0% found this document useful (0 votes)
27 views7 pages

Digital Law

The document discusses digital law, also known as information technology law, which governs the use and impact of digital technologies, including the Internet and artificial intelligence. It outlines the rights and responsibilities of digital citizens, the historical development of digital law, key areas such as data protection, cybersecurity, and intellectual property, as well as the benefits and challenges facing digital law today. The paper emphasizes the importance of effective regulation and the need for international cooperation to address the complexities of the digital landscape.

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views7 pages

Digital Law

The document discusses digital law, also known as information technology law, which governs the use and impact of digital technologies, including the Internet and artificial intelligence. It outlines the rights and responsibilities of digital citizens, the historical development of digital law, key areas such as data protection, cybersecurity, and intellectual property, as well as the benefits and challenges facing digital law today. The paper emphasizes the importance of effective regulation and the need for international cooperation to address the complexities of the digital landscape.

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

International Journal of Trend in Scientific Research and Development (IJTSRD)

Volume 9 Issue 3, May-Jun 2025 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470

Digital Law
Paul A. Adekunte1, Matthew N. O. Sadiku2, Janet O. Sadiku3
1
International Institute of Professional Security, Lagos, Nigeria
2
Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX, USA
3
Juliana King University, Houston, TX, USA

ABSTRACT How to cite this paper: Paul A.


Digital law, which is also known as “information technology law (IT Adekunte | Matthew N. O. Sadiku | Janet
law)“ or “information, communication and technology law (ICT O. Sadiku "Digital
law)” or “cyberlaw,” is the legal framework that governs the use and Law" Published in
International Journal
the impact of information technology, including the Internet,
of Trend in
software, and artificial intelligence. This focuses and addresses the Scientific Research
legal implications of online activities, digital assets, and the digital and Development
economy, seeking to ensure a safe and responsible online (ijtsrd), ISSN: 2456- IJTSRD80003
environment. Just as citizens in a society have certain rights and 6470, Volume-9 |
responsibilities, so do digital citizens in the online world also have Issue-3, June 2025, pp.429-435, URL:
certain rights and responsibilities. Digital citizens can enjoy rights of www.ijtsrd.com/papers/ijtsrd80003.pdf
privacy, security, access and inclusion, freedom of expression, etc.
With these rights come certain responsibilities, such as ethics and Copyright © 2025 by author (s) and
empathy in order to ensure a safe and responsible digital environment International Journal of Trend in
Scientific Research and Development
for all. This paper examines the pros and cons to the issue of digital
Journal. This is an
law and its implications to humanity in general. Open Access article
KEYWORDS: Digital law, digital assets, digital economy, ethics, distributed under the
empathy, privacy, security, artificial intelligence (AI), blockchain, terms of the Creative Commons
Attribution License (CC BY 4.0)
quantum computing (http://creativecommons.org/licenses/by/4.0)

1. INTRODUCTION
The digital environment has become so complex an common and continental law and international law.
environment, more especially in terms of rights and Some important areas covered include information
responsibilities of users. Therefore, there arises the and data, communication, and information
need for digital citizens to also be aware and to technology, both software and hardware and technical
understand their own online rights and communications technology, as well as coding and
responsibilities, so as not to infringe the rights and protocols [2], as shown in Figures 3 and 4.
responsibilities of others as well. As good as the
HISTORY OF DIGITAL LAW
internet is, it can also be a destructive weapon when Digital law, also known as “legal informatics,” is said
users’ rights are impeded or if users are not given the to have its roots in the intersection of law and
opportunity to establish any rights whatsoever, as technology. A brief overview of its’ early
shown in Figures 1 and 2. developments are as follows [3]:
Therefore, the individual users, governments,  Printed legal information (15th-20th centuries):
industry, and public institutions have an obligation to In this case, the advent of printing technology
maintain the integrity of the Internet community, not enabled the mass production of legal texts,
withstanding whether it has local or international transforming the dissemination of legal
effects [1]. information. This period saw the development of
indexed court reports, compiled statutes, and
IT law is concerned with the juridical regulation of
annotated laws.
information technology, its possibilities and the
consequences of its use, including computing,  LEXIS (1970s): The introduction of LEXIS, a
software coding, artificial intelligence, the internet computer-based federal tax library, marked the
and virtual worlds. This field of law comprises beginning of digital law. This innovation
elements of various branches of law, originating revolutionized legal research and paved the way
under various acts or statutes of parliaments, the for modern digital law systems.

