SlideShare a Scribd company logo
1 of 5
Download to read offline
Information Technology Act,
2000
Section 66 of the Information Technology Act, 2000 deals with
computer-related offenses. Under this section, any person who commits
any of the following actions can be punished with imprisonment and/or
a fine:
• Tampering with computer source documents: This refers to altering or
destroying computer source documents, with the intention to cause
damage or to conceal any wrongdoing.
Destroying, deleting, or altering computer source documents: This
refers to any action that causes damage to computer source
documents, with the intention to cause harm or disruption.
• Hacking into a computer system: This refers to unauthorized access to
a computer system or network.
Accessing computer systems or data without authorization: This
refers to accessing a computer system or data without the permission
of the owner or authorized user.
Obtaining computer resources or services fraudulently: This refers to
obtaining computer resources or services by deception or
misrepresentation.
• Publishing or transmitting obscene material in electronic form: This
refers to the distribution of sexually explicit or offensive material
through electronic means, such as email or social media.
Publishing or transmitting material which is threatening, abusive, or
inflammatory in electronic form: This refers to the distribution of
material that is intended to incite violence or hatred, or that is likely
to cause fear or alarm, through electronic means.
• Cyberstalking: This refers to the use of electronic means to harass or
intimidate someone, such as sending repeated threatening messages
or posting personal information online without consent.
• Identity theft: This refers to the unauthorized use of another person's
personal information, such as their name, address, or credit card
details, for fraudulent purposes.
• Cheating by personation using computer resource: This refers to the
use of a computer or other electronic device to impersonate
someone else, with the intention of defrauding or misleading others.
It is important to note that these actions are punishable under the act,
and a person found guilty of any of these actions can be imprisoned
and/or fined.

More Related Content

Similar to IT ACT Sec 66.ppt

Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsPrabesh Shrestha
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000PrakharPrasoon
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safetyheidirobison
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxJoelGautham
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Ranjita Naik
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentcparimala
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 

Similar to IT ACT Sec 66.ppt (20)

Prekaj Cybercrime By the Italian Team
Prekaj Cybercrime  By the Italian TeamPrekaj Cybercrime  By the Italian Team
Prekaj Cybercrime By the Italian Team
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safety
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
cyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptxcyber safety_grade11cse_afsheen,vishal.pptx
cyber safety_grade11cse_afsheen,vishal.pptx
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 

Recently uploaded

Embed-7.pdfp;kpokipppedoioediouedooedijed
Embed-7.pdfp;kpokipppedoioediouedooedijedEmbed-7.pdfp;kpokipppedoioediouedooedijed
Embed-7.pdfp;kpokipppedoioediouedooedijedbhavenpr
 
Classification of Contracts in Business Regulations
Classification of Contracts in Business RegulationsClassification of Contracts in Business Regulations
Classification of Contracts in Business RegulationsSyedaAyeshaTabassum1
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Dr. Oliver Massmann
 
An introduction to Indian Contract Act, 1872 by Shraddha Pandit
An introduction to Indian Contract Act, 1872 by Shraddha PanditAn introduction to Indian Contract Act, 1872 by Shraddha Pandit
An introduction to Indian Contract Act, 1872 by Shraddha PanditSHRADDHA PANDIT
 
ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibili...
ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibili...ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibili...
ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibili...Anadi Tewari
 
The Ultimate Guide to Drafting Your Separation Agreement with a Template
The Ultimate Guide to Drafting Your Separation Agreement with a TemplateThe Ultimate Guide to Drafting Your Separation Agreement with a Template
The Ultimate Guide to Drafting Your Separation Agreement with a TemplateBTL Law P.C.
 
