SlideShare a Scribd company logo
1 of 18
InformationTechnology Act, 2000
From Wikipedia,the free encyclopedia
Information Technology Act, 2000
An Act to provide legal recognition for
transactions carried out by means of electronic
data interchange and other means of electronic
communication, commonly referred to as
"electronic commerce", which involve the use of
alternatives to paper-based methods of
communication and storage of information, to
facilitate electronic filing of documents with the
Government agencies and further to amend the
Indian Penal Code, the Indian Evidence Act,
1872, the Bankers' Books Evidence Act, 1891
and the Reserve Bank of India Act, 1934 and for
matters connected therewith or incidental
thereto.
Citation Act No 21 of 2000
Enacted by Parliament of India
Date enacted 9 June 2000
Date assented to 9 June 2000
Date signed 9 May 2000
Date commenced 17 October 2000
Amendments
2008
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of
the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law
in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model
Law on Electronic Commerce 1996.
Background[edit]
The bill was passed in the budget session of 2000 and signed by
President K. R. Narayanan on 9 May 2000. The bill was finalised by
group of officials headed by then Minister of Information
Technology Pramod Mahajan.[1]
Summary[edit]
The original Act contained 94 sections, divided in 19 chapters and
4 schedules. The laws apply to the whole of India. Persons of other
nationalities can also be indicted under the law, if the crime involves a
computer or network located in India.[2]
The Act provides legal framework for electronic governance by giving
recognition to electronic records and digital signatures. The formation
of Controller of Certifying Authorities was directed by the Act, to
regulation issuing of digital signatures. It also defined cyber crimes
and prescribed penalties for them. It also established a Cyber
Appellate Tribunal to resolve disputes rising from this new law.[2]
The Act also amended various sections of Indian Penal Code,
1860, Indian Evidence Act, 1872, Banker's Book Evidence Act, 1891,
and Reserve Bank of India Act, 1934 to make them compliant with
new technologies.[2]
Amendments[edit]
A major amendment was made in 2008. It introduced the Section 66A
which penalised sending of "offensive messages". It also introduced
the Section 69, which gave authorities the power of "interception or
monitoring or decryption of any information through any computer
resource". It also introduced penalties for child porn, cyber
terrorism andvoyeurism. It was passed on 22 December 2008 which
any debate in Lok Sabha. The next day it was passed by the Rajya
Sabha. It was signed by the President of 5 February 2009.[3][4][5][6]
Offences[7][edit]
List of offences and the corresponding penalties:[8][9]
Section Offence Description Penalty
65
Tampering with
computer source
documents
If a person
knowingly or
intentionally
conceals, destroys
or alters or
Imprisonment up
to three years,
or/and with fine up
to ₹200,000
intentionally or
knowingly causes
another to conceal,
destroy or alter any
computer source
code used for a
computer, computer
programme,
computer system or
computer network,
when the computer
source code is
required to be kept
or maintained by
law for the time
being in force.
66
Hacking with
computer system
If a person with the
intent to cause or
knowing that he is
likely to cause
wrongful loss or
damage to the
public or any person
destroys or deletes
or alters any
Imprisonment up
to three years,
or/and with fine up
to ₹500,000
information residing
in a computer
resource or
diminishes its value
or utility or affects it
injuriously by any
means, commits
hack.
66B
Receiving stolen
computer or
communication
device
A person receives
or retains a
computer resource
or communication
device which is
known to be stolen
or the person has
reason to believe is
stolen.
Imprisonment up
to three years,
or/and with fine up
to ₹100,000
66C
Using password of
another person
A person fradulently
uses the password,
digital signature or
other unique
identification of
another person.
Imprisonment up
to three years,
or/and with fine up
to ₹100,000
66D
Cheating using
computer
resource
If a person cheats
someone using a
computur resource
or communication.
Imprisonment up
to three years,
or/and with fine up
to ₹100,000
66E
Publishing private
images of others
If a person
capturee, transmits
or publishes images
of a person's private
parts without his/her
consent or
knowledge.
Imprisonment up
to three years,
or/and with fine up
to ₹200,000
66F
Acts
ofcyberterrorism
If a person denies
access to an
authorised
personnel to a
computer resource,
accesses a
protected system or
introduces
contaminant into a
system, which the
intention of
threatening the
Imprisonment up
to life.
unity, integrity,
sovereignty or
security of India,
then he commits
cyberterrorism.
67
Publishing
information which
is obscene in
electronic form.
If a person
publishes or
transmits or causes
to be published in
the electronic form,
any material which
is lascivious or
appeals to the
prurient interest or if
its effect is such as
to tend to deprave
and corrupt persons
who are likely,
having regard to all
relevant
circumstances, to
read, see or hear
the matter
contained or
Imprisonment up
to five years,
or/and with fine up
to ₹1,000,000
