SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Section 43 Damage to Computer, Computer system etc. 
Dealing with compensation for failure to protect data was introduced in the 
ITI -2008. This is another watershed in the area of data protection especially at the 
corporate level. As per this Section, where a body corporate is negligent in 
implementing reasonable security practices and thereby causes wrongful loss or 
gain to any person, such body corporate shall be liable to pay damages by way of 
compensation to the person so affected. As per the Section it further explains the 
phrase body corporate’ and quite significantly the phrases ‘reasonable security 
practices and procedures’ and sensitive personal data or information’. 
Punishment 
The punishment would be compensation to the tune of Rs.1 crore to the affected 
person. 
Case study 
Data theft makes IT firm quit India 
Published on Fri, Oct 13, 2006 at 11:48, 
New Delhi: After registering a case against an employee who had allegedly stolen 
data, the Gurgaon based IT firm Acme Telepower Management waited for 
something to happen. Weeks later they have decided to stop operating out of India 
and move to Australia. It seems like this is the beginning of a domino effect, even 
as India's antiquated police force tries to deal with new age crime like data theft. 
Acme Telepower is claiming a national loss of Rs 750 crore. They are saying it's 
all because an ex-employee named Sachidanand Patnaik who allegedly stole 
research and handed it over to his new employer – a competitor in the power 
industry solutions space. On Thursday, the board of Acme met after a Gurgaon 
Sessions court granted bail to Patnaik and decided it was time to pack their bags. 
"We are disappointed in the system. Patents and research are not protected, so we 
are not sure if the law will be able to protect us,” GM Marketing, Acme, Sandeep 
Kashyap said. Acme employs around 1,100 people, who will be affected by the 
firm’s move to Australia that will happen over the next eight months. Most of the 
70 people in the Research and Development section will be the first to move.
For the rest, the future is unclear. According to Acme, only a small manufacturing 
operation will remain in India, but they say they will take care of their employees 
and that their reason for leaving is simple. "The fact that the main accused has got 
bail and the others got a clean chit has disappointed us completely,” Kashyap said. 
However, the lawyer for Sachidanand Patnaik says they are giving up too soon and 
that this trend could have dangerous repercussions. "If the reason they are leaving 
India is because the main accused has got bail, then it is contempt of court,” 
Patnaik's lawyer, Vakul Sharma said. When people lost faith in the system in the 
past, there was little they could, outside of rallying against everything wrong with 
the world. However, today people have a choice. They can simply move on. But 
the question remains - will the system respond? 
Section 65 - Tampering with Computer Source Documents 
Tampering with computer Source Documents: A person who knowingly or 
intentionally, conceal (hides or keeps secret), destroys (demolishes or reduces), 
alters (change in characteristics) or causes another to conceal, destroy, and alter 
any computer source code used for a computer, computer program, computer 
system or computer network, when the computer source code is required to be kept 
or maintained by law is punishable. For instance, hiding the C.D.ROM in which 
the source code files are stored, making a C File into a CPP File or removing the 
read only attributes of a file. 
Punishment 
The punishment would be imprisonment up to three years, or with fine which may 
extend up to two lakh rupees, or with both.
Case study: 
Syed Asifuddin Ors Vs The State of Andhra Pradesh 
In this case, Tata Indicom employees were arrested for manipulation of the 
electronic 32- bit number (ESN) programmed into cell phones theft were 
exclusively franchised to Reliance Infocomm. 
Summary of the case 
Tata Indicom employees were arrested for manipulation of the electronic 32-bit 
number (ESN) programmed into cell phones that were exclusively franchised to 
Reliance Infocomm. The court held that such manipulation amounted to tampering 
with computer source code as envisaged by section 65 of the Information 
Technology Act, 2000. 
Background of the case: 
Reliance Infocomm launched a scheme under which a cell phone subscriber was 
given a digital handset worth Rs. 10,500 as well as service bundle for 3 years with 
an initial payment of Rs. 3350 and monthly outflow of Rs. 600. The subscriber was 
also provided a 1 year warranty and 3 year insurance on the handset. 
The condition was that the handset was technologically locked so that it would 
only work with the Reliance Infocomm services. If the customer wanted to leave 
Reliance services, he would have to pay some charges including the true price of 
the handset. Since the handset was of a high quality, the market response to the 
scheme was phenomenal. 
Unidentified persons contacted Reliance customers with an offer to change to a 
lower priced Tata Indicom scheme. As part of the deal, their phone would be 
technologically “unlocked” so that the exclusive Reliance handsets could be used 
for the Tata Indicom service. 
Reliance officials came to know about this “unlocking” by Tata employees and 
lodged a First Information Report (FIR) under various provisions of the Indian 
Penal Code, Information Technology Act and the Copyright Act. 
The police then raided some offices of Tata Indicom in Andhra Pradesh and 
arrested a few Tata Teleservices Limited officials for re-programming the Reliance 
handsets.
These arrested persons approached the High Court requesting the court to quash 
the FIR on the grounds that their acts did not violate the said legal provisions. 
Section 66 Hacking 
Hacking is usually understood to be the unauthorized access of a computer system and 
network. Originally, the term “hacker” describes any amateur computer programmer 
who discovered ways to make software run more efficiently. Hackers usually “hack” on 
a problem until they find a solution, and keep trying to make their equipment work in 
new and more efficient ways. A hacker can be a Code Hacker, Cracker or a Cyber 
Punk. Whoever with the intent to cause or knowing that he is likely to cause wrongful 
loss or damage to the public or any person destroys or deletes or alters any information 
residing in a computer resource or diminishes its value or utility or affects it injuriously 
by means is said to commit hacking. 
Punishment 
The Punishment would be Imprisonment up to three years, or with fine which may 
extend up to two lakh, or with both 
Case study 
Kumar v/s Whiteley 
In this case the accused gained unauthorized access to the Joint Academic Network 
(JANET) and deleted, added files and changed the passwords to deny access to the 
authorized users. 
Investigations had revealed that Kumar was logging on to the BSNL broadband 
Internet connection as if he was the authorized genuine user and ‘made alteration in 
the computer database pertaining to broadband Internet user accounts’ of the 
subscribers. 
The CBI had registered a cyber crime case against Kumar and carried out 
investigations on the basis of a complaint by the Press Information Bureau, Chennai, 
which detected the unauthorized use of broadband Internet. The complaint also stated 
that the subscribers had incurred a loss of Rs 38,248 due to Kumar’s wrongful act. He 
used to ‘hack’ sites from Bangalore, Chennai and other cities too, they said. 
Punishment 
The punishment would be imprisonment up to three years,
Section 66A - Punishment for sending offensive messages through 
communication service 
Any person who sends, by means of a computer resource or a communication device, - 
any information that is grossly offensive or has menacing character; or 
18 any information which he knows to be false, but for the purpose of causing 
annoyance inconvenience, danger, obstruction, insult, injury, criminal intimidation, 
enmity, hatred, or ill will, persistently makes by making use of such computer 
resource or a communication device, any electronic mail or electronic mail message 
for the purpose of causing annoyance or inconvenience or to deceive or to mislead the 
addressee or recipient about the origin of such messages. 
Punishment 
The punishment would be imprisonment for a term which may extend to three 
years and with fine. 
Case study: First juvenile accused in a cyber crime case. 
In April 2001 a person from New Delhi complained to the crime branch regarding 
the website. Amazing.com, he claimed, carried vulgar remarks about his daughter 
and a few of her classmates. During the inquiry, print-outs of the site were taken 
and proceedings initiated. After investigation a student of Class 11 and classmate 
of the girl were arrested. The juvenile board in Nov 2003 refused to discharge the 
boy accused of creating a website with vulgar remarks about his classmate. The 
accuser’s advocate had sought that his client be discharged on the ground that he 
was not in a stable state of mind. Seeking discharge, the advocate further said that 
the trial has been pending for about two years. While rejecting the accuser’s 
application, metropolitan magistrate Santosh Snehi Mann said: ‘The mental 
condition under which the juvenile came into conflict with the law shall be taken 
into consideration during the final order.’ Mann, however, dropped the sections of 
Indecent Representation of Women Prohibition) Act. The accused would face trial 
under the Information Technology Act and (for intending to outrage the modesty 
of a woman. She held the inquiry could not be closed on technical ground, 
especially when the allegations were not denied by the accuse
Section 66 B: Punishment for dishonestly receiving stolen computer resource 
or communication device 
Whoever dishonestly receives or retains any stolen computer resource or 
communication device knowing or having reason to believe the same to be stolen 
computer resource or communication device. 
Punishment 
The punishment would be imprisonment of either description for a term which 
may extend to three years or with fine which may extend to rupees one lakh or 
with both. 
Section 66C: identity theft 
Whoever, fraudulently or dishonestly make use of the electronic signature, 
password or any other unique identification feature of any other person. 
Punishment 
The punishment would be imprisonment of either description for a term which 
may extend to three years and shall also be liable to fine which may extend to 
rupees one lakh. 
Case study: Online fraudulent share & commodity transactions 
Now a day the shares are sold and purchased online. There has been spurt in the 
cases in which the complainant report that there online share/commodity account 
has been compromised and fraudulent transactions has been executed by unknown 
fraudster which resulted in huge loss to him. In the online transaction, the client is 
allotted an online account with client id & password through which he executes the 
sale & purchase transactions through the server based in the broker office. The 
fraudster who are generally software experts or the executives (core dealers) at the 
broker office try to acquire the client id & password from the broker office itself, 
hit & trial methods or social engineering. After acquiring the client Id & password, 
the fraudster makes unauthorized access to the client account and also accesses 
their own account in which the profits are to be transferred from the victim client 
account. The fraudster executes the transactions into the client accounts at 
unrealistic prices and match these transactions into their own account 
simultaneously. In this way, he shifts the profit to his own account and losses to the 
account of the unsuspecting clients.
Section 66 D: Punishment for cheating by Impersonation by using computer 
resource 
By means of any communication device or computer resource cheats by 
Impersonation. 
Punishment 
Imprisonment of either description for a term which may extend to three years and 
shall also be liable to fine which may extend to one lakh rupees. 
Case study 
Email spoofing 
Recently, a branch of the Global Trust Bank experienced a run on the bank. 
Numerous customers decided to withdraw all their money and close their accounts. 
It was revealed that someone had sent out spoofed emails to many of the banks 
customers stating that the bank was in very bad shape financially and could close 
operations at any time. Unfortunately this information proved to be true in the next 
few days. But the best example of the email spoofing can be given by the Gujarat 
Ambuja Executive’s case. Where he pretended to be a girl and cheated the Abu 
Dhabi based NRI for crores by blackmailing tactics. 
Section 66E: Punishment for violation of privacy. 
Whoever, intentionally or knowingly captures, publishes or transmits the image of 
a private area of any person without his or her consent, under circumstances 
violating the privacy of that person. 
Punishment 
Imprisonment which may extend to three years or with fine not exceeding two lakh 
rupees, or with both.
Case Study 
Nagpur Congress leader’s son MMS scandal 
On January 05, 2012 Nagpur Police arrested two engineering students, one of them 
a son of a Congress leader, for harassing a 16-year-old girl by circulating an MMS 
clip of their sexual acts. According to the Nagpur (rural) police, the girl was in a 
relationship with Mithilesh Gajbhiye, 19, son of Yashodha Dhanraj Gajbhiye, a 
zilla parishad member and an influential Congress leader of Saoner region in 
Nagpur district. 
Section 66F: Punishment for cyber terrorism 
Whoever, with intent to threaten the unity, integrity, security or sovereignty of 
India or to strike 
terror in the people or any section of the people by denying or cause the denial of 
access to any person authorized to access computer resource attempting to 
penetrate or access a computer resource without authorization or exceeding 
authorized access introducing or causing to introduce any Computer Contaminant. 
Punishment 
The punishment would be imprisonment which may extend to imprisonment for 
life. 
Case study 
The Mumbai police have registered a case of ‘cyber terrorism’—the first in the 
state since an amendment to the Information Technology Act—where a threat 
email was sent to the BSE and NSE on Monday. The MRA Marg police and the 
Cyber Crime Investigation Cell are jointly probing the case. The suspect has been 
detained in this case. 
The police said an email challenging the security agencies to prevent a terror attack 
was sent by one Shahab Md with an ID sh.itaiyeb125@yahoo.in to BSE’s 
administrative email ID corp.relations@bseindia.com at around 10.44 am on 
Monday. 
The IP address of the sender has been traced to Patna in Bihar. The ISP is Sify. The 
email ID was created just four minutes before the email was sent. “The sender had, 
while creating the new ID, given two mobile numbers in the personal details
column. Both the numbers belong to a photo frame-maker in Patna,’’ said an 
officer. 
Section 67: Punishment for publishing or transmitting obscene material in 
electronic form 
Whoever publishes or transmits or causes to be published in the electronic form, 
any material which is lascivious or appeals to the prurient interest or if its effect is 
such as to tend to deprave and corrupt persons who are likely, having regard to all 
relevant circumstances, to read, see or hear the matter contained or embodied. 
Punishment 
Imprisonment upto 5 years and with fine which may extend to one lakh rupees on 
first conviction and its double punishment for second and subsequent convictions. 
Case study: State of Tamil Nadu v/s. Suhas Kutti, 2004 
Assistant Commissioner of Police, Cyber Crime Cell, C.C.B.Egmore, Chennai.8 has filed Final 
Report against the accused, that on 7.2.04, evening at Cyber Café Hello World Centre, Sion, Mumbai 
having an I.P.61.11.10.99, the accused with intention of harming the reputation of the Complainant 
Ms. R, created user id in the name of her and composed an obscene message intending that such 
document shall be used for posting in different obscene Yahoo Group, with the intention to make 
others to believe that the document was made by her, so that the persons seeing the obscene message 
would send offending calls to her,in harming her reputation and by insulting her modesty by the 
words exhibited in the email and in the course of same transaction, on 7.2.04, evening at Cyber Café 
Hello World Centre, Sion, Mumbai, having an IP 61.11.10.99 the Accused posted obscene message 
which are lascivious and also have the effect to corrupt persons who are likely to read and see such 
obscene messages and caused to the published in different obscene Yahoo goups and in the course of 
same transaction, that on 9.2.04, morning, at Cyber Café Heighten Advertising, Mahim, Mumbai, 
having an IP 202.88.165.53 the accused with intention of harming the reputation of the complainant 
Ms. R entered user id. which was created by him in the name of the complainant and composed an 
obscene message intending that such document shall be used for posting in different obscene Yahoo 
groups, with the intention to make others to believe that the document was made by her, so that the 
persons seeing the obscene message would send offending calls to her, in harming her reputation and 
by insulting her modesty by the words exhibited in the email and that in the course of same 
transaction, that on 9.2.04, morning at cyber café Heighten Advertising, Mahim, Mumbai, having an 
IP 202.88.165.53, the accused posted obscene messages which are lascivious and also have the effect 
to corrupt person who are likely to read and see such obscene messages and caused to be published in 
different obscene Yahoo goups and thereby the accused have committed offences u/s 469 IPC, 67 I.T 
Act. 469 &509 IPC, and 67 of I.T. Act.
P.W. 1 is the only daughter of P.W.2 and P.W.3.P.W.2 is the father, P.W.3 is the mother. 
Presently, P.W.1 is working as a senior Executive (H.R.) in a multinational Company at Chennai. 
She studied her MBA Course in Mumbai in the year 1997, the accused studied with P.W.1 and she 
was his classmate is Mumbai. Accused belongs to Mumbai. On 9.2.04, She opened her Rediff e-mail 
and noticed the receipt of two obscene messages which were posted on 7.2.04 and 9.2.04. She took 
computer output of the obscene message posted on 7.2.04, Ex P.1 is the obscene message. The 
obscene message carried her Office phone numbers and her e-mail I.D. The house Phone number 
was wrongly given. The said obscene messages have been sent through Yahoo website to 5 sex 
groups. The computer printout obscene message posted in @ Radha lovers group is EX.P.2. On 
seeing the said messages, several persons sent the responsive message and many persons tried to 
contact her over phone. Ex P3 series is the responsive messages. Several Phone calls came to her 
office. P.W.1 informed the said matter to her parents. The messages were likely to harm the 
reputation and morale of P.W.1. 
P.W. 1 had married Jaichand Prajapathi of Uttar Pradesh in the year 2001. The family life was not 
happy and she obtained divorce through court in the year 2003. The Accused was citied as witness in 
the divorce petition. P.W.1 recollected one incident and suspected in the involvement of the Accused. 
During college days in the year 1997, the accused used to travel with P.W.1 in train at Mumbai. On 
one such occasion, Accused pointed out an obscene scribbling with phone number in the train and 
told P.W.1 that on seeing the phone number, many persons would try to contact the phone number 
and this is the best way to spoil the reputation of a woman. The Accused even expressed his desire to 
marry P.W.1, after the engagement of P.W.1 with Jaichand Prajapati was over. P.W.1 turned down 
his proposal. In the year 2003, the Accused stayed in the house of the P.W.1 for about 10 days stating 
that he has to attend an interview at Banglalore. At that time also, Accused offered to marry P.W.1 
for which P.W.1 and her parents refused the alliance. Thereafter, P.W.1 after his return to Mumbai 
was in the habit of making Phone calls, sending S.M.S. Messages and sending E-mail to P.W.1 
frequently. Hence P.W.1 blocked the e-mail I.D. of the Accused. Ex.P5 is the Computer output for 
blocking the e-mail I.D. of the Accused. 
On seeing the obscene message, P.W.1 discussed the matter with P.W.2 and P.W.3 and sought 
the help of the Accused over phone. P.W.1 and her parents issued a warning message in the name of 
PW 2 and PW 3 by creating an email ID viz, parant2003@yahoo.co.in and transmitted same to the 
yahoo groups. She sent warning messages to the persons, who sent responsive message in ExP.6 
series. A copy of warning message was also sent to the Accused. 
P.W.1 lodged a complaint on 14/2/2004 along with Ex.P1 at Cyber Crime Police. The complaint 
is Ex. P.4 P.W.12 who received the complaint directed P.W.4 to obtain header details and other 
particulars to find out the origination of the messages. P.W.4 went to Cyber Café at Kennath Lane, 
Egmore along with P.W. 1 she down loaded the message took print out by using the e-mail I.D. 
Parant2003@Yahoo.Co.in Ex.P.9-Ex.P.12. She extracted and stored the messages in Mo.2 floppies. 
Thereafter P.W.12 gave a requisition to the Hathway Cable and Data Com. Pvt. Ltd; under Ex.P.13, 
for which it gave a reply in Ex. P.14. P.W.12 also gave a requisition to Dishnet D.S.L. in Ex.P.13 and 
the reply given by Dishnet D.S.L is Ex.P.15. P.W.5 speaks about Ex.P.13 and Ex.P.14. P.W.6 speaks 
about Ex.P.15.P.W.12 also examined P.W.11 and obtained particulars in Ex. P.29 series and
confirmed that the messages were originated from Mumbai. P.W.12- Investigation Officer registered 
F.I.R. Ex.P.34 on 20.2.04. 
Thereafter, P.W.12 proceeded to Mumbai on 24.2.04, and arrested the Accused at Mumbai on 
25.2.04. He seized Mo.1 Cell Phone from the Accused under Mahazar Ex.P.8 P.W.8 and P.W.9 who 
are running browsing Centre at Mumbai, identified the Accused in the presence of P.W.12. He seized 
Ex.P.23, 24 registers from them. P.W.8 speaks about the Accused and the seizure of Ex.P.22 and the 
remarks made by P.W.12 in Ex.P.23, P.W. 9 speaks about the Accused that he came to the browsing 
centre and signed in the Register Ex.P24 as R. Ex.P.25 is the word written by the Accused. 
P. W. 12, brought the Accused to Chennai on 28.2.04, after producing the Accused before a Mumbai 
Court. The Accused gave a confession statement in the presence of P.W. 10 and he gave the 
password “an rose”. The said word is Ex.P.27. 
The particulars stored in the SIM Card were taken print out in Ex.P. 28 series through S.M.S. 
Reader. P.W.12 went to the office of P.W.7 and took computer print out by using the password “an 
rose”. He issued the certificate in Ex.P.21. The computer print outs are Ex. P 16-P.20. P.W.12 
completed investigation and laid charge sheet against the Accused of offences u/s 67 of I T Act and 
u/s 469,509 of IPC. 
Final Order 
…this court is not inclined to accept the theory projected by the Accused that the obscene 
messages would have been created by P.W.1, P.W.2 and P.W.3 or by Jaichand Prajapathi. It is clear 
that the Accused himself has composed and posted the obscene messages from the browsing centre 
of P.W.8 and P.W.9. This Court holds that the prosecution has proved its charges against the accused 
beyond all reasonable doubt and hence the Accused is liable to be punished. 
The Accused was heard regarding the question of sentence u/s 248 (2) Cr.P.C. The Accused pleaded 
for admonition. The Accused is not a lay man. He is educated and studied upto M.B.A. P.W.1 is 
holding a responsible post in a multinational Company at Chennai. The Accused has chosen to post 
the obscene message for the simple reason that she refused to marry him. He did not behave like an 
educated man. Only a family woman can realise the mental sufferings and pain if unknown persons 
contacted her through phone and e-mail and invited her to bed. The mental sufferings and 
humiliation undergone by the P.W.1 cannot be compensated in terms of money or by solacial words. 
It cannot be stated that the Accused had acted in a heat of passion. Two days repeatedly he had sent 
the obscene message—Computer system and browsing centre are meant for learning things and 
updating knowledge in various fields. The Accused has misused the same to take revenge on a 
sophisticated lady. Therefore, the Accused does not deserve leniency and is liable to be punished. 
In the result, the Accused is found guilty of offences u/s 469,509 IPC, and u/s 67 of I.T. Act. and the 
Accused is convicted and is sentenced to undergo Rigorous imprisonment for 2 years u/s 469 IPC, 
and to pay a fine Rs.500/- i/d, to undergo simple imprisonment for 1 month and for the offence u/s 
509 IPC, sentenced to undergo 1 year simple Imprisonment and to pay a fine of Rs.500/- i/d to 
undergo simple imprisonment for 1 month and for the offence u/s 67 of Information Technology Act 
2000 to undergo Rigorous Imprisonment for 2 years and to pay a fine of Rs.4,000/- i/d to undergo
S.I. for 6 months. All sentences to run concurrently. The period undergone by the Accused will be set 
off u/s 428 Cr.P.C. 
Section 67 A: Punishment for publishing or transmitting of material 
Containing sexually explicit acts in electronic form 
Whoever publishes or transmits or causes to be published or transmitted in the 
electronic form any material which contains sexually explicit act or conduct shall 
be punished on first conviction with imprisonment of either description for a term 
which may extend to five years with fine which may extend to ten lakh rupees and 
in the event of second or subsequent and conviction with imprisonment of either 
description for a term which may extend to seven years and also with fine which 
may extend to ten lakh rupees 
Section 67 B: Punishment for publishing or transmitting of material 
depicting children in sexually explicit act, etc. in electronic form. 
Whoever publishes or transmits or causes to be published or transmitted material in 
any electronic form which depicts children engaged in sexually explicit act or 
conduct or creates text or digital images, collects, seeks, browses, downloads, 
advertises, promotes, exchanges or distributes material in any electronic form 
depicting children in obscene or indecent or sexually explicit manner 
Punishment 
Imprisonment up to five years and with fine which may extend to ten lakh rupees 
and in the event of second or subsequent conviction with imprisonment of seven 
years and also with fine which may extend to ten lakh rupees. 
Case study 
Janhit Manch & Ors. v. The Union of India 10.03.2010 Public Interest Litigation: 
The petition sought a blanket ban on pornographic websites. The NGO had argued 
that websites displaying sexually explicit content had an adverse influence, leading 
youth on a delinquent path.
Section 69 - Powers to issue directions for interception or monitoring or 
decryption of any information through any computer resource 
Punishment 
The punishment would be imprisonment which may extend to seven years. 
Case study 
In August 2007, Lakshmana Kailash K., a techie from Bangalore was arrested on 
the suspicion of having posted insulting images of Chhatrapati Shivaji, a major 
historical figure in the state of Maharashtra, on the social-networking site Orkut. 
The police identified him based on IP address details obtained from Google and 
Airtel -Lakshmana’s ISP. He was brought to Pune and detained for 50 days before 
it was discovered that the IP address provided by Airtel was erroneous. The 
mistake was evidently due to the fact that while requesting information from 
Airtel, the police had not properly specified whether the suspect had posted the 
content at 1:15 p.m. 
Section 70: Securing or attempting to secure access to a protected system. 
Punishment: 
The punishment would be imprisonment which may extend to 10 years and fine. 
Case study: 
The Government of Kerala issued a notification u/s 70 of the Information 
Technology Act declaring the FRIENDS application software as a protected 
system.The author of the application software filed a petition in the High Court 
against the said notification. He also challenged the constitutional validity of 
section 70 of the IT Act.The Court upheld the validity of both, section 70 of the IT 
Act, as well as the notification issued by the Kerala Government. 
Conclusions of the court given on 24.05.2006 
There is no conflict between the provisions of Copyright Act and Section 70 of IT 
Act. Section 70 of the IT Act is not unconstitutional. While interpreting section 70 
of the IT Act, a harmonious construction with Copyright Act is needed. Section 70 
of the IT Act is not against but subject to the provisions of the Copyright Act.
Government cannot unilaterally declare any system as "protected" other than 
"Government work" falling under section 2(k) of the Copyright Act on which 
Govt.'s copyright is recognized under Section 17(d) of the said Act. 
Section 71: For misrepresentation or suppression of any material fact from 
the Controller or the Certifying Authority. 
Whoever makes any misrepresentation to, or suppresses any material fact from, the 
Controller or the Certifying Authority for obtaining any license or Electronic 
Signature Certificate, 
Punishment 
The punishment would be imprisonment up to 2 years, or fine up to rupees one 
lakh or with both. 
Case study: 
(NMIMS) along with the Mumbai Police has unearthed a racket that used unethical 
practices to secure admission for MBA courses in prestigious management 
institutes of the country. 
NMIMS had lodged a complaint with Joint Commissioner of Police, Mumbai 
regarding impersonation cases observed during NMIMS Management Aptitude 
Test (NMAT) 2013. This is a national level MBA entrance test and was conducted 
from October 11, 2012 to December 19, 2012. 
Post the test, during the admission process, the admission department discovered 
discrepancy between the photograph taken at the time of writing the NMAT and 
the photographs on the Personal Interview application form of a few students. 
After they checked into the details, it was found that about 87 candidates in the 
final merit list had committed forgery in securing admission. “Our research also 
showed that there are at least 6 individuals who have impersonated for as many as 
87 or more students across the country. Most of these students are with high scores 
of 220 and above,” said NMIMS in a statement. The NMIMS statement further 
said that all admissions to the institute are merit based.
A press note from the Mumbai Police revealed that the accused had promised one 
student of securing him passing marks in NMAT Exam through Management 
Quota and quoted Rs 15 lakhs for the same. 
Thereafter the accused person took Rs 7.5 lakhs as advance and told the student not 
to appear for the written examination and that they would manage from inside. The 
police said that the accused person employed ‘dummy’ for the student who gave 
the exam by impersonating the candidate. 
Later, the accused person informed the student that he has passed NMAT exam 
and has been short listed for Group Discussion and Interview. The arrested accused 
informed the student to pay the remaining Rs. 7.5 lakhs which was paid 
immediately. 
“Preliminary investigation has revealed that such malpractices are also rampant in 
prestigious Institutes based all over India in the field of MBA, Medical, 
Engineering etc. through Education Consultancy firms, Coaching Classes etc. 
which have mushroomed all over India. One such institute i.e. Career Guardian, 
Ghaziabad, U.P. and Meta Consultancy, Delhi are found involved in such 
malpractices,” said Mumbai Police in a press note. 
The police have also found forged & misrepresented documents of Aadhaar Card, 
Pan Card, and Election Card in the name of students for appearing as ‘dummy’.

