Offences Under Information Technology Act
Offences Under Information Technology Act
Offences Under Information Technology Act
Act, 2000
Introduction
Information Technology Act, 2000 was enacted on 17th May, 2000 to provide legal
recognition for electronic transactions and facilitate E-commerce. It was later amended by
passing Information Technology (amendment) Act, 2008.
Object
Chapter XI of the Information Technology Act, 2000 deals with cyber offences in which two
elements are important, actus reus (the act) and the mens rea (mental intention to commit a
crime). As the IT Act is a special law on information technology it is related to offences that
use Information Technology to commit the crime or as a target of the crime. The general law
of Indian Penal Code, 1860 applies in many cases in addition to IT Act 2000 in cyber
offences or where there are no specific provisions expressly mentioned in IT Act, 2000. For
example, in case of online defamation, section 500 could apply alongwith Section 66 A of the
IT Act, 2000.
The offences under IT Act 2000 are as follows;
Section 77 B of IT Act, 2000 provides that all offences that are punishable with imprisonment
of three years and above are cognizable and offences punishable with imprisonment of three
years are bailable. Section 77 A prescribes for compounding of offences except for which
punishment is for life or imprisonment for a term exceeding three years. As per Section 77 A
proviso, the court will not compound an offence when an accused is liable under previous
conviction to enhanced punishment or punishment of different kind or if it affects socio
economic condition of a country or if an offence is committed against a child below 18 years
or a woman. The power to investigate IT offences vests with an inspector and above.
Explanation to the Section states that computer source code means listing of programmes,
computer commands, design and layout and programme analysis of computer resource in any
form.
Essential ingredients
The essential ingredients of this section are as follows:
1. knowingly or intentionally :
i. concealing,
ii. destroying,
iii. altering,
iv. causing another to conceal,
v. causing another to destroy,
vi. causing another to alter,
2. a computer source code which is used for a computer
3. such source code is required to be kept or maintained by law for the time being in
force.
Object
The object of the section is to protect the “intellectual property” invested in the computer. It
is an attempt to protect the computer source documents beyond what is available under the
Copyright Law.
Case laws
1. Syed Asifuddin
In this case the employees of the Tata Indicom were arrested by government officials for the
manipulation of an electronic 32-bit number program. The program exclusively franchised to
Reliance Infocom was added into cell phones for theft by the hackers. The court held that
tampering with source code invokes Section 65 of the Information Technology Act and
applied the punishment as provided.
in this case several terrorist attacked on 13 December, 2001 Parliament House. In this the
Digital evidence played an important role during their prosecution. The accused argued that
computers an evidence can easily be tampered and hence should not be relied.
In parliament case several smart device storage disks and devices, a Laptop were recovered
from the truck intercepted at Srinagar pursuant to information given by two suspects. The
laptop included the evidence of fake identity cards, video files containing clips of the political
leaders with the background of parliament in the background of shot from T.V. news
channels. In this case design of ministry of home affairs car sticker. There was the name in
one of the fake identity cards used by the terrorist found.
It was held by Supreme Court “ Challenges to the accuracy of computer evidence should be
established by the challenger. Mere theoretical and generic doubts cannot be cast on the
evidence.
The cyber offences under Section 66 are read with Section 43 and include :
The word “dishonestly” bears the same meaning as in Section 24 of the Indian Penal Code,
1860 wherein “dishonestly” means ‘whoever does anything with the intention of wrongful
gain to one person or wrongful loss to another person is said to do that thing dishonestly’.
The term ‘fraudulently’ means same as Section 25 of the Indian Penal Code 1860. As per
Section 25 of IPC, a person commits an act fraudulently if he does so with intention to
defraud and not otherwise. The punishment in Section 66 has been amended with an increase
in fine from 2 lakhs to 5 lakhs by the IT (Amendment) Act,2008.
The term ‘hacking’ has not been used under Section 66 of IT Act, 2000 after IT (
amendment) Act 2008. The term now used is computer related offences which has much
wider connotations. The scope of the section is enlarged to include acts earlier known as
hacking, i.e. intentionally or knowingly causing wrongful loss to public or a person destroys,
alters, deletes any information residing in a computer or affects it injuriously.
