No. of Printed Pages : 3

MIR-014

POST GRADUATE CERTIFICATE IN

■.0

CYBER LAWS (PGCCL)

O

Term-End Examination December, 2011

MIR-014 : PRIVACY AND DATA PROTECTION Time : 3 hours Note :

Maximum Marks : 100

(i) Attempt all questions from Part A. Each question carries 2 marks. (ii) Attempt any five questions from Part B. Each question carries 10 marks. (iii) Attempt any two questions from Part C. Each question carries 15 marks. -

-

-

PART A 1. Explain the following in brief. (a) Right to privacy and Article 21. (b) Specify four privacy related wrongs. (c) Cyber stalking. (d) Hoax (e) System inference. (f) Tort of intrusion (g) Information warefare. (h) E-commerce. -

(i)

Openness principle.

(j)

E-Governance

MIR-014



1

P.T.O.

PART - B 2. Answer any five questions confirming it to 300 words. (a)

What are the guiding principles for protection of privacy in European Union ?

(b)

Discuss US Judicial approach on online crimes.

(c)

Write a note on e-bay case in US.

(d)

What are Audit Trials and why is it important to have Audit Trails ?

(e)

What is the present status of 'Data Protection' laws in India ?

(f)

Explain the US safe Harbor framework.

(g)

Discuss self - disciplinary measures to check online crimes.

(h)

Explain the concept of information warefare and its counter measures.

MIR-014

2

PART - C 3. Answer any two of the following questions in not more than 450 words each. (a)

Explain the provisions under Information Technology Act, 2000 (IT Act, 2000) that are affecting the concept of privacy in the information world.

(b)

Explain the eight principles set out in the OECD guidelines on the protection on privacy.

(c)

Discuss Judicial Trend in India relating to Individual privacy.

MIR-014

3

Privacy and Data.pdf

... guiding principles for. protection of privacy in European Union ? (b) Discuss US Judicial approach on online. crimes. (c) Write a note on e-bay case in US. (d) What are Audit Trials and why is it. important to have Audit Trails ? (e) What is the present status of 'Data. Protection' laws in India ? (f) Explain the US safe Harbor ...

65KB Sizes 1 Downloads 181 Views

Recommend Documents

Cheap privacy filter 14 inch Laptop Privacy Screens Anti Privacy ...
Cheap privacy filter 14 inch Laptop Privacy Screens A ... Monitor 31.0df17.4cm Privacy Anti-Spy Screen 16-9.pdf. Cheap privacy filter 14 inch Laptop Privacy ...

Privacy, Contingency and Personal Identity
http://www.secureidnews.com/weblog/2005/04/15/thailand-introduces-national-id-with- biometric-technology/, retrieved May 9, 2007. See more references in ...

Cybersecurity and Privacy Compliance The Delicate ...
Cybersecurity and Privacy Compliance The Delicate Balance_hb_final.pdf. Cybersecurity and Privacy Compliance The Delicate Balance_hb_final.pdf. Open.

2017 Access and Privacy Conference.pdf
Retrying... Whoops! There was a problem previewing this document. Retrying... Download ... 2017 Access and Privacy Conference.pdf. 2017 Access and Privacy ...

408.14 Workplace Privacy and Searches.pdf
408.14 Workplace Privacy and Searches.pdf. 408.14 Workplace Privacy and Searches.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying 408.14 ...

Portuguese Privacy and Cookie Policy.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Portuguese ...

PDF Download Healthcare Information Privacy and Security ...
PDF Download Healthcare Information Privacy ... that include: * Identity and access management systems * Proper application design * Physical and.

Workplace Surveillance, Privacy and
no doubt that the extensive use of information technology in all organisational ... degree to which they engage in systematic monitoring. Since surveillance often ...

PRIVACY POLICY.pdf
Page 1 of 1. PRIVACY POLICY.pdf. PRIVACY POLICY.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying PRIVACY POLICY.pdf. Page 1 of 1.

Privacy Policy.pdf
[email protected]. Telephone number: (877) 8-CAESAR. Effective as of January 01, 2017. Page 3 of 3. Privacy Policy.pdf. Privacy Policy.pdf. Open.

Vanity or Privacy? Social Media as a Facilitator of Privacy and Trust
each study, each participant received the title, snippet and url for each of several articles (seven, eight, nine and five in the four studies, respectively). The articles.

User Privacy o User Privacy on Social Networking ...
As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports about privacy breaches on social networking sites. A significant amount of work for privacy protection on OSN(Online S

Privacy Cookie.pdf
I cookie sono dei file di testo che i siti visitati inviano al browser dell'utente e che. vengono memorizzati per poi essere ritrasmessi al sito alla visita successiva. 2.

Privacy Act Statement - USAREC
AUTHORITY: Collection of this information is authorized by 10 USC, sections 503 and 3013. PRINCIPAL PURPOSE: Information collected will be used to ...

Privacy Final
Sep 20, 2002 - personal information made possible by information technology. ..... Rachels, base their defense of privacy on grounds unrelated to autonomy, ...

PRIVACY POLICY.pdf
PRIVACY POLICY.pdf. PRIVACY POLICY.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying PRIVACY POLICY.pdf. Page 1 of 1.

Privacy Policy
Apr 17, 2017 - Your privacy matters to Google, so whether you are new to Google or a long- ... identifiers, and mobile network information including phone number). ... telephony log information, such as your phone number, calling-party number, ... Pa

Privacy-enhanced display device
Jan 15, 2009 - 5,463,428 A 10/1995 Ligtg? et al'. Darrell L. Lelgh ... 5,963,371 A 10/1999 Needham et al. .... This is a particular problem for laptop computers.

Privacy Policy.pdf
CalOPPA is the first state law in the nation to require commercial websites and online services. to post a privacy policy. The law's reach stretches well beyond ...