Cyber Law Paper Presentation Text

Jonathan Friesen - Writing Coach

Well researched papers on the main theme of cyber security and cyber laws are called for presentation in the technical sessions of the seminar. Laws and concerns in relation to any selected/ specific forms of cyber crimes such as hacking, cyber pornography, identity theft, spoofing, cyber stalking, software piracy, etc. Providing / developing an alternative law / policy framework to secure cyber space etc. An abstract of the research paper, not exceeding 250 words, accompanied by a covering letter containing: title of the paper, full name of the author/authors, complete address with contact number and e mail address must be submitted as attachment via email to email 160 protected 2. Notification of the accepted abstracts will be done on/ before 30th october, 2014. The text of the abstract must be in – ms word format with times new roman, font of size 12 amp with 1.5 line spacing. please refer to the official brochure here. international virtual conference on law ivcl 2014 it's with immense pleasure that international forum for research analysis, invites you to participate in one of its kind, the ivcl 2014 virtual presentation.

The conference foresees to provide an opportunity for academicians, legal practitioners, research scholars and students to exchange ideas, and discuss upon emerging issues in the field of law. To provide a forum for academicians, curriculum developers, students, researchers' scholars, practitioners, service providers and other interested persons from the field of law, to discuss the contemporary issues in law. To encourage students to be involved in the research process, in order to achieve comprehensive excellence. Once the paper is accepted and requisite fee paid, the authors will be intimated to send a power point presentation of not less than 25 slides and not more than 30 slides or a video file a recorded personal presentation of not less than 10 minutes and not more than 20 minutes, which will be uploaded in the website of the forum under virtual presentation section. This virtual presentation section will enable all the participants to have access to all power point presentations/video file. Abstracts and papers will be published in online journal with issn as per the given chedule.

In today’s world as everything is going to connected through internet every time when data is provided to a service provider or a firm then there is great danger of misuse of that data. Today, in india there is no specific law on the subject of data protection or on the violation of the privacy of an individual. Although some sections of the information technology act deals with the computer related offences and violation of privacy, but those provisions are in no way sufficient to deal with the present situation. The bill does not contain any provision relating to the categorical division of data but actually different type of data requires different type of protection as like in the case of us.

Dissertation Topics Environmental Science

We have to provide practical guidelines that what type of data can be revealed generally to all persons or what type of data only to some specific or only to the data subject. We are required to make a comprehensive law, which should deal with the different aspects of data protection as right to privacy or intellectual rights. Ultimately, the authors want to convey that if there would be comprehensive code dealing with data protection, then the incidents of data theft or unauthorised access will reduce, and it will attract more and more foreign firms/entities to our country, which would be a boom to our country’s it industry. With the advancement of computer related technology, the cyber crimes are the order of the day.

Recently the government of united states has accused chinese hackers for stealing their data and that too from the highly secured network of pentagon. Now, one can easily imagine if pentagon is not safe then who else can be? as we all know that india has emerged as an it hub of the world and it is extremely important for us to have a proper law dealing with data protection. But data protection laws in india are currently facing many problems and resentments due to absence of proper legislative frameworks. India being the largest host of outsource data can be an easy target for cyber criminals mainly due to lack of proper law.

The data security council of india 3 dsci and department of information technology dit must also rejuvenate its efforts in this regard on the similar lines. Now if you might remember that some 1 and half years ago the website of ministry of health, government of india was hacked and all the links were directed to some porn sites. To protect all these we not only need a strong cyber law but also an effective cyber force to work on.

Latest Legal Essay Topics

With the advancement in it and bpo sectors, indian companies handle and have access to almost all kind of sensitive details of individuals across the world. These data are stored in electronic medium and is vulnerable in the hands of their employees. These recent trends in the indian it sector has raised concerns about data privacy. Now dealing with the law, there is no express legislation dealing with in india dealing with the data protection. Although a bill was introduced in the parliament in 2006, it is yet to see the light of the day. That bill seems to be on the framework of european union data privacy directive 1996. It is important to note that applicability of that bill was limited to personal data.

The bills provides for both government as well as private enterprises engaged in data collection. It also provides for the appointment of, data controllers , who have general superintendence and adjudicatory jurisdiction over subjects covered by the bill. It also says that penal sanctions may be imposed on offenders in addition to compensation for damages to victims. In india, to cover cyber crimes we do have indian information technology act, commonly referred as it act, to cover it related laws in india and delineates the scope of access that a party may have to on data stored on a computer, computer system or computer network, the provisions of the it act do not address the need for a stringent data protection law being in place. This act has been amended in 2008 to meet the growing challenges of the cyber crime. However these amendments are still insufficient to deal with the present scenario.