Cyber Liability

In: Other Topics

Submitted By kalyanii01
Words 14892
Pages 60

New India Assurance India Limited, incorporated on July 23rd 1919 was founded Sir Dorab Tata who was a founding member of The House of Tata’s. I got further nationalized in the year 1973 with merger of Indian companies.
Present Position
New India Assurance India Limited has vast presence all over the country and it is also doing remarkably high business. The company’s gross premium (in India) has increased tremendously over the years 2010-2012. It was Rs. 8542.86 crores in the year 2011-2012, as against Rs. 7097.14 crores in the year 2010-2011. Also, the company’s total assets are as high as Rs. 42162.74 crores as on 31st March 2012.
The company has an extensive network of offices covering each and every state and other regions of India as shown in Figure1.

Figure 1.New India Assurance India Limited presence all over the country.
Such large and extensive network makes NIA Rank No. 1 in the Indian market. Not only this, the company is also the largest Non-Life insurer in Afro-Asia excluding Japan. It is infact also the first Indian non-life company to reach Rs. 10073.88 crores Gross Premium.
International Presence
NIA also provides global Re-insurance facilities. It has its over-seas presence in countries like Japan, U.K, Middle East, Fiji and Australia. Overseas operations commenced in 1920. The company has operations in 20 countries in the year 2011-12 which spans through a network of 9 branches, 7 agencies, 1 associate company and 3 subsidiary companies in the year 2011-12. The company received an overseas premium of Rs. 1531.37 crores in the year 2011-12.
New India Insurance has many strength and advantage that puts it ahead of others. The company has the largest number of offices in India and abroad. It is also blessed with skilful, trained and…...

Similar Documents

Cyber Bullying

...Cyber-bullying among juveniles is a growing and severely dangerous problem that most are unaware of. Many educators and legislators are afraid to cross the line of right and wrong and will not punish these children as they should be. Unsurprisingly these juveniles are doing this when the parents are not present. Surprisingly though most of these children are in elementary school and are not even old enough to have a Facebook or other social network sites. “The incidence of cyber-bullying increases during elementary school, peaks in middle school and decreases in high school.”(Snakenborg, Van Acker, Gable page 90). This goes to show that parents need to be more aware and more controlling over what their children are doing and who they are hanging out with. Cyber-bullying also has a different outcome when looking at the aspects of males and females. During face to face bullying, “males are the primary instigators and victims.” (Snakenborg, Van Acker and Gable. Page 90.) When cyber-bullying females are “25% more likely victims.”(Snakenborg, Van Aker and Gable. Page 90). This increases the one that is bullying’s control over the situation because they believe that they are reaming anonymous. Having a sense of control can heighten a juvenile’s belief that they fit in and can be with friends with a certain crowd of people. A juvenile’s behavior is a major factor into why they would bully another peer on through electronic devices. This depends on the motivation which varies......

Words: 601 - Pages: 3


...Settlement expected to result in outflow of resources embodying economic benefits. Obligation must be to pay cash, transfer noncash asset or provide service at some future time Measurement of financial liability Initial: fair value plus directly attributable transaction costs Fair value: present value of future cash payment Present value: discounted amount of future cash outflow using market rate Conceptually, measure at present value Subsequent: amortized cost Measurement of current liabilities: face amount Measurement of noncurrent liabilities Interest-bearing: face amount (already the present value) Noninterest-bearing: present value (requires amortization using effective method) Classification 1. Current liabilities Expect to settle liability within entity’s operating cycle Ex. Trade payables, accruals Current even if settled more than twelve months after reporting period When normal operating cycle not clearly identifiable, it’s twelve months Holds liability primarily for trading Financial liabilities held for trading: incurred with intention to repurchase in near term Due to be settled within twelve months after reporting period Does not have unconditional right to defer settlement for at least twelve months after reporting period 2. Noncurrent liabilities: those not current Long term debt falling due within one year is Current even if: Original term longer than twelve months Agreement to refinance or reschedule on long term basis......

Words: 2034 - Pages: 9


...Liabilities - Effects Of Capital Vs. Operating Leases Capital Leases - Effects On: • Balance sheet - At the inception of a capital lease, the company leasing the equipment will record the equipment as an asset, and the company will also recognize a liability on the balance sheet, by an amount equal to the present value of the minimum lease payments. The discount rate used will be the lower of the following two rates: The lessor's (the rental company's) implied rate The lessee incremental borrowing rate Going forward, the leased asset is depreciated in a manner consistent with the lessee's usual policy for depreciating its operational assets. It can be over the term of the lease (most common) or over the asset's useful life, if ownership transfers or a bargain purchase option is present. • Income statement - A capital-lease payment includes two components: one is the interest expense - which is included in the income statement but is not part of operating income (earnings before taxes from continuing operations) - and the second component is the principal payment, which is included in the income statement and operating income. The interest portion will be higher in the first few years of the lease, and is consistent with the interest expense of an amortized loan. Total income over the life of the leased assets will be the same for operating and capital leases. • Cash flow statement - Total cash flow statements remain unaffected by operating and capital leases.......

Words: 284 - Pages: 2

Cyber Cafe

...CYBER CAFÉ CHAPTER ONE 1.0 BUSINESS DESCRIPTION 1.1 THE SPONSOR (BACKGROUND INFORMATION) Noel Aaron Agutu who is the entrepreneur is a Kenyan Citizen aged 19 years; born in February 22nd, 1993. The entrepreneur currently resides in Nakuru town. He is currently pursuing a Diploma Course in Business Administration in the Rift Valley Institute of Science and Technology in Nakuru town. The entrepreneur attained his Kenya Certificate of Secondary Education in the year 2010 from Naivasha High School. He attained his Kenya Certificate of Primary Education in the year 2006. 1.2 NAME OF BUSINESS The name of the business will be “Fabulous Cyber Café.” The name will depict the quality of the services to be offered by the business, customers have the surety of quality services just from the title itself. The entrepreneur intends to start the business in 2014 operating it as a sole proprietor whereby, the owner will be enjoying and maximizing profits on his own. The major activity of the business will be to bring forth quality computer services ensuring customer satisfaction. The other activities the business will look or tend to venture in is community development through education, the community will get this through, for instance, the internet services to be offered. The business will also open doors for advisory services for those in need. The principal customers to Fabulous Cyber Café are: 1. The local community 2. Students from the local learning institutions, that is,......

Words: 4632 - Pages: 19

Cyber Liability

...Vicarious liability Vicarious liability is the principle of law that holds one party liable for the acts or negligence of another party. (Susan W Killion, 2006) It is provided that the third parties such as members of the group, subcontractors, agents, franchisee, clients and customers, are deemed to be under the control of the employer. (David A. Beyer, 2006) It is also known as the legal liability and responsibility attached to the shoulder of the employer if his employee committed wrongful act within the course, scope or terms of their employment due to the authority delegate to him by the employer. (Ibrahim, 2012)This may include bullying and harassment, violent or discriminatory acts and breach of copyright. (Dale, 2005) In vicarious liability, the key question is the difficulty in determining whether the employee was acting in personal capacity or in the course of their employment. The knowledge of the employer is irrelevant on the wrongdoing. Though, the employer could take reasonable steps to prevent such acts from occurring and take remedial and corrective measures. For example, policies and standards could be prosecuted and training could be provided. Employer also may claim the right to a limited indemnity from the employee if the employer is vicariously liable for the tort of an employee under common law. However, this could not apply to the employer when he required the employee to do something illegal.(Queensland Law Reform Commission, December......

Words: 503 - Pages: 3


...Liabilities The role of a liability and what it means to the business as a whole is different for every business. What remains the same is the definition. A liability is a company’s legal debts or obligations that arise during the course of business operations and is recorded on the balance sheet. Liabilities can include many things to a business, such as, loans, accounts payable, mortgages, accrued expenses, etc. All the named liability accounts are just fancy for any money or service that is owed to another party. There are two types of liabilities, current liability and long term liability. Current liability is debt payable within one year and long-term liability is debt payable over more than a year. Current liability includes payables such as wages, accounts, taxes, and accounts payable. Long term liability includes long term bonds, notes payables, and long term leases. It is important that every business knows the concept of extinguishing liabilities. To extinguish liabilities means to satisfy the obligation and or payment to the creditor. Another way to extinguish liabilities is to transfer assets. This idea of extinguishing liabilities is meant for use by the SEC. There are many different industries that consider industry guidance in the FASB, Financial Accounting Standards Board, Codification and they include agriculture, contractors, entertainment, financial services and health care entities. The agriculture industry has many different characteristics......

Words: 944 - Pages: 4


...Week Four Exercise Assignment Liability 1. Payroll accounting. Assume that the following tax rates and payroll information pertain to Brookhaven Publishing: • Social Security taxes: 4% on the first $55,000 earned per employee .04 2000 • Medicare taxes: 1.5% on the first $130,000 earned per employee • Federal income taxes withheld from wages: $7,500 • State income taxes: 4% of gross earnings • Insurance withholdings: 1% of gross earnings 0.015 750 7500 500 • Federal unemployment taxes: 0.8% on the first $7,000 earned per employee 0.008 400 • State unemployment taxes: 5.4% on the first $7,000 earned per employee 0.054 2700 o 15850 The company incurred a salary expense of $50,000 during February. All employees had earned less than $5,000 by month-end and no wages have been paid during the month. a. Prepare the necessary entry to record Brookhaven’s February payroll. The entry will include deductions for the following: • Social Security taxes • Medicare taxes • Federal income taxes withheld • State income taxes • Insurance withholdings Brookhaven Account Debit Salary 50000 Social Security Tax Payable Medicare Tax Payable Federal Income Tax Payable Credit 2000 750 7500 2000 500 37250 State Income Tax Payable Insurance Withholding Salary Payable Total 50000 50000 b. Prepare the journal entry to record Brookhaven’s payroll tax expense. The entry will include the following: • Matching Social Security taxes • Matching Medicare taxes • State unemployment...

Words: 829 - Pages: 4


...Initial Recognition, Measurement, Presentation & Disclosure of Liabilities and Shareholder’s Equity A liability is a present obligation of the enterprise arising from past events, the settlement of which is expected to result in an outflow from the enterprise of resources embodying economic benefits (IASB Framework). Apart from satisfying the definition of liability, the framework has also advised the following recognition criteria to be met before a liability could be shown on the face of a financial statement: * The outflow of resources embodying economic benefits (such as cash) from the entity is probable. * The cost / value of the obligation can be measured reliably. The minimum line items to be included on the face of the statement of financial position are: [IAS 1.54] (k) trade and other payables (l)provisions (m)financial liabilities (excluding amounts shown under (k) and (l)) (n)current tax liabilities and current tax assets, as defined in IAS 12 (o)deferred tax liabilities and deferred tax assets, as defined in IAS 12 (p)liabilities included in disposal groups (q)non-controlling interests, presented within equity (r) Issued capital and reserves attributable to owners of the parent. LIABILITIES Trade payables, financial liabilities and other liabilities Recognition | Measurement | Presentation | Disclosures | Recognized if qualifications of liabilities are met. | They are initially recognized at their fair value net of transaction...

Words: 5128 - Pages: 21


...CASE STUDY 8.1 PG 287 Disclosure of environmental liability By Lindene Patton C.I.H, Senior Vice President and Counsel, Zurich Around the world, companies are being required to meet higher levels of disclosure of environmental liability … in the United States, for example, the US Financial Accounting Standard Boards (FASB) issued provisions in 2002 for accounting for environmental liabilities on assets being retired from service. The provision for accounting for assets retirement obligations required companies to reserve environmental liabilities related to the eventual retirement of an assets if its fair market value could be reasonable estimated. The intent of the ruling was disclosure, but the conditional nature of estimating of fair market value caused corporations to take the position that they could defer their liability indefinitely by ‘mothballing’ a contaminated property. Companies effectively postponed the recognition of the environmental liabilities in the absence of pending or anticipated litigation. Earlier this year, FASB clarified its intention by providing an interpretation that said companies have a legal obligation to reserve for environmental and other liabilities associated with the eventual retirement of manufacturing facilities of parts of facilities, even when the timing or method of settlement in uncertain. Among examples given by FASB: * An asbestos-contaminated factory can not simply by ‘mothballd’ without adequate reserves to cover the......

Words: 2515 - Pages: 11


...advancements and the information technologies used operate the critical infrastructure that feeds the heart of the U.S. economic and people. However, these advancements have also enable a wide range of malicious activities, such as crime, espionage and terrorism. The U.S. and it’s partners are grappling with a number of complex cybersecurity issues ranging from the proper role of government in protecting U.S. intellectual property to the establishment of the global norms for Internet governance. This paper will discuss two emerging technologies, smart and bionics, and will examine the security challenges and cyber threats associated with them. It will outline how these emerging technologies are used by private and government organizations. Dived further into some of the prominent cybersecurity policies and legal implications that might be associated the use of them. Emerging Cyber Technologies There is some much hype about smart technologies such as smart phones; cars and power grids as the technology has proven to be able to move data that is in rest transmit it over the Internet from almost anywhere. Most of the population has become technology-happy these days. Some pore over rumors and specs on technology websites, some even stand in line for days waiting to get their hands on the newest gadgets. Our world has moved from anticipating the new technologies to now demanding it. Most consumers are ill informed when it comes to understanding the number of......

Words: 2506 - Pages: 11


... CYBER WARFARE Student’s Name Institution of Affiliation CYBER WARFARE Cyber warfare is also commonly referred to as the cyber attack. It involves both the attacks and the counter cyber warfare. By definition, it is an intentional breaching of a person’s or community computer system with an intended to fraud money or steal knowledge from the system. Therefore, it involves manipulation of the computer systems, disabling or to wipe out the aggregate information contained in the system of equipment. It has thus been a stern challenge in the economic and national and the world security. As thus, it has become a primary concern for all business people protecting their ideas not to be leaked, in the military due to the protection of national security and also by the government which has to keep it a secret of all what is happening within it. The issue of the cyber attacks has not been one event but something that has occurred over time as a result of inventions and innovations by the governments and security agencies. It was triggered by the need to safeguard one's interests and at the same time keep secrets that if they leak the competitors or the enemies can use them against you. One of the periods that can be credited to giving birth to the period of developments that led to cyber attacks is 1918 all the way to 1939 whereby there was increased military revolution. One of these......

Words: 1263 - Pages: 6


...HTTP, FTP, IMAP, SMTP, POP3, CIFS/NetBIOS and TCP Stream.”(Best Practices, 2014) User awareness training is the keystone to all of this: if you are not educating them, they will show you they are the weakest link in the chain. A multilateral defense strategy is necessary to defend against this and other threats as they evolve over time; if you aren’t vigilant in the cyber realm, you are as good as hacked. References Alert (TA13-309A). (2013, November 5). Retrieved June 24, 2015, from Best Practices to protect against CryptoWall and CryptoLocker (SW12434). (2014, November 11). Retrieved June 25, 2015, from Ducklin, P. (2013, October 18). CryptoLocker ransomware - see how it works, learn about prevention, cleanup and recovery. Retrieved June 24, 2015, from Jarvis, K. (2013, December 18). CryptoLocker Ransomware - Dell SecureWorks. Retrieved June 24, 2015, from ransomware/ Kostadinov, D. (2014, February 6). RansomWar(e) - InfoSec Institute. Retrieved June 24, 2015, from ...

Words: 833 - Pages: 4

Cyber Crime

... Topic Outline Crime and Cyber Risk RMI 4300-Klein Distinctive Features of Crime Risk Common Crimes • Burglary • Robbery • Shoplifting • Fraud • Embezzlement • Forger and Counterfeiting • Vandalism • Arson • Espionage • Computer Crime Fraud • Fraud involves inducing another to act to his or her detriment. • Examples of fraud • A merchant collects payment in advance for good that will not be delivered or will be greatly inferior to what was promised • A customer accepts delivery od goods with the interntion of not paying them • And inventor sells all rights to an invention that has been developed and patented by another • A unauthorized person acquired and uses the account number or pin of someone credit or debit card to change items to that person’s account Forgery and Counterfeiting • Both forgery and counterfeiting involve fraudulently creating or using false or unauthorized versions of currency, documents, artwork or other property that only specified entities or persons have the right to make or use or unauthorized versions of documents such as stock certificates, birth records, lottery tickets, licenses , passports or other papers that only government agencies or other entities can issue. • Two broad types of crimes losses from forgery/counterfeiting o Inducing an organization to accept falsified documents, etc, to exchange something od valye for something that is valueless o Impersonating an organization using and unauthorized......

Words: 632 - Pages: 3


...Liability I think a store that many, if not all people have been to at least once in their life would be Walmart. Considering the massive amount of inventory and size of the average Walmart the chance of something potentially happening is great. Walmart being an owner/occupier has an affirmative duty to warn of or make safe known conditions if non obvious and dangerous. One instance would be a slip and fall accident which are real risk when walking the many isles of Walmart. In some instances, the property owner is responsible for the injured party's injuries, and in others, the property owner will not be held liable. Walmart has a vast inventory of products and many aisle of which need to be monitored for potential slip hazards. An example would be if you were to be walking through the aisle and broken jar had not been cleaned up and you were to slip and fall on said item the Walmart could be held liable. Each case turns on whether Walmart acted responsibly so that slipping or tripping was not likely to happen. In order to establish Walmart knew of the hazard it must be shown that: Created the condition, knew the condition existed and negligently failed to correct it, knew hazard exited for a length of time that they should have discovered and prevented the injury. Another example of liability would be within a retail store like Target in which false imprisonment could happen. False imprisonment is the unlawful restraint of a person against her will by someone......

Words: 455 - Pages: 2

Cyber Law - with Reference to Jurisprudence of Defamation Cases, Examine the Liability of 1worldcom

...WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS ARAVIND - 09901366442 – 09902787224 CYBER LAW 1. Neha, a desktop publishing professional has made several authentic looking certificates Of major indian and foreign universities and has sold these counterfeit for large sums of money to at least 3 people in india. Neha had sent these certificates as email attachments to prospective customers. Select the most appropriate answer keeping the said facts in mind: a. neha would be punished for forgery for forging a document under the information technology act,2000 b. neha would be punished for forgery for forging a document under the indian the penal code,1860 c. neha would be punished for forgery for forging an electronic record under the indian penal code,1860 d. neha would be punished for forgery for forging an electronic record under the information Act,2000 2.With regard to jurisprudence relating to pornography, tick the most appropriate answer: a. most jurisdictions punish dissemination of pornography, in some manner b. all jurisdictions punish dissemination of Publishing of child pornography, c. in some jurisdictions dissemination and possession of actual child pornography as well as dissemination of simulated computer animated images depicting child pornography is penalized. d. some jurisdictions punish dissemination as well as possession of child pornography 3.......

Words: 1194 - Pages: 5

Pokemon Season 10 Diamond And Pearl | Economic Analysis of Sainsburys - 391 Words | Fear the Walking Dead Flight 462 parts 1 to 15 720p.mp4