{"id":2008,"date":"2019-12-28T21:09:17","date_gmt":"2019-12-28T21:09:17","guid":{"rendered":"https:\/\/worldcyberlaw.com\/?p=2008"},"modified":"2019-12-28T21:15:40","modified_gmt":"2019-12-28T21:15:40","slug":"hacking-section-43-of-the-it-act-2000","status":"publish","type":"post","link":"https:\/\/worldcyberlaw.com\/?p=2008","title":{"rendered":"Hacking &#8211; Section 43 and Section 66 of the IT Act, 2000"},"content":{"rendered":"\n<p>43.&nbsp;<strong>Penalty and compensation for damage to computer, computer system, etc<\/strong>.<\/p>\n\n\n\n<p>If any person<\/p>\n\n\n\n<p><strong><span style=\"text-decoration: underline;\"> without permission<\/span><\/strong><\/p>\n\n\n\n<p> of the owner or any other person who is incharge of a computer, computer system or computer network, or computer resource \u2014<\/p>\n\n\n\n<ol><li><strong><span style=\"text-decoration: underline;\">accesses or secures access<\/span><\/strong> to such computer, computer system or computer network;&nbsp;<\/li><li><strong><span style=\"text-decoration: underline;\">downloads, copies or extracts any data<\/span><\/strong>, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium;&nbsp;<\/li><li><strong><span style=\"text-decoration: underline;\">introduces or causes to be introduced any computer contaminant or computer virus into any computer<\/span>,<\/strong> computer system or computer network;&nbsp;<\/li><li><strong><span style=\"text-decoration: underline;\">damages or causes to be damaged any computer<\/span><\/strong>, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network;&nbsp;<\/li><li><strong><span style=\"text-decoration: underline;\">disrupts or causes disruption of any computer<\/span><\/strong>, computer system or computer network;&nbsp;<\/li><li><strong><span style=\"text-decoration: underline;\">denies or causes the denial of access to any person authorised to access any computer,<\/span><\/strong> computer system or computer network by any means; (g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder;&nbsp;<\/li><li><strong><span style=\"text-decoration: underline;\">charges the services availed of by a person to the account of another person<\/span><\/strong> by tampering with or manipulating any computer, computer system, or computer network, he shall be liable to pay damages by way of compensation to the person so affected.&nbsp;<\/li><li><span style=\"text-decoration: underline;\"><strong>destroys, deletes or alters any information residing in a computer resource<\/strong> <\/span>or diminishes its value or utility or affects it injuriously by any means;&nbsp;<\/li><li>steel, conceals, destroys or alters or causes any person to steal, conceal<strong><span style=\"text-decoration: underline;\">, destroy or alter any computer source code<\/span><\/strong> used for a computer resource with an intention to cause damage;&nbsp;<\/li><\/ol>\n\n\n\n<p><strong><span style=\"text-decoration: underline;\"><em>Explanation<\/em>.<br><\/span><\/strong>For the purposes of this section:<\/p>\n\n\n\n<ol><li><strong>&#8220;computer contaminant&#8221; <\/strong>means any set of computer instructions that are designed \u2014<ul><li>to modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or<\/li><li>by any means to usurp the normal operation of the computer, computer system, or computer network;<\/li><\/ul><\/li><li><strong>&#8220;computer data base&#8221; <\/strong>means a representation of information, knowledge, facts, concepts or instructions in text, image, audio, video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network;<\/li><li><strong>&#8220;computer virus&#8221; <\/strong>means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, daia or instruction is executed or some other event takes place in that computer resource;<\/li><li><strong>&#8220;damage&#8221;<\/strong> means to destroy, alter, delete, add, modify or rearrange any computer resource by any means.<\/li><li><strong>&#8220;computer source code&#8221;<\/strong> means the listing of programmes, computer commands, design and layout and programme analysis of computer resource in any form.<\/li><\/ol>\n\n\n\n<p><\/p>\n\n\n\n<p><strong><span style=\"text-decoration: underline;\">Section 66 &#8211; Punishment &#8211; Computer related offences <\/span><\/strong><\/p>\n\n\n\n<p>If any person, dishonestly or fraudulently, does any act referred to in section 43,<strong> he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.<\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>43.&nbsp;Penalty and compensation for damage to computer, computer system, etc. If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network, or computer resource \u2014 accesses or secures access to such computer, computer system or computer network;&nbsp; downloads, copies or extracts any data, &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/worldcyberlaw.com\/?p=2008\"> <span class=\"screen-reader-text\">Hacking &#8211; Section 43 and Section 66 of the IT Act, 2000<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[9,11],"tags":[],"_links":{"self":[{"href":"https:\/\/worldcyberlaw.com\/index.php?rest_route=\/wp\/v2\/posts\/2008"}],"collection":[{"href":"https:\/\/worldcyberlaw.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/worldcyberlaw.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/worldcyberlaw.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/worldcyberlaw.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2008"}],"version-history":[{"count":5,"href":"https:\/\/worldcyberlaw.com\/index.php?rest_route=\/wp\/v2\/posts\/2008\/revisions"}],"predecessor-version":[{"id":2014,"href":"https:\/\/worldcyberlaw.com\/index.php?rest_route=\/wp\/v2\/posts\/2008\/revisions\/2014"}],"wp:attachment":[{"href":"https:\/\/worldcyberlaw.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/worldcyberlaw.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/worldcyberlaw.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}