StudyMaterial_CLE
StudyMaterial_CLE
StudyMaterial_CLE
BCSF188OEF
STUDY MATERIAL
DEPARTMENT OF CSE
SRI CHANDRASEKHARENDRA SARASWATHI VISWA
MAHAVIDYALAYA
(Deemed to be University established under section 3 of UGC act 1956)
ENATHUR, KANCHIPURAM - 631 561
PRE-REQUISITE
1. Cryptography and Network Security.
2. Ethical Hacking
OBJECTIVES
1. To understand the basics of cyber threats & security.
2. To learn various fundamentals of law & act
3. To study about cyber & security policies.
4. To understand the nature and applications of cyber law in real life
5. To understand various security issues in cyber.
COURSE OUTCOMES
1. Basic information on cybercrime.
2. Cyber laws for various crime activities.
3. Identify the security policies for cyber issues.
4. Analyze the role of organization for securing cyberspace.
5. Need for security in organizations.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M
CO2 M
CO3 L
CO4 S
CO5 M
UNIT – I INTRODUCTION
Introduction, Forgery, Hacking, Software Piracy, Computer Network
intrusion - Category of Cybercrime - Cybercrime Mobile & Wireless
devices - Tools and Methods used in Cybercrime - Phishing & Identity
Theft.
UNIT - IV E-COMMERCE
E-commerce concept-commerce-salient features online approaches like
B2B, B2C & C2Conline contracts, click wrap contracts, applicability of
Indian contract act 1872.
UNIT – V JURISDICTION
Dispute Resolution in cyberspace, concepts of Jurisdiction, Indian
context of Jurisdiction and IT Act 2000.Interantional Law and
Jurisdictional issues in cyberspace.
TEXT BOOKS
Chris Reed & John Angel, Computer Law, OUP, New York.
Justice Yatindra Singh, Cyber Laws, Universal Law Publishing Co, New Delhi.
Verma S, K, Mittal Raman, Legal Dimensions of Cyber Space, Indian Law Institute.
Jonthan Rosenoer, Cyber Law, Springer, New York.
Sudhir Naib, The Information Technology Act, 2005: A Handbook, OUP, New York.
S. R. Bhansali, Information Technology Act, 2000, University Book House Pvt. Ltd.
REFERENCES
Reich, Pauline C, “Law, Policy, and Technology: Cyberterrorism, Information
Warfare, and Internet Immobilization”, IGI Global, 2012.
Jonathan Rosenoer, “Cyber law: the Law of the Internet”, Springer - verlag, 1997.
Protecting privacy
• Encryption
• Trust mark-webtrust, truste,etc
• Anonymity
• Cookie guards-cookie cop, siemen’s webwasher, cookie crush,etc
• Privacy policy of website-p3p-platform for privacy preference
• Secure system for electronic money transfer- e.g SSL
• Need for legislation and enforcement
• Establish effective dispute resolution
Wireless networks
Infrastructure Mode
Ad-hoc mode
Specific Threats to Wireless Networks
Unauthorized use of service
Jamming
• Constant Jamming
• Deceptive Jamming
Auditing Wireless Networks
Access control, transmission control, viruses, and monitoring access points are
important risks to consider
Firewall generally secures information but WLAN creates new challenges because it
easier to access. Therefore, control is more important.
• (Ex) If an employee were to bring in an unauthorized router in to work,
unauthorized users could potentially access the network from outside the
building
Access Point (AP) – security of APs is crucial for wireless network auditing, consider
unauthorized access, unauthorized APs, improperly configured APs, and Ad Hoc
networks
An Auditor might walk around the building looking for markings left on the ground
by hackers indicating a spot in range of a wireless network
Wireless auditor – an automated system that detects anomalies
An Anonymizer
An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet
untraceable.
It is a proxy server computer that acts as an intermediary and privacy shield between a client
computer and the rest of the Internet.
It accesses the Internet on the user’s behalf protecting personal information by hiding the
client computer’s identifying information.
Computer vulnerability
Computers store huge amounts of data in small spaces
Ease of access
Complexity of technology
Human error
One of the key elements that keeps most members of any society honest is fear of
being caught — the deterrence factor. Cyberspace changes two of those rules. First, it
offers the criminal an opportunity of attacking his victims from the remoteness of a
different continent and secondly, the results of the crime are not immediately
apparent.
Need new laws and upgraded technology to combat cyber crimes
E-Mail bombing: Email bombing refers to sending a large number of e-mails to the victim
resulting in interruption in the victims’ e-mail account or mail servers.
Data diddling: This kind of an attack involves altering the raw data just before it is
processed by a computer and then changing it back after the processing is completed.
Salami attacks: These attacks are used for the commission of financial crimes. The key here
is to make the alteration so insignificant that in a single case it would go completely
unnoticed e.g. A bank employee inserts a program into bank’s servers, that deducts a small
amount from the account of every customer
Denial of Service: This involves flooding computer resources with more requests than it
can handle. This causes the resources to crash thereby denying authorized users the service
offered by the resources.
Issues in Cyberspace
The freedom of speech rights in regard of speaking and giving opinion which associated with
IT is often leads to victim suspected of breaking these limits. Actually, the freedom of speech
rights itself is regulated in the article 28 of the 1945
The Internet is the undiscovered ocean of information, and the biggest supplier in the world.
Technology is, in his opinion, an enabling agent of rights and not a privilege of its own. India
has legislation which deals with cyberspace crimes.
Right to privacy
What is privacy?
Privacy is a fundamental right, essential to autonomy and the protection of human dignity,
serving as the foundation upon which many other human rights are built.
Privacy enables us to create barriers and manage boundaries to protect ourselves from
unwarranted interference in our lives, which allows us to negotiate who we are and how we
want to interact with the world around us. Privacy helps to establish boundaries to limit with
the access for information sharing and communication.
Privacy is an essential way to protect against society with arbitrary and unjustified usage of
power. Privacy International envisions, protects the right to access the information. Individual
can participate in the modern development of technologies with ability to freely enjoy the
rights. Privacy is a qualifies, fundamental human right with articulated management
instruments.
Types of Cybercrime
DDoS Attacks
Botnets
Identity Theft
Cyberstalking
Social Engineering
PUPs
Phishing
Prohibited/Illegal Content
Cybercrimes against Individuals, Institution and State
Individual
Property
Government
Hacking
Digital Forgery
Forgery has been defined as the crime of falsely altering document with intension to mislead
others. It includes the production of counterfeited items. Digital Forgery involve electronic
forgery and identity theft. The majority of digital forgery occurs because of digitally altering
pictures. Digital techniques are notoriously more precise than conventional retouching
because any area of the photo can be changed pixel by pixel. The three types of image
forgery include image retouching, splicing forgery and copy-move image forgery.
Cyberstalking
Cyberstalking is a new concept with agreed-upon definition such as
Stalking is done with the assistance of technology
It is done to make a person feel afraid, threatened or worried about their safety
It invades a person’s privacy
The stalker monitors the victim’s behaviour, threatens them with unwanted access.
Cyber pornography
It is defined as the act of using cyberspace to create, display, distribute, import or publish
pornography. The traditional pornographic content has been largely replaced by online/digital
pornographic content.
Cyber Defamation
The term defamation is used to define the injury caused by the reputation of a person. The
intention of the person causes defamatory statement which lowers the reputation of the
person against whom the statement has been made in the eyes of general public. Defamation
is the application to Cyber defamation which involves defamation of a person through a new
and a virtual medium. Cyber defamation is publishing of defamatory material against another
person with the help of computers or internet.
Medium by which offense of cyber defamation can be caused:
PREPARED BY E. PADMA, ASSISTANT PROFESSOR (S-III), CSE 18
World Wide Web
Discussion groups
Intranets
Mailing lists and bulletin boards
E-mail
The word “tort” originates from the French language, in English, it is equivalent to term
“wrong” and it is derived from the Latin word “tortum” which means “wrong or injury” and
the word tortum is developed from the word “torquere” which means “to twist”. It is simply
a breach of duty which amounts to a civil wrong.
A person who commits a tort is called as a tortfeasor and if there are multiple persons
involved, then they are called joint tortfeasor as they are jointly liable for the tortious act and
they can be sued individually or jointly.
Cyber Stalking
Cyber Obscenity
Pornography on the internet has various forms. It may also include prohibited material such
as child pornography, which is a heinous crime in real life as well.
Cyber Defamation
Defamation is an act of making a statement about an individual which may lower his
reputation in the eyes of the right-thinking people. It can be written and oral also. Cyber
defamation is very similar to defamation in real life except for the involvement of a virtual
machine. Cyber defamation is that kind of defamation which is done through the virtual
medium.
