It Act 2000
It Act 2000
ACT,2000
By;
S. Karpaga Priya
Advocate
HIGH COURT
CHENNAI
• Information Technology Act,2000 is the primary law in India dealing with Cyber
• Information Technology Act is based on the United Nations Model law on Electronic
Commerce 1996 (UNCITRAL Model) which was suggested by the General Assembly
• Bill was passed in the budget session of 2000 and signed by president K.R.
• This act amended the Indian Penal Code 1860, the Indian Evidence Act
1872, the Bankers’ Books Evidence Act 1891, and the Reserve Bank of
India Act 1934.
CHAPTERS
• The Information Technology Act (IT Act) contains 13 chapters and 90 sections and 2
schedules.
• Chapter 1, which deals with the short, title, extent, commencement and application of the
Act in Section 1. Section 2 provides Definition.
• Chapter 2 deals with the authentication of electronic records, digital signatures, electronic
signatures, etc.
• Chapter 3 deals with Electronic Governance such as electronic signature, its validity and
powers.
• Chapter 4 deals with Attribution , acknowledgement and despatch of
electronic records.
• Chapter 12 and 12A deals with intermediaries not be liable in certain cases
and examiner of electronic evidence.
• SECTION 43- This section of IT Act, 2000 states that any act of destroying, altering or stealing
computer system/network or deleting data with malicious intentions without authorization from
owner of the computer is liable for the payment to be made to owner as compensation for
damages.
• SECTION 43A - This section of IT Act, 2000 states that any corporate body dealing with
sensitive information that fails to implement reasonable security practices causing loss of other
person will also liable as convict for compensation to the affected party.
• SECTION 65- This section of IT act states that, If a person knowingly or intentionally
conceals, destroys or alters or intentionally or knowingly causes another to conceal,
destroy or alter any computer source code used for a computer, computer programme,
computer system or computer network, when the computer source code is required to be
kept or maintained by law for the time being in force.
• SECTION 66- This section of IT act states that, If a person with the intent to cause or
knowing that he is likely to cause wrongful loss or damage to the public or any person
destroys or deletes or alters any information residing in a computer resource or diminishes
its value or utility or affects it injuriously by any means, commits hack.
• SECTION 66B- This section states that, A person receives or retains a computer resource
or communication device which is known to be stolen or the person has reason to believe
is stolen.
• SECTION 66C- This section states that, A person fraudulently uses the password, digital
signature or other unique identification of another person.
PENALTY- Imprisonment up to three years, or/and with fine up to ₹100,000
• SECTION 66D- This section states that, If a person cheats someone using a computer
resource or communication.
The appropriate Government may, by order in writing, authorize the persons who are
authorized to access protected systems. If a person who secures access or attempts to secure
access to a protected system, then he is committing an offence.
• SECTION 71 – This section states that, If anyone makes any misrepresentation to, or
suppresses any material fact from, the Controller or the Certifying Authority for obtaining
any license or Digital Signature Certificate.
PENALTY- imprisonment for a term which may extend to two years, or with fine which
may extend to one lakh rupees, or with both.
• SECTION 72A- This section states that, any person including an intermediary who, while
providing services under the terms of lawful contract, has secured access to any material
containing personal information about another person, with the intent to cause or knowing
that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of
the person concerned, or in breach of a lawful contract, such material to any other person
PENALTY- imprisonment for a term which may extend to three years, or with fine
which may extend to five lakh rupees, or with both.
PENALTY- imprisonment for a term which may extend to two years, or with fine which
may extend to one lakh rupees, or with both.
• SECTION 74- This section states that, Whoever knowingly creates, publishes or
unlawful purpose.
• PENALTY- imprisonment for a term which may extend to two years, or with fine which
I. Cyber stalking
II. Impersonation
• Cyber stalking.
• Cyber bullying ( social networking sites like Facebook, Instagram, twitter) the air force
bal barathi school case.
• Cyber pornography.
• Sexual defamation.
• Morphing ( Salem girl-suicide, Delhi school girl- suicide)- Revenge Porn.
• Cyber Flirting
• Hacking.
PROVISIONS AND PUNISHMENTS DEALING WITH
CYBER CRIMES AGAINST WOMEN
• 292 of Indian penal code-Sale, etc., of obscene books, etc.-5years and fine.
INDIAN PENAL CODE PROVISIONS
• The case of Nascom v. Ajay Sood and Others is another landmark judgement
delivered in March 2005, in which the Delhi High Court declared ‘Phishing’ on
the internet to be an illegal act.
• Shreya Singhal v. Union of India (2015), Section 66A of the Information
Technology Act, 2000 is struck down in its entirety being violative of
Article 19(1)(a) and not saved under Article 19(2). )Section 69A and the
Information Technology (Procedure & Safeguards for Blocking for Access
of Information by Public) Rules 2009 are constitutionally valid. Further,
Section 79 is valid subject to Section 79(3)(b) being read down and so on.
• Harpal Singh v. State of Punjab (2016), the prosecution has relied upon
the secondary evidence in the form of printed copy of the call details, even
assuming that the mandate of Section 65B(2) had been complied with, in
absence of a certificate under Section 65B(4), the same has to be held
inadmissible in evidence.
• Yahoo! Inc v. Akash Arora (1999), the plaintiff against the defendants
seeking for a decree of permanent injunction restraining the defendants,
their partners, servants and agents from operating any business and/or
selling, offering for sale, advertising and in any manner dealing in any
services or goods on the Internet or otherwise under the trademark/domain
name ‘Yahooindia.Com’ or any other mark/domain name which is identical
with or deceptively similar to the plaintiff’s trademark ‘Yahoo!’ and also
for rendition of accounts and damages.
• DELFI AS v. ESTONIA (2015), a news portal held liable for comments
made on its website.- In India, this Case casts bearing on Sec 79 of the
Information Technology Act, 2000, which offers protection for
intermediaries in a particular facts & circumstances.- The Parallel of this
Case can be traced down to the Case, namely, "Shreya Singhal", where Sec
66A of the Act was quashed, and constitutional validity of Sec 79 and 79A
was upheld.
• S. Sekar v The Principal General Manager (Telecom) (B.S.N.L.) (2004),
It was held that the Police to investigate thoroughly into the matter and add
or delete the penal Sections under the Information Technology Act, 2000,
as well as IPC and ultimately, it is for the criminal court which would be
seized of the matter to decide on that. The Section 43(g) of the Information
Technology Act, 2000, invoked by the police and specified in the FIR is
declared void.
• Ritu Kohli Case, is the first case in India delaying with cyber
stalking, Ritu Kolhi’s case was an alarm to the Government, to make laws
regarding the aforesaid crime and regarding protection of victims under the
same. As a result Section 66A of the Information Technology Act, 2000
(ITA 2008) “Punishment for sending offensive messages through
communication service, etc.
THANK YOU…