Some important sections of the IT Act, 2000 and their penalties:-
Vijay Singh
InfoSec & Privacy Specialist || Zero Trust Auth* || TPRM || Lead Auditor ISO 27001:2022|| ISO 27701:2019 || GDPR/Data Security & Privacy || DPDPA-2023 || Azure/ AWS Security || Threat/Vulnerability Management
1. Section 43: Penalty for unauthorized access, damage to computer systems, and data theft.
??- Penalty: Imprisonment for up to three years or a fine of up to ?500,000 or both.
2. Section 66: Offense of computer-related offenses, including hacking.
??- Penalty: Imprisonment for up to three years or a fine of up to ?500,000 or both.
3. Section 66C: Identity theft.
??- Penalty: Imprisonment for up to three years and a fine of up to ?1,000,000.
4. Section 66D: Cheating by personation using a computer resource.
??- Penalty: Imprisonment for up to three years and a fine of up to ?1,000,000.
5. Section 66E: Violation of privacy by capturing, publishing, or transmitting images of a private area of any person.
??- Penalty: Imprisonment for up to three years and a fine of up to ?200,000.
6. Section 66F: Cyber terrorism.
领英推荐
??- Penalty: Imprisonment for life.
7. Section 67: Publishing or transmitting obscene material in electronic form.
??- Penalty: Imprisonment for up to three years and a fine of up to ?500,000 for the first offense. For subsequent offenses, the imprisonment may extend up to five years, and the fine may increase to ?1,000,000.
8. Section 67A: Publishing or transmitting sexually explicit material.
??- Penalty: Imprisonment for up to seven years and a fine.
9. Section 67B: Publishing or transmitting child pornography.
??- Penalty: Imprisonment for up to five years and a fine.
10. Section 72: Breach of confidentiality and privacy of information.
???- Penalty: Imprisonment for up to two years or a fine of up to ?1,000,000 or both.
It's important to note that the penalties mentioned above are subject to the discretion of the courts and may vary based on the specific circumstances of each case. The IT Act, 2000, provides a legal framework to address cybercrimes and protect individuals and organizations from various online offenses.