Books on Cyber Law
Books on Cyber Law
-
.IN DOMAINS AND THE LAW
₹300₹209.IN DOMAINS AND THE LAW .IN stands for the country code top-level domains allocated to India. The rise of India as an important rising power in the field of Information Technology has meant emergence of many new trends. One of the big trends in this regard is the increased propagation and adoption of the .in country code top-level domains. In fact, India was already allocated this country code top-level domain couple of decades back. However, it shows a lack of innovative approach in marketing the same, which led to very few .in registrations by the year 2004. Consequently, restructuring took place in the Indian .in country code top-level domain regime and thereafter the Indian country code top-level domain has now seen unprecedented growth. Having crossed more than million domain names in .in cctld registry is only an indication of things to come.Add to cart -
APPIFICATION OF SOCIETY AND THE LAW
₹350₹297APPIFICATION OF SOCIETY AND THE LAW The last one decade has witnessed an exponential boom in the adoption of mobile devices. With each passing week, new kinds of mobile models are coming up and the adoption is getting increasingly more prevalent. The advent of smart phones and mobiles has ushered in the era of Mobile Applications or Mobile Apps.. Today, more and more people are downloading mobile apps on their mobile phones. In fact, the dependence on the mobile phones and various mobile apps has led to a phenomenon called the ‘Appification of Society’.Add to cart -
AUTHENTICATION IN MOBILITY – A LEGAL VIEWPOINT
₹160₹133AUTHENTICATION IN MOBILITY - A LEGAL VIEWPOINT As increasingly mobiles are being used for a variety of human endeavours and activities, there is increasingly a need felt for mobile authentication. The concept of mobile signature has emerged and is increasingly gaining currency. What kind of authentication that is done in the context of use of mobiles and communication devices? What are the various strategies adopted in the context of mobile authentication? What are various kinds of factor of authentication available internationally in this regard? These and other related issues concerning mobile authentication have been sought to be addressed in this book. Clearly, a lot of development has yet to take place in the area of mobile authentication. However, there will also be a need for coming up with appropriate changes in Mobile Law jurisprudence as developments take place in the area of mobile authentication.Add to cart -
BIOMETRIC CONFIDENTIALITY, SECURITY & INDIAN LAW
₹950₹784BIOMETRIC CONFIDENTIALITY, SECURITY & INDIAN LAW In the year 2009, India started an experiment that was soon become a trailblazer. This was the Indian Aadhaar system or the Indian national biometric identity system. Under the said scheme, India initiated the process of collecting the biometric and demographic information of Indian residents, so that biometric identity consisting random Aadhaar Number could be granted to them. This biometric identity ecosystem slowly started growing and today, India’s national biometric identity system is the biggest biometric identity system anywhere in the world. Meanwhile, India has come up with the new legal framework to govern the national biometric identity system. Indian legislation has been extremely concerned that biometric information being collected under the national biometric identity system, should be secure, protected as well as confidential. That is the reason why the law has come up with various statutory parameters to protect confidentiality and security of biometric information in India.Read more -
BIOMETRIC CRIMES – REGULATION IN INDIA
₹850₹784BIOMETRIC CRIMES -REGULATION IN INDIA India has demonstrated to the world its unique working of its national biometric identity system, being the Aadhaar system. This is the system which has collated the biometric and demographic information of residents in India and has issued to residents, a random Aadhaar Number which can be used as proof of identity. However, given the significance and value of biometric information, it is but natural to expect that criminal activities would be targeted at such biometric information, by criminal elements. This eBook seeks to understand the various biometric crimes that have been defined, under the Indian law impacting biometric information. It is pertinent to note that India has already put in place the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 which seeks to provide legal framework for regulating activities in the Aadhaar ecosystem. Various crimes impacting biometric and demographic information have been defined under the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016.Add to cart -
BYOD AND THE LAW
₹300₹268BYOD AND THE LAW The advent of technology and mobility has ensured a change in people's perspective. Today, more and more people want to carry their own devices to work. That is why the concept of Bring Your Own Device (BYOD) has attained prevalence and currency. BYOD presents an immediate advantage for any organisation that does not wish to invest on devices and infrastructure. Further BYOD allows the employee the convenience of working on official data and matters through his own device. The advent of BYOD has brought forward various legal, policy and regulatory challenges. In fact, while technology has enabled the ease of convenience, the reality is that there are large numbers of legal and regulatory challenges before organizations who are today opting for BYOD. This eBook looks at the legal, policy and regulatory issues impacting BYOD. This eBook further examines the position of BYOD in India and how Indian law has sought to address the same.Add to cart -
CHILD PROTECTION IN MOBILE PARADIGM
₹250₹199CHILD PROTECTION IN MOBILE PARADIGM ABOUT THE EBOOK In today's world, more and more children are using mobile phones and communication devices. The new generation is far more tech savvy than the older generation. However, the access to communication devices to children has not only empowered the children but has also made them more vulnerable. More and more children are today being specifically targeted, using communication devices that are being used by such children. The use of mobile phones by children has a direct impact upon protection of children not only vis-à-vis their safety but also from exposure from potential pedophiles and cyber criminals. Further, mobile phones today immediately bring to the child's hands access to unlimited pornography using mobile Internet. Consequently, there are large number of legal, policy regulatory issues concerning child protection and mobile.Add to cart -
CLOUD COMPUTING LEGAL ISSUES
₹300₹223CLOUD COMPUTING- LEGAL ISSUES Cloud computing has increasingly emerged as an important aspect of technology. Cloud computing technology has immense benefits and promises to harness the power of the cloud. The advent of cloud computing has also brought, to the forefront, various legal, policy and regulatory issues. These legal, policy and regulatory issues not only deal with authenticity and veracity of information on the cloud but also complex issues pertaining to jurisdiction, data protection and privacy. The eBook looks at the various legal, policy and regulatory issues impacting cloud computing. This eBook further examines the various challenges that lawmakers across the world have to be bear in mind, when they go about dealing with the legalities of cloud computing.Add to cart -
CONFIDENTIAL INFORMATION ON MOBILES – SOME LEGAL ISSUES
₹150₹133CONFIDENTIAL INFORMATION ON MOBILES – SOME LEGAL ISSUES Today mobiles have become the preferred mode of communication. Companies are increasingly relying upon mobile phones for doing business and also for interacting with their employees, customers, clients. However, because mobility is now the name of the game, companies are increasingly giving access to various kinds of corporate confidential information to employees on their mobile devices. This is invariably being done so as to increase efficiency and productivity. However, the advent of mobility and mobile devices has got itself ensured that there are large number of legal, regulatory and policy issues when it comes to use and access of confidential information through mobile devices and communication devices. What are these challenges concerning confidential information on mobiles? How can confidential information in the mobile ecosystem be appropriately protected? What is the approach that the law needs to take? These and variety of other issues have been sought to be addressed by the present eBook.Add to cart