Professional Documents
Culture Documents
Information Technology Act
Information Technology Act
The Information Technology Act, 2000 or ITA, 2000 or IT Act, was notified on October 17, 2000.
It is the law that deals with cybercrime and electronic commerce in India. In this article, we will
look at the objectives and features of the Information Technology Act, 2000.
In 1996, the United Nations Commission on International Trade Law (UNCITRAL) adopted the
model law on electronic commerce to bring uniformity in the law in different countries.
Further, the General Assembly of the united nations recommended that all countries must
consider this model law before making changes to their own laws. India became the 12th
country to enable cyber law after it passed the Information Technology Act, 2000.
While the first draft was created by the Ministry of Commerce, government of India as the
ECommerce Act, 1998, it was redrafted as the ‘Information Technology Bill, 1999’, and passed
in May 2000.
The Information Technology Act, 2000 provides legal recognition to the transaction done via
electronic exchange of data and other electronic means of communication or electronic
commerce transactions.
Further, this act amended the ipc 1860, the Indian Evidence Act 1872, the Bankers’ Books
Evidence Act 1891, and the Reserve Bank of India Act 1934. The objectives of the Act are as
follows:
i. Grant legal recognition to all transactions done via electronic exchange of data or other
electronic means of communication or e -commerce, in place of the earlier paper-based
method of communication.
ii. Give legal recognition to digital signatures for the authentication of any information or
matters requiring legal authentication
iii. Facilitate the electronic filing of documents with Government agencies and also
departments
vi. Grant legal recognition to bankers under the Evidence Act, 1891 and the reserve
bank of India Act, 1934, for keeping the books of accounts in electronic form.
Features of the Information Technology Act, 2000
a. All electronic contracts made through secure electronic channels are legally valid.
c. Security measures for electronic records and also digital signatures are in place
d. A procedure for the appointment of adjudicating officers for holding inquiries under
the Act is finalized
e. Provision for establishing a Cyber Regulatory Appellant Tribunal under the Act.
Further, this tribunal will handle all appeals made against the order of the Controller or
Adjudicating Officer.
f. An appeal against the order of the Cyber Appellant Tribunal is possible only in the
High Court
j. Senior police officers and other officers can enter any public place and search and
arrest without warrant
Applicability
According to Section 1 (2), the Act extends to the entire country, which also includes Jammu
and Kashmir. In order to include Jammu and Kashmir, the Act uses article 253 of the
constitution. Further, it does not take citizenship into account and provides extra-territorial
jurisdiction.
Section 1 (2) along with Section 75, specifies that the Act is applicable to any offence or
contravention committed outside India as well. If the conduct of person constituting the offence
involves a computer or a computerized system or network located in India, then irrespective of
his/her nationality, the person is punishable under the Act.
Non-Applicability
According to Section 1 (4) of the Information Technology Act, 2000, the Act is not applicable to
the following documents:
4. Execution of a Will under the Indian Succession Act, 1925 including any other
testamentary disposition
by whatever name called.
5. Entering into a contract for the sale of conveyance of immovable property or any
interest in such property.
Information technology is one of the important law relating to Indian cyber laws. In
May 2000, both the houses of the Indian Parliament passed the Information
Technology Bill. The Bill received assent of the President in August 2000 and came
to be known as the Information Technology Act, 2000. Cyber laws are contained in
the IT Act, 2000.This act is helpful to promote business with the help of internet. It
contains set of rules and regulations which apply on any electronic business
transaction. It is “An Act to provide legal recognition for transactions carried out by
means of electronic data interchange and other means of electronic communication,
commonly referred to as “electronic commerce” which involve the use of alternatives
to paper-based methods of communication and storage of information, to facilitate
electronic filing of documents with the Government agencies and further to amend the
Indian Penal Code, the Indian Evidence Act, 1872,
the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and
for matters connected therewith or incidental thereto”.
IT Act, 2000 focuses on three main highlights:
a) Providing legal recognition to the transactions which are carried out through
electronic means or use of Internet.
b) Empowering the government departments to accept filing, creating and retention of
official documents in the digital format and
c) To amend outdated laws and provide ways to deal with cybercrimes.
a) To give legal recognition to any transaction which is done by electronic way or use
of internet?
b) To give legal recognition to digital signature for accepting any agreement via
computer.
c) To provide facility of filling documents online relating to school admission or
registration in employment exchange.
d) According to I.T. Act 2000, any company can store their data in electronic storage.
e) To stop computer crime and protect privacy of internet users.
f) To give more power to IPO, RBI and Indian Evidence act for restricting electronic
crime.
g) To give legal recognition for keeping books of accounts by bankers and other
companies in electronic form.
