We all are facing the problem of Hacking in one or the other way. But do we all know about the laws in which that culprit "Cracker" can really be punished?
If not, then, HANS is making an effort to make you aware about your rights so that a right step can be taken at the right time so that this "CYBER TERRORISM" can actually be stopped.
Section 43 - Unauthorised Access means Using someone account without permission and authentication.
Under the IT Act, 2008 no limit on amount of compensation for offences under Section 43.
Under IT Act, 2008 all the acts referred under section 43, are also covered u/Sec. 66 if they are done "dishonestly" or "fraudulently".
Section 66(A) Sending of offensive or false messages , Also known as "Cyber Stalking"
Section 66(B) Dishonestly receiving stolen computer resource or communication device
Also covers use of stolen Computers, mobile phones, SIM Cards, etc
Punishment – imprisonment upto 3 years or fine upto Rs. 1 lakh or both
Section66(C) Identity theft
Fraudulently or dishonestly using someone else's electronic signature, password or any other unique identification feature.
Punishment - Imprisonment upto 3 years and fine upto Rs. 1 lakh
Section 66(D) Cheating by personation
Cheating by pretending to be some other person
Punishment – imprisonment upto 3 years and fine upto Rs. 1 lakh.
Covers sending of menacing, offensive or false messages via SMS/EMAIL/MMS
Punishment – imprisonment upto 3 years and fine.
Section 66(E) Violation of Privacy ,Popularly known as Voyeurism
Pune spy cam incident where a 58-year old man was arrested for installing spy cameras in his house to 'snoop' on his young lady tenants
Covers acts like hiding cameras in changing rooms, hotel rooms, etc
Punishment –Imprisonment upto 3 years or fine upto Rs. 2 lakh or both.
Section 66(F) Cyber terrorism
Whoever uses cyberspace with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people
Punishment - Imprisonment which may extent to life imprisonment
Section 67 - Publishing or transmitting obscene material in electronic form.
Punishment
First instance - imprisonment upto 3 years and fine upto Rs. 5 lakh.
Subsequent - imprisonment upto 5 years and fine upto Rs. 10 lakh.
Section 67(A) Cyber Pornography.
Publishing or transmitting sexually explicit acts in the electronic form
Similarity with Sec. 292 IPC
Punishment
First instance - imprisonment upto 5 years Subsequent - imprisonment upto 7 years Fine upto Rs. 10 lakh.
Section 67(B)
Creating, collecting, browsing, downloading, etc of Child Pornography
Punishment
First instance - imprisonment upto 5 years.
Subsequent - imprisonment upto 7 years
Fine upto Rs. 10 lakh.
Section 69 – Government's power to intercept
Government to intercept, monitor or decrypt any information generated through any computer resource if it thinks to do so in the interest of the sovereignty or integrity of India.
Section 67(C) – Preservation of information by intermediaries
Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.
Section 72(A) - Liability of Intermediary not to disclose any personal information
Intermediary to act as per the terms of its lawful contract and not beyond it.
Punishment – imprisonment upto 3 years or fine upto 5 lakh or both.
Section 79- Liability of Intermediary
An intermediary not to be liable for any third party information, data, or communication link made available or hosted by him.
Liability of Intermediary:-
Intermediary need to prove that he didn't –
* Initiate the transmission,
* Select the receiver of the transmission, and
* Select or modify the information contained in the transmission and
The intermediary observes due diligence while discharging his duties under the Act.
Section 84(B) – Abetment
Abetting to commit an offence is punishable
Punishment – Same punishment provided for the offence under the Act
Section 84(C) – Abetment
Attempt to commit an offence is punishable.
Punishment – Imprisonment which may extend to one-half of the longest term of imprisonment provided for that offence
Section 78 – Investigation Powers
As per the IT Act, 2008 Cyber crime cases can be investigated by the "Inspector" rank police officers.
Under the IT Act, 2000 such powers were with the "DYSP/ACP".
Section 77 (A) – Compounding of Offences
Compounding – "Out of court settlement"
Offences
* "for which less than three years imprisonment has been provided" can be compounded.
* Such offence should not affect the socio economic conditions of the country or
* has been committed against a child below the age of 18 years or a woman.
These are the"Laws" according to the "IT AMENDMENT ACT 2008" which was passed in 2009. We all should be aware of our CYBER RIGHTS, so that we together can fight with the "CYBER THREATS
TechSetia.com : Technology Simplified
Techsetia.com is a dedicated technology blog that helps to learn, understand and explore the facts of computer technology.It covers various aspects of Information & Technology and other trending topics related to Operating System, Social Media, SEO,Internet world, Networking and much more is being added to this blog on daily basis.
How can I become a hacker?Where to start?