Case laws
Case: Abhinav Gupta v. State of Haryana
In this an employee alleged to have hacked into a computer system of his past employer and
stolen confidential information and copyrighted drawings of the complainant and disclosed
the same to a competitor company. His petition for anticipatory bail was rejected. The
screenshots of his email inbox were produced by complainant in the court as evidence. The
court took the view that such acts prima facie amounted to hacking under Section 66 of the IT
Act, 2000.
Constitutional validity
Case : Shreya Singhal v. Union of India
In this a Public Interest Litigation was filed before the Apex Court challenging
constitutionality of Section 66 A of the Information Technology Act, 2000 wherein State of
Maharashtra was called upon to explain the manner of arrest of two muslim girls for writing
posts on facebook relating to closure of Mumbai over Bal Thackeray’s death. Here the
Supreme Court said that “Section 66 A affects right of people to know, hence violates Article
19 (1) (a) of the constitution beyond the extent permissible under Article 19 (2)”, hence,
struck down in its entirely.
The supreme court further said “ Section 66 A is unconstitutional on ground of being vague
and not providing manageable standards”.
If any person committed the offence mentioned in this section he may in addition to this
section made liable under Section 410 of IPC.
This applies particularly with respect to MMS clips that are transmitted or published online if
it invades privacy of person within the meaning of this Section.
Section 66 F (1) (a) provides If any person with intention to threaten sovereignty, integrity,
security or unity of India or to strike terror in the people causes denial of service attacks ( that
is where overloading of mails/spamming leads to disruption or damage to computer networks
which makes them malfunction ) or access a computer without permission or exceeds the
authority given or introduces any computer virus or other contaminant which is likely to
cause or causes death or injury to persons or destroys property or supplies or services
essential to public life or adversely affects critical information infrastructure ( which are
sensitive systems of the government) commits the offence of cyber terrorism.
Section 66 F(1) (B) provides that a person who knowingly or intentionally accesses a
computer resource without authorization or exceeds the authorization and steals information
that is sensitive to our nation‘s security, foreign relations, or such information that is likely to
cause injury to integrity, security, sovereignty of India or friendly relations with foreign states
or public order, decency or morality ,or in relation to contempt of court, defamation or
incitement to an offence or to advantage any foreign nation , or group of individuals commits
cyber terrorism.
In the above case a video clip containing obscene material was listed on the Bazee.com site
for sale concerning two school students of DPS School. Despite actual notice, clip was not
removed for sometime from the website. An FIR was registered under Section 67 of IT Act
read with Section 85 ( director’s liability for acts of the company) and Section 292 of the IPC
Act. The court, in a petition to quash FIR against the director held that under Section 292 IPC
no automatic liability of directors was envisaged but Section 67 of IT Act read with Section
85 provides for deemed liability of the director. Later, the case was heard in Appeal in
Aneeta Hada v. M/s Godfather Travels and Tours (p) ltd, the court took the view that
under Section 85 incase an offence is committed by a company, director cannot be made
personally liable without impleading the company as an accused.
Note: proviso to Section 67,67A and 67 B excludes such literary work that is written for the
purposes of art, science, literature or other objects of general concern, or which are retained
for religious, or bona fide heritage purposes.
Sub-section 2 of Section 68 states that in case any person who fails to comply with any order
under sub-section 1 shall be guilty of an offence and shall be liable on conviction to
imprisonment for a term not exceeding three years or to a fine not exceeding two lakh rupees
or both.
Sub-section 2 states that the subscriber or any person in charge of the computer resource
shall, when called upon by any agency which has been directed by the controller. Such
person has to provide technical assistance to decrypt the information.
Sub-section 3 states that in case the subscriber or any person who fails to assist the agency
shall be punishable with an imprisonment for a term which may extend to Seven Years.
Section 70. Protected System
Under section 70 the appropriate government ( central or state government as the case may
be) is empowered to declare any computer, computer system or computer network to be a
protected system.
Sub – section 2 provides that the Government by an order in writing authorize the person to
access the protected system. If any person who secures access or attempts to secure access to
a protected system in contravention of the provision of this section shall be punished with
imprisonment of either description for a term which may extend to ten years and shall also be
liable to fine. (sub-section 3)
Section 73 and Section 74. Penalty for illegal acts connected with electronic
signature certificates
Penalty for publishing electronic signatures that bear false particulars is imprisonment for a
term of upto two years or fine of upto one lac or both. ( section 73)
Section 74 provides punishment for publishing electronic signature certificates for unlawful
or fraudulent purposes with a term that may extend to two years or fine of one lac or both.
