Subscribe this Blog

Enter your email address:

Delivered by FeedBurner

Followers

Monday, April 11, 2016

IT & Cyberlaw : Information Technology Act 2000 : Sections explained

List of offences and the corresponding penalties


Section
Offence
Description
Penalty
65
Tampering with computer source documents
If a person knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force.
Imprisonment up to three years, or/and with fine up to 200,000
66
Hacking with computer system
If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack.
Imprisonment up to three years, or/and with fine up to 500,000
66B
Receiving stolen computer or communication device
A person receives or retains a computer resource or communication device which is known to be stolen or the person has reason to believe is stolen.
Imprisonment up to three years, or/and with fine up to 100,000
66C
A person fradulently uses the password, digital signature or other unique identification of another person.
Imprisonment up to three years, or/and with fine up to 100,000
66D
If a person cheats someone using a computer resource or communication.
Imprisonment up to three years, or/and with fine up to 100,000
66E
Publishing private images of others
If a person capturee, transmits or publishes images of a person's private parts without his/her consent or knowledge.
Imprisonment up to three years, or/and with fine up to 200,000
66F
If a person denies access to an authorised personnel to a computer resource, accesses a protected system or introduces contaminant into a system, which the intention of threatening the unity, integrity, sovereignty or security of India, then he commits cyberterrorism.
Imprisonment up to life.
67
Publishing information which is obscene in electronic form.
If a person publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it.
Imprisonment up to five years, or/and with fine up to 1,000,000
67A
Publishing images containing sexual acts
If a person publishes or transmits images containing a sexual explicit act or conduct.
Imprisonment up to seven years, or/and with fine up to 1,000,000
67B
Publishing child porn or predating children online
If a person captures, publishes or transmits images of a child in a sexually explicit act or conduct. If a person induces a child into a sexual act. A child is defined as anyone under 18.
Imprisonment up to five years, or/and with fine up to 1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to 1,000,000 on second conviction.
67C
Failure to maintain records
Persons deemed as intermediatary (such as an ISP) must maintain required records for stipulated time. Failure is an offence.
Imprisonment up to three years, or/and with fine.
68
Failure/refusal to comply with orders
The Controller may, by order, direct a Certifying Authority or any employee of such Authority to take such measures or cease carrying on such activities as specified in the order if those are necessary to ensure compliance with the provisions of this Act, rules or any regulations made thereunder. Any person who fails to comply with any such order shall be guilty of an offence.
Imprisonment up to three years, or/and with fine up to 200,000
69
Failure/refusal todecrypt data
If the Controller is satisfied that it is necessary or expedient so to do in the interest of the sovereignty or integrity of India, the security of the State, friendly relations with foreign Stales or public order or for preventing incitement to the commission of any cognizable offence, for reasons to be recorded in writing, by order, direct any agency of the Government to intercept any information transmitted through any computer resource. The subscriber or any person in charge of the computer resource shall, when called upon by any agency which has been directed, must extend all facilities and technical assistance to decrypt the information. The subscriber or any person who fails to assist the agency referred is deemed to have committed a crime.
Imprisonment up to seven years and possible fine.
70
Securing access or attempting to secure access to a protected system
The appropriate Government may, by notification in the Official Gazette, declare that any computer, computer system or computer network to be a protected system.
The appropriate Government may, by order in writing, authorise the persons who are authorised to access protected systems. If a person who secures access or attempts to secure access to a protected system, then he is committing an offence.
Imprisonment up to ten years, or/and with fine.
71
If anyone makes any misrepresentation to, or suppresses any material fact from, the Controller or the Certifying Authority for obtaining any license or Digital Signature Certificate.
Imprisonment up to three years, or/and with fine up to 100,000

No comments:

Total Pageviews

Disclaimer : Blog Policies

This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.