-
siteadmin
Breach of confidentiality and privacy – Sec.72
72. Breach of confidentiality and privacy.-Â Save as otherwise provided in this Act or any other law for the time being in force, any person who, in pursuant of any of the powers conferred under this Act, rules or regulations made there under, has secured access to any electronic record, book, register, correspondence, information, document or…
-
siteadmin
Penalty for misrepresentation – Sec.71
71. Penalty for misrepresentation.-Â Whoever makes any misrepresentation to, or suppresses any material fact from, the Controller or the Certifying Authority for obtaining any license or Electronic Signature Certificate, as the case may be, shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one…
-
siteadmin
Un-authorized access to protected system – Sec.70
*[ 70. Protected system.-Â (1) The appropriate Government may, by notification in the Official Gazette, declare any computer resource which directly or indirectly affects the facility of Critical Information Infrastructure, to be a protected system. Explanation: For the purposes of this section, “Critical Information Infrastructure” means the computer resource, the incapacitation or destruction of which, shall…
-
siteadmin
Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security – Sec.69B
*[ 69B. Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security.-Â (1) The Central Government may, to enhance Cyber Security and for identification, analysis and prevention of any intrusion or spread of computer contaminant in the country, by notification in the official Gazette, authorize any agency of…
-
siteadmin
Power to issue directions for blocking for public access of any information through any computer resource – Sec.69A
*[ 69A. Power to issue directions for blocking for public access of any information through any computer resource.-Â (1) Where the Central Government or any of its officer specially authorized by it in this behalf is satisfied that it is necessary or expedient so to do in the interest of sovereignty and integrity of India, defense…
Category
- Articles (27)
- Bare Acts (16)
- Blog (1)
- Case Laws (15)
- Cyber Laws (50)
- Cybersecurity (6)
- Data Privacy (2)
- Data Recovery (3)
- Digital Forensics (6)
- eDiscovery (1)
- Incident Response (2)
- Indian Arms Act 1959 (1)
- Information Technology Act (1)
- Information Technology Act 2000 (1)
- Intellectual Property (4)
- Legal terms (2)
- Malware & Virus (3)
- News (5)
- Vulnerability Management (1)
- WordPress Security (2)
Recent Post
- Avoiding Common Mistakes in Cyber Incident Response Planningby siteadmin
- Protect Your Accounts in Minutes: The Power of Multi-Factor Authenticationby siteadmin
- Recovering Email from Computers and Drivesby siteadmin
- Recovering Email from Mobile Phonesby siteadmin
- Hunting Down an ASP.Net XSS Filter Bypassby siteadmin