Information Technology Law Project ON Contraventions Under Information Technology Act, 2000
Information Technology Law Project ON Contraventions Under Information Technology Act, 2000
Information Technology Law Project ON Contraventions Under Information Technology Act, 2000
PROJECT
ON
CONTRAVENTIONS UNDER INFORMATION
TECHNOLOGY ACT, 2000
SUBMITTED TO – SUBMITTED BY –
Chandigarh Section - C
ACKNOWLEDGMENT
This project would be incomplete without expressing my gratitude towards the people
who made it possible for me to finish it on time and with accuracy.
Firstly, I would like to thank our Information Technology Law Professor Dr.Amita
Verma for giving me the requisite guidelines and helping me in fulfilling the loopholes of my
project.
Secondly, I would like to thank my family member‘s friends who constantly gave me
advice on the quality of information and helped me in completing my project.
Lastly I would like to thank our library staff for helping me in collecting the material and
the required books for the project.
Shivika Sood
LIST OF ABBREVIATIONS..........................................................................................................4
TABLE OF CASES.........................................................................................................................5
HACKING.......................................................................................................................................9
BIBLIOGRAPHY..........................................................................................................................22
SC – Supreme Court
IT – Information Technology
Dr. Katari Sunil Kumar v. Dr. B. Hema Nalini and Another, 2013(1)ALD(Cri)251,
2013(1)ALT(Cri)257.................................................................................................................11
Rajesh v. State of Kerala, 2014CriLJ204, ILR2013(4)Kerala443................................................11
Sanjay Kumar v. State Of Haryana , CRR No.66 of 2013 (O&M).................................................7
Shreya Singhal v. Union of India, WRIT PETITION (CRIMINAL) NO.167 OF 2012...............12
Sporting Mindz Technology Private Limited v. State of Karnataka and Ors., 2015(1) AKR 23..13
Syed Asifuddin and Ors. v. State of Andhra Pradesh and Anr.,2005 CriLJ 4314 (AP)..................7
INTRODUCTION –
According to section 65 of the IT Act Whoever knowingly or intentionally conceals, destroys or
alters or intentionally or knowingly causes another to conceal, destroy or alter any computer
source code used for a computer, computer programme, computer system or computer network,
when the computer source code is required to be kept or maintained by law for the time being in
force, shall be punishable with imprisonment up to three years, or with fine which may extend up
to two lac rupees, or with both.
Explanation.—For the purposes of this section, "computer source code" means the listing of
programmes, computer commands, design and layout and programme analysis of computer
resource in any form.
COMPUTER SOURCE –
Computer source code is the listing of programmes, computer commands, design and layout and
programme analysis of computer resource in any form. Computer source code need not only be
in the electronic form. It can be printed on paper (e.g. printouts of flowcharts for designing a
software application). This section relates to computer source code that is either:
Required to be kept (e.g. in a cell phone, hard disk, server etc), or
Required to be maintained by law,
INGREDIENTS –
The following acts are prohibited in respect of the source code:-
Knowingly concealing or destroying or altering;
Intentionally concealing or destroying or altering;
Knowingly causing another to conceal or destroy or alter;
Intentionally causing another to conceal or destroy or alter
INTRODUCTION –
(1)Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or
damage to the public or any person destroys or deletes or alters any information residing in a
computer resource or diminishes its value or utility or affects it injuriously by any means,
commits hacking.
(2)Whoever commits hacking shall be punished with imprisonment up to three years, or with
fine which may extend upto two lac rupees, or with both.
INGREDIENTS –
Intention to cause wrongful loss or damage or Knowledge of the likelihood of wrongful loss
or damage;
AND
Destruction or deletion or alteration of information in a computer or diminishing value or
utility of a computer resource or injuriously affecting a computer resource.
Loss signifies detriment or disadvantage. Loss can be temporary or permanent. Loss can relate to
something that the loser has currently or is likely to get in the future. This term is best
understood through the following illustrations. Wrongful loss is the loss by unlawful means.
