Cyber Crime and Law Class
Cyber Crime and Law Class
UNIT–1 Crime
1.14 Reasons for Cyber Crime
1.15 Cyber Criminals
Introduction to 1.16 Mode and Methods of Committing Cyber
Crimes
Cyber Crimes 1.17 Motive Behind Any Attack
1.18 Classification of Cyber Crime
1.19 Information Technology Act
(Structure) 1.20 Relevant Cyber Crimes other than IT Act,
2000
1.1 Learning Objectives
1.21 Misuse of Technology in the form of Cyber
1.2 Introduction
Crime
1.3 Origin of Cyber Crime
1.22 Cyber Crime in Modern Society
1.4 What is Cyber Law?
1.23 Categories of Cyber Crime
1.5 Need for Cyber Law
1.24 Different Kinds of Cyber Crime
1.6 Jurisprudence of Indian Cyber Law
1.25 How to Tackle Cyber Crime
1.7 Introduction to Cyber Crime
1.26 Major Threats of Cyber Crime in the Current
1.8 Defining Cyber Crime Scenario
1.9 Frequently Used Cyber Crimes
Cyber Crimes Notes
1.10 Misuse of Technology
1.11 Conventional Crime
1.12 Cyber Crime
1.13 Distinction between Conventional & Cyber
Self Learning Material 1
Cyber Crime and Law
1.34 Legal Provisions in Indian Perspective
1.35 Phases of Cyber Forensics
Notes 1.36 Forensics Methodology
1.27 Impact of Cyber Crime on Businesses 1.37 Cyber Forensic Tools
1.28 Cyber Laws 1.38 Case Laws
1.29 Prevention of Cyber Crime 1.39 Misuse of Computer Forensics
1.30 Misuse of Technology 1.40 Indian Evidence Act, 1872
1.31 Computer Forensics Defined 1.41 Provisions of Indian Evidence Act, 1872
1.32 Objectives of Cyber Forensics followed with Information Technology Act,
1.33 Legal Scenario 2000
1.42 Digital Evidence – Technological & 1.52 Further Readings
Practical Issues 1.43 Cyber Crimes – Law,
Investigation & Adjudication
1.44 Misuse of Technology
1.1 Learning Objectives
1.45 Computer Forensics After studying the chapter, students will be able
to:
1.46 Legal Scenario
⌘ Discuss the Cyber crime and cyber Law;
1.47 Flaws in Current Scenario
⌘ Explain the Cyber Crime and Origin of Cyber
1.48 Misuse of Cyber Forensics and Crime;
Investigation
⌘ Discussthe Jurisprudence of Indian Cyber
1.49 Summary Law and Crime;
1.51 Review Questions
2001. Next were the Guidelines for submission of Holding Enquiry) Rules, 2003 were passed. These rules
certificates and certification revocation lists to the prescribe the qualifications required for Adjudicating
Controller of Certifying Authorities for publishing in Officers. Their chief responsibility under the IT Act is
National Repository of Digital Certificates. These were to
purportedly from news agencies like Reuters, to share sophisticated computers, printers and scanners. Outside
brokers and investors who were informed that the many colleges across India, one finds touts soliciting
companies were doing very badly. Even after the truth the sale of fake mark sheets or even certificates. These
came out the values of the shares did not go back to the are made using computers, and high quality scanners
earlier levels and thousands of investors lost a lot of and printers. In fact, this has becoming a booming
1.9 Frequently Used Cyber Crimes Housing Board to buy land at lower rates. When he
made an application it was rejected on the grounds
Unauthorized access to Computer Systems or that the schemes were available only for citizens of
Networks India. He decided to take his revenge. Consequently
This activity is commonly referred to as hacking. The he sent thousands of mails to the Shimla Housing
Indian law has however given a different connotation Board and repeatedly kept sending e-mails till their
to the term hacking, so we will not use the term servers crashed.
“unauthorized access” interchangeably with the term
Data Diddling
“hacking”.
