Professional Documents
Culture Documents
IT Act 2000
IT Act 2000
4. Make electronic filing of papers with government offices and departments easier.
6. Provide legal authorization while also facilitating electronic payments transfers between
banks and money institutions.
7. Grant legal approval to bankers for maintaining electronic books of accounts under the
proof Act of 1891 and the Bank of India Act of 1934.
• Every electronic contract formed using secure electronic channels was legally binding.
• Electronic records have security protections in place, as well as digital signatures. The
procedure for appointing adjudicating officials to conduct inquiries under the Act has been
completed.
• Under the Act, there is a provision for creating a Cyber restrictive Appellant judicature.
Furthermore, this judicature can handle any appeals filed against the Controller's or
Adjudicating Officer's orders. • It appeals against the Cyber Appellant's order are only
possible inside the court.
• Digital Signatures make use of a mixed cryptosystem as well as a hash function.
• The Controller of Certifying Authorities (CCA) will be appointed to licence and control the
operation of Certifying Authorities. The Controller is the central location for all digital
signatures.
• The Act covers offences and violations committed outside of India.
• Without a warrant, senior law enforcement officials and substitute officers will enter any
public location and search and arrest anyone.
• Provisions for the establishment of a Cyberlaws Advisory Committee to advise the Central.
The Act, according to Section 1 (2), applies to the entire nation, which includes Jammu and
the geographical region, as it is based on Article 253 of the constitution. Furthermore,
citizenship is not taken into account, and extraterritorial jurisdiction is granted.
The Act extends to any act or dispute committed outside of India, according to Section 1 (2)
next to Section 75. If the behaviour of people that constitutes the infraction includes a
laptop, a processing system, or a network located in India, the individual is punishable under
the Act, regardless of his or her rank.
Non-Applicability
The Act does not apply to the following materials, according to Section 1 (4) of the
Knowledge Technology Act of 2000:
• Except for cheques, execution of instruments under the Negotiable Instruments Act of
1881.
• Execution of professional influence under the Powers of Professional Act of 1882.
• Establishment of a trust under the Indian Trust Act of 1882.
• The execution of a will under the Indian Succession Act of 1925, as well as the disposal of
any other legal instrument by whatever name.
• Entering into a contract for the sale or conveyance of real estate or any interest in real
estate.
• Any other category of papers or transactions that the Central Government has also
published in the Gazette.
The origination of the internet has brought massive change in our lives. It has made our lives
better by introducing a better way of communication, faster transit and also storage of
electronic data in large quantities in small spaces. People from diverse fields are enormously
using the computers to create, store and transmit information in the electronic form instead
of the documents, papers. The internet has evolved in decades, and every day, a new
change in technology has been taking place. Mike Fitzpatrick said, “The internet has brought
communities across the globe closer together through instant communication.” A single
button can grab many opportunities; a broad scope of data can be accessed by just sitting at
one place. The information across can the world can be accessed in a minute, making the
internet, a global library. Internet was once used for only military purposes, but now, it has
brought a radical change in our lives.
In the era of technology, new crimes have emerged as a result of our increasing reliance on
the internet. People are abusing technology to the point of causing harm to others. Because
of the increased speed of communication, there is a need for a legislation to safeguard
people. "First and foremost, our focus on security is on the infrastructure itself," stated John
W Thompson. So it's all about how you safeguard the server's network, device, and
application." In 1998, the Indian Parliament prepared the E-Commerce Act, which was then
redrafted as the 'Information Technology Bill, 1999,' which was eventually enacted in 2000.
The IT Act's goal is to give legal status to legal transactions, electronic data interchange,
electronic commerce transactions, and other forms of communication. When it comes to
electronic media, such as computers, television, social media, and telephones, this Act
covers a wide range of topics. If the accused offender tries to infect a computer with a virus.
PROVISIONS
The first law addressing technology, computers, e-commerce, and electronic
communication was the Information Technology Act of 2000. There are a total of 13
chapters and 90 provisions in the Act. The revisions to the Indian Penal Code 1860, the
Indian Evidence Act 1872, the Bankers' Books Evidence Act 1891, and the Reserve Bank of
India Act 1934 are dealt with in sections 91 to 94. The Act includes chapters on electronic
record authentication, electronic signatures, and other topics.
Several amendments have been made to various laws to give effect to the IT Act, such as the
admissibility of electronic records as evidence, the Presumption as to Digital Signature
Certificates, and so on. In the Indian Penal Code, provisions relating to digital signatures and
electronic records have been added.
Let's have a look at some frequent cyber-crime scenarios that might lead to conviction
under the IT Act 2000 (as modified in 2008) Act's fines and crimes. This will provide a brief
explanation of the offence as well as the circumstances under which it can be committed:
A fake public profile of a person is made on a social networking site with the right location,
residence information, or contact data, but he or she is labelled as a "prostitute" or a "loose
character." As a result, the victim is harassed. Sections 66A and 67 of the Information
Technology Act, as well as Section 509 of the Indian Penal Code, are applicable.
An online hate community is formed when a religious group is incited to act or make
offensive statements about a country, national personalities, or other topics. Section 66A of
the IT Act, as well as sections 153A and 153B of the Indian Penal Code, are applicable.
Web Defacement:
A pornographic or defamatory page replaces the homepage of a website. On significant
days, government websites are frequently targeted by hackers. Sections 43 and 66 of the IT
Act, as well as Sections 66F, 67, and 70 of the IT Act, apply in some instances.
Cyber Terrorism:
For hiding information and records of their unlawful activity, many terrorists employ virtual
(GDrive, FTP sites) and physical storage devices (USBs, hard drives). Provisions that apply:
Traditional terrorist legislation, as well as Section 69 of the IT Act, may apply.
Money launderers and persons engaged in unlawful business operations use both virtual
and physical actions to conceal their identities. Income Tax Act and Prevention of Money
Laundering Act are both applicable. Depending on the circumstances, the IT Act may apply.
Investors must now link their DEMAT accounts to their internet banking accounts, which are
frequently accessed without authorization, resulting in share trading fraud. Sections 43, 66,
66C, and 66D of the IT Act, as well as Section 420 of the IPC, are applicable.
LIMITATIONS OF IT ACT
Because of the rise in cybercrime, the Indian government recognised the challenges faced
by internet users, and the IT Act was enacted to protect their interests. The government has
issued a number of notices to change the legislation, however the following concerns have
yet to be addressed.
1. Spam is an unwanted e-mail communication that is the electronic equivalent of junk mail
delivered by the postal service. The receivers of the email have no prior business or personal
contact with the sender. Unsolicited Bulk Email ("UBE") or Unsolicited Commercial Email
("UCE") is sent without the recipient's permission or request. In India, there is no specific
anti-spam legislation that applies to UCE/UBE. The Spam Act of 2003 in Australia prohibits
all unsolicited commercial electronic messages and requires that all commercial emails
include complete sender information and a functional unsubscribe facility, whereas CAN-
SPAM in the United States does not outright prohibit all UCE, but rather regulates it by
prohibiting header information that is materially false or misleading. Any email
communication that causes irritation or trouble, or is meant to deceive or mislead the
receiver about the origin of such a message, is punished under the 2008 amendment.
2. Customer transaction integrity: Data integrity refers to data that has not been tampered
with while retaining correctness and consistency. It's not the same as data security or denial
of service. Data modification by malicious programmes or individuals can frequently
generate more significant issues than data confidentiality. The IT Act of 2000, Section 43,
makes provision for illegal access, but nothing is written concerning a bank's transaction
integrity. There is a guideline for maintaining transaction integrity, but no formal regulation.
It is also not regarded as a criminal offence. Many countries, on the other hand, have
legislation in place to ensure transaction integrity.
3. Pornography: The IT Act of 2000 forbids the publication of obscene material, but there
have been no considerations or laws regarding the viewing of such information. Browsing of
child pornography is only criminal under Section 67 B of the 2008 Amendment.
Nothing has been said about looking at adult pornography. However, under Section 63 of
the Criminal Justice and Immigration Act 2008, possession of "extreme pornographic
pictures" is a crime in the United Kingdom.
Section 65: Any person who tampers, conceals, destroys, or alters any computer source
material knowingly faces a fine of up to Rs.2,00,000/- or a sentence of up to 3 years in jail,
or both.
Section 66: Any individual who does a dishonest or fraudulent act as described in
Section 66B: Any person who obtains or keeps any stolen computer resource or
communication equipment dishonestly or fraudulently will be subject to a penalty of up to
Rs. 1,00,000/-, or to imprisonment for up to three years, or both.
Section 66C: Any person who uses another person's Electronic Signature, Password, or any
other Unique Identification Feature dishonestly or fraudulently is liable to a fine of up to Rs.
1,00,000/-, or to imprisonment for up to 3 years, or both.
Section 66D: Any person who cheats by personating dishonestly or fraudulently using any
communication device or computer resource is liable to a fine of up to Rs. 1,00,000/-, or to
imprisonment for up to 3 years, or both.
