Sie sind auf Seite 1von 19

1.

What are the fundamental conceptions regarding the evaluation of


individual actions?

Ans:

There are two the fundamental conceptions regarding the evaluation of


individual actions:-i) Examine an issue under independently justified
principles of what one considers being right.
This is referred to as deontological (Ethical theory concerned with duties
and rights) approach where one starts out with one or more moral
principle and see how they apply to particular case.ii) Look for the course of
action that maximizes the good. This approach is referred to as
teleological means involves framing what is good for users, and spell out
what is wrong with
actions that interfere with attempts to get in.
2. Define computer ethics and give classifications of ethical issues.OR,
Explain the four classifications of ethical issues.
Ans:Computer Ethics:- Computer ethics is the analysis of the nature and social
impact of computer technology and the formulation and justification of the
policies for the ethical use of technology. It includes consideration of both
personal and social policies for ethical use of computer technology. Its main
goal is to understand the impact of computing technology uponhuman
values.There are four kinds of ethical issues:i) Privacy:- It deals with
collection, storage and dissemination of information about individuals.ii)
Accuracy:- It deals with authenticity, fidelity and accuracy of information
collected andprocured.iii) Property:- It deals about ownership and value of
information (intellectual property).iv) Accessibility:- It deals about right to
access information and payment towards the same.
in the social and ethical issues arising out of the presence of computers in the
workplace.
Ans:
The social and ethical issues that can arise out of the presence of computers
in theworkplace are:i)Task Automation: At workplace, computers have

become universal tools that can in principleperform any task and hence pose
a threat to jobs. They are far more efficient than humans inperforming many
tasks. Therefore, economic incentives to replace humans with
computerizeddevices are very high. In the industrialized world, many workers
doing jobs as bank tellers,autoworkers, telephone operators, typists etc have
already been replaced by computers.. On theother hand, the computer
industry has generated a wide range of new jobs in the form of hardware
engineers, software engineers, system analysts, webmasters, information
technologyteachers, and computer sales clerks. Even when a job is not
eliminated by computers, the jobprofile could be radically altered. So, job
gains and losses are to be viewed in the context of thesociety we live
in.ii)Health and Safety: Another workplace issue concerns health and safety.
Often radiation frommachines, repetitive injuries, and posture related
problems are common at computer dominatedworkplaces. Another concern is
poisonous non biodegradable computer waste, which is causinga major threat
to the environment. The advent of stress in the workplace due to the
introductionof computers is becoming more and more evident.iii)Employee
Monitoring: Another major concern is the employee monitoring or
surveillance bythe organizations using sophisticated computer driven
technology. Some amount of monitoringmay be vital for protecting the
interest of the employer and to increase productivity, but excessof such
surveillance can becomes unethical.
4. How is a professional code distinguished?
Ans:
Professional code is divided into three groups of code:
Code of Ethics:- Code of ethicsis more aspirational (aim). They are mission
statements stressed the professional objectives andvision.
Code of Conduct:-Code of conduct are more oriented towards the
professionals attitude.They make clear the issues at risk in the different
specialized fields.
Code of Practice:- Technical document on health and safety issue approved by
the government minister. It provides particular guideline on way to achieve
agreement with OMC legislation.
5. Explain the different sources of law.
Ans:
Following are the different source of law:
a) Legislation:- It is the formal enactment of law by the legislature created or

authorized by theconstitution. It stands in contrasted with judge made law.


Legislation consists of written laws, ascontrasted with judge made law or
common law. It also stans in contrasted to customary law.
b) Common Law:- It comprises the body of principle, which derive their
authority solely fromthe decisions of courts. It is a body of law that develops
and derives through judicial decisionsdifferent from legislative enactments.
Its principals do not derive their validity from formal lawmaking by anybody,
but from their enunciation through decisions of courts.
c) Custom:-Custom denotes a usage or practice of the people (including a
particular social
group or a group residing in a particular locality) which by common adoption
and acquiescenceand by long and unvarying habit, has become compulsory
and has acquired the force of law withrespect to the place or subject matter
to which it relates
6. There is no nexus between cyber space and real space. Comment.
Ans:
There is the difference between the business rules for online commerce and
carryingbusiness in the real space. Much of this difference comes from
Internets telepresence features.This feature renders the network
technologically indifferent to physical location. The network isvery insensitive
to geography. It is not possible to determine the physical location of a user or
aresource. In real space, locating a person or entity with which business is
interacting is mucheasier. In the cyberspace to know the location of the
partners with whom you are interacting isvery difficult to know. In some
instances, even an Internet address tells something only about thelocation of
a given machine. There is no way to find the information about the actual
user.
7. Explain how Custom is a source of law.
Ans:
Custom denotes a usage or practice of the people (including a particular
social group or a
group residing in a particular locality) which by common adoption and
acquiescence and by longand unvarying habit, has become compulsory and
has acquired the force of law with respect tothe place or subject matter to
which it relates.Legislation and case law can operate in any sphere of human
activity, while theoperation of custom is generally restricted to a particular
locality, group or family.