This kind of an attack involves altering raw data just
before it is processed by a computer and then crimes. The key here is to make the alteration so
changing it back after the processing is completed. insignificant that in a single case it would go
Electricity Boards in India have been victims to data completely unnoticed. E.g. a bank employee inserts a
diddling programs inserted when private parties were program, into the bank's servers, that deducts a small
computerizing their systems. Introduction to Cyber Crimes
Salami Attacks
These attacks are used for the commission of financial Notes
Denial of Service Attack When the virus was brought under check the true
magnitude of the losses was incomprehensible.
This involves flooding a computer resource with
Losses incurred during this virus attack were pegged
more requests than it can handle. This causes the
at US $ 10billion.
resource (e.g. a web server) to crash thereby denying
authorized users the service offered by the resource.
This type of offence involves the theft of a computer, and has the sanction of the law. Crime or an offence is
some part(s) of a computer or peripheral attached to a legal wrong that can be followed by criminal
the computer. proceedings which may result into punishment. ‘The
hallmark of criminality is that, it is breach of the
Physically Damaging a Computer System criminal law. Per Lord Atkin the criminal quality of
This crime is committed by physically damaging a an act cannot be discovered by reference to any
computer or its peripherals. Rehabilitation standard but one: is the act prohibited with penal
consequences’. A crime may be said to be any
1.10 Misuse of Technology conduct accompanied by act or omission prohibited
by law and consequential breach of which is visited
The evolution of Information Technology (IT) gave
by penal consequences.
birth to the cyber space wherein internet provides
equal opportunities to all the people to access any
information, data storage, analyze etc. with the use of
1.12 Cyber Crime
high technology. Due to increase in the number of Cybercrime is the latest and perhaps the most
netizens, misuse of technology in the cyberspace was complicated problem in the cyber world. Cybercrime
clutching up which gave birth to cybercrimes at the may be said to be those species, of which, genus is the
domestic and international level as well. conventional crime, and where either the computer is
an object or subject of the conduct constituting crime.
1.11 Conventional Crime Any criminal activity that uses a computer either as an
instrumentality, target or a means for perpetuating
Crime is a social and economic phenomenon and is as
further crimes comes within the ambit of cybercrime.
Ageneralized definition of cybercrime may be however be target for unlawful acts in the following
unlawful acts wherein the computer is either a tool or cases- unauthorized
target or both’ The computer may be used as a tool in Introduction to Cyber Crimes
the following kinds of activity- financial crimes, sale
of illegal articles, pornography, online gambling,
intellectual property crime, e-mailspoofing,forgery,
Notes
cyber defamation, cyberstalking.The computer may
required to protect them. Applying this to the with human conduct. It is therefore very probable that
while protecting the computer system there might be
cyberspace we may say that computers are vulnerable
any negligence, which in turn provides a cybercriminal
so rule of law is required to protect and safeguard them
to gain access and control over the computer system.
against
5. Loss of evidence : Loss of evidence is a very
cybercrime. The reasons for the vulnerability of
common & obvious problem as all the data are
computers may be said to be: 1. Capacity to store data
routinely destroyed. Further collection of data outside
in comparatively small space: The computer has
the territorial extent also paralyzes this system of crime
unique characteristic of storing data in a very small
investigation.
space. This affords to remove or derive information
Any derogatory statement, which is designed to injure sophisticated computers, printers and scanners. It is
a person's business or reputation, constitutes cyber very difficult to control such attacks. For e.g. across
defamation. Defamation can be accomplished as libel the country students buy forged mark sheets for heavy
or slander. Cyber defamation occurs when sums to deposit in college.
defamation takes place with the help of computers andFinancial Crimes
/ or the Internet. E.g. someone publishes defamatory
This would include cheating, credit card frauds,
matter about someone on a website or sends e-mails
money laundering etc. such crimes are punishable
containing defamatory information to all of that
under both IPC and IT Act. A leading Bank in India
person’s friends.
was cheated to the extent of 1.39 crores due to
Trojan Attack misappropriation of funds by manipulation of
A Trojan, the program is aptly called an unauthorized computer records regarding debit and credit accounts.
program which functions from inside what seems to Internet Time Theft
be an authorized program, thereby concealing what it
This con notes the usage by an unauthorized person of
is actually doing.
the Internet hours paid for by another person. This
Forgery kind of cybercrime was unheard until the victim
Counterfeit currency notes, postage and revenue reported it. This offence is usually covered under IPC
and the Indian Telegraph Act.
