About Asian School of Cyber Laws

The best cyber law courses since 1999

Asian School of Cyber Laws

Born in 1999, Asian School of Cyber Laws is a global pioneer in cyber law & cyber crime investigation.
We work with Governments, Corporates, and Enforcement agencies across the world.



What we do

We conduct premium courses in cyber law and cyber crime investigation. We also conduct several free online courses in these fields.
COIN is an interactive platform empowering the world's enforcement agencies to tackle cyber crime & other cases involving digital evidence.
Get experts' answers to your cyber questions with the Lexcode Cyber Helpline.
DP-43 is an Online Tool for checking Data Privacy Law Compliance.

Global Cyber Law Database (GCLD) is a comprehensive and authoritative source of cyber laws for all countries.
c4 - Conference on Cyber Crime Control, 2015 was co-organized by Home Dept, Govt. of Maharashtra, Mumbai Police, IIT Bombay and ASCL.
www.LeapCourses.com is a platform providing free online courses in several categories.
War of the Apps is a unique platform for helping a billion people choose the perfect apps.
Cyber Crime Challenge is an annual competition in cyber crime investigation.
Republic of Cyberia is a virtual nation for cyber smart youngsters.
billionCoders is a global initiative, to empower girls and women with Information Technology skills.
Cyber Awards, 2015 were presented by Home Dept, Govt. of Maharashtra, Mumbai Police, IIT Bombay and ASCL.

Brief History

Achievements and more ..

Indian Achievements

  • We have assisted the Government of India in framing draft rules and regulations under the Information Technology Act and drafting model rules for the functioning of Cyber Cafes and drafting the Information Age Crimes Act.

  • We have assisted the Controller of Certifying Authorities in drafting regulations relating to the recognition of foreign certifying authorities.

  • We have also provided academic support to the National Consultation meeting on Enforcement of Cyber Law held at New Delhi on 31st January 2010. This meeting was organized by National Project Committee on Enforcement of Cyber Law (Supreme Court of India) in association with Cyber Appellate Tribunal, Ministry of Communication & Information Technology, Department of Information Technology, Government of India and National Legal Services Authority (NALSA).

  • A public interest litigation filed by our students led to the appointment of Adjudicating Officers to decide the fate of cyber crime cases.

    The Bombay high court directed the Union government to expedite the process of appointing enforcement authorities as per the information technology (IT) Act, 2000, so that aggrieved persons can get their grievances settled.

    The Bombay High Court bench comprising Chief Justice A.P. Shah and Justice Ranjana Desai gave this order while hearing a public interest litigation (PIL) filed by Nupur Jain and other students of Asian School of Cyber Laws.

  • Also see:

  • Vishal Kumar, former Director (Academics), Asian School of Cyber Laws was a member of Sub-group on E-Security under working group on Information Technology Sector for the formulation of the Twelfth Five Year Plan (2012 -17) Government of India., New Delhi – India Department of Information Technology, as per the recommendation of Working Group on Information Technology Sector has constituted a Sub Group on ESecurity on 14th July 2011 to make the recommendations on various policy matters related to E-Security area for formulation of the Twelfth Five Year Plan (2012 -2017).

Global Achievements

  • ASCL Computer Crime & Abuse Report(India) is the only study of its kind quoted by the United Nations in its E-commerce & Development Report (2003). The third edition of the E-Commerce and Development Report, published by the United Nations Conference on Trade and Development, identifies some of the implications that the growth of the digital economy may have for developing countries.

    The UN Report is available at:

    The ASCL Computer Crime and Abuse Report (2001-02) is available at:

  • We were invited to make a presentation on "Indian Legal Position on Cyber Terrorism, Encryption and Preventive Measures", on behalf of the Karnataka Police, for Otto Schily, Interior Minister, Federal Republic of Germany. See: http://www.asianlaws.org/aboutus/germany.pdf

  • We have conducted training programs on Cyber Crime Investigation, Incident Response and Cyber Forensics for senior Government and Police officials from Malaysia.

  • See the article in the Indian Express dated APRIL 30, 2004 titled Pune beats IT peers in fixing cyber crimes: http://www.asianlaws.org/aboutus/malaysia.pdf

  • In May 2011, the Mauritius Bar Association, together with the Association of Magistrates, invited Mr Debasis Nayak, Director, Asian School of Cyber Laws, at the seat of the Bar Council to provide "an overview of Cyber law in Mauritius with emphasis on evidentiary aspects of cybercrime." See: http://www.asianlaws.org/aboutus/mba.pdf

  • We have also conducted a high end training program at Accra, Ghana. Former Deputy Minister of Communication Hon. Gideon Kwame Boye Quarcoo was the guest of honour.