Inter-relation between offences mentioned under IT Act and Offences
Under Indian Penal Code
The Information Technology Act deals with cyber crimes. The cyber crimes which are e-
crimes are more like the conventional offline crimes transformed into digital world which is
online and therefore they becomes e-crimes or cyber crimes. The crimes which we see earlier
like theft or extortion or any kind of harassment, now those crimes are actually shifted into
online world. The reason behind this is that it is very easy for a criminal to be hide behind the
anonymity which exist on the internet and it is very difficult to track because the IP Address
can be easily concealed using software and other kinds of high-tech gadgets, therefore the
criminals find it very lucrative to be online. To tackle with this problem the I T Act was
enacted and several amendments were made in the Indian Penal Code, 1860. Different
sections of IPC are applied in Cyber Crimes along with the Sections of the I T Act. These are
follows :
1. Forgery
Section 463 of IPC deals with forgery. If any person makes any false electronic record or part
of an electronic record with intent to cause damage or injury to the public or to any person, or
to support any claim or title, or to enter into any express or implied contract, or with intent to
commit fraud , commits forgery. This offence is punishable with imprisonment upto 2 years
or with fine or both (sec.465). In case if such offence is committed the person will be liable
under Section 463 IPC along with Section 65, Section 66 C and 66 D ( when the offence is
committed by person by making fraudulent signature password etc.) The relevant case of
forgery of any electronic record is the Parliament Attack Case.
2. Criminal intimidation
According to Section 503 of IPC – whoever threatens another person with injury to his
person, or property or to his reputation to intimidate the person and to make the person to do
what he is not legally bound to do as means to avoid execution of such threat commits
criminal intimidation. The offence is punishable under Section 506 with imprisonment of
term upto two years or fine or both. If a person is committing the criminal intimidation by
anonymous means it could be by any fake e-mail ID or through a fake profile created on a
social media blog or a network now this offence is punishable up to three years under Section
65 of IT Act in addition to punishment under Section 506 of IPC.
3. Falsification of Accounts
If any person fraudulently or dishonestly or with intent to cause injury to public or any
person, conceals, destroy or deface any document he is said to commit the offence of
falsification of account and such offence is punishable imprisonment for life or imprisonment
up to seven years or and fine. If same person commits the same offence by using computer as
a resource in that case he will also be liable under IT Act under Section 65 and under Section
66 and he may also made liable under section 43 for compensation.
4. Fabricating Evidence
Section 192 states that if any person makes any false entry in any electronic record or makes
any electronic record containing false statement with intention that such record may appear in
evidence in a judicial proceeding, he is said to fabricate false evidence. Such offence is
punishable with imprisonment up to 7 years or and fine.
6. Cyber Stalking
The word stalking means pursuing stealthily. Cyber stalking can be used interchangeably
used with online harassment/abuse. It is use of internet or any other electronic means to stalk
or harass a person, it involves invading the privacy by following a person’s movement across
the internet, by posting messages on bulletin boards, entering the chat rooms frequented by
the victim and constantly bombarding to the victim messages and e-mails with obscene
languages. In cyber stalking, stalker accesses the victim’s personal information like name,
address, telephone no., family background and posts it on pornographic websites.
Stalking-Section 354D
Any man who follows a woman and contacts or attempts to contact such woman to obtain
personal interaction repeatedly despite a clear indication of disinterest by such woman or
monitors the use of internet by woman or email or any other form of electronic
communication used by her. He commits the offence of stalking.
Obscenity-Section 292
The offence of Cyber Stalking takes within its purview the act of sending obscene materials
to the victim on a social networking sites or through emails.
A stalker can be booked under this section if the conduct of stalker hinders the privacy of
woman by making any gesture or through words sent by emails messages or posts on social
media.
If any person commits the offence of cyber stalking he in addition to the above mentioned
sections shall be made liable under Section 67, 67 A, 67 B of the IT Act, 2000.
Case law:
Ritu Kohli received a no. of emails from unknown sources. Initially she ignored stalker used
obscene language and posted her detail on various websites inviting people to chat with her
on the phone. As a result, she started receiving numerous obscene calls at odd hours. She
lodged a police complaint and police traced down the IP address of accussed to a cyber café.
The cyber stalker Manish Kathuria was arrested under Section 509 IPC for outraging
modesty of a woman and Section 67 IT Act. This is the first case of cyber stalking in India.
Analysis