It is a kind of e-mail that appears to originate from
Virus/Worms Attack one source although it has actually been sent from
Virus is a program that attaches itself to a computer or another source. Such kind of crime can be done for
a file and then circulates to other files and to other reasons like defaming a person or for monetary gain
computers on a network. They usually affect the data etc. E.g. if A sends email to B’s friend containing ill
on a computer, either by altering or deleting it. about
Worms, unlike viruses do not need the host to attach Introduction to Cyber Crimes
themselves to. They merely make functional copies of
themselves and do this repeatedly till they eat up all
Notes
the available space on a computer's memory.
E-mail Spoofing
Self Learning Material 29
Cyber Crime and Law Notes from individuals to companies and even the email
service provider.
Salami Attack
This is basically related to finance and therefore the
him by spoofing B’s email address, this could result in
main victims of this crime are the financial institutions.
ending of relations between B and his friends.
This attack has a unique quality that the alteration isso
Email Bombing insignificant that in a single case it would go completely
Email bombing means sending large amount of mails to unnoticed. E.g. a bank employee inserts a programme
the victims as a result of which their account or mail whereby a meager sum of ` 3 is deducted from
server crashes. The victims of email bombing can vary customers account. Such a small amount will not be
noticeable at all. disclosure of traffic data, production order, search and
seizure of computer data, real-time collection of traffic
Web Jacking
data, and interception of content data.
This term has been taken from the word hijacking. Once
a website is web jacked the owner of the site loses all 1.22 Cyber Crime in Modern Society
control over it. The person gaining such kind of an
Today, criminals that indulge in cybercrimes are not
access is called a hacker who may even alter or destroy
driven by ego or expertise. Instead, they want to use
any information on the site. Rehabilitation
their knowledge to gain benefits quickly. They are using
1.21 Misuse of Technology in the form of their expertise to steal, deceive and exploit people as
they find it easy to earn money without having to do an
Cyber Crime
honest day’s work.
The following offences are defined by the Convention:
Cybercrimes have become a real threat today and are
illegal access, illegal interception, data interference,
quite different from old school crimes, such as robbing,
system interference, misuse of devices, computer-
mugging or stealing. Unlike these crimes, cybercrimes
related forgery, computer-related fraud, offences
can be committed single handedly and does not require
related to child pornography, and offences related to
the physical presence of the criminals. The crimes can
copyright and neighboring rights. It also sets out such
be committed from a remote location and the criminals
procedural law issues as expedited preservation of
need
stored data, expedited preservation and partial
Cybercrimes are broadly categorized into three Government: Although not as common as the other
categories, namely crime against 1. Individual two categories, crimes against a government are
referred to as cyber terrorism. If successful, this
2. Property
category can wreak havoc and cause panic amongst
3. Government
the civilian population. In this category, criminals
Each category can use a variety of methods and the hack government websites, military websites or
methods used vary from one criminal to another. circulate propaganda. The perpetrators can be
Individual: This type of cybercrime can be in the terrorist outfits or unfriendly governments of other
form of cyber stalking, distributing pornography, nations.
trafficking and grooming’. Today, law enforcement
agencies are taking this category of cybercrime very 1.24 Different Kinds of Cyber Crime
seriously and are joining forces internationally to
The different kinds of cybercrimes are:
reach and arrest the perpetrators.
1. Unauthorized Access and Hacking: Unauthorized
Property: Just like in the real world where a criminal
access means any kind of access without the
can steal and rob, even in the cyber world criminals permission of either of the rightful or person in charge
resort to stealing and robbing. In this case, they can of the computer, computer system or computer
steal a person’s bank details and siphon off money; network. Hacking means an illegal intrusion into a
computer system and/or network. Every act Introduction to Cyber Crimes
committed towards breaking into a computer and/or
network is hacking. Hackers write or use ready- made
computer programs to attack the target computer. Notes
They possess the desire to destruct and they
2. Web Hijacking: Web hijacking means taking and then call them out for personal interaction. Then
forceful control of website of others. In this case the starts actual exploitation of the children by offering
them
owner of the website loses control over his website and
(a) They collect all personal information about the victim may have filled in while opening the chat or
victim such as name, family background, telephone e-mail account or while signing an account with some
numbers of residence and work place, daily routine ofwebsite.