embodied in it.
67A
Publishing images
containing sexual
acts
If a person
publishes or
transmits images
containing a sexual
explicit act or
conduct.
Imprisonment up
to seven years,
or/and with fine up
to ₹1,000,000
67B
Publishing child
porn or predating
children online
If a person
captures, publishes
or transmits images
of a child in a
sexually explicit act
or conduct. If a
person induces a
child into a sexual
act. A child is
defined as anyone
under 18.
Imprisonment up
to five years,
or/and with fine up
to ₹1,000,000 on
first conviction.
Imprisonment up
to seven years,
or/and with fine up
to ₹1,000,000on
second conviction.
67C
Failure to maintain
records
Persons deemed as
intermediatary (such
as an ISP) must
maintain required
Imprisonment up
to three years,
or/and with fine.
records for
stipulated time.
Failure is an
offence.
68
Failure/refusal to
comply with
orders
The Controller may,
by order, direct a
Certifying Authority
or any employee of
such Authority to
take such measures
or cease carrying on
such activities as
specified in the
order if those are
necessary to ensure
compliance with the
provisions of this
Act, rules or any
regulations made
thereunder. Any
person who fails to
comply with any
such order shall be
guilty of an offence.
Imprisonment up
to three years,
or/and with fine up
to ₹200,000
69
Failure/refusal
todecrypt data
If the Controller is
satisfied that it is
necessary or
expedient so to do
in the interest of the
sovereignty or
integrity of India, the
security of the
State, friendly
relations with
foreign Stales or
public order or for
preventing
incitement to the
commission of any
cognizable offence,
for reasons to be
recorded in writing,
by order, direct any
agency of the
Government to
intercept any
information
transmitted through
any computer
resource. The
Imprisonment up
to seven years
and possible fine.
subscriber or any
person incharge of
the computer
resource shall,
when called upon
by any agency
which has been
directed, must
extend all facilities
and technical
assistance to
decrypt the
information. The
subscriber or any
person who fails to
assist the agency
referred is deemed
to have committed a
crime.
70
Securing access
or attempting to
secure access to
a protected
system
The appropriate
Government may,
by notification in the
Official Gazette,
declare that any
computer, computer
Imprisonment up
to ten years,
or/and with fine.
system or computer
network to be a
protected system.
The appropriate
Government may,
by order in writing,
authorise the
persons who are
authorised to
access protected
systems. If a person
who secures access
or attempts to
secure access to a
protected system,
then he is
committing an
offence.
71 Misrepresentation
If anyone makes
any
misrepresentation
to, or suppresses
any material fact
from, the Controller
or the Certifying
Imprisonment up
to three years,
or/and with fine up
to ₹100,000
Authority for
obtaining any
licence or Digital
Signature
Certificate.
Notable cases[edit]
Section 66[edit]
 In February 2001, in one of the first cases, the Delhi police arrested
two men running a web-hosting company. The company had shut
down a website over non-payment of dues. The owner of the site
had claimed that he had already paid and complained to the police.
The Delhi police had charged the men for hacking under Section 66
of the IT Act and breach of trust under Section 408 of the Indian
Penal Code. The two men had to spend 6 days in Tihar jail waiting
for bail. Bhavin Turakhia, chief executive officer of diretci.com, a
webhosting firm said that this interpretation of the law would be
problematic for web-hosting companies.[10]
Section 66A REMOVED[11][edit]
 In September 2010, a freelance cartoonist Aseem Trivedi was
arrested under Section 66A of the IT Act, Section 2 of Prevention of
Insults to National Honour Act, 1971 and for sedition under the
Section 124 of the Indian Penal Code.[12] His cartoons depicting
widespread corruption in India were considered offensive.[13]
 On 12 April 2012, a Chemistry professor from Jadavpur University,
Ambikesh Mahapatra, was arrested for sharing a cartoon of West
Bengal Chief Minister Mamata Banerjeeand then Railway
Minister Mukul Roy.[14] The email was sent from the email address
of a housing society. Subrata Sengupta, the secretary of the
housing society, was also arrested. They were charged under
Section 66A and B of the IT Act, for defamation under Sections
500, for obsence gesture to a woman under Section 509, and
abetting a crime under Section 114 of the Indian Penal Code.[15]
 On 30 October 2012, a Puducherry businessman Ravi Srinivasan
was arrested under Section 66A. He had sent tweet accusing Karti
Chidambaram, son of then Finance Minister P. Chidambaram, of
corruption. Karti Chidambaram had complained to the police.[16]
 On 19 November 2012, a 21-year-old girl was arrested
from Palghar for posting a message on Facebook criticising the
shutdown in Mumbai for the funeral of Bal Thackeray. Another 20-
year-old girl was arrested for "liking" the post. They were initially
charged under Section 295A of the Indian Penal Code (hurting
religious sentiments) and Section 66A of the IT Act. Later, Section
295A was replaced by Section 505(2) (promoting enmity between
classes).[17] A group of Shiv Sena workers vandalised a hospital run
by the uncle of one of girls.[18] On 31 January 2013, a local court
