100% found this document useful (1 vote)
556 views5 pages

Cyber Contravention

This document outlines the penalties, adjudication system, and appellate tribunal process for cyber crimes and contraventions under the Indian IT Act of 2000. It discusses penalties for unauthorized computer access, data theft, introducing viruses, and other harms. Adjudication is handled by the Controller of Certifying Authorities and Adjudicating Officer, with appeals going to the Appellate Tribunal. The tribunal has civil court powers and defendants can further appeal to the High Court within specified time periods. The document distinguishes between cyber contraventions and offenses and provides definitions for relevant terms.

Uploaded by

Aman Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
556 views5 pages

Cyber Contravention

This document outlines the penalties, adjudication system, and appellate tribunal process for cyber crimes and contraventions under the Indian IT Act of 2000. It discusses penalties for unauthorized computer access, data theft, introducing viruses, and other harms. Adjudication is handled by the Controller of Certifying Authorities and Adjudicating Officer, with appeals going to the Appellate Tribunal. The tribunal has civil court powers and defendants can further appeal to the High Court within specified time periods. The document distinguishes between cyber contraventions and offenses and provides definitions for relevant terms.

Uploaded by

Aman Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CHAPTER

9
CYBER CONTRAVENTIONS,
ADJUDICATION, APPELLATE
TRIBUNAL AND OFFENCES
CHAPTER OUTLINE
9.1 Introduction
9.2 Penalties and Compensation
9.3 Justice dispensation system for Cyber Crimes under IT Act
9.4 The Appellate Tribunal (AT)
9.5 Distinction between Cyber Contraventions and Cyber Offences
9.6 Compounding of Contraventions
9.7 Offences
9.8 Compounding of Offences (Sec. 77A)

9.1 INTRODUCTION
The Act has provided legal protection to the owner of computer resources
against cyber crimes. Any illegal act or unauthorized use of the computer
system constitutes cyber crime. It may be in the form of contravention or
offence. Secs. 43 to 47 of the Act deal with contraventions, penalties and
their adjudication. Chapter X of the IT Act, 2000 provides for the estab-
lishment of Cyber Appellate Tribunal to exercise jurisdiction, powers and
authority as conferred under the Act.

9.2 PENALTIES AND COMPENSATION


Chapter IX of the Act provides for the following penalties :
115
Para 9.2 UNIT IV - REGULATORY FRAMEWORK 116

1. Penalty and compensation for damage to computer, computer sys-


tem (CS) or computer network (CNW) (Sec. 43). This section states
that if a person commits any of the following prohibited acts, he
shall be liable to pay damages by way of compensation not exceed-
ing ` 1 crore to the affected party :
(i) Access without authority. If he accesses or secures access to
such computer, computer system or computer network.
(ii) Downloading, copying or extracting any data without autho-
rity. If he downloads, copies or extracts any data, computer
data base or information from such computer, computer sys-
tem or computer network.
(iii) Introduction of computer contaminant/virus. If he introduces
or causes to be introduced any computer contaminant or com-
puter virus into any computer, computer system or computer
network including information or data held or stored in any
removable storage medium.
(iv) Damage to computer database. If he damages or causes to be
damaged any computer, computer system or computer net-
work, data, computer data base or any other programmes
residing in such computer, computer system or computer
network.
(v) Disruption of computer, computer system or computer net-
work. If he disrupts or causes disruption to the stated com-
puter resources.
(vi) Denial of access. If he denies or causes to denial of access to
any person authorized to access any computer, computer sys-
tem or computer network by any means.
(vii) Providing assistance to facilitate access. If he provides any
assistance to any person to facilitate access to a computer,
computer system or computer network in contravention of
the provisions of this Act, rules or regulations made there-
under.
(viii) Charging the services to the account of another. If he charges
the services availed of by a person to the account of another
person by tempering with or manipulating any computer CS
or CNW.
(ix) Destruction, deletion or alteration or information. If he
destroys, deletes or alters any information residing in a com-
puter resource or diminishes its value or utility or affects it
injuriously by any means.
117 CH. 9 - CYBER APPELLATE TRIBUNAL & OFFENCES Para 9.2

