Internet Law and Policy

How do the law and other forces determine the structure or constitution of cyberspace [of which the Internet is the largest and best-known component], both locally and internationally? How is cyberspace governed? Cyberspace gives rise to the most distinctive and interesting problems of information technology law, as it is the most pervasive conjunction of computing and telecommunications technologies. The Internet is the focus through which this programme studies information technology law. The topics in this section of Law Wire cover all topics and issues related to Internet Law

Privacy and the mechanics of modern encryption

12 December 2012    Author: Devna Arora

Encryption offers the industry tremendous advantage in conducting business activities but the usage by criminals for terrorism and organized crime has prompted governments across the world to come with stronger encryption laws.  In the recent spate of events the Indian government had asked Canada based blackberry...

What's all the fuss about section 66A

17 January 2013    Author: Aishani Gupta

Section 66A of the Information Technology Act, 2000 (ITA) is under threat by a PIL that has been filed in the Supreme Court. This section is under heat for being grossly misused by the executive in the recent past. Some recent incidents include:

  • The arrest of 2 girls in Mumbai for questioning the bandh on Facebook after...

Religious Sentiments

18 January 2013    Author: Aishani Gupta

Section 66A of the Information Technology Act, 2000 (ITA) is under threat by a PIL that has been filed in the Supreme Court. This section is under heat for being grossly misused by the executive in the recent past. Some recent incidents include:

  • The arrest of 2 girls in Mumbai for questioning the bandh on Facebook after...

Too much litter on Twitter

25 January 2013    Author: Devna Arora

Have you ever thought that 140 words on twitter can land you in court for a defamation suit. Dawn Simorangkir v. Courtney love and Cairns v. Lalit Modi have been few cases delineating the scope of tweets being defamatory.  The question that needs to be answered is will a tweet be treated as a publication which is defamatory...

Copyright Infringement on the Internet

26 January 2013    Author: Devna Arora

Internet is an ideal medium for the artists to exercise their creativity. Copyright exists in all original works from the time they come into existence even if they are not registered. Ubiquitous nature of the internet has made it vulnerable to copyright violations. With the growth of technology there is difficulty in...

Data Base an unsung business proposal in India

01 February 2013    Author: Sooraj Abraham

The Data Base industry is not a popularly discussed business industry in India. However, the international scene is different as they recognized the importance of the industry and passed separate legislations to nurture it. The Indian Data Base industry is governed by two legislations, the Information Technology Act 2000 and...

Freedom of Association on the Internet

02 February 2013    Author: Aishani Gupta

It is not often thought of. But the Internet is also a medium of forming associations. The right to freedom of association is generally thought of in the context of trade unions. However, the Internet especially through social networking sites helps one form associations.

Courts have interpreted the right as a voluntary...

Self Regulation on the Internet

03 February 2013    Author: Aishani Gupta

The extent of the information available on the Internet is vast. The Internet is analogous to a galaxy. No one knows the extent of it and it grows exponentially everyday. It’s a place where people post their private thoughts for the world to see. It’s a place where freedom of expression thrives in various forms, through...

Social Media Censorship: Justified to what extent

21 March 2013    Author: Akshat Razdan

Social Media is a platform for netizens to cite their own ideas and opinions about the situations surrounding them. It is a medium through which boundaries can be eliminated and people can connect with each other without any hinderances. Article 19(1)(a) of the Constitution of India ensures Right of Freedom of  Speech &...

The Future of E-Commerce in India

26 March 2013    Author: Akshat Razdan

The modern age of commerce is moving from brick and mortar to click and mortar. With the advent of technology and globalization, Electronic Commerce has seen expeditious growth. The roots of Electronic Commerce have spread deep in India as more and more corporate houses and business entrepreneurs have realized the importance...

Understanding Cyber Squatting

27 March 2013    Author: Akshat Razdan

Internet is an indispensable platform for all the modern day corporations to reach maximum audience in the shortest span of time; which is not possible through any other conventional platform. The need to get customers “online” rather than “waiting in line” is the neoteric approach followed by companies to increase their...

The Wikileaks Saga

16 May 2013    Author: Arjun Kant

The Internet age can also be termed as the age of the whistleblower. In this era of free press and liberty, the cyber world has played the quintessential role of a facilitator for dissemination of information. In a world where human movement is restricted by boundaries and limitations imposed by law, the cyber world has...

Cyber tort as key factor for the infringement of Right to privacy

14 June 2013    Author: Anagh Tiwari

Privacy is deeply rooted in the history and religion of India. Several religious scriptures, texts and classical right- ups recognize the importance of privacy. There is recognition of privacy in the Quran and the sayings of Prophet Mohammed. The Bible has numerous references to privacy and The Jewish law has long recognized...


28 June 2013    Author: Kanwardeep Kandolha

“One person’s joke could be another’s hurtful insult.”

Cyberbullying is also known as online bullying. It is the use of electronic information and communication devices such as mobile phones, text messages, e-mail or defamatory websites to bully or harass an individual or a group of people.

Cyber bullying is a vast topic...

Legal Aspects of Cloud Computing

15 November 2013    Author: Smitha HS


“Cloud computing” is the new buzzword. It is heralded as a development that has changed the landscape of information technology. So what exactly is cloud computing?

Technically, Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data,...

Phishing Scams: Bane of E-Commerce

21 November 2013    Author: Samar Chowdhery


E-commerce defined simply, is the commercial transaction of services in an electronic format. In general terms, E-commerce is a business methodology that addresses the needs of organizations, traders and consumers to reduce costs while improving the quality of goods and services and...

Phishing Scams - An Affliction to the Cyber World

01 December 2013    Author: Salagala Maneesh

A computer crime is an unlawful activity which is done by using a computer. This definition can extend to traditional crimes that are committed with the machine, such as counterfeiting money, but it also includes more tech-savvy crimes like phishing or logic bombs. Using a computer in this way, a criminal may be able to...