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Incident response process
Incident response processIncident response process
Incident response process
 
Cyber law
Cyber lawCyber law
Cyber law
 
Case of baazee
Case of baazeeCase of baazee
Case of baazee
 

Andere mochten auch

Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment9945446746
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Data Warehousing Practical for T.Y.I.T.
Data Warehousing Practical for T.Y.I.T.Data Warehousing Practical for T.Y.I.T.
Data Warehousing Practical for T.Y.I.T.Niraj Bharambe
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTESTYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTESWE-IT TUTORIALS
 
Cyber law and ipc codes
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codesRakesh Otari
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crimeParas Kansagara
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
Data warehousing labs maunal
Data warehousing labs maunalData warehousing labs maunal
Data warehousing labs maunalEducation
 

Andere mochten auch (20)

TYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CLTYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CL
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Data Warehousing Practical for T.Y.I.T.
Data Warehousing Practical for T.Y.I.T.Data Warehousing Practical for T.Y.I.T.
Data Warehousing Practical for T.Y.I.T.
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTESTYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
TYBSC IT SEM 6 PROJECT MANAGEMENT NOTES
 
Indian cyber law & acts
Indian cyber law & actsIndian cyber law & acts
Indian cyber law & acts
 
Cyber law and ipc codes
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codes
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Case no 1
Case no 1Case no 1
Case no 1
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber
CyberCyber
Cyber
 
Data warehousing labs maunal
Data warehousing labs maunalData warehousing labs maunal
Data warehousing labs maunal
 

Ähnlich wie Cyber laws with case studies

Ähnlich wie Cyber laws with case studies (20)

Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Rakesh n cyber
Rakesh n cyberRakesh n cyber
Rakesh n cyber
 
Cyber crime in details with sections and clause
Cyber crime in details with sections and clauseCyber crime in details with sections and clause
Cyber crime in details with sections and clause
 
irfhan k cyber law assignment
irfhan k cyber law assignment irfhan k cyber law assignment
irfhan k cyber law assignment
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber law01
Cyber law01Cyber law01
Cyber law01
 
Shilpa
ShilpaShilpa
Shilpa
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Hacking
HackingHacking
Hacking
 
Cyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &casesCyber law sections under itc act 2000 &cases
Cyber law sections under itc act 2000 &cases
 
Cyber law
Cyber lawCyber law
Cyber law
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 

Kürzlich hochgeladen

RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxJFSB1
 
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptxThe Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptxgurcharnsinghlecengl
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideillinoisworknet11
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Labour legislations in India and its history
Labour legislations in India and its historyLabour legislations in India and its history
Labour legislations in India and its historyprasannamurthy6
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Rich Bergeron
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklosbeduinpower135
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Rich Bergeron
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesChesley Lawyer
 
Choosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasChoosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasBrandy Austin
 
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseRich Bergeron
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21vasanthakumarsk17
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsRich Bergeron
 

Kürzlich hochgeladen (20)

RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptx
 
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptxThe Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guide
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Labour legislations in India and its history
Labour legislations in India and its historyLabour legislations in India and its history
Labour legislations in India and its history
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklos
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
 
Choosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasChoosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in Texas
 
