Section 75 of the Information Technology Act establishes the extraterritorial jurisdiction of Indian cyber law. It clarifies that the provisions of the Act apply to any cyber offence or cyber contravention committed outside India, regardless of the perpetrator's nationality, provided the act involves a computer or network located within Indian borders. This section ensures that geography is not a shield for those targeting Indian infrastructure.\n
\n\nThe Principle of Extraterritorial Jurisdiction
\nIn the borderless world of the internet, a criminal in one continent can target a victim in another with a single click. Section 75 addresses this by anchoring the law to the \"computer resource\" rather than the physical location of the attacker. If a server in Mumbai or a network in Bangalore is accessed unlawfully from abroad, the Indian legal system asserts its right to prosecute. This is a foundational element of cyber law in India and international legal cooperation.\n
\n\nWhen Does Section 75 Apply?
\nThe law is specific: for the Act to apply to an offence committed outside India, the \"conduct constituting the offence\" must involve a computer, computer system, or computer network located in India. This covers everything from remote hacking of Indian corporate databases to the distribution of prohibited content through Indian hosting providers. For businesses with global operations, this means that their Indian assets are protected under local laws even against international threats.\n
\n\nChallenges in Cross-Border Enforcement
\nWhile the law grants jurisdiction, enforcement remains a complex challenge. Pursuing a suspect across national borders requires valid Mutual Legal Assistance Treaties (MLAT) and cooperation with international agencies. However, the first step is always the local filing of a case under Section 75. Having a clear jurisdictional claim allows Indian authorities to issue notices and seek the cooperation of international managed security partners and ISPs.\n
\n\nRole of Digital Forensics in International Cases
\nIn cross-border investigations, proving the link between an international IP address and an Indian computer resource is critical. This requires sophisticated digital forensics to map the path of the attack, identify the affected Indian nodes, and preserve the traffic logs that establish jurisdiction. Without this technical proof, asserting Section 75 in an international context becomes nearly impossible.\n
\n\nProtect Your Global Infrastructure
\nIf your Indian-based servers or networks have been targeted by an international entity, the law is on your side. You need a team that understands the nuances of international jurisdiction and can build a technical case for prosecution. Contact our cyber law specialists to discuss your cross-border security concerns and formalise your evidence strategy.\n