Assignemnt 2nd Year LLB(Hons) 2013

Cyber Law Assignemnt 2nd Year LLB Students

  • Writing Assignment on Cyber Law 
  • Step 1 – Read
  • Step 2 – Bullet point the main idea(s)
  • Step 3 – Reread
  • Step 4 – Paraphrase
  • Step 5 – Check
Writing Assignment on Cyber Law 
Written assignments are an important part of university education. They give you a chance to exercise your skills at assessing evidence, developing and evaluating arguments, and expressing your views. Nowadays Universities around the globe place more and more emphasis on the written assignments. The reason for that is because essays, courseworks and dissertations enable students to understand the subject matter and be able to apply theory onto practice. It is vital to carefully read the given assignment and any explanatory notes provided. Also, be alert for any comments that the Professor (Dr. Zulfiquar Ahmed) may make about the assignment. Try to work out why a particular assessment task has been set. Can you figure out how it relates to the goals of the subject, as set out in the Cyber Law guideline? Another useful strategy is to determine what the assignment is designed to evaluate. Some assessment tasks are planned to develop your problem-solving skills; others are devised to judge how well you can relate theory to practice; others to ascertain whether you have read deeply and critically on a topic. After having read the given assignment and the Cyber Law guideline, if you are still not quite clear about what is expected of you in the assignment, ask your Professor (Dr. Zulfiquar Ahmed or communicate over cell phone 01712534626/ 01673610159 or through web site: www.quialancer.com http://www.quialancer.com Department of Law & Justice or email: zulfiquarcyberlaw@gmail.com or facebook: Facebook quiatimet@gmail.com Discussion with other students can also be helpful.
Guideline to prepare the Assignment Sometimes you will wish to write about what a particular given assignment has mentioned. You do not always need to repeat what they have said word-for-word and can summarize it and just discuss the main points that are most relevant to your assignment. Step 1 – Read The first step involves carefully reading your given assignment. Identify the part of the source that is relevant and read this section (when paraphrasing do not try and read too much in one go or you will forget some of the material – you can always read it stage by stage). As you are reading, try to focus upon the key point(s) that the author is trying to convey rather than focusing upon what is discussed in single sentences. You might find that you need to read a source more than once in order to understand the content. If there is terminology that you do not understanding – look this up in a dictionary. Once you have read the source you should put it to one side. It will be easier to paraphrase if you do not have the original in front of you. Step 2 – Bullet point the main idea(s) From memory and using your own words, list the key points that you identified during your reading. At this stage, do not aim to write a full paragraph –just a short summary of each key point. Step 3 – Reread Go back to the original and reread the section. Try to identify if there are any points that you have missed out. Likewise, check that what you have already summarised is accurate. Repeat steps 2 and 3 until you are satisfied that you have identified the main points that are relevant to your assignment. Step 4 – Paraphrase Using the list of key points that you have created, summarise the source. Do not simply repeat your list of key points – present the ideas you have