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
 

Cyber laws with case studies

  • 1.
  • 2. Section 43 Damage to Computer, Computer system etc. Dealing with compensation for failure to protect data was introduced in the ITI -2008. This is another watershed in the area of data protection especially at the corporate level. As per this Section, where a body corporate is negligent in implementing reasonable security practices and thereby causes wrongful loss or gain to any person, such body corporate shall be liable to pay damages by way of compensation to the person so affected. As per the Section it further explains the phrase body corporate’ and quite significantly the phrases ‘reasonable security practices and procedures’ and sensitive personal data or information’. Punishment The punishment would be compensation to the tune of Rs.1 crore to the affected person. Case study Data theft makes IT firm quit India Published on Fri, Oct 13, 2006 at 11:48, New Delhi: After registering a case against an employee who had allegedly stolen data, the Gurgaon based IT firm Acme Telepower Management waited for something to happen. Weeks later they have decided to stop operating out of India and move to Australia. It seems like this is the beginning of a domino effect, even as India's antiquated police force tries to deal with new age crime like data theft. Acme Telepower is claiming a national loss of Rs 750 crore. They are saying it's all because an ex-employee named Sachidanand Patnaik who allegedly stole research and handed it over to his new employer – a competitor in the power industry solutions space. On Thursday, the board of Acme met after a Gurgaon Sessions court granted bail to Patnaik and decided it was time to pack their bags. "We are disappointed in the system. Patents and research are not protected, so we are not sure if the law will be able to protect us,” GM Marketing, Acme, Sandeep Kashyap said. Acme employs around 1,100 people, who will be affected by the firm’s move to Australia that will happen over the next eight months. Most of the 70 people in the Research and Development section will be the first to move.
  • 3. For the rest, the future is unclear. According to Acme, only a small manufacturing operation will remain in India, but they say they will take care of their employees and that their reason for leaving is simple. "The fact that the main accused has got bail and the others got a clean chit has disappointed us completely,” Kashyap said. However, the lawyer for Sachidanand Patnaik says they are giving up too soon and that this trend could have dangerous repercussions. "If the reason they are leaving India is because the main accused has got bail, then it is contempt of court,” Patnaik's lawyer, Vakul Sharma said. When people lost faith in the system in the past, there was little they could, outside of rallying against everything wrong with the world. However, today people have a choice. They can simply move on. But the question remains - will the system respond? Section 65 - Tampering with Computer Source Documents Tampering with computer Source Documents: A person who knowingly or intentionally, conceal (hides or keeps secret), destroys (demolishes or reduces), alters (change in characteristics) or causes another to conceal, destroy, and alter any computer source code used for a computer, computer program, computer system or computer network, when the computer source code is required to be kept or maintained by law is punishable. For instance, hiding the C.D.ROM in which the source code files are stored, making a C File into a CPP File or removing the read only attributes of a file. Punishment The punishment would be imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
  • 4. Case study: Syed Asifuddin Ors Vs The State of Andhra Pradesh In this case, Tata Indicom employees were arrested for manipulation of the electronic 32- bit number (ESN) programmed into cell phones theft were exclusively franchised to Reliance Infocomm. Summary of the case Tata Indicom employees were arrested for manipulation of the electronic 32-bit number (ESN) programmed into cell phones that were exclusively franchised to Reliance Infocomm. The court held that such manipulation amounted to tampering with computer source code as envisaged by section 65 of the Information Technology Act, 2000. Background of the case: Reliance Infocomm launched a scheme under which a cell phone subscriber was given a digital handset worth Rs. 10,500 as well as service bundle for 3 years with an initial payment of Rs. 3350 and monthly outflow of Rs. 600. The subscriber was also provided a 1 year warranty and 3 year insurance on the handset. The condition was that the handset was technologically locked so that it would only work with the Reliance Infocomm services. If the customer wanted to leave Reliance services, he would have to pay some charges including the true price of the handset. Since the handset was of a high quality, the market response to the scheme was phenomenal. Unidentified persons contacted Reliance customers with an offer to change to a lower priced Tata Indicom scheme. As part of the deal, their phone would be technologically “unlocked” so that the exclusive Reliance handsets could be used for the Tata Indicom service. Reliance officials came to know about this “unlocking” by Tata employees and lodged a First Information Report (FIR) under various provisions of the Indian Penal Code, Information Technology Act and the Copyright Act. The police then raided some offices of Tata Indicom in Andhra Pradesh and arrested a few Tata Teleservices Limited officials for re-programming the Reliance handsets.
  • 5. These arrested persons approached the High Court requesting the court to quash the FIR on the grounds that their acts did not violate the said legal provisions. Section 66 Hacking Hacking is usually understood to be the unauthorized access of a computer system and network. Originally, the term “hacker” describes any amateur computer programmer who discovered ways to make software run more efficiently. Hackers usually “hack” on a problem until they find a solution, and keep trying to make their equipment work in new and more efficient ways. A hacker can be a Code Hacker, Cracker or a Cyber Punk. Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by means is said to commit hacking. Punishment The Punishment would be Imprisonment up to three years, or with fine which may extend up to two lakh, or with both Case study Kumar v/s Whiteley In this case the accused gained unauthorized access to the Joint Academic Network (JANET) and deleted, added files and changed the passwords to deny access to the authorized users. Investigations had revealed that Kumar was logging on to the BSNL broadband Internet connection as if he was the authorized genuine user and ‘made alteration in the computer database pertaining to broadband Internet user accounts’ of the subscribers. The CBI had registered a cyber crime case against Kumar and carried out investigations on the basis of a complaint by the Press Information Bureau, Chennai, which detected the unauthorized use of broadband Internet. The complaint also stated that the subscribers had incurred a loss of Rs 38,248 due to Kumar’s wrongful act. He used to ‘hack’ sites from Bangalore, Chennai and other cities too, they said. Punishment The punishment would be imprisonment up to three years,
  • 6. Section 66A - Punishment for sending offensive messages through communication service Any person who sends, by means of a computer resource or a communication device, - any information that is grossly offensive or has menacing character; or 18 any information which he knows to be false, but for the purpose of causing annoyance inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device, any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages. Punishment The punishment would be imprisonment for a term which may extend to three years and with fine. Case study: First juvenile accused in a cyber crime case. In April 2001 a person from New Delhi complained to the crime branch regarding the website. Amazing.com, he claimed, carried vulgar remarks about his daughter and a few of her classmates. During the inquiry, print-outs of the site were taken and proceedings initiated. After investigation a student of Class 11 and classmate of the girl were arrested. The juvenile board in Nov 2003 refused to discharge the boy accused of creating a website with vulgar remarks about his classmate. The accuser’s advocate had sought that his client be discharged on the ground that he was not in a stable state of mind. Seeking discharge, the advocate further said that the trial has been pending for about two years. While rejecting the accuser’s application, metropolitan magistrate Santosh Snehi Mann said: ‘The mental condition under which the juvenile came into conflict with the law shall be taken into consideration during the final order.’ Mann, however, dropped the sections of Indecent Representation of Women Prohibition) Act. The accused would face trial under the Information Technology Act and (for intending to outrage the modesty of a woman. She held the inquiry could not be closed on technical ground, especially when the allegations were not denied by the accuse
