Information Technology Act, 2000: Ca Intermediate
Information Technology Act, 2000: Ca Intermediate
Information Technology Act, 2000: Ca Intermediate
CHAPTER 6
INFORMATION
TECHNOLOGY ACT, 2000
CA-INTER | Ch. 6 – IT Act, 2000
CHAPTER 6
INFORMATION TECHNOLOGY ACT, 2000
This Act aims to provide the legal infrastructure for e-commerce in India. And the cyber
laws have a major impact for e-businesses and the new economy in India. So, it is
important to understand what are the various perspectives of the IT Act, 2000 (as amended
in 2008) and what it offers.
From the perspective of e-commerce in India, the IT Act 2000 and its provisions
contain many positive aspects which are as follows:
209
PRIVACY
The main principles on data protection & privacy enumerated under the IT Act, 2000 are:
i. creating civil liability if any person accesses or secures access to computer,
computer system or computer network
ii. creating criminal liability if any person accesses or secures access to computer,
computer system or computer network
iii. declaring any computer, computer system as a protected system
iv. imposing penalty for breach of confidentiality and privacy
v. setting up of hierarchy of regulatory authorities, namely adjudicating officers, the
Cyber Regulations Appellate Tribunal etc.
For the banks, the Act exposes them to both civil and criminal liability.
- The civil liability could consist of exposure to pay damages by way of compensation up
to 5 crores.
- There may also be exposure to criminal liability to the top management of the banks
and exposure to criminal liability could consist of imprisonment for a term which would
extend from three years to life imprisonment and also fine.
I. Cyber Crimes
Cybercrime also known as computer crime is a crime that involves use of a computer and a
network. The computer may have been used in committing a crime, or it may be the target.
Cybercrimes is defined as: “Offences that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the reputation of the victim or cause
physical or mental harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and
mobile phones.
210
The United Nations Manual on the Prevention and Control of Computer Related Crime classifies
such crimes into following categories:
- Committing of a fraud by manipulation of the input, output, or throughput of a computer
based system.
- Computer forgery, which involves changing images or data stored in computers,
- Deliberate damage caused to computer data or programs through virus or logic bombs,
- Unauthorized access to computers by 'hacking' into systems or stealing passwords, and,
- Unauthorized reproduction of computer programs or software piracy.
- Cybercrimes have grown big with some countries promoting it to attack another country's
security and financial health.
Banking sector is prone to high risks by cyber criminals as banks deal with money and using
technology, frauds can be committed across geographical boundaries without leaving a trace.
Hence, CBS and banking software is expected to have high level of controls covering all aspects
of cyber security.
Some examples of offences in IT Act which could impact banks are as follows:
required to be kept or maintained by law for the time being in force, shall be punishable with
imprisonment up to three years, or with fine which may extend up to 2 lakh rupees, or both.
[upto 3 years or fine upto 2 Lacs or BOTH]
212
Reasonable Security Practices and Procedures and Sensitive Personal Data or Information
Rules 2011 formed under section 43A of the Information Technology Act 2000 define a
data protection framework for the processing of digital data by Body Corporate.
Definition of Personal and Sensitive Personal data: Rule 2(i) defines personal
information as "information that relates to a natural person which either directly or
indirectly, in combination with other information available or likely to be available with a
body corporate, is capable of identifying such person."
The present definition of personal data hinges on the factor of identification (data that is
capable of identifying a person).
By listing specific categories of sensitive personal information, the Rules do not account
for additional types of sensitive personal information that might be generated or correlated
through the use of Big Data analytics.
Definitions
2(a) "Access" with its grammatical variations and cognate expressions means gaining
entry into, instructing or communicating with the logical, arithmetical, or memory function
resources of a computer, computer system or computer network;
(i) "Computer" means any electronic, magnetic, optical or other high-speed data
processing device or system which performs logical, arithmetic, and memory functions
by manipulations of electronic, magnetic or optical impulses, and includes all input,
output, processing, storage, computer software, or communication facilities which are
connected or related to the computer in a computer system or computer network;
(i) the use of satellite, microwave, terrestrial line, wire, wireless or other
communication media; and
(ii) terminals or a complex consisting of two or more interconnected computers or
communication device whether or not the interconnection is continuously
maintained;
2(v) "Information" includes data, message, text, images, sound, voice, codes, computer
programmes, software and databases or micro film or computer generated micro fiche;
In a cyber-crime, computer or the data are the target or the object of offence or a tool in
committing some other offence. The definition of term computer elaborates that computer
is not only the computer or laptop on our tables, as per the definition computer means any
electronic, magnetic, optical or other high speed data processing devise of system which
performs logical, arithmetic and memory function by manipulations of electronic,
magnetic or optical impulses, and includes all input, output, processing, storage, computer
software or communication facilities which are connected or related to the computer in a
computer system or computer network. Thus, the definition is much wider to include
mobile phones, automatic washing machines, micro wave ovens etc.
215
1. The positive aspects of The Information which would extend from three years
Technology Act, 2000 are: to life imprisonment
a. IT Act gave legal recognition to c. Either ‘a’ or ‘b’
Digital Signature as a method of d. Both ‘a’ and ‘b’
authentication.
b. It recognizes Book keeping in e- 5. Under which section of The IT Act,
forms. 2000 is a person punished for ‘Identity
c. Email would now be a valid and Theft’ the punishment for which the
legal form of communication in offender shall be punished with
India that can be duly produced and imprisonment of either description for a
approved in a court of law. term which may extend to three years
d. All of the above and shall also be liable to fine which
may extend to rupees one lakh?
2. The main principles on data protection a. Section 66-C
and privacy enumerated under The IT b. Section 66-D
Act, 2000 are: c. Section 65
a. Creating civil and criminal liability d. Section 66
if any person accesses or secures
access to computer, computer system 6. According to Section 66-D: Punishment
or computer network. for cheating by personation by using
b. Imposing imprisonment for breach computer resource, the offender shall be
of confidentiality and privacy punished with
c. Both ‘a’ and ‘b’ a. Imprisonment of either description
d. None of the above for a term which may extend to three
years
3. Which section of the IT Act, 2000 b. Shall be liable to fine which may
provides the legal framework for extend to one lakh rupees
electronic governance by giving c. Either ‘a’ or ‘b’
recognition to electronic records. d. Both ‘a’ and ‘b’
a. Sec 2
b. Sec 5 7. Whoever knowingly or intentionally
c. Sec 4 conceals, destroys or alters or
d. None of the above intentionally or knowingly causes
another to conceal, destroy or alter any
4. The IT Act, 2000 exposes the banks to computer source code used for a
a. Civil liability which could consist of computer, computer program, computer
exposure to pay damages by way of system or computer network, when the
compensation up to 5 crores. computer source code is required to be
b. Criminal liability to the top kept or maintained by law for the time
management of the banks and being in force, shall be punishable with
exposure to criminal liability could a. Imprisonment up to three years
consist of imprisonment for a term 216
ANSWERS
1 2 3 4 5
(d) (a) (c) (d) (a)
6 7 8 9 10
(d) (d) (b) (d) (c)
217
218