Final
Final
BCSF188OEF
STUDY MATERIAL
DEPARTMENT OF CSE
SRI CHANDRASEKHARENDRA SARASWATHI VISWA
MAHAVIDYALAYA
(Deemed to be University established under section 3 of UGC act 1956)
ENATHUR, KANCHIPURAM - 631 561
Course Code: L T P C
BCSF188OEF CYBER LAW AND ETHICS 3 0 0 3
PRE-REQUISITE
1. Cryptography and Network Security.
2. Ethical Hacking
1
OBJECTIVES
1. To understand the basics of cyber threats & security. 2. To
learn various fundamentals of law & act
3. To study about cyber & security policies.
4. To understand the nature and applications of cyber law in real life
5. To understand various security issues in cyber.
COURSE OUTCOMES
1. Basic information on cybercrime.
2. Cyber laws for various crime activities.
3. Identify the security policies for cyber issues.
4. Analyze the role of organization for securing cyberspace.
5. Need for security in organizations.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M
CO2 M
CO3 L
CO4 S
CO5 M
UNIT – I INTRODUCTION
Introduction, Forgery, Hacking, Software Piracy, Computer Network intrusion -
Category of Cybercrime - Cybercrime Mobile & Wireless devices - Tools and
Methods used in Cybercrime - Phishing & Identity Theft.
2
UNIT - III CYBER LAW
Cyber torts cyber defamation, different types of civil wrongs under IT Act 2000,
Intellectual property issues in cyber space, interface with copyright law, interface
with patent law, trademark & domain names related issues.
UNIT - IV E-COMMERCE
E-commerce concept-commerce-salient features online approaches like
B2B, B2C & C2Conline contracts, click wrap contracts, applicability of Indian contract
act 1872.
UNIT – V JURISDICTION
Dispute Resolution in cyberspace, concepts of Jurisdiction, Indian context of Jurisdiction
and IT Act 2000.Interantional Law and
Jurisdictional issues in cyberspace.
TEXT BOOKS
Chris Reed & John Angel, Computer Law, OUP, New York.
Justice Yatindra Singh, Cyber Laws, Universal Law Publishing Co, New Delhi.
Verma S, K, Mittal Raman, Legal Dimensions of Cyber Space, Indian Law Institute.
Jonthan Rosenoer, Cyber Law, Springer, New York.
Sudhir Naib, The Information Technology Act, 2005: A Handbook, OUP, New York. S. R.
Bhansali, Information Technology Act, 2000, University Book House Pvt. Ltd.
REFERENCES
Reich, Pauline C, “Law, Policy, and Technology: Cyberterrorism, Information Warfare,
and Internet Immobilization”, IGI Global, 2012.
Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt,
“Cyber Security Policy Guidebook”, John Wiley & Sons, 2012.
Jonathan Rosenoer, “Cyber law: the Law of the Internet”, Springer - verlag, 1997.
3
UNIT I
Introduction to Cyber Law
4
Cyber law encompasses laws relating to:
1. Cyber Crimes
2. Electronic and Digital Signatures
3. Intellectual Property
4. Data Protection and Privacy
Hacking:
role of an ethical hacker
legally as an ethical hacker
Ethical hackers
Employed by companies to perform penetration tests
Penetration test
Legal attempt to break into a company’s network to find its weakest link
Tester only reports findings, does not solve problems
5
Security test
More than an attempt to break in; also includes analyzing company’s
security policy and procedures
Tester offers solutions to secure or protect the network
6
Tests if security personnel are able to detect an attack
Gray box model
Hybrid of the white and black box models
Company gives tester partial information
Overview – Software Piracy
• Major software companies are losing 35-40% of their potential retail revenue to
software pirates around the world
The Concept of privacy
7
•
• Hacking
• Cookies
• HTTP
• Browsers
• Websites
• Spam
• Satellite vigilance
Protecting privacy
• Encryption
• Anonymity
• Mobile Device: a device that is easy to use, enables remote access to business
networks and the internet, and enables quick transfer of data.
