The Internet is a global collection of computer networks that are connected together by devices called routers and use a common set of protocols for data transmission called TCP/IP (Transmission Control Protocol/Internet Protocol). The primary objective of the Internet is to facilitate the exchange of information. Many different devices are used on the Internet to make this possible. Some of the more common tools include email, list servers, newsgroups, Telnet, Gopher, FTP, and the World Wide Web. Probably the most popular of all Internet devices is the World Wide Web.
By the end of the century, information, including access to the Internet, will be the basis for personal, economic and political progress. The popular name of the Internet is information superhighway. Whether you want to discover the latest financial news, browse library catalogues, exchange information with colleagues, or engage in a lively political debate, the Internet is the tool that will take you beyond telephones, faxes and isolated computers to an emerging network information area The Internet complements the traditional tools you use to collect information, data graphics, news, and correspond with other people. When used efficiently, the Internet shrinks the world and brings information, expertise and knowledge directly to your computer on almost every topic.
What Is Internet?
Internet links are computer networks spread around the world so that users can share resources and communicate with each other. Some computers have direct access to all features on the Internet, such as universities and other computers, such as those privately owned, have indirect links through a business service provider, which provides some or all of the Internet features. To connect to the Internet, you need to go through service providers. There are many options available with monthly rates. Depending on the option chosen, access times may vary.
We call the Internet Meta Network, that is, a network of networks that is spread all over the world. It is impossible to accurately estimate the number of networks or users involved in the Internet, but this number can easily be found in thousands and millions respectively. The Internet uses a set of standardized protocols that allow the exchange of resources between different types of computers communicating with each other over a network. These standards, sometimes called Internet Protocol Suite, are the rules that developers follow when creating new functions for the Internet. We also call the Internet a distributed system; There is no central collection in it. Technically, no one runs the Internet. Rather, the Internet is made up of thousands of small networks. The Internet thrives and evolves when many of its users discover new ways to create, display, and retrieve the information that makes up the Internet.
History And Development Of The Internet
In its early period, the Internet was conceived by the Department of Defense to protect government communications systems in the event of a military attack. The original network, called Arpanet (named after the advanced research project agency that developed it), developed into a communication channel between contractors, military personnel, and university researchers who were contributing to ARPA projects. This network used a set of standard protocols to create an effective way for these people to communicate with each other and share data. Arpanet’s popularity continued to grow among researchers, and in the 1980’s the National Science Foundation, whose NSFNet connected several high-speed computers, took over the system known as the Internet. By the late 1980’s, thousands of collaborative networks were participating in the Internet. In 1991, the U.S. High Performance Computing Act established NREN (National Research and Education Network). NREN’s goal was to develop and maintain high-speed networks for research and education, and to investigate the commercial uses of the Internet. The rest, as they say, is becoming history. The Internet has improved through the development of services such as Gopher and the World Wide Web. Although the Internet is largely considered a research-oriented network, it is still developing as an informational, creative and business resource every day around the world.
The concept of “Internet” evolved from a program called APRANET, which was developed to conduct defense-related research and maintain communications in the event that computer networks were damaged during combat. The Internet has made tremendous growth. There is no need to emphasize the importance of the Internet. Most people obtain most of their information on topics of contemporary interest through this medium. It plays an important role in shaping the society. It is a powerful instrument, which can be used for the larger interest of the society and also to cause huge harm to the society. It depends on how it is used. Although the phenomenon of the Internet is not as widespread as that of television or radio, since many positive steps have to be taken before it can be accessed, its diversity cannot be underestimated. It is similar to human thought. Since the jurisprudence of pornography and pornography on the Internet has developed mainly in Western countries, it becomes necessary to understand the judicial principles developed by the courts of those countries, which, although not binding the Indian judiciary, certainly shape the law in India. and can provide necessary guidance for adjudication of cases in future.
Civil Remedies In Case Of Obscenity
Civil remedies in case of obscenity can generally be applied in case of defamation. The Code of Civil Procedure, 1908, regulates the law relating to the jurisdiction of civil courts. It provides that in the case of suits filed for compensation for a wrongful act, which is commonly used in a defamation case, the suit may be filed either at the place where the act was committed or where the defendant resides or personally works for profit. And in all other cases suits may be filed either at the place where the defendant resides or personally works for profit or where the cause of the suit arises wholly or partly.
