By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
ApniLawApniLawApniLaw
  • Home
  • Law Forum
  • Find Lawyers
  • Legal Services
  • Legal News
  • Legal Jobs
  • Legal Articles
    • Documentation
    • Marriage and Divorce
    • Land Dispute & Will
    • Civil
    • Criminal
    • Supreme Court
    • High Court
  • Bare Acts
    • BNSS
    • BNS
    • BSA
    • CrPC
    • DPDP
    • Hindu Marriage Act
    • IPC
    • POCSO
Reading: Understanding IT Act Offences: A Simple Guide
Share
Notification Show More
Font ResizerAa
ApniLawApniLaw
Font ResizerAa
  • Supreme Court
  • High Court
  • Acts
  • Documentation
  • BNSS
  • Home
  • Law Forum
  • Find Lawyers
  • Legal Services
  • Legal News
  • Legal Jobs
  • Legal Articles
    • Documentation
    • Marriage and Divorce
    • Land Dispute & Will
    • Civil
    • Criminal
    • Supreme Court
    • High Court
  • Bare Acts
    • BNSS
    • BNS
    • BSA
    • CrPC
    • DPDP
    • Hindu Marriage Act
    • IPC
    • POCSO
Have an existing account? Sign In
Follow US
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
ApniLaw > Blog > Documentation > Understanding IT Act Offences: A Simple Guide
Documentation

Understanding IT Act Offences: A Simple Guide

Amna Kabeer
Last updated: April 27, 2025 8:56 am
Amna Kabeer
1 month ago
Share
Offences in Digital Age
Offences in Digital Age
SHARE


The Information Technology (IT) Act was introduced in India in 2000. It regulates cyber activities and ensure online safety. Back then, the internet was just starting to grow in India. But even then, the need for cyber laws was clear. Over time, the Act has evolved to include many digital offences. These laws help protect your privacy, secure digital communication, and punish cybercrime.

Contents
What Are Cyber Offenses?Key Cybercrime Offenses Under the IT ActSection 65 – Tampering with Computer Source DocumentsSection 66 – Computer-Related OffensesSection 66A – Sending Offensive Messages via Communication Services (Struck down by Supreme Court in 2015)Section 66B – Receiving Stolen Computer ResourcesSection 66C – Digital Identity TheftSection 66D – Online Impersonation & CheatingSection 66E – Violation of PrivacySection 66F – Cyber TerrorismSection 67 – Publishing Obscene Content OnlineSection 67A – Publishing Sexually Explicit MaterialSection 67B – Child PornographySection 67C – Data Retention by IntermediariesSection 68 – Powers of the ControllerSection 69 – Government Surveillance and Decryption PowersSection 69A – Blocking Access to Online ContentSection 69B – Monitoring of Network TrafficSection 70 – Protected SystemsSection 70A – Nodal Agency for Critical Information Infrastructure (CII)Section 70B – CERT-In (Indian Cyber Emergency Response Team)Section 71 – Misrepresentation to Obtain Digital CertificatesSection 72 – Breach of Confidentiality by Authorized PersonsSection 72A – Breach of Privacy and Contractual ConfidentialitySection 73 – Misuse of Digital Signature CertificatesSection 74 – Fraud Involving Digital CertificatesSection 75 – Applicability to Offenses Outside IndiaSection 76 – Confiscation of EquipmentSection 77 – Dual Liability Under Other LawsSection 77A – Compounding of OffensesSection 77B – Bailable Offenses for Minor CybercrimesSection 78 – Investigating AuthorityPopular Case LawsSyed Asifuddin Case: ESN Tampering Invokes IT ActParliament Attack Case: Digital Evidence Key in Terror ConvictionHow Did The Shreya Singhal Case Impact Section 66A Of The IT Act?Conclusion


What Are Cyber Offenses?


Offences are enumerated in Chapter XI of the IT Act. Cyber offenses are unlawful acts carried out using advanced technology. In these crimes, the computer acts as a tool, a target, or both. Offenders use digital systems to commit fraud, theft, or data breaches. These crimes are complex and often hard to trace.


Key Cybercrime Offenses Under the IT Act


Section 65 – Tampering with Computer Source Documents


This section deals with the unauthorized alteration, destruction, or concealment of critical computer source code or system files. These documents are essential for the proper functioning of computer systems, and tampering with them can disrupt security or operations.


Section 66 – Computer-Related Offenses


Covers digital fraud, dishonesty, or unauthorized access related to data, programs, or services. If someone violates Section 43 (like hacking, data theft, or introducing viruses), this section makes those acts punishable.


