0% found this document useful (0 votes)
106 views2 pages

Cyber Law Assignment Guidelines

The document outlines the requirements for two assignments on cyber law. The first assignment requires students to identify a topic in cyber law, provide a problem statement explaining why they chose the topic, and include an annotated bibliography of at least 10 sources from the last 10 years. The annotated bibliography must include the bibliographic citation and a brief summary of each source. The second assignment builds upon the first, requiring a title, research methodology, objectives, description, and conclusion analyzing the topic based on the problem statement and sources from the first assignment. Both assignments must follow Blue Book citation style and include footnotes.

Uploaded by

sartak singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views2 pages

Cyber Law Assignment Guidelines

The document outlines the requirements for two assignments on cyber law. The first assignment requires students to identify a topic in cyber law, provide a problem statement explaining why they chose the topic, and include an annotated bibliography of at least 10 sources from the last 10 years. The annotated bibliography must include the bibliographic citation and a brief summary of each source. The second assignment builds upon the first, requiring a title, research methodology, objectives, description, and conclusion analyzing the topic based on the problem statement and sources from the first assignment. Both assignments must follow Blue Book citation style and include footnotes.

Uploaded by

sartak singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

CYBER LAW- 8th SEMESTER

INTERNALS

ASSIGNMENT -I

I. Title of the paper

II. Problem statement - (Grey area in the topic which made you choose the topic)

III. Annotated Bibliography (minimum 10 to be referred)

(Please try to limit your research to last 10 years of relevant literature)

Example of Annotated Bibliography:

List of literature referred year wise:

1. Azam, M. Monirul and Chowdhury, Abdul Hamid, IP Enforcement Mechanisms to Combat


Piracy: The Context of Software Piracy (December 21, 2006). Asian Journal of International
law, Vol. 3 • Issue 1-2 • January-December 2008.

Software piracy, the unauthorized duplication and distribution of software, is a worldwide problem
that is growing at an epidemic pace. In this paper the author attempt to define software piracy and its
global scenario. Outlined the causes of piracy, the debate between the free software and software
protection and the legal mechanisms to curb software piracy at the international, regional and national
levels. The alternative measures to tackle the software piracy are mentioned and other international and
national legal measures are discussed.

2. Peltz-Steele, Richard J., Global Warming Trend? The Creeping Indulgence of Fair Use in
International Copyright Law (2009). Texas Intellectual Property Law Journal, Vol. 27, No.
267, 2009.

Discusses about internationalization of copyright law would threaten the freedom of expression if some
doctrine akin to U.S. “fair use” were not established as an international legal norm. This paper analyzes
research and legal developments since that article to determine how the present state of the “fair use”
concept in international copyright law differs from its state in 2000.

3. Gupta, Aditya, The Scope of Online Service Providers’ Liability for Copyright Infringing
Third Party Content under the Indian Laws – The Road Ahead. JIPR Vol.15(1) [January 2010]

The issue of liability of online service providers (OSPs) for third party content is one of the most
contentious issues in the realm of cyber law. Different jurisdictions around the world have dealt with
the issue either through legislative provisions or judicial pronouncements. Until recently, the legal
position in India was nebulous and vague especially with respect to liability for copyright infringing
third party content. The Information Technology (Amendment) Act, 2008 has significantly clarified the
scope of immunities available to intermediaries. Unlike the immunities under the old IT Act, these
immunities are not only available with respect to offences under the IT Act, 2000 but even for the
liabilities arising under any law.

(Explaining the article in brief in your own words)


ASSIGNMENT -II

The 2nd assignment will be based on the problem statement & list of literature of 1st
assignment.

 TITLE

 RESEARCH METHODOLOGY

 OBJECTIVES

 DESCRIPTION

 CONCLUSION ( Including your analysis)

Please follow Blue Book citation in all your assignments. Marks will be deducted
on not adhering to the guidelines. Footnoting is must.

You might also like