SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
www.QuestionsBank4BScIT.Blogspot.Com
IPR & Cyber Laws
(Question Bank)
[Unit – VI]
www.QuestionsBank4BScIT.Blogspot.Com
Five Major Points of Focus:
1. Penalty of damage of Computer, Computer
System, etc.
If any person without permission of the owner or any other person
who is incharge of a Computer, Computer or Computer Network –
(a) Accesses or secures access to such computer, computer system
or computer network;
(b) Downloads, copies or extracts any Data, Computer Database or
information from such Computer, Computer System or Computer
Network including information or data held or stored in any
removable Storage Medium;
(c) Introduces or causes to be introduced any Computer
Contaminant or Computer Virus into Any Computer, Computer
System or Computer Network;
(d) Damages or causes to be damaged any Computer, Computer
System or Computer Network, Data, Computer Database or other
Programmes residing in such Computer, Computer System or
Computer Network;
(e) Disrupts or causes disruption of any Computer, Computer System
or Computer Network;
(f) Denies or causes the denial of access to any person authorised to
access any Computer, or computer network by any means;
(g) Provides any assistance to any person to facilitate access to a
Computer, Computer System or Computer Network in
contravention of the Provisions of this Act, rules or regulations
made thereunder;
(h) Charges the services availed of by a person to the account of
another person by tampering with or manipulating any
Computer, Computer System, or Computer Network, he shall be
liable to pay damages by way of compensation not exceeding one
crore rupees to the person so affected.
www.QuestionsBank4BScIT.Blogspot.Com
Explanation: For the purpose of this section –
(i) "Computer Contaminant" means any set of computer
instructions that are designed –
(a) To modify, destroy, record, transmit data or programme
residing within a computer, computer system or computer
network; or
(b) By any means to usurp the normal operation of the
computer, computer system, or computer network;
(ii) "Computer Data Base" means a representation of information,
knowledge, facts, concepts or instructions in text, image, audio
video that are being prepared or have been prepared in a
formalised manner or have been produced by a computer,
computer system or computer network and are intended for use
in a computer, computer system or computer network;
(iii) "Computer Virus" means any computer instruction,
information, data or programme that destroys, damages,
degrades or adversely affects the performance of a computer
resource or attaches itself to another computer resource and
operates when a programme, data or instruction is executed
some other event takes place in that computer resource;
(iv) "Damage" means to destroy, alter, delete, add, modify or
rearrange any computer resource by any means.
2. Penalty for failure to furnish information,
return, etc.
If any person who is required under this Act or any rules or regulations
made there under to –
(a) Furnish any document, return or report to the Controller or the
Certifying Authority fails to furnish the same, he shall be liable to
a penalty not exceeding one lakh and fifty thousand rupees for
each such failure;
www.QuestionsBank4BScIT.Blogspot.Com
(b) File any return or furnish any information, books or other
documents within the time specified therefore in the regulation
fails to file return or furnish the same within the time specified
therefor in the regulations, he shall be liable to a penalty not
exceeding five thousand rupees for every day during which such
failure continues;
(c) Maintain books of account or records, fails to maintain the same,
he shall be liable to a penalty not exceeding ten thousand rupees
for every day during which the failure continues.
3. Residuary Penalty:
Whoever contravenes any rules or regulations made under this Act,
for the contravention of which no penalty has been separately
provided, shall be liable to pay a compensation not exceeding twenty-
five thousand rupees to the person affected by such contravention or
a penalty not exceeding twenty-five thousand rupees.
4. Power To Adjudicate:
(1) For the purpose of adjudging under this Chapter whether any
person has committed a contravention of any of the Provisions of
this Act or of any rule, regulation, direction or order made
thereunder the Central Government shall, subject to the
provisions of sub-section (3), appoint any officer not below the
rank of a Director to the Government of India or an equivalent
officer of a State Government to be an adjudicating officer for
holding an inquiry in the manner prescribed by the Central
Government.
(2) The adjudicating officer shall, after giving the person referred to
in sub-section (1) a reasonable opportunity for making
representation in the matter and if, on such inquiry, he is satisfied
that the person has committed the contravention, he may impose
www.QuestionsBank4BScIT.Blogspot.Com
such penalty or award such compensation as he thinks fit in
accordance with the provisions of that section.
(3) No person shall be appointed as an adjudicating officer unless he
possesses such experience in the field of Information Technology
and legal or judicial experience as may be prescribed by the
Central Government.
(4) Where more than one adjudicating officers are appointed, the
Central Government shall specify by order the matters and places
with respect to which such officers shall exercise their
jurisdiction.
(5) Every adjudicating officer shall have the powers of a civil court
which are conferred on the Cyber Appellate Tribunal under sub-
section (2) of section 58, and-
(6) All proceedings before it shall be deemed to be judicial
proceedings within the meaning of sections 193 and 228 of the
Indian Penal Code;
(7) Shall be deemed to be a civil court for the purpose of section 345
and .46 of the Code of Criminal Procedure, 1973.
5. Factors to be taken into account by the
adjudicating officer:
While adjudging the quantum of compensation under this Chapter,
the adjudicating officer shall have due regard to the following factors,
namely –
(a) The amount of gain of unfair advantage, wherever quantifiable,
made as a result of the default;
(b) The amount of loss caused to any person as a result of the default;
(c) The repetitive nature of the default.