The term "Hacker" is spreading all over social networking sites/internet .So now everyone want to be a hacker.Manyone out there call themself hacker ,they dont even know a single programming language.Then you will ask who you are? I am not a hacker ,I am network/system admin having some knowledge in networking ,and know some programming language like C,C++,vb.net,
CREATE YOUR OWN TOOLBAR IN 2 MINUTE
You have seen lots of internet toolbar like google toolbar,yahoo toolbar and many more for many sites.So you may wish its good if you have a internet toolbar for your own site,blog or orkut community.Yes then you can create your own internet toolbar within 2 minutes.this is not amazing or exciting...
5 Pirate Bay BitTorrent Alternatives
The Pirate Bay we know and love, though still harboring torrents for now, is going away. But that doesn't mean BitTorrent is dead. Far from it. Here are five places to get your torrent on after it closes for good.
Hide files(MP3/txt) in MS word document-Trick
.Today I'll be showing you how to hide files (txt/mp3) on Word Documents (docx). (YOU CAN'T EDIT THE DOCUMENT AFTER YOU HIDE THE FILE)What will you need? - Word Document (docx) - File to hide (jpg/mp3/etc) - 7Zip (1st Method only)
Cyber Laws-- One should know.
independence day india
independence day india 2014
independence day images
independence day speech
independence day of india
happy independence day images
speech on independence day
indian independence day
independence day sms
independence day wallpaper
15 august independence day
independence day songs
independence day essay
independence day speech in hindi
independence day speech for students
independence day photos
independence day messages
independence day wishes
happy independence day india
happy independence day india 2014
quotes on independence day
1947 independence day
Popular Posts
Labels
Blog Archive
-
▼
2011
(527)
-
▼
April
(64)
- What is Piggybacking ?
- GMAIL DOT TRICK
- RECORD YOUR VOICE WITHOUT ANY SOFWARE...!!
- Burn a CD on Windows XP without using software
- GAMES SECRETS...!!!
- Hard Drive Cleanup
- Hard Drive Defragmentation
- GOOGLE OPERATING SYSTEM.
- how to see infrared rays of ur tv via camera phone?
- HOW TO FIND YOUR GMAIL CREATION DATE:IMPORTANT
- HOW WE CAN LOCK DESKTOP ICON?
- Windows 8 gets a new task manager and USB booting
- SIMPLE TRICK TO ENABLE RIGHT CLICK ON DISABLE WEBS...
- How To Rotate Your Nokia Mobile Phone Screen From ...
- How To Block Your Stolen or Lost Mobile
- SPEED UP YOUR INTERNET SPEED
- FILESONIC LATEST PREMIUM ACCOUNT
- GOOGLE MAGICAL TRICK !!!!!
- Intex launches projector on a mobile phone!
- Divert call and DEactivATE call by just dialling n...
- NOW SEND 320 CHARACTER MESSAGE WITHOUT ANY ADS.
- Batch FIle Animation!
- Hack Windows Vista Administrator Account password
- how to hack friend facebook wall 100% working
- What Is Hibernate In Computers ?
- New way to boot win xp faster
- ADDING NEW OPTIONS TO THE RIGHT CLICK OF MY COMPUTER
- Nokia 3G Phones Price List In INDIA
- Microsoft's Attack Surface Analyzer (ASA)Tool
- HOW TO SECURE YOUR USB FROM GETTING VIRUS ON IT
- OPEN OFFICE 2007 FILES IN OFFICE 2003
- backward version of google
- WINDOWS 8 M1 [Leaked] [Dwnld]
- List of free sms sites
- Free Virus with Free AntiVirus
- Facebook Stylish Themes - by stylish
- Clean your RAM by notepad
- Cyber Laws-- One should know.
- How to Make Your Phone Unreachable
- Create HDQuality Video Upload to YouTube with 5mts
- HOW TO CREATE A PDF FILE ? AN EASY WAY
- Password Guessing
- HOW TO ENABLE COMMAND PROMPT IN SYSTEM,DISABLED BY...
- Longest video on youtube!,19 WEEKS!!
- Dont Press F1 - Your System could get HACKED
- Window 7's "GODMODE"
- TOP 10 IT Certifications
- Downloading a “Movie” or a “Microbe”?
- Java Drive : The Next Generation of Threats
- NOW ONWARDS EYE WILL BE USED AS MOUSE FOR LAPTOP
- SAVE YOUTUBE VIDEO IN 5 SEC WITHOUT ANY S/W
- Talking notepad
- How to find bsnl broadband usage via BSNL portal
- Animated Signature via photoshop
- [CODING] Google Jam is HERE.........
- [Tut] Get Facebook profile out of a picture
- HOW TO MAKE CON FOLDER IN YOUR COMPUTER
- [Offer Exipred][app] recover deleted files from HDD
- Now File Your Banking Complaints By SMS
- Change Google logo text
- Google Sphere - Have fun with Google
- Have FUN with Google - Try Google Gravity
- BLUETOOTH MAGIC.
- HOW TO MAKE A CALCULATOR USING BATCH FILE
-
▼
April
(64)
Tech Setia is a dedicated blog for Internet and Computer help, Technology update, Blogging, Windows, Software, Make Money Online, SEO and many more.
0 comments: