Page 1 of 16 COURSE MODULE Information and Communication Technology Law COURSE CODE: SEMESTER – IX COURSE: B.A., LLB (Hons.) / B.Com., LL.B (Hons.) JULY 2015 TO DECEMBER 2015 Course Coordinator: Mr.Sanjay Pandey Mr. Niteesh Kumar Upadhyay SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 Page 2 of 16 INDEX 1. 2. Syllabus Teaching and Examination Scheme 3. Micro Teaching Plan 4. 5. 6. Lesson Plan Textbook & References Unit wise list of Cases / Articles / Web References 7. 8. Assessment Rubrics Structured Tutorial Planning 9. 10. 11. 12. 13. Pre-defined Sessional Exam Syllabus Recommended Learning Resources _ ERM Course Website Blog Class Decorum SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 Page 3 of 16 B.A.LL.B. (Hons.) Programme, Semester – IX Academic Year 2014-15 Honours Course (Crime and Criminology) Course: ICT Law (Information and Communication Technology Law) INTRODUCTION The aim and object of ICT Law is to depart special knowledge about the information and communication technology law to enhance their capacity in the field of ICT Law, of the student of ‘crime and criminology’ group in their last year of the B.A.LL.B. (Hons.) Programme. The subject tries to give them deep and wider knowledge related to information technology law governing at the international and domestic level. It also exposes them about the claims and procedure for the civil wrong, with authorities to decide the dispute concerning computer and information technology law along with the cyber crimes and appropriate punishment thereof with investigation knowledge. The course will discuss in detail about the types of cyber crimes, cyber investigation, e-commerce, e-governance etc. The syllabus of the course may be discussed under the following heads. COURSE LEARNING OUTCOMES • Students will be able to understand the importance of Information Technology Laws in the present context. • Students will be able to analyse and critically evaluate various lacuna and challenges in the implementation of IT law in India. Students will be prepared to apply the IT laws in the given situation in day to day life. OBJECTIVE OF COURSE To deal with the most contemporary issues related with Information Technology; To exposes the students about the claims and procedure for the civil wrong and cybercrimes and appropriate punishment thereof with investigation knowledge. Pedagogy: Pedagogy for this course would involve interactive sessions on given topics involving examples from industry and case studies wherever applicable. As part of continuous evaluation, the students will be given assignments and quizzes. The sessions would be a combination of chalk & talk and Multimedia presentations. SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 Page 4 of 16 Teaching and examination scheme:- Syllabus:- SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 Page 5 of 16 SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 Page 6 of 16 SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 Page 7 of 16 SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 Page 8 of 16 Micro Teaching Plan Mode of Teaching / Learning Weightage Allocated Units Unit VI Experiential Learning 10% to 20% of the Syllabus Self-Study 20% of the Syllabus Unit IV and VIII (partially) Unit V (partially) Expert Lecture / Cooperative Teaching / Video Sessions 10% of the Syllabus Core Teaching 60% of the Syllabus I , II, III ,VII, IX ,X SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 Page 9 of 16 Session Plan (Lecture & Tutorial as Per Teaching Examination Scheme) Sessio n No. 1 2 4 5 6 8 9 10 11 12 14 15 Information Technology and International Law, Introduction of Information Technology Act, 2000 General classification of Computer and Information Technology Crimes Magnitude of Computer and Information Technology Crimes in India Class learning outcome Teaching method Lecture and discussion Reading material ERM I Lecture and discussion Lecture and discussion Lecture and discussion ERM 1 1,2 IT Act , 2000 ERM 1 2 Lecture and discussion NCRB Report 2012 ERM 4 1,2 1,2 1,2 1,2 Digital Signature and Electronic Signature Lecture and discussion Provisions relating to Electronic Signatures Advantages (Benefits) and disadvantages of digital signature Legal recognition of electronic records Recent development and guidelines pertaining to Digital Signatures Damage to Computers and Computer System (Computer Torts) Failure to protect data, Failure to furnish information, return, etc. Contravenes of any rules or regulations, Adjudication in case of contravention, Cyber Appellate Tribunal Appeal to Cyber Regulations Appellate Tribunal Appeal to High court, Compounding of Contravention, Recovery of Penalty or Compensation Lecture and discussion Lecture and discussion Lecture and discussion Lecture and discussion Lecture and discussion Lecture and discussion Lecture and discussion ERM 4 1,2 Class Handout Class Handout Class Handout Class Handout Class Handout IT Act 1,2 Lecture and discussion Lecture and discussion IT Act 1,2 Class Handout 1,2 Week 3 13 Meaning of Computer and Information Technology Week 2 7 Topic Week 1 3 Week 1,2 1,2 1,2 1,2 1,2 SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 Page 10 of 16 16 17 19 20 21 22 24 25 27 Week 6 26 Week 5 23 Week 4 18 Sections 43, 43A, 48-51, 52D, 55, 59, 60, 61, 64, and other relevent provisions of the Information aned Technology Act, 2000 after 2008 Amendment with appropriate Rules Tampering with computer source document, Computer related offences (Hacking with computer system, etc.), Sending offensive messages through communication service, etc. Cyber thefts and frauds, Violation of personal piracy, Cyber terrorism Offence relating publishing or transmitting obscene material or material containing sexually explicit act, etc. Breach of confidentiality and privacy, Fail to assist Government in the interest of sovereignty, integrity, etc. Blocking for public access of any information through any computer resource, Secure access to a protected system, Other offences under the Act Cyber Crime Investigation, Cognizance of IT offences, Search and seizure of the computer or computer system Examiner of Electronic Evidence, Provisions relating to admissibility of electronic records as evidence, Digital Signature and evidence, Presumptions relating to electronic records Application of the Act to electronic cheque and truncated cheque, Cyber forensics, Admissibility of evidence collected through the interception of communication Video-conferencing evidence is admissible, Cyber crime investigating agencies in India e-commerce meaning, Classification Advantages (Benefits) Disadvantages of e-commerce Indian economy and Information technology sector Electronic Governance (egovernance) Lecture and discussion IT, Act 1,2 Lecture and discussion ERM 1 1,2 Lecture and discussion Lecture and discussion ERM 1 1,2 ERM 1 1,2 Lecture and discussion ERM 1 1,2 Lecture and discussion Class Handout 2 Lecture and discussion Class handout 1,2 Lecture and discussion Class handout 1,2 Lecture and discussion Class handout 1,2 Lecture and discussion ERM 4,7 1,2 Lecture and discussion Lecture and discussion Class handout ERM 7 1,2 1,2 SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 Page 11 of 16 28 29 30 31 33 34 35 36 37 39 40 41 42 44 45 1,2 Lecture and discussion ERM 5 1,2 Lecture and discussion ERM 5 1,2 New challenges to information technology law Convergence of technologies, Convergence Bill Lecture and discussion Lecture and discussion ERM 7 1,2 Class Handout 1,2 Lecture and discussion Lecture and discussion Class Handouts 1,2 Lecture and discussion Lecture and discussion Lecture and discussion Lecture and discussion Lecture and discussion Lecture and discussion Lecture and discussion Lecture and discussion Lecture and discussion Lecture and discussion ERM I 1,2 Class Handout ERM 7 1,2 Offences not covered under IT Act Data protection (Data protection act 1984, 1998 of UK; EU guidelines 1995) Cyber-squatting - domain name, IP issues and Online dispute resolution Protection of Multimedia works in cyber space IPR and Cyber world Remedial Classes Remedial Classes Remedial Classes Remedial Classes Remedial Classes Remedial Classes Week 9 43 Class Handout ERM 7 Week 8 38 Lecture and discussion Lecture and discussion Week 7 32 Electronic Governance (egovernance) Validity of contracts formed through electronic means, Attribution of Electronic Records, Directorate of Information Technology Definition of e-banking, Electronic Payment System, Mobile Banking, IBanking Legal Issues in E- banking, Amendments to Negotiable Instruments Act, 1881, International Legal Practice regarding E- banking 1,2 1,2 1,2 1,2 1,2 ERM II 1,2 1,2 1,2 1,2 1,2 SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 Page 12 of 16 Case law referred: • Director General of Doordarshan v. Anand Patwardhan, JT 2006 (8) SC 255; • Ajay Goswami v. Union of India, (2006) INSC 947 • Chandrakant Kalyandas Kakodkar v. State of Maharashtra, (1962) 2 SCC 687 • Director General of Doordarshan v. Anand Patwardhan, JT 2006 (8) SC 255; • Samaresh Bose v. Amal Mitra, (1985) 4 SCC 289 • Alfred E Butler v. State of Michigan, 1 Led 2d 412 • Chandrakant Kalyandas Kakodkar v. State of Maharashtra, 1969 (2) SCC 687 • United States v. Playboy Entertainment Group, Inc, 146 L ed 2d 865 • Sharda v. Dharmpal, (2003) 5 ILD 62 (SC) • M.P. Sharma v. Satish Chandra, AIR 1954 SC 300 • Kharak Singh v. State of UP, (1963) • State of Maharashtra v. Madhukar Narain Mandikar, AIR 1991 SC 207 • Jane Roe v. Henry Wade, 410 US 113 • R. Rajagopal v. State of Tamil Nadu, (1994) 6 SCC 632 • Mr. X v. Hospital Z, (1998) 8 SCC = AIR 1998 SCW 3662 = AIR 1999 SC 495 • PUCL v. Union of India, AIR 1997 SC 568 • U.S. v. An Unnamed Juvenile, (WD Wash) February 11, 2005, www.corpmen.com • U.S. v. Borghard, (SD NY) June 16, 2004 • U.S. v. Dinh, (D. Mass.) May 5, 2004 • U.S. v. Salcedo, et. al. (WD NC) (December 15, 2004) www.corpmen.com • State of Punjab v. M/S. Amritsar Beverages Ltd., (2006) INSC 476 • Liverpool & London S.P. & I Association Ltd. v. M.V. Sea Success I and Another, (2004) 9 SCC 512 • Union of India v. Naveen Jindal and Another, (2004) 2 SCC 510 • John Vallamattom and Another v. Union of India, (2003) 6 SCC 1 • Kapila Hingorani v. State of Bihar, (2003) 6 SCC 1 • SIL, Import, USA v. Exim Aides Silk Exporters, Bangalore, (1999) 4 SCC 567 • State of Maharashtra v. Dr. Praful B. Desai, (2003) 4 SCC 601 • Commissioner of Customs, Chennai v. M/S Pentamedia Graphics Ltd., (2006) INSC 292 • State of Maharashtra v. Dr. Praful B. Desai, (2003) 4 SCC 601 • Sri Krishna Gobe v. State of Maharashtra, (1973) 4 SCC 23 Note : Due to paucity of time chapterwise bifurcation of the cases is not done. The above list is tentative cases for all the chapters furthermore wherever needed the cases will be added. SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 Page 13 of 16 C.E Details Sl. No. C.E - I C.E –II C.E- III Date 18 August , 2015 28, August 2015 Components of TA Moodle Based Test 20, September 2015 Project Work Submission Class Test Description of Marks 40 Marks Result Declaration date: 4 Problems x 10 Marks = 40 Marks Criteria for evaluation 2 Marks- Brief facts 2 marks – Identification of all the issues at hand 2 Marks- brief of applicable laws & cases (if any) 2 Marks- application of applicable laws/ cases in the given problem 2 Marks – Conclusive opinion 30 Marks Mid Semester Course = 1-3 Units Block Semester Course = 1-5 Units ESSENTIAL READING MATERIAL – ERM DETAILS 1 Textbook: Karnika Seth, Computers Internet New Technology Laws LexisNexis Edition 2013. 2 A to Z of Cyber Crime book by Asian School of Cyber Laws 3 Kamath Nandan, Law Relating to Computers Internet and E-commerce, Universal Publication 2015. 4 Rachana C. R, The Role of Digital Signatures in Digital Information Management, International Monthly Refereed Journal of Research In Management & Technology ISSN – 2320-0073 Volume II, March’13, Page 103-109 5 N. Leena, Cyber Crime Effecting E-commerce Technology, Oriental Journal of Computer Science & Technology Vol. 4(1), 209-212 (2011) Page 1-4 6 C Niranjan Rao, The Role of Intellectual Property Rights in Information and Communication Technologies Page 2-22. 7 Sairam Bhat, Law of Business Contracts in India, Sage publication 2009 (selected part only ) 8 Saurabh Sharma , Information Security and Cyber Laws, Vikas Publication, New Delhi 2014 page 22-42. SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 Page 14 of 16 REFERENCE READING MATERIAL 1. Case Studies on Cyber Crime, published by Indian Audit and Accounts Department Government of India, page 6-47. 2. CDMS , Difference between Digital and Electronic Signature Page 1-2 3. Nishith Desai Associates, E-Commerce in India, Copyright 2013 Page 5-41 4. Information Technology and Green Governance in India: Some Legal Perspective, International Journal of Applied Research and Studies ISSN: 2278-9480 Volume 2, Issue 5 (May - 2013) Page 1-8 5. Krishna Pal Malik, Computer and Information Technology Law, Allahabad Law Agency, 1st Ed. 2010. 