dropped all charges against the girls.[19]
 On 18 March 2015, a teenaged boy was arrested
from Bareilly, Uttar Pradesh, for making a post on Facebook
insulting politician Azam Khan. The post allegedly contained hate
speech against a community and was falsely attributed to Azam
Khan by the boy. He was charged under Section 66A of the IT Act,
and Sections 153A (promoting enmity between different religions),
504 (intentional insult with intent to provoke breach of peace) and
505 (public mischief) of Indian Penal Code. After the Section 66A
was repealed on 24 March, the state government said that they
would continue the prosecution under the remaining charges.[20][21]
Criticism[edit]
Section 66A and restriction of free speech[edit]
Resolution for amendment[edit]
In December 2012, P Rajeev, a Rajya Sabha member from Kerala,
tried to pass a resolution seeking to amend the Section 66A. He was
supported by D. Bandyopadhyay, Gyan Prakash Pilania, Basavaraj
Patil Sedam, Narendra Kumar Kashyap, Rama Chandra Khuntia
and Baishnab Charan Parida. P Rajeev pointed that cartoons and
editorials allowed in traditional media, were being censored in the new
media. He also said that law was barely debated before being passed
in December 2008.[22]
Rajeev Chandrasekhar suggested the 66A should only apply to
person to person communication pointing to a similar section under
the Indian Post Office Act, 1898. Shantaram Naik opposed any
changes, saying that the misuse of law was sufficient to warrant
changes. Then Minister for Communications and Information
Technology Kapil Sibal defended the existing law, saying that similar
laws existed in US and UK. He also said that a similar provision
existed under Indian Post Office Act, 1898. However, P Rajeev said
that the UK dealt only with communication from person to person.[22]
Petitions challenging constitutionality[edit]
In November 2012, IPS officer Amitabh Thakur and his wife social
activist Nutan Thakur, filed a petition in the Lucknow bench of
the Allahabad High Court claiming that the Section 66A violated the
freedom of speech guaranteed in the Article 19(1)(a) of
the Constitution of India. They said that the section was vague and
frequently misused.[23]
Also in November 2012, a Delhi-based law student, Shreya Singhal,
filed a Public Interest Litigation (PIL) in the Supreme Court of India.
She argued that the Section 66A was vaguely phrased, as result it
violated Article 14, 19 (1)(a) and Article 21 of the Constitution. The PIL
was accepted on 29 November 2012.[24][25] A similar petition was also
filed the founder of MouthShut.com, Faisal Farooqui[26], and NGO
Common Cause represented by Prashant Bhushan[27] In August 2014,
the Supreme Court asked the central government to respond to a
petition filed by the Internet and Mobile Association of India (IAMAI)
which claimed that the IT Act gave the government power to arbitrarily
remove user-generated content.[28]
On 24 March 2015, the Supreme Court of India, gave the verdict that
Section 66A is unconstitutional in the Shreya Singhal v. Union of
India case. It however rejected the plea to strike down Sections 69A
and 79. The Court said that the offences defined under the law were
“open-ended, undefined and vague” and that "public's right to know" is
directly affected by it.[29][30]
Strict data privacy rules[edit]
The data privacy rules introduced in the Act in 2011 have been
described as too strict by some Indian and US firms. The rules require
firms to obtain written permission from customers before collecting
and using their personal data. This has affected US firms which
outsource to Indian companies. However, some companies have
welcomed the strict rules, saying it will removed fears of outsourcing
to India companies.[31]
Mandatory decryption[edit]
See also: Mandatory decryption
The Section 69 allows intercept any information and ask for
information decryption. To refuse decryption is an offence. The Indian
Telegraph Act, 1885 allows the government to tap phones. But,
according to a 1996 Supreme Court verdict the government can tap
phones only in case of a "public emergency". But, there is no such
restriction on Section 69.[4]
Future changes[edit]
On 2 April 2015, the Chief Minister of Maharashtra, Devendra
Fadnavis revealed to the state assembly that a new law was being
framed to replace the repealed Section 66A. Fadnavis was replying to
a query from Shiv Sena leader Neelam Gorhe. Gorhe had said that
repeal of the law would encourage online miscreants and asked
whether the state government would frame a law to this regard.
Fadnavis said that the previous law had resulted in no convictions, so
the law would be framed such that it would be strong and result in
convictions.[32]
On 13 April 2015, it announced that the Ministry of Home Affairs would
form a committee of officials from the Intelligence Bureau, Central
Bureau of Investigation, National Investigation Agency, Delhi
Police and ministry itself to produce a new legal framework. This step
was reportedly taken after complaints from intelligence agencies that,
they were no longer able to counter online posts that involved national
security matter or incite people to commit an offence, such as online
recruitment for ISIS.[33][34] Former Minister of State with the Ministry of
Information Technology, Milind Deora has supported a new
"unambiguous section to replace 66A".[35]