CYBERTERRORISM
Cyberterrorism is the use of the INTERNET to conduct violent acts that result in, or
threaten, loss of life or significant bodily harm, in order to achieve political or ideological
gains through threat or intimidation. It is also sometimes considered an act of Internet
terrorism where terrorist activities, including acts of deliberate, large-scale disruption
of computer networks, especially of personal computers attached to the Internet by means of
tools such as computer viruses, computer worms, phishing, and other malicious software and
hardware methods and programming scripts. Cyber terrorism is a controversial term. Some
authors opt for a very narrow definition, relating to deployment by known terrorist
organizations of disruption attacks against information systems for the primary purpose of
creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which
includes cybercrime. Participating in a cyber attack affects the terror threat perception, even
if it isn't done with a violent approach. By some definitions, it might be difficult to
distinguish which instances of online activities are cyber terrorism or cybercrime.
Cyber terrorism can be also defined as the intentional use of computers, networks, and public
internet to cause destruction and harm for personal objectives. Experienced cyber terrorists,
who are very skilled in terms of hacking can cause massive damage to government systems,
hospital records, and national security programs, which might leave a country, community or
organization in turmoil and in fear of further attacks.[3] The objectives of such terrorists may
be political or ideological since this can be considered a form of terror.
There is much concern from government and media sources about potential damage that
could be caused by cyber terrorism, and this has prompted efforts by government agencies
such as the federal bureau of investigation (FBI) and the central intelligence agency (CIA) to
put an end to cyber attacks and cyber terrorism.
There have been several major and minor instances of cyber terrorism. Al - qqeda utilized the
internet to communicate with supporters and even to recruit new members. estonia, a Baltic
country which is constantly evolving in terms of technology, became a battleground for cyber
terror in April, 2007 after disputes regarding the removal of a WWII soviet statue located in
Estonia's capital Tallinn.
Cyber fraud
Internet fraud is a type of fraud or deception which makes use of the internet and could
involve hiding of information or providing incorrect information for the purpose of tricking
victims out of money, property, and inheritance. Internet fraud is not considered a single,
distinctive crime but covers a range of illegal and illicit actions that are committed
in cyberspace. It is, however, differentiated from theft since, in this case, the victim
voluntarily and knowingly provides the information, money or property to the perpetrator. It
is also distinguished by the way it involves temporally and spatially separated offenders.
According to the FBI's 2017 Internet Crime Report, the Internet Crime Complaint Center
(IC3) received about 300,000 complaints. Victims lost over $1.4 billion in online fraud in
2017.[4] According to a study conducted by the Center for Strategic and International Studies
(CSIS) and McAfee, cybercrime costs the global economy as much as $600 billion, which
translates into 0.8% of total global GDP.[5] Online fraud appears in many forms. It ranges
from email spam to online scams. Internet fraud can occur even if partly based on the use of
Internet services and is mostly or completely based on the use of the Internet.
1}Charity fraud
3}Gambling fraud
What is Hacking?
A Hacker is a person who finds and exploits the weakness in computer systems and/or
networks to gain access. Hackers are usually skilled computer programmers with knowledge
of computer security.
Hackers are classified according to the intent of their actions. The following list classifies
hackers according to their intent.
Symbol Description
What is Cybercrime?
Cyber crime is the use of computers and networks to perform illegal activities such as
spreading computer viruses, online bullying, performing unauthorized electronic fund
transfers, etc. Most cybercrimes are committed through the internet. Some cybercrimes can
also be carried out using Mobile phones via SMS and online chatting applications.
Type of Cybercrime
Ethical Hacking is identifying weakness in computer systems and/or computer networks and
coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the
following rules.
Ethical Hacking is legal if the hacker abides by the rules stipulated in the above section
on the definition of ethical hacking. The International Council of E-Commerce Consultants
(EC-Council) provides a certification program that tests individual’s skills. Those who pass
the examination are awarded with certificates. The certificates are supposed to be renewed
after some time.
What is cyberstalking?
As mentioned, cyberstalking can take many different forms, but in the broadest sense, it is
stalking or harassment that takes place via online channels such as social media, forums or
email. It is typically planned and sustained over a period of time.
