This document summarizes sections 43, 65, 66, 66A, 66B, 66C, 66D, 66E, 67, 67A, 67B, 69, 70, 71, 72, 73 of the Indian IT Act 2000. It provides details of the sections, including definitions and punishments. It also summarizes relevant court cases related to each section. One case discussed involved employees of an outsourcing company stealing customer financial information. Another involved tampering with source code by cell phone company employees. A final case discussed involved convicting a priest and son for morphing and distributing nude photos of a pastor and his family online.
Our team presenting Cyber laws in India in brief and and what are the penalties and fines under different sections applicable under IT Act 2000 and IPC act.
This PPt is very useful for any students , Law enforcement agencies, Cyber Forensic Experts. It includes Overview of Cyber Law in India which includes cyber offences and penalties. This ppt will help for the public to aware about cyber crime. This ppt covers Information Technology Act, 2000 and highlights on IT (Amendment) Act, 2008. This PPt also covers applicability of IT Act and Other Act's sections to Cyber crimes.
Our team presenting Cyber laws in India in brief and and what are the penalties and fines under different sections applicable under IT Act 2000 and IPC act.
This PPt is very useful for any students , Law enforcement agencies, Cyber Forensic Experts. It includes Overview of Cyber Law in India which includes cyber offences and penalties. This ppt will help for the public to aware about cyber crime. This ppt covers Information Technology Act, 2000 and highlights on IT (Amendment) Act, 2008. This PPt also covers applicability of IT Act and Other Act's sections to Cyber crimes.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
Important section of IT Act 2000 & IPC sections related to cyber law. these will help each one of us and give us details about these which are very important in our life.
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
This ppt is useful for basic understanding of IT Act 2000. This ppt explains offences and relevant penal sections [IT Act & IPC] in cyber crimes. This ppt also explains RBI guidelines in case of fraudulent transactions. Also highlights on liability of customer i.e. when customer has zero liability in fraudulent transaction, limited liability of customer in fraudulent transactions.
some IT Acts which people should now for their upcomming future so that they could free from crime against them, because now-a-days the number of crimes are increasing day by day.Public should be aware of these laws.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxshweeta209
transfer of the P.I.L filed by lawyer Ashwini Kumar Upadhyay in Delhi High Court to Supreme Court.
on the issue of UNIFORM MARRIAGE AGE of men and women.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxOmGod1
Precedent, or stare decisis, is a cornerstone of common law systems where past judicial decisions guide future cases, ensuring consistency and predictability in the legal system. Binding precedents from higher courts must be followed by lower courts, while persuasive precedents may influence but are not obligatory. This principle promotes fairness and efficiency, allowing for the evolution of the law as higher courts can overrule outdated decisions. Despite criticisms of rigidity and complexity, precedent ensures similar cases are treated alike, balancing stability with flexibility in judicial decision-making.
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxOmGod1
Victims of crime have a range of rights designed to ensure their protection, support, and participation in the justice system. These rights include the right to be treated with dignity and respect, the right to be informed about the progress of their case, and the right to be heard during legal proceedings. Victims are entitled to protection from intimidation and harm, access to support services such as counseling and medical care, and the right to restitution from the offender. Additionally, many jurisdictions provide victims with the right to participate in parole hearings and the right to privacy to protect their personal information from public disclosure. These rights aim to acknowledge the impact of crime on victims and to provide them with the necessary resources and involvement in the judicial process.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.
Introducing New Government Regulation on Toll Road.pdf
Cyber law sections under itc act 2000 &cases
1. CYBER LAW ASSIGNMENT
ON
IT ACT 2000 UNDER SECTIONS
(43,65,66,66A,66B,66C,66D,66E,67,67A,67B,69,70,71,72,73)
Submitted to
Prof. Bhargav Revenkar
Submitted by
Padmaja naidu.v
Kavitha.k
Nandini.a
2. SECTIONS
43: Penalty for damage to computer, computer system, etc.-
If any person without permission of the owner or any other person who is in charge of a
computer, computer system or computer network,- accesses or secures access to such computer,
computer system or computer network downloads, copies or extracts any data, computer data
base information from such computer, computer system or computer network including
information or data held or stored in any removable storage medium.
