Osmania University Information Technology Law Previous Important Questions

Exam Oriented Book – OU 3LLB 6/ 5LLB 10

Note- These questions are updated annually, unit-wise, to make your exam preparation easier. Best of luck!

Unit-I: Concept of Information Technology and Cyber Space

Syllabus: Concept of Information Technology and Cyber Space- Interface of Technology and Law – Jurisdiction in Cyber Space and Jurisdiction in traditional sense – Internet Jurisdiction – Indian Context of Jurisdiction -Enforcement agencies – International position of Internet Jurisdiction – Cases in Cyber Jurisdiction

Part A: 6-Mark Questions

  1. Search Engines
  2. Ethics and characters in Cyber space
  3. Cyber Space
  4. Internet Service Provider
  5. Netizen

Part B: 15-Mark Questions

  1. What is Cyber space? What are the jurisdictional issues relating to cyber space operations?

Unit-II: Information Technology Act, 2000

Syllabus: Information Technology Act, 2000 – Aims and Objects — Overview of the Act – Jurisdiction –Electronic Governance – Legal Recognition of Electronic Records and Electronic Evidence -Digital Signature Certificates – Securing Electronic records and secure digital signatures – Duties of Subscribers – Role of Certifying Authorities- RegulatorsundertheAct-TheCyberRegulationsAppellateTribunal – Internet Service Providers and their Liability– Powers of Police under the Act – Impact of the Act on other Laws.

Part A: 6-Mark Questions

  1. Electronic Signature
  2. Electronic Records
  3. Digital Signature Certificate
  4. Cyber Regulations Appellate Tribunal
  5. Legal recognition of electronic documents
  6. Cyber Appellate Tribunal
  7. Protected system
  8. Digital signatures
  9. Intermediary

Part B: 15-Mark Questions

  1. Is there any protection for digital signature in India? What method has the Act adopted? Explain.
  2. Explain the power of Cyber Appellate Tribunal.
  3. What are the objects of the Information Technology Act 2000 as amended in 2008?
  4. How are electronic records and electronic signatures secured under the Information Technology Act?
  5. How is controller or Certifying Authority appointed? What are his functions under the Information Technology Act?
  6. Explain the legal provisions relating to Digital signatures.
  7. What was the need for the enactment of the Information Technology Act, 2000?
  8. Discuss the functions of controller and powers of Controller of Certifying Authorities.

Unit-III: E-Commerce

Syllabus: E-Commerce – UNCITRAL Model Law – Legal aspects of E-Commerce – Digital Signatures – Technical and Legal issues – E-Commerce, Trends and Prospects – E-taxation, E-banking, online publishing and online credit card payment – Employment Contracts – Contractor Agreements, Sales, Re-Seller and Distributor Agreements, Non-Disclosure Agreements- Shrink Wrap Contract ,Source Code, Escrow Agreements etc.

Part A: 6-Mark Questions

  1. E-Banking
  2. Credit card frauds
  3. Escrow agreements
  4. Click wrap contract

Part B: 15-Mark Questions

  1. Examine the technical and legal issues involved in E-Commerce and E-Contracts.
  2. Discuss the technical and legal aspects relating to Electronic Contracts and E-Commerce.

Unit-IV: Cyber Law and IPRs

Syllabus: Cyber Law and IPRs-Understanding Copyright in Information Technology – Software – Copyrights vs Patents debate – Authorship and Assignment Issues – Copyright in Internet – Multimedia and Copyright issues – Software Piracy – Patents – Understanding Patents – European Position on Computer related Patents – Legal position of U.S. on Computer related Patents – Indian Position on Computer related Patents – Trademarks – Trademarks in Internet – Domain name registration – Domain Name Disputes & WIPO -Databases in Information Technology – Protection of databases – Position in USA,EU and India

Part A: 6-Mark Questions

  1. Kinds of Operating System
  2. Website authors
  3. WI-FI
  4. Software Piracy

Part B: 15-Mark Questions

  1. What is called “Domain Name” and explain with the help of case laws the regulation of Domain Names in the Indian legal system?
  2. What are Domain name Dispute and Resolution and trademark Issue in Digital Medium?