More Related Content

What's hot

Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000Karnika Seth
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008Mohit Goswami
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
The information technology act
The information technology actThe information technology act
The information technology actDhii Raymond
 
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]Kamal Thakur
 
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...manumelwin
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleHemraj Singh Chouhan
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTUShrey Patel
 

What's hot (20)

Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
Electronic governance
Electronic governanceElectronic governance
Electronic governance
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
It act 2000
It act 2000It act 2000
It act 2000
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
The information technology act
The information technology actThe information technology act
The information technology act
 
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]
 
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
 
it act 2000
it act 2000it act 2000
it act 2000
 
Manoj 1
Manoj 1Manoj 1
Manoj 1
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTU
 

Similar to Information technology act

Information Technology Act.pdf
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdfnithyam40
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000PrakharPrasoon
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Ashish Karan
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Parth Patel
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxTapan Khilar
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesPadmaja Naidu
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and traiHimanshu Jawa
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law casesSnavi
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in PakistanAyesha Majid
 
Information technology act
Information technology actInformation technology act
Information technology actDeepthiPrabhu9
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 

Similar to Information technology act (20)

Information Technology Act.pdf
Information Technology Act.pdfInformation Technology Act.pdf
Information Technology Act.pdf
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
 
Cyber
CyberCyber
Cyber
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &cases
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 
Information technology act
Information technology actInformation technology act
Information technology act
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 

Recently uploaded

The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 

Recently uploaded (20)

