-
Admin
Legal validity of a Non-Compete Agreement in India
Employers use non-compete clause in the employment contracts to restrict the employees in working with their competitors or customers after leaving the employment. However, Section 27 of the Indian Contract Act states that every agreement by which anyone is restrained from exercising a lawful profession, trade or business of any kind, is, to that extent,…
-
Admin
Cyber Laws Dishonestly receiving stolen computer resource or communication device – Sec.66B – Information Technology Act
Information Technology Act *[ 66B. Punishment for dishonestly receiving stolen computer resource or communication device.-Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may…
-
Admin
Section 66A of IT Law – Cyber Laws Sending offensive messages through communication service, etc
Section 66A of IT Law – Cyber Laws Sending offensive messages through communication service, etc *[ 66A. Punishment for sending offensive messages through communication service, etc.. – Any person who sends, by means of a computer resource or a communication device,- (a) any information that is grossly offensive or has menacing character; or (b) any information…
-
Admin
Cyber Laws Hacking with computer systems, Data Alteration – Sec.66 (IT Act)
66. Hacking with Computer System. (1) Whoever with the intent of cause or knowing that is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits…
-
Admin
[] Tampering with computer source Documents – Sec.65 (IT Act)
65. Tampering with computer source documents. – Whoever knowingly or intentionally conceals, destroy, or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment…
Search
Category
- Articles (30)
- Bare Acts (17)
- Blog (1)
- Case Laws (641)
- Cyber Law Guide (3)
- Cyber Laws (14)
- Information Technology Act (2)
- Intellectual Property (3)
- News (4)
- Resources (3)
Recent Post
- OWASP Top 10 Web Application Security Risksby Admin
- Offences by Companies – Sec.85 – Information Technology Actby Admin
- Ultimate Guide: Legal Compliance for E-commerce in India [2024]by Admin
- E-commerce Laws and Compliances in India: A Deep Dive into Legal Metrology (Packaged Commodities) Rulesby Admin
- External Data Protection Officer Servicesby Admin