Mobile Law, 3rd Edn.
This book is the first of its kind in its specialized category and has explored various hitherto unexplored areas of jurisprudence around the use of mobiles, cell phones, samartphones, personal digital assistants and all other kinds of communication devices, which are used to communicate audio, video, image or text of any kind whatsoever.
This book covers a variety of issues around mobile legalities and includes detailed legal discussion inter alia on:
- Legality of the mobile format
- Service Providers Liability
- Mobile Contracts
- Mobile Authentication
- Mobile Banking
- Mobile Crimes
- Mobile Misuse
- Mobiles and Privacy
- Cyber Terrorism
- Mobiles and IPR
- Mobile Evidence
- Mobiles and Child Protection
- 2G Judgments and Much more
More about the book is available at: Click Here
Text Book Cyberlaw 2nd Edition
There is no running away from one broad principle that is emerging in today’s life- every person is getting connecting on to the digital bandwagon and hence the discipline of Cyberlaw is of increasing significance for all stakeholders. As such, knowing about the Cyberlaw is becoming increasing important necessity for all entities who are connecting on to the digital ecosystem.
No wonder given the increasing significance and importance of Cyberlaw as a subject, Cyberlaw is being made an integral part of college curriculum in various courses.
When I wrote the Text Book on Cyberlaw couple of years back, I had not envisaged the kind of response that such a Text Book could generate. Due to the fast pace changes happening in the Cyberlaw jurisprudence, I felt the need for revising the Text Book on Cyberlaw and keeping it updated. For More about the book Click Here
Data Protection Law In India
India is the second most populous nation and the largest democracy in the world. The manner in which India has adopted the electronic ecosystem and the Internet has suddenly made India a very fertile destination for companies wanting to do business. The increased adoption of mobile by Indians and the rapid adoption of social media in India has suddenly meant that Indians have become fast generators of data. The kind of volumes that of data that are being produced in India today on a daily basis, far surpasses the output of corporate India for numerous decades post independence.
As such, data protection is one issue that becomes extremely relevant and pertinent for all users, generators, transmitters and recipients of data. Unfortunately, at the time of writing, India does not have a dedicated legislation on data protection. However that does not mean that India has not taken appropriate steps for protecting data.
India has put in place various legal provisions, rules and regulations need in its various legislations, which primarily impacted data. Given the fact that the majority of data today in India is being retained in the electronic form, various rights, duties and obligations have been put on by the Indian cyber legal frameworks for various stakeholders in the data ecosystem. For More about the book Click Here
China as a nation is extremely significant at the world stage. The huge size of the population and the immense economic opportunities that abound in China, make it a nation whose policies are closely watched by the international community.
China has adopted strategies that are different from other countries and has shown to the world how it enforces its legislations to meet up with its desired objectives.
Recently, China has passed a new law on countering terrorism. The said law comes into effect from 1st of January 2016. The said legislation is extremely significant inasmuch as it extensively and elaborately covers all aspects pertaining to terrorists, terrorism activities and strategies aimed at combating terrorism, both in the physical world as also in cyberspace. The said law has come up with various rights, duties and obligations of various stakeholders and has elaborated a distinct code for the Chinese nation, as it goes about dealing with the challenges raised by terrorism.
This eBook examines the salient features of the new Anti-Terrorism legislation enacted by China, the significance of its various provisions, the importance, ambit and scope of coverage of the said legislation, the benefits and the potential drawbacks/grey areas of the legislation and other concerns raised by various stakeholders.
This eBook examines the legislation from an objective viewpoint and seeks to cover…, For More about the book Click Here
Law of Intermediaries book seeks to uncover the emerging jurisprudential and Legal position of intermediaries in India. This book Analyses , what according to the law, are intermediaries expected to do, what kind of protections they have under the law and what kind of compliance requirements are mandated for intermediaries in India This book informs its users about the latest existing position of the Indian Cyberlaw on the issue of intermediaries and their liability. This book also tells distinct ways in which intermediaries can potentially limit their exposure to potential legal consequences and limit their liability.
This book is an absolute must for any person or legal entity who is an intermediary. For More about the book Click Here
Darknet, Anonymity & Law
Over the last few years, we have begun to hear more frequent mention of the darknet in the mainstream media. Increasingly now we are finding that media is reporting about different aspects of the darknet. This is also coupled with the fact that a majority of stakeholders still do not want to believe in the existence of the darknet. This is notwithstanding the fact that darknet as a phenomenon and paradigm distinctly exists. Darknet is getting more and more center-stage attention with the passage of time.
At the same time, darknet is also increasingly being used by cybercriminals for the purposes of perpetuating cyber criminal activities and engaging in all kinds of criminal or illegal behaviour which is ultimately aimed to give effect to criminal intentions and purposes.
This eBook seeks to identify some of the practical legal, policy and regulatory challenges that anonymity on the darknet presents before lawmakers and legislators.
The darknet is a network of the future. However, the future has already begun. The legal frameworks, which are already shaped in the past, have to shake free out of the shackles of the past and come up with innovative new mechanisms, approaches and paradigms as also perspectives to deal with emerging new complex policy and legal challenges thrown up by legal issues like anonymity on the darknet.
This eBook should be of value to.. For More about the book Click Here
As Cyber Security Law Develops
Cyber security slowly is beginning to achieve centre stage attention. Various cyber security breaches in different parts of the world have convinced almost all stakeholders that there is a need for having in place legal frameworks to address the growing menace of cyber security breaches. It is in this regard that cyber security law as a jurisprudential subject is beginning to evolve. The said subject is coming up as a distinct discipline within the overall umbrella of Cyberlaw jurisprudence.
Given today’s ground realities where there is no one international agreement on cyber security, it is imperative to appreciate that different developments are taking place in different parts of the world which are all contributing in their own unique way to the further development and evolution of cyber security law jurisprudence. This eBook seeks to examine some of the important developments that are taking place in different parts of the world which are contributing to the evolution and growth of cyber security law jurisprudence. This eBook further seeks to encapsulate the collective cumulative learning from all these developments and has further sought to enunciate various principles which could form the basis for further development of cyber security law jurisprudence.
This eBook aims to examine some of the important legal, policy and regulatory challenges and issues pertaining to cyber security which need to.. (For more about the book Click Here)