The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 

Information technology act

  • 1. InformationTechnology Act, 2000 From Wikipedia,the free encyclopedia Information Technology Act, 2000 An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto. Citation Act No 21 of 2000 Enacted by Parliament of India
  • 2. Date enacted 9 June 2000 Date assented to 9 June 2000 Date signed 9 May 2000 Date commenced 17 October 2000 Amendments 2008 The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996. Background[edit] The bill was passed in the budget session of 2000 and signed by President K. R. Narayanan on 9 May 2000. The bill was finalised by group of officials headed by then Minister of Information Technology Pramod Mahajan.[1] Summary[edit] The original Act contained 94 sections, divided in 19 chapters and 4 schedules. The laws apply to the whole of India. Persons of other nationalities can also be indicted under the law, if the crime involves a computer or network located in India.[2] The Act provides legal framework for electronic governance by giving recognition to electronic records and digital signatures. The formation of Controller of Certifying Authorities was directed by the Act, to
  • 3. regulation issuing of digital signatures. It also defined cyber crimes and prescribed penalties for them. It also established a Cyber Appellate Tribunal to resolve disputes rising from this new law.[2] The Act also amended various sections of Indian Penal Code, 1860, Indian Evidence Act, 1872, Banker's Book Evidence Act, 1891, and Reserve Bank of India Act, 1934 to make them compliant with new technologies.[2] Amendments[edit] A major amendment was made in 2008. It introduced the Section 66A which penalised sending of "offensive messages". It also introduced the Section 69, which gave authorities the power of "interception or monitoring or decryption of any information through any computer resource". It also introduced penalties for child porn, cyber terrorism andvoyeurism. It was passed on 22 December 2008 which any debate in Lok Sabha. The next day it was passed by the Rajya Sabha. It was signed by the President of 5 February 2009.[3][4][5][6] Offences[7][edit] List of offences and the corresponding penalties:[8][9] Section Offence Description Penalty 65 Tampering with computer source documents If a person knowingly or intentionally conceals, destroys or alters or Imprisonment up to three years, or/and with fine up to ₹200,000
  • 4. intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force. 66 Hacking with computer system If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any Imprisonment up to three years, or/and with fine up to ₹500,000
  • 5. information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack. 66B Receiving stolen computer or communication device A person receives or retains a computer resource or communication device which is known to be stolen or the person has reason to believe is stolen. Imprisonment up to three years, or/and with fine up to ₹100,000 66C Using password of another person A person fradulently uses the password, digital signature or other unique identification of another person. Imprisonment up to three years, or/and with fine up to ₹100,000
  • 6. 66D Cheating using computer resource If a person cheats someone using a computur resource or communication. Imprisonment up to three years, or/and with fine up to ₹100,000 66E Publishing private images of others If a person capturee, transmits or publishes images of a person's private parts without his/her consent or knowledge. Imprisonment up to three years, or/and with fine up to ₹200,000 66F Acts ofcyberterrorism If a person denies access to an authorised personnel to a computer resource, accesses a protected system or introduces contaminant into a system, which the intention of threatening the Imprisonment up to life.
  • 7. unity, integrity, sovereignty or security of India, then he commits cyberterrorism. 67 Publishing information which is obscene in electronic form. If a person publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or Imprisonment up to five years, or/and with fine up to ₹1,000,000
  • 8. embodied in it. 67A Publishing images containing sexual acts If a person publishes or transmits images containing a sexual explicit act or conduct. Imprisonment up to seven years, or/and with fine up to ₹1,000,000 67B Publishing child porn or predating children online If a person captures, publishes or transmits images of a child in a sexually explicit act or conduct. If a person induces a child into a sexual act. A child is defined as anyone under 18. Imprisonment up to five years, or/and with fine up to ₹1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to ₹1,000,000on second conviction. 67C Failure to maintain records Persons deemed as intermediatary (such as an ISP) must maintain required Imprisonment up to three years, or/and with fine.
