SlideShare a Scribd company logo
1 of 12
CYBER LAW ASSIGNMENT 
ON 
IT ACT 2000 UNDER SECTIONS 
(43,65,66,66A,66B,66C,66D,66E,67,67A,67B,69,70,71,72,73) 
Submitted to 
Prof. Bhargav Revenkar 
Submitted by 
Padmaja .N( MBA13007061) 
Nandini.A (MBA13007055) 
Kavita. R (MBA13007034)
SECTIONS 
43: Penalty for damage to computer, computer system, etc.- 
If any person without permission of the owner or any other person who is in charge of a 
computer, computer system or computer network,- accesses or secures access to such computer, 
computer system or computer network downloads, copies or extracts any data, computer data 
base information from such computer, computer system or computer network including 
information or data held or stored in any removable storage medium. 
Introduces or causes to be introduced any computer contaminant or computer virus into any 
computer, computer system or computer network; 
damages or causes to be damaged and computer, computer system or computer network, data, 
computer database or any other programmes residing in such computer, computer system or 
computer network; 
Related Case: Mphasis BPO Fraud: 2005 
In December 2004, four call centre employees, working at an outsourcing facility operated by 
MphasiS in India, obtained PIN codes from four customers of MphasiSā€™ client, Citi Group. 
These employees were not authorized to obtain the PINs. In association with others, the call 
centre employees opened new accounts at Indian banks using falsse identities. Within two 
months, they used the PINs and account information gleaned during their employment at 
MphasiS to transfer money from the bank accounts of CitiGroup customers to the new accounts 
at Indian banks. 
By April 2005, the Indian police had tipped off to the scam by a U.S. bank, and quickly 
identified the individuals involved in the scam. Arrests were made when those individuals 
attempted to withdraw cash from the falsified accounts, $426,000 was stolen; the amount 
recovered was $230,000. 
Verdict: Court held that Section 43(a) was applicable here due to the nature of unauthorized 
access involved to commit transactions. 
65. Tampering with computer source documents. - 
Whoever knowingly or intentionally conceals, destroy, or alter any computer source code used 
for a computer, computer programme, computer system or computer network, when the 
computer source code is required to be kept or maintained by law for the time being in force, 
shall be punishable with imprisonment up to three years, or with fine which may extend up to 
two lakh rupees, or with both.
Explanation ā€“ For the purposes of this section, ā€œcomputer source codeā€ means the listing of 
programmes, compute commands, design and layout and programme analysis of computer 
resource in any form. 
Related Case: Syed Asifuddin and Ors. Vs. The State of Andhra PradeshIn this case, Tata 
Indicom employees were arrested for manipulation of the electronic 32- bit number (ESN) 
programmed into cell phones theft were exclusively franchised to Reliance Infocomm. 
Verdict: Court held that tampering with source code invokes Section 65 of the Information 
Technology Act. 
66. Hacking with Computer System. 
(1) Whoever with the intent of cause or knowing that is likely to cause wrongful loss or damage 
to the public or any person destroys or deletes or alters any information residing in a computer 
resource or diminishes its value or utility or affects it injuriously by any means, commits 
hacking. 
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with 
fine which may extend up to two lakh rupees, or with both. 
Related Case: Kumar v/s Whiteley In this case the accused gained unauthorized access to the 
Joint Academic Network (JANET) and deleted, added files and changed the passwords to deny 
access to the authorized users.Investigations had revealed that Kumar was logging on to the 
BSNL broadband Internet connection as if he was the authorized genuine user and ā€˜made 
alteration in the computer database pertaining to broadband Internet user accountsā€™ of the 
subscribers.The CBI had registered a cyber crime case against Kumar and carried out 
investigations on the basis of a complaint by the Press Information Bureau, Chennai, which 
detected the unauthorised use of broadband Internet. The complaint also stated that the 
subscribers had incurred a loss of Rs 38,248 due to Kumarā€™s wrongful act. He used to ā€˜hackā€™ 
sites from Bangalore, Chennai and other cities too, they said. 
Verdict: The Additional Chief Metropolitan Magistrate, Egmore, Chennai, sentenced N G Arun 
Kumar, the techie from Bangalore to undergo a rigorous imprisonment for one year with a fine 
of Rs 5,000 under section 420 IPC (cheating) and Section 66 of IT Act (Computer related 
Offense).
66 A Punishment for sending offensive messages through communication service, etc. 
Any person who sends, by means of a computer resource or a communication device, 
a) any information that is grossly offensive or has menacing character; or 
b) any information which he knows to be false, but for the purpose of causing annoyance, 
inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill 
will, persistently makes by making use of such computer resource or a communication device, 
c) any electronic mail or electronic mail message for the purpose of causing annoyance or 
inconvenience or to deceive or to mislead the addressee or recipient about the or igin of such 
messages (Inserted vide ITAA 2008) shall be punishable with imprisonment for a term which 
may extend to two three years and with fine. 
Explanation: For the purposes of this section, terms "Electronic mail" and "Electronic Mail 
Message" means a message or information created or transmitted or received on a computer, 
computer system, computer resource or communication device including attachments in text, 
image, audio, video and any other electronic record, which may be transmitted with the message] 
[ 66 B Punishment for dishonestly receiving stolen computer resource or communication 
device (Inserted Vide ITA 2008) 
Whoever dishonestly receives or retains any stolen computer resource or communication device 
knowing or having reason to believe thesame to be stolen computer resource or 
communication device, shall be punished with imprisonment of either description for a term 
which may extend to three years or with fine which may extend to rupees one lakh or with both.] 
[ 66C Punishment for identity theft. (Inserted Vide ITA 2008) 
Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other 
unique identification feature of any other person, shall be punished with imprisonment of 
eitherdescription for a term which may extend to three years and shall also be liable to fine 
which may extend to rupees one lakh.] 
ļ‚§ Relevant Cases: 
ļ‚§ The CEO of an identity theft protection company, Lifelock, Todd Davisā€™s social 
security number was exposed by Matt Lauer on NBCā€™s Today Show. Davisā€™ identity 
was used to obtain a $500 cash advance loan.
ļ‚§ Li Ming, a graduate student at West Chester University of Pennsylvania faked his 
own death, complete with a forged obituary in his local paper. Nine months later, Li 
attempted to obtain a new driverā€™s license with the intention of applying for new 
credit cards eventually. 
[66D Punishment for cheating by personation by using computer resource (Inserted Vide 
ITA 2008) 
Whoever, by means of any communication device or computer resource cheats by personation, 
shall be punished with imprisonment of either description for a term which may extend to 
three years and shall also be liable to fine which may extend to one lakh rupees.] 
Relevant Case: Sandeep Vaghese v/s State of Kerala 
A complaint filed by the representative of a Company, which was engaged in the business of 
trading and distribution of petrochemicals in India and overseas, a crime was registered against 
nine persons, alleging offenses under Sections 65, 66, 66A, C and D of the Information 
Technology Act along with Sections 419 and 420 of the Indian Penal Code. 
The company has a web-site in the name and and style `www.jaypolychem.comā€™ but, another 
web site `www.jayplychem.orgā€™ was set up in the internet by first accused Samdeep Varghese @ 
Sam, (who was dismissed from the company) in conspiracy with other accused, including Preeti 
and Charanjeet Singh, who are the sister and brother-in-law of `Samā€™ 
Defamatory and malicious matters about the company and its directors were made available in 
that website. The accused sister and brother-in-law were based in Cochin and they had been 
acting in collusion known and unknown persons, who have collectively cheated the company and 
committed acts of forgery, impersonation etc. 
Two of the accused, Amardeep Singh and Rahul had visited Delhi and Cochin. The first accused 
and others sent e-mails from fake e-mail accounts of many of the customers, suppliers, Bank etc. 
to malign the name and image of the Company and its Directors. The defamation campaign run 
by all the said persons named above has caused immense damage to the name and reputation of 
the Company. 
The Company suffered losses of several crores of Rupees from producers, suppliers and 
customers and were unable to do business.
66 E. Punishment for violation of privacy. (Inserted Vide ITA 2008) 
Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area 
of any person without his or her consent, under circumstances violating the privacy of 
thatperson, shall be punished with imprisonment which may extend to three years or with fine 
not exceeding two lakh rupees, or with both 
Explanation - 
For the purposes of this section ā€” 
(a) ā€•transmitā€– means to electronically send a visual image with the intent that it be viewed 
by a person or persons; 
(b) ā€•captureā€–, with respect to an image, means to videotape, photograph, film or record 
by any means; 
(c) ā€•private areaā€– means the naked or undergarment clad genitals, pubic area, buttocks or 
female breast; 
(d) ā€•publishesā€– means reproduction in the printed or electronic form and making it available for 
public; 
(e) ā€“ under circumstances violating privacyā€– means circumstances in which a person can have a 
reasonable expectation thatā€” 
(i) he or she could disrobe in privacy, without being concerned that an image of his private area 
was being captured; or 
(ii) any part of his or her private area would not be visible to the public, regardless of whether 
that person is in a public or private place.] 
ļ‚§ Relevant Cases: 
i. Jawaharlal Nehru University MMS scandal In a severe shock to the prestigious and 
renowned institute ā€“ Jawaharlal Nehru University, a pornographic MMS clip was 
apparently made in the campus and transmitted outside the university.Some media 
reports claimed that the two accused students initially tried to extort money from the 
girl in the video but when they failed the culprits put the video out on mobile phones, 
on the internet and even sold it as a CD in the blue film market.
67. Publishing of information which is obscene in electronic form. 
Whoever publishes or transmits or causes to be published in the electronic form, any material 
which is lascivious or appeal to the prurient interest or if its effect is such as to tend to deprave 
and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or 
hear the matter contained or embodied in it, shall be punished on first conviction with 
imprisonment of either description for a term which may extend to five years and with fine 
which may extend to one lakh rupees and in the event of a second or subsequent conviction with 
imprisonment of either description for a term which may extend to ten years and also with fine 
which may extend to two lakh rupees. 
ļ‚§ Relevant Case:This case is about posting obscene, defamatory and annoying message 
about a divorcee woman in the Yahoo message group. E-mails were forwarded to the 
victim for information by the accused through a false e- mail account opened by him in 
the name of the victim. These postings resulted in annoying phone calls to the lady. 
Based on the ladyā€™s complaint, the police nabbed the accused.Investigation revealed that 
he was a known family friend of the victim and was interested in marrying her. She was 
married to another person, but that marriage ended in divorce and the accused started 
contacting her once again. On her reluctance to marry him he started harassing her 
through internet. 
ļ‚§ Verdict: The accused was found guilty of offences under section 469, 509 IPC and 67 of 
IT Act 2000. He is convicted and sentenced for the offence as follows: 
ļ‚§ As per 469 of IPC he has to undergo rigorous imprisonment for 2 years and to pay 
fine of Rs.500/- 
ļ‚§ As per 509 of IPC he is to undergo to undergo 1 year Simple imprisonment and to 
pay Rs 500/- 
ļ‚§ As per Section 67 of IT Act 2000, he has to undergo for 2 years and to pay fine of 
Rs.4000/- 
All sentences were to run concurrently. 
The accused paid fine amount and he was lodged at Central Prison, Chennai. This is 
considered the first case convicted under section 67 of Information Technology Act 2000 
in India.
6. Section 67A ā€“ Punishment for publishing or transmitting of material containing 
sexually explicit act, etc. in electronic form Whoever publishes or transmits or causes 
to be published or transmitted in the electronic form any material which contains sexually 
explicit act or conductshall be punished on first conviction with imprisonment of either 
description for a term which may extend to five years and with fine which may extend to 
ten lakh rupees andin the event of second or subsequent conviction with imprisonment of 
either description for a term which may extend to seven years and also with fine which 
may extend to ten lakh rupees. 
7. Section 67B. Punishment for publishing or transmitting of material depicting 
children in sexually explicit act, etc. in electronic form Whoever:- 
o publishes or transmits or causes to be published or transmitted material in any 
electronic form which depicts children engaged in sexually explicit act or conduct or 
o creates text or digital images, collects, seeks, browses, downloads, advertises, 
promotes, exchanges or distributes material in any electronic form depicting children 
in obscene or indecent or sexually explicit manner or 
o cultivates, entices or induces children to online relationship with one or more children 
for and on sexually explicit act or in a manner that may offend a reasonable adult on 
the computer resource or 
o facilitates abusing children online or 
o records in any electronic form own abuse or that of others pertaining to sexually 
explicit act with children, 
shall be punished on first conviction with imprisonment of either description for a term 
which may extend to five years and with a fine which may extend to ten lakh rupees 
and in the event of second or subsequent conviction with imprisonment of either 
description for a term which may extend to seven years and also with fine which may 
extend to ten lakh rupees: 
Provided that the provisions of section 67, section 67A and this section does not extend to 
any book, pamphlet, paper, writing, drawing, painting, representation or figure in 
electronic form
Case: Father & son convicted under IT act in Kerala. 
The Additional District and Sessions Court here has upheld a lower courtā€™s 
verdict in the first cyber case filed in the State sentencing a Pentecostal Church priest and his son 
to rigorous 
imprisonment in 2006. 
Disposing of the appeal filed by the priest T.S. Balan and his son, Aneesh 
Balan, against the order of the Chief Judicial Magistrate, on Wednesday, 
Additional District Judge T.U. Mathewkutty said it was time the government took 
effective measures to check the growing trend of cyber crimes in the State.The 
court upheld the magistrateā€™s order sentencing the two to three-year rigorous 
imprisonment and imposing a fine of Rs. 25,000 under Section 67 of the 
information technology (IT) Act; awarding six months rigorous imprisonment 
under Section 120(B) of the Indian Penal Code; and ordering one year rigorous 
imprisonment and imposing a fine of Rs. 10,000 under Section 469 of the code. 
The court revoked the sentence under Section 66 of the IT Act. 
The cyber case dates back to January-February 2002 and the priest and his son 
became the first to be convicted of committing a cyber crime. 
The two were found guilty of morphing, web-hosting and e-mailing nude pictures 