(x) Stealing, concealing or destroying computer source code. If


he steals, conceals, destroys or alters or causes any person to
steal, conceal, destroy, or alter any computer source code used
for a computer resource with an intention to cause damage.
[Inserted vide ITAA, 2008].
Explanation of terms used under section 43
(i) “Computer Contaminant” means any set of computer instructions
that are designed (a) to modify, destroy, record, transmit data or
programme residing within a computer, CS or CNW ; or (b) to seize
illegally by any means the normal operations of the computer, or
CNW.
(ii) “Computer Database” means a representation of information, know-
ledge, facts, concepts or instructions in text, image, audio, video that
are being prepared or have been prepared in a formalized manner
or have been produced by a computer, CS or CNW and are intended
for use in a computer, CS or CNW.
(iii) “Computer Virus” means any computer instruction, information,
data or programme that destroys, damages and degrades or ad-
versely affects the performance of a computer resource or attaches
itself to another computer resource and operates when a
programme, data or instruction is executed or some other event
takes place in that computer resource.
(iv) “Damage” means to destroy, alter, delete, add, modify or rearrange
any computer resource by any means.
(v) “Computer Source Code” means the listing of programmes, com-
puter commands, design and layout and programme analysis of com-
puter resource in any form.
2. Compensation for failure to protect data [43A, Inserted vide ITAA, 2008].
This section provides that if a body corporate, processing, dealing or han-
dling any sensitive personal data or information in a computer resource
which it owns, controls or operates, is negligent in implementing and main-
taining reasonable security practices and procedures and thereby causes
wrongful loss or gain to any person, such body corporate shall be liable to
pay damages by way of compensation not exceeding ` 5 crore to the
affected party.
Explanation of terms used under section 43A
(i) “Body Corporate” means any company and includes a firm, sole
proprietorship or other association of individuals engaged in com-
mercial or professional activities.
(ii) “Reasonable Security Practices and Procedures” means security
practices and procedures designed to protect such information from
Para 9.3 UNIT IV - REGULATORY FRAMEWORK 118

unauthorized access, damage, use, modification, disclosure or im-


pairment, as may be specified in an agreement between the parties
or as may be specified in any law for the time being in force and in
the absence of such agreement or any law, such reasonable secu-
rity practices and procedures, as may be prescribed by the Central
Government in consultation with such professional bodies, or asso-
ciations as it may deem fit.
(iii) “Sensitive Personal Data or Information” means such personal in-
formation as may be prescribed by the Central Government in con-
sultation with such professional bodies or associations as it may
deem fit.
3. Penalty for failure to furnish information, return or report (Sec. 44).
This section provides for the following penalties for a person who has to
fulfil some legal requirements under this Act, rules or regulations made
thereunder :
(i) Penalty for failure in furnishing any document, return or report to
CCA or CA. He shall be liable to a penalty not exceeding ` 1,50,000
for each such failure.
(ii) Penalty for failure in filing return or furnishing information, books
or other documents within the specified time. He shall be liable to a
penalty not exceeding ` 5,000 for every day during which such fai-
lure continues.
(iii) Penalty for failure in maintenance of books of account or records.
He shall be liable to a penalty not exceeding ` 10,000 for every day
during which the failure continues.
4. Penalty for contravention of rules or regulations (Sec. 45). This section
provides that if any person contravenes any rules or regulations made
under this Act, for the contravention of which no penalty has been pres-
cribed, he shall be liable to pay compensation not exceeding ` 25,000 to
the person affected by such contravention.

9.3 JUSTICE DISPENSATION SYSTEM FOR CYBER CRIMES


UNDER IT ACT, 2000
The IT Act, 2000 provides the following authorities for justice dispensation
system for cyber crimes.
u Controller of Certifying Authorities (CCA)
u Adjudicating Officer (AO)
u Appellate Tribunal (AT)
u High Court
119 CH. 9 - CYBER APPELLATE TRIBUNAL & OFFENCES Para 9.3

Authorities for Justice Dispensation System for Cyber Crimes

High Court


Appeal against the or-
der of AT within 60 days
or extended period of
further 60 days

Appellate Tribunal (AT)


Powers of a Civil Court
conferred on the AT
▼ ▼ A p der n d e
p e day -
ed 45 ts or

or e x t
p e wit d p
rio s

or

a l hin e r
i

d
te in st
ex ith ain

a g 45 i o d
e
or r w l ag

ai
n s day
de pea

nd

t
Ap

its
s

Controller of Certifying Authority Adjudicating Officer


u Acts as a regulator of u Deals with contraventions
Certifying Authorities under the IT Act
u Ensure adherence to the u Exercises powers of a Civil
provisions of IT Act Court
u Jurisdiction to adjudicate
matters for claims upto ` 5
crore

FIG. 9 : JUSTICE DISPENSATION SYSTEM FOR CYBER CRIMES


UNDER IT ACT, 2000
Note : various provisions relating to CCA have been explained in Chapter 8

You might also like