Cyber-Vandalism
Trafficking
Trafficking is of many kinds, it may be in drug, ammunition, or even human beings, etc.
Trafficking is taken a form with the ascension of the internet as cyber trafficking has also
developed, where the process of trafficking is done online through the use of a virtual
machine.
Online fraud and cheating have become one of the biggest threats the government has to deal
with. These include Credit card crimes, fake job offerings, misappropriation, etc.
Civil Cyber Wrongs A civil cyber wrong is one which is committed online and is civil in
nature, such as a tort of defamation committed online through a computer (or any device
which has access to the internet and is able to modify the information or post anything
online, such as a mobile phone, or a tablet) is used as a tool to commit that kind of wrong.
Although not defined or addressed as civil cyber wrongs, the essence of civil liability is
defined under section 43 ofthe IT Act, 2000.
A criminal cyber wrong is a serious threat and it must be dealt with as soon as possible, a
criminal cyber wrong is a criminal wrong committed online through the use of technology,
crimes such as Hacking, information theft, denial of service attacks, etc. Although not
addressed as criminal cyber wrongs in any acts, but various wrongs of criminal nature are
defined under the IT Act, 2000, such as Child pornography defined under Section 67-A of
the act.
Intellectual property rights are the legal rights that cover the privileges given to individuals
who are owners and inventors of a work. The following list of activities which are covered by
the intellectual property rights are laid down by the World Intellectual Property Organization
(WIPO)
Industrial designs
Scientific discoveries
Protection against unfair competition
Literary, artistic and scientific works
Inventions in all fields of human endeavor
Performances of performing artists, phonograms and broadcasts
Trademarks, service marks, commercial names and designations
Copyright
Patent
Patent
Trade Secrets, etc.
A domain name is an Internet resource name that is universally understood by web servers
and online organizations and provides all pertinent destination information. To access an
organization’s Web-based services, website usersmust know the precise domain name.
Domain names are used worldwide, particularly in the world of networks and data
communication. The following points explain how they work and how they are used:
Domain names have two parts that are separated by a dot, such as
example.com.
A domain name can be used to identify a single IP address or group of IP
addresses.
A host or organization may use a domain name as an alternate IP address because
domain names are alphanumeric (as opposed to all numbers), making them easier
to memorize.
A domain name is used as part of a URL to identify a website.
The part that follows the dot is the top-level domain (TLD), or group to which
the domain name belongs. For example, .gov is the TLD for U.S. government
domains.
From a legal perspective, this is one of the simplest scenarios in domain name law. If a
third party has without any right whatsoever managed to transfer a domain name from your
account to its own, then it has infringed your domain rights and you should be able to
recover it by contacting the ISP and proving your case. In a world menaced by terrorism
and global warming, stolen domain names might not sound like a serious issue but the
entities behind such foul playare often serious criminals.
Cybersquatting
This is one of the most common scenarios in domain disputes. This can overlap with
passing off domain name activity. In that scenario, the domain name is usually diverted to
the website of a third – party competitor who seeks to trade off the goodwill of the legitimate
brand owner. However, typically cybersquatting and passing off domain name
machinations are quite distinct.
This is probably the busiest area of activity for the typical domain name lawyer. Domain
name disputes often pivot around the issue as to whether a company has overstepped the
mark by registering a domain name which reflects the trading name or product name of one
of its competitors. Another similar form of dispute may arise where a company uses
metatags or pays for sponsored ads which incorporate the competitor’s branding. Each case
is assessed on its facts but if the bottom line is that a trading entity is taking unfair
advantage of a competitor’s branding and/or marketing efforts, the courts will usually find
in favour of the competitor and award damages or order an account for profits.
Trademark related issues – Here are ten issues keeping trademark attorneys and rights
holders alike, on their toes.
Just like their patent troll counterparts, individuals and agencies are using predatory
PREPARED BY E. PADMA, ASSISTANT PROFESSOR (S-III), CSE 25
registrations to insidious ends. Unscrupulous characters are exploiting the opportunity to
demand licensing fees from alleged infringers.
Trademarks as Keywords
The first ever online sale was in 1994 when a man sold a CD by the band Sting to his
friend through his website NetMarket, an American retail platform. This is the first
example of a consumer buying a product from a business through the World Wide
Web or e-commerce as we commonly know it today. After that ecommerce has
evolved to make products easier to discover and purchase through online retailers and
marketplaces. All freelancers as well as small and large businesses have been
benefited from e-commerce which enables them to sell their goods and services at a
scale that was not possible with traditional offline retail.
A website following the B2B business model sells its products to an intermediate buyer
who then sells the products to the final customer. As an example, a wholesaler places an
order from a company's website and after receiving the consignment, it sells the end
product to the final customer.
B2B identifies both the seller as well as the buyer as business entities. B2B covers a
large number of applications, which enables business to form relationships with their
distributors, re-sellers, suppliers, etc. Following are the leading items in B2B
eCommerce.
Following are the key technologies used in B2B e-commerce −
Electronic Data Interchange (EDI) − EDI is an inter-organizational
exchange of businessdocuments in a structured and machine processable format.
Buyer Oriented marketplace − In this type of model, buyer has his/her own
market place or e-market. He invites suppliers to bid on product's catalog. A
Buyer company opens a biddingsite.
a market place where business buyers and sellers can transact with each other.
In B2C model, a business website is a place where all the transactions take place directly
between a business organization and a consumer.
In the B2C model, a consumer goes to the website, selects a catalog, orders the catalog,
and an email is sent to the business organization. After receiving the order, goods are
dispatched to the customer. Following are the key features of the B2C model −
compares similar items for price, delivery date or any other terms.
consults the vendor to get after service support or returns the product if not
satisfied with the delivered product.
With the advance use of internet and electronic commerce, online contracts have
assumed importance mainly in terms of reach and multiplicity. Online contract or an
electronic contract is an agreement modelled, signed and executed electronically,
usually over internet. An Online contract is conceptually very similar and is drafted in
the same manner in which a traditional paper-based contract is drafted. In case of an
online contract, the seller who intends to sell their products, present their products,
prices and terms for buying such products to the prospective buyers. In turn, the buyers
who are interested in buying the products either consider or click on the ‘I Agree’ or
‘Click to Agree’
Once the terms are accepted and the payment is made, the transaction can be completed.
The communication is basically made between two computers through servers. The
online contract is brought to the scenario to help people in the way of formulating and
implementing policies of commercial contracts within business directed over internet.
Online Contract is modelled for the sale, purchase and supply of products and services
Online can be categorized into three types mainly i.e. browse or web wrap contracts,
shrink wrap contracts and clickwrap contracts. Other kinds of online contracts include
employment contract, contractor agreement, consultant agreement, Sale re-sale and
distributor agreements, non-disclosure agreements, software development and licensing
agreements, source code escrow agreements. Though these online contracts are
witnessed in our everyday life, most of us are not aware of the legal complexities
connected to it; the use of online contract faces many technical and legal challenges.
Online contracts can be of three types mainly i.e. shrink-wrap agreements, click or
web-wrap agreements and browse-wrap agreements. In our everyday life, we usually
witness these types of online contracts. Other types of online contracts include
employment contract, contractor agreement, consultant agreement, Sale re-sale and
distributor agreements, non-disclosure agreements, software development and
licensing agreements, source code escrow agreements.
Clickwrap is an online agreement between a user and a company that requires the user
to click a box or a button before they download content, make a purchase, or use a
website. The box or button confirms that the user agrees to an online contract with the
company, and substitutes for the user's signature.
In a clickwrap agreement, in order to use a website or download content, the user has to
check a box saying they've read and agree to the terms and conditions that apply to the
website or software.
Sometimes the agreements are many pages long and difficult to read. They usually contain
two things:
A checkbox or button
A notice telling you that you agree to the terms if you
click the box Clickwrap agreements are also called:
I agree
OK
I consent
I accept
The Act as enacted originally had 266 Sections, it had wide scope and included.
