Practice Area

Internet Law and Policy


How do the law and other forces determine the structure or constitution of cyberspace [of which the Internet is the largest and best-known component], both locally and internationally? How is cyberspace governed? Cyberspace gives rise to the most distinctive and interesting problems of information technology law, as it is the most pervasive conjunction of computing and telecommunications technologies. The Internet is the focus through which this programme studies information technology law. The topics in this section of Law Wire cover all topics and issues related to Internet Law

Privacy and the mechanics of modern encryption

12 December 2012    Author: Devna Arora

Encryption offers the industry tremendous advantage in conducting business activities but the usage by criminals for terrorism and organized crime has prompted governments across the world to come with stronger encryption laws.  In the recent spate of events the Indian government had asked Canada based blackberry...

What's all the fuss about section 66A

17 January 2013    Author: Aishani Gupta

Section 66A of the Information Technology Act, 2000 (ITA) is under threat by a PIL that has been filed in the Supreme Court. This section is under heat for being grossly misused by the executive in the recent past. Some recent incidents include:

  • The arrest of 2 girls in Mumbai for questioning the bandh on Facebook after...

Religious Sentiments

18 January 2013    Author: Aishani Gupta

Section 66A of the Information Technology Act, 2000 (ITA) is under threat by a PIL that has been filed in the Supreme Court. This section is under heat for being grossly misused by the executive in the recent past. Some recent incidents include:

  • The arrest of 2 girls in Mumbai for questioning the bandh on Facebook after...

Too much litter on Twitter

25 January 2013    Author: Devna Arora

Have you ever thought that 140 words on twitter can land you in court for a defamation suit. Dawn Simorangkir v. Courtney love and Cairns v. Lalit Modi have been few cases delineating the scope of tweets being defamatory.  The question that needs to be answered is will a tweet be treated as a publication which is defamatory...

Data Base an unsung business proposal in India

01 February 2013    Author: Sooraj Abraham

The Data Base industry is not a popularly discussed business industry in India. However, the international scene is different as they recognized the importance of the industry and passed separate legislations to nurture it. The Indian Data Base industry is governed by two legislations, the Information Technology Act 2000 and...

Freedom of Association on the Internet

02 February 2013    Author: Aishani Gupta

It is not often thought of. But the Internet is also a medium of forming associations. The right to freedom of association is generally thought of in the context of trade unions. However, the Internet especially through social networking sites helps one form associations.

Courts have interpreted the right as a voluntary...

Self Regulation on the Internet

03 February 2013    Author: Aishani Gupta

The extent of the information available on the Internet is vast. The Internet is analogous to a galaxy. No one knows the extent of it and it grows exponentially everyday. It’s a place where people post their private thoughts for the world to see. It’s a place where freedom of expression thrives in various forms, through...

Social Media Censorship: Justified to what extent

21 March 2013    Author: Akshat Razdan

Social Media is a platform for netizens to cite their own ideas and opinions about the situations surrounding them. It is a medium through which boundaries can be eliminated and people can connect with each other without any hinderances. Article 19(1)(a) of the Constitution of India ensures Right of Freedom of  Speech &...

The Wikileaks Saga

16 May 2013    Author: Arjun Kant

The Internet age can also be termed as the age of the whistleblower. In this era of free press and liberty, the cyber world has played the quintessential role of a facilitator for dissemination of information. In a world where human movement is restricted by boundaries and limitations imposed by law, the cyber world has...

Cyberbullying

28 June 2013    Author: Kanwardeep Kandolha

“One person’s joke could be another’s hurtful insult.”

Cyberbullying is also known as online bullying. It is the use of electronic information and communication devices such as mobile phones, text messages, e-mail or defamatory websites to bully or harass an individual or a group of people.

Cyber bullying is a vast topic...

Legal Aspects of Cloud Computing

15 November 2013    Author: Smitha HS

Introduction

“Cloud computing” is the new buzzword. It is heralded as a development that has changed the landscape of information technology. So what exactly is cloud computing?

Technically, Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data,...

Phishing Scams: Bane of E-Commerce

21 November 2013    Author: Samar Chowdhery

MEANING AND TYPES OF E-COMMERCE MODELS

E-commerce defined simply, is the commercial transaction of services in an electronic format. In general terms, E-commerce is a business methodology that addresses the needs of organizations, traders and consumers to reduce costs while improving the quality of goods and services and...