PPLE ASSGN 4 - 1828292 - Ankit Kumar
PPLE ASSGN 4 - 1828292 - Ankit Kumar
PPLE ASSGN 4 - 1828292 - Ankit Kumar
PPLE
NAME – ANKIT KUMAR
CSSE 4
Roll – 1828292
Q1) Enlist some salient features the amendment bill IT Act 2008?
Ans) The Act was subsequently and substantially amended in 2006 and again in 2008 citing the
harmonization with the provisions of the Information Technology Act. Further, protection
A rapid increase in the use of computer and internet has given rise to new forms of
crimes like publishing sexually explicit materials in electronic form, video voyeurism and
through communication services. So, penal provisions are required to be included in the
Information Technology Act, the Indian Penal Code, the Indian Evidence Act and the
The United Nations Commission on International Trade Law (UNCITRAL) in the year
2001 adopted the Model Law on Electronic Signatures. The General Assembly of the
United Nations by its resolution No. 56/80, dated 12th December, 2001, recommended
that all States accord favorable consideration to the said Model Law on Electronic
Signatures. Since the digital signatures are linked to a specific technology under the
provide for alternate technology of electronic signatures for bringing harmonization with
The service providers may be authorized by the Central Government or the State
Government to set up, maintain and upgrade the computerized facilities and also collect,
retain appropriate service charges for providing such services at such scale as may be
Q2) Define the term cyber space and enlist the security concerns in cyber space?
Ans) Cyberspace refers to the virtual computer world, and more specifically, an electronic
medium that is used to facilitate online communication. Cyberspace typically involves a large
computer network made up of many worldwide computer subnetworks that employ TCP/IP
One way to talk about cyberspace is related to the use of the global Internet for diverse
spaces, we see the cyberspace existing. Wherever the Internet is used, you could say, that
creates a cyberspace. The prolific use of both desktop computers and smartphones to access
the Internet means that, in a practical (yet somewhat theoretical) sense, the cyberspace is
growing.
Another prime example of cyberspace is the online gaming platforms advertised as massive
online player ecosystems. These large communities, playing all together, create their own
cyberspace worlds that exist only in the digital realm, and not in the physical world, sometimes
Q3) Define the term data and security issues concerned with it?
Ans) Data security is the process of protecting corporate data and preventing data loss through
unauthorized access. This includes protecting your data from attacks that can encrypt or destroy
data, such as ransomware, as well as attacks that can modify or corrupt your data.
The Ponemon Institute’s Cost of Data Breach Study found that on average, the damage caused
by a data breach in the USA was $8 million. 25,575 user accounts were impacted in the
average data incident, which means that beyond financial losses, most incidents lead to loss of
Lawsuits, settlements, and fines related to data breaches are also on the rise, with many
governments introducing more stringent regulations around data privacy. Consumers have
much more extensive rights, especially in the EU, California, and Australia, with the introduction
HIPAA for healthcare organizations in the USA, and PCI/DSS for organizations processing
on the rise. These are threats that are difficult to defend against and can cause catastrophic
Q4) List the steps corporates and individuals have to take to ensure data security?
One of the most crucial steps towards efficient data protection is knowing exactly what data is
being stored and where. By accurately identifying their data flow and its vulnerable points,
companies can make informed decisions concerning the measures they need to take to protect
it.Large organizations use data discovery tools to scan company networks for sensitive data
and, when finding it on computers not authorized to access it, they frequently have the option of
deleting or encrypting it. In the age of data protection regulations, transparency is key both for
From encrypted hard drives, USBs, and phones to data encrypted prior to its transfer to the
cloud or onto portable devices, encryption has become an essential step to protect company
data and secure sensitive information.Encryption tackles two common data protection
vulnerabilities in today’s global economy: a workforce always on the move and the rise of
remote work. With devices frequently leaving the safety of company networks, encryption
ensures that, in case of theft or loss, the sensitive data they contain is inaccessible to outsiders.
The cloud has become an integral part of digitalization efforts, but as data migrates to the cloud,
the issue of its security has sparked heated debates among CIOs and in information security
circles. While many argue that the security measures applied by cloud service providers to their
servers far exceed any a modest or even large company is likely to apply to its on-site servers,
the feeling that their most sensitive data’s security is out of their hands makes many
organizations nervous.
