The police suspects Rana of aiding terrorists by arranging safe house and finance. The Police has realized that Rana has several e-mail accounts and operates those e-mail accounts using aliases. The police wants to access the e-mail messages being sent and received by Rana to confirm its suspicion. Select the most appropriate method which may be used by the police to access Rana's e-mail account:-
A. Crack the password of his e-mail account by installing a 'Trojan programme' in his computer without his knowledge
B. Arrest him and interrogate him so that he gives the password to all his e-mail accounts
C. Obtain an order from the appropriate authority directing him to hand over the passwords to the police
D. Detain him on charges of suspicion and ask for judicial custody from a court till the police completes its investigation and make further arrests. The police can obtain the passwords from his arrested associates
Answer: Option D
Which chapter of Cyber Law provides the legal Recognition to Digital Signature
A. Chapter III
B. Chapter IV
C. Chapter IX
D. Chapter IX and X
A. High Court
B. Supreme Court
C. Central Administrative Tribunal
D. None of the above
. . . . . . . . is a person in whose name the Digital Signature Certificate is issued
A. Certified authority
B. Subscriber
C. Holder
D. Controller
Join The Discussion