EXECUTIVE COURSE ON CYBERLAW LEVEL B

EXECUTIVE COURSE ON CYBERLAW LEVEL B The coming of Internet has seen a paradigm shift in governance processes, the advent of the public health emergency has further seen the governments not just realizing the power of the Internet for governance, but also increasingly relying upon Internet and cyberspace for the purposes of reaching out and […]

EXECUTIVE COURSE ON CYBERLAW LEVEL B

The coming of Internet has seen a paradigm shift in governance processes, the advent of the public health emergency has further seen the governments not just realizing the power of the Internet for governance, but also increasingly relying upon Internet and cyberspace for the purposes of reaching out and working for the welfare of its citizens. A large chunk of governance activities today get done in the digital ecosystem. These digital activities have their own distinctive legal ramifications. Hence, the senior level and the middle level government officers were dealing with these issues are often need to be sensitized about the legal policy and regulatory ramifications of cyberspace issues to the extent it involves a day-to-day governance activities. This course enables the senior and middle level officers and various governmental ministries, departments and organizations to have a holistic understanding of the legalities and other policy and regulatory ramifications pertaining to use of Internet, World Wide Web cyberspace as also newly emerging technologies.

In the day-to-day decision-making by middle and senior level officers. The government they are often called to apply the principles of governance via Internet and therefore they need to be aware of the legal policy and regulatory ramifications of not just cyberspace, but also newly emerging technologies.

This course enables the senior and the middle level officers and various governmental ministries, organizations and bodies to specifically have a holistic understanding of governance -related issues in cyberspace, what all strategies they need to keep in mind while dealing with digital data as also activities in cyberspace and the digital ecosystem and what kind of proactive approaches they need to adopt while dealing with day-to-day emerging challenges of governance in the digital paradigm. This course will further enable the senior and middle level officers of government ministries and organizations to also understand how the advent of newly emerging technologies are completely changing the face of governance and how governments across the world now increasingly need to engage in addressing the distinctive challenges towards governance posed by newly emerging technologies like artificial intelligence, blockchain and internet of things.

This course will empower the senior and middle level governmental officers to get a holistic appreciation and understanding of the digital aspects of their governance activities and what all new strategies need to be adopted by them so as to ensure that governance in the digital ecosystem is up to speed and topical with current developments. This course further empowers the senior and middle level governmental officers to have in-depth understanding and knowledge about the governance issues and challenges in the digital age during Covid-19 and beyond, and the need for more proactive approaches to be adopted by governments while dealing with not just governmental data but also sensitive personal data of third parties as also addressing issues which have a direct connection with the sovereignty, security and integrity of any sovereign nation as also the governance processes, procedures and practices adopted by the relevant governments of the day.

1. INDIAN CYBERLAW & ITS PRACTICAL IMPLEMENTATION

1
Definition of Cyberlaw
2
Ambit of Cyberlaw
3
Applications of Cyberlaw
4
Cyberlaw constantly evolving
5
Cyberlaw early developments and UN Model Laws
6
Cyberlaw to play Important Role in New Cyber World Order
7
Why knowing Cyberlaw is Important For Your Daily Life
8
Examples Of Cyberlaw Impacting Your Daily Life
9
Indian Cyberlaw Needs To Constantly Evolve

2. GOLDEN AGE OF CYBERCRIME – GLOBAL & INDIAN TRENDS

1
COVID-19 – The golden age of Cybercrime

3. RANSOMWARE - CYBER APPROACHES AND CII PROTECTION

1
Cyber Extortion & Ransomware
2
Ransomware and related perspectives
3
Ransomware As A Cybercrime & Legal Nuances
4
Ransomware frauds
5
Your Response To A Ransomware Attack

