The Indian Evidence Act, 1872 contains set of rules and regulations regarding admissibility of evidence in the Indian Courts of law. Indian Evidence Act was passed by the British Parliament in 1872 setting up a path-breaking judicial measure by changing traditional legal …
- Website
- http://sagarrahurkar.com
- About Me
- Sagar is a Law graduate. He is Head at Asian School of Cyber Laws(Maharashtra). He specializes in Cyber Law, Intellectual Property Law and Corporate Law. He teaches at numerous educational institutions across India.
All Articles by "Sagar Rahurkar"
“Freedom of speech does not protect you from the consequences of saying stupid shit.” ― Jim C. Hines Yes, you have guessed it right, it with reference to current things happenings around. Although I had written in one of the earlier editions …
(I) Shri.Thomas Raju Vs. The Branch Manager, ICICI Bank, Anna Nagar Branch, Chennai Case decided by – the Adjudicating officer, Government of Tamilnadu. Civil Jurisdiction. Petition No. 3 of 2011 Dated– 16th May, 2011 Petitioner, an employee of a Chennai based IT …
Introduction The Government of Kerala issued a notification u/s 70 of the Information Technology Act, 2000 (IT Act) declaring the FRIENDS application software as a protected system. Sec. 70 of the IT Act reads as – Protected System The appropriate Government may, …
Having covered almost all the cyber legal issues till date, we will have a look at some of the landmark cases decided by the Indian courts till date from this issue onwards. First in the list is famous case of Baazee.com. I …
(1) Controller of Certifying Authorities (CCA) CCA is appointed by the Central Government under section 17 of the IT Act. Some of the functions of CCA are – Act. To exercise supervision over the activities of Certifying Authorities; To supervise public …
In some of the latest articles we have focused on the areas of data privacy, due diligence to be observed by the companies handling sensitive personal data, etc. But, not much has been spoken/written on violation of person’s privacy. I.e. ensuring privacy …
Whoever, by means for any communication device or computer resource cheats by personating, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one …
Introduction The term identity theft was coined in 1964. However, it is not literally possible to steal an identity so the term is usually interpreted with identity fraud or impersonation. Identity Theft is a form of stealing someone's identity by pretending to …