the victim, address of residence and place of work, Introduction to Cyber Crimes
date of birth etc. If the stalker is one of the
acquaintances of the victim he can easily get this
Notes
information. If stalker is a stranger to victim, he
⌘ Sending defamatory messages by email - Sec 499 ⌘ Online sale of Arms Act
IPC Introduction to Cyber Crimes
⌘ Forgery of electronic records - Sec 463 IPC
⌘ Bogus websites, cyber frauds - Sec 420 IPC
Notes
⌘ Email spoofing - Sec 463 IPC
One should make them a part of his cyber life. Sailesh site owners to adopt some policy for preventing
Kumar Zarkar, technical advisor and network security cybercrimes as number of internet users are growing
consultant to the Mumbai Police Cybercrime Cell, day by day.
advocates the 5P mantra for online security: Precaution, ⌘ Web servers running public sites must be physically
Prevention, Protection, Preservation and Perseverance. separately protected from internal corporate network.
⌘ Identification of exposuresthrough education will ⌘ It is better to use a security programs by the body
assist responsible companies and firms to meet these corporate to control information on sites.
challenges. ⌘ Strict statutory laws need to be passed by the
⌘ One should avoid disclosing any personal information legislatures keeping in mind the interest of netizens.
to strangers, the person whom they don’t know, via ⌘ IT departmentshould pass certain guidelines and
e-mail or while chatting or any social networking site. notificationsfor the protection of computer system and
⌘ One must avoid sending any photograph to strangers should also bring out with some more strict laws to
by online as misusing or modification of photograph breakdown the criminal activities relating to
incidents increasing day by day. cyberspace.
⌘ An update Anti-virus software to guard against virus ⌘ As Cyber Crime is the major threat to all the countries
attacks should be used by all the netizens and should worldwide, certain steps should be taken at the
also keep back up volumes so that one may not suffer international level for preventing the cybercrime.
data loss in case of virus contamination.
⌘ A person should never send his credit card number or
⌘ Sec. 65B – Admissibility of electronic records not make any presumption as to the person by whom
such message was sent.
The person owning or in-charge of the computer from
proceedings, without further proof or production of the
1.41 Provisions of Indian Evidence Act, original, as evidence of any contents of the original or
1872 followed with Information of any fact stated therein of which direct evidence
Technology Act, 2000 would be admissible.
Section 65A: Special provisions as to evidence relating 2. The conditions referred to in sub-section (1) in
to electronic record. The contents of electronic records respect of a computer output shall be the following,
may be proved in accordance with the provisions of namely:
section 65B”. (i) The computer output containing the information was
produced by the computer during the period over
Section 65B- Admissibility of Electronic
which the computer was used regularly to store or
Records
process information for the purposes of any activities
1. Notwithstanding anything contained in this Act, any
regularly carried on over that period by the person
information contained in an electronic record which is
having lawful control over the use of the computer;
printed on a paper, stored, recorded or copied in optical
(ii) During the said period, information of the kind
or magnetic media produced by a computer (hereinafter
contained in the electronic record or of the kind from
referred to as the computer output) shall be deemed to
which the information so contained is derived was
be also a document, if the conditions mentioned in this
regularly fed into the computer in the ordinary course
section are satisfied in relation to the information and
of the said activities;
computer in question and shall be admissible in any
and to combating them an investigation team should ⌘ Used to store data from electronic devices.
be prepared with mitigation practices. Let us discuss ⌘ Keep away from magnets, radio transmitters and
the following categories with preservation steps: other potentially damaging devices.
218
Notes
Date
Article
Cyber Crime and Law Notes
Fig. 1.3: Sticker of Evidence popular platform in the grounds for collecting
electronic-evidence in processes like investigations,
Fig. Sticker of Evidence audits, or litigation. Since, court can also proceed with
e-evidence or ask for such evidences by the
investigating authority that can perform these tasks.