For example, if you’ve received a few negative comments on Facebook and Instagram, it may
upset or annoy you, but this isn’t cyberstalking yet. For some people, such as semi-celebrities
looking for attention, negative comments are actually welcomed.
However, once you start receiving unwanted and annoying messages repeatedly and feel
harassed, then the line has likely been crossed. Cyberstalkers might terrorize victims by
sending unpleasant messages systematically, perhaps even several times a day. It is especially
unnerving when such messages come from different accounts managed by the same person. It
is probably a good idea to report this to both the website owners and law enforcement
agencies.
Cyberstalking doesn’t have to involve direct communication, and some victims may not even
realize they are being stalked online. Perpetrators can monitor victims through various
methods and use the information gathered for crimes like identity theft. In some cases, the
line between cyberspace and real life can become blurred. Attackers can collect your personal
data, contact your friends and attempt to harass you offline.
USING FAKE PROFILES TO ACT AS DECOYS
This may sound extreme, but it could be helpful in some situations to add profiles to social
networks that include fake personas using your name or picture. You can supply those
profiles with different addresses, jobs and interests. You can also change some information in
your real profiles and use one of the fake accounts as your primary for some time.
This tactic will help to mislead the cyberstalker and create doubts that this is really you. Just
be sure to check the rules and regulations for those platforms before doing this.
Cyberstalking is a big problem, but it is easier to prevent it than to try to solve it and
eliminate the consequences.
Fortunately, law enforcement agencies, security professionals and social media platforms are
on your side and are ready to provide you with useful tools and methods of protection. For
example, social media platforms make it easy to report abuse and reputable VPN providers
will help you hide your IP address and encrypt your communication. If needed, don’t hesitate
to contact the police to report cyberstalking or similar crimes.
It is difficult to find and punish professional attackers because they know how to anonymize
themselves behind fake personas. Plus, most countries have not yet adopted specific laws that
regulate cyberstalking. For example, in the US, cyberstalking falls under harassment and anti-
stalking laws. Depending on the severity of the case, a fine or even imprisonment may be
applied.
Cyberstalking specifically has been addressed in U.S. federal law – the Violence Against
Women Act. However, there still remains a lack of federal legislation to address stalking by
electronic means, and the majority of legislation is done at the state level. The first U.S.
cyberstalking law went into effect in California. Since 1999, there have been a number of
high-profile legal cases related to cyberstalking.
Cyber bullying is the harassment or bullying executed through digital devices like computers,
laptops, smartphones, and tablets. The platforms where cyber bullying can occur include
social media, chat rooms, and gaming platforms where people can view and participate in the
sharing of content.
The different types of cyber bullying involve causing humiliation through hateful comments
on online platforms/apps, or through SMS or messaging. It comprises posting, sending or
sharing negative, nasty or false information about another individual for causing humiliation
and character assassination.
A cognizance of the different types of cyber bullying is necessary. This enables parents and
young adults to report cyber bullying and adopt measures to prevent cyber bullying.
Following are some of the common types of cyber bullying:
Posting hurtful, nasty or humiliating rumors or comments about an individual online
Publishing an embarrassing or nasty photo or video
Creating a fake or nasty webpage about another individual
Issuing online threats provoking an individual to kill themselves or hurt someone else
Triggering religious, racial, ethnic or political vitriol online by posting hate comments
or content
Faking an identity online to ask for or post personal or fake information about
someone
Also, one should be aware of “doxing’’ here. It is a practice prevalent on the Internet for
researching and publishing personal information about an individual. One obtains
information from the person’s social media accounts and other online profiles. It is then used
for online harassment, online defamation and other forms of cyber bullying.
With increasing availability of affordable data services and social media presence, cyber
bullying in India has witnessed an alarming rise.
The same study ranks India as the country facing the highest cyber bullying in the Asia
Pacific region, more than Australia and Japan.
In fact, 50% of women residing in prime Indian cities are a victim of online abuse, according
to a survey by Feminism.
Spurred by the increasing cases of cyber bullying in India, the Ministry of Women and Child
Development has launched a distinct helpline to report cyber bullying, online harassment, and
cyber defamation, particularly against women and children.
Some Horrifying Incidents of Cyber Bullying in India
In November 2017, an MBBS student in Kerala jumped to her death from the highest floor of
her college building. An examination of her Facebook profile showed her displeasure over
the nasty comments made one of her peers. Police suspect that cyber bullying provoked her to
take this extreme step.