Damage for the purposes of this section implies injury or deterioration caused by an unlawful
act. Intent means a fixed determination to act in a particular manner. To cause means to make
something happen. Cause can be direct or indirect. Knowingly doing something implies
consciously or wilfully doing something. Likely to cause means probable to cause. The term
likely is usually used to mean “in all probability”. This term has to be interpreted in light of the
circumstances of each case. Public is a term that refers to “the people”, “the general body of
mankind”, “the community at large”, “a class of the community” etc. A thing is said to be public
if it is owned by the public or if its uses are public. Person includes natural persons (such as men,
women and children) as well as artificial persons (such as companies, societies etc). Information
includes data, text, images, sound, voice, codes, computer programmes, software and data bases
or micro film or computer generated micro fiche. Computer resource includes computer,
3
Rajesh v. State of Kerala, 2014CriLJ204, ILR2013(4)Kerala443.
4
Dr. Katari Sunil Kumar v. Dr. B. Hema Nalini and Another, 2013(1)ALD(Cri)251, 2013(1)ALT(Cri)257.
INTRODUCTION –
It has been stated under Section 66A that “any person who sends, by means of a computer
resource or a communication device:-
a) any information that is grossly offensive or has menacing character; or
b) any information which he knows to be false, but for the purpose of causing annoyance,
inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill
will, persistently makes by making use of such computer resource or a communication device; or
c) any electronic mail or electronic mail message for the purpose of causing annoyance or
inconvenience or to deceive or to mislead the addressee or recipient about the origin of such
messages shall be punishable with imprisonment for a term which may extend to two three years
and with fine.”
For explanation the purposes of this section, terms "electronic mail" and "electronic mail
message" means a message or information created or transmitted or received on a computer,
computer system, computer resource or communication device including attachments in text,
image, audio, video and any other electronic record, which may be transmitted with the message.
REPEALED –
That the Hon’ble Supreme Court has struck down the Section 66A of the Information
Technology Act, 2000 is struck down in its entirety being violative of Article 19(1)(a) and not
saved under Article 19(2).5
5
Shreya Singhal v. Union of India, WRIT PETITION (CRIMINAL) NO.167 OF 2012.
INTRODUCTION –
It has been stated under Section 66B of the Act that “Whoever dishonestly receives or retains any
stolen computer resource or communication device knowing or having reason to believe the
same to be stolen computer resource or communication device, shall be punished with
imprisonment of either description for a term which may extend to three years or with fine which
may extend to rupees one lakh or with both.”
INGREDIENTS –
That the ingredients are as follows:-
Dishonestly receives or retains;
Computer resource;
reason to believe to be stolen
The petitioner has approached this Court seeking Writ of Mandamus, directing the second
respondent for seizure of passport along with all the equipment, data, computers, software
programmes, compact discs (CDs.), drives, hardware and all forms of data storage and transfer in
the possession of respondent No. 3 in connection with Crime No. 37/2014 on the file of Cyber
Crime Police Station, Palace Road, Bangalore. It is an undisputed fact that petitioner has filed a
complaint before the Cyber Crime Police Station, Sub-Division CID, CID Annexe Building,
Carlton House, Palace Road, Bangalore on 23.9.2014 and the police have registered the said case
in Crime No. 37/2014 for the offence punishable under Sections 43(j), 65, 66(B) of the IT Act
and started the investigation. It is contended that the investigating officer has not made any
efforts for seizure of the articles which are very important so far as this case is concerned. It was
held by the Hon’ble Court that the authorities are directed to apply their mind.6
6
Sporting Mindz Technology Private Limited v. State of Karnataka and Ors., 2015(1) AKR 23.
INTRODUCTION –
It has been stated under Section 66C that “ Whoever, Fraudulently Or Dishonestly Make Use Of
The Electronic Signature, Password Or Any Other Unique Identification Feature Of Any Other
Person, Shall Be Punished With Imprisonment Of Either Description For A Term Which May
Extend To Three Years And Shall Also Be Liable To Fine Which May Extend To Rupees One
Lac.”
