Akhil Bhartiya Cyber Suraksha Sangathan (Regd.)
Regd. with Registrar of Society of NCT Delhi-Regd. No-287
Cyber Criminals se Suraksha, Digital India ki Raksha
अखिल भारतीय साइबर सुरक्षा संगठन (पंजी)
भारत की पहली साइबर क्राइम इन्वेस्टीगेशन एन जी ओ
ऑनलाइन रहें सतर्क, साइबर अपराध से रहें सुरक्षित
www.abcss.org Email: info@abcss.org
AMIT MALHOTRA
(Cyber Crime Investigation Specialist)
Founder Akhil Bhartiya Cyber Suraksha Sangathan
18 yrs experience in crime prevention, detection and investigation. Certified Ethical Hacker from Ec-Council. Certified Cyber Crime Investigator from Asian School of Cyber Laws. Presently working in the area of cyber crime investigation.
The IT Act 2000 covers: legal recognition of electronic records and digital signatures, e-governance, electronic contracts, cyber offences and penalties, data protection obligations, role of Certifying Authorities (CA), duties of intermediaries (ISPs, social media, cloud services), establishment of the Cyber Appellate Tribunal, and appointment of the Adjudicating Officer. The 2008 Amendment introduced sweeping changes including recognition of new forms of communication (mobile phones, tablets), enhanced intermediary liability, new cyber crime offences, increased penalties and stronger provisions for child safety online.
(a) accesses or secures access to such computer or network;
(b) downloads, copies or extracts any data;
(c) introduces or causes to be introduced any computer contaminant or computer virus;
(d) damages or causes to be damaged any computer or data;
(e) disrupts or causes disruption of any computer;
(f) denies or causes the denial of access to any authorised person;
(g) provides any assistance to any person to facilitate access;
(h) charges the services availed of by a person to the account of another person.
Remedy: Such person shall be liable to pay damages by way of compensation to the person so affected. The Adjudicating Officer can award compensation up to ₹1 crore. This section covers all forms of hacking, data theft, DoS attacks and unauthorised access.
Key Point: Section 43 is a civil remedy — the victim can claim monetary compensation even without filing a criminal complaint.
Scope: Applies to all companies, hospitals, banks, e-commerce firms, IT companies and other organisations that collect and process personal data (medical records, financial information, passwords, biometric data).
Key Point: This section was the first Indian law holding organisations directly accountable for data breaches caused by inadequate security — a precursor to modern data protection laws. Now supplemented by the Digital Personal Data Protection Act 2023.
(a) furnish any document, return or report — shall be liable to a penalty not exceeding ₹1.5 lakh for every such failure;
(b) file any return or furnish any information — shall be liable to a penalty not exceeding ₹5,000 for every day during which such failure continues;
(c) maintain books of account or other records — shall be liable to a penalty not exceeding ₹10,000 for every day during which the failure continues.
Key Point: Primarily applies to Certifying Authorities, intermediaries and regulated entities that have reporting obligations under the IT Act.
Key Point: This is a catch-all provision ensuring that any violation of IT Act rules or regulations that is not covered by a specific section still attracts a minimum financial penalty.
Punishment: Imprisonment up to 3 years, or fine up to ₹2 lakh, or both.
Examples: Tampering with government software source code, altering EVM software, destroying mandatory audit trails, modifying billing system code to evade taxes.
Punishment: Imprisonment up to 3 years, or fine up to ₹5 lakh, or both.
Examples: Hacking websites, stealing data from servers, installing malware on systems, conducting DoS attacks, gaining unauthorised access to banking systems — all done with dishonest intent.
Current Position: Section 66A is no longer in force and cannot be used to prosecute anyone. Harassment and threatening messages are now prosecuted under BNS Section 351 (criminal intimidation), BNS 356 (defamation) and other applicable provisions.
Punishment: Imprisonment up to 3 years, or fine up to ₹1 lakh, or both.
Examples: Buying or using hacked email accounts, purchasing stolen login credentials on dark web marketplaces, retaining data known to have been stolen from a company database, using a mobile phone known to be obtained through fraud.
Punishment: Imprisonment up to 3 years, and fine up to ₹1 lakh.
Examples: Using someone else's password to access their accounts, SIM swapping to steal another person's mobile identity, creating fake profiles using another person's digital credentials, using stolen OTP to authorise transactions, impersonating someone in digital communications.
Punishment: Imprisonment up to 3 years, and fine up to ₹1 lakh.
Examples: Phishing emails pretending to be from banks, vishing calls impersonating government officials, fake banking websites, Business Email Compromise attacks, digital arrest scams, WhatsApp calls pretending to be from family members, fake customer care numbers.
Punishment: Imprisonment up to 3 years, or fine up to ₹2 lakh, or both.
Examples: Secretly filming a person in changing rooms or private spaces, circulating intimate images without consent (revenge porn), voyeurism using hidden cameras, morphing a person's face onto obscene images and distributing them, recording and sharing intimate video calls without the other person's knowledge.
(i) denying or causing denial of access to any person authorised to access computer resource;
(ii) attempting to penetrate or access a computer resource without authorisation or exceeding authorised access;
(iii) introducing or causing to be introduced any computer contaminant — and thereby causing or likely to cause death or injuries to persons or damage or destruction of property or disruption of the supply of essential services or adversely affecting the critical information infrastructure.
Punishment: Imprisonment which may extend to LIFE.
Examples: Attacking power grid control systems, hacking banking settlement infrastructure, attacking hospital systems during emergencies, DDoS attacks on defence networks, disrupting railway or air traffic control systems, attacking communication infrastructure during national emergencies.
Punishment: First conviction — imprisonment up to 3 years and fine up to ₹5 lakh. Second or subsequent conviction — imprisonment up to 5 years and fine up to ₹10 lakh.
Examples: Sharing obscene content via WhatsApp or email, publishing pornographic content on websites accessible to all, sending obscene messages or images to harass victims.
Punishment: First conviction — imprisonment up to 5 years and fine up to ₹10 lakh. Second or subsequent conviction — imprisonment up to 7 years and fine up to ₹10 lakh.
Examples: Non-consensual intimate image sharing (revenge porn), circulation of morphed explicit images, sharing sexually explicit content via digital platforms without age verification, explicit content sent via email to harass victims.
Punishment: First conviction — imprisonment up to 5 years and fine up to ₹10 lakh. Second conviction — imprisonment up to 7 years and fine up to ₹10 lakh.
Note: Read together with POCSO Act 2012 for comprehensive child protection. Downloading, viewing, sharing or even searching for CSAM is an offence — there is no defence of accidental viewing.
Punishment for Non-Compliance: Any intermediary or person who fails to extend all facilities and technical assistance shall be punished with imprisonment up to 7 years and shall also be liable to fine.
Key Point: This section is often cited in debates about government surveillance and privacy rights. It provides legal authority for lawful interception of internet communications with proper authorisation.
Punishment for Non-Compliance: Imprisonment up to 7 years and fine.
Key Point: This section was used to block TikTok, PUBG Mobile and 59 Chinese apps in 2020, to block Pakistani social media accounts during security emergencies, and to direct platforms to remove harmful content. The Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules 2009 govern its implementation.
Punishment: Imprisonment up to 10 years, and fine.
Examples of Protected Systems: National Power Grid control systems, Defence networks, Banking settlement infrastructure (NPCI, RBI systems), Railway control systems (CRIS), Air traffic control, Nuclear facility systems, Government data centres and UIDAI's Aadhaar infrastructure.
Punishment: Imprisonment up to 2 years, or fine up to ₹1 lakh, or both.
Key Point: Applies to fraudulent obtaining of Digital Signature Certificates by misrepresentation. Digital signatures are used in e-filing of taxes, company registration, government procurement and other official digital processes.
Punishment: Imprisonment up to 2 years, or fine up to ₹1 lakh, or both.
Examples: A government officer who obtains private emails under Section 69 and leaks them, an Adjudicating Officer who discloses confidential case information, an intermediary employee who shares user data without authorisation.
Punishment: Imprisonment up to 3 years, or fine up to ₹5 lakh, or both.
Examples: An IT company employee selling customer personal data to a competitor, a bank outsourcing vendor sharing customer account details with third parties, a healthcare IT service provider disclosing patient data in breach of contract.
Punishment: Imprisonment up to 2 years, or fine up to ₹1 lakh, or both.
Examples: Creating fake digital signature certificates to fraudulently sign government documents, using fake DSC to file fraudulent GST returns, forged digital signatures on electronic contracts.
