You are on page 1of 5

Information Technology Act, 2000 (India)

The Information Technology Act, 2000 also Known as an IT Act is an act proposed by the
Indian Parliament reported on 17th October 2000. This Information Technology Act is
based on the United Nations Model law on Electronic Commerce 1996 (UNCITRAL
Model) which was suggested by the General Assembly of United Nations by a resolution
dated on 30th January, 1997. It is the most important law in India dealing with Cybercrime
and E-Commerce.
The main objective of this act is to carry lawful and trustworthy electronic, digital and
online transactions and alleviate or reduce cybercrimes. The IT Act has 13 chapters and
90 sections. The last four sections that starts from ‘section 91 – section 94’, deals with the
revisions to the Indian Penal Code 1860.
The IT Act, 2000 has two schedules:
 First Schedule –
Deals with documents to which the Act shall not apply.
 Second Schedule –
Deals with electronic signature or electronic authentication method.
The offences and the punishments in IT Act 2000 :
The offences and the punishments that falls under the IT Act, 2000 are as follows :-
1. Tampering with the computer source documents.
2. Directions of Controller to a subscriber to extend facilities to decrypt information.
3. Publishing of information which is obscene in electronic form.
4. Penalty for breach of confidentiality and privacy.
5. Hacking for malicious purposes.
6. Penalty for publishing Digital Signature Certificate false in certain particulars.
7. Penalty for misrepresentation.
8. Confiscation.
9. Power to investigate offences.
10. Protected System.
11. Penalties for confiscation not to interfere with other punishments.
12. Act to apply for offence or contravention committed outside India.
13. Publication for fraud purposes.
14. Power of Controller to give directions.

Sections and Punishments under Information Technology Act, 2000 are as follows :

SECTION PUNISHMENT

This section of IT Act, 2000 states that any act of destroying, altering
or stealing computer system/network or deleting data with malicious
intentions without authorization from owner of the computer is liable
Section 43 for the payment to be made to owner as compensation for damages.

Section This section of IT Act, 2000 states that any corporate body dealing with
43A sensitive information that fails to implement reasonable security
practices causing loss of other person will also liable as convict for
compensation to the affected party.

Hacking of a Computer System with malicious intentions like fraud will


be punished with 3 years imprisonment or the fine of Rs.5,00,000 or
Section 66 both.

Section 66 Fraud or dishonesty using or transmitting information or identity theft


B, C, D is punishable with 3 years imprisonment or Rs. 1,00,000 fine or both.

Section 66 This Section is for Violation of privacy by transmitting image of private


E area is punishable with 3 years imprisonment or 2,00,000 fine or both.

This Section is on Cyber Terrorism affecting unity, integrity, security,


Section 66 sovereignty of India through digital medium is liable for life
F imprisonment.

This section states publishing obscene information or pornography or


transmission of obscene content in public is liable for imprisonment
Section 67 up to 5 years or fine of Rs. 10,00,000 or both.

Hacking: Hacking in cyber security refers to the misuse of devices like computers,
smartphones, tablets, and networks to cause damage to or corrupt systems, gather
information on users, steal data and documents, or disrupt data-related activity.

A traditional view of hackers is a lone rogue programmer who is highly skilled in coding
and modifying computer software and hardware systems. But this narrow view does not
cover the true technical nature of hacking. Hackers are increasingly growing in
sophistication, using stealthy attack methods designed to go completely unnoticed by
cyber security software and IT teams. They are also highly skilled in creating attack
vectors that trick users into opening malicious attachments or links and freely giving up
their sensitive personal data.

As a result, modern-day hacking involves far more than just an angry kid in their
bedroom. It is a multibillion-dollar industry with extremely sophisticated and successful
techniques.

Teenage web vandals:- Teenage web vandals are young individuals, often in their teenage
years, who engage in disruptive or malicious activities on the internet. They typically use
their computer skills to cause trouble online. Some common actions of teenage web vandals
include:
1. Hacking: They might break into computer systems, websites, or online accounts without
permission. This is illegal and can lead to serious consequences.

2. Defacement: Web vandals may alter the appearance or content of websites, replacing it
with their own messages, images, or graffiti, which can be offensive or disruptive.

3. Disruption: They may engage in activities like distributed denial of service (DDoS) attacks
to overwhelm websites, making them unavailable to users.

4. Cyberbullying: Some teenage web vandals use the internet to harass, threaten, or spread
false information about others, causing harm and emotional distress.

5. Unauthorized Access: They might gain access to private or personal information, such as
email accounts, social media profiles, or sensitive data, without permission.

Teenage web vandals often act out of curiosity, a desire for attention, or to showcase their
technical skills. However, their actions can have serious consequences, both legally and
socially. Engaging in such activities is not only unethical but also harmful to individuals,
organizations, and the online community. It's important for young people to be educated
about responsible and legal internet behavior.

Cyber Fraud:

Cyber fraud is a type of crime that occurs in the digital or online world. It involves dishonest
or illegal activities where individuals or groups use the internet and technology to deceive
others and gain financial or personal benefits. Here are some common forms of cyber fraud:

Phishing: Cybercriminals send fake emails or messages that appear to be from reputable
sources, tricking people into revealing sensitive information like passwords, credit card
details, or personal data.

Online Scams: Scammers create fake websites, profiles, or offers to steal money or personal
information from unsuspecting victims. This includes lottery scams, online shopping fraud,
and advance-fee fraud.

Identity Theft: Criminals steal someone's personal information to impersonate them online,
often to commit financial fraud, open fraudulent accounts, or engage in other criminal
activities.
Credit Card Fraud: Unauthorized use of someone else's credit card information to make
purchases or withdrawals.

Investment Scams: Promising high returns, fraudsters trick individuals into investing in fake
or nonexistent ventures.

Cheating:

Cheating in the context of the internet and technology can refer to various dishonest
practices, depending on the situation. Here are a few examples:

Online Gaming Cheating: Some players use cheat codes, hacks, or unauthorized software to
gain an unfair advantage in online video games, which ruins the experience for others.

Academic Cheating: In online education or exams, students may use unauthorized materials
or assistance to get higher grades, which is considered dishonest and can lead to academic
penalties.

Cheating in Online Relationships: People may pretend to be someone else or engage in


deceptive behavior in online dating or relationships, leading to emotional harm or fraud.

Cheating in Online Competitions: In online contests, individuals or teams might use


unethical methods to win prizes or recognition, such as manipulating votes or engaging in
unfair practices.

Defamation: - Defamation is a legal term that refers to making false statements about
someone that harm their reputation. These false statements can be spoken (slander) or
written (libel), and they must meet specific criteria to be considered defamation. Here's a
simplified explanation:

False Statements: Defamation involves making untrue statements about someone, whether
through spoken words, written text, or other forms of communication.

Harm to Reputation: These false statements must harm the person's reputation in some way.
This harm can be in the form of damage to their character, public image, or professional
standing.
Publication: The false statements need to be communicated to a third party, which means
they are shared with someone other than the person making the statement and the person
being defamed.

You might also like