SlideShare a Scribd company logo
1 of 27
Glimpses
on
Information Technology Act, 2000
With Cyber Offences under IT
Act,2000
Rahul Kailas Bharati
HOD and Assistant Professor in Law
Department of Law
Government Institute of Forensic Science,Aurangabad
E-mail : rahulbharati.2009 @gmail. Com
IT Act, 2000
Enacted on 17th
October 2000- India is
12th nation in the world to adopt cyber
laws.
IT Act is based on Model law on
e-commerce adopted by UNCITRAL.
Structure of IT Act, 2000
✔ Total 13 chapters ,90 sections.
✔ Sections 91 to 94 deal with the
amendments to the four Acts namely
Indian Penal Code 1860, The Indian
Evidence Act 1872, The Bankers’ Books
Evidence Act 1891 and the Reserve Bank
of India Act 1934.
Objectives of the IT Act
To provide legal recognition for
transactions:-
⚫ Carried out by means of electronic data
interchange, and other means of electronic
communication, commonly referred to as
"electronic commerce“
⚫ To facilitate electronic filing of documents
with Government agencies and E-Payments
⚫ To amend the Indian Penal Code, Indian
Evidence Act,1872, the Banker’s Books
Evidence Act 1891,Reserve Bank of India
Act ,1934
Important Definitions
Computer : Sec.2(1)(i)
✔ Any electronic, magnetic, optical and
other high speed data processing
device,
✔ Performs logical, arithmetic and
memory functions,
✔ By manipulating electronic, magnetic
or optical impulses.
Computer System : Sec.2(1)(l)
A device or collection of devices including
input support devices (keyboard, mouse,
etc) and output support devices (monitor,
printers, etc.) capable of being used in
conjunction with external files which
contain computer programs.
Communication Device :
Sec.2(1)(ha)
Includes Cell phones, personal Digital
Assistance or any other device used to
communicate, send or transmit any text,
video, audio or image.
Examples : ipod, ipads, DTH (Set top Box),
other smart devices.
Information: Sec.2(1)(v)
Includes data, message, text, images, sound,
voice, codes, computer programmes,
software, databases or microfilm.
IT Act (chapter XI ) : Offences
Three parts:
❖ Where computer /server/communication
device is object/target.
(Secs.65,66,66F ,70)
Sec.65 .Tampering with computer
source documents.
Penalty : Imprisonment up to 3years or fine
up to two lakhs rupees or both.
Case : Syed Asifuddin v. State of A.P., 2006
Sec.66. Computer related offences
( Dishonest and fraudulent intension)
Includes destruction, damage, disruption,
denial, deletion, concealment, stealing of
information.
Examples : Cyber spying, Data theft, Denial
of Service Attacks (Dos), Ramsomware,
Virus attack.
Penalty : Imprisonment up to 3years or a
fine up to 5lakhs rupees or both.
Sec.66 F. CyberTerrorism
Illegal Activities with the computer resource
with intent to threaten the unity, integrity,
security or sovereignty of India
Penalty : Imprisonment for life.
Example : 26/11 attacks on Taj and Trident
Hotel.
Where crime is committed using a
computer/ / communication device
Three sub parts :
a) Offences affecting the human
body/person :
Sec.66 A. and Sec. 66 E (Added by 2008
Amendment Act)
Sec.66 A : Punishment for sending
offensive messages through
communication service
✔ Messages which are grossly offensive sent
through emails, SMS, blogs, tweets.
Examples : cyber stalking, morphing of
images, unsolicited e-mails.
Penalty : 3 year imprisonment and with
fine.
Challenge to the Constitutionality of
Sec. 66A
Shreya Singhal v. Union of India, 2012
Supreme Court of India Struck down Sec
66A as violative of Art. 19(1)(a) of the
Constitution of India.
Sec. 66 E. Punishment for violation of
privacy
Intentionally capturing , publishing or
transmitting pictures of private parts of
person without consent.
Examples : Installation of spy cams/hidden
cameras inside wash rooms, bedrooms,
changing rooms, hotel rooms.
Penalty : Imprisonment up to 3 years or
fine not exceeding 2 lakh rupees or both.
b) Offences affecting property
✔ Sec.66 B, 66 C, 66 D.
❖ Sec.66B : Punishment for dishonestly
receiving stolen computer resource.
❖ Sec.66C : Punishment for identity theft
(Fraudulently making use of password)
Examples : phishing, data theft.
❖ Sec. 66D : Punishment for cheating by
personation
Examples of Sec. 66D :
Creation of clone website to capture
personal information, Intentionally
creating a fake profile on matrimonial
social networking sites with intention to
cheat that person.
Penalty for above three sections :
Imprisonment up to 3 years and fine up to
one lakh rupees.
c) Offences affecting Decency and
Morals
✔ Sec.67, 67A , 67 B.
❖ Sec.67. punishment for publishing or
transmitting obscene material in
electronic form.
Penalty :
First conviction : 3 year imprisonment
with fine up to 5 lakh rupees .
Second Conviction : 5year imprisonment
and fine up to 10 lakh rupees
Sec. 67 and Bazee Case.
❖ Sec. 67 A : Punishment for publishing /
transmitting of material sexually explicit act
in electronic form.
Penalty :
First conviction : 5 years and fine may
extend to 10 lakh rupees.
Second conviction: 7years and fine may
extend to 10 lakh rupees.
❖ Sec. 67 B. Punishment for publishing or
transmitting material depicting children in
sexually explicit act in electronic form.
(Child Pornography)
Penalty :
First Conviction : 5 years imprisonment
with fine up to 10 lakh rupees.
Second conviction : 7 years imprisonment
and fine up to 10 lakh Rupees.
Common Cyber-crime scenarios and
Applicability of Legal Sections
Harassment via fake public profile on
social networking site
A fake profile of a person is created on a
social networking site with the correct
address, residential information or contact
details but he/she is labeled as ‘prostitute’ or
a person of ‘loose character’.This leads to
harassment of the victim.
Provisions Applicable:- Sections 67 of IT
Act and Section 509 of the Indian Penal
Code.
Email Account Hacking
If victim’s email account is hacked and
obscene emails are sent to people in
victim’s address book.
Provisions Applicable:- Sections 43, 66,
66C, 67, 67A and 67B of IT Act.
Credit Card Fraud
Unsuspecting victims would use infected
computers to make online transactions.
Provisions Applicable:- Sections 43, 66,
66C, 66D of IT Act and section 420 of the
IPC.
Web Defacement
The homepage of a website is replaced
with a pornographic or defamatory page.
Government sites generally face the
wrath of hackers on symbolic days.
Provisions Applicable:- Sections 43 and
66 of IT Act and Sections 66F, 67 and 70
of IT Act also apply in some cases.
IntroducingViruses,Worms,
Backdoors, Rootkits,Trojans, Bugs
All of the above are some sort of
malicious programs which are used to
destroy or gain access to some electronic
information.
Provisions Applicable:- Sections 43, 66,
66A of IT Act and Section 426 of Indian
Penal Code.
Cyber Pornography
Among the largest businesses on Internet.
Pornography may not be illegal in many
countries, but child pornography is.
Provisions Applicable:- Sections 67, 67A and
67B of the IT Act.
Phishing and Email Scams
Phishing involves fraudulently acquiring
sensitive information through masquerading a
site as a trusted entity. (E.g. Passwords, credit
card information)
Provisions Applicable:- Section 66, 66D of IT
Act and Section 420 of IPC
Theft of Confidential Information
Many business organizations store their
confidential information in computer
systems.This information is targeted by
rivals, criminals and disgruntled
employees.
Provisions Applicable:- Sections 43, 66,
66B of IT Act and Section 426 of Indian
Penal Code.
Thank you

