PL
PL
M1
📘 1. Definition of Transfer of Property (Section 5)
"Transfer of Property" means:
Giving property rights (ownership, lease, mortgage, etc.)
From one living person to another living person.
🟢 Applies to both movable and immovable property (but TP
Act mainly deals with immovable).
🔸 Example:
A sells his land to B → This is a transfer of property.
📘 2. Kinds of Interest
Interest = Type of right a person has in the property.
a. Vested Interest (Section 19)
Becomes the person’s right immediately, even if
possession is delayed.
🔸 Example: A gives land to B, to be taken after 5 years. B’s
right starts now, even though possession is later.
b. Contingent Interest (Section 21)
Depends on a future event happening. No right until the
condition is met.
🔸 Example: A gives property to B if B marries before 25. If B
doesn’t marry, no rights
📘 3. Conditional Transfer (Section 25)
A transfer made with a condition attached.
If the condition is valid, the transfer is valid.
If the condition is impossible, illegal, or immoral, the
transfer is void.
🔸 Example: A gives land to B on condition that B never
marries – ❌ invalid condition → transfer fails.
📘 4. Doctrine of Election (Section 35)
When someone gets a benefit and a burden from the same
transfer, they must choose (elect):
Either accept the benefit and give up the property, or
Reject the benefit and keep the property.
🔸 Example: A gives ₹5 lakh to B and also gives B's house to C.
B must elect:
Take ₹5 lakh and let C keep house, or
Refuse ₹5 lakh and keep the house.
EXCHANGE
🔁 Section 118 – "Exchange" Defined
An exchange means when two people transfer
ownership of one property for another, without
involving money (i.e., not a sale).
Both parties give and take property.
It can include movable or immovable property.
📝 Example: A gives a piece of land to B, and in return B gives
A a shop. That’s an exchange.
🔁 Section 119 – Right of Party Damaged by Breach of
Exchange
If one party fails to deliver the property they promised
in the exchange:
o The other party can either claim the property or
ask for compensation for the loss.
o This section protects a party who suffers due to the
breach of agreement in an exchange.
🔁 Section 120 – Rights and Liabilities of Parties as to
Improvements
If a party receives a property in exchange and then:
o Loses it because of defective title (e.g., someone
else claims it),
o And they made improvements or constructions on
that property,
Then they have a right to claim compensation for the
value of those improvements from the other party.
🔁 Section 121 – Exchange of Money
Money for money is not considered an exchange under
the TP Act.
Example: Swapping ₹500 notes for ₹100 coins is not an
exchange under this law—it’s just a money transaction.
M3
WHAT IS A MORTGAGE? (Section 58)
A mortgage is when a person (mortgagor) transfers an
interest in immovable property to another person
(mortgagee) as security for a loan or debt. The property acts
as collateral.
🔷 TYPES OF MORTGAGES (Section 58 clauses a–g)
There are 6 main types of mortgages:
1. Simple Mortgage:
o Possession is not given.
o Mortgagor personally promises to pay.
o If unpaid, the mortgagee can get the property sold
by court.
2. Mortgage by Conditional Sale:
o Mortgagor sells the property on condition that the
sale will be cancelled if the loan is repaid.
o If not repaid, the sale becomes absolute.
3. Usufructuary Mortgage:
o Possession is given to the mortgagee.
o Mortgagee enjoys rents and profits from the
property in place of interest.
o No personal liability on the mortgagor.
4. English Mortgage:
o Mortgagor transfers property absolutely to the
mortgagee.
o But promises to repay on a fixed date, and
mortgagee agrees to retransfer once the loan is
paid.
5. Mortgage by Deposit of Title Deeds (Equitable
Mortgage):
o No formal document is needed.
o The mortgagor gives title deeds to the lender
(mortgagee) as security.
o Common in cities like Mumbai, Kolkata, and
Chennai.
6. Anomalous Mortgage:
o A mixture of the above types or something
different not covered by others.
🔷 Rights and Liabilities
✅ Rights of Mortgagee (Sections 67–72)
Right to sell or foreclose the property.
Right to possession (in some types).
Right to receive rent/profits in usufructuary mortgage.
🔹 D. Partial Redemption
The mortgagor cannot redeem only part of the mortgaged
property unless the mortgage is divisible.
Exception: If the mortgage deed specifies separate debts and
property divisions, partial redemption may be allowed.
CHARGE
In the Transfer of Property Act, 1882 (TP Act), the term
"charge" refers to a specific kind of interest or right over an
immovable property, created to secure the payment of
money, similar to a mortgage — but with some key
differences.