  • 7. Section 66 B: Punishment for dishonestly receiving stolen computer resource or communication device Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device. Punishment The punishment would be imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both. Section 66C: identity theft Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person. Punishment The punishment would be imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh. Case study: Online fraudulent share & commodity transactions Now a day the shares are sold and purchased online. There has been spurt in the cases in which the complainant report that there online share/commodity account has been compromised and fraudulent transactions has been executed by unknown fraudster which resulted in huge loss to him. In the online transaction, the client is allotted an online account with client id & password through which he executes the sale & purchase transactions through the server based in the broker office. The fraudster who are generally software experts or the executives (core dealers) at the broker office try to acquire the client id & password from the broker office itself, hit & trial methods or social engineering. After acquiring the client Id & password, the fraudster makes unauthorized access to the client account and also accesses their own account in which the profits are to be transferred from the victim client account. The fraudster executes the transactions into the client accounts at unrealistic prices and match these transactions into their own account simultaneously. In this way, he shifts the profit to his own account and losses to the account of the unsuspecting clients.
  • 8. Section 66 D: Punishment for cheating by Impersonation by using computer resource By means of any communication device or computer resource cheats by Impersonation. Punishment Imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees. Case study Email spoofing Recently, a branch of the Global Trust Bank experienced a run on the bank. Numerous customers decided to withdraw all their money and close their accounts. It was revealed that someone had sent out spoofed emails to many of the banks customers stating that the bank was in very bad shape financially and could close operations at any time. Unfortunately this information proved to be true in the next few days. But the best example of the email spoofing can be given by the Gujarat Ambuja Executive’s case. Where he pretended to be a girl and cheated the Abu Dhabi based NRI for crores by blackmailing tactics. Section 66E: Punishment for violation of privacy. Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person. Punishment Imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both.
  • 9. Case Study Nagpur Congress leader’s son MMS scandal On January 05, 2012 Nagpur Police arrested two engineering students, one of them a son of a Congress leader, for harassing a 16-year-old girl by circulating an MMS clip of their sexual acts. According to the Nagpur (rural) police, the girl was in a relationship with Mithilesh Gajbhiye, 19, son of Yashodha Dhanraj Gajbhiye, a zilla parishad member and an influential Congress leader of Saoner region in Nagpur district. Section 66F: Punishment for cyber terrorism Whoever, with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people by denying or cause the denial of access to any person authorized to access computer resource attempting to penetrate or access a computer resource without authorization or exceeding authorized access introducing or causing to introduce any Computer Contaminant. Punishment The punishment would be imprisonment which may extend to imprisonment for life. Case study The Mumbai police have registered a case of ‘cyber terrorism’—the first in the state since an amendment to the Information Technology Act—where a threat email was sent to the BSE and NSE on Monday. The MRA Marg police and the Cyber Crime Investigation Cell are jointly probing the case. The suspect has been detained in this case. The police said an email challenging the security agencies to prevent a terror attack was sent by one Shahab Md with an ID sh.itaiyeb125@yahoo.in to BSE’s administrative email ID corp.relations@bseindia.com at around 10.44 am on Monday. The IP address of the sender has been traced to Patna in Bihar. The ISP is Sify. The email ID was created just four minutes before the email was sent. “The sender had, while creating the new ID, given two mobile numbers in the personal details
  • 10. column. Both the numbers belong to a photo frame-maker in Patna,’’ said an officer. Section 67: Punishment for publishing or transmitting obscene material in electronic form Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied. Punishment Imprisonment upto 5 years and with fine which may extend to one lakh rupees on first conviction and its double punishment for second and subsequent convictions. Case study: State of Tamil Nadu v/s. Suhas Kutti, 2004 Assistant Commissioner of Police, Cyber Crime Cell, C.C.B.Egmore, Chennai.8 has filed Final Report against the accused, that on 7.2.04, evening at Cyber Café Hello World Centre, Sion, Mumbai having an I.P.61.11.10.99, the accused with intention of harming the reputation of the Complainant Ms. R, created user id in the name of her and composed an obscene message intending that such document shall be used for posting in different obscene Yahoo Group, with the intention to make others to believe that the document was made by her, so that the persons seeing the obscene message would send offending calls to her,in harming her reputation and by insulting her modesty by the words exhibited in the email and in the course of same transaction, on 7.2.04, evening at Cyber Café Hello World Centre, Sion, Mumbai, having an IP 61.11.10.99 the Accused posted obscene message which are lascivious and also have the effect to corrupt persons who are likely to read and see such obscene messages and caused to the published in different obscene Yahoo goups and in the course of same transaction, that on 9.2.04, morning, at Cyber Café Heighten Advertising, Mahim, Mumbai, having an IP 202.88.165.53 the accused with intention of harming the reputation of the complainant Ms. R entered user id. which was created by him in the name of the complainant and composed an obscene message intending that such document shall be used for posting in different obscene Yahoo groups, with the intention to make others to believe that the document was made by her, so that the persons seeing the obscene message would send offending calls to her, in harming her reputation and by insulting her modesty by the words exhibited in the email and that in the course of same transaction, that on 9.2.04, morning at cyber café Heighten Advertising, Mahim, Mumbai, having an IP 202.88.165.53, the accused posted obscene messages which are lascivious and also have the effect to corrupt person who are likely to read and see such obscene messages and caused to be published in different obscene Yahoo goups and thereby the accused have committed offences u/s 469 IPC, 67 I.T Act. 469 &509 IPC, and 67 of I.T. Act.
  • 11. P.W. 1 is the only daughter of P.W.2 and P.W.3.P.W.2 is the father, P.W.3 is the mother. Presently, P.W.1 is working as a senior Executive (H.R.) in a multinational Company at Chennai. She studied her MBA Course in Mumbai in the year 1997, the accused studied with P.W.1 and she was his classmate is Mumbai. Accused belongs to Mumbai. On 9.2.04, She opened her Rediff e-mail and noticed the receipt of two obscene messages which were posted on 7.2.04 and 9.2.04. She took computer output of the obscene message posted on 7.2.04, Ex P.1 is the obscene message. The obscene message carried her Office phone numbers and her e-mail I.D. The house Phone number was wrongly given. The said obscene messages have been sent through Yahoo website to 5 sex groups. The computer printout obscene message posted in @ Radha lovers group is EX.P.2. On seeing the said messages, several persons sent the responsive message and many persons tried to contact her over phone. Ex P3 series is the responsive messages. Several Phone calls came to her office. P.W.1 informed the said matter to her parents. The messages were likely to harm the reputation and morale of P.W.1. P.W. 1 had married Jaichand Prajapathi of Uttar Pradesh in the year 2001. The family life was not happy and she obtained divorce through court in the year 2003. The Accused was citied as witness in the divorce petition. P.W.1 recollected one incident and suspected in the involvement of the Accused. During college days in the year 1997, the accused used to travel with P.W.1 in train at Mumbai. On one such occasion, Accused pointed out an obscene scribbling with phone number in the train and told P.W.1 that on seeing the phone number, many persons would try to contact the phone number and this is the best way to spoil the reputation of a woman. The Accused even expressed his desire to marry P.W.1, after the engagement of P.W.1 with Jaichand Prajapati was over. P.W.1 turned down his proposal. In the year 2003, the Accused stayed in the house of the P.W.1 for about 10 days stating that he has to attend an interview at Banglalore. At that time also, Accused offered to marry P.W.1 for which P.W.1 and her parents refused the alliance. Thereafter, P.W.1 after his return to Mumbai was in the habit of making Phone calls, sending S.M.S. Messages and sending E-mail to P.W.1 frequently. Hence P.W.1 blocked the e-mail I.D. of the Accused. Ex.P5 is the Computer output for blocking the e-mail I.D. of the Accused. On seeing the obscene message, P.W.1 discussed the matter with P.W.2 and P.W.3 and sought the help of the Accused over phone. P.W.1 and her parents issued a warning message in the name of PW 2 and PW 3 by creating an email ID viz, parant2003@yahoo.co.in and transmitted same to the yahoo groups. She sent warning messages to the persons, who sent responsive message in ExP.6 series. A copy of warning message was also sent to the Accused. P.W.1 lodged a complaint on 14/2/2004 along with Ex.P1 at Cyber Crime Police. The complaint is Ex. P.4 P.W.12 who received the complaint directed P.W.4 to obtain header details and other particulars to find out the origination of the messages. P.W.4 went to Cyber Café at Kennath Lane, Egmore along with P.W. 1 she down loaded the message took print out by using the e-mail I.D. Parant2003@Yahoo.Co.in Ex.P.9-Ex.P.12. She extracted and stored the messages in Mo.2 floppies. Thereafter P.W.12 gave a requisition to the Hathway Cable and Data Com. Pvt. Ltd; under Ex.P.13, for which it gave a reply in Ex. P.14. P.W.12 also gave a requisition to Dishnet D.S.L. in Ex.P.13 and the reply given by Dishnet D.S.L is Ex.P.15. P.W.5 speaks about Ex.P.13 and Ex.P.14. P.W.6 speaks about Ex.P.15.P.W.12 also examined P.W.11 and obtained particulars in Ex. P.29 series and
