Bare Act Search Results
Home Bare Acts Phrase: computer resourceInformation Technology Act, 2000 Section 69
Title: Power to Issue Directions for Interception or Monitoring or Decryption of Any Information Through Any Computer Resource
State: Central
Year: 2000
.....to the commission of any cognizable offence relating to above or for investigation of any offence, it may subject to the provisions of sub-section (2), for reasons to be recorded in writing, by order, direct any agency of the appropriate Government to intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any information generated, transmitted, received or stored in any computer resource. (2) The procedure and safeguards subject to which such interception or monitoring or decryption may be carried out, shall be such as may be prescribed. (3) The subscriber or intermediary or any person in-charge of the computer resource shall, when called upon by any agency referred to in sub-section (1), extend all facilities and technical assistance to- (a) provide access to or secure access to the computer resource generating transmitting, receiving or storing such information; or (b) intercept, monitor, or decrypt the information, as the case may be; or (c) provide information stored in computer resource. (4) The subscriber or intermediary or any person who fails to assist the agency referred to in sub-section (3) shall be punished with.....
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Section 69B
Title: Power to Authorise to Monitor and Collect Traffic Data or Information Through Any Computer Resource for Cyber Security
State: Central
Year: 2000
.....or information. (3) The procedure and safeguards for monitoring and collecting traffic data or information, shall be such as may be prescribed. (4) Any intermediary who intentionally or knowingly contravenes the provisions of sub-section (2) shall be punished with an imprisonment for a term which any extend to three years and shall also be liable to fine. Explanation.-For the purposes of this section,- (i) "computer contaminant" shall have the meaning assigned to it in section 43; (ii) "traffic data" means any data identifying or purporting to identify any person, computer system or computer network or location to or from which the communication is or may be transmitted and includes communications origin, destination, route, time, data, size, duration or type of underlying service and any other information.] __________________ 1. Inserted vide Information Technology (Amendment) Act, 2008.
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Section 66B
Title: Punishment for Dishonestly Receiving Stolen Computer Resource or Communication Device.
State: Central
Year: 2000
1[66B.Punishment for dishonestly receiving stolen computer resource or communication device.- Whoever dishonestly received or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both. ______________________ 1. Inserted vide Information Technology (Amendment) Act, 2008.
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Section 66D
Title: Punishment for Cheating by Personation by Using Computer Resource.
State: Central
Year: 2000
1[66D. Punishment for cheating by personation by using computer resource.- Whoever, by means for any communication device or computer resource cheats by personating, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupee. ] ______________________ 1. Inserted vide Information Technology (Amendment) Act, 2008.
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Section 69A
Title: Power to Issue Directions for Blocking for Public Access of Any Information Through Any Computer Resource
State: Central
Year: 2000
.....so to do in the interest of sovereignty and integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above, it may subject to the provisions of sub-section (2) for reasons to be recorded in writing, by order, direct any agency of the Government or intermediary to block for access by the public or cause to be blocked for access by the public any information generated, transmitted, received, stored or hosted in any computer resource. (2) The procedure and safeguards subject to which such blocking for access by the public may be carried out, shall be such as may be prescribed. (3) The intermediary who fails to comply with the direction issued under sub-section (1) shall be punished with an imprisonment for a term which may extend to seven years and also be liable to fine. __________________ 1. Inserted vide Information Technology (Amendment) Act, 2008.
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Section 43
Title: Penalty and Compensation for Damage to Computer, Computer System, Etc
State: Central
Year: 2000
.....normal operation of the computer, computer system, or computer network; (ii) "computer database" means a representation of information, knowledge, facts, concepts or instructions in text, image, audio, video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network; (iii) "computer virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource; (iv) "damage" means to destroy, alter, delete, add, modify or rearrange any computer resource by any means. (v) "computer source code" means the listing of programme, computer commands, design and lay out and programme analysis of computer resource in any form." 1[(i) destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any.....
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Section 65
Title: Tampering with Computer Source Documents
State: Central
Year: 2000
Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy, or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. Explanation.For the purposes of this section, "computer source code" means the listing of programmes, computer commands, design and layout and programme analysis of computer resource in any form.
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Section 66
Title: Computer Related Offences
State: Central
Year: 2000
1[66. Computer related offences.-- If any person, dishonestly or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both. Explanation.-- For the purposes of this section,-- (a) the word "dishonestly" shall have the meaning assigned to it in section 24 of the Indian Penal Code;(45 of 1860). (b) the word "fraudulently" shall have the meaning assigned to it in section 25 of the Indian Penal Code(45 of 1860).] _________________ 1. Substituted vide Information Technology (Amendment) Act, 2008 Prior to substitution text read as under :- (1) Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hacking. (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend upto two lakh rupees, or with both.
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Chapter XI
Title: Offences
State: Central
Year: 2000
.....Act, 2008. Section 71 - Penalty for misrepresentation Whoever makes any misrepresentation to, or suppresses any material fact from the Controller or the Certifying Authority for obtaining any licence or 1[Electronic]Digital Signature Certificate, as the case may be, shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both. _____________________________________________________________________________________________ 1. Substituted vide Information Technology (Amendment) Act, 2008. Previous text was digital Section 72 - Penalty for Breach of confidentiality and privacy Save as otherwise provided in this Act or any other law for the time being in force, if any person who, in pursuance of any of the powers conferred under this Act, rules or regulations made thereunder, has secured access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned discloses such electronic record, book, register, correspondence, information, document or other material to any other person shall be.....
View Complete Act List Judgments citing this sectionInformation Technology Act, 2000 Amending Act 1
Title: Information Technology (Amendment) Act, 2008
State: Central
Year: 2000
.....appropriate Government may authorise the service providers to collect, retain and appropriate service charges under this section notwithstanding the fact that there is no express provision under the Act, rule, regulation or notification under which the service is provided to collect, retain and appropriate e-service charges by the service providers. (4) The appropriate Government shall, by notification in the Official Gazette, specify the scale of service charges which may be charged and collected by the service providers under this section: Provided that the appropriate Government may specify different scale of service charges for different types of services.'. 8. Insertion of new section 7A After section 7 of the principal Act, the following section shall be inserted, namely:-- "7A. Audit of documents, etc., maintained in electronic form.-- Where in any law for the time being in force, there is a provision for audit of documents, records or information, that provision shall also be applicable for audit of documents, records or information processed and maintained in the electronic form.". 9. Insertion of new section 10A After section 10 of the principal Act, the.....
View Complete Act List Judgments citing this section- << Prev.
- Next >>
Sign-up to get more results
Unlock complete result pages and premium legal research features.
Start Free Trial