Weitere ähnliche Inhalte

Was ist angesagt?

Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
avinashmsy
 
Income tax authorities under Income tax act 1961
Income tax authorities under Income tax act 1961Income tax authorities under Income tax act 1961
Income tax authorities under Income tax act 1961
Chirantan Tiwari
 

Was ist angesagt? (20)

Competition Commission of India
Competition Commission of IndiaCompetition Commission of India
Competition Commission of India
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Debt Recovery Tribunal
Debt Recovery TribunalDebt Recovery Tribunal
Debt Recovery Tribunal
 
Winding up of a company
Winding up of a companyWinding up of a company
Winding up of a company
 
The prevention of money laundering act, 2002 (2)
The prevention of money laundering act, 2002 (2)The prevention of money laundering act, 2002 (2)
The prevention of money laundering act, 2002 (2)
 
Constitutional aspect of comp. law
Constitutional aspect of comp. lawConstitutional aspect of comp. law
Constitutional aspect of comp. law
 
Competition Commission of India
Competition Commission of IndiaCompetition Commission of India
Competition Commission of India
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
Rights and obligations of banker
Rights and obligations of bankerRights and obligations of banker
Rights and obligations of banker
 
Search and Seizure under Income Tax Act
Search and Seizure under Income Tax ActSearch and Seizure under Income Tax Act
Search and Seizure under Income Tax Act
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Prospectus
ProspectusProspectus
Prospectus
 
Nature and scope of protection of copyright
Nature and scope of protection of copyrightNature and scope of protection of copyright
Nature and scope of protection of copyright
 
winding up of a company
winding up of a companywinding up of a company
winding up of a company
 
Presumption
PresumptionPresumption
Presumption
 
Income tax authorities under Income tax act 1961
Income tax authorities under Income tax act 1961Income tax authorities under Income tax act 1961
Income tax authorities under Income tax act 1961
 
Negotiable instruments
Negotiable instrumentsNegotiable instruments
Negotiable instruments
 
Code of civil procedure 1908 appeals
Code of civil procedure 1908 appealsCode of civil procedure 1908 appeals
Code of civil procedure 1908 appeals
 
Special type of customer of bank
Special type of customer of bankSpecial type of customer of bank
Special type of customer of bank
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 

Ähnlich wie What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]

p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
badangayonmgb
 

Ähnlich wie What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24] (20)

Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cybel law assignment sections
Cybel law assignment sectionsCybel law assignment sections
Cybel law assignment sections
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
 
It act 2000
It act 2000It act 2000
It act 2000
 
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber CrimesRelevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
111cyber law sectins cases.docx new
111cyber law sectins cases.docx new111cyber law sectins cases.docx new
111cyber law sectins cases.docx new
 
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
 
Nadeem cyber law assignment
Nadeem cyber law assignmentNadeem cyber law assignment
Nadeem cyber law assignment
 
information related crime in asu
information related crime in asuinformation related crime in asu
information related crime in asu
 
Cyber law in India with sections and penalties
Cyber law in India with sections and penalties Cyber law in India with sections and penalties
Cyber law in India with sections and penalties
 
CYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).pptCYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
CYBER CRIME JUDICIAL PERSPECTIVE (1).ppt
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

What does chapter 9 of IT Act, 2000, "Penalties & Adjudication" cover? [#24]