• Laptops
Cell Phones
• PDAs
• Flash Drives
• Bluetooth
• Mouse/Keyboard
• Mp3 Players
How does Wireless Work?
• Cable Locks
• Encryption
• Authentication
Risk: Data loss/leakage
7 out of 10 government mobile devices are unencrypted.
Government Accountability Office (GAO), IT Security: Federal Agency efforts to
encrypt sensitive information are under way, but work remains, June 2008
• The cost of recovering from a single data breach now averages $6.3M - that’s up 31
percent since 2006 and nearly 90 percent since 2005.
Ponemon Institute, U.S. Costs of a Data Breach, November 2007
Wireless networks
Infrastructure Mode
Ad-hoc mode
Specific Threats to Wireless Networks
Unauthorized use of service
Jamming
• Constant Jamming
• Deceptive Jamming
Auditing Wireless Networks
Access control, transmission control, viruses, and monitoring access points are
important risks to consider
Firewall generally secures information but WLAN creates new challenges because
it easier to access. Therefore, control is more important.
An Anonymizer
An anonymizer or an anonymous proxy is a tool that attempts to make activity on the
Internet untraceable.
It is a proxy server computer that acts as an intermediary and privacy shield between a
client computer and the rest of the Internet.
It accesses the Internet on the user’s behalf protecting personal information by hiding the
client computer’s identifying information.
UNIT II
Cybercrime – An Introduction
Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is where a computer is the
target of a crime or is the means adopted to commit a crime.
Most of these crimes are not new. Criminals simply devise different ways to undertake
standard criminal activities such as fraud, theft, blackmail, forgery, and embezzlement using
the new medium, often involving the Internet
Computer vulnerability
Computers store huge amounts of data in small spaces
Ease of access
Complexity of technology
Human error
One of the key elements that keeps most members of any society honest is fear of
being caught — the deterrence factor. Cyberspace changes two of those rules. First,
it offers the criminal an opportunity of attacking his victims from the remoteness of
a different continent and secondly, the results of the crime are not immediately
apparent.
Need new laws and upgraded technology to combat cyber crimes
Issues in Cyberspace
Cyberspace has been faced many security challenges like identity tracing, identity theft,
cyberspace terrorism and cyberspace warfare. In this paper, we focus on analysis these
security challenges, and give some possible solutions offered by law and technology.
Right to use Cyberspace
Accordingly, the Internet has become a major vehicle for the exercise of the right to
freedom of expression and information. The International Covenant on Civil and Political
Rights (ICCPR)3 states (in article 19(2))
The freedom of speech rights in regard of speaking and giving opinion which associated
with IT is often leads to victim suspected of breaking these limits. Actually, the freedom of
speech rights itself is regulated in the article 28 of the 1945
Internet plays a significant role with the escalation of technology, so a primitive question
arises that:
Whether or not Internet access should be considered a civil right?
In 2016, the UNHRC General Assembly expressed an important human right to Internet
access.
The Internet is the undiscovered ocean of information, and the biggest supplier in the world.
Technology is, in his opinion, an enabling agent of rights and not a privilege of its own.
India has legislation which deals with cyberspace crimes.
Right to privacy
What is privacy?
Privacy is a fundamental right, essential to autonomy and the protection of human dignity,
serving as the foundation upon which many other human rights are built.
Privacy enables us to create barriers and manage boundaries to protect ourselves from
unwarranted interference in our lives, which allows us to negotiate who we are and how we
want to interact with the world around us. Privacy helps to establish boundaries to limit
with the access for information sharing and communication.
Privacy is an essential way to protect against society with arbitrary and unjustified usage of
power. Privacy International envisions, protects the right to access the information.
Individual can participate in the modern development of technologies with ability to freely
enjoy the rights. Privacy is a qualifies, fundamental human right with articulated
management instruments.
Types of Cybercrime
DDoS Attacks
Botnets
Identity Theft
Cyberstalking
Social Engineering
PUPs
Phishing
Prohibited/Illegal Content
Cybercrimes against Individuals, Institution and State
Individual
Property
Government
Digital Forgery
Forgery has been defined as the crime of falsely altering document with intension to
mislead others. It includes the production of counterfeited items. Digital Forgery involve
electronic forgery and identity theft. The majority of digital forgery occurs because of
digitally altering pictures. Digital techniques are notoriously more precise than
conventional retouching because any area of the photo can be changed pixel by pixel. The
three types of image forgery include image retouching, splicing forgery and copy-move
image forgery.
Cyberstalking
Cyberstalking is a new concept with agreed-upon definition such as
Stalking is done with the assistance of technology
It is done to make a person feel afraid, threatened or worried about their safety
It invades a person’s privacy
The stalker monitors the victim’s behaviour, threatens them with unwanted access.
Cyber pornography
It is defined as the act of using cyberspace to create, display, distribute, import or publish
pornography. The traditional pornographic content has been largely replaced by
online/digital pornographic content.
Cyber Defamation
The term defamation is used to define the injury caused by the reputation of a person. The
intention of the person causes defamatory statement which lowers the reputation of the
person against whom the statement has been made in the eyes of general public.
Defamation is the application to Cyber defamation which involves defamation of a person
through a new and a virtual medium. Cyber defamation is publishing of defamatory
material against another person with the help of computers or internet.
Medium by which offense of cyber defamation can be caused:
World Wide Web
Discussion groups
Intranets
Mailing lists and bulletin boards
E-mail
S
S
Cyber torts – An Introduction
Cyber Torts
A tort is a negligent or intentional act is done by someone that injures someone else in
some way. Cyber Torts are simply a tort done over cyberspace. Cyber torts are very
important because they are on the rise and are still crimes that can have serious effects on
society. Everyone should be exposed to the dangers and damages caused by cyber torts
because technology is an important aspect in everyone’s lives, especially now.
The word “tort” originates from the French language, in English, it is equivalent to term
“wrong” and it is derived from the Latin word “tortum” which means “wrong or injury”
and the word tortum is developed from the word “torquere” which means “to twist”. It is
simply a breach of duty which amounts to a civil wrong.
A person who commits a tort is called as a tortfeasor and if there are multiple persons
involved, then they are called joint tortfeasor as they are jointly liable for the tortious act
and they can be sued individually or jointly.
Cyber Stalking
Cyber Obscenity
Pornography on the internet has various forms. It may also include prohibited material
such as child pornography, which is a heinous crime in real life as well.
Cyber Defamation
Defamation is an act of making a statement about an individual which may lower his
reputation in the eyes of the right-thinking people. It can be written and oral also. Cyber
defamation is very similar to defamation in real life except for the involvement of a virtual
machine. Cyber defamation is that kind of defamation which is done through the virtual
medium.
Cyber-Vandalism
Trafficking
Trafficking is of many kinds, it may be in drug, ammunition, or even human beings, etc.
Trafficking is taken a form with the ascension of the internet as cyber trafficking has also
developed, where the process of trafficking is done online through the use of a virtual
machine.
Online fraud and cheating have become one of the biggest threats the government has to
deal with. These include Credit card crimes, fake job offerings, misappropriation, etc.
Different Types of Civil Wrongs under the IT Act 2000
Civil Cyber Wrongs A civil cyber wrong is one which is committed online and is civil in
nature, such as a tort of defamation committed online through a computer (or any device
which has access to the internet and is able to modify the information or post anything
online, such as a mobile phone, or a tablet) is used as a tool to commit that kind of wrong.
Although not defined or addressed as civil cyber wrongs, the essence of civil liability is
defined under section 43 of the IT Act, 2000.
A criminal cyber wrong is a serious threat and it must be dealt with as soon as possible, a
criminal cyber wrong is a criminal wrong committed online through the use of technology,
crimes such as Hacking, information theft, denial of service attacks, etc. Although not
addressed as criminal cyber wrongs in any acts, but various wrongs of criminal nature are
defined under the IT Act, 2000, such as Child pornography defined under Section 67-A of
the act.