In February 2017, the Akhil Bharatiya Vidyarthi Parishad (ABVP) attacked students at a
literary event in Delhi’s Ramjas College.
At that time, little did a 20-year-old student from Lady Shri Ram College, Delhi, imagine that
her online campaign against the violence would change her life forever? The student,
Gurmehar Kaur, has ever since been trolled and abused extensively on social media
platforms. Worse still, she has even been receiving death and rape threats!
This is just another example of the ugly state of cyber bullying in India. Sadly, each day yet
another innocent life is subject to online torments and cyber bullying in India.
Obscenity and Pornography
CHILD PORNOGRAPHY
One of the biggest keys in a child pornography case is the element that the defendant
possessed, distributed, produced or sold “obscene matter” that involved a minor engaging in
sexual conduct. If this element is not meant, you cannot be convicted of a child pornography
crime.
Several child pornography crimes require the prosecution to prove that the material involved
is obscene. These crimes include:
However, this element can be tricky to define. What does the term “obscene matter” actually
mean? Let’s explore this element of child pornography crimes in depth.
Where the term gets tricky is how the word “obscene” is defined.
Defining obscenity is something that has confounded even the U.S. Supreme Court. Justice
Potter Stewart famously wrote in a case concerning whether a film was pornographic:
“I shall not today attempt further to define the kinds of material I understand to be embraced
within that shorthand description [“hard-core pornography”], and perhaps I could never
succeed in intelligibly doing so. But I know it when I see it, and the motion picture involved
in this case is not that.”
Justice Stewart’s candid observation that people know obscenity when they see it highlights
why the concept is so hard to pin down. With this difficulty in mind, California’s prosecutors
now use the definition of obscene found in California Penal Code Section 311.
Under this law, material is considered “obscene” if:
“Prurient interest” is a morbid, degrading and unhealthy interest in sex. This means the
material appeals to something beyond what is considered a normal, healthy interest in sex.
Essentially, this definition means that not all representations of sexual conduct by minors will
be considered child pornography. For example, if a film about the relationship between
young lovers contains explicit scenes where two teenaged actors simulate sexual intercourse,
the film could be considered to have significant artistic value. This means it would not be
considered “obscene” despite this explicit scene.
Contact the Criminal Defense Attorneys at Wallin & Klarich Today
If you or a loved one is facing child pornography charges, it is critical that you speak to an
experienced criminal defense attorney as soon as possible.
At Wallin & Klarich, our criminal defense lawyers have more than 35 years of experience
successfully defending clients facing child pornography crimes. Our lawyers will use their
knowledge and skill to help you obtain the best possible outcome in your case.
With offices in Orange County, Riverside, San Bernardino, Los Angeles, San Diego, West
Covina, Torrance and Victorville, there is an experienced Wallin & Klarich criminal defense
attorney available to help you no matter where you are located.
Section 43: Where a person without the permission of owner or any other person-in-charge
damage the Computer, or Computer System, or Computer Network, the he shall be liable for
Penalty and Compensation to such person so affected.
Section 44: Where a person fails to furnish any document, return, report to the controller, or
certifying authority, then he shall be liable to pay penalty upto Rs.1,50,000/- per failure.
Further where a person fails to furnish any information, books or other documents within
time specified, then he shall be liable to pay penalty upto Rs.5,000/- per day. Further
provided that where a person fails to maintain books of accounts or other records, then he
shall be liable to pay penalty upto Rs.10,000/- per day.
Section 65: Any person tamper, conceal, destroy, or alter any computer source document
intentionally, then he shall be liable to pay penalty upto Rs.2,00,000/-, or Imprisonment
upto 3 years, or both.
Section 66: Any person dishonestly, or fraudulently does any act as referred in Section 43,
then he shall be liable to pay penalty upto Rs.5,00,000/-, or Imprisonment upto 3 years, or
both.
Section 66B: Any person dishonestly, or fraudulently receives or retains any stolen computer
resource or communication device, then he shall be liable to pay penalty upto Rs.1,00,000/-,
or Imprisonment upto 3 years, or both.
Section 66C: Any person dishonestly, or fraudulently make use of Electronic Signature,
Password or any other Unique Identification Feature of any other person, then he shall be
liable to pay penalty upto Rs.1,00,000/-, or Imprisonment upto 3 years, or both.
