of a stock
3! Salami slice


Answers: 1 (D), 2 (A), 3 (D), 4 (A), 5 (D)