Alok Gupta, Mr.
Abhishek Arvind and Mr. Mohit Kothiwal had committed theft of data
by way of unauthorised access to the computer system, network ... Alok Gupta, Mr. Abhishek Arvind and Mr. Mohit
Kothiwal had committed data theft by way of unauthorizedly
assessing the computer system, network and e-mails
store the data relating to the
enquiry, and further, without the authority/permission of the Governing
Body, Satyawati College, you stored confidential data of such ... part amounts to gross
misconduct and is also an offence of data theft and, as such is unbecoming
on the part of any person appointed
laptop / desktop which was kept in office and is
unauthorizedly accessing the data and information contained
therein, in flagrant breach of the provisions ... 2020 Page 18/148
hence a serious risk of misappropriation, data theft and
manipulation of records at the behest of respondent in
furtherance
conspiracy with each other and committed breach of trust by
committing data theft from the system, network and emails of the
Company and also took ... Later it was found that Mr.
Abhishek Arvind had deleted all confidential data from the office
laptop which was in his possession. The said three
copyright in the GUI and concept note,
in addition to data theft of their curated data and unfair competition.
10. On the contrary ... their application as an 'artistic work' besides
theft of their curated data and allege unfair competition by the
Defendants. In the alternative
cause of action arises from independent acts of
copyright infringement, data theft, and diversion of business
committed by the Defendants after cessation of all alleged
Complaint)
against the Respondents for various offences of data theft, etc. punishable
under Sections 182, 211, 406, 500, 506 read with Sections 34 and 120B
defendant contained vital and important data
as also the computer programme authored by the plaintiff.
The data stored in the laptop stolen by the defendant ... computer resource, it does not
provide for payment of damages for theft of data other than
the computer source Code used for a computer resource
laboratory, Regulation 52 (xii) provides for the
establishment of theft by analysis of metering data "downloaded by a
third party authorized laboratory ... basis of theft under Regulation 52(viii) , for arriving at a conclusion
of theft under Regulation 52(xii) , the data has to be sent
network assets data to an accuracy level of 99.9% to enable the defendant company to create a comprehensive geographical data base so established that ... unregistered consumer not paying for electricity consumed, theft etc. The defendants have asserted that accuracy of the data, therefore, was the essence of the contract