Data Theft And Theft Of Internet Hours
Section 43 (b) of the Indian Technology Act 2000 defines data theft as: Downloading data/information stored in a computer via the Internet (without permission of the owner or any other person in charge of the computer, computer system or computer network). ii. Downloading or extracting copies of any data, computer databases or information from such computer network computer systems. This section makes the affected person liable to pay damages in the form of compensation, not exceeding Rs 1 crore. Section 378 of the IPC defines theft as “Anyone who dishonestly intends to take from the possession of a person any movable property without his consent, transfers that property to take such property, is said to be a stealer”
As regards this definition, it may involve every form of theft with the help of a computer, since computer data/information is movable property and downloading data may be said to transfer property by reference to section 378. Theft of Internet hours refers to using someone else’s Internet hours.
Denial Of Access/Refusal Of Service
A denial of service (DoS) attack occurs when a malicious user attempts to flood a network-connected computer or device with traffic so that that computer or device becomes unavailable. The attack derives its name from its purpose: its purpose is to deprive an institution or company of the ability to provide a service to its users, affiliates or customers. On the Internet, common targets of DoS attacks include corporate websites and email servers, as well as IRCs and other chat servers and hosts. In the FAS network, Harvard’s main router providing Internet service and our UNIX login server/email systems are common goals. This is one of the most common reasons for Harvard’s loss of connection to the Internet and external sites. In many cases where a DoS attack affects FAS networks and systems, the attack occurs from a student’s, faculty’s, or employee’s computer on the network, or from a hacked FAS UNIX account. Usually this happens when a malicious user hacks into the user’s system and installs software there to launch a DoS attack. The legitimate user is prevented from using the services of the computer to which he is legally entitled. Networks are flooded with someone else’s information and keep a legitimate user away from the network. It can disable any organization or any personal computer. Section 43 (f) of the Information Technology Act 2000 provides for penalties for offenders who deny access to a genuine user.
Common Law Of Obscenity In India
This article considers the need to reform the old laws related to obscenity in India. Laws that have been misused to restrict freedom of expression. The law relating to obscenity is described in the Indian Penal Code of 1860. Interestingly, these laws are vestiges of the colonial period and are fundamentally contrary to the constitutional guarantee of freedom of expression. These laws relating to obscenity are inherited directly from British colonialism. A time when Britain experienced a period of what could be called ‘moral radicalization’. A brief study has been made on the current obscenity law of India, the history of that law, the circumstances and inadequacy of the law in which that law entered our statute. In addition, it looks at the laws dealing with pornography in different countries.
The general law relating to obscenity in India is contained in section 292 of the Indian Penal Code, 1860. This section applies to a wide variety of cases and is broad enough to cover all pornographic publications. It is noteworthy here that under the State Amendment (Madhya Pradesh Act, 17, 1999) to Section 320 of the Code of Criminal Procedure, 1973, “obscenity”, which in the context of the amendment would mean either obscene act or use of obscene words, has been made a negotiable offence at the instance of the person against whom the act is committed. On June 9, 2000, the Government of India enacted the Information Technology Act, 2000. However, the preamble indicates that the focal point of the present Act is commerce, yet this Act contains a number of penal provisions. Most relevant to the subject under discussion is section 67.
Thus, section 67 is the first statutory provision dealing with pornography on the Internet. It should be noted that the test for prescribing obscenity is the same under both the Indian Penal Code, 1860 and the Information Technology Act, 2000. Therefore, to determine “obscenity”, it is necessary to understand the broad norms of law laid down by the Court in India. The Indian Penal Code on obscenity evolved from English law, which made the Court the guardian of public morality. While interpreting the meaning of ‘obscenity’, the Courts in India have uniformly adopted the test laid down by the English Court in the Hicklins case. The Courts have clarified that the Hicklins test does not emphasize only sporadic words, as the words are “the subject matter alleged” and to this extent should be considered secundum subjectum materium, i.e., should apply to the booklet in question. Thus, the Court must consider each act at a time.
There is a difference between “obscenity”, “pornography” and “vulgarity”. While obscenity includes pictures, articles etc. whose purpose is to arouse sexual feelings, obscenity includes articles etc. whose purpose is not to arouse sexual feelings, but they definitely have a tendency to arouse sexual feelings. Pornography can evoke feelings of hatred, revulsion, and even boredom, but unlike “pornography” or “obscenity”, it does not have the tendency to corrupt or corrupt a person’s mind. However, this concept of obscenity may vary from country to country depending on contemporary standards of society.
Invention Of Computers And Increasing Use Of The Internet
With the invention of computers and the increasing use of the Internet and its positive impact, a variety of negative effects and international white collar crime have also emerged. Cybercrime is a major challenge facing the legislature and law enforcement agencies as there may be differences between different sectors as to whether the activity in question has taken place, whether it is criminal, who has carried it out, who should investigate it and who should administer justice and punishment These problems can be addressed by enacting laws that are consistent with the requirements for regulating cybercrimes. “Investigating officers, police officers, judges and law enforcement agents should be given special training so that they can understand the subtle and complex nature of cyber law and then assist in bringing justice to victims. There should also be a global consensus among nations on what constitutes cybercrime and when jurisdiction for crime will come so that procedures do not delay the criminal’s prosecution which could lead to injustice.”
