Important terms related to cyber law

  • "Access" with its grammatical variations and cognate expressions means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network. (Sec.2(1)(a) of IT Act, 2000)

  • "Addressee" means a person who is intended by the originator to receive the electronic record but does not include any intermediary. (Sec.2(1)(b) of IT Act, 2000)

  • "Affixing Electronic Signature" with its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of Electronic Signature. (Sec.2(1)(d) of IT Act, 2000)

  • "Asymmetric Crypto System" means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature. (Sec.2(1)(f) of IT Act, 2000)

 

  • "Certifying Authority" means a person who has been granted a license to issue a Electronic Signature Certificate under section 24. (Sec.2(1)(g) of IT Act, 2000)

 

  • "Communication Device" means Cell Phones, Personal Digital Assistance (Sic), or combination of both or any other device used to communicate, send or transmit any text, video, audio, or image. (Sec.2(1)(ha) of IT Act, 2000)

  • "Computer" means any electronic, magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network (Sec.2(1)(i) of IT Act, 2000)

  • "Computer Network" means the interconnection of one or more Computers or Computer systems or Communication device through- (i) the use of satellite, microwave, terrestrial line, wire, wireless or other communication media; and (ii) terminals or a complex consisting of two or more interconnected computers or communication device whether or not the interconnection is continuously maintained. (Sec.2(1)(j) of IT Act, 2000)

  • "Computer Resource" means computer, communication device, computer system, computer network, data, computer database or software. (Sec.2(1)(k) of IT Act, 2000)

    "Computer System" means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files, which contain computer programmes, electronic instructions, input data, and output data, that performs logic, arithmetic, data storage and retrieval, communication control and other functions. (Sec.2(1)(l) of IT Act, 2000)

  • "Cyber cafe" means any facility from where access to the Internet is offered by any person in the ordinary course of business to the members of the public. (Sec.2(1)(na) of IT Act, 2000)

More Topics

1. Need for Cyber law

2. Cyber crime on the rise

3. Important terms related to cyber law

4. Cyber law in India

5. Need for cyber law in India

6. History of cyber law in India

7. Information Technology Act, 2000

8. Salient features of the Information Technology (Amendment) Act, 2008

9. Rules notified under the Information Technology Act, 2000

10. Overview of other laws amended by the IT Act, 2000 - India Panel Code 1860

11. Indian Evidence Act, 1872

12. National Policy on Information Technology 2012

13. Applicability and Scheme of the INFORMATION TECHNOLOGY ACT, 2000

14. Digital signature and Electronic signature

15. Digital Signature under the IT Act, 2000

16. Electronic Signature

17. E-Governance

18. Attribution, Acknowledgement and Dispatch of Electronic Records

19. Certifying Authorities

20. Root Certifying Authority of India (RCAI)





Subscribe Indian Cyber Security RSS feed


Enter your email address:



 


Facebook RSS

 

© Copyright-2010. All Rights Reserved.

This website is Accessible! We are proud to say, this website has ZERO detected "accessibility errors",
as per an accessibility evaluation conducted using WAVE, a highly reputable accessibility evaluation tool.

If you have any issue about publishing content of this site, then mail us to info@indiancybersecurity.com

Best View in CSS 3 Supportable Browsers and 1366x768 Resolution system.

Facebook