Introduces or causes to be introduced any computer contaminant or computer virus into any
computer, computer system or computer network;
damages or causes to be damaged and computer, computer system or computer network, data,
computer database or any other programmes residing in such computer, computer system or
computer network;
Related Case: Mphasis BPO Fraud: 2005
In December 2004, four call centre employees, working at an outsourcing facility operated by
MphasiS in India, obtained PIN codes from four customers of MphasiS’ client, Citi Group.
These employees were not authorized to obtain the PINs. In association with others, the call
centre employees opened new accounts at Indian banks using false identities. Within two
months, they used the PINs and account information gleaned during their employment at
MphasiS to transfer money from the bank accounts of CitiGroup customers to the new accounts
at Indian banks.
By April 2005, the Indian police had tipped off to the scam by a U.S. bank, and quickly
identified the individuals involved in the scam. Arrests were made when those individuals
attempted to withdraw cash from the falsified accounts, $426,000 was stolen; the amount
recovered was $230,000.
Verdict: Court held that Section 43(a) was applicable here due to the nature of unauthorized
access involved to commit transactions.
65. Tampering with computer source documents. -
Whoever knowingly or intentionally conceals, destroy, or alter any computer source code used
for a computer, computer programme, computer system or computer network, when the
computer source code is required to be kept or maintained by law for the time being in force,
shall be punishable with imprisonment up to three years, or with fine which may extend up to
two lakh rupees, or with both.
3. Explanation – For the purposes of this section, “computer source code” means the listing of
programmes, compute commands, design and layout and programme analysis of computer
resource in any form.
Related Case: Syed Asifuddin and Ors. Vs. The State of Andhra PradeshIn this case, Tata
Indicom employees were arrested for manipulation of the electronic 32- bit number (ESN)
programmed into cell phones theft were exclusively franchised to Reliance Infocomm.
Verdict: Court held that tampering with source code invokes Section 65 of the Information
Technology Act.
66. Hacking with Computer System.
(1) Whoever with the intent of cause or knowing that is likely to cause wrongful loss or damage
to the public or any person destroys or deletes or alters any information residing in a computer
resource or diminishes its value or utility or affects it injuriously by any means, commits
hacking.
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with
fine which may extend up to two lakh rupees, or with both.
Related Case: Kumar v/s Whiteley In this case the accused gained unauthorized access to the
Joint Academic Network (JANET) and deleted, added files and changed the passwords to deny
access to the authorized users.Investigations had revealed that Kumar was logging on to the
BSNL broadband Internet connection as if he was the authorized genuine user and ‘made
alteration in the computer database pertaining to broadband Internet user accounts’ of the
subscribers.The CBI had registered a cyber crime case against Kumar and carried out
investigations on the basis of a complaint by the Press Information Bureau, Chennai, which
detected the unauthorised use of broadband Internet. The complaint also stated that the
subscribers had incurred a loss of Rs 38,248 due to Kumar’s wrongful act. He used to ‘hack’
sites from Bangalore, Chennai and other cities too, they said.
Verdict: The Additional Chief Metropolitan Magistrate, Egmore, Chennai, sentenced N G Arun
Kumar, the techie from Bangalore to undergo a rigorous imprisonment for one year with a fine
of Rs 5,000 under section 420 IPC (cheating) and Section 66 of IT Act (Computer related
Offense).
4. 66 A Punishment for sending offensive messages through communication service, etc.
Any person who sends, by means of a computer resource or a communication device,
a) any information that is grossly offensive or has menacing character; or
b) any information which he knows to be false, but for the purpose of causing annoyance,
inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill
will, persistently makes by making use of such computer resource or a communication device,
c) any electronic mail or electronic mail message for the purpose of causing annoyance or
inconvenience or to deceive or to mislead the addressee or recipient about the or igin of such
messages (Inserted vide ITAA 2008) shall be punishable with imprisonment for a term which
may extend to two three years and with fine.
Explanation: For the purposes of this section, terms "Electronic mail" and "Electronic Mail
Message" means a message or information created or transmitted or received on a computer,
computer system, computer resource or communication device including attachments in text,
image, audio, video and any other electronic record, which may be transmitted with the message]
[ 66 B Punishment for dishonestly receiving stolen computer resource or communication
device (Inserted Vide ITA 2008)
Whoever dishonestly receives or retains any stolen computer resource or communication device
knowing or having reason to believe thesame to be stolen computer resource or
communication device, shall be punished with imprisonment of either description for a term
which may extend to three years or with fine which may extend to rupees one lakh or with both.]
[ 66C Punishment for identity theft. (Inserted Vide ITA 2008)
Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other
unique identification feature of any other person, shall be punished with imprisonment of
eitherdescription for a term which may extend to three years and shall also be liable to fine
which may extend to rupees one lakh.]
Relevant Cases:
The CEO of an identity theft protection company, Lifelock, Todd Davis’s social
security number was exposed by Matt Lauer on NBC’s Today Show. Davis’ identity
was used to obtain a $500 cash advance loan.
5. Li Ming, a graduate student at West Chester University of Pennsylvania faked his
own death, complete with a forged obituary in his local paper. Nine months later, Li
attempted to obtain a new driver’s license with the intention of applying for new
credit cards eventually.
[66D Punishment for cheating by personation by using computer resource (Inserted Vide
ITA 2008)
Whoever, by means of any communication device or computer resource cheats by personation,
shall be punished with imprisonment of either description for a term which may extend to
three years and shall also be liable to fine which may extend to one lakh rupees.]
Relevant Case: Sandeep Vaghese v/s State of Kerala
A complaint filed by the representative of a Company, which was engaged in the business of
trading and distribution of petrochemicals in India and overseas, a crime was registered against
nine persons, alleging offenses under Sections 65, 66, 66A, C and D of the Information
Technology Act along with Sections 419 and 420 of the Indian Penal Code.
The company has a web-site in the name and and style `www.jaypolychem.com’ but, another
web site `www.jayplychem.org’ was set up in the internet by first accused Samdeep Varghese @
Sam, (who was dismissed from the company) in conspiracy with other accused, including Preeti
and Charanjeet Singh, who are the sister and brother-in-law of `Sam’
Defamatory and malicious matters about the company and its directors were made available in
that website. The accused sister and brother-in-law were based in Cochin and they had been
acting in collusion known and unknown persons, who have collectively cheated the company and
committed acts of forgery, impersonation etc.
Two of the accused, Amardeep Singh and Rahul had visited Delhi and Cochin. The first accused
and others sent e-mails from fake e-mail accounts of many of the customers, suppliers, Bank etc.
to malign the name and image of the Company and its Directors. The defamation campaign run
by all the said persons named above has caused immense damage to the name and reputation of
the Company.
The Company suffered losses of several crores of Rupees from producers, suppliers and
customers and were unable to do business.
6. 66 E. Punishment for violation of privacy. (Inserted Vide ITA 2008)
Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area
of any person without his or her consent, under circumstances violating the privacy of
thatperson, shall be punished with imprisonment which may extend to three years or with fine
not exceeding two lakh rupees, or with both
Explanation -
For the purposes of this section —
(a) ―transmit‖ means to electronically send a visual image with the intent that it be viewed
by a person or persons;
(b) ―capture‖, with respect to an image, means to videotape, photograph, film or record
by any means;
(c) ―private area‖ means the naked or undergarment clad genitals, pubic area, buttocks or
female breast;
(d) ―publishes‖ means reproduction in the printed or electronic form and making it available for
public;
(e) – under circumstances violating privacy‖ means circumstances in which a person can have a
reasonable expectation that—
(i) he or she could disrobe in privacy, without being concerned that an image of his private area
was being captured; or
(ii) any part of his or her private area would not be visible to the public, regardless of whether
that person is in a public or private place.]
Relevant Cases:
i. Jawaharlal Nehru University MMS scandal In a severe shock to the prestigious and
renowned institute – Jawaharlal Nehru University, a pornographic MMS clip was
apparently made in the campus and transmitted outside the university.Some media
reports claimed that the two accused students initially tried to extort money from the
girl in the video but when they failed the culprits put the video out on mobile phones,
on the internet and even sold it as a CD in the blue film market.
7. 67. Publishing of information which is obscene in electronic form.
Whoever publishes or transmits or causes to be published in the electronic form, any material
which is lascivious or appeal to the prurient interest or if its effect is such as to tend to deprave
and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or
hear the matter contained or embodied in it, shall be punished on first conviction with
imprisonment of either description for a term which may extend to five years and with fine
which may extend to one lakh rupees and in the event of a second or subsequent conviction with
imprisonment of either description for a term which may extend to ten years and also with fine
which may extend to two lakh rupees.
Relevant Case:This case is about posting obscene, defamatory and annoying message
about a divorcee woman in the Yahoo message group. E-mails were forwarded to the
victim for information by the accused through a false e- mail account opened by him in
the name of the victim. These postings resulted in annoying phone calls to the lady.
Based on the lady’s complaint, the police nabbed the accused.Investigation revealed that
he was a known family friend of the victim and was interested in marrying her. She was
married to another person, but that marriage ended in divorce and the accused started
contacting her once again. On her reluctance to marry him he started harassing her
through internet.
Verdict: The accused was found guilty of offences under section 469, 509 IPC and 67 of
IT Act 2000. He is convicted and sentenced for the offence as follows:
As per 469 of IPC he has to undergo rigorous imprisonment for 2 years and to pay
fine of Rs.500/-
As per 509 of IPC he is to undergo to undergo 1 year Simple imprisonment and to
pay Rs 500/-
As per Section 67 of IT Act 2000, he has to undergo for 2 years and to pay fine of
Rs.4000/-
All sentences were to run concurrently.
The accused paid fine amount and he was lodged at Central Prison, Chennai. This is
considered the first case convicted under section 67 of Information Technology Act 2000
in India.
8. 6. Section 67A – Punishment for publishing or transmitting of material containing
sexually explicit act, etc. in electronic form Whoever publishes or transmits or causes
to be published or transmitted in the electronic form any material which contains sexually
explicit act or conductshall be punished on first conviction with imprisonment of either
description for a term which may extend to five years and with fine which may extend to
ten lakh rupees andin the event of second or subsequent conviction with imprisonment of
either description for a term which may extend to seven years and also with fine which
may extend to ten lakh rupees.
7. Section 67B. Punishment for publishing or transmitting of material depicting
children in sexually explicit act, etc. in electronic form Whoever:-
o publishes or transmits or causes to be published or transmitted material in any
electronic form which depicts children engaged in sexually explicit act or conduct or
o creates text or digital images, collects, seeks, browses, downloads, advertises,
promotes, exchanges or distributes material in any electronic form depicting children
in obscene or indecent or sexually explicit manner or
o cultivates, entices or induces children to online relationship with one or more children
for and on sexually explicit act or in a manner that may offend a reasonable adult on
the computer resource or
o facilitates abusing children online or
o records in any electronic form own abuse or that of others pertaining to sexually
explicit act with children,
shall be punished on first conviction with imprisonment of either description for a term
which may extend to five years and with a fine which may extend to ten lakh rupees
and in the event of second or subsequent conviction with imprisonment of either
description for a term which may extend to seven years and also with fine which may
extend to ten lakh rupees:
Provided that the provisions of section 67, section 67A and this section does not extend to
any book, pamphlet, paper, writing, drawing, painting, representation or figure in
electronic form
9. Case: Father & son convicted under IT act in Kerala.
The Additional District and Sessions Court here has upheld a lower court’s
verdict in the first cyber case filed in the State sentencing a Pentecostal Church priest and his son
to rigorous
imprisonment in 2006.
Disposing of the appeal filed by the priest T.S. Balan and his son, Aneesh
Balan, against the order of the Chief Judicial Magistrate, on Wednesday,
Additional District Judge T.U. Mathewkutty said it was time the government took
effective measures to check the growing trend of cyber crimes in the State.The
court upheld the magistrate’s order sentencing the two to three-year rigorous
imprisonment and imposing a fine of Rs. 25,000 under Section 67 of the
information technology (IT) Act; awarding six months rigorous imprisonment
under Section 120(B) of the Indian Penal Code; and ordering one year rigorous
imprisonment and imposing a fine of Rs. 10,000 under Section 469 of the code.
The court revoked the sentence under Section 66 of the IT Act.
The cyber case dates back to January-February 2002 and the priest and his son
became the first to be convicted of committing a cyber crime.
The two were found guilty of morphing, web-hosting and e-mailing nude pictures
of Pastor Abraham and his family.
Balan had worked with the pastor until he fell out with him and was shown the
door by the latter. Balan joined the Sharon Pentecostal Church later.
The prosecution said the duo had morphed photographs of Abraham, his son,
Valsan Abraham, and daughter, Starla Luke, and e-mailed them from fake mail IDs
with captions.
The morphed pictures were put on the web and the accused, who edited a local
magazine called The Defender, wrote about these photos in his publication.
Valsan received the pictures on the Internet and asked his father to file a
complaint to the police. A police party raided the house of Balan and his son
at Perumbavoor and collected evidences.
The magistrate’s verdict came after a four-year trial, for which the court had
to procure a computer with Internet connection and accessories.
The police had to secure the services of a computer analyst too to piece
together the evidences. Twenty-nine witnesses, including the Internet service
provider and Bharat Sanchar Nigam Ltd., had to depose before the court.
10. 69. Directions of Controller to a subscriber to extend facilities to decrypt informatio n.
(1) If the Controller is satisfied that it is necessry or expedient so to do in the interest of the
sovereignty or integrity of India, the security of the State, friendly relations with foreign States or
public order or for preventing incitement to the commission of any cognizable offence, for
reasons to be recorded in writing, by order, direct any agency of the Government to intercept any
information transmitted through any computer resource.
(2) The subscriber or any person in charge of the computer resource shall, when called upon by
any agency which has been directed under sub-section (1), extend all facilities and technical
assistance to decrypt the information.
(3) The subscriber or any person who fails to assist the agency referred to in sub-section (2) shall
be punished with an imprisonment for a term which may extend to seven years.
Relevant Case: In August 2007, Lakshmana Kailash K., a techie from Bangalore was arrested on
the suspicion of having posted insulting images of Chhatrapati Shivaji, a major historical figure
in the state of Maharashtra, on the social-networking site Orkut.The police identified him based
on IP address details obtained from Google and Airtel -Lakshmana’s ISP. He was brought to
Pune and detained for 50 days before it was discovered that the IP address provided by Airtel
was erroneous. The mistake was evidently due to the fact that while requesting information from
Airtel, the police had not properly specified whether the suspect had posted the content at 1:15
p.m.
Verdict: Taking cognizance of his plight from newspaper accounts, the State Human Rights
Commission subsequently ordered the company to pay Rs 2 lakh to Lakshmana as damages. The
incident highlights how minor privacy violations by ISPs and intermediaries could have impacts
that gravely undermine other basic human rights.
11. 70. Protected system.-
(1) The appropriate Government may, by notification in the Official Gazette, declare that any
computer, computer system or computer network to be a protected system.
(2) The appropriate Government may, by order in writing, authorise the persons who are
authorised to access protected systems notified under sub-section.
(3) Any person who secures access or attempts to secure access to a protected system in
contravention of the provisions of this section shall be punished with imprisonment of either
description for a term which may extend to ten years and shall also be liable to fine.
71. Penalty for misrepresentation.-
Whoever makes any misrepresentation, to, or suppresses any material fact from, the Controller or
the Certifying Authority for obtaining any licennce or Digital Signature Certificate, as the case
may be, shall be punished with imprisonment for a terms which may extend to two years, or with
fine which may extend to one lakh rupees, or with both.
72. Breach of confidentiality and privacy.-
Save as otherwise provided in this Act or any other law for the time being in force, if any person
who, in pursuance of any of the powers conferred under this Act, rules or regulations made
thereunder, has secured access to any electronic record, book, register, correspondence,
information, document or other material without the consent of the person concerned discloses
such electronic record, book, register, correspondence, information, document or other material
to any other person shall be punished with imprisonment for a term which may extend to two
years, or with fine which may extend to one lakh rupees, or with both.
12. 73. Penalty for publishing Digital Signature Certificate false in certain particulars. -
(1) No person shall publish a Digital Signature Certificate or otherwise make it available to any
other person with the knowledge that-
(a) the Certifying Authority listed in the certificate has not issued it; or
(b) the subscriber listed in the certificate has not accepted it; or
(c) the certificate has been revoked or suspended, unless such publication is for the purposes of
verifying a digital signature created prior to such suspension or revocation.
(2) Any person who contravenes the provisions of sub-section (1) shall be punished with
imprisonment for a term which may extend to two years, or with fine which may extend to one
lakh rupees, or with both.