INGREDIENTS –
That the ingredients are as follows:-
Fraudulently or dishonestly;
makes use of any electronic form.
INTRODUCTION -
It has been stated under Section 66D that “Whoever, by means of any communication device or
computer resource cheats by personation, shall be punished with imprisonment of either
description for a term which may extend to three years and shall also be liable to fine which may
extend to one lakh rupees.”
INGREDIENTS –
That the ingredients of Section 66D are as follows:-
Personation by any communication device; or
computer resource;
INTRODUCTION –
It has been stated under Section 66E that “Whoever, intentionally or knowingly captures,
publishes or transmits the image of a private area of any person without his or her consent, under
circumstances violating the privacy of that person, shall be punished with imprisonment which
may extend to three years or with fine not exceeding two lac rupees, or with both.”
INGREDIENTS –
The ingredients of this Section are as follows:-
Intentionally or Knowingly;
captures, publishes or transmits the image of a private area of any person;
without consent.
EXPLANATION –
For the purpose of this Section here “transmit” means to electronically send a visual image with
the intent that it be viewed by a person or persons. The word “capture”, with respect to an image,
means to videotape, photograph, film or record by any means. The “private area” means the
naked or undergarment clad genitals, pubic area, buttocks or female breast. The circumstances
violating privacy are as follows:-
he or she could disrobe in privacy, without being concerned that an image of his private area
was being captured; or
any part of his or her private area would not be visible to the public, regardless of whether
that person is in a public or private place.
INTRODUCTION -
It has been stated under Section 66F where the punishment for cyber terrorism has been defined
as:- “
(1) Whoever,
(a) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in
the people or any section of the people by –
(i) denying or cause the denial of access to any person authorized to access computer resource; or
(ii) attempting to penetrate or access a computer resource without authorization or exceeding
authorized access; or
(iii) introducing or causing to introduce any Computer Contaminant. and by means of such
conduct causes or is likely to cause death or injuries to persons or damage to or destruction of
property or disrupts or knowing that it is likely to cause damage or disruption of supplies or
services essential to the life of the community or adversely affect the critical information
infrastructure specified under section 70, or
(b) knowingly or intentionally penetrates or accesses a computer resource without authorisation
or exceeding authorized access, and by means of such conduct obtains access to information,
data or computer database that is restricted for reasons of the security of the State or foreign
relations; or any restricted information, data or computer database, with reasons to believe that
such information, data or computer database so obtained may be used to cause or likely to cause
injury to the interests of the sovereignty and integrity of India, the security of the State, friendly
relations with foreign States, public order, decency or morality, or in relation to contempt of
court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of
individuals or otherwise, commits the offence of cyber terrorism. (2) Whoever commits or
conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to
imprisonment for life’.”
7
Proposed by the National Infrastructure Protection Center, Analysis and Information Sharing Unit, USA.
8
US Federal Bureau of Investigation.
9
Denning, D. (2000), Cyberterrorism,
http://www.cs.georgetown.edu/~denning/infosec/cyberterror-GD.doc).
INTRODUCTION –
It has been stated under Section 67 which provides Punishment for publishing or transmitting
obscene material in electronic form:- “Whoever publishes or transmits or causes to be published
in the electronic form, any material which is lascivious or appeals to the prurient interest or if its
effect is such as to tend to deprave and corrupt persons who are likely, having regard to all
relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be
punished on first conviction with imprisonment of either description for a term which may
extend to two three years and with fine which may extend to five lakh rupees and in the event of
a second or subsequent conviction with imprisonment of either description for a term which may
extend to five years and also with fine which may extend to ten lakh rupees.”
INGREDIENTS –
The ingredients of the Section are as follows:-
Publishes or transmits or causes to be published;
in electronic form;
material which is lascivious or appeals to the prurient interest.