8. What is common law? How does it differ from codified law?


Ans:b) Common Law:- It comprises the body of principle, which derive their
authority solely from the decisions of courts. It is a body of law that develops
and derives through judicial decisions different from legislative enactments.It
is differ from codified law in following ways:-i) Common law is judge made
law, while codified law is made by legislature.ii) It consists of written laws
while codified consists of unwritten law.
1.a) Explain the three levels of computer ethics
Ans
: Following are the three levels of computer ethics:-i)
First level
: It is the basic level where computer ethics tries to sensitize people to the
fact thatcomputer technology has social and ethical consequences.
Newspaper, TV news program, andmagazines have highlighted the topic of
computer ethics by reporting on events relating tocomputer viruses, software
ownership law suits, computer aided bank robbery, computermalfunction
etc.ii)
Second level
:- It consists of someone who takes interest in computer ethics cases,
collectsexamples, clarifies them, looks for similarities and differences reads
related works, attendsrelevant events to make preliminary assessments and
after comparing them.iii)
Third level
:
It referred to as theoretical computer ethics applies scholarly theories to
computer ethics cases and concepts in order to deepen the understanding of
issues.All three level of analysis are important to the goal of advancing and
defending human values.
2.Discuss the distinct features of the internet.
Ans:
Following are the three distinct features of Internet:-i)
Global scope

: Internet communications has much broader scope and reach. This feature
of internet do things to one another demonstrates the great amount of power
when connected to theinternet. It also enables individuals apart from
fraternizing with one another to disrupt, steal,damage, snoop, harass, stalk,
and defame from great distance.ii)
Anonymity
: This feature of internet provides a certain kind of anonymity means it
givesindividuals a senses if invisibility that allows them to engage in behavior
that they might nototherwise engage in. The positive aspect of anonymity is
that it might allow individuals to get afree and equal treatment irrespective of
their race, color or creed. It enables their participation inactivities where
individuals might otherwise reluctant. It also leads a serious problem
foraccountability and integrity of information.iii)
Reproducibility:
Electronic information exists in the form that makes it easy to copywithout
any loss of originality or value in the process of reproduction.
Reproducibilityexacerbates the problem arising by global scope and
anonymity. It also adds to the problems of accountability and integrity of
information arising out of anonymity.All these three features of
communication lead directly or indirectly to a wide range of ethical issues.
3. What are the ten commandments for computer ethics?
Ans:Commandments for computer ethics:- i) Thou shalt not use a computer
to harm otherpeople.
ii) Thou shalt not interfere with other peoples computer work.
iii) Thou shalt not snoop around in other peoples files.
iv) Thou shalt not use a computer to steal.v) Thou shalt not use a computer
to bear false witness.vi) Thou shalt not use of copy software for which you
have not paid.
vii) Thou shalt not use other peoples computer resources without
authorization.
viii) Thou shalt not appropriate other peoples in
tellectual output.ix) Thou shalt think about the social consequences of the
program u write.x) Thou shalt use a computer in ways to show consideration
and respect.
4. Discuss the classification of crimes under the IT Act 2000.

