Section No
|
I. PRELIMINARY |
|
I |
1 |
|
|
Short Title, Extent,
Commencement and Application |
|
|
|
(1) |
|
This Act may be called
the Information Technology Act, 2000. [As Amended by Information
technology (Amendment) Act 2008]
P.S: Information
Technology (Amendment) Bill 2006 was amended by Information
Technology Act Amendment Bill 2008 and in the process, the
underlying Act was renamed as Information Technology
(Amendment) Act 2008 herein after referred to as ITAA 2008. |
|
|
|
(2) |
|
It shall extend to the
whole of India and, save as otherwise provided in this Act, it
applies also to any offence or contravention hereunder committed
outside India by any person. |
|
|
|
(3) |
|
It shall come into
force on such date as the Central Government may, by
notification, appoint and different dates may be appointed for
different provisions of this Act and any reference in any such
provision to the commencement of this Act shall be construed as
a reference to the commencement of that provision.
[Act notified with
effect from October 17, 2000. Amendments vide ITAA-2008 notified
with effect from October 27, 2009] |
|
|
|
(4) |
|
(Substituted Vide ITAA-2008)
Nothing in this Act shall apply to
documents or transactions specified in the First Schedule by way
of addition or deletion of entries thereto. |
|
|
|
(5) |
|
(Inserted vide ITAA-2008)
Every notification issued under
sub-section (4) shall be laid before each House of Parliament |
|
|
2 |
|
|
Definitions |
|
|
|
(1) |
|
In this Act, unless the
context otherwise requires, |
|
|
|
|
(a) |
"Access" with its
grammatical variations and cognate expressions means gaining
entry into, instructing or communicating with the logical,
arithmetical, or memory function resources of a computer,
computer system or computer network; |
|
|
|
|
(b) |
"Addressee" means a
person who is intended by the originator to receive the
electronic record but does not include any intermediary; |
|
|
|
|
(c) |
"Adjudicating Officer"
means adjudicating officer appointed under subsection (1) of
section 46; |
|
|
|
|
(d) |
"Affixing Electronic Signature"
with its grammatical variations and cognate expressions means
adoption of any methodology or procedure by a person for the
purpose of authenticating an electronic record by means of
Electronic Signature; |
|
|
|
|
(da) |
"Appellate Tribunal" means the
Appellate Tribunal referred to in sub-section (1) of section 48:
(inserted vide Finance Act 2017-31/3/2017) |
|
|
|
|
(e) |
"Appropriate
Government" means as respects any matter.
|
(i) |
enumerated in
List II of the Seventh Schedule to the Constitution; |
|
(ii) |
relating to any
State law enacted under List III of the Seventh Schedule
to the Constitution, the State Government and in any
other case,
(I)
relating to relevant provision, or a computer resource,
which is controlled by the respective Ministry or
Department of the Central Government, such Ministry or
Department; or
(II) not covered under
sub-clause (I)
(Inserted vide Janviswas Act-2022)
the Central Government; |
|
|
|
|
|
(f) |
"Asymmetric Crypto
System" means a system of a secure key pair consisting of a
private key for creating a digital signature and a public key to
verify the digital signature; |
|
|
|
|
(g) |
"Certifying Authority"
means a person who has been granted a license to issue a
Electronic Signature Certificate under section 24; |
|
|
|
|
(h) |
"Certification Practice
Statement" means a statement issued by a Certifying Authority
to specify the practices that the Certifying Authority employs
in issuing Electronic Signature Certificates; |
|
|
|
|
(ha) |
"Communication Device" means Cell
Phones, Personal Digital Assistance (Sic), or combination of
both or any other device used to communicate, send or transmit
any text, video, audio, or image. (Inserted Vide ITAA 2008) |
|
|
|
|
(i) |
"Computer" means any
electronic, magnetic, optical or other high-speed data
processing device or system which performs logical, arithmetic,
and memory functions by manipulations of electronic, magnetic
or optical impulses, and includes all input, output,
processing, storage, computer software, or communication
facilities which are connected or related to the computer in a
computer system or computer network; |
|
|
|
|
(j) |
(Substituted vide
ITAA-2008)
"Computer Network"
means the interconnection of one or more Computers or Computer
systems or Communication device through-
(i) |
the use of
satellite, microwave, terrestrial line,wire,wireless or
other communication media; and |
(ii) |
terminals or a
complex consisting of two or more interconnected
computers or communication device whether or not the
interconnection is continuously maintained; |
|
|
|
|
|
(k) |
"Computer Resource"
means computer, communication device, computer system, computer
network, data, computer database or software; |
|
|
|
|
(l) |
"Computer System" means
a device or collection of devices, including input and output
support devices and excluding calculators which are not
programmable and capable of being used in conjunction with
external files, which contain computer programmes, electronic
instructions, input data, and output data, that performs logic,
arithmetic, data storage and retrieval, communication control
and other functions; |
|
|
|
|
(m) |
"Controller" means the
Controller of Certifying Authorities appointed under sub-section
(7) of section 17; |
|
|
|
|
(n)
|
"Cyber Appellate Tribunal" means the Cyber Appellate *
Tribunal established under sub-section (1) of section 48 (*
"Regulations" omitted) (omitted
vide Finance Act 2017-31/3/2017)
|
|
|
|
|
(na) |
(Inserted vide ITAA-2008)
"Cyber cafe" means any facility from where
access to the internet is offered by any person in the ordinary