@ IJTSRD | Unique Paper ID – IJTSRD80003 | Volume – 9 | Issue – 3 | May-Jun 2025 Page 429
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
Furthermore, some other key milestones include: to computers and networks [8], as shown in
 CD-ROM and Wide Area Networks (1980s- Figure 5.
1990s): The development of CD-ROM
3. Intellectual Property Law or Rights: This
technology and Wide Area Networks further
covers the protection of digital content, software,
accelerated the growth of digital law, enabling
and innovations (i. e. copyrights, trademarks, and
faster access to legal information.
trade secrets in the digital realm).
 Internet and Online Platforms (1990s-present):
 Digital Millennium Copyright Act (DMCA) –
The widespread adoption of the internet and
USA (1998): This protects copyrighted digital
online platforms has transformed the legal
material and implements WIPO treaties [9].
landscape, enabling global access to legal
information and facilitating digital  WIPO Copyright Treaty (1996): An
communication. international treaty on copyright and related rights
in the digital environment [10], as shown in
All of these have impacted increased accessibility,
Figures 6 - 8.
multimedia integration and global connectivity of
digital law. 4. E-Commerce and Digital Contracts: Regulates
online transactions, digital signatures, and
Adams Crymble showcased and explored the
consumer protection.
intersection of technology and historical research
within the broader field of the digital humanities via  UNCITRAL Model Law on electronic
digital historical research, the history of mass Commerce (1996): It provides a legal framework
digitization, the influence of technology on historical for electronic commerce [11].
curricula, and the role of blogs in outreach and  Electronic Signatures in Global and National
academic writing [4]. Commerce Act (E-SIGN Act) – USA (2000):
OVERVIEW AND KEY CONCEPTS OF Legalizes electronic signatures in transactions
DIGITAL LAW [12].
Digital law is defined as the legal principles and 5. AI and Emerging Technologies: Digital law is
regulations that govern the use of digital technologies, expanding to include regulation of artificial
the Internet, and electronic communication. It covers intelligence, big data, and blockchain.
a broad range of issues including data privacy,
cybersecurity, intellectual property, digital contracts,  EU Artificial Intelligence Act (Proposed 2021):
and cybercrime. It aims to regulate AI systems based on risk [13].
The key areas of digital law include:  Digital Services Act (DSA) & Digital Markets
1. Data Protection and Privacy: The laws in this Act (DMA) – EU (2022): Regulates digital
area regulate how personal data is collected, platforms and ensures fairness in digital markets
stored, processed, and shared. [14].
 General Data Protection Regulation (GDPR) – 6. Freedom of Expression and Censorship: Deals
EU (2016): This is a comprehensive privacy law with the balance between freedom of speech and
that strengthens data protection for individuals in regulation online. This has to do with hate speech,
the European Union [5]. defamation, Government censorship, and platform
moderation [15, 16].
 California Consumer Privacy Act (CCPA) –
USA (2018): The Act gives California residents 7. Digital Accessibility and Inclusion: This ensures
rights over their personal data [6]. equal access to digital technologies for all users,
including those with disabilities. The key
2. Cybercrime and Cybersecurity Law: These elements are:
laws address offenses involving digital  Web Content Accessibility Guidelines (WCAG)
technologies, such as hacking, phishing, identity  Assistive technologies
theft, cyberstalking, harassment, cyberterrorism,  Inclusion mandates [17, 18].
and malware distribution.
8. Digital Ethics and Responsibility: Covers the
 Budapest Convention on Cybercrime (2001): ethical use of technology, including AI and big
First international treaty to address internet and data. The key elements are:
computer crime [7].  Ethical algorithms
 Computer Fraud and Abuse Act (CFAA) –  Fair data practices
USA (1986): It criminalizes unauthorized access  Bias in AI systems [19, 20].

@ IJTSRD | Unique Paper ID – IJTSRD80003 | Volume – 9 | Issue – 3 | May-Jun 2025 Page 430
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
9. Jurisdiction and Digital Sovereignty: This 4. Rapid technological Change: Laws often lag
determines which laws apply in cross-border behind fast-moving technologies like AI,
digital issues. The key elements are: blockchain, and quantum computing [40, 41].
 Cross-border data transfer 5. Ethical and Moral Dilemmas: Digital law
 Conflicts of law in digital crimes struggles to keep up with ethical concerns around
 Internet governance [21, 22]. AI, surveillance, and online behavior [42, 43].
10. Digital Evidence and Forensics: This concerns 6. Intellectual Property (IP) Violations: Digital
the handling of digital data in legal proceedings. piracy, content theft, and IP Infringement are
The key element are: widespread and hard to control [9, 10].
 Collection and authentication of digital evidence 7. Digital Divide and Accessibility: Not all
 Chain of custody populations have equal access to technology,
 Admissibility in court [23, 24]. which affects enforcement and fairness of digital
BENEFITS OF DIGITAL LAW laws [44, 45].
Digital law plays a significant role in governing the 8. Misinformation and Online Harms: Legal
use of technology, data, and digital platforms. It also systems struggle with regulating harmful content
ensures the security, fairness, innovation, and like fake news, hate speech, and online
accountability in the digital environment, as shown in harassment [46, 47].
Figure 9. Some of its key benefits are the: 9. Lack of Global Standards: Inconsistent digital
1. Protection of Privacy and Personal Data [25, 26]. laws between countries lead to confusion and
2. Cybersecurity and Crime Prevention [7, 27]. loopholes [31, 32].
3. Intellectual Property Protection [10, 28]. 10. Digital Sovereignty and Control: Nations are
4. Enabling E-Commerce and Digital Contracts [11, increasingly seeking to assert control over their
12]. own digital infrastructure, leading to “splinternet”
5. Enhancing Digital Inclusion and Accessibility risks [48].
[17, 18]. CONCLUSION
6. Regulation of Online Behavior [29, 30]. The digital law should be far more effectively and
7. Supporting Innovation and Technological Growth equitably distributed – to ensure the fair and just
[19, 20]. application of laws and regulations in the digital
8. International Cooperation and Harmonization [31, world (bridging the digital divide); should be colorful,
32]. tuneful, even noisy, and capable of movement and
9. Accountability and Transparency for Digital interaction (i. e. fully communicative); should be
Platforms [33, 34]. characterized by flatter administrative agencies – with
less top down control, delay, and rigidity, but greater
10. Empowerment of Digital Citizens [35]. consistency (i.e. reduced bureaucracy) and; offer both
CHALLENGES FACING DIGITAL LAW greater opportunity and greater influence for those
The implementation and enforcement of digital law working in artificial intelligence and the law.
face numerous challenges due to the rapid evolution Undoubtedly, digital law has transformed the legal
of technology, differing legal systems, and the global landscape, offering numerous benefits and
nature of digital interactions. Some of the key opportunities for growth, amongst which are
challenges are: increased accessibility, efficient research, and global
1. Jurisdictional Issues: The challenge is due to the connectivity. With the integration of emerging
fact that internet transcends national borders, technologies like AI, blockchain, and IoT it will
making it difficult to determine which country’s continue to shape the legal landscape. The ensuring of
laws apply in cross-border digital activities [7, security and integrity of digital legal information will
36]. be crucial, and as well as promoting digital literacy
among both legal professionals and citizens will be
2. Enforcement difficulties: The challenge is that
essential for navigating the digital legal landscape.
the tracking and prosecuting of offenders is hard
due to anonymity, encryption, and lack of More information on digital law can be found in the
international cooperation [37, 38]. books in [50-52] and the following related journals:
 Journal of Digital Technologies and Law
3. Data Privacy and Protection: Challenge is
 Journal of Law and Sustainable Development
balancing user privacy with business interests and
 International Journal of Digital Law and
government surveillance [26, 39].
Governance

@ IJTSRD | Unique Paper ID – IJTSRD80003 | Volume – 9 | Issue – 3 | May-Jun 2025 Page 431
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
REFERENCES [25] D. J. Solove (2006), A taxonomy of privacy,
[1] ”Rights and responsibilities – Education – The University of Pennsylvania Law Review, vol.
Council of Europe,” https://www.coe.int/rights- 154, no. 3.
and-responsibilities
[26] GDPR Regulation (EU) 2016/679
[2] “Information technology law,” Wikipedia, the
[27] D. S. Wall (2007), Cybercrime: The
free encyclopedia,
transformation of crime in the information age.
https://en.m.wikipedia.org/information-
technology-law [28] P. Samuelson (1999), Copyright and digital
libraries, Communications of the ACM
[3] S. Lonskaya (2024), “Digital history of law:
Principles of methodology,” Journal of Digital [29] T. Gillespie (2018), Custodians of the Internet
technologies and Law. [30] UK Online Safety Act (2023)
[4] A. Crymble (2021), “Technology and the [31] International Telecommunication Union (ITU)
historian, topics in the digital humanities,” – Global Cybersecurity Index
Champaign: University of lllinois Press.
[32] UNODC – Cybercrime repository
[5] European Parliament (2016), Regulation (EU)
2016/679. [33] EU Digital Services Act (2022)
[6] California Legislative Information (2018), [34] F. Pasquale (2015), The Black Box Society: The
California Consumer Privacy Act (CCPA). Secret Algorithms that control money and
information
[7] Council of Europe (2001), ETS No. 185 –
Convention on Cybercrime. [35] M. Ribble (2011), Digital Citizenship in
Schools: Nine Elements all Students Should
[8] United States Code, Title 18, Section 1030. Know
[9] U. S. Copyright Office (1998), Digital [36] B. J. Koops & M. Goodwin (2014),
Millennium Copyright Act. Cyberspace, jurisdiction and the new world
[10] World Intellectual Property Organization order: Mapping the discussion, Tilburg Law
(1996). School Legal Studies Research Paper Series.
[11] United Nations Commission on International [37] S. Brenner (2006), Cybercrime jurisdiction,
Trade Law (UNCITRAL) (1996). crime, law and social change, vol. 46, no. 3.
[12] U. S. Congress (2000), 15 U. S. C. Chapter 96. [38] Interpol’s Global Cybercrime Strategy (source)
[13] European Commission (2021), Proposal for a [39] P. M. Schwartz & D. J. Solove (2011), The PII
Regulation on Artificial Intelligence. problem: Privacy and a new concept of
personally identifiable information, NYU Law
[14] European Parliament and Council (2022).
Review.
[15] First Amendment of the U. S. Constitution
[40] European Parliament (2021), AI and civil
(contextual).
liability
[16] International Covenant on Civil and Political
[41] C. Kuner et al. (2012), The challenge of “big
Rights (ICCPR).
data” for data protection law, International
[17] Americans with Disabilities Act (ADA). Data Privacy Law, vol. 2, no. 2.
[18] UN Convention on the Rights of Persons with [42] OECD (2019), OECD Principles on Artificial
Disabilities Intelligence
[19] OECD Principles on AI. [43] UNESCO (2021), Recommendation on the
[20] EU AI Act (2024). Ethics of Artificial Intelligence

[21] General Principles of Private International Law [44] UN Digital Inclusion Strategy (2021)

[22] Cloud Act (USA). [45] World Bank (2020), Digital Dividends

[23] Federal Rules of Evidence (USA). [46] UK Online Safety Bill (2023)

[24] ISO/IEC 27037 (Guidelines for digital [47] T. Gillespie (2018), Custodians of the Internet:
evidence). Platforms, content moderation, and the hidden
decisions that shape social media.

@ IJTSRD | Unique Paper ID – IJTSRD80003 | Volume – 9 | Issue – 3 | May-Jun 2025 Page 432
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
[48] R. Deibert (2019), The geopolitics of ELt75UNddFGCVA:1747174036782&q=IMAGES
cybersecurity, Journal of International Affairs. +of+digital+law+by+wikipedia&udm=2&fbs=ABz
OT_CWdhQLP1FcmU5B0fn3xuWpAdk4wpBWO
[49] Internet Governance Forum (IGF)
GsoR7DG5zJBpcx8kZB4NRoUjdgt8WwoMvlShZ
[50] P. W. Martin, Digital law: Some speculations UHgaGO_QEjdLI1_v2RImbt6yuaihSiBTX0oWDE
on the future of legal information technology, qMwfVr6_DPkAb076czEChEBXO1nXHkLl2doE5
NCAIR Sponsored Program on the Future of 9WhMOILr7UQGkFgdTkLuuLWPcS7q_Dywt7RT
Legal Information Technology, May 1995. 32Up0ycFybfMmZL7U0FiU2DVtwqE2HcKa9MB
[51] A. Murray, Information Technology Law: The mQQ&sa=X&ved=2ahUKEwiM2MquqGNAxVw
Law and Society. RPEDHbDlBXAQtKgLegQIFRAB&biw=1036&bi
h=539#vhid=5jgAlNQtv1GM0M&vssid=mosaic
[52] L. Lessig, Code and Other Laws of Cyberspace