Section 66F: Any person who acts electronically or with the use of a computer with the aim
to endanger India's unity, integrity, security, or sovereignty is punished by life
imprisonment.
Section 67: Any person who publishes or transmits in electronic form any material that
appeals to prurient interest, or whose effect is such that it tends to deprave and corrupt
persons who are likely to read, see, or hear matter contained in it, shall be liable to a fine of
up to Rs.5,00,000/-, or to imprisonment for up to 3 years, or both. In the event of a second
or subsequent conviction, he might face a fine of up to Rs.10,000/-, or a sentence of up to 5
years in jail, or both.
Section 67A: Any person who publishes or transmits in electronic form any content
containing sexually explicit acts or behaviour is liable to a fine of up to Rs.10,000/- or a
sentence of up to 5 years in jail, or both. In the event of a second or subsequent conviction,
he might face a fine of up to Rs.10,000/-, or a sentence of up to seven years in jail, or both.
Section 68: The Controller may, by order, direct a Certifying Authority or any employee of
such Authority to take such measures or cease carrying on such activities as specified in the
order if those measures or activities are necessary to ensure compliance with the provisions
of this Act, rules, or regulations made thereunder, and any person who intentionally or
knowingly fails to comply with the order shall be liable to a penalty of up to Rs.1,00,000/- or
imprisonment for up to two years.
Section 69: Directions of the Controller to a subscriber to extend decryption facilities: - If the
Controller is satisfied that it is necessary or expedient to do so in the interest of India's
sovereignty or integrity, the security of the State, friendly relations with foreign States, or
public order, or to prevent incitement to the commission of any cognizable offence; by
order, direct any agency of the Government to intercept
- When any agency instructed under subsection (1) requests it, the subscriber or any person
in charge of the computer resource must provide all facilities and technical support to
decrypt the information.
- Any subscriber or person who fails to help the agency referred to in paragraph (2) is
subject to a sentence of imprisonment of up to seven years.
Section 70: The appropriate government may declare any computer resource that directly
or indirectly affects the facility of Critical Information Infrastructure to be a protected
system by notification in the Official Gazette. Any person who fails to comply with the
notification is liable to ten years in prison and a fine (amount of fine is not specified in the
act).
Section 71: Whoever makes any misrepresentation to, or conceals any material fact from,
the Controller or the Certifying Authority for the purpose of obtaining any License or
Electronic Signature Certificate, as the case may be, is liable to a fine of up to Rs.1,00,000/-,
or to imprisonment for up to two years, or both.
Section 72: Any person who has secured access to any electronic record, book, register,
correspondence, information, document, or other material without the consent of the
person concerned discloses such electronic record, book, register, correspondence,
information, document, or other material to any other person is liable to a fine of up to
Rs.1,00,000/-, or to imprisonment for up to two years, or both.
Section 72A: Any person who obtains access to any material containing personal
information about another person with the intent to cause or knowing that he is likely to
cause wrongful loss or gain discloses it without the consent of the person concerned, or in
violation of a lawful contract, is liable to a fine of up to Rs.5,00,000/-, or to imprisonment for
up to three years, or both.
Section 73: Any person who publishes an Electronic Signature Certificate or makes it
available to anyone else with the knowledge that the Certifying Authority has not issued it,
the Subscriber has not accepted it, or the Certificate has been revoked or suspended is liable
to a fine of up to Rs. 1,00,000/-, or both.
Section 74: Any person who intentionally develops, publishes, or otherwise makes
accessible an Electronic Signature Certificate for any fraudulent or criminal purpose faces a
fine of up to Rs. 1,00,000/- or a sentence of up to 2 years in jail, or both.
Section 75: If a person commits an offence or contravention outside of India and the act or
conduct constituting the offence or contravention involves a computer, computer system, or
computer network located in India, the provisions of this Act apply to any offence or
contravention committed outside of India by any person, regardless of nationality.
Section 76: Any computer, computer system, floppies, compact discs, tape drives, or other
accessories linked thereto that have been, or are being, used in violation of any provision of
this Act, rules, orders, or regulations imposed thereunder, is subject to seizure. Only the
person in default will be arrested if it is proven that such resources were not utilised to
conduct fraud.
The aforementioned provision has a required condition that specifies that the penalties or
confiscation will not interfere with any other punishments that the person affected is
subject to under any other legislation in effect at the time.
The offence will be investigated by a police officer with at least the rank of Deputy
Superintendent of Police.