Women and the World of Climate Change- A Conceptual Foundation by Shraddha Pa...
Women and the World of Climate Change- A Conceptual Foundation by Shraddha Pa...Women and the World of Climate Change- A Conceptual Foundation by Shraddha Pa...
Women and the World of Climate Change- A Conceptual Foundation by Shraddha Pa...SHRADDHA PANDIT
 
Islamabad High Court Judges wrote a letter to Supreme Judicial Council.pdf
Islamabad High Court Judges wrote a letter to Supreme Judicial Council.pdfIslamabad High Court Judges wrote a letter to Supreme Judicial Council.pdf
Islamabad High Court Judges wrote a letter to Supreme Judicial Council.pdfNo One
 
Law-on-Partnership-and-Corporation business org
Law-on-Partnership-and-Corporation business orgLaw-on-Partnership-and-Corporation business org
Law-on-Partnership-and-Corporation business orgAnonymousUKTzN2ggtG
 

Recently uploaded (9)

Embed-7.pdfp;kpokipppedoioediouedooedijed
Embed-7.pdfp;kpokipppedoioediouedooedijedEmbed-7.pdfp;kpokipppedoioediouedooedijed
Embed-7.pdfp;kpokipppedoioediouedooedijed
 
Classification of Contracts in Business Regulations
Classification of Contracts in Business RegulationsClassification of Contracts in Business Regulations
Classification of Contracts in Business Regulations
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
 
An introduction to Indian Contract Act, 1872 by Shraddha Pandit
An introduction to Indian Contract Act, 1872 by Shraddha PanditAn introduction to Indian Contract Act, 1872 by Shraddha Pandit
An introduction to Indian Contract Act, 1872 by Shraddha Pandit
 
ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibili...
ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibili...ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibili...
ArtificiaI Intelligence based Cyber Forensic Tools: Relevancy and Admissibili...
 
The Ultimate Guide to Drafting Your Separation Agreement with a Template
The Ultimate Guide to Drafting Your Separation Agreement with a TemplateThe Ultimate Guide to Drafting Your Separation Agreement with a Template
The Ultimate Guide to Drafting Your Separation Agreement with a Template
 
Women and the World of Climate Change- A Conceptual Foundation by Shraddha Pa...
Women and the World of Climate Change- A Conceptual Foundation by Shraddha Pa...Women and the World of Climate Change- A Conceptual Foundation by Shraddha Pa...
Women and the World of Climate Change- A Conceptual Foundation by Shraddha Pa...
 
Islamabad High Court Judges wrote a letter to Supreme Judicial Council.pdf
Islamabad High Court Judges wrote a letter to Supreme Judicial Council.pdfIslamabad High Court Judges wrote a letter to Supreme Judicial Council.pdf
Islamabad High Court Judges wrote a letter to Supreme Judicial Council.pdf
 
Law-on-Partnership-and-Corporation business org
Law-on-Partnership-and-Corporation business orgLaw-on-Partnership-and-Corporation business org
Law-on-Partnership-and-Corporation business org
 

IT ACT Sec 66.ppt

  • 1. Information Technology Act, 2000 Section 66 of the Information Technology Act, 2000 deals with computer-related offenses. Under this section, any person who commits any of the following actions can be punished with imprisonment and/or a fine:
  • 2. • Tampering with computer source documents: This refers to altering or destroying computer source documents, with the intention to cause damage or to conceal any wrongdoing. Destroying, deleting, or altering computer source documents: This refers to any action that causes damage to computer source documents, with the intention to cause harm or disruption.
  • 3. • Hacking into a computer system: This refers to unauthorized access to a computer system or network. Accessing computer systems or data without authorization: This refers to accessing a computer system or data without the permission of the owner or authorized user. Obtaining computer resources or services fraudulently: This refers to obtaining computer resources or services by deception or misrepresentation.
  • 4. • Publishing or transmitting obscene material in electronic form: This refers to the distribution of sexually explicit or offensive material through electronic means, such as email or social media. Publishing or transmitting material which is threatening, abusive, or inflammatory in electronic form: This refers to the distribution of material that is intended to incite violence or hatred, or that is likely to cause fear or alarm, through electronic means. • Cyberstalking: This refers to the use of electronic means to harass or intimidate someone, such as sending repeated threatening messages or posting personal information online without consent.
  • 5. • Identity theft: This refers to the unauthorized use of another person's personal information, such as their name, address, or credit card details, for fraudulent purposes. • Cheating by personation using computer resource: This refers to the use of a computer or other electronic device to impersonate someone else, with the intention of defrauding or misleading others. It is important to note that these actions are punishable under the act, and a person found guilty of any of these actions can be imprisoned and/or fined.