Jurisdiction
The ability of the Internet to reach across borders has raised many questions, including questions of legal jurisdiction. Should defendants be brought to a jurisdiction where they had no intention of doing business, despite their websites being accessible? Several recent Court rulings on interstate jurisdiction point to the introduction of a standard for determining whether an institution has “deliberately” directed itself to Internet users in another jurisdiction. At the international level, differing legal approaches between countries exacerbate potential problems. Without international guidelines on recognizing jurisdiction, the risk of local liability can have a detrimental effect on global trade.
As mentioned, pornography on the Internet has both criminal and civil consequences. The measure to be taken by a party will depend essentially on the effect of the act of obscenity. Suppose an offence has been committed and the Court is asked to exercise jurisdiction. Chapter XIII of the Code of Criminal Procedure, 1973, regulates the law relating to the jurisdiction of the courts in respect of investigations and trials. It provides that an offense shall ordinarily be investigated and tried by the court within whose local jurisdiction it was committed. Provided that where the place of the offense is uncertain, that is, if the offense is committed partly in one area and partly in another area, or where it is committed partly in one area but has effect in another area, where it is committed in more than one area, So the offense can be tried by a court having jurisdiction in any such area. In a case where an act becomes an offense by reason of its subsequent consequences, it may be tried either by the court within whose jurisdiction the act was committed or where the consequences occurred. It should be noted that the Indian Penal Code also applies to an offense committed by an Indian citizen outside the territory of India. According to section 75 of the Information Technology Act 2000, there is a penalty for an offence committed outside India by a person of any nationality, irrespective of the country.
Pornography And Freedom Of Expression – Human Rights Characteristics
A recent newspaper article reported that the Indian government had “given up the right to block pornographic websites solely on the grounds of obscenity” Although the author lamented this limitation of the Government’s censorship powers, in reality, the amendments made in October 2009 to the Information Technology (IT) Act, under which the alleged change in the law was made, should come under scrutiny for exactly the opposite reason: these amendments actually increase the possibility of government interference in privacy and freedom. While these amendments are generally reasonable and indeed close to the constitutional standards established in the United States on the subject, an in-depth look at the amendments of the IT Act should make those who are concerned about the possibility of increased government powers being abused and arbitrarily used to limit freedom of expression In particular, if indeed, as claimed in the article, the amendments ensure that the Government can no longer ban websites for obscenity, and that only the judiciary can do so pursuant to the prosecution of a case under the Act, then this change is a positive development. Such a change would ensure that some form of due process would be provided to the accused person before a site was banned.
However, inspecting the text of the amendments provides less assurance than interpreting the article. According to the relevant section 69 of the amended Act, a Central Government official may “interrupt, monitor or decrypt” any information from any computer source (including websites), if “the sovereignty or integrity of India, the defence of India, the security of the State, the Be necessary “in the interest of friendly relations or public order with foreign States or to prevent incitement to any cognizable offence related to the above or to investigate any offence” (emphasis added). Similarly, the newly added Section 69-A empowers the Central Government to “prevent from the public access” information contained in any computer resource if it is “in the interests of the sovereignty or integrity of India, the defence of India, the security of the State, friendly relations with foreign States or public order or to prevent incitement to any cognizable offence related to the above” Be necessary (emphasis added). The previous version of the IT Act also had a similar definition, except that the last part of the definition only stated “to prevent incitement to a cognizable offence”, while the part “relating to the above or to the investigation of an offence” was not written.
Protection By The First Amendment Of The Constitution
The primary concern of the United States Courts has been to protect the freedoms afforded by the First Amendment to the U.S. Constitution. The First Amendment places a blanket ban on the deprivation of freedom of expression, placing a heavy burden on anyone who violates the right to justify a violation. Since there were no exceptions to the constitutional provision, these had to be developed by judicial decisions. Courts are grappling with the problem of striking a balance between the right of individual expression and the way in which that right is exercised. The aim has been to arrive at a decision that protects “quality of life”, without making the “narrow mind” the dominant feature of an open society or making the unwilling recipient of information the arbiter of vetoing or restricting freedom of expression. Similarly, in the areas of commercial speech it was recognized that the Government could ban forms of communication that were more likely to deceive the public than to inform them and could ban commercial speech about illegal activity.