Ans:
The following acts are cyber crime in the I.T. Act 2000:-Without permission of
the authorized useri) Accessing or securing access to computer system or
network.ii) Downloading, coping or extracting any data or information.iii)
Introducing any computer, virus or contaminant in the computer.iv)
Disrupting the working of the computer.v) Disrupting the access of the
computer of an authorized user.vi) Providing assistance to ensure
unauthorized access to the computer.vii) Tampering with computer source
documents.viii) Hacking of computer system.ix) Carring on activities that are
not in compliance with the provisions of the Act.
x) Failure to extend all facilities and technical assistance to the Controller to
decrypt anyinformation necessary for the security of the nation.xi) Publishing
Digital Certificate that are false in certain particular.xii) Misrepresenting or
suppressing any material fact from the Controller or Certifying Authorityfor
obtaining any license or Digital Signature Certificate.
5. Discuss the essential of a valid contract.
Ans:
The general law of contracts is contained in the Indian Contract Act 1872. The
Act defines
contract as an agreement enforced by law. The essentials of a valid
contract are:
-i) Intention to be bound:- The intention to create a contract should be clear
otherwise, it will betreated as invalid.ii) Offer and acceptance:-It is an
essential ingredient of a contract that there must be an offer andits
acceptance. If there is no offer then there is no contract. But if one party offer
but another onedoes not accept it then also no contract will be formediii)
Concept of offer:- An offer is not defined by statue. It is generally understood
as denoting theexpression, by words or conduct, of a willingness to enter into
a legally binding contract. Itexpressly indicates that it is to become binding
on the offer or as soon as it has been accepted.iv) Offer by and whom: An
offer must be made by a person legally competent to contract or onhis behalf
by someone authorized by him to make the offer. If there is no particular
individuals to
whom that offer a contract then that contract become a unilateral contract.
So, there must be
two parties to made contract.vi) Statements which are not offer: Every
statement of intention is not an offer. A statementmust be made with the
intention that it will be accepted and will constitute a binding contract.

6. What are the amendments to the Indian Penal Code?


Ans:
The Indian Panel Code (IPC) details actions that constitute a crime and the
punishmentsprescribed for such actions. It elaborately classifies crimes based
on interests that are intended tobe protected. The classification includes :- i)
Offences against body ii) Offences againstpropertyiii) Offences against
marriage iv) Offences against public tranquility v) Offences againststateSome
important aspects have to be weighed while determining whether a crime has
beencommitted or not.
7. Explain with the help of historical millstones e
volution of computer ethics. 15
Ans:
Evolution of computer ethics:
The term computer ethics was coined in the mid 1970s byWalter Manor to
refer to that field of applied professional ethics dealing with ethical
problemsaggravated, transformed or created by human technology.The
evolution of computer ethics is tied to the wide range of philosophical
theories andmethodologies, which is rooted in the understanding of the
technological revolution fromintroduction to permeation.In the 1940s and
1950s computer ethics as a field of study had its roots in the new field of
research called cybernetic the science of information feedback system
undertaken by Professor
Norbert Weiner. The concepts of cybernetic led Weiner to draw some
remarkable ethicalconclusions about the technology that is now called
information and communication technology.In his views the integration of
computer technology into society would eventually constitute the
remarking the society, which he turned as the second industrial
revolution.
In the 1960s Don Parker of SRI Inc. began to examine the unethical and
illegal uses of
computer by computer professions. He published Rules of Ethics in
Information Processing
and headed the development of the first code of professional conduct for his
association of computing machinery.

The 1970s saw Walter Manor coin the term Computer Ethics to refer to that
field of inquiry
dealing with ethical problems aggravated, transformed by computer
technology. He disseminatedhis starter Kit in computer ethics, which contain
curriculum materials and guideline to developand teach computer ethics.In
1980s a number of social and ethical consequences of information technology
werebecoming public issues in America and Europe. Issues like computer
enabled crime, disasterscaused by computer failure; invasions of privacy
through computer database etc become theorder of the day.The 1990s
heralded the beginning of the second generation of computer ethics.
8. How is information privacy, violated? Discuss the privacy policy guidelines
for database.
Ans:
Information privacy violated, when the individual:i) Does not know what
information is being collected about them.ii) Cannot limit access to what is
being collected.iii) Cannot control the use and distribution of this
information.iv) Cannot correct erroneous data and out-of-date information.
The privacy policy guidelines for database include guideline for following
:
a)Data Collection

:- i) Data should be collected on individuals only for the purpose of


accomplishing a business objective.ii) Data should be adequate, relevant and
not excessive to the business.iii) Individuals must give their consent before
data pertaining to them can be gathered.
b)Data Accuracy
:- i) Sensitive data gathered on individuals should be verified.ii) Data should
be accurate and current.
iii) The individuals version should be noted if any disagreement about the
accuracy of the data
found.
c) Data Confidentiality
:- i) Computer security procedures should be implemented to
providereasonable assurance against unauthorized disclosure of data.ii) Third

parties shpuls not be given access to data without the permission.iii)


Disclosure of data should be noted and maintained.iv) Data should not be
disclosed for the reason that is not compatible with the business objective.
9. State and discuss the primary assumptions of a legal system.
Ans:
Following are the primary assumptions of a legal system:i)
Sovereignty
: Law making power is a matter of sovereign prerogative. As a result, the writ
of sovereign authority runs throughout wherever sovereign power exercises
authority. Beyond itsauthority, which is always attributed to determine
geographical boundaries, the sovereign cannotregulate a subject matter
through legal intervention.ii)
Territorial Enforcement
: Any law in real world context can only be subjected topredetermined
territorial enforcements. There are some exceptions to this. The
sovereignauthority could join extra territorial jurisdiction in case of criminal
law. This indicates that if thecrime is committed beyond the limits of the
territory the sovereign authority can initiateprosecution.iii)
Notion of property
: The obtaining premise of the legal response considers property astangible
and physical. In the cyber context, property in the form of digitized services
or goodsposes serious challenges to this legal understanding. Also that the
domain names raisefundamental questions.iv)
Paper-based transaction
: Legal response considers and encourages people to create andconstitute
legally binding relationships on the basis of paper- based transactions.
Although the
word document under law takes within its fold material other than paper
also. Since in cyber context, digital or electronic record forms the basic of
electronic transactions. hence, the transactions are on the basic of electronic
records.
v)
Real relationships
: Legal response considers relationships, which are real world oriented. Inview

of connectivity, pace and accuracy as to transmission, in the cyber context,


theserelationships acquire unique distinction of virtual character. In case of
trade and commerce,commercial transaction in the form of contracts
constitutes the foundation of legal relationship.

10. Discuss the different forms of computer crime. OR

Discuss the current forms of computer crimes.


Ans: Different forms of computer crimes:i) Privacy infringement: The personal rights of thecitizens are endangered
with the collection, transmission, and storage of the personal data.Therefore,
in the data processing area, the protection of privacy needs to be considered.
Abalance needs to be maintained between the privacy interests of data
subjects concerned and theeconomic freedom of the holders of personal
data.ii) Economic offences: The economic crimes are considered as the
central area of computercrime. Hacking, fraudulent manipulation of the
computer data is some of the economic offencesrelated to computers.iii)
Computer Hacking:-This is a greatest risk in terms of integrity, availability,
andconfidentiality. Website defacements, credit card frauds, non-availability
of web and applicationservers, and new virus attacks are common. These
defacements are done by hackers and thisprocess is called as hacking.iv)
Software Piracy and Other forms of Product Piracy:- This includes illegal
access of computerprograms. It also includes copying the important software
and information of the individual.v) Computer Espionage:- It rarely appears in
official statistics constitute a special dangercompared with traditional
economic espionage. The object of this offence are especially
copyingcomputer program, data of research and defence, data of commercial
accounting as well asaddress of client. It is done by data
telecommunication.vii) Computer Sabotage and Computer Extortion:- It is
danger for business and administration. Itincludes activities like destroying
the store tangible and intangible data containing computerprograms and
other valuable information. It also affect the data processing.viii) Computer
Fraud:- It describe a spectrum of various cases within the field of
economiccrimes. It includes invoice manipulations concerning the payment of
bill and salaries of industrial companies along with the manipulation of
account balance and balance sheets.viii) Illegal and Harmful content:- It
includes providing harmful contents such as porn movies orvideos, adult
picture or story, more violent games etc, on internet through website which
areillegal.

