I. INTRODUCTION TO Cyber Jurisprudence
  • Meaning of Law
  • Sources of Law
  • Hierarchy & Composition of the Indian Judiciary
  • Civil Courts Structure and Procedures
  • Criminal Court Structure and Procedures
  • Understanding Cyber Space
  • Defining Cyber Laws
  • Internet Governance, ICANN, UDRP, INDRP
  • Jurisdiction in Cyber Space
II. Understanding Law relating to Information and Technology
  • Information Technology Act – An Overview
  • The Indian Law of Contract - Construction of Electronic Contracts
  • Issues of Security and Privacy
  • Technical Issues in Cyber Contracts
  • Security and Evidence in E-Commerce
  • Dual Key Encryption, Digital Signatures
  • Security issues in E-Commerce
III. E-Banking and Legal Issues
  • Electronic Money
  • Regulating e-transactions
  • Role of RBI and Legal issues
  • Transnational Transactions of E-Cash
  • Credit Card and Internet
  • Laws relating to Internet credit cards
  • Secure Electronic Transactions
  • RBI Security Framework Guidelines for Banks
  • Guidelines for payment gateway providers
  • SEBIs framework for stock market
IV. Law of Cyber Crimes
  • Defining Crime, Classification of Cyber Crimes
  • General Principles of Criminal Law applicable to Cyber Crimes
  • Law relating to punishments in IPC and IT Act –
  • Cyber Crimes:
  • Hacking, Phishing
  • Obscenity & Pornography, Child Pornography
  • Cyber Stalking
  • Theft of Identity
  • Cyber Defamation
  • Cyber Terrorism
  • Cyber warfare
  • Cyber Cheating
  • Data Diddling
  • Steganography
  • Breach of Confidentiality and Privacy
  • Offences of/by Companies
  • Liability of Intermediaries including 2011 guidelines
  • Deep web, Dark net
  • Cyber Investigation
  • Compoundable Offences
  • Powers of Police Officers
  • Law of Evidence in Cyber Crimes ( Electronic Evidence)
  • Admissibility and relevancy of Electronic Evidence
  • Sec 65A, 65 B
V. Emerging and Contemporary Issues in cyber space
  • Quantum Computing
  • Artificial Intelligence
  • IOT (Internet of things)
  • Block chain technology
I. Historical Perspective of emergence of Data Protection laws in different countries General Data Protection regulation (GDPR)
- Application of GDPR guidelines to Indian Companies
- GDPR- Applicability, Data Protection Principles and Data Subject Rights, Exemptions and Derogations
- GDPR-Cross Border Transfer of Data, SCC, BCR
GDPR-Compliance Obligations, DPIA, Privacy By Design,
DPO, Remedies, Liabilities and Sanctions
TK v Asociatia de Proprietari bloc M5A-ScaraA: ( Some CJE U Guidance on the Use of Video Surveillance in Apartment Buildings under EU Data Protection Law)
II. DIFC-Overview
Singapore PDPA-Applicability, Principles, Data Subject’s Rights, Exemptions,
Singapore PDPA-Compliance Obligations
Challenges in Compliance of Multiple Data Protection Laws
III. Data Protection Law in UK:
  • The Data Protection Act 2018
    • Meaning of certain terms used in the GDPR,Meaning of “controller”, Meaning of “public authority” and “public body”.
    • Lawfulness of processing, Lawfulness of processing: public interest etc,
    • Child’s consent in relation to information society services
    • Special categories of personal data, and criminal convictions etc
    • Rights of the data subject
    • Restrictions on data subject's rights
    • Power to make further exemptions etc by regulations, Accreditation of certification providers,
    • Transfers of personal data to third countries etc
    • Specific processing situations
    • Principles, The first data protection principle, The second data protection principle, The third data protection principle, The fourth data protection principle, The fifth data protection principle, The sixth data protection principle
    • Representation of data subjects
    • Framework for Data Processing by Government
    • Offences and penalties
IV. Data protection laws in US
  • HIPAA (Health Insurance Portability and Accountability Act
  • National Provider Identifier Standard.
  • Transactions and Code Sets Standard.
  • HIPAA Privacy Rule.
  • HIPAA Security Rule.
  • HIPAA Enforcement Rule.
  • CCPA- Applicability, Principles and Data Subject’s Rights, Legitimate Interests, CCPA-Compliance Obligations, Notice, Consent, Legitimate Interest etc
  • NDHM Regulatory requirement – August 28, 202
V. Data Protection laws in Canada
  • Federal: Personal Information Protection and Electronic Documents Act 2000 ('PIPEDA');
  • British Columbia: Personal Information Protection Act, SBC 2003 c 63('BC PIPA');
  • Alberta: Personal Information Protection Act, SA 2003 c P-6.5 ('AB PIPA'); and
  • Quebec:Act respecting the Protection of Personal Information in the Private Sector, CQLR c P-39.1 ('Quebec Private Sector Act').
Protecting privacy and ensuring the security of data are more than only following government regulations. Organizations must develop sound data security policies to assist in preventing the unauthorized or unintentional disclosure of data. Data security breaches involving the financial information of customers are well publicized and, unfortunately, all too common. A robust privacy and data protection technologies – including an emphasis on cyber security and end-user best practices – can help avoid the costly consequences of data loss while protecting the company’s reputation.
This paper helps to understand the technical aspects of Cyber Security and Data Protection concepts and frameworks in practice
I. Cyber Security Concepts
  • Cyber Security Concepts: Cyber security issues, goals, architecture, attacks, Security Services and Mechanisms.
  • Introduction to Cryptography: Network security model, Cryptographic systems,
  • Crypt analysis, Steganography.
  • Types of Cryptography: Symmetric key and Asymmetric Key Cryptography,
  • Encryption and Decryption Techniques.
  • Cryptographic Algorithms: Cryptographic hash, Message Digest, Data Encryption
  • Standard, Advanced Encryption Standard, RSA, ECC (Introductory concepts only)
II. Cyber Security Threats and Vulnerabilities
  • Overview of Security Threats and Vulnerability: Types of attacks on
  • Confidentiality, Integrity and Availability.
  • Vulnerability and Threats.
  • Malware: Viruses, Worms, Trojan horses
  • Security Counter Measures; Intrusion Detection Systems, Antivirus Software
  • Ransoware, extortion
III. Ethical Issues in Information Security & Privacy
  • Information Security, Privacy and Ethics
  • Cyber Crime
  • Hacking: Ethical issues
  • Responsible vulnerability disclosure
  • Privacy respecting security technologies and AI
  • System Security
  • Desktop Security
  • Dynamic and static source code testing
  • Database Security
  • Operating System Security: Designing Secure Operating Systems, OS Security
V. Cyber Security Audits, Vulnerability Assessment and Penetration Tests
  • ISO 27001 Audits
  • PCIDSS (Payment Card Providers)
VI. Security Management
  • Disaster Recovery
  • Digital Signature
  • Ethical Hacking, Penetration Testing
  • Computer Forensic
VII. Introduction to Cyber Forensic Tools – Virtual Lab
  • EaseUS Data Recovery Wizard
  • Wondershare Recoverit
  • ICare Data Recovery

Course Coordinator

Associate Professor
Ph : +9140 – 23498213

Ask your Question

Administrative Contact

Ms. B. Nagalakshmi
Assistant Registrar
Ph : +9140 – 23498402

Ms. G. Usha Devi
Junior Assistant
Ph : +9140 – 23498404

Mr. B. Vijay Kumar
Record Assistant
Ph : +9140 – 23498404

Postal Address

Directorate of Distance Education
NALSAR University of Law
Justice City, Shameerpet, Medchal District,
Hyderabad - 500101, Telangana, India.
Ph : +9140 – 23498404;Fax: +91 40 23498403
okey oyna agario
tempobet giris