In the case of Chaplinsky v. New Hampshire, the Courts recognized “obscenity” as an exception to the “freedom of expression” granted by the U.S. Constitution. Although the reference to this case was a “spoken word”, its significance lay in the recognition of obscenity as an exception to the full freedoms granted by the U.S. Constitution. However, in the case of Roth v. United States the Supreme Court dealt directly with the issue of “obscenity” as an exception to freedom of expression. The case concerned the constitutionality of 18 U.S.C. 1461, which made it punishable to send any material such as “obscene, erotic, lewd or other publications of a dirty and indecent nature”. While upholding the constitutional validity of the aforementioned Code the Court stated that “obscenity does not fall within the scope of constitutionally protected freedom of expression or of the press, whether under (1) the First Amendment with respect to the federal government, or (2) the Due Process Clause of the Fourteenth Amendment with respect to the states” The Court further held that the rejection of “obscenity” was implicit in the First Amendment. Sex and pornography were not considered synonymous with each other. Only those sex-related material with a tendency to “stimulate sexuality” were considered pornographic. According to the Supreme Court, obscenity must be assessed from the perspective of an average person, applying contemporary community standards.
Protection Of Minors
Internet safety tips for kids
- Do not give personal information such as your address, telephone number, parent’s office address or telephone number, or your school name and location to anyone.
- If you find something online that makes you feel uncomfortable, tell your parents right away.
- Never agree to meet someone you “meet” online without your parents’ permission. If they allow the meeting, make sure it is in a public place and that you bring your parents along.
- Never send your photos or any other personal content to a friend you’ve met online without first telling your parents.
- Never respond to messages or content published on a bulletin board that are obscene, offensive, threatening, or make you feel uncomfortable. Give a copy of such messages to your parents.
- Follow the rules set by your parents to go online and don’t enter other areas or violate these rules without their permission.
- Don’t download anything from someone you don’t know.
Congress had passed the Child Internet Safety Act (CIPA) in 2000 to address concerns surrounding children’s access to pornographic or harmful content on the Internet. CIPA imposes certain needs on schools or libraries that receive discounts on Internet access or internal connections through the e-rate program. It is a program that makes certain communication services and products affordable for eligible schools and libraries. In early 2001, the FCC issued regulations implementing CIPA and updated those regulations in 2011.
The moral health of children has always been and will continue to be a major concern. Courts in every jurisdiction are constantly making efforts to protect minors from the harmful effects of pornographic material on the Internet. The Child Pornography Acts have consistently been regarded as an exception to every constitutional freedom and the Courts and legislators have developed various concepts to prevent it from flourishing.
However, it must always be remembered that the goal must always be to strike the right balance between the protection of minors and the interests of adults. At this juncture, the observations of the Supreme Court of the United States in the Prince vs. Massachusetts case are noteworthy:
Internet Safety Tips For Parents
- Find out what information your computer service provider provides and whether you can block offensive content.
- If possible, consider using a pseudonym or removing your child’s name from the list. Avoid using online profiles.
- Do not allow a child to have a meeting with another computer user without permission. Go to any meeting with the child.
- Don’t let your child respond to obscene, vulgar, or threatening messages. Forward such messages to your Internet Service Provider (ISP).
- If you’re aware of any online child pornography, call the National Center for Missing and Exploited Children (1-800-843-5678).
- Never give personal information about yourself or your child.
- Place the computer in your family room where you can monitor your child’s movements.
- Share an email account with your child so you can keep track of his or her mail.
- Spend as much time as you can online to teach your kids proper behavior and rules.
- Don’t let your kids go to private chat rooms alone.
- Keep track of your credit card bills for payments on porn sites.
- Consider using an online service that has specialized child accounts and limited access to chat rooms and the Internet.
“It is imperative for us that the care, protection and upbringing of the child be held first and foremost by the parents, whose primary task and independence is to prepare for obligations that the State can neither fulfil nor impede” Furthermore, there should be no insistence on creating a standard in which the author should always bear in mind that the child should not be exposed to sexual relations, since that would require him to write only about adolescents and not adults.
Read Also:
- Children Smartphone Launched! ‘Wrong On The Internet ’ Will Save Things From This AI Mobile
- Internet Fraud And International Organized Crime
- Guidelines For Safe Internet Browsing
- Internet Crime Prevention Tips
- Internet Will Be Available Through Satellite In The Country, Agreement Between Spacex And Airtel
- Musk Satellite-Based Starlink Internet Launched In Bangladesh: No Need For Cable And Fiber; 300mbps Speed And Unlimited Data For ₹3000
- Telecom Ministry Approves Musk Company: Starlink Will Provide High Speed Satellite Internet In India, Unlimited Data For A Month For ₹840
- Possibilities of Internet Blog in Education
- Internet Users To Have Access To Made In India Web Browser: Indian Company Zoho To Produce It, Could Give Google And Microsoft A Run For The Money