6. Law For E-Commerce, Rogger LeRoy Miller, Gay Lord A. Jentz, Publisher: Thomson Learning:2002 7. Reed, Chris and Angel, John. Computer Law, New York: Oxford University Press, 2003. Rubrics of continuous evaluation CLO-1: Students will be able to understand the importance of Information Technology Laws in the present context. Course Learning Assessm Assessm outcome ent ent Techniq Descript ue ion Students will be Moodle Written Test able to after completi understand the on of importance of certain Information units Technology Laws in the present context. Below 50% Meets 51- 60% Meets 61- Above 70% 69 % PLO PEO Poor understa nding and Slow learner No clarity on the given topic Students Advance have the learners thorough knowledg e of the chapters and can accurately select the correct answers. 1 and 1 & 1 & 2 5 2 CLO-2: Students will be able to analyse and critically evaluate various lacuna and challenges in the implementation of IT law in India. SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 GA Page 15 of 16 Course Learning Assessm Assessm outcome ent ent Techniq Descript ue ion Students will Written MSE be able to after analyse and completi on of critically certain evaluate units Below 50% Meets 51- 60% Meets 61- Above 70% 69 % Poor understa nding and Slow learner No clarity on the given topic and fail to concept ualize the topic. Student’s gives brief descriptio n of topic relates it with law and case study. various lacuna and challenges in the implementation of IT law in India. PLO PEO GA Students 1, 2, 1, 4 1 & gives brief , 3 & 5 2 description and 4 on the topic, explain various laws to that area with case study and also relate with current aspect, global scenario. CLO-3: Students will be prepared to apply the IT laws in the given situation in day to day life Course Learning Assessm Assessm outcome ent ent Techniq Descript ue ion Project Students will be prepared to Work on Submiss apply the IT domain ion name, laws in the metagiven situation tagging , in day to day linking disputes life in cyber world Below 50% Meets 51- 60% Meets 61- Above 70% 69 % PLO PEO Poor understa nding and Slow learner No clarity on the given topic and fail to understa nd the basics of domain name , metatagging and linking dispute Student’s gives brief descriptio n of topic relate it with law and case study 1, 2, , 3 ,4 6 and 7 1, 1, 2 2,3, An 5 and d 3 6 Students gives brief description on the topic, explain various laws to that area with case study and also relate with current aspect, global scenario. WEBSITES http://indiancaselaws.wordpress.com/category/technology/ http://galido.net/blog/ http://gradestack.com/NUJS-Diploma-Course-in-Entrepreneur/Information-Technology- SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015 GA Page 16 of 16 and-Law/14945-2975-2783-study-wtw Course Website: https://sites.google.com/a/nirmauni.ac.in/information-communicationand-technology/ Blog: Niteshupadhyay2015.wordpress.com As part of 24X7 learning environment, the blog is intended to take the learners beyond class environment and hence gives them an opportunity to learn in an interactive manner. The Blog covers a wide array of topics within and outside the subject area in order to bring a global perspective to the class discussion. Students may post their comments, views and voice of descent on relevant issues. CLASS DECORUM – 1. 2. 3. 4. Thou shalt be prepared for class. Thou shalt be on time. Thou shalt not be afraid to ask questions. Thou shalt not be afraid to voice your opinion, even when it is believed to be contrary to the professor's. 5. Thou shalt tolerate the professor's offbeat sense of humor. 6. Thou shalt respect thy classmates. 7. Thou shalt understand that there is method in the madness. 8. Thou shalt not be afraid to seek out the professor's office. 9. Thou shalt regularly attend class. 10. Thou shalt take a deep breath and prepare for a long, hard semester. 11. Timely submission of assignments, projects and reports is a must. 12. Academic honesty is expected. 13.There is zero tolerance for any kind of indiscipline. NOTE: ALL TERM ASSIGNMENT COMPONENTS ARE AT PAR WITH THE RULES APPLICABLE TO MSE & SEE REGULATIONS. ABSENCE WITHOUT PRIOR PERMISSION WOULD INVITE ASSIGNING ZERO MARKS. IN NO CIRCUMSTANCES RE-EXAMINATION WOULD BE ENTERTAINED. SEMESTER - IX /Information and Communication Technology Law / JULY 2015 TO DEC 2015