More Related Content

What's hot

Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
maruhope
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 

What's hot (20)

Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Cyber law
Cyber lawCyber law
Cyber law
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
it act 2000
it act 2000it act 2000
it act 2000
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 

Similar to Information technology Act with Cyber offences .pptx

Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrime
Aryan Ajmer
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
Prashant Angadi
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
Aditya Shukla
 

Similar to Information technology Act with Cyber offences .pptx (20)

Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrime
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber
CyberCyber
Cyber
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber law01
Cyber law01Cyber law01
Cyber law01
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Shilpa
ShilpaShilpa
Shilpa
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
15998595.ppt
15998595.ppt15998595.ppt
15998595.ppt
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 

Recently uploaded

一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution law
yogita9398
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
F La
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
mefyqyn
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
bd2c5966a56d
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
Airst S
 

Recently uploaded (20)

Petitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docxPetitioner Moot Memorial including Charges and Argument Advanced.docx
Petitioner Moot Memorial including Charges and Argument Advanced.docx
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
Call Girls in Nizamabad 9332606886 High Profile Call Girls You Can Get The...
Call Girls in Nizamabad   9332606886  High Profile Call Girls You Can Get The...Call Girls in Nizamabad   9332606886  High Profile Call Girls You Can Get The...
Call Girls in Nizamabad 9332606886 High Profile Call Girls You Can Get The...
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution law
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxCASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptx
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 