of Pastor Abraham and his family. 
Balan had worked with the pastor until he fell out with him and was shown the 
door by the latter. Balan joined the Sharon Pentecostal Church later. 
The prosecution said the duo had morphed photographs of Abraham, his son, 
Valsan Abraham, and daughter, Starla Luke, and e-mailed them from fake mail IDs 
with captions. 
The morphed pictures were put on the web and the accused, who edited a local 
magazine called The Defender, wrote about these photos in his publication. 
Valsan received the pictures on the Internet and asked his father to file a 
complaint to the police. A police party raided the house of Balan and his son 
at Perumbavoor and collected evidences. 
The magistrateā€™s verdict came after a four-year trial, for which the court had 
to procure a computer with Internet connection and accessories. 
The police had to secure the services of a computer analyst too to piece 
together the evidences. Twenty-nine witnesses, including the Internet service 
provider and Bharat Sanchar Nigam Ltd., had to depose before the court.
69. Directions of Controller to a subscriber to extend facilities to decrypt information. 
(1) If the Controller is satisfied that it is necessry or expedient so to do in the interest of the 
sovereignty or integrity of India, the security of the State, friendly relations with foreign States or 
public order or for preventing incitement to the commission of any cognizable offence, for 
reasons to be recorded in writing, by order, direct any agency of the Government to intercept any 
information transmitted through any computer resource. 
(2) The subscriber or any person in charge of the computer resource shall, when called upon by 
any agency which has been directed under sub-section (1), extend all facilities and technical 
assistance to decrypt the information. 
(3) The subscriber or any person who fails to assist the agency referred to in sub-section (2) shall 
be punished with an imprisonment for a term which may extend to seven years. 
Relevant Case: In August 2007, Lakshmana Kailash K., a techie from Bangalore was arrested on 
the suspicion of having posted insulting images of Chhatrapati Shivaji, a major historical figure 
in the state of Maharashtra, on the social-networking site Orkut.The police identified him based 
on IP address details obtained from Google and Airtel -Lakshmanaā€™s ISP. He was brought to 
Pune and detained for 50 days before it was discovered that the IP address provided by Airtel 
was erroneous. The mistake was evidently due to the fact that while requesting information from 
Airtel, the police had not properly specified whether the suspect had posted the content at 1:15 
p.m. 
Verdict: Taking cognizance of his plight from newspaper accounts, the State Human Rights 
Commission subsequently ordered the company to pay Rs 2 lakh to Lakshmana as damages. The 
incident highlights how minor privacy violations by ISPs and intermediaries could have impacts 
that gravely undermine other basic human rights.
70. Protected system.- 
(1) The appropriate Government may, by notification in the Official Gazette, declare that any 
computer, computer system or computer network to be a protected system. 
(2) The appropriate Government may, by order in writing, authorise the persons who are 
authorised to access protected systems notified under sub-section. 
(3) Any person who secures access or attempts to secure access to a protected system in 
contravention of the provisions of this section shall be punished with imprisonment of either 
description for a term which may extend to ten years and shall also be liable to fine. 
71. Penalty for misrepresentation.- 
Whoever makes any misrepresentation, to, or suppresses any material fact from, the Controller or 
the Certifying Authority for obtaining any licennce or Digital Signature Certificate, as the case 
may be, shall be punished with imprisonment for a terms which may extend to two years, or with 
fine which may extend to one lakh rupees, or with both. 
72. Breach of confidentiality and privacy.- 
Save as otherwise provided in this Act or any other law for the time being in force, if any person 
who, in pursuance of any of the powers conferred under this Act, rules or regulations made 
thereunder, has secured access to any electronic record, book, register, correspondence, 
information, document or other material without the consent of the person concerned discloses 
such electronic record, book, register, correspondence, information, document or other material 
to any other person shall be punished with imprisonment for a term which may extend to two 
years, or with fine which may extend to one lakh rupees, or with both.
73. Penalty for publishing Digital Signature Certificate false in certain particulars. - 
(1) No person shall publish a Digital Signature Certificate or otherwise make it available to any 
other person with the knowledge that- 
(a) the Certifying Authority listed in the certificate has not issued it; or 
(b) the subscriber listed in the certificate has not accepted it; or 
(c) the certificate has been revoked or suspended, unless such publication is for the purposes of 
verifying a digital signature created prior to such suspension or revocation. 
(2) Any person who contravenes the provisions of sub-section (1) shall be punished with 
imprisonment for a term which may extend to two years, or with fine which may extend to one 
lakh rupees, or with both.

More Related Content

What's hot

Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber lawPrashant Angadi
Ā 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentRini Mahade
Ā 
Hacking
HackingHacking
Hackinggsmonga
Ā 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies Bhagya Bgk
Ā 
Assignment on cyber law
Assignment on cyber lawAssignment on cyber law
Assignment on cyber lawPrakash Masagi
Ā 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentvishalhp123
Ā 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studiesBhagya Bgk
Ā 
Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases. Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases. Ezra Paul
Ā 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant maliAdv Prashant Mali
Ā 
Cyber law in India with sections and penalties
Cyber law in India with sections and penalties Cyber law in India with sections and penalties
Cyber law in India with sections and penalties Iramma Harijan
Ā 

What's hot (17)

Cyber Law
Cyber LawCyber Law
Cyber Law
Ā 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
Ā 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
Ā 
Cyber
CyberCyber
Cyber
Ā 
Cyber law01
Cyber law01Cyber law01
Cyber law01
Ā 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Ā 
Cyber Law
Cyber LawCyber Law
Cyber Law
Ā 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Ā 
Hacking
HackingHacking
Hacking
Ā 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
Ā 
Assignment on cyber law
Assignment on cyber lawAssignment on cyber law
Assignment on cyber law
Ā 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Ā 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
Ā 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
Ā 
Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases. Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases.
Ā 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
Ā 
Cyber law in India with sections and penalties
Cyber law in India with sections and penalties Cyber law in India with sections and penalties
Cyber law in India with sections and penalties
Ā 

Similar to Cyber law cases

Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesPadmaja Naidu
Ā 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
Ā 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
Ā 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
Ā 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber lawPrashant Angadi
Ā 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxTapan Khilar
Ā 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
Ā 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
Ā 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
Ā 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
Ā 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
Ā 
irfhan k cyber law assignment
irfhan k cyber law assignment irfhan k cyber law assignment
irfhan k cyber law assignment Irfhan K Sorab
Ā 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentRajshekar786
Ā 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
Ā 
Information technology act
Information technology actInformation technology act
Information technology actbahubali1611
Ā 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.anveshika thakur
Ā 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleHemraj Singh Chouhan
Ā 

Similar to Cyber law cases (20)

Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &cases
Ā 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
Ā 
Cyber law
Cyber law Cyber law
Cyber law
Ā 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
Ā 
Shilpa
ShilpaShilpa
Shilpa
Ā 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
Ā 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
Ā 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
Ā 
cyberlaw
cyberlawcyberlaw
cyberlaw
Ā 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
Ā 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
Ā 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
Ā 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
Ā 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
Ā 
irfhan k cyber law assignment
irfhan k cyber law assignment irfhan k cyber law assignment
irfhan k cyber law assignment
Ā 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Ā 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Ā 
Information technology act
Information technology actInformation technology act
Information technology act
Ā 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
Ā 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
Ā 

Recently uploaded

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
Ā 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
Ā 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
Ā 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
Ā 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
Ā 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
Ā 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
Ā 
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļøcall girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
Ā 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
Ā 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
Ā 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
Ā 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
Ā 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
Ā 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
Ā 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
Ā 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
Ā 

Recently uploaded (20)

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
Ā 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
Ā 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Ā 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Ā 
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
Ā 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
Ā 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
Ā 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
Ā 
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļøcall girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
Ā 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
Ā 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Ā 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
Ā 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
Ā 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
Ā 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
Ā 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
Ā 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
Ā 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
Ā 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
Ā 

Cyber law cases

  • 1. CYBER LAW ASSIGNMENT ON IT ACT 2000 UNDER SECTIONS (43,65,66,66A,66B,66C,66D,66E,67,67A,67B,69,70,71,72,73) Submitted to Prof. Bhargav Revenkar Submitted by Padmaja .N( MBA13007061) Nandini.A (MBA13007055) Kavita. R (MBA13007034)
  • 2. SECTIONS 43: Penalty for damage to computer, computer system, etc.- If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network,- accesses or secures access to such computer, computer system or computer network downloads, copies or extracts any data, computer data base information from such computer, computer system or computer network including information or data held or stored in any removable storage medium. Introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; damages or causes to be damaged and computer, computer system or computer network, data, computer database or any other programmes residing in such computer, computer system or computer network; Related Case: Mphasis BPO Fraud: 2005 In December 2004, four call centre employees, working at an outsourcing facility operated by MphasiS in India, obtained PIN codes from four customers of MphasiSā€™ client, Citi Group. These employees were not authorized to obtain the PINs. In association with others, the call centre employees opened new accounts at Indian banks using falsse identities. Within two months, they used the PINs and account information gleaned during their employment at MphasiS to transfer money from the bank accounts of CitiGroup customers to the new accounts at Indian banks. By April 2005, the Indian police had tipped off to the scam by a U.S. bank, and quickly identified the individuals involved in the scam. Arrests were made when those individuals attempted to withdraw cash from the falsified accounts, $426,000 was stolen; the amount recovered was $230,000. Verdict: Court held that Section 43(a) was applicable here due to the nature of unauthorized access involved to commit transactions. 65. Tampering with computer source documents. - Whoever knowingly or intentionally conceals, destroy, or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
  • 3. Explanation ā€“ For the purposes of this section, ā€œcomputer source codeā€ means the listing of programmes, compute commands, design and layout and programme analysis of computer resource in any form. Related Case: Syed Asifuddin and Ors. Vs. The State of Andhra PradeshIn this case, Tata Indicom employees were arrested for manipulation of the electronic 32- bit number (ESN) programmed into cell phones theft were exclusively franchised to Reliance Infocomm. Verdict: Court held that tampering with source code invokes Section 65 of the Information Technology Act. 66. Hacking with Computer System. (1) Whoever with the intent of cause or knowing that is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hacking. (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. Related Case: Kumar v/s Whiteley In this case the accused gained unauthorized access to the Joint Academic Network (JANET) and deleted, added files and changed the passwords to deny access to the authorized users.Investigations had revealed that Kumar was logging on to the BSNL broadband Internet connection as if he was the authorized genuine user and ā€˜made alteration in the computer database pertaining to broadband Internet user accountsā€™ of the subscribers.The CBI had registered a cyber crime case against Kumar and carried out investigations on the basis of a complaint by the Press Information Bureau, Chennai, which detected the unauthorised use of broadband Internet. The complaint also stated that the subscribers had incurred a loss of Rs 38,248 due to Kumarā€™s wrongful act. He used to ā€˜hackā€™ sites from Bangalore, Chennai and other cities too, they said. Verdict: The Additional Chief Metropolitan Magistrate, Egmore, Chennai, sentenced N G Arun Kumar, the techie from Bangalore to undergo a rigorous imprisonment for one year with a fine of Rs 5,000 under section 420 IPC (cheating) and Section 66 of IT Act (Computer related Offense).
  • 4. 66 A Punishment for sending offensive messages through communication service, etc. Any person who sends, by means of a computer resource or a communication device, a) any information that is grossly offensive or has menacing character; or b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device, c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the or igin of such messages (Inserted vide ITAA 2008) shall be punishable with imprisonment for a term which may extend to two three years and with fine. Explanation: For the purposes of this section, terms "Electronic mail" and "Electronic Mail Message" means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, image, audio, video and any other electronic record, which may be transmitted with the message] [ 66 B Punishment for dishonestly receiving stolen computer resource or communication device (Inserted Vide ITA 2008) Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe thesame to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both.] [ 66C Punishment for identity theft. (Inserted Vide ITA 2008) Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of eitherdescription for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.] ļ‚§ Relevant Cases: ļ‚§ The CEO of an identity theft protection company, Lifelock, Todd Davisā€™s social security number was exposed by Matt Lauer on NBCā€™s Today Show. Davisā€™ identity was used to obtain a $500 cash advance loan.