11. Explain the different sources of law.


Ans:
Following are the different source of law:a) Legislation:- It is the formal
enactment of law by the legislature created or authorized by theconstitution.
It stands in contrasted with judge made law. Legislation consists of written
laws, ascontrasted with judge made law or common law. It also stands in
contrasted to customary law.b) Common Law:- It comprises the body of
principle, which derive their authority solely fromthe decisions of courts. It is
a body of law that develops and derives through judicial decisionsdifferent
from legislative enactments. Its principals do not derive their validity from
formal lawmaking by anybody, but from their enunciation through decisions
of courts.c) Custom:Custom denotes a usage or practice of the people (including a particular
social
group or a group residing in a particular locality) which by common adoption
and acquiescenceand by long and unvarying habit, has become compulsory
and has acquired the force of law withrespect to the place or subject matter
to which it relates.Legislation and case law can operate in any sphere of
human activity, while theoperation of custom is generally restricted to a
particular locality, group or family.
b) Discuss the significance of legislation.
Ans:
Significance of legislation:
i) The legislature can legislate in advance. But judges cant do
so.ii) The legislature can make a law on any subject within its competence.
But judges can deal witha subject.iii) The legislature can override the law laid
down by the courts, on a particular point because of the doctrine of
separation of powers.iv) Legislation is the most fertile source of law. The
legislature can vest a subordinate authoritywith power to make rules, orders,
etc.v) A legislative enactment is not subject to appeal; and the law enacted
by it cannot be reversed.
12. What are the remedies for the breach of the contract?
Ans:
Remedies for breach of a contract:i)Damage:- When a contract has been broken, the party who suffer by such

breach is entitled toreceive compensation from the party who broken the
contract for any loss or damage caused byhim. Such compensation is not to
be given for any remote and indirect loss or damage sustainedby reason of
the breach.
ii)Penal Stipulations:- If a sum is named in the contract or if the contract
contains any otherstipulation by way of penalty, the party complaining of the
breach is entitled to receivereasonable compensation from party who broken
the contract, whether or not actual damage orloss is proved to have been
caused thereby.iii) Specific performance:- In certain cases the court may
direct against the party in default
specific performance of the contract means that party may be directed to
perform the very
obligation which he has undertaken by the contract.iv) Injunction:- An
injunction is a preventive relief and is granted at the discretion of the
court.The discretion of court is not arbitrary but is guided by judicial
principles. A further check on thediscretion is the provision for correction
through an appeal in a higher court.
13. Discuss the impact of globalization on computer ethics.
Ans:
The impact of globalization on computer ethics led to the discussion of the
followingissues:-i) Global Laws: Over 200 countries are already
interconnected by the Internet. Given thissituation, what is the effect and
impact of the law of one particular country on the rest of theworld? Issues
regarding freedom of speech, protection of intellectual property, invasion of
privacy vary from country to country. The framing of common laws pertaining
to such issues toensure compliance by all the countries is one of the foremost
questions being debated.ii) Global Cyber Business: Technology is growing
rapidly to enable electronic privacy andsecurity on the Internet to safely
conduct international business transactions. With such advancedtechnology
in place, there will be a rapid expansion of global cyber business. Nations
with atechnological infrastructure already in place will enjoy rapid economic
growth, while the rest of the world will lag behind. This disparity in levels of
technology will fuel political and economicfallout, which could further widen
the gap between the rich and the poor.iii) Global Education: Inexpensive
access to the global information net for the rich and the pooralike is
necessary for everyone. However the impact of this sudden and global
education ondifferent communities, cultures, and religious practices is likely
to be profound. The impact onlesser known universities would be felt as older
well-established universities begin offeringdegrees and knowledge modules
over the Internet.