  • 12. confirmed that the messages were originated from Mumbai. P.W.12- Investigation Officer registered F.I.R. Ex.P.34 on 20.2.04. Thereafter, P.W.12 proceeded to Mumbai on 24.2.04, and arrested the Accused at Mumbai on 25.2.04. He seized Mo.1 Cell Phone from the Accused under Mahazar Ex.P.8 P.W.8 and P.W.9 who are running browsing Centre at Mumbai, identified the Accused in the presence of P.W.12. He seized Ex.P.23, 24 registers from them. P.W.8 speaks about the Accused and the seizure of Ex.P.22 and the remarks made by P.W.12 in Ex.P.23, P.W. 9 speaks about the Accused that he came to the browsing centre and signed in the Register Ex.P24 as R. Ex.P.25 is the word written by the Accused. P. W. 12, brought the Accused to Chennai on 28.2.04, after producing the Accused before a Mumbai Court. The Accused gave a confession statement in the presence of P.W. 10 and he gave the password “an rose”. The said word is Ex.P.27. The particulars stored in the SIM Card were taken print out in Ex.P. 28 series through S.M.S. Reader. P.W.12 went to the office of P.W.7 and took computer print out by using the password “an rose”. He issued the certificate in Ex.P.21. The computer print outs are Ex. P 16-P.20. P.W.12 completed investigation and laid charge sheet against the Accused of offences u/s 67 of I T Act and u/s 469,509 of IPC. Final Order …this court is not inclined to accept the theory projected by the Accused that the obscene messages would have been created by P.W.1, P.W.2 and P.W.3 or by Jaichand Prajapathi. It is clear that the Accused himself has composed and posted the obscene messages from the browsing centre of P.W.8 and P.W.9. This Court holds that the prosecution has proved its charges against the accused beyond all reasonable doubt and hence the Accused is liable to be punished. The Accused was heard regarding the question of sentence u/s 248 (2) Cr.P.C. The Accused pleaded for admonition. The Accused is not a lay man. He is educated and studied upto M.B.A. P.W.1 is holding a responsible post in a multinational Company at Chennai. The Accused has chosen to post the obscene message for the simple reason that she refused to marry him. He did not behave like an educated man. Only a family woman can realise the mental sufferings and pain if unknown persons contacted her through phone and e-mail and invited her to bed. The mental sufferings and humiliation undergone by the P.W.1 cannot be compensated in terms of money or by solacial words. It cannot be stated that the Accused had acted in a heat of passion. Two days repeatedly he had sent the obscene message—Computer system and browsing centre are meant for learning things and updating knowledge in various fields. The Accused has misused the same to take revenge on a sophisticated lady. Therefore, the Accused does not deserve leniency and is liable to be punished. In the result, the Accused is found guilty of offences u/s 469,509 IPC, and u/s 67 of I.T. Act. and the Accused is convicted and is sentenced to undergo Rigorous imprisonment for 2 years u/s 469 IPC, and to pay a fine Rs.500/- i/d, to undergo simple imprisonment for 1 month and for the offence u/s 509 IPC, sentenced to undergo 1 year simple Imprisonment and to pay a fine of Rs.500/- i/d to undergo simple imprisonment for 1 month and for the offence u/s 67 of Information Technology Act 2000 to undergo Rigorous Imprisonment for 2 years and to pay a fine of Rs.4,000/- i/d to undergo
  • 13. S.I. for 6 months. All sentences to run concurrently. The period undergone by the Accused will be set off u/s 428 Cr.P.C. Section 67 A: Punishment for publishing or transmitting of material Containing sexually explicit acts in electronic form Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years with fine which may extend to ten lakh rupees and in the event of second or subsequent and conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees Section 67 B: Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form. Whoever publishes or transmits or causes to be published or transmitted material in any electronic form which depicts children engaged in sexually explicit act or conduct or creates text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting children in obscene or indecent or sexually explicit manner Punishment Imprisonment up to five years and with fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of seven years and also with fine which may extend to ten lakh rupees. Case study Janhit Manch & Ors. v. The Union of India 10.03.2010 Public Interest Litigation: The petition sought a blanket ban on pornographic websites. The NGO had argued that websites displaying sexually explicit content had an adverse influence, leading youth on a delinquent path.
  • 14. Section 69 - Powers to issue directions for interception or monitoring or decryption of any information through any computer resource Punishment The punishment would be imprisonment which may extend to seven years. Case study In August 2007, Lakshmana Kailash K., a techie from Bangalore was arrested on the suspicion of having posted insulting images of Chhatrapati Shivaji, a major historical figure in the state of Maharashtra, on the social-networking site Orkut. The police identified him based on IP address details obtained from Google and Airtel -Lakshmana’s ISP. He was brought to Pune and detained for 50 days before it was discovered that the IP address provided by Airtel was erroneous. The mistake was evidently due to the fact that while requesting information from Airtel, the police had not properly specified whether the suspect had posted the content at 1:15 p.m. Section 70: Securing or attempting to secure access to a protected system. Punishment: The punishment would be imprisonment which may extend to 10 years and fine. Case study: The Government of Kerala issued a notification u/s 70 of the Information Technology Act declaring the FRIENDS application software as a protected system.The author of the application software filed a petition in the High Court against the said notification. He also challenged the constitutional validity of section 70 of the IT Act.The Court upheld the validity of both, section 70 of the IT Act, as well as the notification issued by the Kerala Government. Conclusions of the court given on 24.05.2006 There is no conflict between the provisions of Copyright Act and Section 70 of IT Act. Section 70 of the IT Act is not unconstitutional. While interpreting section 70 of the IT Act, a harmonious construction with Copyright Act is needed. Section 70 of the IT Act is not against but subject to the provisions of the Copyright Act.
  • 15. Government cannot unilaterally declare any system as "protected" other than "Government work" falling under section 2(k) of the Copyright Act on which Govt.'s copyright is recognized under Section 17(d) of the said Act. Section 71: For misrepresentation or suppression of any material fact from the Controller or the Certifying Authority. Whoever makes any misrepresentation to, or suppresses any material fact from, the Controller or the Certifying Authority for obtaining any license or Electronic Signature Certificate, Punishment The punishment would be imprisonment up to 2 years, or fine up to rupees one lakh or with both. Case study: (NMIMS) along with the Mumbai Police has unearthed a racket that used unethical practices to secure admission for MBA courses in prestigious management institutes of the country. NMIMS had lodged a complaint with Joint Commissioner of Police, Mumbai regarding impersonation cases observed during NMIMS Management Aptitude Test (NMAT) 2013. This is a national level MBA entrance test and was conducted from October 11, 2012 to December 19, 2012. Post the test, during the admission process, the admission department discovered discrepancy between the photograph taken at the time of writing the NMAT and the photographs on the Personal Interview application form of a few students. After they checked into the details, it was found that about 87 candidates in the final merit list had committed forgery in securing admission. “Our research also showed that there are at least 6 individuals who have impersonated for as many as 87 or more students across the country. Most of these students are with high scores of 220 and above,” said NMIMS in a statement. The NMIMS statement further said that all admissions to the institute are merit based.
  • 16. A press note from the Mumbai Police revealed that the accused had promised one student of securing him passing marks in NMAT Exam through Management Quota and quoted Rs 15 lakhs for the same. Thereafter the accused person took Rs 7.5 lakhs as advance and told the student not to appear for the written examination and that they would manage from inside. The police said that the accused person employed ‘dummy’ for the student who gave the exam by impersonating the candidate. Later, the accused person informed the student that he has passed NMAT exam and has been short listed for Group Discussion and Interview. The arrested accused informed the student to pay the remaining Rs. 7.5 lakhs which was paid immediately. “Preliminary investigation has revealed that such malpractices are also rampant in prestigious Institutes based all over India in the field of MBA, Medical, Engineering etc. through Education Consultancy firms, Coaching Classes etc. which have mushroomed all over India. One such institute i.e. Career Guardian, Ghaziabad, U.P. and Meta Consultancy, Delhi are found involved in such malpractices,” said Mumbai Police in a press note. The police have also found forged & misrepresented documents of Aadhaar Card, Pan Card, and Election Card in the name of students for appearing as ‘dummy’.