summarised together in a logical sequence. For example, 1) introduce the area that the author addressed; 2) outline what the author said/found; and 3) discuss relevance to your topic. Step 5 – Check Compare your summary with the original. It should be apparent that what you have written is in your own words and accurate. Your writing should not look the same as the original with only a few words changed. For Getting Your Assignment you have to Click on the following addresses: http:// www.cyberlawbangladesh.wordpress.com or http://cyberlaw-phd.blogspot.com/ or http://www.quialancer.com Your Assignment is given the following link, at first you click on your Roll Number & get the allocated articles, then rewrite it in your own language and submit to the following e-mail address: or email: zulfiquarcyberlaw@gmail.com Rewrite Following Articles:
Roll No.TitleDate of Submission
9001CYBER LEGISLATION: A MODEL LAW FOR THE SOUTH PACIFIC 03 FEBRUARY, 2013
9002CYBER LAW: THE SOUTH PACIFIC LEGISLATION 03 FEBRUARY, 2013
9003The FCC's New Network Semi-Neutrality Order Maintains Inconsistency in the Broadband World03 FEBRUARY, 2013
9004US v. Warshak: Will Fourth Amendment Protection be Delivered to Your Inbox?03 FEBRUARY, 2013
9005Personal Jurisdiction, Internet Commerce, and Privacy: The Pervasive Legal Consequences of Modern Geolocation Technologies03 FEBRUARY, 2013
9006Unknown Futures and the Known Past: What Can Patent Learn from Copyright in the New Technological Age?03 FEBRUARY, 2013
9007International Responses Cyber Crime03 FEBRUARY, 2013
9008The Espionage Act and Today's "High-Tech Terrorist03 FEBRUARY, 2013
9009 The So-Called Right to Privacy 03 FEBRUARY, 2013
9010Doc Ock - Should Knock Off the Knocking-Up: Using Dr. Michael Kamrava’s Treatment of Nadya Suleman as a Model for Tort Regulation in the Fertility Industry03 FEBRUARY, 2013
9011The Clash of Titanic Paradigms—The American Criminal Justice System Versus Modern Computer Technology: The Greatest Unresolveable Conflict Between a Square Peg and Round Hole?03 FEBRUARY, 2013
9012New York State Information Security Breach and Notification Act: State Breach Notification Requirements03 FEBRUARY, 2013
9013Using Fair Use to Stop a Copyright Troll from Threatening Hyperlinkers03 FEBRUARY, 2013
9014A Review of the ‘As Such’ Exclusions to Patentable Subject Matter in the United Kingdom: Lessons for Canadian and American Courts03 FEBRUARY, 2013
9015Cyber Law, Morals & Ethics03 FEBRUARY, 2013
9016Are E-Discovery Costs Recoverable By A Prevailing Party?03 FEBRUARY, 2013
9017Don’t Be Evil: The Fourth Amendment in the Age of Google, National Security, and Digital Papers and Effects03 FEBRUARY, 2013
9018Fighting_Cybercrime_-_Technical,Juridical_and_Ethical_Challenges03 FEBRUARY, 2013
9019Wrotten But Not Dead: High Court of New York Signals Legislature to Review Televised Testimony at Criminal Trial03 FEBRUARY, 2013
902oITU Publication on Understanding Cybercrime: A Guide for Developing Countries03 FEBRUARY, 2013
9021The Italian Google-Case Privacy, Freedom of Speech and Responsibility of Providers for User-Generated Contents03 FEBRUARY, 2013
9022Why the Google Book Search Settlement Should Be Approved: A Response to Antitrust Concerns and Suggestions for Regulation03 FEBRUARY, 2013
9023Copyright in Second Life03 FEBRUARY, 2013
9024Destroying a Pharmaceutical Patent for Saving Lives?: A Case Study of Sanofi-Synthelabo v. Apotex, Inc.03 FEBRUARY, 2013
9025 Cybersquatting: Pits and Stops 03 FEBRUARY, 2013
9026FREE IS HARD TO BEAT: A CLOSER LOOK AT THE DIGITAL MUSIC DOWNLOAD DILEMMA03 FEBRUARY, 2013