📘 Section 100 of the TP Act: Charge
This section defines and governs charges on immovable
property.
🔍 Definition of Charge:
A charge is created when:
A person secures the payment of money (like a loan or
obligation),
Without transferring ownership or possession, and
The property is used as security for that obligation.
⚖️Essentials of a Charge:
1. Immovable property must be involved.
2. No transfer of interest or possession (unlike a
mortgage).
3. Can be created by act of parties or by operation of law.
4. Must be in writing, unless it is by operation of law.
Example:
If A agrees to pay maintenance to B and creates a charge on
his land for that payment, B can enforce this charge against
the land, but B doesn’t own or possess the land.
LEASE
🔹 Section 105 – Lease Defined
A lease is:
A transfer of the right to enjoy an immovable property,
For a certain time period, in return for rent or service,
Between two people:
o Lessor = Owner who gives the property,
o Lessee = Person who takes it on lease.
🔹 Section 106 – Duration of Lease (In Absence of a Contract)
If the lease doesn’t mention time:
For residential or business purposes ➝ Month-to-
month lease.
For agricultural or manufacturing ➝ Year-to-year lease.
📌 Either party can end the lease by giving:
15 days’ notice for monthly leases.
6 months’ notice for yearly leases.
🔹 Section 107 – How Lease is Made
If lease is for more than 1 year, it must:
o Be in writing,
o Be registered.
Shorter leases (up to 1 year) can be oral if possession is
given.
🔹 Section 108 – Rights and Liabilities of Lessor and Lessee
Covered earlier in detail, but a quick recap:
For Lessor:
Give possession.
Disclose defects.
Not disturb the lessee’s enjoyment.
For Lessee:
Pay rent.
Take care of the property.
Return property after lease ends.
Use property legally.
🔹 Section 109 – Rights of Lessor’s Transferee
If the lessor sells or transfers the leased property:
The new owner gets the same rights (like collecting
rent).
Lessee must be informed of the transfer.
🔹 Section 110 – Commencement of Lease
A lease starts:
From the day it’s executed, unless the lease document
mentions a different starting date.
🔹 Section 111 – How Lease Ends (Determination of Lease)
Lease ends:
1. By expiry of time.
2. On event happening.
3. On notice to quit.
4. On forfeiture (lessee breaks conditions).
5. On surrender (lessee gives up lease).
6. On merger (lessor and lessee become one).
7. By law (e.g., property taken by govt).
🔹 Section 112 – Waiver of Forfeiture
If lessor forgives a default (like accepting rent after breach),
the lease continues — the forfeiture is waived.
🔹 Section 113 – Waiver of Notice to Quit
If the landlord gives notice to end lease but then:
Accepts rent, or
Acts like the lease is still active,
👉 Then that notice is cancelled (waived).
🔹 Section 114 – Relief Against Forfeiture
If lessee breaks terms (like not paying rent), but:
Pays the rent due with interest before eviction,
👉 Court can allow him to stay, i.e., cancel the forfeiture.
🔹 Section 114A – Relief Against Forfeiture for Breach of
Condition
If lease says “property must be used for a specific purpose”
and lessee does something else:
Lessor may want to cancel lease.
But court can give lessee another chance if it's fair.
🔹 Section 115 – Effect of Surrender and Forfeiture on Under-
Leases
If lessee gives up lease (surrenders) or it ends (forfeiture),
Any under-lease created by the lessee also ends unless
the lessor agrees to let it continue.
🔹 Section 116 – Doctrine of Holding Over
Already discussed earlier:
When lease ends, but lessee continues to stay, and
Lessor accepts rent or allows it,
👉 It becomes a new lease, usually month-to-month.
🔹 Section 117 – Leases for Agricultural Purposes
This section allows state governments to make special
rules for leases of agricultural lands — may override
other TP Act rules.
ACTIONABLE CLAIM
An actionable claim under the Transfer of Property Act,
1882 is defined in Section 3. Here's a clear and simple
explanation:
🔹 What is an Actionable Claim?
An actionable claim is a claim to a debt or any beneficial
interest in movable property that:
1. Can be enforced by a civil suit, and
2. The debt is unsecured (i.e., not backed by any mortgage
or pledge).
✅ Examples of Actionable Claims:
A person’s right to recover unsecured loans.
Money due under a life insurance policy.
Claim for arrears of rent.
Lottery winnings (in some contexts).
❌ Not Actionable Claims:
Secured debts (e.g., mortgage, pledge).