Such authorities acquire all e-records includes
219 telephone logs, e-mail and instant messaging which are
to be preserved carefully. Since, the content and
preservation of e-records will be a subject which causes
different problems in litigation and investigation
exercises under some new legislation which has been
Self Learning Material 59 opted by government of different countries for
preserving digital evidences or e-records. In any
investigation process of digital evidence consent of
legal advisor must be necessary who guide the officials some provisions of these acts. Although, nowadays
with rules and regulations. This may be done because many countries are going to opt or follow international
there are many agencies who indicate themselves that standard of ISO/IEC 27037 which deals with
they have power or legal authority for gathering of information technology- security techniques- guidelines
digital evidence. While, some of them use their powers, for identification, collection, acquisition, and
acquire search warrant or court order for seizing preservation of digital evidence.
evidence because in many countries there is not a single
explicit legal provision in their national law. 1.47 Flaws in Current Scenario
US opt various acts and rules for preservation of The investigation and preservation of digital evidence is
e-records such as Sarbanes-Oxley Act (SOX) which much vast in itself. Although, government has been
was signed in 2002 where data retention and facing different problems in solving the case related to
preservation issues were arises, Federal Rules of Civil cyber world. This happens because officials didn’t
Procedure (1970) which deals with all types of conducts
consist of least knowledge about technologies which
and activities, another is Federal Rules of Discovery
are eroded day by day and replacing the old one. In
which has been assign the duty for preserving the
current setup where cybercrime affect the nation and in
documents. However, if we concentrate in Indian
this situation investigation process is facing number of
scenario then we came to know that there are very few
problems from its officials. Because of lack of technical
rules or regulations followed by Indian government in
knowledge, didn’t aware of forensics
preserving digital or electronic evidences i.e.
process, haven’t any idea of rules and regulation and
Information Technology Act, 2000 and Indian Penal
many other.
Code (1860). Where not a single section deals with
preservation of digital evidences but co-relates with
laws behind these process is much wider and complex. 6. What do you understand by conventional and
Since, officials didn’t contain perfect knowledge of all cybercrime? Explain in detail. 7. Describe some
the process; then in this situation government have to relevant crimes which are not discussed in IT Act,
offer a workshop or session for these officials in which 2000. 8. What are the motives behind cybercrime?
cyber experts share their knowledge and provide with
9. Explain different categories of cybercrime?
latest tactics and standards for solving a case. And
10. Describe cyber stalking and cyber defamation in
government should also show their efforts by brief.
providing country a proper regulations or rules for such
How digital evidence described under Information ⌘ Cyber Crimes: Law and Practice; retrieved from
Notes
Offenses Related to
UNIT–2 Information
Technology 2.8 Accrued Liability and Procedural Law
2.9 Data Protection
2.10 Pre-censorship
2.11 Privacy and Surveillance
2.12 Civil Liability for Corporate
2.13 Adjudication
2.14 Evidences
2.15 Misuse of Technology
2.16 Constitutional Validity of Section 66A of
(Structure) IT Act
2.17 Criminalization of Online Speech and
2.1 Learning Objectives
Social Media 2.18 Recent Cases
2.2 Introduction
2.3 Criminal Liability for Misuse of Information 2.19 Case study: Facebook Arrests
Technology 2.4 Offences & Penalties under the 2.20 Rights vs. Responsibilities
Information Technology Act, 200050 2.5 2.21 Misuse of Social Media and Freedom of
Information Technology
Notes
2.4 Offences & Penalties under the Information Technology Act,
200050
The introduction of the internet has brought the tremendous changes in our lives.
People of all fields are increasingly using the computersto create, transmit and store
information
Act, 1872, The Banker’s Book’s Evidence Act, 1891 8. Trojan attacks
and The Reserve Bank of India Act, 1934. 9. Internet time theft
10. Web jacking
2.5 Offences 11. Email bombing
Cyber offences are the unlawful acts which are carried 12. Salami attacks
in a very sophisticated manner in which either the 13. Physically damaging computer system
computer is the tool or target or both. Cybercrime The offences included in the IT Act 2000 are as
usually includes: 1. Unauthorized access of the follows:
computers 1. Tampering with the computer source documents.
