Home | Help     
Prev<< See More Youniverse >>Next
July 2008
 
By The Numbers

The average number of students passing out of various Degree, Diploma and Professional courses in India every year is 4.2 Million.

Exams alert

Open Management Admission Test (OPENMAT) will be conducted by IGNOU on 17th August 2008 for admission to its Management programmes.

Thus Spake

Creativity is a type of learning process where the teacher and pupil are located in the same individual.

- Arthur Koestler

Did you know

 
 

The abbreviation Xmas for the word Christmas is of Greek origin. Since the word for Christ in the Greek language....

The Great Pyramids used to be as white as snow because they were encased in a bright limestone ....

The shortest war in history was between Zanzibar an England in 1896. Zanzibar surrendered ....

 
 

Interesting Facts

 
 

Only place a flag is not saluted : The only place in the universe where a flag flies....

Tomato world's most popular fruit : The tomato is the world's most popular fruit.....

Thanksgiving held twice in 1815 : Thanksgiving was a centuries-old tradition held by most cultures around the world....

 
 

 

Cyber Law  

Cyber Law is a term used to describe the legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet. It is less a distinct field of law in the way that property or contract are, as it is an intersection of many legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction. In essence, cyber law is an attempt to apply laws designed for the physical world to human activity on the Internet.

 
 
     
 
Smile Please..!   

Funding for Ten years

A lawyer's son wanted to follow in his father's footsteps, so he went to law school. He graduated with honors, and then went home to join his father's firm. At the end of his first day at work he rushed into his father's office, and said, "Father, father, in one day I broke the accident case that you've been working on for ten years!"
His father responded: "You idiot, we could live on the funding of that case for another ten years!"

----------------------------------------------


Where's my Rolex?

 

A lawyer opened the door of his BMW, when suddenly a car came along and hit the door, ripping it off completely. When the police arrived at the scene, the lawyer was complaining bitterly about the damage to his precious BMW.
"Officer, look what they've done to my Beeeemer!" he whined.
"You lawyers are so materialistic, you make me sick!" retorted the officer, "You're so worried about your stupid BMW, that you didn't even notice that your left arm was ripped off!"
"Oh my gaaad....", replied the lawyer, finally noticing the bloody left shoulder where his arm once was, "Where's my Rolex!!!!"

----------------------------------------------


The Oldest profession in the world

 

A physician, a civil engineer, and a consultant were arguing about what was the oldest profession in the world.
The physician remarked, "Well, in the Bible, it says that God created Eve from a rib taken out of Adam. This clearly required surgery, and so I can rightly claim that mine is the oldest profession in the world."
The civil engineer interrupted, and said, "But even earlier in the book of Genesis, it states that God created the order of the heavens and the earth from out of the chaos. This was the first and certainly the most spectacular application of civil engineering. Therefore, fair doctor, you are wrong: mine is the oldest profession in the world."
The consultant leaned back in her chair, smiled, and then said confidently, "Ah, but who do you think created the chaos?"

 
 
 
From The Editors Desk
 

Heartiest Greetings!

In this issue of Youniverse, we have presented an Article on "Cyber Law". With technology making its foray into all walks of daily life, it is getting essential for any netizen to understand the legal implications of various technical tools and activities which we perform.

More >>

Complex Simplicities  

Web 2.0

Web 2.0 is a term describing the trend in the use of World Wide Web technology and web design that aims to enhance creativity, information sharing, and, most notably, collaboration among users. Web 2.0 is the business revolution in the computer industry caused by the move to the Internet as platform, and an attempt to understand the rules for success on that new platform. Web 2.0 is an enhancement of the existing Internet and it is a system in which online users become participants rather than mere viewers.

The idea of "Web 2.0" can also relate to a transition of some websites from isolated information silos to interlinked computing platforms that function like locally-available software in the perception of the user.

SOA

Service Oriented Architecture (SOA) is a software architecture where functionality is grouped around business processes and packaged as interoperable services. SOA also describes IT infrastructure which allows different applications to exchange data with one another as they participate in business processes. The aim is a loose coupling of services with operating systems, programming languages and other technologies which underly applications. SOA separates functions into distinct units, or services, which are made accessible over a network in order that they can be combined and reused in the production of business applications. These services communicate with each other by passing data from one service to another, or by coordinating an activity between two or more services. SOA concepts are often seen as built upon and evolving from older concepts of distributed computing and modular programming.

SOAs build applications out of software services. Services are intrinsically unassociated units of functionality, which have no calls to each other embedded in them.

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
top 
 
 
Did you know
 
The abbreviation Xmas for the word Christmas is of Greek origin. Since the word for Christ in the Greek language is Xristos, which starts with the letter "X," they started putting the X in place of Christ and came up with the short form for the word Christmas,
The Great Pyramids used to be as white as snow because they were encased in a bright limestone that has worn off over the years.  
The shortest war in history was between Zanzibar an England in 1896. Zanzibar surrendered after 38 minutes.  
In 1873, Colgate made a toothpaste that was available in a jar.  
The largest employer in the world is the Indian railway system in India, employing over 1.6 million people.  
The word "comet" comes from the Greek word "kometes" meaning long hair and referring to the tail.  
Mars is the home of Olympus Mons, the largest known volcano in our solar system.  
The typical lead pencil can draw a line that is thirty five miles long.  
The deepest mine in the world is the East Rand mine, which goes to a depth of about 3,585 metres.  
Japan has approximately 200 volcanoes and is home to 10% of the active volcanoes in the world.  
 
     
 
Interesting Facts
 
 
Only place a flag is not saluted : The only place in the universe where a flag flies all day, never goes up or comes down, never flies half-mast and does not get saluted, is the moon.
It is, of course, the American flag, the only country to have landed people on the moon. Since Apollo 11 landed on moon on 20th July 1969 untill 1972, 12 American astronauts walked on the moon, spending 170 hours roaming over 100 km (over 60 miles). They brought home 400 kilograms (880 pounds) of soil and rock, and 30,000 photographs.
 
Tomato world's most popular fruit : The tomato is the world's most popular fruit. And yes, just like the brinjal and the pumpkin, botanically speaking it is a fruit, not a vegetable. More than 60 million tons of tomatoes are produced per year, 16 million tons more than the second most popular fruit, the banana. Apples are the third most popular (36 million tons), then oranges (34 million tons) and watermelons (22 million tons).
Tomatoes were first cultivated in 700 AD by Aztecs and Incas. Explorers returning from Mexico introduced the tomato into Europe, where it was first mentioned in 1556. The French called it "the apple of love", the Germans "the apple of paradise".
 
 
Thanksgiving held twice in 1815 : Thanksgiving was a centuries-old tradition held by most cultures around the world. After the autumn harvest, communities held 3-day-long feasts, sharing meat, bread and beer. Today, Thanksgiving is known best as an US public holiday.
The first US Thanksgiving was held between 21 September and 11 November 1621 in Massachusetts by 50 Plymouth Pilgrims and their 90 Wampanoag neighbours. After that, Thanksgiving was held fairly randomly. Thanksgiving days were proclaimed annually by the US Congress from 1777 to 1783 which, except for 1782, were all celebrated in December. George Washington declared Thanksgiving in 1789 and 1795, and John Adams in 1798 and 1799. James Madison declared Thanksgiving twice in 1815. None of these were celebrated in the autumn.
 
 
You Forget 90% of your Dreams : Within 5 minutes of waking, half of your dream are forgotten. Within 10, 90% is gone. The famous poet, Samuel Taylor Coleridge, woke one morning having had a fantastic dream (likely opium induced) - he put pen to paper and began to describe his “vision in a dream” in what has become one of English’s most famous poems: Kubla Khan. Part way through (54 lines in fact) he was interrupted by a “Person from Porlock“. Coleridge returned to his poem but could not remember the rest of his dream. The poem was never completed.
 
 
Paralyzed while you sleep : Believe it or not, your body is virtually paralyzed during your sleep - most likely to prevent your body from acting out aspects of your dreams. "Glands begin to secrete a hormone that helps induce sleep and neurons send signals to the spinal cord which cause the body to relax and later become essentially paralyzed".
 
 
 
 
Cyber Law
 

Cyber Law is a term used to describe the legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet. It is less a distinct field of law in the way that property or contract are, as it is an intersection of many legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction. In essence, cyber law is an attempt to apply laws designed for the physical world to human activity on the Internet.

Cyber Law in India

India became independent on 15th August, 1947. In the 49th year of Indian independence, Internet was commercially introduced in our country. The beginnings of Internet were extremely small and the growth of subscribers painfully slow. However as Internet has grown in our country, the need has been felt to enact the relevant Cyberlaws which are necessary to regulate Internet in India. This need for cyberlaws was propelled by numerous factors.

Firstly, India has an extremely detailed and well-defined legal system in place. Numerous laws have been enacted and implemented and the foremost amongst them is The Constitution of India. We have interalia, amongst others, the Indian Penal Code, the Indian Evidence Act 1872, the Banker's Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934, the Companies Act, and so on. However the arrival of Internet signalled the beginning of the rise of new and complex legal issues. It may be pertinent to mention that all the existing laws in place in India were enacted way back keeping in mind the relevant political, social, economic, and cultural scenario of that relevant time. Nobody then could really visualize about the Internet. Despite the brilliant acumen of our master draftsmen, the requirements of cyberspace could hardly ever be anticipated. As such, the coming of the Internet led to the emergence of numerous ticklish legal issues and problems which necessitated the enactment of Cyberlaws.

Secondly, the existing laws of India, even with the most benevolent and liberal interpretation, could not be interpreted in the light of the emerging cyberspace, to include all aspects relating to different activities in cyberspace. In fact, the practical experience and the wisdom of judgment found that it shall not be without major perils and pitfalls, if the existing laws were to be interpreted in the scenario of emerging cyberspace, without enacting new cyberlaws. As such, the need for enactment of relevant cyberlaws.

Thirdly, none of the existing laws gave any legal validity or sanction to the activities in Cyberspace. For example, the communications via instant messengers, blogs and message boards etc require legal sanctity. Courts and judiciary in our country have been reluctant to grant judicial recognition to the legality of such communication in the absence of any specific law having been enacted by the Parliament. As such the need has arisen for Cyberlaw.

Fourthly, Internet requires an enabling and supportive legal infrastructure in tune with the times. This legal infrastructure can only be given by the enactment of the relevant Cyberlaws as the traditional laws have failed to grant the same. E-commerce, the biggest future of Internet, can only be possible if necessary legal infrastructure compliments the same to enable its vibrant growth.

All these and other varied considerations created the conducive atmosphere for the need for enacting relevant cyberlaws in India. The Government of India responded by coming up with the draft of the first Cyberlaw of India - The Information Technology Bill, 1999. Keeping in line with other countries, India also has passed its first cyber law, The Information Technology Act 2000, which aims to provide the legal backbone for enabling e-commerce in the Country.

Jurisdiction and sovereignty

Issues of jurisdiction and sovereignty have quickly come to the fore in the era of the Internet. The Internet does not tend to make geographical and jurisdictional boundaries clear, but Internet users remain in physical jurisdictions and are subject to laws independent of their presence on the Internet.

As such, a single transaction may involve the laws of at least three jurisdictions:

The laws of the state/nation in which the user resides
The laws of the state/nation that apply where the server hosting the transaction is located, and
The laws of the state/nation which apply to the person or business with whom the transaction takes place. So a user in one of the United States conducting a transaction with another user in Britain through a server in Canada could theoretically be subject to the laws of all three countries as they relate to the transaction at hand

Jurisdiction is an aspect of state sovereignty and it refers to judicial, legislative and administrative competence. Although jurisdiction is an aspect of sovereignty, it is not coextensive with it. The laws of a nation may have extra-territorial impact extending the jurisdiction beyond the sovereign and territorial limits of that nation. This is particularly problematic as the medium of the Internet does not explicitly recognize sovereignty and territorial limitations. There is no uniform, international jurisdictional law of universal application, and such questions are generally a matter of conflict of laws, particularly private international law. An example would be where the contents of a web site are legal in one country and illegal in another. In the absence of a uniform jurisdictional code, legal practitioners are generally left with a conflict of law issue.