  • See the article titled "Shaolin of Cybercrime fighters" published in Times of India:

  • We were part of the Organizing Committee for the World Congress on Informatics and Law at Spain (2002), Cuba (2003) and Peru (2004)

    World Congress For Informatics And Law II was held in Madrid, Spain in 2002. The Honorary President of the World Congress was His Royal Highness the Prínce of Asturias.

    World Congress II was the continuation of World Congress I, held in Quito (Equador), 15-18 October 2001, under the auspices of the State of Equator, represented by H.E. Vice President Pedro Pinto, who chaired the inaugural session. During this Congress, a paper titled Cyber Terrorism in the context of Globalization was presented by Rohas Nagpal, President, Asian School of Cyber Laws.

    This was one of the first papers in the world that defined the term cyber terrorism. The definition was - Cyber terrorism is the premeditated use of disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives. The digital version of this paper is at:

Other Achievements

  • Thousands of students have benefitted from our free online programs in cyberlaw, intellectual property law, Cyber Crime Protection and Data Privacy Law in India.

  • We have conducted free "Cyber Smart" seminars and workshops for thousands of school children. These programs were conducted under the Republic of Cyberia project in several schools in Pune and Mumbai including St. Mira’s, Bhartiya Vidya Bhavan, St. Joseph’s, Bishop's High School, St. Anne’s, Dhirubhai Ambani International School, Ecole Mondiale World School, Blossoms School, JBCN International School, Hill Spring and SVKM International School.

    These programs aim to make children CyberSmart so they understand the cyber threats facing them and their family.

    Children are also taught how to protect themselves and their family from these threats. Finally, these programs teach children how to efficiently and effectively use cyber technology.

  • We developed the world’s smallest cyber crime investigation device code-named pCHIP. This Portable Mega Investigation & Forensic Solution is delivered in two versions – on a USB device and on a micro SD card. It was released in August, 2010 by Hon’ble Justice Rajesh Tandon, who was then the Chairperson, Cyber Appellate Tribunal, New Delhi. pCHIP runs from a USB drive / micro SD card without installation on the suspect PC. It captures relevant volatile evidence from a live (switched on) computer. It has an extremely easy-to-use interface and provides detailed reports. Some of the features of pCHIP are:

    1. The pCHIP retrieves crucial volatile digital evidence from the suspect computer and generates 38 reports at the click of a button.
    2. The pCHIP can detect and list password protected & encrypted files on a suspect computer. It can also attack and crack hundreds of types of passwords.
    3. At the click of a button, the pCHIP can generate a report containing the details of every USB device ever connected to the suspect computer.
    The pCHIP can clone and image disks and also recover deleted data.

  • We organize CyberAttack - a national conference on cyber crime & security.

    CyberAttack is usually held in India (Delhi, Mumbai, Pune & Hyderabad) as well as Mauritius.

    Dr. Gulshan Rai, Director General, Indian Computer Emergency Response Team, Government of India inaugurated the 2011 conference at Pune. He also delivered the key note address.

  • We were invited to talk on "International and National Legal Implications of Operations in Cyber Space" at Cyber Security India 2011 - India's Only Dedicated Military Cyber Security Conference.

  • We conducted the world's first online moot court in 2002 adjudged by Hon'ble Ranganath Misra ex-chief Justice of Supreme Court of India, ex-National Human Rights Commission Chairman and ex-Rajya Sabha member.

  • We drafted the compromis, for the Philip C. Jessup International Law Moot Court Competition, 2002 (USA). It is the world's largest moot court competition, with participants from over 500 law schools in more than 80 countries. Please see: http://www.asianlaws.org/aboutus/jessup.pdf

  • We maintain the Global Cyber Law Database, an online repository of cyber related laws of major countries around the globe.

  • We run bugs.ms, a Google Custom Search Engine for bugs, hacks, exploits and security for Microsoft products. The search engine searches through a database of websites that is compiled and updated by subject experts. This ensures that users get the most relevant information. Bugs are errors, flaws, mistakes, failures, or faults in a computer program that prevent it from behaving as intended.

  • We run moodstatus, a unique personal cum social platform which helps users flaunt as well as record and map their moods.

  • We run 13q, a unique personal cum social platform which is a modern digitalized version of the popular slam book concept.

  • We have launched a massive national level program to make Indian colleges ragging free.

  • We have developed the ita64 suite of technological solutions for facilitating Information Technology Act compliance.

Our Associates

  • Government Law College, Mumbai

  • St. Xavier's College, Mumbai

  • Gujarat Forensic Science University

  • Chanakya National Law University

  • Vaikunth Mehta National Institute for Co-operative Management (VAMNICOM)

  • Bharati Vidyapeeth University, New Law College, Pune

  • The Indian Law Society (ILS) Law College

  • Kerela Law Academy

  • V.M Salgaocar College of Law

  • Whitefield Business School

  • Gopaldas Jhamatmal Advani Law College

  • K.P.B Hinduja College of Commerce

  • Kishinchand Chellaram Law College

  • IILM Business School

  • St.Teresa's College

  • MVP Samaj's Law College

  • New Law Academy

  • NS Soti Law College

  • Ismailsaheb Mulla Law College

  • Dr. Ambedkar College

  • SBK Law College

  • Shahaji Law College

  • Central India College of Law

Commentary & Manual

  • Law enforcement personnel in India and abroad extensively use our Cyber Crime Investigation Manual. This was one of the first of its kind manuals in the world. Times of India (the world's largest selling English newspaper) has referred to it as a bible for Cyber Crime Investigators.

  • We have published the first-of-its-kind Commentary on the Information Technology Act.

Other Publications

  • Internet Time Theft & the Indian Law - white paper prepared for the Corps of Detectives, Karnataka Police, September 2001.

  • Legislative Approach to Digital Signatures - paper presented at the First World Congress on Computer Law organized at Ecuador, October, 2001.

  • Legislative Approach to Digital Signatures - paper presented at the International Law Seminar organized by ISIL at New Delhi, India in October, 2001.

  • Indian Legal position on Cyber Terrorism, Encryption and preventive measures on behalf of the Karnataka Police for Otto Schily, Interior Minister, Federal Republic of Germany (30th October , 2001).

  • Defining Cyber Terrorism - paper submitted at the National Seminar on Human Rights and Terrorism on 9 and 10 March 2002 at Nagpur, India.

  • The mathematics of terror - paper submitted at the National Seminar on Human Rights and Terrorism on 9 and 10 March, 2002 at Nagpur, India.

  • Cyber Terrorism in the context of Globalisation - Paper presented at the UGC sponsored National Seminar on “Globalization and Human Rights” held on 7th - 8th September, 2002 at Mumbai, India.

  • Cyber Terrorism - A Global Perspective – Paper presented at the Second World Congress on Informatics and Law held at Madrid, Spain from 23rd - 27th September, 2002.

  • Internet Draft titled Biometric based Digital Signature scheme – which proposes a method of using biometrics to generate keys for use in digital signature creation and verification.

  • Intellectual property law and cyberspace - presented at the seminar on intellectual property rights conducted by the Department of Civics and Politics, University of Mumbai in 2006.

Institutional Training

  • We have conducted training programs for income tax officials at the National Academy of Direct Taxes, Nagpur (a Central Institute of the Ministry Of Finance) and its unit at Lucknow - the Direct Taxes Regional Training Institute.

  • We have conducted training programs for police officials at the National Police Academy, Hyderabad (which trains officers of the Indian Police Service) and Sher-I-Kashmir Police Academy.

  • We have conducted training programs for bank officials at the National Institute of Bank Management, Pune (an autonomous apex institution set up by the Reserve Bank of India, in consultation with the Government of India).

  • We have conducted training programs for insurance officials at the National Insurance Academy, Pune.

  • We have also conducted training programs for the Securities and Exchange Board of India.

  • We have also conducted training programs for Yashwantrao Chavan Academy of Development Administration (YASHADA), which is the Administrative Training Institute of the Government of Maharashtra.

  • We have also conducted training programs for the Vaikunth Mehta National Institute of Cooperative Management (VAMNICOM), an Institution of National Council for Cooperative Training, New Delhi.

  • We have conducted cyber law workshops under the guidance and supervision of the office of the Chairperson, Cyber Appellate Tribunal, New Delhi (established under the Information Technology Act).

  • We have trained employees of Bank of India and HSBC (one of the world's largest banking and financial services organisations).

  • We were invited to conduct a session on cyber security for Defence Institute of Advanced Technology (DIAT), previously called Institute of Armament Technology (IAT), a Deemed University specializing in Armament Technologies.

  • We have conducted workshops for corporates such as Mahindra British Telecom, National Stock Exchange, Kanbay, Finolex, GCCI, MCCIA, Tata Consultancy Services, Patni Computer Systems, Cognizant, Facor, Thermax, Mastek Limited, CSI, DiPurba Consulting- Malaysia, Microline, Bit- Tech, Datamatics, Growel Softech, Iopsis, VAIDS, Synel, Resonance, Rishabh Software, Seed Infotech, NIIT, Delphi, Concourse, I2IT, IHNS2.

  • We have conducted workshops for educational institutions such as Banaras Hindu University, ILS Law College, Government Law College (Mumbai), Nagpur University, Bangalore Institute of Legal Studies, Bharti Vidyapeeth University, Sri Venkateswara University, Surendra Nath Law College, M.G.Kashi Vidyapith University, Hazra Law College (Kolkata), Jogeshchandra Choudhoury Law College, Jadhavpur University, YC Law College, Amravati College of Management, Amravati University, V.M. Salgaocar Law College.

  • We have assisted the Indian Army, various branches of the Indian police and the Central Bureau of Investigation in matters relating to cyber investigation.

  • See some of the relevant reference letters: