IT RULES 2011

The information technology rules 2021 were notified on February 25, 202. The guidelines were related to intermediaries and digital media ethics code. The rules have been notified under sections 69A(2), 79(2) and 87 the information technology act, 2000. The 2021 rules replace the information technology (intermediates guidelines) rules, 2011. The term social media intermediaries demonstrates…

Cyber Stalking

The definition of cyber stalking or cyber bullying is very simple it says that using the Internet or other electronic means to harass and intimidate certain victims. Common features include (but are not limited to) the classic “tracking” behavior tracking someone’s location and monitoring their online and real-world activities. As we all know, cyber stalkers…

PSYCHOLOGY : THE STUDY OF HUMAN MIND

Psychology is the scientific study of behaviour, experience and mental processes. Behaviour includes all of our outward or overt actions and reactions, such as talking, facial expressions and movement. Mental processes refer to all the internal, covert actions of our minds, such as thinking, feeling and remembering. To study behaviour and mental processes in both…

IT rules 2021

The foundation to the new Information Technology, 2021 rules is found to be grounded in the Information and Technology Act, 2000. These rules are a subordinate legislation of India’s Intermediary Guidelines rules, 2011. These rules are formed and supported with the help of Central government of India, Ministry of electronics and Information technology (MietY) and…

Data Protection Bill, 2019

The Data Protection Bill 2019 has been presented to Parliament. The bill has been submitted to the Joint Parliamentary Committee for detailed review, and a report is expected to be presented before the 2020 budget meeting. The purpose of this bill is to protect people’s personal data and to create a framework for the processing…

Data Privacy In India

In today’s world as everything is going to connected through internet every time when data is provided to a service provider or a firm then there is great danger of misuse of that data. Changing generations involves changing trends which leads to changing ideas and technology. Gone are the days where people were not used…

Cyber terrorism

Cyber terrorism is the use of the Internet to carry out violent acts that cause or threaten to cause loss of life or major bodily harm in order to obtain political or ideological benefits through threats or intimidation. When terrorist activities include deliberate and large-scale destruction of computer networks, especially through computer viruses, computer worms,…

Cyber security

Cyber security is the practice of protecting critical systems and sensitive information from digital attacks. Also known as information technology (IT) security, cybersecurity measures are designed to combat threats against networked systems and applications, whether those threats originate from inside or outside of an organization. The cost of data breach include the expenses of discovering…