Exam Details
Subject | Privacy and Data | |
Paper | ||
Exam / Course | Post Graduate Certificate In Cyber Laws | |
Department | School of Law (SOL) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | December, 2016 | |
City, State | new delhi, |
Question Paper
Explain the following in brief
1. Computer Hacking
2. Phishing
3. E-mail forgery
4. Business Process Outsourcing (BPO).
5. Malicious software.
6. Types of Cyber Crime.
7. Concept of Cyberspace.
8. Information warfare.
9. E-governance.
10. Child pornography.
11. Discuss the tortious remedies available for protection of privacy.
12. Explain the different concepts of electronic monitoring.
13. Discuss the importance of audit trial during audits.
14. Explain the eight principles set out in the Organisation for Economic Cooperation and Development (OECD) Guidelines.
15. What are the security challenges in Cyberspace? Discuss.
16. Explain the technological safeguards to protect minors from cyber crime.
17. What are the three steps which a non-ED Company should take in order to transfer personal information about the ED citizen outside the ED? Discuss.
18. What do you understand by the term 'Information Privacy'? Explain the legal approach with respect to protection of Information privacy in India.
19. Discuss the legal formalities for setting up a BPO in India..
20. Explain the 'concept of hacking. What are the common techniques used for hacking? Discuss.
1. Computer Hacking
2. Phishing
3. E-mail forgery
4. Business Process Outsourcing (BPO).
5. Malicious software.
6. Types of Cyber Crime.
7. Concept of Cyberspace.
8. Information warfare.
9. E-governance.
10. Child pornography.
11. Discuss the tortious remedies available for protection of privacy.
12. Explain the different concepts of electronic monitoring.
13. Discuss the importance of audit trial during audits.
14. Explain the eight principles set out in the Organisation for Economic Cooperation and Development (OECD) Guidelines.
15. What are the security challenges in Cyberspace? Discuss.
16. Explain the technological safeguards to protect minors from cyber crime.
17. What are the three steps which a non-ED Company should take in order to transfer personal information about the ED citizen outside the ED? Discuss.
18. What do you understand by the term 'Information Privacy'? Explain the legal approach with respect to protection of Information privacy in India.
19. Discuss the legal formalities for setting up a BPO in India..
20. Explain the 'concept of hacking. What are the common techniques used for hacking? Discuss.
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Commerce and Cyberspace
- Cyberspace Technology and Social Issues
- Privacy and Data
- Regulation of Cyberspace