Lesson
Module No |
Topic |
Synopsis |
Module 1 |
Basic
Concepts of Technology and Law |
|
Lesson
1 |
Understanding the Technology of Internet |
Origin
of Internet, How the Internet functions, Understanding TCP/IP, HTTP,Web
hosting etc |
Lesson
2 |
Scope of
Cyber Laws |
Nature
of Cyber Space, Cyber Property, Cyber Personality, Cyber Transactions, |
Lesson
3 |
Cyber
Jurisprudence |
Concepts
of Historical, Analytical and Ethical Jurisprudence, Relationship
between Meta Society Laws and Cyber Laws, How Cyber Laws need to be
developed |
Module 2 |
Law
of Digital Contracts |
|
Lesson
4 |
The
Essence of Digital Contracts |
Defining
a Digital Contract, Formation of Digital Contracts, Special issues
relating to Cyber contracts |
Lesson
5 |
The
System of Digital Signatures |
Technology of Digital Signatures, Hash, Asymmetric Cryptography,
|
Lesson
6 |
The Role
and Function of Certifying Authorities |
Licensing of CAs, Roles and Responsibilities of CCA and CA |
Lesson
7 |
The
Science of Cryptography |
The
basis of PKI System |
Module 3 |
Intellectual Property Issues in Cyber Space |
|
Lesson
8 |
Domain
Names and Related issues |
Understanding the system of domain names, Different Perspectives, Cyber
Squatting, UDRP |
Lesson
9 |
Copyright in the Digital Media |
Nature
of Copyright, Fairuse and Infringment, Copyright issues in Digital
Media, Hyperlinking, Caching, Framing etc. |
Lesson
10 |
Patents
in the Cyber World |
Nature
of Patent Rights, Procedure of Obtaining Patents, Difference between
Copyright and Patents, Patenting of Business Methods. |
Module 4 |
Rights of Netizens and E-Governance |
|
Lesson
11 |
Privacy
and Freedom Issues in the Cyber World |
Nature
of Privacy Rights, Cyber Stalking, Use of Cookies, Privacy Invasion by
Government, Employer, Freedom of Speech Vs Privacy Rights, Spam etc |
Lesson
12 |
E-Governance |
E-Government and E-governance, Legal Issues in E-Governance |
Lesson
13 |
Cyber
Crimes and Cyber Laws |
Types of
Cyber Crimes and Legal Provisions regarding Cyber Crimes. |
Module 5 |
Information Technology Act 2000 |
|
Lesson
14 |
Information Technology Act-2000-1 (Sec 1 to 13) |
Section
by Section analysis -Introduction,
Definition and Scope |
Lesson
15 |
Information Technology Act-2000-2 (Sec 14 to 42 and Certifying authority
Rules) |
Section
by Section analysis-Secured Communication
and Digital Signatures |
Lesson
16 |
Information Technology Act-2000-3 (Sec 43 to 45 and Sec 65 to 78) |
Section
by Section analysis-Cyber Crimes |
Lesson
17 |
Information Technology Act-2000-4(Sec 46 to Sec 64 and CRAT Rules) |
Section
by Section analysis-CRAT |
Lesson
18 |
Information Technology Act-2000-5 (Sec 79 to 90) |
Section
by Section analysis-Miscellaneous
Provisions |
Lesson
19 (a) |
Information Technology Act-2000-6 ( Sec 91-94) |
Section
by Section analysis-Amendments to other
Acts |
Chapter 19 (b) |
Proposed Amendments to ITA-2000 and Case Studies |
Analysis of the proposed amendments and a few Case
studies |
Module 6 |
International Scenario in Cyber Laws |
|
Lesson
20 |
Data
Protection Laws in EU and
USA |
OECD
Principles of Data Protection, EU Data Protection Laws, Electronic
Communications Privacy Act, USA, HIPAA,GLBA etc |
Lesson
21 |
Child
Abuse Protection Laws in EU and USA |
Children
Online Privacy Protection Act, Communication Decency Act etc, EU Cyber
Crime Treaty on Child Abuse, Pakistani E-crimes Act, etc |
Lesson
22 |
Cyber
Laws - the Malaysian Approach |
Computer
Crimes Act, Computer Crimes Act,
Amendment to the Copyright Act Communications and Multimedia Act
Digital Signature Act |
Module 7 |
Cyber
Law Issues for Management |
|
Lesson
23 |
Cyber
Law Issues in E-Business Management |
Cyber
Law Risks in E-Business, |
Lesson
24 |
Major
issues in Cyber Evidence Management |
Nature
and Type of Cyber Evidence, Collection , Preservation and Presentation
of Cyber Evidence |
Lesson
25 |
Cyber
Law Compliancy Audit |
The
Concept of CyLawCom, The CyLawCom Audit process |
Module 8 |
Case
Studies |
Major
National and International Cases |
|
Group
Discussions and Tests |
|