Figure 1. Information Age


Source:https://www.google.com/search?sca_esv=50
22dfc098ad2113&sxsrf=AHTn8zpAu_CJT9_QX1z
ELt75UNddFGCVA:1747174036782&q=IMAGES
+of+digital+law+by+wikipedia&udm=2&fbs=ABz
OT_CWdhQLP1FcmU5B0fn3xuWpAdk4wpBWO
GsoR7DG5zJBpcx8kZB4NRoUjdgt8WwoMvlShZ
UHgaGO_QEjdLI1_v2RImbt6yuaihSiBTX0oWDE
qMwfVr6_DPkAb076czEChEBXO1nXHkLl2doE5
9WhMOILr7UQGkFgdTkLuuLWPcS7q_Dywt7RT
Figure 3. Digital Law Journal
32Up0ycFybfMmZL7U0FiU2DVtwqE2HcKa9MB
Source:https://www.google.com/search?sca_esv=50
mQQ&sa=X&ved=2ahUKEwiM2MquqGNAxVw
RPEDHbDlBXAQtKgLegQIFRAB&biw=1036&bi 22dfc098ad2113&sxsrf=AHTn8zpAu_CJT9_QX1z
ELt75UNddFGCVA:1747174036782&q=IMAGES
h=539#vhid=kWerjgyRaztcQM&vssid=mosaic
+of+digital+law+by+wikipedia&udm=2&fbs=ABz
OT_CWdhQLP1FcmU5B0fn3xuWpAdk4wpBWO
GsoR7DG5zJBpcx8kZB4NRoUjdgt8WwoMvlShZ
UHgaGO_QEjdLI1_v2RImbt6yuaihSiBTX0oWDE
qMwfVr6_DPkAb076czEChEBXO1nXHkLl2doE5
9WhMOILr7UQGkFgdTkLuuLWPcS7q_Dywt7RT
32Up0ycFybfMmZL7U0FiU2DVtwqE2HcKa9MB
mQQ&sa=X&ved=2ahUKEwiM2MquqGNAxVw
RPEDHbDlBXAQtKgLegQIFRAB&biw=1036&bi
h=539#vhid=Og17CYhx9_w_iM&vssid=mosaic

Figure 2. Freedom of information


Source:https://www.google.com/search?sca_esv=50
22dfc098ad2113&sxsrf=AHTn8zpAu_CJT9_QX1z

@ IJTSRD | Unique Paper ID – IJTSRD80003 | Volume – 9 | Issue – 3 | May-Jun 2025 Page 433
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470

Figure 6. Digital Millennium Copyright Act


Source:https://www.google.com/search?sca_esv=50
22dfc098ad2113&sxsrf=AHTn8zpAu_CJT9_QX1z
ELt75UNddFGCVA:1747174036782&q=IMAGES
Figure 4. Digital rights +of+digital+law+by+wikipedia&udm=2&fbs=ABz
Source:https://www.google.com/search?sca_esv=50 OT_CWdhQLP1FcmU5B0fn3xuWpAdk4wpBWO
22dfc098ad2113&sxsrf=AHTn8zpAu_CJT9_QX1z GsoR7DG5zJBpcx8kZB4NRoUjdgt8WwoMvlShZ
ELt75UNddFGCVA:1747174036782&q=IMAGES UHgaGO_QEjdLI1_v2RImbt6yuaihSiBTX0oWDE
+of+digital+law+by+wikipedia&udm=2&fbs=ABz qMwfVr6_DPkAb076czEChEBXO1nXHkLl2doE5
OT_CWdhQLP1FcmU5B0fn3xuWpAdk4wpBWO 9WhMOILr7UQGkFgdTkLuuLWPcS7q_Dywt7RT
GsoR7DG5zJBpcx8kZB4NRoUjdgt8WwoMvlShZ 32Up0ycFybfMmZL7U0FiU2DVtwqE2HcKa9MB
UHgaGO_QEjdLI1_v2RImbt6yuaihSiBTX0oWDE mQQ&sa=X&ved=2ahUKEwiM2MquqGNAxVw
qMwfVr6_DPkAb076czEChEBXO1nXHkLl2doE5 RPEDHbDlBXAQtKgLegQIFRAB&biw=1036&bi
9WhMOILr7UQGkFgdTkLuuLWPcS7q_Dywt7RT h=539#vhid=0TZsA88Pp-LU2M&vssid=mosaic
32Up0ycFybfMmZL7U0FiU2DVtwqE2HcKa9MB
mQQ&sa=X&ved=2ahUKEwiM2MquqGNAxVw
RPEDHbDlBXAQtKgLegQIFRAB&biw=1036&bi
h=539#vhid=aYhSMfVkts15EM&vssid=mosaic