OBSCENITY –
In Aveek Sarkar v. State of West Bengal10, the Supreme Court has held that a photograph of Boris
Becker and his fiancee, in the nude, is not “obscene” within the meaning of S. 292 of the Indian
Penal Code. This judgment is particularly significant because it expressly rejects the Hicklin
Test, the archaic 1868 rule for determining obscenity, that the Court has regularly used in its
history – most notably, to uphold the ban on Lady Chatterly’s Lover in Ranjit Udeshi’s
Case. Interestingly, by citing a number of countries where Lady Chatterly’s Lover was not found
obscene, the Court seems – at least implicitly – to be expressing its disapproval of Udeshi,
10
Aveek Sarkar v. State of West Bengal, (2014) 4 SCC 257.
INTRODUCTION –
It has been stated under Section 67A the Punishment for publishing or transmitting of material
containing sexually explicit act, etc. in electronic form – “Whoever publishes or transmits or
causes to be published or transmitted in the electronic form any material which contains sexually
explicit act or conduct shall be punished on first conviction with imprisonment of either
description for a term which may extend to five years and with fine which may extend to ten lac
rupees and in the event of second or subsequent conviction with imprisonment of either
description for a term which may extend to seven years and also with fine which may extend to
ten lac rupees.”
Whereas the Exception provided as follows this section and section 67 does not extend to
any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic
form- (i) the publication of which is proved to be justified as being for the public good on the
ground that such book, pamphlet, paper, writing, drawing, painting, representation or figure is in
the interest of science, literature, art,or learning or other objects of general concern; or (ii) which
is kept or used bona fide for religious purposes.
INGREDIENTS –
The ingredients of Section 67A are as follows:-
Publishes or Transmits;
Causes to be published or transmitted in electronic form;
Any sexually explicit act or conduct.
INTRODUCTION –
It has been stated under Section 67B the Punishment for publishing or transmitting of material
depicting children in sexually explicit act, etc. in electronic form. Whoever,
(a) publishes or transmits or causes to be published or transmitted material in any electronic form
which depicts children engaged in sexually explicit act or conduct or,
(b) creates text or digital images, collects, seeks, browses, downloads, advertises, promotes,
exchanges or distributes material in any electronic form depicting children in obscene or
indecent or sexually explicit manner or,
(c) cultivates, entices or induces children to online relationship with one or more children for and
on sexually explicit act or in a manner that may offend a reasonable adult on the computer
resource or ,
(d) facilitates abusing children online or,
(e) records in any electronic form own abuse or that of others pertaining to sexually explicit act
with children, shall be punished on first conviction with imprisonment of either description for a
term which may extend to five years and with a fine which may extend to ten lac rupees and in
the event of second or subsequent conviction with imprisonment of either description for a term
which may extend to seven years and also with fine which may extend to ten lac rupees:
Provided that the provisions of section 67, section 67A and this section does not extend to any
book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form-
(i) The publication of which is proved to be justified as being for the public good on the ground
that such book, pamphlet, paper writing, drawing, painting, representation or figure is in the
interest of science, literature, art or learning or other objects of general concern; or
(ii) which is kept or used for bonafide heritage or religious purposes Explanation: For the
purposes of this section, "children" means a person who has not completed the age of 18 years.
INTRODUCTION –
It has been stated under Section 67C for Preservation and Retention of information by
intermediaries “(1) Intermediary shall preserve and retain such information as may be specified
for such duration and in such manner and format as the Central Government may prescribe. (2)
Any intermediary who intentionally or knowingly contravenes the provisions of sub section (1)
shall be punished with an imprisonment for a term which may extend to three years and shall
also be liable to fine”.
INGREDIENTS –
The ingredient of Section 67C stated that any intermediary who intentionally or knowingly
contravenes the provisions
Sharma, Vakul, Handbook of Cyberlaws, Universal Law Publication, Reprint Edtion, 2010.
Sharma, Vakul, Information Technology: Law and Practice, Universal Law Publishers, 2nd
edition, 2007.
Verma, Dr Amita, Cyber Crimes and Law, Central Law Publishers, Allahabad, 2009.