Get Started. It's Free
or sign up with your email address
CHAPTER 1 by Mind Map: CHAPTER 1

1. Definition of Cyber Law

1.1. The area of law that deal s with the Internet' s relationship to technological and electronic element s , including computer s , software, hardware and information sys tems (IS)

2. Why need Cyber Law?

2.1. It touches almost all aspect s of transactions and activities on and concerning the Internet, the World Wide Web and Cyber space.

3. Cyber Law laws related to:

3.1. Cyber Crimes

3.1.1. Computer crime i s an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or s teal s a company' s or individual' s private information.

3.2. Electronic and Digital

3.2.1. A digital signature i s a type of electronic signature that offer s more security than a traditional electronic signature. When you sign a document with a digital signature, the signature links a “ fingerprint ” of the document to your identity.

3.3. Intellectual Property

3.3.1. Intellectual property is a category of property that includes intangible creations of the human intellect, and primarily encompasses copyrights , patents , and trademarks

3.4. Data Protection and Privacy

3.4.1. The relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

4. Differentiation of Conversional Law and Conventional Law

4.1. CONVERSIONAL LAW: Act of dominion wrongfully exerted over another's personal property in denial of or inconsistent with his title or rights therein, or in derogation, exclusion, or defiance of such title or rights, without the owner's consent and without lawful justification.

4.2. CONVENTIONAL LAW: Special law and has its source in the agreement of those who are subject to it. Rules that as decides between persons, countries or organizations

5. Regulatory instruments provided by government

5.1. Digital Signature Act 1997

5.1.1. An Act to make provision for, and to regulate the use of, digital signatures and to provide for matter s connected therewith.

5.2. Computer Crimes Act 1997

5.3. Telemedicine Act 1997

5.3.1. It deal s with unauthori zed acces s to computer material, unauthori zed acces s with intent to commit other offenses and unauthori zed modification of computer content s .

5.3.2. The act states that only registered doctor can practice telemedicine. Other health care provider s must obtain license to do telemedicine.

5.4. Communications and Multimedia Act 1998

5.4.1. Is a guide to prepare a content code and to enforce the code according to the standard and practices in the communications and multimedia industry

6. Importance of regulatory frameworks

6.1. Law takes the principle of territoriality as point of departure.

6.2. Cyber security tool s and target s are physical boundary-independent

6.3. Agreement s between nations create a general common basis for cyber security measures