(a) the function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored;
(b) the intermediary does not initiate the transmission, select the receiver of transmission and select or modify the information contained in the transmission;
(c) the intermediary observes due diligence while discharging its duties under this Act.
Loss of Safe Harbour: The intermediary loses protection if it has actual knowledge of unlawful content, fails to take down content upon court order or government direction, or conspires or abets the unlawful act.
IT (Intermediary Guidelines) Rules 2021: Social media companies with over 5 million users must appoint a Chief Compliance Officer, Nodal Contact Person and Grievance Officer in India. They must respond to government orders within 36 hours and grievances within 15 days. Significant Social Media Intermediaries (SSMIs) must enable traceability of originator of messages.
Key Point: This section establishes the legal basis for electronic evidence examiners — government-authorised experts who provide forensic analysis and expert testimony on digital evidence in courts. Their reports are admissible as expert evidence in criminal and civil proceedings.
Key Point: This is the foundational section that gives digital signatures the same legal standing as physical signatures in India — enabling e-filing of taxes, digital contracts, company registration and government submissions.
Licensed CAs in India: eMudhra, National Informatics Centre (NIC), IDRBT, SafeScrypt, Capricorn, CDAC, TCS-CA and NSDL e-Governance are licensed by CCA to issue DSCs.
Key Point: DSCs are used for ITR e-filing, GST registration, company incorporation (MCA), e-tendering, EPFO, customs and many government services.
Powers: The Adjudicating Officer can summon persons, examine evidence, order production of documents and award compensation up to ₹5 crore. The Adjudicating Officer has the powers of a Civil Court for the purposes of taking evidence.
Key Point: The Adjudicating Officer provides an alternative to civil courts for resolving disputes and awarding compensation under the IT Act — faster and more technical than regular courts.
Appeal Process: Any person aggrieved by an order of the Adjudicating Officer may appeal to the CAT within 45 days of the order. The CAT can confirm, modify or reverse the order of the Adjudicating Officer.
Further Appeal: Appeals against CAT orders lie to the High Court on questions of law.
| Section | Offence / Subject | Punishment | Added in 2008? |
|---|---|---|---|
| Sec 43 | Unauthorised access / damage to computer | Compensation up to ₹1 Cr | No (Modified) |
| Sec 43A | Failure to protect sensitive personal data | Compensation as determined | Yes ✓ |
| Sec 65 | Tampering with computer source code | 3 Yrs + ₹2 Lakh Fine | No |
| Sec 66 | Computer related offences (hacking) | 3 Yrs + ₹5 Lakh Fine | No (Modified) |
| Sec 66A | Offensive messages [STRUCK DOWN — SC 2015] | Not applicable | Yes ✓ |
| Sec 66B | Receiving stolen computer resource | 3 Yrs + ₹1 Lakh Fine | Yes ✓ |
| Sec 66C | Identity theft | 3 Yrs + ₹1 Lakh Fine | Yes ✓ |
| Sec 66D | Cheating by personation via computer | 3 Yrs + ₹1 Lakh Fine | Yes ✓ |
| Sec 66E | Privacy violation / voyeurism | 3 Yrs + ₹2 Lakh Fine | Yes ✓ |
| Sec 66F | Cyber terrorism | Life Imprisonment | Yes ✓ |
| Sec 67 | Publishing obscene material online | 3–5 Yrs + ₹5–10 Lakh Fine | No (Modified) |
| Sec 67A | Publishing sexually explicit material | 5–7 Yrs + ₹10 Lakh Fine | Yes ✓ |
| Sec 67B | Child sexual abuse material online | 5–7 Yrs + ₹10 Lakh Fine | Yes ✓ |
| Sec 69 | Interception/monitoring of computer traffic | 7 Yrs (non-compliance) | No (Modified) |
| Sec 69A | Blocking of online content | 7 Yrs (non-compliance) | Yes ✓ |
| Sec 70 | Accessing protected systems | 10 Yrs Imprisonment + Fine | No (Modified) |
| Sec 72 | Breach of confidentiality and privacy | 2 Yrs + ₹1 Lakh Fine | No |
| Sec 72A | Disclosure of personal information in breach of contract | 3 Yrs + ₹5 Lakh Fine | Yes ✓ |
| Sec 74 | Publication of DSC for fraudulent purpose | 2 Yrs + ₹1 Lakh Fine | No |
| Sec 79 | Intermediary safe harbour / liability | Regulatory | No (Modified) |