Section 66B: Any person dishonestly, or fraudulently receives or retains any stolen computer
resource or communication device, then he shall be liable to pay penalty upto Rs.1,00,000/-,
or Imprisonment upto 3 years, or both.
Section 66C: Any person dishonestly, or fraudulently make use of Electronic Signature,
Password or any other Unique Identification Feature of any other person, then he shall be
liable to pay penalty upto Rs.1,00,000/-, or Imprisonment upto 3 years, or both.
Section 66D: Any person dishonestly, or fraudulently by means of any communication
device or computer resource cheats by personating, then he shall be liable to pay penalty
upto Rs.1,00,000/-, or Imprisonment upto 3 years, or both.
Section 66E: Any person intentionally captures, publishes, or transmits image of private area
of any person without consent, then he shall be liable to pay penalty upto Rs.2,00,000/-, or
Imprisonment upto 3 years, or both.
Section 66F: Any person does any act electronically, or with use of computer with intent to
threaten unity, integrity, security, or sovereignty of India, then he shall punishable
with Imprisonment for Life.
Section 67: Any person publishes, or transmits in electronic form any material which appeals
to prurient interest, or if its effect is such as to tend to deprave and coorupt persons who are
likely to read, see, or hear matter contained in it, then he shall be liable to pay penalty
upto Rs.5,00,000/-, or Imprisonment upto 3 years, or both, And in the event of second or
subsequent conviction, he shall be liable to pay penalty upto Rs.10,00,000/-, or Imprisonment
upto 5 years, or both.
Section 67A: Any person publishes, or transmits in electronic form any material which
contains sexually explicit act, or conduct, then he shall be liable to pay penalty
upto Rs.10,00,000/-, or Imprisonment upto 5 years, or both, And in the event of second or
subsequent conviction, he shall be liable to pay penalty upto Rs.10,00,000/-, or Imprisonment
upto 7 years, or both.
Section 68: The Controller may, by order, direct a Certifying Authority or any employee of
such Authority to take such measures or cease carrying on such activities as specified in the
order if those are necessary to ensure compliance with the provisions of this Act, rules or any
regulations made thereunder and if any person who intentionally or knowingly fails to
comply with the order, then he shall be liable to pay penalty upto Rs.1,00,000/-, or
Imprisonment upto 2 years, or both.
Section 69: Where the Central Government or a State Government or any of its officers
specially authorized by the Central Government or the State Government, as the case may be,
in this behalf may, if satisfied that it is necessary or expedient so to do, in the interest of the
sovereignty or integrity of India, defense of India, security of the State, friendly relations with
foreign States or public order or for preventing incitement to the commission of any
cognizable offence relating to above or for investigation of any offence, it may with reasons
to be recorded in writing, by order, direct any agency of the appropriate Government to
intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any
information generated, transmitted, received or stored in any computer resource, Any person
who fails to comply with the order, then he shall be liable to Imprisonment of 7 years, along
with the fine (amount of fine is not specified in the act).
Section 70: The appropriate Government may, by notification in the Official Gazette, declare
any computer resource which directly or indirectly affects the facility of Critical Information
Infrastructure, to be a protected system, Any person who fails to comply with the notification,
then he shall be liable to Imprisonment of 10 years, along with the fine (amount of fine is
not specified in the act).
Section 71: Whoever makes any misrepresentation to, or suppresses any material fact from
the Controller or the Certifying Authority for obtaining any License or Electronic Signature
Certificate, as the case may be, then he shall be liable to pay penalty upto Rs.1,00,000/-, or
Imprisonment upto 2 years, or both.
Section 72: If any person who has secured access to any electronic record, book, register,
correspondence, information, document or other material without the consent of the person
concerned discloses such electronic record, book, register, correspondence, information,
document or other material to any other person, then he shall be liable to pay penalty
upto Rs.1,00,000/-, or Imprisonment upto 2 years, or both.
Section 72A: If any person who has secured access to any material containing personal
information about another person, with the intent to cause or knowing that he is likely to
cause wrongful loss or wrongful gain discloses, without the consent of the person concerned,
or in breach of a lawful contract, then he shall be liable to pay penalty upto Rs.5,00,000/-, or
Imprisonment upto 3 years, or both.
Section 73: If any person publishes a Electronic Signature Certificate, or make it available to
any other person with the knowledge that