Unit-V: Cyber Crimes

Syllabus: Cyber Crimes -Meaning of Cyber Crimes –Different Kinds of Cyber crimes – Cyber crimes under BNS, BNSS and BSA 2023- Cyber crimes under the Information Technology Act, 2000 – Cyber crimes under International Law – Hacking, Child Pornography, Cyber Stalking, Denial of service Attack, Virus Dissemination, Software Piracy, Internet Relay Chat (IRC) Crime, Credit Card Fraud, Net Extortion, Phishing etc – Cyber Terrorism – Violation of Privacy on Internet – Data Protection and Privacy.

Part A: 6-Mark Questions

  1. Phishing
  2. Encryption
  3. Hacking
  4. Cyber terrorism
  5. Identity theft
  6. Protection of sensitive personal data
  7. Hate speech in the internet
  8. Data Protection
  9. Stalking

Part B: 15-Mark Questions

  1. Differentiate between cyber crimes and conventional crimes.
  2. Enumerate and explain the various offences punishable under the Information Technology Act, 2000 with latest Amendments.
  3. Enumerate and explain the offences punishable under the Information Technology Act, 2000.

10 Mark IT Law IMP Questions

  1. ‘A’ studying 5th class in the Hyderabad city has involved in a cyber crime with a US based Company. Explain the law to deal the case.
  2. Ramu is buying and selling of goods and services on the internet, but once he felt deficiency of services? Explain the available remedies to “X”.
  3. ‘X’ is sending secret cyber order and cheating his friend ‘Y’? Explain the Law.
  4. Explain the case facts involved in Yahoo.inc Vs Akash Arora case.
  5. Unsolicited emails are a menace. They should have a provision to unsubscribe them or they may not be sent unless asked for. Many countries have enacted laws against unsolicited mail known as Anti Spam laws. Is the Information Technology Act takes care of such a problem? Discuss.
  6. ‘Dow Jones & Company Incorporated’ is the publisher of Wall Street Journal. It also publishes a magazine known as Barrons. This magazine is also put online on Servers maintained at New Jersey, USA. It carried an article ‘Unholy Gains’, which was alleged to be defamatory to Joseph Gutnick resident of Victoria, Australia. He filed a suit for damages in Victoria. Preliminary objection was raised as to the maintainability of the case in an Australian Court. Decide in the light of jurisdictional issues and law.
  7. A customer contacted with a car park machine representing the owner and he fed his money into it and received a claim ticket for the purpose of parking of his car. Is there a valid contract in this transaction? Explain how the essentials of a valid contract are present in this transaction.
  8. A bank employee inserts a program, into a bank’s server, that deducts a small amount of money, to say Rs. 2/- a month, from the account of every customer. No account holder probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month. Discuss how the Information Technology Act handles such financial crimes.
  9. Messages which are offensive to a particular religion, community, ethnic group or political party are posted in a blog or a social networking site. Such messages might have the effect of either inciting hatred in the minds of the people or communal clashes between two groups. Is it an offence under the Information Technology Act, 2000? Examine.
  10. A computer scientist accepts online payments and allows paying customers to view or download pornographic pictures and videos from his website. Is it an offence punishable under the Information Technology Act, 2000? Discuss the nature of offence and the punishment for it.
  11. In an Engineering college, private version of software is used in the computer lab. Is there any violation of the Information Technology Act and the copyright Act? Examine.
  12. The original home page of a website belonging to a Government Department is substituted with another page by a computer miscreant. Disturbing images and offensive phrases are displayed in the process. It affected the image of the Government Department. Are there adequate provisions under the Information Technology Act for counteracting this kind of problem? Examine.
  13. Mr. X fraudulently acquires the sensitive information such as Passwords and credit card details, and misrepresents himself and uses the parameters for his personal purpose. What is the offence committed by Mr. X?
  14. Two men from Mumbai posted offensive comments against some leaders on their Facebook group and took the defence of Right to expression. Discuss.
  15. Mr. A of Canada sends indecent E-mail to Mr. B of Chandigarh on his E-mail address. Under which provision of Information Technology Act, 2000 Mr. A will be liable?
  16. Mr. ‘A’ steals computer source code used for Mr. B’s computer. Is Mr. ‘A’ liable?
  • Notes- Unit-wise All 6th Sem Subjects
  • PYQs- Unit Wise All 6th Sem Subjects
  • Model Answers to 10 Mark Case Law Questions
  • Revision Material for last-minute revision