
Your Action | Section Applicable. |
---|---|
Tampering with computer source Documents | Sec.65 |
Hacking with computer systems , Data Alteration | Sec.66 |
Sending offensive messages through communication service, etc | Sec.66A |
Dishonestly receiving stolen computer resource or communication device | Sec.66B |
Identity theft | Sec.66C |
Cheating by personation by using computer resource | Sec.66D |
Violation of privacy | Sec.66E |
Cyber terrorism | Sec.66F |
Publishing or transmitting obscene material in electronic form | Sec.67 |
Publishing or transmitting of material containing sexually explicit act, etc. in electronic form | Sec.67A |
Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form | Sec.67B |
Preservation and Retention of information by intermediaries | Sec.67C |
Powers to issue directions for interception or monitoring or decryption of any information through any computer resource | Sec.69 |
Power to issue directions for blocking for public access of any information through any computer resource | Sec.69A |
Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security | Sec.69B |
Un-authorized access to protected system | Sec.70 |
Penalty for misrepresentation | Sec.71 |
Breach of confidentiality and privacy | Sec.72 |
Publishing False digital signature certificates | Sec.73 |
Publication for fraudulent purpose | Sec.74 |
Act to apply for offence or contraventions committed outside India | Sec.75 |
Compensation, penalties or confiscation not to interfere with other punishment | Sec.77 |
Compounding of Offences | Sec.77A |
Offences with three years imprisonment to be cognizable | Sec.77B |
Exemption from liability of intermediary in certain cases | Sec.79 |
Punishment for abetment of offences | Sec.84B |
Punishment for attempt to commit offences | Sec.84C |
Offences by Companies | Sec.85 |
Note : Sec.78 of I.T. Act empowers Police Inspector to investigate cases falling under this Act
Sending threatening messages by e-mail | Sec.503 IPC |
Word, gesture or act intended to insult the modesty of a woman | Sec.509 IPC |
Sending defamatory messages by e-mail | Sec.499 IPC |
Bogus websites , Cyber Frauds | Sec.420 IPC |
E-mail Spoofing | Sec.463 IPC |
Making a false document | Sec.464 IPC |
Forgery for purpose of cheating | Sec.468 IPC |
Orgery for purpose of harming reputation | Sec.469 IPC |
Web-Jacking | Sec.383 IPC |
E-mail Abuse | Sec.500 IPC |
Punishment for criminal intimidation | Sec.506 IPC |
Criminal intimidation by an anonymous communication | Sec.507 IPC |
When copyright infringed:- Copyright in a work shall be deemed to be infringed | Sec.51 |
Offence of infringement of copyright or other rights conferred by this Act. Any person who knowingly infringes or abets the infringement of | Sec.63 |
Enhanced penalty on second and subsequent covictions | Sec.63A |
Knowing use of infringing copy of computer programme to be an offence | Sec.63B |
Obscenity | Sec.292 IPC |
Printing etc. of grossly indecent or scurrilous matter or matter intended for blackmail | Sec.292A IPC |
Sale, etc., of obscene objects to young person | Sec.293 IPC |
Obscene acts and songs | Sec.294 IPC |
Theft of Computer Hardware | Sec.378 |
Punishment for theft
|
Sec.379 |
Viruses are programs which affect available files on the computer & spread over networks using internet.
As per IT act,2000, publishing, transmitting & causing to be published any porn material in electronic format is considered as cyber crime. There are millions of websites which includes pornography material online.
Program source code is most important asset of any organization. Source code theft is common in software/IT companies.
Sale & Purchase through net There are web site which offer sale and shipment off contrabands drugs They may use the techniques of stenography for hiding the messages. Depending upon illegal iteams,provisions of narcotic drugs,psycotropic substance act,arms act,wild life related laws can also be applied.
Mobile Phones have become popular means of communications. SMS forging is method to spoof identity of SMS. Call Forging is method to spoof caller ID of Call.