9027 Democratic Global Internet Regulation? Governance Networks, International Law and the Shadow of Hegemony 03 FEBRUARY, 2013
9028PROGRESS IN THE AIRCRAFT INDUSTRY AND THE ROLE OF PATENT POOLS AND CROSS-LICENSING AGREEMENTS03 FEBRUARY, 2013
9029Bit-Wise But Privacy Foolish: Smarter E-Messaging Technologies Call for a Return to Core Privacy Principles03 FEBRUARY, 2013
9030 Patterns of Legalization in the Internet 03 FEBRUARY, 2013
9031An Empirical Study of the Effect of KSR v. Teleflex on the Federal Circuit’s Patent Validity Jurisprudence03 FEBRUARY, 2013
9032Public Access to Science: The New Policy of the National Institute of Health in Light of Copyright Protections in National and International Law03 FEBRUARY, 2013
9033LEGAL ISSUES STEMMING FROM THE ADVANCEMENT OF PHARMACOGENOMICS03 FEBRUARY, 2013
9034Targeting Enantiomer Product Hopping with a New Obviousness Standard03 FEBRUARY, 2013
9035Internalizing Identity Theft03 FEBRUARY, 2013
9036Historical Perspectives on Reasonable Royalty Patent Damages and Current Congressional Efforts for Reform03 FEBRUARY, 2013
9037Metered-Usage Billing and the Broadband Internet Fairness Act03 FEBRUARY, 2013
9038 Internet Regulation and the Role of International Law 03 FEBRUARY, 2013
9039Oocyte Donor Compensation for Embryonic Stem Cell Research: An Analysis of New York's "Payment for Eggs Program" 03 FEBRUARY, 2013
9040Self-Governing Online Communities in Web 2.0: Privacy, Anonymity and Accountability in Wikipedia03 FEBRUARY, 2013
9042Balancing Anonymity, Popularity, & Micro-Celebrity: The Crossroads of Social Networking & Privacy03 FEBRUARY, 2013
9043New York State Model for Regulatory Oversight of ART and Genetic Testing03 FEBRUARY, 2013
9044Differential Payments to Egg Donors03 FEBRUARY, 2013
9045How (Not) to Regulate ARTs: Lessons from Octomom03 FEBRUARY, 2013
9046The Practice of ART Law from a Practitioner's Perspective: How Law and Science Intersect in the Real World03 FEBRUARY, 2013
9047The Espionage Act and Today's "High-Tech Terrorist”03 FEBRUARY, 2013
9048Using Fair Use to Stop a Copyright Troll from Threatening Hyperlinkers03 FEBRUARY, 2013
9049Climbing in Our Windows & Snatching Our Likenesses Up: Viral Videos & The Scope of the Right of Publicity on the Internet03 FEBRUARY, 2013
9050The Straight Talk Express: Yes We Can Have a False Political Advertising Statute03 FEBRUARY, 2013
9051ITU No Free Lunch (or Wi-Fi): Michigan’s Unconstitutional Computer Crime Statute03 FEBRUARY, 2013
9052“Apps.Gov”: Assessing Privacy in the Cloud Computing Era03 FEBRUARY, 2013
9053ONLINE COURT: Online Dispute Resolution and the Future of Small Claims03 FEBRUARY, 2013
9054Against Search Engine Volition03 FEBRUARY, 2013
9055The Unmanned Voyage: An Examination of Nanorobotic Liability03 FEBRUARY, 2013
9056The Limits of Licensing: Quanta v. LGE and the New Doctrine of Simultaneous Exhaustion03 FEBRUARY, 2013
9057Commercialspeech.com: ACPA and the First Amendment03 FEBRUARY, 2013
9058Beyond Efficiency: The Transformation of Courts through Technology03 FEBRUARY, 2013
9059An Overview and the Evolution of The Anti-Counterfeiting Trade Agreement03 FEBRUARY, 2013
9060The Puzzles of Infertility: A Patient Advocate's View03 FEBRUARY, 2013
9061What Do I Own, If Not Myself?03 FEBRUARY, 2013
9062Reformation of the UK Judiciary and Its Effect on Patent Litigation03 FEBRUARY, 2013
9063Transactions of Virtual Items in Virtual Worlds03 FEBRUARY, 2013
9064Health Care Reform: Will It Succeed?03 FEBRUARY, 2013
9065Asserting Foreign Patent Claims in U.S. Federal Courts: Whats Left After Voda v. Cordis?03 FEBRUARY, 2013
9066Cyber-Surfing On The High Seas Of Legalese: Law And Technology Of Internet Agreements03 FEBRUARY, 2013