The most common policies applied by big companies involve the use of tools specialized in data
protection in the cloud or a limitation of the types of data that are stored in the cloud. Another
The human factor is often the biggest vulnerability in the chain of data protection. Whether
through ignorance or negligence, employees account for 54% of data breaches according to a
survey conducted by the Ponemon Institute. Large corporations ensure employees are kept
informed of compliance regulations and internal cybersecurity policies, providing them with both
training and clear guidelines for those coming into contact with the most sensitive types of data.
C-level executives are frequently targeted by malicious outsiders due to their high-level access
to data. Big companies take special care that higher management do not circumvent the rules
as it is essential that the same level of data security is maintained across the board, not only
Software such as Data Loss Prevention solutions can act as an effective method of
enforcement, by setting clear policies that protect and restrict access to sensitive data. Levels of
access to data can be controlled based on groups and specific users or endpoints.
reduce costs, they often ignore their security implications. Accessing sensitive information on
personal devices means that data is traveling outside the confines of the company network,
Big organizations restrict the sort of data that can be transferred outside company devices. At
the same time, policies marking the level of trust of a device can be applied. In this way,
employees are given the option of aligning the security of their personal devices to policies used
within the company and, if they choose not to apply them, it guarantees that no sensitive data is
As we move forward into the age of data protection by design and by default, smaller and mid-
sized companies must follow in the footsteps of larger companies and adopt security methods to
protect data from both inside and outside threats or risk losing not only their customers’ trust but
Q5) State the provisions in the IT act for authentication of electronic records?
Ans) Section 3 of the Information technology Act, 2000 provides certain provisions for the
Subject to the provisions of this section, any subscriber can affix his digital signature and
An asymmetric crypto system and hash function envelop and transform the initial
electronic record into another record which affects the authentication of the record.
Also, any person in possession of the public key can verify the electronic record.
Further, every subscriber has a private key and a public key which are unique to him and
artistic works; designs; and symbols, names and images used in commerce.
verify a document.
Microsoft and Adobe pdf. On the other hand, an electronic signature is of four types –
qualified signature.
A digital signature is regulated by the certification authority. Some national acts and
provider authority. Electronic signatures are authorised by the specific vendors, document
The main intention of using a digital signature is to secure the document. The main
A digital signature is comprised of more security features which makes it more secure.
signature itself. Details of the signatory are not held in an electronic signature but can be
held separately to the signature. A timestamp is a mechanism that allows the approval of
the integrity of a series of data. That means it demonstrates that this data existed in a
specific moment, and has not been altered since then. The timestamp guarantees the
Q8) List out the subject matter for patent protection and what inventions cannot be protected?
Ans) There is a lot that can be patented. So, here are some examples of what cannot be
patented.
2. an aesthetic creation,
3. a scheme, rule or method for performing a mental act, playing a game or doing business,
or a computer program,
4. a presentation of information,
or animals.
Patent Cooperation Treaty which allows all the signatories of the convention to claim
priority rights.
Under the Act of 2000, Locarno classification has been adopted in which the
classification is based only on the subject matter of design. Under the previous
provisions, the classification was made on the basis of the material which has been used
The introduction of “Absolute Novelty” makes it possible to judge a novelty on the basis
As per the new law, a design can be restored which was absent in the previous enactment.
The Act allows the district courts to transfer cases to the high courts where the
Laws regarding the delegation of powers of the controllers to other controllers and the
The quantum of punishment is also enhanced under the Act in case of any infringement.
Provisions regarding the avoidance of certain restrictive conditions are also there so as to
Whenever a license is brought within the domain of public records and that too publicly,
the registration is likely to be taken into consideration. Anyone can get a certified copy of
Under new provisions, power has been given to district court to transfer cases to the high
court where the court is having jurisdiction. This is only possible if the person is
Under the new provision, the quantum of punishment is also enhanced in case of
infringement.
The registration is taken into consideration when it is brought within the domain of public
records that too physically. Anyone can inspect the records and get a certified copy of it.
It contains provisions for substitution of the application before registering the design.
Ans) Similar to patents, utility models protect new technical inventions through granting a
limited exclusive right to prevent others from commercially exploiting the protected inventions
without consents of the right holders. In order to obtain protection, an application must be filed,
and a utility model must be granted. They are sometimes referred to as “short-term patents”,
“utility innovations” or “innovation patents”. It is not easy to define a utility model, as it varies
from one country to another. In general, utility models are considered particularly suited for
protecting inventions that make small improvements to, and adaptations of, existing products
or that have a short commercial life. Utility model systems are often used by local inventors.
THANK YOU