Cyber Lawyer, Digital Evidence, Technology Lawyers, Cyber Challenges, Digital Forensic, Information Technology Act 2000, Cyber Litigation, AOR, Advocate-on-record,
How To Become A Cyber Lawyer
With the evaluation of e-governance and society moving towards digitization, the Information Technology has penetrated in every sphere of life and the profession of law, being no exception, is immensely impacted by it. The opportunities in the cyber domain emerge as a cyber lawyer, specializing into litigations involving information technology, cyber consultant in the companies- particularly in every IT company and almost every government department. The tremendous growth of the information technology is pervasive in every domain of life and business which is responsible for expanding and opening–up of the opportunities for legal professionals in the cyber field exponentially.
Studying cyber law can help IT and other professionals like CIO, CISO, CISA, CISSP, CA, CS etc. to provide better services to their clients by providing them with know how about the legal aspect of the issues relating to e-businesses. The integration of processes in every domain with the information technology have resulted into all the processes exposed to cyber risks and as such the compliances and information system audit has become mandatory for all medium or big organizations. This has also generated more avenues for the cyber lawyers as consultant, advisors etc. Thus, a person with a good legal knowledge, skill and technological bent of mind would be able to master this field and surely going to rule.
The entry to the cyber law domain can be as early as with the passing of secondary education. The aspirants can join five years integrated course such as B.Tech, LLB or B.Sc LLB and even the aspirants who have joined BA or BBA LLB course can also develop their technical skills alongwith their graduation. With the LLB, the young aspirants can develop their skills into networking, OSI models, TCP, different operating system i.e. windows, Mac, Linux, mobiles etc.
After the LLB, the individual needs to go for training in the court to develop its skills in the procedural laws i.e. Cr.P.C, CPC, interpretation of statutes and join specialized courses like PG Diploma or LLM in Cyber Law. The development of legal skills in the interpretation is more important in the field of cyber as the cyber law is still emerging and only a lawyer with a expert knowledge of the legal principles, principles of interpretations of statutes would be in a position to apply the law to the constantly emerging and developing technology. As such, the professionals like Advocate-on-record who have excellent skills into legal and interpretations principles, can become good cyber lawyers by adding technical skills.
I would repeatedly insist that developing the legal skills and spending the time in civil/criminal litigations is even more important than acquiring the technical knowledge. Both the categories of cyber lawyers, technocrat termed lawyer and the lawyer acquiring technical knowhow needs to remember that for practicing cyber law domain, the knowledge of legal skills will pre-dominant the technical knowledge.. Doing small courses, either into computer or cyber law, would not make you competent to handle these cases of data breach or hacking or cases involving cyber forensics. The skills in the field of information technology as well as law have to be developed in parallel through a consistent study, practice and exposure. The field of cyber law is multi-dimensional and has an international prospective which would make a cyber lawyer a truly global professional.
Read Full Article at – http://www.neerajaarora.com/how-to-become-a-cyber-lawyer/
Right to be forgotten in Blockchain: Is GDPR redundant?
Blockchain has become pervasive in all segments and its impact is being felt across the industries. The effective date of the EU’s General Data Protection Regulation (GDPR) is fast approaching (May 25 th, 2018) and efforts are being made globally to comply with it.Intercepted Mobile Evidence on CD: Infringement of Constitutional Right of Defence
Electronic Interception of Telephonic Communication, also known as “Wiretapping” always clouded with various controversies as to illegality or breach of privacy however, an important concern as to what standard of evidence, the prosecution needs to establish the Admissibility, Authenticity, Veracity and Reliability of such recordings in the court.SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 Official Dead: Authenticity Challenge in Electronic Evidence Cases