Intellectual property rights are the legal rights that cover the privileges given to individuals
who are owners and inventors of a work. The following list of activities which are covered
by the intellectual property rights are laid down by the World Intellectual Property
Organization (WIPO)
Industrial designs
Scientific discoveries
Protection against unfair competition
Literary, artistic and scientific works
Inventions in all fields of human endeavor
Performances of performing artists, phonograms and broadcasts
Trademarks, service marks, commercial names and designations
Types of Intellectual Property Rights
Intellectual Property Rights can be further classified into the following categories −
Copyright
Patent
Patent
Trade Secrets, etc.
A domain name is an Internet resource name that is universally understood by web servers
and online organizations and provides all pertinent destination information. To access an
organization’s Web-based services, website users must know the precise domain name.
Domain names are used worldwide, particularly in the world of networks and data
communication. The following points explain how they work and how they are used:
Domain names have two parts that are separated by a dot, such as example.com.
A domain name can be used to identify a single IP address or group of IP
addresses.
A host or organization may use a domain name as an alternate IP address because
domain names are alphanumeric (as opposed to all numbers), making them easier
to memorize.
A domain name is used as part of a URL to identify a website.
The part that follows the dot is the top-level domain (TLD), or group to which the
domain name belongs. For example, .gov is the TLD for U.S. government
domains.
From a legal perspective, this is one of the simplest scenarios in domain name law. If a
third party has without any right whatsoever managed to transfer a domain name from
your account to its own, then it has infringed your domain rights and you should be able
to recover it by contacting the ISP and proving your case. In a world menaced by
terrorism and global warming, stolen domain names might not sound like a serious issue
but the entities behind such foul play are often serious criminals.
Cybersquatting
This is one of the most common scenarios in domain disputes. This can overlap with
passing off domain name activity. In that scenario, the domain name is usually diverted to
the website of a third – party competitor who seeks to trade off the goodwill of the
legitimate brand owner. However, typically cybersquatting and passing off domain name
machinations are quite distinct.
This is probably the busiest area of activity for the typical domain name lawyer. Domain
name disputes often pivot around the issue as to whether a company has overstepped the
mark by registering a domain name which reflects the trading name or product name of
one of its competitors. Another similar form of dispute may arise where a company uses
metatags or pays for sponsored ads which incorporate the competitor’s branding. Each
case is assessed on its facts but if the bottom line is that a trading entity is taking unfair
advantage of a competitor’s branding and/or marketing efforts, the courts will usually find
in favour of the competitor and award damages or order an account for profits.
Trademark related issues – Here are ten issues keeping trademark attorneys and rights
holders alike, on their toes.
Innovative Trademark Trolling
Just like their patent troll counterparts, individuals and agencies are using predatory
registrations to insidious ends. Unscrupulous characters are exploiting the opportunity to
demand licensing fees from alleged infringers.
Trademarks as Keywords
The first ever online sale was in 1994 when a man sold a CD by the band Sting to his
friend through his website NetMarket, an American retail platform. This is the first
example of a consumer buying a product from a business through the World Wide
Web or e-commerce as we commonly know it today. After that ecommerce has
evolved to make products easier to discover and purchase through online retailers
and marketplaces. All freelancers as well as small and large businesses have been
benefited from e-commerce which enables them to sell their goods and services at a
scale that was not possible with traditional offline retail.
A website following the B2B business model sells its products to an intermediate buyer
who then sells the products to the final customer. As an example, a wholesaler places
an order from a company's website and after receiving the consignment, it sells the end
product to the final customer.
B2B identifies both the seller as well as the buyer as business entities. B2B covers a
large number of applications, which enables business to form relationships with their
distributors, re-sellers, suppliers, etc. Following are the leading items in B2B
eCommerce.