Figure 5. Cybercrime
Source:https://www.google.com/search?sca_esv=50
22dfc098ad2113&sxsrf=AHTn8zpAu_CJT9_QX1z
ELt75UNddFGCVA:1747174036782&q=IMAGES
+of+digital+law+by+wikipedia&udm=2&fbs=ABz Figure 7. Cyber rights
OT_CWdhQLP1FcmU5B0fn3xuWpAdk4wpBWO Source:https://www.google.com/search?sca_esv=50
GsoR7DG5zJBpcx8kZB4NRoUjdgt8WwoMvlShZ 22dfc098ad2113&sxsrf=AHTn8zpAu_CJT9_QX1z
UHgaGO_QEjdLI1_v2RImbt6yuaihSiBTX0oWDE ELt75UNddFGCVA:1747174036782&q=IMAGES
qMwfVr6_DPkAb076czEChEBXO1nXHkLl2doE5 +of+digital+law+by+wikipedia&udm=2&fbs=ABz
9WhMOILr7UQGkFgdTkLuuLWPcS7q_Dywt7RT OT_CWdhQLP1FcmU5B0fn3xuWpAdk4wpBWO
32Up0ycFybfMmZL7U0FiU2DVtwqE2HcKa9MB GsoR7DG5zJBpcx8kZB4NRoUjdgt8WwoMvlShZ
mQQ&sa=X&ved=2ahUKEwiM2MquqGNAxVw UHgaGO_QEjdLI1_v2RImbt6yuaihSiBTX0oWDE
RPEDHbDlBXAQtKgLegQIFRAB&biw=1036&bi qMwfVr6_DPkAb076czEChEBXO1nXHkLl2doE5
h=539#vhid=inLNZ6oc9JIYmM&vssid=mosaic 9WhMOILr7UQGkFgdTkLuuLWPcS7q_Dywt7RT

@ IJTSRD | Unique Paper ID – IJTSRD80003 | Volume – 9 | Issue – 3 | May-Jun 2025 Page 434
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
32Up0ycFybfMmZL7U0FiU2DVtwqE2HcKa9MB
mQQ&sa=X&ved=2ahUKEwiM2MquqGNAxVw
RPEDHbDlBXAQtKgLegQIFRAB&biw=1036&bi
h=539#vhid=L9HAvINlb2ACaM&vssid=mosaic

Figure 8. Intellectual property Figure 9. Computer security.


Source:https://www.google.com/search?sca_esv=50 Source:https://www.google.com/search?sca_esv=50
22dfc098ad2113&sxsrf=AHTn8zpAu_CJT9_QX1z 22dfc098ad2113&sxsrf=AHTn8zpAu_CJT9_QX1z
ELt75UNddFGCVA:1747174036782&q=IMAGES ELt75UNddFGCVA:1747174036782&q=IMAGES
+of+digital+law+by+wikipedia&udm=2&fbs=ABz +of+digital+law+by+wikipedia&udm=2&fbs=ABz
OT_CWdhQLP1FcmU5B0fn3xuWpAdk4wpBWO OT_CWdhQLP1FcmU5B0fn3xuWpAdk4wpBWO
GsoR7DG5zJBpcx8kZB4NRoUjdgt8WwoMvlShZ GsoR7DG5zJBpcx8kZB4NRoUjdgt8WwoMvlShZ
UHgaGO_QEjdLI1_v2RImbt6yuaihSiBTX0oWDE UHgaGO_QEjdLI1_v2RImbt6yuaihSiBTX0oWDE
qMwfVr6_DPkAb076czEChEBXO1nXHkLl2doE5 qMwfVr6_DPkAb076czEChEBXO1nXHkLl2doE5
9WhMOILr7UQGkFgdTkLuuLWPcS7q_Dywt7RT 9WhMOILr7UQGkFgdTkLuuLWPcS7q_Dywt7RT
32Up0ycFybfMmZL7U0FiU2DVtwqE2HcKa9MB 32Up0ycFybfMmZL7U0FiU2DVtwqE2HcKa9MB
mQQ&sa=X&ved=2ahUKEwiM2MquqGNAxVw mQQ&sa=X&ved=2ahUKEwiM2MquqGNAxVw
RPEDHbDlBXAQtKgLegQIFRAB&biw=1036&bi RPEDHbDlBXAQtKgLegQIFRAB&biw=1036&bi
h=539#vhid=wSvTvFBLbTku5M&vssid=mosaic h=539#vhid=DevOYfyGGcQnyM&vssid=mosaic

@ IJTSRD | Unique Paper ID – IJTSRD80003 | Volume – 9 | Issue – 3 | May-Jun 2025 Page 435

You might also like