9067Turning a Blind Eye to Misleading Scientific Testimony: Failure of Procedural Safeguards in a Capital Case03 FEBRUARY, 2013
9068The Battlefield of Cyberspace: The Inevitable New Military Branch — The Cyber Force03 FEBRUARY, 2013
9069Working the Bugs Out of Biologics: A Look at the Access to Life-Saving Medicines Act and Follow-On Biologics03 FEBRUARY, 2013
9070Balancing Accessibility and Sustainability: How to Achieve the Duel Objectives of the Hatch-Waxman Act Act While Resolving Antitrust Issues in Pharmaceutical Patent Settlement Cases03 FEBRUARY, 2013
9071A Likelihood of Infringement: The Purchase and Sale of Trademarks as AdWords03 FEBRUARY, 2013
9072Sex, Lies, and MySpace03 FEBRUARY, 2013
9073Invasion Contracts: The Privacy Implications of Terms of Use Agreements in the Online Social Media Setting03 FEBRUARY, 2013
9074Placing a Glove on the Invisible Hand: How Intellectual Property Intellectual Property Rights May Impede Innovation in Energy Research and Development (R & D)03 FEBRUARY, 2013
9075When Circuit Breakers Trip: Restetting the CFAA to Combat Rogue Employee Access03 FEBRUARY, 2013
9076Tax Strategy Patents: Why the Tax Community Should Not Exclude the Patent System03 FEBRUARY, 2013
9077YouTubing Down the Stream of Commerce: Eliminating the Express Aiming Requirement for Personal Jurisdiction in User-Generated Internet Content Cases03 FEBRUARY, 2013
9078Current Voting Systems03 FEBRUARY, 2013
9079Implementing the Help America Vote Act of 2002 in New York State03 FEBRUARY, 2013
9080Rambus, N-Data, and the FTC: Creating Efficient Incentives in Patent Holders and Optimizing Consumer Welfare in Standards-Setting Organizations03 FEBRUARY, 2013
9081Cloud Computing: Privacy Storm on the Horizon?03 FEBRUARY, 2013
9082The Help America Vote Act of 2002 and the Evolution of Voting03 FEBRUARY, 2013
9083Safeguarding the Vote in New York: HAVA and Relevant State Legislation03 FEBRUARY, 2013
9084The Irony of Electronic Voting Machines03 FEBRUARY, 2013
9085Paper Trials, Cryptography and Other Approaches to Vote Verification03 FEBRUARY, 2013
9086Wikipedia: A Republic of Science Democratized03 FEBRUARY, 2013
9087Theft, Transformation, and the Need of the Immaterial: A Proposal for a Fair Use Digital Sampling Regime03 FEBRUARY, 2013
9088Considerations for the Off-Label Use of Medications in Oncology03 FEBRUARY, 2013
9089Toward a “New School” Licensing Regime for Digital Sampling: Disclosure, Coding, and Click-Through03 FEBRUARY, 2013
9090Off-Label Drug Use: Pros and Cons03 FEBRUARY, 2013
9091Probabilistic Knowledge of Third-Party Trademark Infringement03 FEBRUARY, 2013
9092The Moral of the Story :at Grokster Has to Teach About the DMCA03 FEBRUARY, 2013
9093 CYBERLAW 2.003 FEBRUARY, 2013
9094Protection of Privacy of Third Parties Against Email Service Providers03 FEBRUARY, 2013
9095Patentability of a Software03 FEBRUARY, 2013
9096 Cybersquatting: Indian and American Laws 03 FEBRUARY, 2013
9097Privacy and Security of Personal Health Records Maintained by Online Health Services03 FEBRUARY, 2013
9098Cyber space and E-Commerce03 FEBRUARY, 2013
9099Effectiveness of Cyber Laws in India03 FEBRUARY, 2013
9100Online Defamation: A Comparative Analysis and Evaluating the responsibility of the Internet Service Providers in the Indian Legal Frameworks03 FEBRUARY, 2013
9101Rules for Uniform Domain Name Dispute Resolution Policy03 FEBRUARY, 2013
9102Protection of privacy of third parties against Email Service Providers: Current Position03 FEBRUARY, 2013
9103Cyber Defemation – Position in India03 FEBRUARY, 2013
9104Cybersquatting – Domain Name Dispute Resolution”03 FEBRUARY, 2013
