Download as pdf
Download as pdf
You are on page 1of 4
ection 66B: Punishment for dishonest esource or communication device ection 66B of the Act reads as follows: ly receiving stolen computer “Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both”. ~~ This section would be applicable to people buying or retaining stolen computer source or communication device. This includes devices such as laptops, puters and mobile phones and also other computer resources such as stolen ta and software. In the example of a former employee selling a crucial source le to. a business rival, the former employee will be liable under Section 43 (i) ad with Section 66 ( stealing source code with dishonest intent) of the Act, yhile the business rival, if he was aware that the source code was stolen, will be able under this Section. © scanned with OKEN Scanner 86C: Punishment for identity theft ws Follows Section 66C of the Act reads a + use ofthe electronic signan “Whoever fraudulently or dishonestly make use af igmature, en a te aon ee Fy ote person, sh hhe punished with inprisonment of either description for a term which may c\iuind to thiee years and shall also be lable to fine which may extend 1p rupees one lakh.” | ’ ishonest or fraudulent us, ‘This section deals with ‘identity theft, ,, the dis! se unique ‘iewuihertion feature of person, which includes identifiers jio™* electronic signature, a login password, a PIN, a photograph or a biomeyi, identifier. The tems ‘dishonest’ and “fraudulent” have been explained previo, to mean an intention to cause economic loss or gain to a person, and the inten, to cause loss through deception respectively. This section does not differentge between a natural person and legal person like a company. Identity theft is generally of the following types: () Financial identity theft: This consists of using the stolen identity fig financial fraud, for example, if the online banking details are extrac through phishing and used to make purchases by the criminal, i) Criminal identity theft: This refers to the use of the identity forty commission other criminal activities, for instance, using anothe person's e-mail account for sending spam, (ii) Commercial identity theft: The identity theft of a company, busines, or other commercial enterprise is known as business or commercl identity thet. Identity cloning: Identity cloning happens when a person assumes te entie online identity of another person, either by taking over all ts online accounts, or using his personal information to. create furthe accounts 66D: Punishment for cheati i resource ‘ing by personation by using computer Section 66D of the IT Act reads as follows: “Whoever, by means of any communicatic ic cm of any communication device or computer resource ee perinaton fiat be punished with Tindrllontoer. of either lion for a term which may extend to three years Iso be Mable to fine which may extend to one lakh ripées~ Enis : a pute naPbles to any case of cheating by personation which is done wif “eager a Snmunication device. The terms ‘cheatin 3 can : corresponding sections under the IBC,” “"@*7t004 on comparison. with rer 53, In some counties, criminal identi io! record under the name of soit fers specifically to the ereation of an ene

You might also like