Ownership rights over immovable property.
Any right which cannot be claimed through a civil suit.
📝 Transfer of Actionable Claims:
Section 130 of the TP Act allows transfer (assignment)
of actionable claims.
The transfer must be:
o In writing, signed by the transferor.
o Notice must be given to the debtor (though not
mandatory for validity, it’s needed to bind the
debtor).
IT
M3
c) E-Mail Investigation – E-Mail Tracking – E-Mail Recovery
E-Mail Investigation: Analyzing emails to uncover
evidence in cybercrimes—examining headers, content,
attachments, and metadata to trace senders or detect
malicious activity.
E-Mail Tracking: Monitoring emails to check when they
are opened, if links are clicked, and the recipient’s
IP/location. Used in marketing and cybercrime
investigations.
E-Mail Recovery: Restoring deleted or lost emails using
backup systems, forensic tools, or server data—even if
the emails were erased or hidden.
d) Password Cracking
The process of recovering or breaking passwords to gain
system access. Techniques include:
Brute Force (trying all combinations),
Dictionary Attacks (using common passwords),
Rainbow Tables (precomputed hash matches),
Phishing (tricking users), and
Keylogging (recording keystrokes).
Used ethically in security testing or maliciously by attackers.
M5
a) Wireless Networks
Different types of wireless networks based on range and use:
Personal Area Network (PAN): Short-range network (up
to 10 meters) for personal devices like smartphones,
Bluetooth headphones, etc.
Wireless Local Area Network (WLAN): Medium-range
(up to 100 meters), commonly used in homes, schools,
and offices—usually based on Wi-Fi.
Metropolitan Area Network (MAN): Covers a city or
large campus, often using wireless connections like
WiMAX.
Wireless Wide Area Network (WWAN): Covers large
geographic areas using mobile networks (3G/4G/5G)
and satellite links.
b) War Chalking, War Driving, and War Flying
War Chalking: Drawing symbols in public to indicate the
presence of nearby open or secure Wi-Fi networks.
War Driving: Driving around with a laptop and Wi-Fi
scanner to detect wireless networks—used in both
ethical and malicious ways.
War Flying: Similar to war driving, but done from an
aircraft or drone to detect Wi-Fi networks from above.
M6
a) Crime and Mobile Phones – Evidence – Forensic
Procedures
Crime and Mobile Phones: Mobile phones are often
used in crimes (e.g., communication, location tracking,
illegal apps, etc.).
Evidence: Includes call logs, messages, photos, app data,
GPS history, and social media activity.
Forensic Procedures: Steps to preserve, extract, and
analyze data from phones without altering it—includes
proper seizure, isolation (e.g., Faraday bag), imaging,
and analysis.
b) Files Present in SIM Card – Device Data – Evidence in
Memory Card
SIM Card: Stores SMS, contacts, network data (IMSI,
service provider info).
Device Data: Stored on internal memory—includes app
data, browser history, multimedia, call logs, etc.
Memory Card: Stores additional data like photos,
videos, documents—may also contain deleted or hidden
files relevant as evidence.
M7
a) Network Security Management – Firewalls, Intrusion
Detection System (IDS)
Network Security Management: Strategies and tools
used to protect a network from threats and ensure safe
data flow.
Firewalls: Act as a barrier between internal and external
networks—block or allow traffic based on security rules.
IDS (Intrusion Detection System): Monitors network
traffic for suspicious activity or known threats and alerts
administrators.
b) Information Security Management – Access Control
Models
Information Security Management: The overall process
of protecting sensitive data using policies, technologies,
and procedures.
Access Control Models:
o Role-Based Access Control (RBAC): Access is given
based on user roles (e.g., admin, user, guest).
o Lattice Model: Access is based on multiple levels
(e.g., top secret, confidential) using strict policies.
o Mandatory Access Control (MAC): System-
enforced access based on fixed rules; users can't
change permissions.
o Discretionary Access Control (DAC): Users have
control over their data and can decide who
accesses it.
c) Technical Controls for Authentication and Confidentiality
– Password Management
Authentication: Verifying a user's identity using
passwords, biometrics, or tokens.
Confidentiality: Ensuring that data is only accessible to
authorized users.
Password Management:
o Use of strong, unique passwords.
o Use of password managers to store them securely.
o Implementing multi-factor authentication (MFA).
d) Key Management for Users
Key Management: Involves generating, storing,
distributing, and replacing encryption keys securely.
Ensures only authorized users can access encrypted
data.
Important for email encryption, secure file sharing, and
overall data protection.