Another major problem of cyber law lies in whether to treat the Internet as if it were physical space (and thus subject to a given jurisdiction's laws) or to act as if the Internet is a world unto itself (and therefore free of such restraints). Those who favor the latter view often feel that government should leave the Internet community to self-regulate.

Architecture: Everything from internet filtering software (which searches for keywords or specific URLs and blocks them before they can even appear on the computer requesting them), to encryption programs, to the very basic architecture of TCP/IP protocol, falls within this category of regulation. It is arguable that all other modes of regulation either rely on, or are significantly supported by Cyber Law.

Norms: As in all other modes of social interaction, conduct is regulated by social norms and conventions in significant ways. While certain activities or kinds of conduct online may not be specifically prohibited by the code architecture of the internet, or expressly prohibited by applicable law, nevertheless these activities or conduct will be invisibly regulated by the inherent standards of the community, in this case the internet “users.” And just as certain patterns of conduct will cause an individual to be ostracized from our real world society, so too certain actions will be censored or self-regulated by the norms of whatever community one chooses to associate with on the internet.

Markets: Closely allied with regulation by virtue of social norms, markets also regulate certain patterns of conduct on the internet. While economic markets will have limited influence over non-commercial portions of the internet, the internet also creates a virtual marketplace for information, and such information affects everything from the comparative valuation of services to the traditional valuation of stocks. In addition, the increase in popularity of the internet as a means for transacting all forms of commercial activity, and as a forum for advertisement, has brought the laws of supply and demand in cyberspace.

Internet regulation in other countries

While there is some United States law that does restrict access to materials on the internet, it does not truly filter the internet. Many Asian and Middle Eastern nations use any number of combinations of code-based regulation to block material that their governments have deemed inappropriate for their citizens to view. China and Saudi Arabia are two excellent examples of nations that have achieved high degrees of success in regulating their citizen’s access to the internet.

Pros and Cons of Cyber Laws

The IT Act 2000 in India attempts to change outdated laws and provides ways to deal with cyber crimes. We need such laws so that people can perform purchase transactions over the Net through credit cards without fear of misuse. The Act offers the much-needed legal framework so that information is not denied legal effect, validity or enforceability, solely on the ground that it is in the form of electronic records.

In view of the growth in transactions and communications carried out through electronic records, the Act seeks to empower government departments to accept filing, creating and retention of official documents in the digital format. The Act has also proposed a legal framework for the authentication and origin of electronic records / communications through digital signature.

From the perspective of e-commerce in India, the IT Act 2000 and its provisions contain many positive aspects. Firstly, the implications of these provisions for the e-businesses would be that email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law
Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act
Digital signatures have been given legal validity and sanction in the Act
The Act throws open the doors for the entry of corporate companies in the business of being Certifying Authorities for issuing Digital Signatures Certificates
The Act now allows Government to issue notification on the web thus heralding e-governance
The Act enables the companies to file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in electronic form by means of such electronic form as may be prescribed by the appropriate Government
The IT Act also addresses the important issues of security, which are so critical to the success of electronic transactions. The Act has given a legal definition to the concept of secure digital signatures that would be required to have been passed through a system of a security procedure, as stipulated by the Government at a later date
Under the IT Act, 2000, it shall now be possible for corporates to have a statutory remedy in case if anyone breaks into their computer systems or network and causes damages or copies data. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs.1 crore
The IT Act is silent on filming anyone’s personal actions in public and then distributing it electronically. It holds ISPs (Internet Service Providers) responsible for third party data and information, unless contravention is committed without their knowledge or unless the ISP has undertaken due diligence to prevent the contravention.

Conclusions

Cyber law is a generic term, which denotes all aspects, issues and the legal consequences on the Internet, the World Wide Web and cyber space. India is the 12th nation in the world that has cyber legislation apart from countries like the US, Singapore, France, Malaysia and Japan.

The computer-related crime is a real, (at least in respect of certain offences) expanding phenomenon. Furthermore, a steady increase in number of such crimes in this area is expected which demands for greater attention of lawmakers. The law of the Internet has already emerged, and we believe can continue to emerge with individual users voting to join the particular systems they find most congenial.

But can the cyber laws of the country be regarded as sufficient and secure enough to provide a strong platform to the country’s e-commerce industry for which they were meant. If India doesn’t want to loose its position and wishes to stay as the world’s leader forever in outsourcing market, it needs to take fast but intelligent steps to cover the glaring loopholes of the Act.

 
 
 
Web 2.0
Web 2.0 is a term describing the trend in the use of World Wide Web technology and web design that aims to enhance creativity, information sharing, and, most notably, collaboration among users. Web 2.0 is the business revolution in the computer industry caused by the move to the Internet as platform, and an attempt to understand the rules for success on that new platform. Web 2.0 is an enhancement of the existing Internet and it is a system in which online users become participants rather than mere viewers.
The idea of "Web 2.0" can also relate to a transition of some websites from isolated information silos to interlinked computing platforms that function like locally-available software in the perception of the user. Web 2.0 also includes a social element where users generate and distribute content, often with freedom to share and re-use. This can result in a rise in the economic value of the web to businesses, as users can perform more activities online.
Web 2.0 websites allow users to do more than just retrieve information. They can build on the interactive facilities of "Web 1.0" to provide "Network as platform" computing, allowing users to run software-applications entirely through a browser. Users can own the data on a Web 2.0 site and exercise control over that data. These sites may have an "Architecture of participation" that encourages users to add value to the application as they use it. Web 2.0 sites often feature a rich, user-friendly interface based on Ajax, Flex or similar rich media. The sites may also have social-networking aspects.
 
 
 
SOA

Service Oriented Architecture (SOA) is a software architecture where functionality is grouped around business processes and packaged as interoperable services. SOA also describes IT infrastructure which allows different applications to exchange data with one another as they participate in business processes. The aim is a loose coupling of services with operating systems, programming languages and other technologies which underly applications. SOA separates functions into distinct units, or services, which are made accessible over a network in order that they can be combined and reused in the production of business applications. These services communicate with each other by passing data from one service to another, or by coordinating an activity between two or more services. SOA concepts are often seen as built upon and evolving from older concepts of distributed computing and modular programming.

SOAs build applications out of software services. Services are intrinsically unassociated units of functionality, which have no calls to each other embedded in them. They typically implement functionalities most humans would recognize as a service, such as filling out an online application for an account, viewing an online bank statement, or placing an online booking or airline ticket order. Instead of services embedding calls to each other in their source code, protocols are defined which describe how one or more services can talk to each other. This architecture then relies on a business process expert to link and sequence services, in a process known as orchestration, to meet a new or existing business system requirement.

SOA is an architecture that relies on service-orientation as its fundamental design principle. In an SOA environment, independent services can be accessed without knowledge of their underlying platform implementation. SOA relies on services exposing their functionality via interfaces which other applications and services read to understand how the service can be utilized.
 
 
 
From The Editors Desk
 
Kayalvizhi
Email - kayal@mindlogicx.com
 
Heartiest Greetings!

In this issue of Youniverse, we have presented an Article on "Cyber Law". With technology making its foray into all walks of daily life, it is getting essential for any netizen to understand the legal implications of various technical tools and activities which we perform. The article on Cyber Law makes an attempt to provide a brief insight into this field.

Our regular section on Examinations informs you of the exams alert in the coming months. Section on Complex simplicities provides you an introducion to Web 2.0 & SOA.

We hope that you would find the information presented in this issue of Youniverse interesting and useful.


We welcome your thought, views, comments and suggestions in response to the information provided in this issue of Youniverse.

 
Editor
 
 
Feedback
 
Please provide us with your feedback on how you feel about the Youniverse newsletter.You can also send us your queries on the VEDAS services.
top
Email to info@vedaslive.com
 
 
 
     Terms of use       Sitemap    Contact us
©Mindlogicx Infratec Limited.