course of business to the members of the public. |
|
|
|
|
(nb) |
(Inserted Vide ITAA 2008)
"Cyber Security" means protecting
information, equipment, devices, computer, computer resource,
communication device and information stored therein from
unauthorized access, use, disclosure, disruption, modification
or destruction. |
|
|
|
|
(o) |
"Data" means a
representation of information, knowledge, facts, concepts or
instructions which are being prepared or have been prepared in a
formalized manner, and is intended to be processed, is being
processed or has been processed in a computer system or
computer network. ,.and may be in any form (including computer
printouts magnetic or optical storage media, punched cards,
punched tapes) or stored internally in the memory of the
computer; |
|
|
|
|
(p) |
"Digital Signature"
means authentication of any electronic record by a subscriber
by means of an electronic method or procedure in accordance
with the provisions of section 3; |
|
|
|
|
(q) |
"Digital Signature
Certificate" means a Digital Signature Certificate issued under
sub-section (4) of section 35; |
|
|
|
|
(r) |
"Electronic Form" with
reference to information means any information generated, sent,
received or stored in media, magnetic, optical, computer memory,
micro film, computer generated micro fiche or similar device; |
|
|
|
|
(s) |
"Electronic Gazette"
means official Gazette published in the electronic form; |
|
|
|
|
(t) |
"Electronic Record"
means data, record or data generated, image or sound stored,
received or sent in an electronic form or micro film or computer
generated micro fiche; |
|
|
|
|
(ta) |
(Inserted vide
ITAA-2006) "electronic
signature" means authentication of any electronic record by a
subscriber by means of the electronic technique specified in the
second schedule and includes digital signature |
|
|
|
|
(tb) |
(Inserted vide ITAA-2006)
"Electronic Signature Certificate" means
an Electronic Signature Certificate issued under section 35 and
includes Digital Signature Certificate" |
|
|
|
|
(u) |
"Function", in relation
to a computer, includes logic, control, arithmetical process,
deletion, storage and retrieval and communication or
telecommunication from or within a computer; |
|
|
|
|
(ua) |
"Indian Computer Emergency Response
Team" means an agency established under sub-section (1) of
section 70 B |
|
|
|
|
(v) |
"Information" includes
data, message, text, images, sound, voice, codes,
computer programmes, software and databases or micro film or
computer generated micro fiche; (Amended vide ITAA-2008) |
|
|
|
|
(w) |
(Substituted vide
ITAA-2008)
"Intermediary" with
respect to any particular electronic records, means any person
who on behalf of another person receives, stores or transmits
that record or provides any service with respect to that record
and includes telecom service providers, network service
providers, internet service providers, web hosting service
providers, search engines, online payment sites, online-auction
sites, online market places and cyber cafes. |
|
|
|
|
(x) |
"Key Pair", in an
asymmetric crypto system, means a private key and its
mathematically related public key, which are so related that the
public key can verify a digital signature created by the private
key; |
|
|
|
|
(y) |
"Law" includes any Act
of Parliament or of a State Legislature, Ordinances
promulgated by the President or a Governor, as the case may be.
Regulations made by the President under article 240, Bills
enacted as President's Act under sub-clause (a) of clause (1)
of article 357 of the Constitution and includes rules,
regulations, bye-laws and orders issued or made there under |
|
|
|
|
(z) |
"License" means a
license granted to a Certifying Authority under section 24; |
|
|
|
|
(za) |
"Originator" means a
person who sends, generates, stores or transmits any
electronic message or causes any electronic message to be sent,
generated, stored or transmitted to any other person but does
not include an intermediary; |
|
|
|
|
(zb) |
"Prescribed" means
prescribed by rules made under this Act; |
|
|
|
|
(zc) |
"Private Key" means
the key of a key pair used to create a digital signature; |
|
|
|
|
(zd) |
"Public Key" means the
key of a key pair used to verify a digital signature and listed
in the Digital Signature Certificate; |
|
|
|
|
(ze) |
"Secure System" means
computer hardware, software, and procedure that -:
(a) |
are reasonably
secure from unauthorized access and misuse; |
(b) |
provide a
reasonable level of reliability and correct operation; |
(c) |
are reasonably
suited to performing the intended functions; and |
(d) |
adhere to
generally accepted security procedures; |
|
|
|
|
|
(zf) |
"Security Procedure"
means the security procedure prescribed under section 16 by the
Central Government; |
|
|
|
|
(zg) |
"Subscriber" means a
person in whose name the Electronic Signature Certificate is
issued; |
|
|
|
|
(zh) |
"Verify" in relation to
a digital signature, electronic record or public key, with its
grammatical variations and cognate expressions means to
determine whether
(a) |
the initial
electronic record was affixed with the digital
signature by the use of private key corresponding to
the public key of the subscriber; |
(b) |
the initial
electronic record is retained intact or has been altered
since such electronic record was so affixed with the
digital signature. |
|
|
|
|
(2) |
|
Any reference in this
Act to any enactment or any provision thereof shall, in relation
to an area in which such enactment or such provision is not in
force, be construed as a reference to the corresponding law or
the relevant provision of the corresponding law, if any, in
force in that area. |
|