4. DETECTION - INVESTIGATION & PROSECUTION OF CYBERCRIME – ISSUES AND CHALLENGES

1
Cybercrime and AI
2
Applicability of existing cybercrime legislations to AI
3
Need for deterrence in AI cybercrime law
4
Attribution of AI cybercrime
5
Shutting down AI systems for cybercrimes
6
Coronavirus and Cybercrime
7
New Kinds of Cybercrime on Social Media Emerging
8
Regulating Cybercrime through Cyberlaw
9
Need for Reporting Cybercrime on Social Media
10
Budapest Convention on Cybercrime
11
E-Evidence in Social Media Cybercrime
12
MLATs and Social Media Cybercrime
13
Precaution to Prevent Being Victim of Social Media Cybercrime
14
Cybercrime Statistics
15
Increasing Cybercrime Challenges
16
Internet jurisdiction in cybercrime matters under international laws
17
Cybercrime as an essential issue
18
Cybercrime categories covered under cyberlaw
19
Reporting cyber frauds and cybercrimes by professionals
20
Legalities concerning ransomware as a cybercrime
21
Online financial frauds as Cybercrime and their economic impact
22
Massive Increase in Cybercrime
23
Latest Cases on Cybercrime
24
Cybercrime Origin
25
Kinds of Cybercrime
26
Inter-Personal Cybercrime
27
Impact of Inter-Personal cybercrime
28
Various Kinds of Inter-Personal Cybercrime
29
Regulating Cybercrimes on Darknet
30
Cybercrime Regulation and Digital Users
31
Role of International Conference on Cyberlaw, Cybercrime, Cybersecurity and ICCSL

5. ELECTRONIC EVIDENCE IN GOVT. ECOSYSTEM – ITS ADMISSIBILITY AND PROOF

1
Electronic Evidence Challenge
2
Electronic evidence legalities
3
Electronic evidence and online defamation

6. CYBER SECURITY LEGAL APPROACHES IN INDIA

1
a. IT ACT 2000
2
Cyber security coverage in Indian Cyberlaw
3
Cyber security provisions under the Indian Information Technology Act, 2000
4
International developments on cyber security law and lack of dedicated Indian law on cyber security
5
Cyber security compliances by intermediary
6
Reasonable security practices and procedures
7
Cyber security reporting requirements in India
8
Protection of India’s Critical Information Infrastructure
9
b. DATA BREACH NOTIFICATION
10
Cyber Security Breaches & Legalities
11
Cyber Security Breaches
12
Darknet & Cybersecurity Breaches
13
Dealing with cybersecurity breach
14
Equifax Cybersecurity Breach
15
Grave Figures About Cybersecurity Breaches
16
Increasing Cybersecurity breaches & online financial frauds
17
Increasing Cybersecurity Breaches in Coronavirus Age
18
Prevailing Position of Cybersecurity Breaches
19
Uber Cybersecurity Breach
20
c. IT RULES 2021

7. GROWING CYBER ATTACKS AND CYBERSECURITY BREACHES IN INDIA – CASE STUDIES & PRACTICAL RESPONSES

1
Cyber Security Breaches and Legalities
2
Dealing with cybersecurity breach
3
Breach of medical IoT devices
4
Increasing frequency and cost of IoT cybersecurity breaches
5
Cyber Security Breaches
6
Increasing Cybersecurity breaches and online financial frauds
7
Corporate Liability for Cybersecurity Breaches
8
Increasing Cybersecurity Breaches in Coronavirus Age
9
Increasing Cybersecurity Breaches
10
Equifax Cybersecurity Breach
11
Uber Cybersecurity Breach
12
Darknet and Cybersecurity Breaches
13
Prevailing Position of Cybersecurity Breaches
14
Grave Figures About Cybersecurity Breaches