14. What are the fundamental conceptions regarding the evaluation of


individual actions?10
Ans:
There are two the fundamental conceptions regarding the evaluation of
individualactions:-i) Examine an issue under independently justified principles
of what one considers being right.The idea here is to follow the principals that
articulate what is morally right irrespective of theconsequence. This is
referred to as deontological approach where one starts out with one or
more moral principle and see how they apply to particular case.ii) Look for
the course of action that maximizes the good. This involves determining
whichaction yield the best consequences measured in some standard of the
good. This approach is
referred to as teleological means involves framing what is good for users,
and spell out what is
wrong with actions that interfere with attempts to get in. What is good could
be conceived of interms of happiness, basic needs, shares of primary goods,
desires etc.These values reflect the value that human being can take
different perspectives and can switchbetween them. One can think of a
problem or situation from a self interested and personal stance,but also from
the point of view of us as social beings with roles and position in social
network of the relation.
15. How does professional code address issues from the view point of
computingprofession?
Ans:
In following ways
professional code address issues from the view point of
computingprofession:The first level is a set of ethical values, such as
integrity and justice, which professionalsshare with other human beings by
virtue of their shared humanity. Code statements at this levelare statements
of aspiration that provide vision and objectives.The second level obliges
professionals to more challenging obligations than those requiredat the first
level. By virtue of their role as professionals and their special skills, they owe
a higherdegree of care to those affected by their work. Code statements at
this level express theobligations of all professionals and professional
attitudes. They do not describe specific behaviordetails, but they clearly
indicate professional responsibilities.The third level comprises several
obligations that derive directly from elements unique tothe particular
professional practice. Code statements at this level assert more specific

behavioralresponsibilities that are more closely related to the state of art


within the particular profession.The range of statements is from more general
aspirational statement to specific and measurablerequirements.
16. Explain the term Digital Signature. What is a Digital Signature Certificate?
Ans:
Digital Signature: The IT Act states that any law provides that information
shall be inwriting or in printed form. The key ingredients of the formation of
electronic contracts comprisecommunication of offer and acceptance by
electronic means, verification of the source of thecommunication,
authentication of the time and place of dispatch and finally the verifiability of
the receipt of the data communication. A digital signature may be affixed to
authenticate anelectronic record. The digital signature serves to satisfy the
legal requirement of affixing of asignature in a written or printed document.
The Central Government has the power to make rulesabout the type of digital
signature. Digital Signature Certificate: It certifies the identity of the
subscriber and implies his acceptanceof the provisions of this act and the
rules and regulations contained therein. The certificate isissued only on the
following grounds:i) The Certifying Authority being satisfied that the
information contained in the application of certificate is accurate.ii) The
subscriber holds a Private Key capable of creating a Public Key.iii) The Private
Key corresponds to the Public Key to be listed in the Digital
SignatureCertificate.iv) The Public Key to be listed in the certificate can be
used to verify a digital signature affixedby the Private Key held by the
subscriber.

17. What is cyber privacy? Explain.


Ans:
The issue of privacy on the Internet has generated a lot of debate and
controversy. On onehand, it is necessary for the authorities to indulge in
surveillance in order to keep cyber crime incontrol. The same surveillance
affects the privacy of millions of the people who use the Internetevery day.
However, privacy is extremely important to all individuals, organizations,
andnations.Unfortunately, the Indian judiciary has not laid down specific laws
regarding cyber privacy.Currently, the judiciary can only interpret privacy in
accordance with the existing regulations. Asper Article 21 of the Indian
constitution, the right to privacy is an integral part of thefundamental right to
life.Today, several individuals and organizations collect information regarding
the surfing habits of Internet users and sell the same to interested companies
for a tidy sum of money. Hundreds of websites are hacked and information is

stolen and then sold to interested parties. Every day,individual users have to
deal with the nuisance of dealing with unsolicited e-mail. All the entitiesIndividuals, organizations, and the government need to contribute in the
fight to curb cybercrime and at the same time respect the privacy.The NIF
privacy principals deal with three fundamental concern including information
privacy,information integrity and information quality. The government and the
judiciary need to framecomprehensive laws related to privacy immediately.
18. What is meant by unauthorized access to a computer? Explain.
Ans:
Unauthorized access of computer means using any computer without their
ownerpermission. It includes following activities: i) Accessing or securing
access to computer systemor network.ii) Downloading, coping or extracting
any data or information.
iii) Introducing any computer, virus or contaminant in the computer.iv)
Disrupting the working of the computer.v) Disrupting the access of the
computer of an authorized user.vi) Providing assistance to ensure
unauthorized access to the computer.
19. Discuss the impact of the information technology revolution on society.
Ans:
The amazing growth of information technology has implications for every
aspect of society. So far there is little research that reveals how technology
has and will continue to changethe dynamics of society and the nonprofit
sector. Following point elaborate how informationtechnology affects various
sections of society:i) The nonprofit sector is experiencing an organizational
version of the digital divide-thetechnology gap between large and small
nonprofits. Hardware, software, and technical assistanceare not enough to
close the divide; strategic planning and staff time are also essential.ii) The
true impact the Internet will have on society is in building community,
bringingtogether groups of citizens, who are united by shared values working
for the public good, oftenspanning international lines. Organizations that use
technology well are usually marked bystrong support from the executive
director, support from the board, and the presence of a keyuser staff
person.iii) The Internet enables an organization to strengthen relationships
with its current audiences asit enables targeted, fast, and consistent
communication. It can also enable nonprofits to reach outto new audiences
through effective use of search engines and viral marketing.
20. Discuss the adjudicatory processes incorporated in the act.
Ans:

The adjudicatory processes incorporated in IT act 2000 are:i)Penalty for


damage to computer: If any damage cause by any computer due to accessing
orsecuring data, Downloading, coping data and disrupting the working of
computer by anyunauthorized user then he will have to paid one crore rupees
as a compensation to the affectedperson.ii) Penalty for failure to furnish
information, return: If any individual fall in its preview using thecomputer to
furnish any document, return or reports then he will have to give 1,50,000
rupees aspenalty. iii) Residuary penalty: This act provides that whoever
contravenes any rule or regulation forwhich a penalty has not specified, the
person contravening the act is liable to pay 25,000 rupeesas
compensation.iv) Power to adjudicate: According to this the adjudicating
officer has power to: a) Summon andenforce the attendance of any person
and examine him on oath.b) Direct the production of records and other
electronic records.c) Issue warrant for the examination of witness and receive
evidence on record.
21. Discuss the policy approaches to privacy issues.
Ans: Policy approach to privacy issues:i) Market approach:- The market oriented approachrejects extrinsic legal
enforcement and takes within its fold self-regulatory mechanisms whichwould
enable the market players to employ or adopt. Any failure on the part of the
market playerwill get disciplined or rectified by the market place.ii) Human
rights approach:- This approach recognize right to information and the
relatedattribute of privacy as a human right. Due to this, surveillance
becomes operational strategy toprotect the interests of the members.iii)
Contract approach:- It recognizes contract model. The contract imposes an
obligation on theparties to protect the privacy concerns and it provides for
contractual remedies. Almost in everycase of cyber service provider, policy
pertaining to protection of the privacy interests of theconsumer is normally
announced. Normally this forms part of the envisaged terms andconditions of
the contractual relationship.
22. Explain the essentials of privacy preferences project (p3p) platform.
Ans:P3P provides a simple, automated way for users to gain more control
over the use of personal information on websites they browse. P3P is a
standardized set of multiple-choicequestions about the websites privacy
policies. Online customers can answer these questions toselect the way their
personal information will be handled by the service provider. This
snapshotcould be read by P3P enabled browsers and set according to the set
of privacy preferences of theconsumer.P3P not only provides facilitating
environment for the consumer to decide, negotiate and firm upthe
contractual relationship, but also recognizes nine aspects of online privacy.

The first fiveaspects deal with (a) who is collecting this data? (b) Exactly what
information is being collected?(c) for what purposes? (d) which information is
being shared with others? (e) who are theserecipients? The remaining four
aspects focus on the sites internal privacy policies. They include(a) can users
make changes in how their data is used? (b) how are disputes resolved? (c)
what isthe policy for retaining data? (d) and where can be detailed policies
found in human readableform?P3P is software to negotiate privacy
agreements between websites and online visitors. It is a kindof social
technology that involves not merely technology but also active participation
of humanbeings.
23. What are the evidentiary presumptions of a secured electronic
document?
Ans:An electronic document is said to be secure where any security
procedure has been appliedto the electronic document at a specific point of
time. Such a document is deemed to be securetill the time of verification. But
there is no presumption about the integrity and authenticity of theelectronic
record. To create a legally bound electronic document is technologically
complex. Alegally enforceable electronic document must pass the test of
authentication, non-repudiation,confidentiality, and information integrity
during transmission or storage. The key element in theauthentication of a
paper-based document is the signature of the contracting persons. Likewise
anelectronic signature is the key in an electronic record.The combination of
the Public Key and the Private Key provide both confidentiality
andauthentication, which enables for secure electronic transmission.
24. Explain the process of encryption and decryption of data.
Ans:The process of making the information unintelligible to the unauthorized
reader is knownas encryption of data. The process of making the information
readable once again is known asdecryption of data. The science of
Cryptography is made up of encryption and decryption. Thereare two types of
Cryptographic systems symmetric and asymmetric. The symmetric
Cryptosystem consists of both the sender and the receiver having access and
sharing a common Key toencrypt or decrypt a message. The asymmetric
Crypto system is a more a secure system. Thissystem uses two keys. The
originator of the document keeps one of the keys known as thePrivate Key
and the other key is sent to the recipient of the message. The recipient
affixes thedigital signature when the public key to open the message sent to
him.
25. E-Commerce is the new mantra of business. Explain.
Ans:

E-Commerce is the use of the Internet to buy and sell goods and services. ECommerce ischanging the way in which organizations do business, resulting
in streamlined purchasingprocesses and lowering the cost of transacting
business for both large and small companies.E-Business helps in improving
the way the business is conducted with the government,customers, and other
businesses.E-mail can be used in businesses to communicate with suppliers.
It can also be used forresponding and receiving the customer queries. For
example, e-mail can be used to accept ordersfrom the customers. The
customers can also make the payments online and get the
informationregarding the products available along with their price.Internet
can also be used by businesses for managing their records and they can
make use of electronic bookkeeping. An on-line banking service is another
area, which can be used by thebusinesses. These services can be used for
funds transfer, payroll management, and electronicbill payment
26. Write short notes on:
a) Source of law
Ans:
Our legal system is based on the foundations of common law conceived and
shaped byBritish rulers and jurists. In this system there are three main
sources of law:-a) Legislation:- It is the formal enactment of law by the
legislature created or authorized by theconstitution. It stands in contrasted
with judge made law. Legislation consists of written laws, ascontrasted with
judge made law or common law.b) Common Law:- It comprises the body of
principle, which derive their authority solely fromthe decisions of courts. It is
a body of law that develops and derives through judicial decisionsdifferent
from legislative enactments. Its principals do not derive their validity from
formal lawmaking by anybody, but from their enunciation through decisions
of courts.c) Custom:Custom denotes a usage or practice of the people (including a particular
social
group or a group residing in a particular locality) which by common adoption
and acquiescencehas become compulsory and has acquired the force of law
with respect to the place or subjectmatter to which it relates
b) Cyber crimes
Ans:
The illegal use of computer or computer related information is referred as
cyber crime. Ine-commerce, every transaction depends on safe systems for
money transaction in computer

networks. A companys entire production frequently depends on the


functioning of its data
processing system. Many organizations store their valuable information in
computer systems.Through these examples it is cleared that computer
technology spreading into all areas of life byinterconnection of computer or
network (internet). So this led the computer based crimes that
become a major threat of todays information society. It incl
udes illegal accessing of computer,hacking of important information of
government or private organization. An shows that groupsactive in organized
crime, professional business espionage and secret services around the
worldare already exploiting these feature of computer crime.
g) Intellectual property
Ans:
Intellectual property is the tangible property created by individuals or
corporations, whichis protected under trade secret, patent and copyright
laws. This issue is important for those whomake their livelihood in knowledge
fields.A trade secret is intellectual work that is company secret and not public
information. Ex
Corporate strategic planA patent is a document that grants the holder
exclusive rights on an invention for a fixedperiod of time.Copyright is a
statuary grant that provides the creators of intellectual property with
ownership.Copyright protection enables companies to prevent copying, limit
competition and chargemonopoly prices for the products.
h) Cyber regulations appellate tribunal
Ans:
The central Government has in the act detailed the rules and regulation for
theestablishment of Cyber Regulations Appellate Tribunals. This consists of
one person only who isthe presiding officer of the tribunals to be appointed
by the Central Government. The presidingofficer would have to be a current
or former judge of the high court. An appeal to the Tribunal issubjected to the
following conditions: i) any person aggravated by an order made by
thecontroller under the act may prefer an appeal to the Tribunal.ii) Every
appeal in the prescribed form along with the requisite fee shall be filed within
a periodof forty five days from the date on which an order copy is received by
the aggrieved person.iii) A copy of the order passed by the tribunal shall be
sent to the parties to the appeal and to theconcerned Controller.

Das könnte Ihnen auch gefallen