Tutorial Question

LLB (Hons.), Part II, Tutorial Examination II, 2010 Cyber & Telecommunication Law Department of Law & Justice University of Rajshahi Time: 2.00 hours Marks: 50 Answer any of 25 questions. 1 Do you allow your employees to make personal use of the business's communication systems? 2 Should We Accept A Cyber Personality As A Real Person? 3 ‘No one can control the Internet’. Explain it with special reference to ICCAN. 4 Explain the pessimistic issues which are happened passing of the Cyber Law? 5 What is authentication and how does ICT Act 2006 authenticate the electronic records? 6 Can use of electronic records or digital signature be valid in Government and its agencies? 7 Who can issue a digital signature certificate to a subscriber? 8 Can a CA suspend the digital signature certificate issued by it? 9 When can a digital signature certificate be revoked? 10 Are there any restrictions on the number of players applying for a license to become a CA? 11 Can a digital signature certificate issued by foreign Certifying Authority be valid in Bangladesh? 12 What are the functions of Controller? 13 What are the civil offences stipulated by ICT Act 2006? 14 What are the criminal offences stipulated by ICT Act 2006? 15 What other provisions/Acts are not covered under the ICT Act,2006? 16 Are network service providers liable for offences committed by third party? 17 What Is Cyber Assault & how it will be protected by the ICT Act, 2006? 18 What are the Effects of Cyber-Terrorism? 19 What is the Relation between Cyber Theft and the Telegraph Act, 1885? 20 Why Is Copyright Ill-Equipped To Deal With The Internet? 21 Distinguish Between Conventional and Cyber Crime. 22 Explain the Mode And Manner Of Committing Cyber Crime. 23 Explain the Network Effects In Cyber Security. 24 How the Internet Censorship is applied under the Cyber Law? 25 Is the ICT Act, 2006 Comprehensive or Exhaustive? 26 What is the Relation between Physical World V Cyberspace? 27 What are Cryptographic, Symmetric and Asymmetric Keys? 28 Who and How can one apply to be a Certifying Authority (CA)? 29 How does ICT Act deal with Hacking? 30 What is meant by Online Contracts? 31 What is the evidentiary value of Online Contracts? 32 In case of any contravention of the provisions of ICT Act, who will adjudicate? 33 Does ICT Act suggest changes/modifications in other prevailing Acts? 34 Who will advise for formulation of Rules and Regulations under the Act? 35 Can Controller of Certifying Authorities direct any Law Enforcing Agency to intercept any information transmitted through any computer resources? 36 Is it true that under ICT Act, police officers have unrestricted powers? What steps are taken to alleviate the fear of misuse of power? 37 Can you actually see the signer's handwritten signature? 38 How am I identified as the signer? 39 If my private key is stored on my computer, can't someone sign the documents without my permission by getting access to the computer? 40 What is a Cryptographic Digital Key? 41 How are Digital Certificates issued? 42 What is encryption & decryption? 43 What is sender authentication? 44 What is non-repudiation of origin/data accountability? 45 Has rules for Certifying Authorities been made? What are the salient features of the Rules? 46 How the Computer is treated as Target of the Crime? 47 How the Computer is as An Instrument Facilitating Crime? 48 Have any pre-emption In a Digital World provisions existing in present cyber law? 49 What is the Scope & objectives of Cyber Law & Telecommunication Law? 50 In what way does it distinguish from other types of law? 51 What is cybercrime? How to prevent cyber crime? Share your views? 52 Can the law enforcement authorities find criminals online? 53 How can you create context for your children to understand what cyber crimes are? are?