8. GLOBAL APPROACHES ON CYBER SECURITY REGULATION DATA LOCALIZATION AND PRIVACY RELATED LAWS IN INDIA

1
Applicability of Existing Privacy Law & AI
2
Areas of Cybersecurity Law Jurisprudence
3
Blockchain and privacy
4
Budapest Convention
5
California Internet of Things Cyber Security Law – Dawn of a New Era
6
Cyber Law and Cybersecurity Law
7
Cybersecurity Law in Different Countries
8
Difficulties in privacy protection
9
Emerging Trends in Cyber Security Law Pre & During COVID-19
10
European Cyber Security Framework – Scope & Impact
11
Germany Cybersecurity Law
12
How IoT impacts your privacy
13
Internet of Things and Privacy
14
Justice Puttaswamy judgment and Right to Privacy in Electronic Ecosystem
15
Mobile application and digital privacy
16
National cyber security policies and their impact
17
Need to balance existing privacy legislations with AI
18
New York Cyber Security Policy – Positives & Negatives
19
New York Cyber Security Regulations – Pathbreaking and Impactful
20
Personal privacy & Data privacy as essential elements
21
Privacy & AI
22
Privacy challenges on Internet of Things
23
Privacy Issues
24
Privacy Norm & Their Incorporation in AI
25
Privacy on Darknet
26
Privacy under Indian Cyberlaw
27
Privacy Violation by AI
28
South Carolina Insurance Cyber Security Law – Salient Features & Impact
29
The Emerging Discipline of Cybersecurity Law
30
Violation of Online Privacy

9. GOVT. AS INTERMEDIARY & DATA RELATED ASPECTS CONCERNING GOVERNMENTAL OPERATIONS

1
Intermediary liability and IoT
2
Data protection in AI
3
Applicability of existing data protection laws in AI
4
Social Media Providers and Their Obligations to Provide Data
5
Article 9 – Admissibility and evidential weight of data message
6
Article 10 – Retention of data messages
7
Attribution of data messages
8
Article 15 – Time and Place of dispatch and receipt of data messages
9
Data Localisation and Balkanisation
10
Big Data and Data Protection
11
Roles of data intermediaries in cyberlaw
12
Data Protection as an essential element
13
Personal privacy and Data privacy as essential elements
14
Regulating data intermediaries and service providers
15
Data held by professionals and connected duties
16
Personal data of professionals on official devices and legalities
17
Deletion of corporate data by professionals
18
Duty of confidentiality of data
19
Respecting intellectual property rights in electronic data
20
Protecting professional data
21
Data protection and IoT
22
Monitoring of data transmission on IoT
23
Data Protection on the Darknet
24
Can You Get Your Personal Data Removed From The Web?
25
How to deal with Misuse Of Confidential Data / Trade Secrets?
26
Legal ramifications of Deleting Corporate Data
27
Data as new oil of data economy
28
Legal liability of data intermediaries
29
Ownership and handling of corporate data
30
Social Media Providers and Their Obligations to Provide Data

10. AADHAR ECOSYSTEM - ITS REGULATION AND DATA PROTECTION IN INDIA

1
The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016
2
Supreme Court on Aadhaar
3
Aadhaar and Other Laws (Amendment) Act, 2019
4
Data protection and Cyberlaw
5
Data protection provisions under the Indian Cyberlaw
6
Justice B. N. Srikrishna Committee and data protection
7
Covid-19 learnings on data protection
8
Data localization – International and Indian Position
9
Jurisdiction under the Indian Cyberlaw
10
Big Data & Data Protection
11
Data Protection as an essential element
12
Data protection & IoT
13
Data Protection on the Darknet
14
Data Protection in AI
15
Applicability of existing data protection laws in AI

11. PRACTICAL STRATEGIES AND BEST PRACTICES CONCERNING CYBER RESILIENCE IN GOVERNMENTAL ECOSYSTEM

1
Cyber Resilience – Definition and Historical Evolution
2
Salient Features of Cyber Resilience
3
Cyber Security & Cyber Resilience
4
Cyber Hygiene, Cyber Insurance and Cyber Resilience
5
Data Protection, Intermediaries and Cyber Resilience
6
Global Cyber Resilience Framework

12. INTERESTING USE OF EMERGING TECHNOLOGIES (AI BLOCKCHAIN & IOT) IN GOVERNANCE – GLOBAL & INDIAN CASE STUDIES

1
Introduction to China’s AI Governance Principles
2
China’s AI Governance Principles
3
China’s Judgment on AI Written Articles Being Copyright Protected
4
China’s AI Powered Judge
5
Projected Figures About AI Impact
6
Future Ahead For AI Law
7
AI and Cyber Security
8
Cybercrime and AI
9
Applicability of existing cybercrime legislations to AI
10
Need for deterrence in AI cybercrime law
11
Attribution of AI cybercrime
12
Shutting down AI systems for cybercrimes
13
AI Definition by John McCarthy
14
No Need for specific regulation of AI
15
Treating of AI as a legal entity
16
AI as a legal entity
17
Company’s legal features and their applicability to AI – Part 1
18
Company’s legal features and their applicability to AI – Part 2
19
AI and Ethics
20
Legal Profession – AI and Ethics
21
Morality and AI
22
Morality Question in AI
23
Privacy and AI
24
Privacy Norm and Their Incorporation in AI
25
Privacy Violation by AI
26
Applicability of Existing Privacy Law and AI
27
Roles and Responsibilities of AI users
28
Need to balance existing privacy legislations with AI
29
Data protection in AI
30
Applicability of existing data protection laws in AI
31
Responsibility of keeping AI secure
32
Human monitoring of AI cyber security
33
Cyber security and AI
34
Inequality and AI laws
35
Misuse of AI
36
Malicious use of AI
37
Regulating malicious use of AI
38
FaceApp – an AI legal case study
39
Impact of AI
40
Need for broad legal AI framework
41
Statistics about Artificial Intelligence
42
TCS Survey about Artificial Intelligence
43
Need for Artificial Intelligence Law
44
Legal definition of Artificial Intelligence in Nevada
45
Applicability of legal person parameters to Artificial Intelligence
46
Artificial Intelligence and human intelligence
47
Artificial Intelligence as an agent
48
Treating Artificial Intelligence as a company
49
Ethical principles and Artificial Intelligence
50
Artificial Intelligence and legal liability – various questions
51
Legal liability for company owning or licensing Artificial Intelligence
52
Enforcement of legal liability of Artificial Intelligence
53
Important cases pertaining to Artificial Intelligence legal liability
54
Liability under law of torts and Artificial Intelligence
55
Artificial Intelligence contracts and legalities
56
Artificial Intelligence and professionals
57
Application of Artificial Intelligence and Artificial Intelligence Law
58
Further Application of Artificial Intelligence and Legal Issues
59
Facts and Figures About Artificial Intelligence
60
Additional Artificial Intelligence Statistics
61
Need For Legally Defining Artificial Intelligence
62
US Legal Definition of Artificial Intelligence
63
New Artificial Intelligence Law on Recruitment
64
Preamble of Illinoi Artificial Intelligence Law
65
Disclosure of the Use of Artificial Intelligence Analysis
66
Duty to Explain Artificial Intelligence Working
67
Obtaining Prior Consent For Being Evaluated by Artificial Intelligence
68
Discretions to Employees Using Artificial Intelligence
69
Position Of Illinoi Artificial Intelligence Law
70
Grey Areas Of Illinoi Artificial Intelligence Law
71
Other Deficiencies Of Illinoi Artificial intelligence Law
72
White House Artificial Intelligence Principles 2020
73
Significance Of White House Artificial Intelligence Principles 2020
74
Blockchain and Cyber Legal Challenges
75
Understanding Blockchain
76
Characteristics of Blockchain Ledgers
77
Blockchain Statistics
78
Additional Blockchain Figures
79
Government, Blockchain Pilot Programme
80
Is Blockchain Legal?
81
Blockchain and cybersecurity
82
Challenges of cybersecurity for blockchain
83
Additional cybersecurity risks to blockchain
84
Existing Cyberlaws and Blockchain
85
Malta’s blockchain laws
86
Malta’s innovative technology
87
Need for new Legal framework on Blockchain
88
Legality of Blockchain, Ledger and Entry
89
Nevada Law defining blockchain
90
Blockchain Legislation in United States
91
Delaware Law on Blockchain
92
Blockchain and Privacy
93
Liability of Blockchain Service Providers
94
Smart Contract, Blockchain and Legalities
95
Trustless trust in blockchain contracts
96
Legality of blockchain contracts
97
Consent and frustration of blockchain contract
98
Projected statistics about blockchain
99
Future projections about blockchain
100
Trends emerging in blockchain cases around the world
101
IoT and Statistics
102
How IoT impacts your privacy
103
Breach of medical IoT devices
104
California IOT law – Introduction
105
Clarifications regarding interpretation of California IOT law
106
IoT and Cybersecurity – An Introduction
107
Distinction between computers and communication devices on IoT evaporating
108
Duty to protect Cybersecurity in IoT devices
109
Cybersecurity law and IoT
110
United Kingdom report on consumers IoT products and associated services
111
Intermediary liability and IoT
112
Defining IoT user rights on Cybersecurity
113
Jurisdiction and Attribution in IoT
114
Increasing frequency and cost of IoT cybersecurity breaches
115
Interception, Surveillance and Monitoring in IoT
116
Data protection and IoT
117
Traceability and unlawful profiling on IoT
118
Monitoring of data transmission on IoT
119
IoT and Cyber Security
120
Limitation of Internet of Things (IoT)
121
IoT and Legal Challenges
122
Internet of Things and professionals
123
Positives and Negatives of Internet of Things
124
Internet of Things and Privacy
125
Privacy challenges on Internet of Things

13. PRIVACY & CRYPTO ECOSYSTEM AND REGULATION

1
Belarus crypto-currencies law
2
Blockchain and privacy
3
Crypto & Darknet Cybercrime
4
Cryptocurrencies on Darknet
5
Internet of Things
6
Metaverse Privacy
7
National laws on regulating Blockchains, Bitcoins, crypto-assets and crypto-currencies
8
Personal privacy & Data privacy as essential elements
9
Privacy challenges on IoT
10
Privacy under Indian Cyberlaw
11
Questions regarding IoT Privacy

14. ELECTRONIC GOVERNANCE IN INDIA – CASE STUDIES CHALLENGES & LEARNINGS

1
UNCITRAL Model Law on Electronic Commerce
2
Article 5 and 6 UNCITRAL Model Law on Electronic Commerce
3
Article 7 UNCITRAL Model Law on Electronic Commerce
4
Electronic signature and legal requirements
5
The electronic format
6
Legality of electronic format
7
Legality of electronic signatures
8
Electronic Authentication – Principles
9
Legality of electronic format and electronic authentication
10
Retention of electronic records by professionals
11
Electronic incriminating evidence and anonymity
12
Respecting intellectual property rights in electronic data

15. CYBERCRIME IN INDIA AND ITS REGULATION

1
Cybercrime as an essential issue
2
Cybercrime categories covered under cyberlaw
3
Cybercrimes and their Regulation
4
Identity Theft as cybercrime
5
Hacking as cybercrime
6
Phishing
7
Regulating cybercrime
8
Regulating Cybercrimes on Darknet
9
Cybercrimes In India and Their Regulation
10
No Dedicated law on cybercrime regulation in India
11
Section 65 of the Information Technology Act, 2000
12
Section 66 and 43 of the Information Technology Act, 2000
13
Section 66A of the Information Technology Act, 2000
14
Dishonestly retaining stolen computer resource or communication device
15
2008 Amendments on Bailability of Cybercrimes
16
Arif Azim – India’s first cybercrime conviction
17
Practical Challenges Faced In Cybercrime Regulation Through National Laws
18
Cybercrime Regulation and Digital Users
19
Regulation of cybercrime on Darknet
20
Legal Regulation of Identity Theft
21
Legal Regulations of Cyber Bullying
22
Role of International Conference on Cyberlaw, Cybercrime & Cybersecurity & ICCSL

Be the first to add a review.

Please, login to leave a review
30-Day Money-Back Guarantee

Includes

Full lifetime access
Access on mobile and TV
EXECUTIVE COURSE ON CYBERLAW LEVEL B
Price:
₹46,000
This website uses cookies and asks your personal data to enhance your browsing experience.