Following are the key technologies used in B2B e-commerce −
Electronic Data Interchange (EDI) − EDI is an inter-organizational exchange of
business documents in a structured and machine processable format.
Internet − Internet represents the World Wide Web or the network of networks
connecting computers across the world.
Intranet − Intranet represents a dedicated network of computers within a single
organization.
• Buyer Oriented marketplace − In this type of model, buyer has his/her own
market place or e-market. He invites suppliers to bid on product's catalog. A
Buyer company opens a bidding site.
In B2C model, a business website is a place where all the transactions take place directly
between a business organization and a consumer.
In the B2C model, a consumer goes to the website, selects a catalog, orders the catalog,
and an email is sent to the business organization. After receiving the order, goods are
dispatched to the customer. Following are the key features of the B2C model −
Heavy advertising required to attract customers.
compares similar items for price, delivery date or any other terms.
places the order.
consults the vendor to get after service support or returns the product if not
satisfied with the delivered product.
With the advance use of internet and electronic commerce, online contracts have
assumed importance mainly in terms of reach and multiplicity. Online contract or an
electronic contract is an agreement modelled, signed and executed electronically,
usually over internet. An Online contract is conceptually very similar and is drafted in
the same manner in which a traditional paper-based contract is drafted. In case of an
online contract, the seller who intends to sell their products, present their products,
prices and terms for buying such products to the prospective buyers. In turn, the
buyers who are interested in buying the products either consider or click on the ‘I
Agree’ or ‘Click to Agree’
Once the terms are accepted and the payment is made, the transaction can be
completed. The communication is basically made between two computers through
servers. The online contract is brought to the scenario to help people in the way of
formulating and implementing policies of commercial contracts within business
directed over internet. Online Contract is modelled for the sale, purchase and supply
of products and services to both consumers and business associates.
Online can be categorized into three types mainly i.e. browse or web wrap contracts,
shrink wrap contracts and clickwrap contracts. Other kinds of online contracts include
employment contract, contractor agreement, consultant agreement, Sale re-sale and
distributor agreements, non-disclosure agreements, software development and
licensing agreements, source code escrow agreements. Though these online contracts
are witnessed in our everyday life, most of us are not aware of the legal complexities
connected to it; the use of online contract faces many technical and legal challenges.
Online contracts can be of three types mainly i.e. shrink-wrap agreements, click or
web-wrap agreements and browse-wrap agreements. In our everyday life, we usually
witness these types of online contracts. Other types of online contracts include
employment contract, contractor agreement, consultant agreement, Sale re-sale and
distributor agreements, non-disclosure agreements, software development and
licensing agreements, source code escrow agreements.
In a clickwrap agreement, in order to use a website or download content, the user has
to check a box saying they've read and agree to the terms and conditions that apply to
the website or software.
Sometimes the agreements are many pages long and difficult to read. They usually contain
two things:
A checkbox or button
A notice telling you that you agree to the terms if you
click the box Clickwrap agreements are also called:
Clickthrough agreements
Clickwrap licenses
Types of clickwrap (and browse wrap) include:
I agree
OK
I consent
I accept
The Act as enacted originally had 266 Sections, it had wide scope and included.
Jurisdiction can be defined as the limit of a judicial authority or the extent to which a court
of law can exercise its authority over suits, cases, appeals etc. The rationale behind
introducing the concept of jurisdiction in law is that a court should be able to try and
adjudicate only in those matters with which it has some connection or which fall within
the geographical or political or pecuniary limits of its authority. A 1921 Calcutta High
Court judgment in the case of Hriday Nath Roy v. Ram Chandra sought to explain the
meaning of the term ‘jurisdiction’ in a great detail. The bench observed:
‘An examination of the cases in the books discloses numerous attempts to define the term
‘jurisdiction’, which has been stated to be ‘the power to hear and determine issues of law
and fact;’ ‘the authority by which three judicial officers take cognizance of and decide
cause;’ ‘the authority to hear and decide a legal controversy;’ ‘the power to hear and
determine the subject-matter in controversy between parties to a suit and to adjudicate or
exercise any judicial power over them;’‘the power to hear, determine and pronounce
judgment on the issues before the Court;’‘the power or authority which is conferred upon
a Court by the Legislature to hear and determine causes between parties and to carry the
judgments into effect;’ ‘the power to enquire into the facts, to apply the law, to pronounce
the judgment and to carry it into execution.’
