Patent Law and Computer technology Read

Patent Inventions are protected by Patents. It is a legal monopoly granted to the owner of new invention, for a limited period of time. It can be granted for product as well as process.    Illustration Revati develops a new medicine to …

Trademark Law and Cyberspace Read

A Trademark is a mark used by an individual or business organization which represents trade or business and which is capable of distinguishing goods or services from that of others. A trademark is typically a name, word, phrase, logo, symbol, design, image, …

Copyright and Cyberspace Read

Copyright in cyberspace primarily exists at two levels Computer Source code. Computer database. Copyright   [This concept is explained using simple fictional illustrations involving Revati, who has created easyPDF, a computer program for converting documents into PDF (Portable Document Format)]  According to …

The Information Technology Rules, 2011 Read

The Information Technology (Reasonable security practices and procedures and sensitive personal information) Rules, 2011.We Indians are very social by nature and give very less importance to “Privacy”; let it be our personal privacy or data/corporate privacy. We, by nature want to share …

Law relating to Unauthorized Access Read

One of the most publicized risks to information systems is that of unauthorised access, often referred to as hacking. For some, hacking is seen as something that happens to other people typically large or high profile organisations. But this is not the …

Data Protection and Corporate Liability Read

India – The Emerging IT super power In the recent years India has emerged as one of the preferred destinations for offshore business in outsourcing, financial, educational, legal, banking, healthcare, marketing and telecommunication services. The factors that have turned India into one …

Botnet attacks and the Law Read

IntroductionA botnet (a contraction of the term “RoBOT NETwork”) is a computer network made up of a vast number of compromised  computers  that have been infected with malicious code, and can be remotely-controlled through commands sent via the Internet. Typically, users whose …

Electronic contracts & the Indian law Read

Chapter IV of the Information Technology Act, 2000 (amendment of 2008) contains Sections 10, 11, 12 and 13 which talks about Legal Recognition to Electronic Contracts, Attribution, Acknowledgment and Dispatch of Electronic Records. Section 10A of the IT Act, 2000 provides that, …

Electronic Contracts (Part-1) Read

Contracts have become so common in daily life that most of the time we do not even realize that we have entered into one. Right from hiring an auto to buying airline tickets online, innumerable things in our daily lives are governed …