The Information Technology Act, 2000 (Complete Notes) By Dabangg Lawyer

Introduction to Cyber Crimes - Relevant provisions under The Information Technology Act, 2000

1. Object and Application under the Act

The Information Technology Act, 2000 (IT Act) is an important piece of legislation in India that addresses various aspects of the digital and cyber domain, including cybercrimes. It was enacted to provide legal recognition to electronic transactions and to facilitate e-governance while also addressing concerns related to cybercrimes and data security.

1) Object of the Act:

The primary objective of the Information Technology Act, 2000, is to create a legal framework for electronic transactions and communications, ensuring their validity and security. It aims to:

      (1) Facilitate E-commerce: The Act promotes e-commerce and electronic transactions by giving them legal recognition.
(2) Data Protection: It addresses issues related to data protection, privacy, and security in the digital space.
(3) Cybercrimes: It defines and penalizes various cybercrimes, providing a legal basis for prosecution.
(4) Electronic Governance: supports e-governance initiatives and provides a framework for electronic record-keeping.

2) Application of the Act:

The IT Act applies to the whole of India and to any offense or contravention committed outside India by any person. It extends to:

      (1) Persons: The Act applies to individuals, government entities, and businesses engaging in electronic transactions.
(2) Electronic Records: It covers electronic records, digital signatures, and other electronic data.
(3) Digital Signatures: The Act recognizes digital signatures and their legal validity.


2. Salient Features of the Act

The Information Technology Act, 2000, is a comprehensive legislation in India that addresses various aspects of electronic transactions, data protection, and cybercrimes. Here are some of the salient features of the Act:

      (1)      Extra-territorial Jurisdiction: The Act's jurisdiction extends beyond national boundaries, allowing regulation of activities that may occur outside the country.
(2)    Definition of Terms: Defines various crucial terms like cyber cafes, digital signatures, electronic records, etc., under Section 2(1) for clarity and legal understanding.
(3)    Validation of Electronic Contracts: Declares contracts made through electronic means as legally valid and protected (Section 10A).
(4)    Legal Recognition of Electronic Transactions: The Act provides legal recognition to electronic records and digital signatures, making them equivalent to physical documents and handwritten signatures in most cases.
(5)    Recognition of Digital Signatures: Recognizes and establishes methods for authentication of digital signatures.
(6)    Appointment of Controller and Powers: Contains provisions for the appointment of a Controller and delineates their powers.
(7)    Recognition of Foreign Certifying Authorities: Acknowledges foreign certifying authorities (Section 19).
(8)    Penalties for System Damage: Outlines penalties for damages to computer systems caused by individuals other than the system's owner.
(9) Establishment of Appellate Tribunal: Provides for the establishment of an Appellate Tribunal to handle appeals from decisions made by the Controller or Adjudicating officers. Appeals from the tribunal can further be escalated to the High Court.
(10) Offences and Penalties: Defines various offences related to data and specifies the punishments for these offences.
(11) Intermediaries' Liability Exemption: Specifies circumstances where intermediaries are not held liable, even if data privacy is breached.
(12) Cyber Regulation Advisory Committee: Establishes a committee to advise the Central Government on matters related to e-commerce or digital signatures.


3. Offences, Punishment and Procedure of Investigation and Trial (Chapter XI - Sections 65 to 78)

Section

Offense Description

Punishment

65

Tampering with computer source documents

Imprisonment up to 3 years, or fine up to 2 lakh rupees, or both

66

Computer-related offenses or any act mentioned in Section 43.  

Imprisonment up to 3 years, or fine up to 5 lakh rupees, or both

66A

Sending offensive messages through communication service

Imprisonment up to 3 years and fine

66B

Dishonestly receiving stolen computer resource or device

Imprisonment up to 3 years, or fine up to 1 lakh rupees, or both

66C

Identity theft

Imprisonment up to 3 years and fine up to 1 lakh rupees

66D

Cheating by personation by using computer resource

Imprisonment up to 3 years and fine up to 1 lakh rupees

66E

Violation of privacy

Imprisonment, up to 3 years, or fine up to 2 lakh rupees, or both

66F

Cyberterrorism

Imprisonment, including imprisonment for life

67

Publishing or transmitting obscene material

Imprisonment up to 5 years, and/or fine up to 10 lakh rupees

67A

Publishing or transmitting sexually explicit material

Imprisonment up to 7 years, and/or fine up to 10 lakh rupees

67B

Publishing material depicting children in explicit acts

Imprisonment up to 7 years, and/or fine up to 10 lakh rupees

67C

Preservation and retention of information by intermediaries

Imprisonment up to 3 years and fine


4. Procedure of Investigation and Trial (Chapter XI) under the Information Technology Act, 2000

The Information Technology Act, 2000 delineates a structured framework for the investigation and trial of cyber-related offences in Chapter XI. Here is a breakdown of the key components involved in this process:

1) Investigation Procedure:

      (1)    Search and Seizure: Authorized police officers, not below the rank of an Inspector, possess the authority to conduct searches and seize computers, devices, or data believed to be associated with cyber offences.
(2)    Power to Issue Directions for Interception or Monitoring or Decryption of Information: Government authorities are empowered to issue directives for monitoring, intercepting, or decrypting any information through computers if it is deemed essential for national sovereignty or security.
(3)    Appointment of Adjudicating Officer: The Central Government appoints Adjudicating Officers responsible for hearing and deciding penalties for contraventions of rules or regulations established under the Act.
(4)    Forensic Lab: Provision for the establishment of forensic labs by the government to analyze and process digital evidence crucial for investigations.
(5)    Request for Information: Law enforcement officials or authorized officers hold the authority to request any person to provide information or extend assistance during investigations related to cyber offences.

2) Trial Procedure:

Applicability of the Code of Criminal Procedure, 1973 (CrPC) (Section 78): The Code of Criminal Procedure, 1973, is applicable to all offences under the Information Technology Act, unless specifically stated otherwise.

(1)    Court Jurisdiction: Cases under this Act fall within the jurisdiction of Courts not below the rank of a Metropolitan Magistrate or Judicial Magistrate of the First Class.
(2)    Procedure for Trials: Trials for offences committed under this Act are conducted in a manner similar to a summary trial, expediting the legal process.
(3)    Appellate Tribunal: Appeals from orders passed by the Adjudicating Officer are directed to the Cyber Appellate Tribunal, established under this Act, ensuring a channel for higher-level review and resolution.
(4)    Burden of Proof: The burden of proof, whether proving innocence or guilt, rests with the accused or the individual challenging the order issued by the Adjudicating Officer.

5. Exemption from Liability of Intermediary in Certain Cases (Section 79)

Regardless of other existing laws, intermediaries are not held liable for third-party information, data, or communication links hosted or made available by them.

(1) Conditions for Exemption: The exemption applies if:

(a)   The intermediary's role is limited to providing access to a communication system where third-party information is transmitted or temporarily stored.

(b)  The intermediary does not initiate the transmission, choose the recipient, or modify the transmitted information.

(c)   The intermediary conducts its duties diligently and adheres to guidelines set by the Central Government.

(2) Exceptions to Exemption: The exemption does not apply if:

(a)        The intermediary has actively conspired, aided, abetted, or induced an unlawful act.

(b)       After being informed by the appropriate Government or its agency about the use of their resources for unlawful activities, the intermediary fails to promptly remove or disable access to such materials without tampering with evidence.

Explanation: "Third-party information" in this context refers to any information handled by an intermediary in their capacity as an intermediary.

Post a Comment

0 Comments