Types of Jurisdictions:
In India, there are mainly 5 types of jurisdiction which can be classified as follows:
Subject-matter jurisdiction:
It can be defined as the authority vested in a court of law to try and hear cases of a
particular type and pertaining to a particular subject matter. For example, District Forums
established under the Consumer Protection Act, 1986 have jurisdiction over only
consumer-related cases. It cannot try criminal cases.
Territorial jurisdiction:
Under this type of jurisdiction, geographical limits of a court’s authority are clearly
delineated and specified. It cannot exercise authority beyond that territorial/geographical
limit. For example, if a certain offence is committed in Madhya Pradesh, only the courts
of law within the boundaries of Madhya Pradesh can try and adjudicate upon the same
unless otherwise provided for in a particular piece of legislation.
Pecuniary jurisdiction:
Original jursidiction:
It refers to the authority of a court to take cognizance of cases which can be tried and
adjudicated upon in those courts in the first instance itself. It is different from appellate
jurisdiction in the sense that in case of the latter, the courts rehear and review an already
decided matter whereas in case of the former the cases are tried for the very first time. For
example, the High Court of Allahabad has original jurisdiction with respect to
matrimonial, testamentary, probate and company matters.
Appellate jurisdiction:
It refers to the authority of a court to rehear or review a case that has already been decided
by a lower court. Appellate jurisdiction is generally vested in higher courts. In India, both
the High Courts and the Supreme Court have appellate jurisdiction to hear matters which
are brought in the form of appeal before them. They can either overrule the judgment of
the lower court or uphold it. At times they can also modify the sentence.
Concurrent jurisdiction: A situation in which more than one court of law has
the jurisdiction to try certain matters. Sometimes, this type of jurisdiction is
also referred to as ‘co-ordinate jurisdiction’.
Admirality jurisdiction: Jurisdiction pertaining to mercantile and maritime law
and cases.
The original jurisdiction of a court is the power to hear a case for the first time, as opposed
to appellate jurisdiction, when a higher court has the power to review a lower court's
decision. Original jurisdiction refers to the right of the Supreme court to hear a case for
the first time. It has the exclusive right to hear all cases that deal with disputes between
states, or between states and the union government. It also has original jurisdiction over
cases brought to the court by ordinary people regarding issues to the importance of society
at large.
In India, the Supreme Court has original, appellate and advisory jurisdiction. Its exclusive
original jurisdiction extends to all cases between the Government of India and the States
of India or between Government of India and states on one side and one or more states on
other side or cases between different states. Original jurisdiction is related to cases which
are directly brought to the Supreme Court. Cases which require the interpretation of the
constitution or cases relating to the denial of fundamental rights are heard in the supreme
court. In case there is a dispute between two or more states or between the union and the
states, the Supreme Court decides such cases. In addition, Article 131 of the Constitution
of India grants original jurisdiction to the Supreme Court on all cases involving the
enforcement of fundamental rights of citizens. It is empowered to issue directions, orders
or writs, including writs in the nature of habeas corpus, mandamus, prohibition, quo
warranto and certiorari to enforce them.
The appellate jurisdiction of the Supreme Court can be invoked by a certificate granted by
the High Court concerned under Article 132(1), 133(1) or 134 of the Constitution in
respect of any judgement, decree or final order of a High Court in both civil and criminal
cases, involving substantial questions of law as to the interpretation of the Indian
Constitution.
The Supreme Court has special advisory jurisdiction in matters which may specifically be
referred to it by the President of India under Article 143 of the Indian Constitution.
IT ACT 2000
The Government of India enacted The Information Technology Act with some major
objectives which are as follows −
The Information Technology Act, 2000, was thus passed as the Act No.21 of 2000. The I.
T. Act got the President’s assent on June 9, 2000 and it was made effective from October
17, 2000. By adopting this Cyber Legislation, India became the 12th nation in the world
to adopt a Cyber Law regime.
Digital signature has been replaced with electronic signature to make it a more
technology neutral act.
It is based on The Indian Penal Code, 1860, The Indian Evidence Act, 1872, The
Bankers' Books Evidence Act, 1891, The Reserve Bank of India Act, 1934, etc.
It adds a provision to Section 81, which states that the provisions of the Act shall
have overridden effect. The provision states that nothing contained in the Act shall
restrict any person from exercising any right conferred under the Copyright Act,
1957.
As per the sub clause (4) of Section 1, nothing in this Act shall apply to documents or
transactions specified in First Schedule. Following are the documents or transactions to
which the Act shall not apply −
A will as defined in clause (h) of section 2 of the Indian Succession Act, 1925
including any other testamentary disposition;
Any contract for the sale or conveyance of immovable property or any interest in
such property;
The I.T. Act has brought amendment in four statutes vide section 91-94. These changes
have been provided in schedule 1-4.
The first schedule contains the amendments in the Penal Code. It has widened
the scope of the term "document" to bring within its ambit electronic
documents.
The second schedule deals with amendments to the India Evidence Act. It
pertains to the inclusion of electronic document in the definition of evidence.
International law
Overview
International law consists of rules and principles governing the relations and dealings of
nations with each other, as well as the relations between states and individuals, and
relations between international organizations.
Public international law concerns itself only with questions of rights between several
nations or nations and the citizens or subjects of other nations. In contrast, private
international
law deals with controversies between private persons. These controversies arise out of
situations which have a significant relationship to multiple nations. In recent years the line
between public and private international law has became increasingly uncertain. Issues of
private international law may also implicate issues of public international law, and many
matters of private international law have substantial international significance.
International Law includes the basic, classic concepts of law in national legal systems (i.e.
statutes, property law, tort law, etc). It also includes substantive law, procedural law, due
process, and remedies. The following are major substantive fields of international law:
International economic law
International criminal law is a field of international law that seeks to regulate the behavior
of states, organizations and individuals operating across national boundaries in commission
of international crimes. International criminal law also regulates the commission of grave
crimes occurring on the territory of sovereign states where those crimes constitute
genocide, crimes against humanity, war crimes, or other violations of jus cogens norms.
Diplomatic Law
Diplomatic law is a field of international law concerning the practice of diplomacy, and the
rights and obligations of state representatives on the territory of other states.
International humanitarian law
International human rights law lays down the obligations of Governments to act in certain
ways or to refrain from certain acts, in order to promote and protect human rights and
fundamental freedoms of individuals or groups. One of the great achievements of the
United Nations is the creation of a comprehensive body of human rights law—a universal
and internationally protected code to which all nations can subscribe and all people aspire.
The United Nations has defined a broad range of internationally accepted rights, including
civil, cultural, economic, political and social rights. It has also established mechanisms to
promote and protect these rights and to assist states in carrying out their responsibilities.
Dispute Resolutions
Dispute resolution is a term that refers to a number of processes that can be used to resolve
a conflict, dispute or claim. Dispute resolution may also be referred to as alternative dispute
resolution, appropriate dispute resolution, or ADR for short.
Dispute resolution processes are alternatives to having a court (state or federal judge or
jury) decide the dispute in a trial or other institutions decide the resolution of the case or
contract. Dispute resolution processes can be used to resolve any type of dispute including
family, neighborhood, employment, business, housing, personal injury, consumer, and
environmental disputes.
In addition, the United States Federal Government utilizes dispute resolution processes
to assist government employees and private citizens resolve complaints and disputes in
many areas including workplace, employment, and contracting matters.