9105 IPR in Cyber space and E-Commerce03 FEBRUARY, 2013
OLD9021Cyber Crimes and the Legal Framework against it - International and Indian Perspectives03 FEBRUARY, 2013
OLD9038E-Contracts03 FEBRUARY, 2013
OLD9048Cyber Crimes and the Legal Framework against it - International and Indian Perspectives03 FEBRUARY, 2013
9109 Freedom of Speech, Cyberspace, Harassment Law, and the Clinton Administration03 FEBRUARY, 2013
OLD9069Analysis of the concept of Jurisdiction in Cyberspace03 FEBRUARY, 2013
OLD9070 Self-regulation of Internet Content 03 FEBRUARY, 2013
OLD9082Data Protection Law in India03 FEBRUARY, 2013
OLD9083Law Relating to Contracts through Internet03 FEBRUARY, 2013
OLD9097An analysis of Jurisdictional issue in Cyberspace03 FEBRUARY, 2013
OLD9097Threats to Online Privacy vis-a-vis Social Networking Sites03 FEBRUARY, 2013
OLD9102 Digital signatures and electronic records03 FEBRUARY, 2013
OLD 109070Online Defamation: A Comparative Analysis and Evaluating the responsibility of the Internet Service Providers in the Indian Legal Frameworks03 FEBRUARY, 2013
OLD 10 9071The Emerging Law of Privacy and Speech in Cyberspace03 FEBRUARY, 2013
9119Electronic Commerce and Owning the Means of Value Exchange03 FEBRUARY, 2013
9120Encryption Policy—A Call for Congressional Action03 FEBRUARY, 2013
9121Science, Law, Ethics, Politics, and Religions03 FEBRUARY, 2013
9122A Pragmatic Look at the Costs of Privacy and the Benefits of Information Exchange03 FEBRUARY, 2013
9123Fair Information Practices and the Architecture of Privacy03 FEBRUARY, 2013
9124Legal Advice on the Internet and the Problems of Prohibited Client Solicitation and Unintended Attorney-Client Relationship03 FEBRUARY, 2013
9125A New Paradigm in Intellectual Property Law?03 FEBRUARY, 2013
9126Freedom of Speech, Cyberspace, and Harassment Law03 FEBRUARY, 2013
9127Perserving the Aftermarket in Copyrighted Works:Adapting the First Sale Doctrine to the Emerging Technological Landscape03 FEBRUARY, 2013
9128Self Regulation or Privacy Legislation03 FEBRUARY, 2013
9129Replacing Spectrum Auctions with a Spectrum Commons03 FEBRUARY, 2013
9130The Economic Efficiency and Public Policy of Online Contracts that Restrict Data Collection03 FEBRUARY, 2013
OLD-9023Predation, Affirmative Defenses, and the Case of U.S. v. Microsoft03 FEBRUARY, 2013
OLD-9032Cookie Viewers and the Undermining of Data-Mining: A Critical Review of the DoubleClick Settlement03 FEBRUARY, 2013
OLD-9054Virus Ex Machina: Res Ipsa Loquitur03 FEBRUARY, 2013
OLD-9067Identifying Fundamental Principles of Employee Privacy through a Comparative Study of Data Privacy Legislation in the European Union, United States and Canada03 FEBRUARY, 2013
OLD-9080Pen Registers, Packet Sniffers, and Privacy at the Margins03 FEBRUARY, 2013
OLD-9084Managing Risk to Reputation: The Challenge of the Internet for Legal Recruiting03 FEBRUARY, 2013
OLD-9095E-Elections: Time for Japan to Embrace Online Campaigning03 FEBRUARY, 2013
OLD-9110A Regulatory Proposal for Digital Defamation: Conditioning §230 Safe Harbor on the Provision of a Site "Rating"03 FEBRUARY, 2013
OLD-9117Brain Imaging for Legal Thinkers: A Guide for the Perplexed03 FEBRUARY, 2013

After having read the given assignment and the Cyber Law guideline, if you are still not quite clear about what is expected of you in the assignment, ask your Professor (Dr. Zulfiquar Ahmed or communicate through cell phone 01712534626/ 01191637262 or through web site: www.quialancer.com

http://www.quialancer.com

Department of Law & Justice
CyberLaw PhD
CyberLaw Bangladesh
Cyber Law Bangladesh
CyberLaw PhD
CyberLaw PhD
CyberLaw PhD


or facebook:  Facebook
quiatimet@gmail.com<