Sec.65
2. Hacking with computer systems , Data Alteration
2. Hacking with computer systems , Data Alteration
Sec.66
3. Sending offensive messages through communication service, etc
3. Sending offensive messages through communication service, etc
Sec.66A
4. Dishonestly receiving stolen computer resource or communication device
4. Dishonestly receiving stolen computer resource or communication device
Sec.66B
5. Identity theft
5. Identity theft
Sec.66C
6. Cheating by personation by using computer resource
6. Cheating by personation by using computer resource
Sec.66D
7. Violation of privacy
7. Violation of privacy
Sec.66E
8. Cyber terrorism Sec.66F
9. Publishing or transmitting obscene material in electronic form
8. Cyber terrorism Sec.66F
9. Publishing or transmitting obscene material in electronic form
Sec .67
10. Publishing or transmitting of material containing sexually explicit act, etc. in
electronic form
10. Publishing or transmitting of material containing sexually explicit act, etc. in
electronic form
Sec.67A
11. Punishment for publishing or transmitting of material depicting children in
sexually explicit act, etc. in electronic form
11. Punishment for publishing or transmitting of material depicting children in
sexually explicit act, etc. in electronic form
Sec.67B
12. Preservation and Retention of information by intermediaries
12. Preservation and Retention of information by intermediaries
Sec.67C
13. Powers to issue directions for interception or monitoring or decryption of any
information through any computer resource
13. Powers to issue directions for interception or monitoring or decryption of any
information through any computer resource
Sec.69
14. Power to issue directions for blocking for public access of any information
through any computer resource
14. Power to issue directions for blocking for public access of any information
through any computer resource
Sec.69A
15. Power to authorize to monitor and collect traffic data or information through
any computer resource for Cyber Security
15. Power to authorize to monitor and collect traffic data or information through
any computer resource for Cyber Security
Sec.69B
16. Un-authorized access to protected system
16. Un-authorized access to protected system
Sec.70
17. Penalty for misrepresentation
17. Penalty for misrepresentation
Sec.71
18. Breach of confidentiality and privacy
18. Breach of confidentiality and privacy
Sec.72
19. Publishing False digital signature certificates
19. Publishing False digital signature certificates
Sec.73
20. Publication for fraudulent purpose
20. Publication for fraudulent purpose
Sec.74
21. Act to apply for offence or contraventions committed outside India
21. Act to apply for offence or contraventions committed outside India
Sec.75
22. Compensation, penalties or confiscation not to interfere with other
punishment
22. Compensation, penalties or confiscation not to interfere with other
punishment
Sec.77
23. Compounding of Offences
23. Compounding of Offences
Sec.77A
24. Offences with three years imprisonment to be cognizable
24. Offences with three years imprisonment to be cognizable
Sec.77B
25. Exemption from liability of intermediary in certain cases
25. Exemption from liability of intermediary in certain cases
Sec.79
26. Punishment for abetment of offences
26. Punishment for abetment of offences
Sec.84B
27. Punishment for attempt to commit offences
27. Punishment for attempt to commit offences
Sec.84C
28. Offences by Companies
28. Offences by Companies
Sec.85
No comments:
Post a Comment