  • 9. records for stipulated time. Failure is an offence. 68 Failure/refusal to comply with orders The Controller may, by order, direct a Certifying Authority or any employee of such Authority to take such measures or cease carrying on such activities as specified in the order if those are necessary to ensure compliance with the provisions of this Act, rules or any regulations made thereunder. Any person who fails to comply with any such order shall be guilty of an offence. Imprisonment up to three years, or/and with fine up to ₹200,000
  • 10. 69 Failure/refusal todecrypt data If the Controller is satisfied that it is necessary or expedient so to do in the interest of the sovereignty or integrity of India, the security of the State, friendly relations with foreign Stales or public order or for preventing incitement to the commission of any cognizable offence, for reasons to be recorded in writing, by order, direct any agency of the Government to intercept any information transmitted through any computer resource. The Imprisonment up to seven years and possible fine.
  • 11. subscriber or any person incharge of the computer resource shall, when called upon by any agency which has been directed, must extend all facilities and technical assistance to decrypt the information. The subscriber or any person who fails to assist the agency referred is deemed to have committed a crime. 70 Securing access or attempting to secure access to a protected system The appropriate Government may, by notification in the Official Gazette, declare that any computer, computer Imprisonment up to ten years, or/and with fine.
  • 12. system or computer network to be a protected system. The appropriate Government may, by order in writing, authorise the persons who are authorised to access protected systems. If a person who secures access or attempts to secure access to a protected system, then he is committing an offence. 71 Misrepresentation If anyone makes any misrepresentation to, or suppresses any material fact from, the Controller or the Certifying Imprisonment up to three years, or/and with fine up to ₹100,000
  • 13. Authority for obtaining any licence or Digital Signature Certificate. Notable cases[edit] Section 66[edit]  In February 2001, in one of the first cases, the Delhi police arrested two men running a web-hosting company. The company had shut down a website over non-payment of dues. The owner of the site had claimed that he had already paid and complained to the police. The Delhi police had charged the men for hacking under Section 66 of the IT Act and breach of trust under Section 408 of the Indian Penal Code. The two men had to spend 6 days in Tihar jail waiting for bail. Bhavin Turakhia, chief executive officer of diretci.com, a webhosting firm said that this interpretation of the law would be problematic for web-hosting companies.[10] Section 66A REMOVED[11][edit]  In September 2010, a freelance cartoonist Aseem Trivedi was arrested under Section 66A of the IT Act, Section 2 of Prevention of Insults to National Honour Act, 1971 and for sedition under the Section 124 of the Indian Penal Code.[12] His cartoons depicting widespread corruption in India were considered offensive.[13]
  • 14.  On 12 April 2012, a Chemistry professor from Jadavpur University, Ambikesh Mahapatra, was arrested for sharing a cartoon of West Bengal Chief Minister Mamata Banerjeeand then Railway Minister Mukul Roy.[14] The email was sent from the email address of a housing society. Subrata Sengupta, the secretary of the housing society, was also arrested. They were charged under Section 66A and B of the IT Act, for defamation under Sections 500, for obsence gesture to a woman under Section 509, and abetting a crime under Section 114 of the Indian Penal Code.[15]  On 30 October 2012, a Puducherry businessman Ravi Srinivasan was arrested under Section 66A. He had sent tweet accusing Karti Chidambaram, son of then Finance Minister P. Chidambaram, of corruption. Karti Chidambaram had complained to the police.[16]  On 19 November 2012, a 21-year-old girl was arrested from Palghar for posting a message on Facebook criticising the shutdown in Mumbai for the funeral of Bal Thackeray. Another 20- year-old girl was arrested for "liking" the post. They were initially charged under Section 295A of the Indian Penal Code (hurting religious sentiments) and Section 66A of the IT Act. Later, Section 295A was replaced by Section 505(2) (promoting enmity between classes).[17] A group of Shiv Sena workers vandalised a hospital run by the uncle of one of girls.[18] On 31 January 2013, a local court dropped all charges against the girls.[19]  On 18 March 2015, a teenaged boy was arrested from Bareilly, Uttar Pradesh, for making a post on Facebook