2. Data diddling 2. Hacking with computer system.
5. Directions of Controller to a subscriber to extend Explanation: For the purpose of this section computer
source code’ means the listing of programmes,
facilities to decrypt information 6. Protected system
computer commands, design and layout and programme
7. Penalty for misrepresentation
analysis of computer resource in any form.
8. Penalty for breach of confidentiality and privacy
Object: The object of the section is to protect the
9. Penalty for publishing Digital Signature Certificate intellectual property’ invested in the computer. It is an
false in certain particulars 10. Publication for fraudulent attempt to protect the computer source documents
purpose (codes) beyond what is available under the Copyright
11. Act to apply for offence or contravention committed Law.
outside India 12. Confiscation Essential Ingredients of the Section
13. Penalties or confiscation not to interfere with other 1. Knowingly or intentionally concealing,
punishments. 14. Power to investigate offences. 2. Knowingly or intentionally destroying,
3. Knowingly or intentionally altering,
2.6 Offences under the IT Act 2000
4. Knowingly or intentionally causing others to conceal,
5.4.1 Section 65: Tampering with Computer 5. Knowingly or intentionally causing another to
Source Documents destroy,
Whoever knowingly or intentionally conceals, destroys 6. Knowingly or intentionally causing another to alter.
Offenses Related to Information Technology
or alters or intentionally or knowingly causes another
to conceal, destroy or alter any computer source code
used for a computer, computer programme, computer Notes
system or computer network, when the computer
source code is required to be kept or maintained by law
Self Learning Material 71
Cyber Crime and Law Notes Fine: Two lakh rupees.
Case Laws
(i) Frios v/s State of Kerala
Facts: In this case it was declared that the FRIENDS
This section extends towards the Copyright Act and
application software as protected system. The author of
helps the companies to protect their source code of
the application challenged the notification and the
their programmes.
constitutional validity of software under Section 70.
Penalties: Section 65 is tried by any magistrate.
The court upheld the validity of both.
This is cognizable and non-bailable offence.
It included tampering with source code. Computer
Penalties: Imprisonment up to 3 years and / or source code the electronic form, it can be printed on
paper. prosecution. The accused argued that computers and
Held: The court held that tampering with Source code evidence can easily be tampered and hence should not
are punishable with three years jail and or two lakh be relied.
rupees fine of rupees two lakh rupees for altering, In Parliament case several smart device storage disks
concealing and destroying the source code. and devices, a Laptop were recovered from the truck
(ii) Syed Asifuddin Case intercepted at Srinagar pursuant to information given by
Facts: In this case the Tata Indicom employees were two suspects. The laptop included the evidence of fake
arrested for manipulation of the electronic 32- bit identity cards, video files containing clips of the
number (ESN) programmed into cell phones theft were political leaders with the background of Parliament in
exclusively franchised to Reliance Infocom. the background shot from T.V news channels. In this
case design of Ministry of Home Affairs car sticker,
Held: Court held that Tampering with source code
there was game wolf pack’ with user name of ―Ashiq.
invokes Section 65 of the Information Technology Act.
There was the name in one of the fake identity cards
(iii) Parliament Attack Case
used by the terrorist. No back up was taken therefore it
Facts: In this case several terrorist attacked on 13 was challenged in the Court.
December, 2001 Parliament House: In this the Digital
evidence played an important role during their
Whoever publishes or transmits or causes to be which may extend to five years and with fine which
published in the electronic form, any material which is may extend to one lakh rupees and in the event of a
second or subsequent conviction with imprisonment of These postings resulted in annoying phone calls to the
either description for a term which may extend to ten lady. Based on the complaint police nabbed the
years and also with fine which may extend to two lakh accused. He was a known family friend of the victim
rupees. and was interested in marrying her. She married to
Essential ingredients of this section: another person, but that marriage ended in divorce and
Publishing or transmitting, or causing to be published, the accused started contacting her once again. And her
pornographic material in electronic form. reluctance to marry him he started harassing her
On first conviction- imprisonment which may extend up Held: The accused is found guilty of offences under
to five years. Fine: up to on first conviction which may section 469, 509 IPC and 67 of IT Act 2000 and the
extend to one lakh rupees. On second conviction- accused is convicted and is sentenced for the offence to
imprisonment up to which may extend to ten years and undergo RI for 2 years under 469 IPC and to pay fine of
Fine which may extend up to two lakh rupees. ` 500/-and for the offence u/s 509 IPC sentenced to
undergo 1 year Simple imprisonment and to pay fine of
Case Laws ` 500/- and for the offence u/s 67 of IT Act 2000 to
1. The State of Tamil Nadu v/s Suhas Katti. undergo RI for 2 years and to pay fine of ` 4000/- All
Facts: This case is about posting obscene, defamatory sentences to run concurrently.
