SlideShare une entreprise Scribd logo
1  sur  13
Safe Harbour Protection for Mobile Service Providers In India BY TALWANT SINGH SPECIAL JUDGE: CBI
SAFE HARBOUR PROTECTION FOR MOBILE SERVICE PROVIDERS IN INDIA ,[object Object],[object Object]
SAFE HARBOUR PROTECTION FOR MOBILE SERVICE PROVIDERS IN INDIA ,[object Object],[object Object],[object Object]
SAFE HARBOUR PROTECTION FOR MOBILE SERVICE PROVIDERS IN INDIA ,[object Object],[object Object]
SAFE HARBOUR PROTECTION FOR MOBILE SERVICE PROVIDERS IN INDIA ,[object Object],[object Object],[object Object]
SAFE HARBOUR PROTECTION FOR MOBILE SERVICE PROVIDERS IN INDIA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SAFE HARBOUR PROTECTION FOR MOBILE SERVICE PROVIDERS IN INDIA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SAFE HARBOUR PROTECTION FOR MOBILE SERVICE PROVIDERS IN INDIA ,[object Object],[object Object],[object Object]
SAFE HARBOUR PROTECTION FOR MOBILE SERVICE PROVIDERS IN INDIA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SAFE HARBOUR PROTECTION FOR MOBILE SERVICE PROVIDERS IN INDIA ,[object Object],[object Object],[object Object],[object Object]
SAFE HARBOUR PROTECTION FOR MOBILE SERVICE PROVIDERS IN INDIA ,[object Object],[object Object],[object Object],[object Object],[object Object]
SAFE HARBOUR PROTECTION FOR MOBILE SERVICE PROVIDERS IN INDIA ,[object Object],[object Object],[object Object]
THANKS ,[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000Karnika Seth
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunalAnkita Sharma
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...n|u - The Open Security Community
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformShamseena Zubair
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
2 G-Scam-ppt
2 G-Scam-ppt2 G-Scam-ppt
2 G-Scam-pptshubh14k
 

Tendances (20)

National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Cyber appellate tribunal
Cyber appellate tribunalCyber appellate tribunal
Cyber appellate tribunal
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
Hacking
HackingHacking
Hacking
 
2g scam ppt
2g scam ppt2g scam ppt
2g scam ppt
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Regulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platformRegulation in the place of digital and mobile platform
Regulation in the place of digital and mobile platform
 
it act 2000
it act 2000it act 2000
it act 2000
 
2G spectrum scam
2G spectrum scam2G spectrum scam
2G spectrum scam
 
2 g spectrum
2 g spectrum2 g spectrum
2 g spectrum
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
2G Spectrum Scam
2G Spectrum Scam2G Spectrum Scam
2G Spectrum Scam
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
2 G-Scam-ppt
2 G-Scam-ppt2 G-Scam-ppt
2 G-Scam-ppt
 

En vedette

RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral MiningHC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Miningshiva rajan
 
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...shiva rajan
 
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005chithra venkatesan
 

En vedette (6)

RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral MiningHC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
 
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
 
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
 
Justice of peace
Justice of peaceJustice of peace
Justice of peace
 
At&t v saudi cable case
At&t v saudi cable caseAt&t v saudi cable case
At&t v saudi cable case
 

Similaire à Safe harbour protection_for_mobile_service_pro

Legal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesLegal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesEquiCorp Associates
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Actanthony4web
 
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASELEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASEanthony4web
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Sookman aston it can representations warranties and indemnities presentation
Sookman aston it can representations warranties and indemnities presentationSookman aston it can representations warranties and indemnities presentation
Sookman aston it can representations warranties and indemnities presentationbsookman
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsRaunaq Jaiswal
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Adv Prashant Mali
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCEanthony4web
 
Data Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General PublicData Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General Publicijtsrd
 
Cloud Computing_CS_Oct2012
Cloud Computing_CS_Oct2012Cloud Computing_CS_Oct2012
Cloud Computing_CS_Oct2012Paras Kumar Jain
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 
1Running head CYBERLAW CONSUMER PROTECTION IN CYBERSECURITY .docx
1Running head CYBERLAW CONSUMER PROTECTION IN CYBERSECURITY   .docx1Running head CYBERLAW CONSUMER PROTECTION IN CYBERSECURITY   .docx
1Running head CYBERLAW CONSUMER PROTECTION IN CYBERSECURITY .docxaulasnilda
 
bulk sms in delhi
 bulk sms in delhi bulk sms in delhi
bulk sms in delhijayine group
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summitAdv Prashant Mali
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Adv Prashant Mali
 
Anti-circumvention and ISP liability provisions in Free Trade Agreements.
Anti-circumvention and ISP liability provisions in Free Trade Agreements.Anti-circumvention and ISP liability provisions in Free Trade Agreements.
Anti-circumvention and ISP liability provisions in Free Trade Agreements.blogzilla
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptxsambaba17
 

Similaire à Safe harbour protection_for_mobile_service_pro (20)

Legal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as IntermediariesLegal Obligations of Technology Service Providers as Intermediaries
Legal Obligations of Technology Service Providers as Intermediaries
 
It Amendments Act
It Amendments ActIt Amendments Act
It Amendments Act
 
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASELEGAL STRATEGIES FOR INDIAN BPOs –POST KKARAN BAHREE CASE
LEGAL STRATEGIES FOR INDIAN BPOs – POST KKARAN BAHREE CASE
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Sookman aston it can representations warranties and indemnities presentation
Sookman aston it can representations warranties and indemnities presentationSookman aston it can representations warranties and indemnities presentation
Sookman aston it can representations warranties and indemnities presentation
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Liability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal DownloadsLiability of ISP in case of Illegal Downloads
Liability of ISP in case of Illegal Downloads
 
Htc itmr 30-05-13
Htc   itmr   30-05-13Htc   itmr   30-05-13
Htc itmr 30-05-13
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
Data Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General PublicData Protection Bill 2019 Participative Role of General Public
Data Protection Bill 2019 Participative Role of General Public
 
Cloud Computing_CS_Oct2012
Cloud Computing_CS_Oct2012Cloud Computing_CS_Oct2012
Cloud Computing_CS_Oct2012
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 
1Running head CYBERLAW CONSUMER PROTECTION IN CYBERSECURITY .docx
1Running head CYBERLAW CONSUMER PROTECTION IN CYBERSECURITY   .docx1Running head CYBERLAW CONSUMER PROTECTION IN CYBERSECURITY   .docx
1Running head CYBERLAW CONSUMER PROTECTION IN CYBERSECURITY .docx
 
bulk sms in delhi
 bulk sms in delhi bulk sms in delhi
bulk sms in delhi
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summit
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 
Anti-circumvention and ISP liability provisions in Free Trade Agreements.
Anti-circumvention and ISP liability provisions in Free Trade Agreements.Anti-circumvention and ISP liability provisions in Free Trade Agreements.
Anti-circumvention and ISP liability provisions in Free Trade Agreements.
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptx
 

Plus de Talwant Singh

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018Talwant Singh
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Talwant Singh
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in CourtsTalwant Singh
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in JudiciaryTalwant Singh
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYTalwant Singh
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road MapTalwant Singh
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFTalwant Singh
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courtsTalwant Singh
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courtsTalwant Singh
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet DisputesTalwant Singh
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemTalwant Singh
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An IntroductionTalwant Singh
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICTTalwant Singh
 

Plus de Talwant Singh (20)

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in Courts
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in Judiciary
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road Map
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDF
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courts
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courts
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery System
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An Introduction
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICT
 

Dernier

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Dernier (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Safe harbour protection_for_mobile_service_pro

  • 1. Safe Harbour Protection for Mobile Service Providers In India BY TALWANT SINGH SPECIAL JUDGE: CBI
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.