  • 15. insulting politician Azam Khan. The post allegedly contained hate speech against a community and was falsely attributed to Azam Khan by the boy. He was charged under Section 66A of the IT Act, and Sections 153A (promoting enmity between different religions), 504 (intentional insult with intent to provoke breach of peace) and 505 (public mischief) of Indian Penal Code. After the Section 66A was repealed on 24 March, the state government said that they would continue the prosecution under the remaining charges.[20][21] Criticism[edit] Section 66A and restriction of free speech[edit] Resolution for amendment[edit] In December 2012, P Rajeev, a Rajya Sabha member from Kerala, tried to pass a resolution seeking to amend the Section 66A. He was supported by D. Bandyopadhyay, Gyan Prakash Pilania, Basavaraj Patil Sedam, Narendra Kumar Kashyap, Rama Chandra Khuntia and Baishnab Charan Parida. P Rajeev pointed that cartoons and editorials allowed in traditional media, were being censored in the new media. He also said that law was barely debated before being passed in December 2008.[22] Rajeev Chandrasekhar suggested the 66A should only apply to person to person communication pointing to a similar section under the Indian Post Office Act, 1898. Shantaram Naik opposed any changes, saying that the misuse of law was sufficient to warrant changes. Then Minister for Communications and Information Technology Kapil Sibal defended the existing law, saying that similar laws existed in US and UK. He also said that a similar provision
  • 16. existed under Indian Post Office Act, 1898. However, P Rajeev said that the UK dealt only with communication from person to person.[22] Petitions challenging constitutionality[edit] In November 2012, IPS officer Amitabh Thakur and his wife social activist Nutan Thakur, filed a petition in the Lucknow bench of the Allahabad High Court claiming that the Section 66A violated the freedom of speech guaranteed in the Article 19(1)(a) of the Constitution of India. They said that the section was vague and frequently misused.[23] Also in November 2012, a Delhi-based law student, Shreya Singhal, filed a Public Interest Litigation (PIL) in the Supreme Court of India. She argued that the Section 66A was vaguely phrased, as result it violated Article 14, 19 (1)(a) and Article 21 of the Constitution. The PIL was accepted on 29 November 2012.[24][25] A similar petition was also filed the founder of MouthShut.com, Faisal Farooqui[26], and NGO Common Cause represented by Prashant Bhushan[27] In August 2014, the Supreme Court asked the central government to respond to a petition filed by the Internet and Mobile Association of India (IAMAI) which claimed that the IT Act gave the government power to arbitrarily remove user-generated content.[28] On 24 March 2015, the Supreme Court of India, gave the verdict that Section 66A is unconstitutional in the Shreya Singhal v. Union of India case. It however rejected the plea to strike down Sections 69A and 79. The Court said that the offences defined under the law were
  • 17. “open-ended, undefined and vague” and that "public's right to know" is directly affected by it.[29][30] Strict data privacy rules[edit] The data privacy rules introduced in the Act in 2011 have been described as too strict by some Indian and US firms. The rules require firms to obtain written permission from customers before collecting and using their personal data. This has affected US firms which outsource to Indian companies. However, some companies have welcomed the strict rules, saying it will removed fears of outsourcing to India companies.[31] Mandatory decryption[edit] See also: Mandatory decryption The Section 69 allows intercept any information and ask for information decryption. To refuse decryption is an offence. The Indian Telegraph Act, 1885 allows the government to tap phones. But, according to a 1996 Supreme Court verdict the government can tap phones only in case of a "public emergency". But, there is no such restriction on Section 69.[4] Future changes[edit] On 2 April 2015, the Chief Minister of Maharashtra, Devendra Fadnavis revealed to the state assembly that a new law was being framed to replace the repealed Section 66A. Fadnavis was replying to a query from Shiv Sena leader Neelam Gorhe. Gorhe had said that repeal of the law would encourage online miscreants and asked whether the state government would frame a law to this regard.
  • 18. Fadnavis said that the previous law had resulted in no convictions, so the law would be framed such that it would be strong and result in convictions.[32] On 13 April 2015, it announced that the Ministry of Home Affairs would form a committee of officials from the Intelligence Bureau, Central Bureau of Investigation, National Investigation Agency, Delhi Police and ministry itself to produce a new legal framework. This step was reportedly taken after complaints from intelligence agencies that, they were no longer able to counter online posts that involved national security matter or incite people to commit an offence, such as online recruitment for ISIS.[33][34] Former Minister of State with the Ministry of Information Technology, Milind Deora has supported a new "unambiguous section to replace 66A".[35]