0% found this document useful (0 votes)
177 views3 pages

Tort Synopsis

This document outlines a research synopsis on cyber torts. It will explore the concept of cyber torts through case law analysis. The research methodology will use a doctrinal approach analyzing statutes and cases. It will define cyber torts, distinguish them from cyber crimes, examine reasons for their occurrence and relevant statutory provisions in Indian and English law. It presents research questions and lists chapter topics that will cover the evolution of cyber torts, fundamental concepts, applicable legal frameworks, and analyses of judicial precedents to develop an understanding of this area of law.

Uploaded by

samarth agrawal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
177 views3 pages

Tort Synopsis

This document outlines a research synopsis on cyber torts. It will explore the concept of cyber torts through case law analysis. The research methodology will use a doctrinal approach analyzing statutes and cases. It will define cyber torts, distinguish them from cyber crimes, examine reasons for their occurrence and relevant statutory provisions in Indian and English law. It presents research questions and lists chapter topics that will cover the evolution of cyber torts, fundamental concepts, applicable legal frameworks, and analyses of judicial precedents to develop an understanding of this area of law.

Uploaded by

samarth agrawal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cyber Torts (Synopsis)

AIM

The purpose of this research is to explore the concept of cyber torts with various case laws.

OBJECTIVE

Through this research, researcher will explain the concept of cyber torts, its history, distinction
between cyber crime and cyber tort, reasons behind occurance of cyber torts, and statutory
provisions for cyber torts.

RESEARCH METHODOLOGY

Basically, Research Methodology means careful or diligent inquiry, especially investigation


aimed at the discovery and interpretation of facts, revision of accepted theories or law.

Here, Researcher use Doctrinal method of research, i.e. A research that has been carried out on a
legal preposition or propositions by way of analyzing the existing statutory provisions and cases
by applying the reasoning power.

RESEARCH QUESTION

1. What is cyber torts?


2. What is basic difference between cyber torts and cyber crime?
3. What is the reasons behind occurrence of cyber torts?
4. What is the statutory provisions behind for cyber torts in Indian law as well as in English
law?
TABEL OF CONTENTS

CHAPTER 1 Introduction..

1.1. Research Objective..


1.2. Research Methodology..
1.3. Research Questions

CHAPTER 2 Evolution and Development

2.1. Early history.


2.2. Origin..
2.3. Explanation..

CHAPTER 3 Fundamental Concepts..

3.1. Concept of Cyber torts


3.2. Reasons behind its Occurrence
3.3. Difference between cyber torts and cyber crime
3.4. Some Preventive measures against this crime

CHAPTER 4 LEGAL FRAMEWORK

4.1.India.
4.1.1. Information Technology Act, 2000
4.1.2. Indian Penal Code, 1860.
4.1.3. The Indian Evidence Act, 1872..
4.2.English law..
4.2.1. Computer Misuse Act, 1990
4.2.2. Privacy And Electronic Regulations (EC Directive, 2003)
4.2.3. Police and Justice Act, 2006

CHAPTER 5 JUDICIAL TRENDS

5.1. Indian Case laws ..

5.1.1. State vs. Mohd. Afzal and others (2003)


5.1.2. Dharamvir vs. Central Bureau of Investigation (2008).

5.2. English Case laws..

5.2.1. S B Jafta v. Ezemvelo KZN Wildlife (2008).


5.2.2. Ashcroft v. Free Speech Coalition (2002)

CONCLUSION

BIBLIOGRAPHY

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy