Information Technology Act 2000

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Information Technology Act

Sectio
Offence Description
n

If a person knowingly or intentionally conceals, destroys or alters or


Tampering with intentionally or knowingly causes another to conceal, destroy or alter any
65 computer source computer source code used for a computer, computer programme,
documents computer system or computer network, when the computer source code is
required to be kept or maintained by law for the time being in force.

If a person with the intent to cause or knowing that he is likely to cause


Hacking with computer wrongful loss or damage to the public or any person destroys or deletes
66
system or alters any information residing in a computer resource or diminishes its
value or utility or affects it injuriously by any means, commits hack.

Receiving stolen A person receives or retains a computer resource or communication


66B computer or device which is known to be stolen or the person has reason to believe is
communication device stolen.

Using password of A person fraudulently uses the password, digital signature or other unique
66C
another person identification of another person.

Cheating using computer If a person cheats someone using a computer resource or


66D
resource communication.

Publishing private If a person captures, transmits or publishes images of a person's private


66E
images of others parts without his/her consent or knowledge.

If a person denies access to an authorized personnel to a computer


resource, accesses a protected system or introduces contaminant into a
66F Acts of cyberterrorism
system, with the intention of threatening the unity, integrity, sovereignty or
security of India, then he commits cyberterrorism.

If a person publishes or transmits or causes to be published in the


electronic form, any material which is lascivious or appeals to the
Publishing information
prurient interest or if its effect is such as to tend to deprave and
67 which is obscene in
corrupt persons who are likely, having regard to all relevant
electronic form
circumstances, to read, see or hear the matter contained or embodied
in it
Information Technology Act

Publishing images If a person publishes or transmits images containing a sexual explicit act or
67A
containing sexual acts conduct.

Publishing child If a person captures, publishes or transmits images of a child in a sexually


67B porn or predating explicit act or conduct. If a person induces a child into a sexual act. A child
children online is defined as anyone under 18.

67 Persons deemed as intermediatary (such as an ISP) must maintain


Failure to maintain records
C required records for stipulated time. Failure is an offence.

The Controller may, by order, direct a Certifying Authority or any employee


of such Authority to take such measures or cease carrying on such
Failure/refusal to comply activities as specified in the order if those are necessary to ensure
68
with orders compliance with the provisions of this Act, rules or any regulations made
thereunder. Any person who fails to comply with any such order shall be
guilty of an offence.

If the Controller is satisfied that it is necessary or expedient so to do in the


interest of the sovereignty or integrity of India, the security of the State,
friendly relations with foreign Stales or public order or for preventing
incitement to the commission of any cognizable offence, for reasons to be
recorded in writing, by order, direct any agency of the Government to
Failure/refusal to decrypt
69 intercept any information transmitted through any computer resource. The
data
subscriber or any person in charge of the computer resource shall, when
called upon by any agency which has been directed, must extend all
facilities and technical assistance to decrypt the information. The
subscriber or any person who fails to assist the agency referred is deemed
to have committed a crime.

The appropriate Government may, by notification in the Official Gazette,


declare that any computer, computer system or computer network to be a
Securing access or protected system.
attempting to secure
70
access to a protected The appropriate Government may, by order in writing, authorise the
system persons who are authorised to access protected systems. If a person who
secures access or attempts to secure access to a protected system, then
he is committing an offence.

71 Misrepresentation If anyone makes any misrepresentation to, or suppresses any material fact
Information Technology Act

from, the Controller or the Certifying Authority for obtaining any license or
Digital Signature Certificate.

You might also like