and annoying message about a divorcee woman in the The accused paid fine amount and he was lodged at
Yahoo message group. E-mails were forwarded to the Central Prison, Chennai. This is considered the first
victim for information by the accused through a false e- case convicted under section 67 of Information
mail account opened by him in the name of the victim. Technology Act 2000 in India.
computer system or computer network, to be a protectedFine: may extend to one lakh rupees or with both.
system. Only authorized person has the right to access Section 72: Penalty for Breach of
to protected system. Penalties: Punishment: the Confidentiality and Privacy
imprisonment which may extend to ten years and fine. Save as otherwise provide in this Act or any other law
for the time being in force, any person who, in
Section 71: Penalty for Misrepresentation
pursuance of any of the powers conferred under this
Whoever makes any misrepresentation to, or suppresses
Act, rules or regulation made there under, has secured
any material fact from, the Controller or the Certifying
access to any electronic record, book, register,
Authority for obtaining any license or Digital Signature
correspondence, information, document or other
Certificate, asthe case may be,shall be punished with
material without the consent of the person concerned
imprisonment for a term which may extend to two
discloses such material to any other person shall be disclosure of personal information of a person by a
punished with imprisonment for a term which may website, by his email service provider.
extend to two years, or with fine which may extend to Penalties:
one lakh rupees, or with both.
Punishment: term which may extend to two years.
Explanation: This section relates to any to any person Fine: one lakh rupees or with both.
who in pursuance of any of the powers conferred by the
Act or it allied rules and regulations has secured access Section 73: Penalty for publishing Digital
to any: Electronic record, books, register, Signature Certificate false in certain particulars
correspondence, information, document, or other Offenses Related to Information Technology
material.
If such person discloses such information, he will be
punished with punished. It would not apply to Notes
Self Learning Material 77
Cyber Crime and Law Notes ⌘ The certificate has been revoked or suspended, unless
Any computer, computer system, floppies, compact such computer, computersystem, floppies, compact
disks, tape drives or any other accessories related disks, tape drives or any other accessories relating
thereto, in respect of which any provisions of this Act, thereto is found is not responsible for the contravention
of the provisions of this Act, rules orders or regulations Explanation: The aforesaid section lays down a
made there under, the court may, instead of making an mandatory condition, which states the Penalties or
order for confiscation of such computer, computer confiscation not to interfere with other punishments to
system, floppies, compact disks, tape drives or any which the person affected thereby is liable under any
other accessories related thereto, make such other order other law for the time being in force.
authorized by this Act against the person contravening
of the provisions of this Act, rules, orders or Section 78: Power to investigate offences
regulations made there under as it may think fit. Notwithstanding anything contained in the Code of
Explanation: The aforesaid section highlights that all Criminal Procedure, 1973, a police officer not below
devices whether computer, computersystem, floppies, the rank of Deputy Superintendent of Police shall
compact disks, tape drives or any otherstorage, investigate any offence under this Act.
communication, input or output device which helped in Explanation: The police officer not below the rank of
the contravention of any provision of this Act, rules, Deputy Superintendent of police shall investigate the
orders, or regulations made under there under liable to offence.
be confiscated. Conclusion: Due to the increase in the digital
technology various offences has also increased. Since
Section 77: Penalties or confiscation not to
interfere with other punishments new-new technology come every day, the offences has
also increased therefore the IT Act 2000 need to be
No penalty imposed or confiscation made under this
amended in order to include those offences which are
Act shall prevent the imposition of any other
now not included in the Act.
punishment to which the person affected thereby is
liable under any other law for the time being in force.