Information technology Act with Cyber offences .pptx

  • 1. Glimpses on Information Technology Act, 2000 With Cyber Offences under IT Act,2000 Rahul Kailas Bharati HOD and Assistant Professor in Law Department of Law Government Institute of Forensic Science,Aurangabad E-mail : rahulbharati.2009 @gmail. Com
  • 2. IT Act, 2000 Enacted on 17th October 2000- India is 12th nation in the world to adopt cyber laws. IT Act is based on Model law on e-commerce adopted by UNCITRAL.
  • 3. Structure of IT Act, 2000 ✔ Total 13 chapters ,90 sections. ✔ Sections 91 to 94 deal with the amendments to the four Acts namely Indian Penal Code 1860, The Indian Evidence Act 1872, The Bankers’ Books Evidence Act 1891 and the Reserve Bank of India Act 1934.
  • 4. Objectives of the IT Act To provide legal recognition for transactions:- ⚫ Carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce“ ⚫ To facilitate electronic filing of documents with Government agencies and E-Payments ⚫ To amend the Indian Penal Code, Indian Evidence Act,1872, the Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934
  • 5. Important Definitions Computer : Sec.2(1)(i) ✔ Any electronic, magnetic, optical and other high speed data processing device, ✔ Performs logical, arithmetic and memory functions, ✔ By manipulating electronic, magnetic or optical impulses.
  • 6. Computer System : Sec.2(1)(l) A device or collection of devices including input support devices (keyboard, mouse, etc) and output support devices (monitor, printers, etc.) capable of being used in conjunction with external files which contain computer programs.
  • 7. Communication Device : Sec.2(1)(ha) Includes Cell phones, personal Digital Assistance or any other device used to communicate, send or transmit any text, video, audio or image. Examples : ipod, ipads, DTH (Set top Box), other smart devices.
  • 8. Information: Sec.2(1)(v) Includes data, message, text, images, sound, voice, codes, computer programmes, software, databases or microfilm.
  • 9. IT Act (chapter XI ) : Offences Three parts: ❖ Where computer /server/communication device is object/target. (Secs.65,66,66F ,70) Sec.65 .Tampering with computer source documents. Penalty : Imprisonment up to 3years or fine up to two lakhs rupees or both. Case : Syed Asifuddin v. State of A.P., 2006
  • 10. Sec.66. Computer related offences ( Dishonest and fraudulent intension) Includes destruction, damage, disruption, denial, deletion, concealment, stealing of information. Examples : Cyber spying, Data theft, Denial of Service Attacks (Dos), Ramsomware, Virus attack. Penalty : Imprisonment up to 3years or a fine up to 5lakhs rupees or both.
  • 11. Sec.66 F. CyberTerrorism Illegal Activities with the computer resource with intent to threaten the unity, integrity, security or sovereignty of India Penalty : Imprisonment for life. Example : 26/11 attacks on Taj and Trident Hotel.
  • 12. Where crime is committed using a computer/ / communication device Three sub parts : a) Offences affecting the human body/person : Sec.66 A. and Sec. 66 E (Added by 2008 Amendment Act)
  • 13. Sec.66 A : Punishment for sending offensive messages through communication service ✔ Messages which are grossly offensive sent through emails, SMS, blogs, tweets. Examples : cyber stalking, morphing of images, unsolicited e-mails. Penalty : 3 year imprisonment and with fine.
  • 14. Challenge to the Constitutionality of Sec. 66A Shreya Singhal v. Union of India, 2012 Supreme Court of India Struck down Sec 66A as violative of Art. 19(1)(a) of the Constitution of India.
  • 15. Sec. 66 E. Punishment for violation of privacy Intentionally capturing , publishing or transmitting pictures of private parts of person without consent. Examples : Installation of spy cams/hidden cameras inside wash rooms, bedrooms, changing rooms, hotel rooms. Penalty : Imprisonment up to 3 years or fine not exceeding 2 lakh rupees or both.
  • 16. b) Offences affecting property ✔ Sec.66 B, 66 C, 66 D. ❖ Sec.66B : Punishment for dishonestly receiving stolen computer resource. ❖ Sec.66C : Punishment for identity theft (Fraudulently making use of password) Examples : phishing, data theft. ❖ Sec. 66D : Punishment for cheating by personation
  • 17. Examples of Sec. 66D : Creation of clone website to capture personal information, Intentionally creating a fake profile on matrimonial social networking sites with intention to cheat that person. Penalty for above three sections : Imprisonment up to 3 years and fine up to one lakh rupees.
  • 18. c) Offences affecting Decency and Morals ✔ Sec.67, 67A , 67 B. ❖ Sec.67. punishment for publishing or transmitting obscene material in electronic form. Penalty : First conviction : 3 year imprisonment with fine up to 5 lakh rupees . Second Conviction : 5year imprisonment and fine up to 10 lakh rupees
  • 19. Sec. 67 and Bazee Case. ❖ Sec. 67 A : Punishment for publishing / transmitting of material sexually explicit act in electronic form. Penalty : First conviction : 5 years and fine may extend to 10 lakh rupees. Second conviction: 7years and fine may extend to 10 lakh rupees.
  • 20. ❖ Sec. 67 B. Punishment for publishing or transmitting material depicting children in sexually explicit act in electronic form. (Child Pornography) Penalty : First Conviction : 5 years imprisonment with fine up to 10 lakh rupees. Second conviction : 7 years imprisonment and fine up to 10 lakh Rupees.
  • 21. Common Cyber-crime scenarios and Applicability of Legal Sections Harassment via fake public profile on social networking site A fake profile of a person is created on a social networking site with the correct address, residential information or contact details but he/she is labeled as ‘prostitute’ or a person of ‘loose character’.This leads to harassment of the victim. Provisions Applicable:- Sections 67 of IT Act and Section 509 of the Indian Penal Code.
  • 22. Email Account Hacking If victim’s email account is hacked and obscene emails are sent to people in victim’s address book. Provisions Applicable:- Sections 43, 66, 66C, 67, 67A and 67B of IT Act. Credit Card Fraud Unsuspecting victims would use infected computers to make online transactions. Provisions Applicable:- Sections 43, 66, 66C, 66D of IT Act and section 420 of the IPC.
  • 23. Web Defacement The homepage of a website is replaced with a pornographic or defamatory page. Government sites generally face the wrath of hackers on symbolic days. Provisions Applicable:- Sections 43 and 66 of IT Act and Sections 66F, 67 and 70 of IT Act also apply in some cases.
  • 24. IntroducingViruses,Worms, Backdoors, Rootkits,Trojans, Bugs All of the above are some sort of malicious programs which are used to destroy or gain access to some electronic information. Provisions Applicable:- Sections 43, 66, 66A of IT Act and Section 426 of Indian Penal Code.
  • 25. Cyber Pornography Among the largest businesses on Internet. Pornography may not be illegal in many countries, but child pornography is. Provisions Applicable:- Sections 67, 67A and 67B of the IT Act. Phishing and Email Scams Phishing involves fraudulently acquiring sensitive information through masquerading a site as a trusted entity. (E.g. Passwords, credit card information) Provisions Applicable:- Section 66, 66D of IT Act and Section 420 of IPC
  • 26. Theft of Confidential Information Many business organizations store their confidential information in computer systems.This information is targeted by rivals, criminals and disgruntled employees. Provisions Applicable:- Sections 43, 66, 66B of IT Act and Section 426 of Indian Penal Code.