Skip to content


Bare Act Search Results

Home Bare Acts Phrase: usurp

Sign-up to get more results

Unlock complete result pages and premium legal research features.

Start Free Trial

Information Technology Act, 2000 Chapter IX

Title: Penalties, Compensation and Adjudication

State: Central

Year: 2000

.....normal operation of the computer, computer system, or computer network; (ii) "computer database" means a representation of information, knowledge, facts, concepts or instructions in text, image, audio, video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network; (iii) "computer virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource; (iv) "damage" means to destroy, alter, delete, add, modify or rearrange any computer resource by any means. (v) "computer source code" means the listing of programme, computer commands, design and lay out and programme analysis of computer resource in any form." 1[(i) destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any.....

View Complete Act      List Judgments citing this section

Information Technology Act, 2000 Section 43

Title: Penalty and Compensation for Damage to Computer, Computer System, Etc

State: Central

Year: 2000

.....normal operation of the computer, computer system, or computer network; (ii) "computer database" means a representation of information, knowledge, facts, concepts or instructions in text, image, audio, video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network; (iii) "computer virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource; (iv) "damage" means to destroy, alter, delete, add, modify or rearrange any computer resource by any means. (v) "computer source code" means the listing of programme, computer commands, design and lay out and programme analysis of computer resource in any form." 1[(i) destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any.....

View Complete Act      List Judgments citing this section

Code of Criminal Procedure, 1898 Complete Act

State: Central

Year: 1898

.....(2) of Section 5, for the words 'but subject to any enactment', substitute the words 'but, save as otherwise provided by this Code, subject to any enactment'. [W.B. Act 8 of 1970, Section 3 and Sch., item 2]. (1) All offences under the Indian Penal Code shall be investigated, inquired into, tried and otherwise dealt with according to the provisions hereinafter contained. Trial of offences against other laws (2) All offences under any other law shall be investigated, inquired into, tried, and otherwise dealt with according to the same provisions, but subject to any enactment for the time being in force regulating the manner or place of investigating, inquiring into, trying or otherwise dealing with such offences. PART 2 CONSTITUTION AND POWERS OF CRIMINAL COURTS AND OFFICES: CHAPTER 2: OF THE CONSTITUTION OF CRIMINAL COURTS AND OFFICES: SECTION 6: Glasses of Criminal Courts: Besides the High Courts and the Courts constituted under any law other than this Code for the time being in force, there shall be five classes of Criminal Courts in [India], namely,- : State Amendments GUJARAT.-In its application to the State of Gujarat the amendment made in Section 6 is the.....

List Judgments citing this section

Geographical Indications of Goods (Registration and Protection) Act, 1999 Complete Act

State: Central

Year: 1999

.....expressions used and not defined in this Act but defined in the Trade Marks Act, 1999shall have the meanings respectively assigned to them in that Act. (3) In this Act, unless the context otherwise requires, any reference- (a) to the use of a geographical indication shall be construed as a reference to the use of a printed or other visual representation of the geographical indication; (b) to the use of a geographical indication in relation to goods shall be construed as a reference to the use of the geographical indication upon, or in any physical or in any other relation whatsoever, to such goods; (c) to a registered geographical indication shall be construed as including a reference to a geographical indication registered in the register; (d) to the Registrar shall be construed as including a reference to any officer when discharging the functions of the Registrar in pursuance of sub-section (2) of section 3-; (e) to the Geographical Indications Registry shall be construed as including a reference to any office of the Geographical Indications Registry. SECTION 03: REGISTRAR OF GEOGRAPHICAL INDICATIONS (1) The Controller-General of Patents, Designs and Trade Marks appointed.....

List Judgments citing this section

Information Technology Act, 2000 Complete Act

State: Central

Year: 2000

.....record is retained intact or has been altered since such electronic record was so affixed with the digital signature. (2) Any reference in this Act to any enactment or any provision thereof shall, in relation to an area in which such enactment or such provision is not in force, be construed as a reference to the corresponding law or the relevant provision of the corresponding law, if any, in force in that area. SECTION 03: AUTHENTICATION OF ELECTRONIC RECORDS (1) Subject to the provisions of this section any subscriber may authenticate an electronic record by affixing his digital signature. (2) The authentication of the electronic record shall be effected by the use of asymmetric crypto system and hash function which envelop and transform the initial electronic record into another electronic record. Explanation."For the purposes of this sub-section, "hash function" means an algorithm mapping or translation of one sequence of bits into another, generally smaller, set known as "hash result" such that an electronic record yields the same hash result every time the algorithm is executed with the same electronic record as its input making it computationally infeasible" (a).....

List Judgments citing this section

  • << Prev.
  • Next >>

Sign-up to get more results

Unlock complete result pages and premium legal research features.

Start Free Trial

Save Judgments// Add Notes // Store Search Result sets // Organize Client Files //