Jurisdiction can be defined as the limit of a judicial authority or the extent to which a court
of law can exercise its authority over suits, cases, appeals etc. The rationale behind
introducing the concept of jurisdiction in law is that a court should be able to try and
adjudicate only in those matters with which it has some connection or which fall within the
geographical or political or pecuniary limits of its authority. A 1921 Calcutta High Court
judgment in the case of Hriday Nath Roy v. Ram Chandra sought to explain the meaning of
the term ‘jurisdiction’ in a great detail. The bench observed:
‘An examination of the cases in the books discloses numerous attempts to define the term
‘jurisdiction’,which has been stated to be ‘the power to hear and determine issues of law and
fact;’ ‘the authority by which three judicial officers take cognizance of and decide cause;’
‘the authority to hear and decide a legal controversy;’ ‘the power to hear and determine the
subject-matter in controversy between parties to a suit and to adjudicate or exercise any
judicial power over them;’‘the power to hear, determine and pronounce judgment on the
issues before the Court;’‘the power or authority which is conferred upon a Court by the
Legislature to hear and determine causes between parties and to carry the judgments into
effect;’ ‘the power to enquire into the facts, to apply the law, to pronounce the judgment
and to carry it into execution.’
Types of Jurisdictions:
In India, there are mainly 5 types of jurisdiction which can be classified as follows:
Subject-matter jurisdiction:
It can be defined as the authority vested in a court of law to try and hear cases of a particular
type and pertaining to a particular subject matter. For example, District Forums established
under the Consumer Protection Act, 1986 have jurisdiction over only consumer-related
cases. It cannot try criminal cases.
Under this type of jurisdiction, geographical limits of a court’s authority are clearly
delineated and specified. It cannot exercise authority beyond that territorial/geographical
limit. For example, if a certain offence is committed in Madhya Pradesh, only the courts of
law within the boundaries of Madhya Pradesh can try and adjudicate upon the same unless
otherwise provided for in a particular piece of legislation.
Pecuniary jurisdiction:
Pecuniary means ‘related to money’. Pecuniary jurisdiction tries to address whether a court
of law can try cases and suits of the monetory value/amount of the case or suit in question.
For example, consumer courts have different pecuniary jurisdictions. A district forum can try
cases of value upto Twenty lakh rupees only.
Original jursidiction:
It refers to the authority of a court to take cognizance of cases which can be tried and
adjudicated upon in those courts in the first instance itself. It is different from appellate
jurisdiction in the sense that in case of the latter, the courts rehear and review an already
decided matter whereas in case of the former the cases are tried for the very first time. For
example, the High Court of Allahabad has original jurisdiction with respect to matrimonial,
testamentary, probate and company matters.
Appellate jurisdiction:
It refers to the authority of a court to rehear or review a case that has already been decided
by a lower court. Appellate jurisdiction is generally vested in higher courts. In India, both
the High Courts and the Supreme Court have appellate jurisdiction to hear matters which are
brought in the form of appeal before them. They can either overrule the judgment of the
lower court or uphold it. At times they can also modify the sentence.
Concurrent jurisdiction: A situation in which more than one court of law has the
jurisdiction to try certain matters. Sometimes, this type of jurisdiction is also
referred to as ‘co-ordinate jurisdiction’.
Admirality jurisdiction: Jurisdiction pertaining to mercantile and maritime law
and cases.
The original jurisdiction of a court is the power to hear a case for the first time, as opposed
to appellate jurisdiction, when a higher court has the power to review a lower court's
decision. Original jurisdiction refers to the right of the Supreme court to hear a case for the
first time. It has the exclusive right to hear all cases that deal with disputes between states, or
between states and the union government. It also has original jurisdiction over cases brought
to the court by ordinary people regarding issues to the importance of society at large.
In India, the Supreme Court has original, appellate and advisory jurisdiction. Its exclusive
original jurisdiction extends to all cases between the Government of India and the States of
India or between Government of India and states on one side and one or more states on
other side or cases between different states. Original jurisdiction is related to cases which
are directly brought to the Supreme Court. Cases which require the interpretation of the
constitution or cases relating to the denial of fundamental rights are heard in the supreme
court. In case there is a dispute between two or more states or between the union and the
states, the Supreme Court decides such cases. In addition, Article 131 of the Constitution of
The appellate jurisdiction of the Supreme Court can be invoked by a certificate granted by
the High Court concerned under Article 132(1), 133(1) or 134 of the Constitution in respect
of any judgement, decree or final order of a High Court in both civil and criminal cases,
involving substantial questions of law as to the interpretation of the Indian Constitution.
The Supreme Court has special advisory jurisdiction in matters which may specifically be
referred to it by the President of India under Article 143 of the Indian Constitution.
IT ACT 2000
The Government of India enacted The Information Technology Act with some major
objectives which are as follows −
The Information Technology Act, 2000, was thus passed as the Act No.21 of 2000. The I.
T. Act got the President’s assent on June 9, 2000 and it was made effective from October
17, 2000. By adopting this Cyber Legislation, India became the 12th nation in the world to
adopt a Cyber Law regime.
Digital signature has been replaced with electronic signature to make it a more
technology neutral act.
It defines in a new section that cybercafé is any facility from where the access to
the internet is offered by any person in the ordinary course of business to the
members of the public.
It is based on The Indian Penal Code, 1860, The Indian Evidence Act, 1872, The
Bankers' Books Evidence Act, 1891, The Reserve Bank of India Act, 1934, etc.
It adds a provision to Section 81, which states that the provisions of the Act shall
have overridden effect. The provision states that nothing contained in the Act shall
restrict any person from exercising any right conferred under the Copyright Act,
1957.
As per the sub clause (4) of Section 1, nothing in this Act shall apply to documents or
transactions specified in First Schedule. Following are the documents or transactions to
which the Act shall not apply −
Any contract for the sale or conveyance of immovable property or any interest in
such property;
The I.T. Act has brought amendment in four statutes vide section 91-94. These changes
have been provided in schedule 1-4.
The first schedule contains the amendments in the Penal Code. It has widened
the scope of the term "document" to bring within its ambit electronic
documents.
The second schedule deals with amendments to the India Evidence Act. It
pertains to the inclusion of electronic document in the definition of evidence.
International law
Overview
International law consists of rules and principles governing the relations and dealings of
nations with each other, as well as the relations between states and individuals, and
relationsbetween international organizations.
Public international law concerns itself only with questions of rights between several
nations or nations and the citizens or subjects of other nations. In contrast, private
international
law deals with controversies between private persons. These controversies arise out of
situations which have a significant relationship to multiple nations. In recent years the
International Law includes the basic, classic concepts of law in national legal systems (i.e.
statutes, property law, tort law, etc). It also includes substantive law, procedural law, due
process, and remedies. The following are major substantive fields of international law:
International criminal law is a field of international law that seeks to regulate the behavior
ofstates, organizations and individuals operating across national boundaries in commission
of international crimes. International criminal law also regulates the commission of grave
crimes occurring on the territory of sovereign states where those crimes
constitute genocide, crimes against humanity, war crimes, or other violations of
juscogens norms.
International criminal law is practiced by, and prosecuted within, international criminal
tribunals, such as the International Criminal Tribunal for Rwanda, International
CriminalCourt and similar courts.
Diplomatic Law
Diplomatic law is a field of international law concerning the practice of diplomacy, and the
rights and obligations of state representatives on the territory of other states.
International humanitarian law (law of war) is a field of international law regulating armed
conflict between states, and more recently, between states and informal groups and
individuals. See Jean Pictet, Development and Principles of International Humanitarian
Law (1985). International humanitarian law governs both the legality of justifications for
war and the legality of wartime conduct international humanitarian law should not be
confused
with international human rights law. International humanitarian law is one of the oldest
fields of conventional international law. Core principles of international humanitarian law
can be found in major international treaties such as the Geneva Conventions of 1949, and
thefirst Geneva Convention of 1864.
International human rights law lays down the obligations of Governments to act in certain
ways or to refrain from certain acts, in order to promote and protect human rights and
fundamental freedoms of individuals or groups. One of the great achievements of the
United Nations is the creation of a comprehensive body of human rights law—a universal
and internationally protected code to which all nations can subscribe and all people aspire.
The United Nations has defined a broad range of internationally accepted rights, including
civil, cultural, economic, political and social rights. It has also established mechanisms to
promoteand protect these rights and to assist states in carrying out their responsibilities.
Dispute resolution is a term that refers to a number of processes that can be used to resolve a
conflict, dispute or claim. Dispute resolution may also be referred to as alternative dispute
resolution, appropriate dispute resolution, or ADR for short.
Dispute resolution processes are alternatives to having a court (state or federal judge or jury)
decide the dispute in a trial or other institutions decide the resolution of the case or contract.
Dispute resolution processes can be used to resolve any type of dispute including family,
neighborhood, employment, business, housing, personal injury, consumer, and environmental
disputes.
In addition, the United States Federal Government utilizes dispute resolution processes
to assist government employees and private citizens resolve complaints and disputes in
manyareas including workplace, employment, and contracting matters.