  • 5. ļ‚§ Li Ming, a graduate student at West Chester University of Pennsylvania faked his own death, complete with a forged obituary in his local paper. Nine months later, Li attempted to obtain a new driverā€™s license with the intention of applying for new credit cards eventually. [66D Punishment for cheating by personation by using computer resource (Inserted Vide ITA 2008) Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.] Relevant Case: Sandeep Vaghese v/s State of Kerala A complaint filed by the representative of a Company, which was engaged in the business of trading and distribution of petrochemicals in India and overseas, a crime was registered against nine persons, alleging offenses under Sections 65, 66, 66A, C and D of the Information Technology Act along with Sections 419 and 420 of the Indian Penal Code. The company has a web-site in the name and and style `www.jaypolychem.comā€™ but, another web site `www.jayplychem.orgā€™ was set up in the internet by first accused Samdeep Varghese @ Sam, (who was dismissed from the company) in conspiracy with other accused, including Preeti and Charanjeet Singh, who are the sister and brother-in-law of `Samā€™ Defamatory and malicious matters about the company and its directors were made available in that website. The accused sister and brother-in-law were based in Cochin and they had been acting in collusion known and unknown persons, who have collectively cheated the company and committed acts of forgery, impersonation etc. Two of the accused, Amardeep Singh and Rahul had visited Delhi and Cochin. The first accused and others sent e-mails from fake e-mail accounts of many of the customers, suppliers, Bank etc. to malign the name and image of the Company and its Directors. The defamation campaign run by all the said persons named above has caused immense damage to the name and reputation of the Company. The Company suffered losses of several crores of Rupees from producers, suppliers and customers and were unable to do business.
  • 6. 66 E. Punishment for violation of privacy. (Inserted Vide ITA 2008) Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of thatperson, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both Explanation - For the purposes of this section ā€” (a) ā€•transmitā€– means to electronically send a visual image with the intent that it be viewed by a person or persons; (b) ā€•captureā€–, with respect to an image, means to videotape, photograph, film or record by any means; (c) ā€•private areaā€– means the naked or undergarment clad genitals, pubic area, buttocks or female breast; (d) ā€•publishesā€– means reproduction in the printed or electronic form and making it available for public; (e) ā€“ under circumstances violating privacyā€– means circumstances in which a person can have a reasonable expectation thatā€” (i) he or she could disrobe in privacy, without being concerned that an image of his private area was being captured; or (ii) any part of his or her private area would not be visible to the public, regardless of whether that person is in a public or private place.] ļ‚§ Relevant Cases: i. Jawaharlal Nehru University MMS scandal In a severe shock to the prestigious and renowned institute ā€“ Jawaharlal Nehru University, a pornographic MMS clip was apparently made in the campus and transmitted outside the university.Some media reports claimed that the two accused students initially tried to extort money from the girl in the video but when they failed the culprits put the video out on mobile phones, on the internet and even sold it as a CD in the blue film market.
  • 7. 67. Publishing of information which is obscene in electronic form. Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeal to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to one lakh rupees and in the event of a second or subsequent conviction with imprisonment of either description for a term which may extend to ten years and also with fine which may extend to two lakh rupees. ļ‚§ Relevant Case:This case is about posting obscene, defamatory and annoying message about a divorcee woman in the Yahoo message group. E-mails were forwarded to the victim for information by the accused through a false e- mail account opened by him in the name of the victim. These postings resulted in annoying phone calls to the lady. Based on the ladyā€™s complaint, the police nabbed the accused.Investigation revealed that he was a known family friend of the victim and was interested in marrying her. She was married to another person, but that marriage ended in divorce and the accused started contacting her once again. On her reluctance to marry him he started harassing her through internet. ļ‚§ Verdict: The accused was found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000. He is convicted and sentenced for the offence as follows: ļ‚§ As per 469 of IPC he has to undergo rigorous imprisonment for 2 years and to pay fine of Rs.500/- ļ‚§ As per 509 of IPC he is to undergo to undergo 1 year Simple imprisonment and to pay Rs 500/- ļ‚§ As per Section 67 of IT Act 2000, he has to undergo for 2 years and to pay fine of Rs.4000/- All sentences were to run concurrently. The accused paid fine amount and he was lodged at Central Prison, Chennai. This is considered the first case convicted under section 67 of Information Technology Act 2000 in India.
  • 8. 6. Section 67A ā€“ Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conductshall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees andin the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees. 7. Section 67B. Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form Whoever:- o publishes or transmits or causes to be published or transmitted material in any electronic form which depicts children engaged in sexually explicit act or conduct or o creates text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting children in obscene or indecent or sexually explicit manner or o cultivates, entices or induces children to online relationship with one or more children for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource or o facilitates abusing children online or o records in any electronic form own abuse or that of others pertaining to sexually explicit act with children, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with a fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees: Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form
  • 9. Case: Father & son convicted under IT act in Kerala. The Additional District and Sessions Court here has upheld a lower courtā€™s verdict in the first cyber case filed in the State sentencing a Pentecostal Church priest and his son to rigorous imprisonment in 2006. Disposing of the appeal filed by the priest T.S. Balan and his son, Aneesh Balan, against the order of the Chief Judicial Magistrate, on Wednesday, Additional District Judge T.U. Mathewkutty said it was time the government took effective measures to check the growing trend of cyber crimes in the State.The court upheld the magistrateā€™s order sentencing the two to three-year rigorous imprisonment and imposing a fine of Rs. 25,000 under Section 67 of the information technology (IT) Act; awarding six months rigorous imprisonment under Section 120(B) of the Indian Penal Code; and ordering one year rigorous imprisonment and imposing a fine of Rs. 10,000 under Section 469 of the code. The court revoked the sentence under Section 66 of the IT Act. The cyber case dates back to January-February 2002 and the priest and his son became the first to be convicted of committing a cyber crime. The two were found guilty of morphing, web-hosting and e-mailing nude pictures of Pastor Abraham and his family. Balan had worked with the pastor until he fell out with him and was shown the door by the latter. Balan joined the Sharon Pentecostal Church later. The prosecution said the duo had morphed photographs of Abraham, his son, Valsan Abraham, and daughter, Starla Luke, and e-mailed them from fake mail IDs with captions. The morphed pictures were put on the web and the accused, who edited a local magazine called The Defender, wrote about these photos in his publication. Valsan received the pictures on the Internet and asked his father to file a complaint to the police. A police party raided the house of Balan and his son at Perumbavoor and collected evidences. The magistrateā€™s verdict came after a four-year trial, for which the court had to procure a computer with Internet connection and accessories. The police had to secure the services of a computer analyst too to piece together the evidences. Twenty-nine witnesses, including the Internet service provider and Bharat Sanchar Nigam Ltd., had to depose before the court.
  • 10. 69. Directions of Controller to a subscriber to extend facilities to decrypt information. (1) If the Controller is satisfied that it is necessry or expedient so to do in the interest of the sovereignty or integrity of India, the security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence, for reasons to be recorded in writing, by order, direct any agency of the Government to intercept any information transmitted through any computer resource. (2) The subscriber or any person in charge of the computer resource shall, when called upon by any agency which has been directed under sub-section (1), extend all facilities and technical assistance to decrypt the information. (3) The subscriber or any person who fails to assist the agency referred to in sub-section (2) shall be punished with an imprisonment for a term which may extend to seven years. Relevant Case: In August 2007, Lakshmana Kailash K., a techie from Bangalore was arrested on the suspicion of having posted insulting images of Chhatrapati Shivaji, a major historical figure in the state of Maharashtra, on the social-networking site Orkut.The police identified him based on IP address details obtained from Google and Airtel -Lakshmanaā€™s ISP. He was brought to Pune and detained for 50 days before it was discovered that the IP address provided by Airtel was erroneous. The mistake was evidently due to the fact that while requesting information from Airtel, the police had not properly specified whether the suspect had posted the content at 1:15 p.m. Verdict: Taking cognizance of his plight from newspaper accounts, the State Human Rights Commission subsequently ordered the company to pay Rs 2 lakh to Lakshmana as damages. The incident highlights how minor privacy violations by ISPs and intermediaries could have impacts that gravely undermine other basic human rights.
  • 11. 70. Protected system.- (1) The appropriate Government may, by notification in the Official Gazette, declare that any computer, computer system or computer network to be a protected system. (2) The appropriate Government may, by order in writing, authorise the persons who are authorised to access protected systems notified under sub-section. (3) Any person who secures access or attempts to secure access to a protected system in contravention of the provisions of this section shall be punished with imprisonment of either description for a term which may extend to ten years and shall also be liable to fine. 71. Penalty for misrepresentation.- Whoever makes any misrepresentation, to, or suppresses any material fact from, the Controller or the Certifying Authority for obtaining any licennce or Digital Signature Certificate, as the case may be, shall be punished with imprisonment for a terms which may extend to two years, or with fine which may extend to one lakh rupees, or with both. 72. Breach of confidentiality and privacy.- Save as otherwise provided in this Act or any other law for the time being in force, if any person who, in pursuance of any of the powers conferred under this Act, rules or regulations made thereunder, has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned discloses such electronic record, book, register, correspondence, information, document or other material to any other person shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.
  • 12. 73. Penalty for publishing Digital Signature Certificate false in certain particulars. - (1) No person shall publish a Digital Signature Certificate or otherwise make it available to any other person with the knowledge that- (a) the Certifying Authority listed in the certificate has not issued it; or (b) the subscriber listed in the certificate has not accepted it; or (c) the certificate has been revoked or suspended, unless such publication is for the purposes of verifying a digital signature created prior to such suspension or revocation. (2) Any person who contravenes the provisions of sub-section (1) shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.