  • 1. www.QuestionsBank4BScIT.Blogspot.Com IPR & Cyber Laws (Question Bank) [Unit – VI]
  • 2. www.QuestionsBank4BScIT.Blogspot.Com Five Major Points of Focus: 1. Penalty of damage of Computer, Computer System, etc. If any person without permission of the owner or any other person who is incharge of a Computer, Computer or Computer Network – (a) Accesses or secures access to such computer, computer system or computer network; (b) Downloads, copies or extracts any Data, Computer Database or information from such Computer, Computer System or Computer Network including information or data held or stored in any removable Storage Medium; (c) Introduces or causes to be introduced any Computer Contaminant or Computer Virus into Any Computer, Computer System or Computer Network; (d) Damages or causes to be damaged any Computer, Computer System or Computer Network, Data, Computer Database or other Programmes residing in such Computer, Computer System or Computer Network; (e) Disrupts or causes disruption of any Computer, Computer System or Computer Network; (f) Denies or causes the denial of access to any person authorised to access any Computer, or computer network by any means; (g) Provides any assistance to any person to facilitate access to a Computer, Computer System or Computer Network in contravention of the Provisions of this Act, rules or regulations made thereunder; (h) Charges the services availed of by a person to the account of another person by tampering with or manipulating any Computer, Computer System, or Computer Network, he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected.
  • 3. www.QuestionsBank4BScIT.Blogspot.Com Explanation: For the purpose of this section – (i) "Computer Contaminant" means any set of computer instructions that are designed – (a) To modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or (b) By any means to usurp the normal operation of the computer, computer system, or computer network; (ii) "Computer Data Base" means a representation of information, knowledge, facts, concepts or instructions in text, image, audio video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network; (iii) "Computer Virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed some other event takes place in that computer resource; (iv) "Damage" means to destroy, alter, delete, add, modify or rearrange any computer resource by any means. 2. Penalty for failure to furnish information, return, etc. If any person who is required under this Act or any rules or regulations made there under to – (a) Furnish any document, return or report to the Controller or the Certifying Authority fails to furnish the same, he shall be liable to a penalty not exceeding one lakh and fifty thousand rupees for each such failure;
  • 4. www.QuestionsBank4BScIT.Blogspot.Com (b) File any return or furnish any information, books or other documents within the time specified therefore in the regulation fails to file return or furnish the same within the time specified therefor in the regulations, he shall be liable to a penalty not exceeding five thousand rupees for every day during which such failure continues; (c) Maintain books of account or records, fails to maintain the same, he shall be liable to a penalty not exceeding ten thousand rupees for every day during which the failure continues. 3. Residuary Penalty: Whoever contravenes any rules or regulations made under this Act, for the contravention of which no penalty has been separately provided, shall be liable to pay a compensation not exceeding twenty- five thousand rupees to the person affected by such contravention or a penalty not exceeding twenty-five thousand rupees. 4. Power To Adjudicate: (1) For the purpose of adjudging under this Chapter whether any person has committed a contravention of any of the Provisions of this Act or of any rule, regulation, direction or order made thereunder the Central Government shall, subject to the provisions of sub-section (3), appoint any officer not below the rank of a Director to the Government of India or an equivalent officer of a State Government to be an adjudicating officer for holding an inquiry in the manner prescribed by the Central Government. (2) The adjudicating officer shall, after giving the person referred to in sub-section (1) a reasonable opportunity for making representation in the matter and if, on such inquiry, he is satisfied that the person has committed the contravention, he may impose
  • 5. www.QuestionsBank4BScIT.Blogspot.Com such penalty or award such compensation as he thinks fit in accordance with the provisions of that section. (3) No person shall be appointed as an adjudicating officer unless he possesses such experience in the field of Information Technology and legal or judicial experience as may be prescribed by the Central Government. (4) Where more than one adjudicating officers are appointed, the Central Government shall specify by order the matters and places with respect to which such officers shall exercise their jurisdiction. (5) Every adjudicating officer shall have the powers of a civil court which are conferred on the Cyber Appellate Tribunal under sub- section (2) of section 58, and- (6) All proceedings before it shall be deemed to be judicial proceedings within the meaning of sections 193 and 228 of the Indian Penal Code; (7) Shall be deemed to be a civil court for the purpose of section 345 and .46 of the Code of Criminal Procedure, 1973. 5. Factors to be taken into account by the adjudicating officer: While adjudging the quantum of compensation under this Chapter, the adjudicating officer shall have due regard to the following factors, namely – (a) The amount of gain of unfair advantage, wherever quantifiable, made as a result of the default; (b) The amount of loss caused to any person as a result of the default; (c) The repetitive nature of the default.