• General

    Program on Cyber Law
    Key Highlights
    • Name: Cyber Law
    • Credits: 3
    • Faculty: Dr.B.Muthukumaran
    • Mode: Online/ Classroom
    • Level: Beginner / Intermediate
    • Medium: English
    • Resources: Case Studies and Assignments

    • Course Outline

      The global reach of the Internet, the low marginal cost of online activity, and the relative anonymity of users have contributed to a wide escalation in cyber crime.  It is essential to have a solid foundation of cyber technology principles in order to comprehend how technology is reducing or affecting the power of traditional regulatory tools. Students will clarify issues of jurisdiction and sovereignty of the internet and be introduced to the basic principles of digital intellectual property, online privacy, and the basic elements of software copyright.

      The program on cyber law is designed to address the changing needs to knowledge society in the era of Information Communication Technologies and virtual cyberspace, where one can reach the masses much quickly as opposed to earlier technologies thereby breaking the jurisdictional boundaries and creating series of challenges for the legal system due to its unique quality of openness, economic efficiency and anonymity of members of the virtual community.

      The program is offered as a part of professional diploma in cyber investigation and law. This course will make you familiar with the meaning of Cyber Crime and the legislation in India dealing with offences relating with the abuse of computers and other electronic gadgets.

      This course is a part of Professional Diploma in cyber investigation and law affiliated to Hindustan University. Please more information refer here. This is also offered as a stand alone course for highly focused aspirants.

      Mode of delivery:

      The course is offered as a full time course course as a part of University offering. It is also offered as online program.The course is offered in English.

      Code of conduct

      Ethical behavior is an important part of this course. Since some of the methods, cases, codes and tools that will be discussed in the course can be very harmful, if abused, it is expected that students will behave in a responsible manner. In particular, always ask your local site administrator for permission before experimenting with security-related tools. In-class discussions of techniques for exploiting potential security threats and risks do not imply to use them! You will be sole responsible for any such violation.