Section 66A – Sending Offensive Messages via Communication Services (Struck down by Supreme Court in 2015)


This section originally criminalized sending offensive, false, or threatening messages via electronic communication.


Section 66B – Receiving Stolen Computer Resources


If a person knowingly receives or keeps any stolen computer system, device, or digital property, this section applies. It extends the concept of “stolen goods” to the digital domain.


Section 66C – Digital Identity Theft


Focuses on the misuse of someone else’s digital identity — like passwords, digital signatures, or biometric data — without permission. It aims to protect users from impersonation and fraud in the digital space.


Section 66D – Online Impersonation & Cheating


Covers fraudulent impersonation online to deceive someone — such as fake job offers, phishing scams, or fake social media profiles — done with the intent to cheat.


Section 66E – Violation of Privacy


This section criminalizes the capture, distribution, or publishing of private images or information without the subject’s consent. It’s commonly invoked in cases of revenge porn or unauthorized photo sharing.


Section 66F – Cyber Terrorism


Addresses cyber activities that threaten national security, such as hacking into critical infrastructure or government systems with malicious intent. It focuses on protecting India’s sovereignty and integrity from digital threats.


Section 67 – Publishing Obscene Content Online


Prohibits publishing or transmitting any obscene material in digital form. It’s aimed at regulating pornographic or sexually explicit content accessible online.


Section 67A – Publishing Sexually Explicit Material


Deals with the distribution of sexually explicit content (distinct from obscenity under Section 67). This includes explicit videos or images shared without consent.


Section 67B – Child Pornography


Strictly prohibits creating, sharing, downloading, or promoting child sexual abuse material. It also criminalizes encouraging minors to engage in explicit online acts.


Section 67C – Data Retention by Intermediaries


Obligates platforms like social media companies and ISPs to retain specific user data and logs for a prescribed period. This helps law enforcement trace and investigate cybercrimes.


Section 68 – Powers of the Controller


Grants the Controller of Certifying Authorities the authority to direct any certifying authority or personnel to comply with specific instructions. It’s related to the enforcement of digital signature guidelines and trust services.


Section 69 – Government Surveillance and Decryption Powers


Enables the Central or State Government to authorize agencies to monitor, intercept, or decrypt any digital information for reasons related to national security, public order, or sovereignty.


Section 69A – Blocking Access to Online Content


Allows the Central Government to block public access to specific online content in the interest of national security, public order, or foreign relations. Often used to block websites or social media posts deemed harmful.


Section 69B – Monitoring of Network Traffic


Permits authorized agencies to monitor and collect traffic data from any computer network to enhance cybersecurity and protect sensitive infrastructure.


Section 70 – Protected Systems


The government can declare certain computer systems as “protected systems,” typically those involved in critical infrastructure (like power grids, banking systems). Unauthorized access to these systems is strictly prohibited.


Section 70A – Nodal Agency for Critical Information Infrastructure (CII)


Authorizes the Central Government to appoint a national nodal agency responsible for safeguarding India’s critical information infrastructure, ensuring its resilience against cyber threats.


Section 70B – CERT-In (Indian Cyber Emergency Response Team)


CERT-In is designated as the national agency for responding to cybersecurity incidents. It coordinates alerts, vulnerability management, and emergency responses across the digital ecosystem.


Section 71 – Misrepresentation to Obtain Digital Certificates


This section deals with anyone who gains digital licenses or certificates by providing false information or hiding material facts.


Section 72 – Breach of Confidentiality by Authorized Persons


Covers unauthorized access or disclosure of information by someone who had lawful access (e.g., IT personnel, service providers) but misuses it without consent.


Section 72A – Breach of Privacy and Contractual Confidentiality


Applies to individuals or intermediaries who misuse personal data accessed through service contracts. This section reinforces data protection responsibilities in commercial agreements.


Section 73 – Misuse of Digital Signature Certificates


Prohibits the unauthorized publication of digital certificates, especially after revocation or expiration, which could mislead the public or businesses.


Section 74 – Fraud Involving Digital Certificates


Targets individuals who forge or use fake digital certificates for illegal activities, ensuring trust in digital identity infrastructure.


Section 75 – Applicability to Offenses Outside India


Ensures the IT Act applies to any offense involving Indian computer systems, even if committed by a foreigner or from outside the country.


Section 76 – Confiscation of Equipment


Empowers authorities to confiscate any digital device used to commit a cyber offense, such as hard drives, mobile phones, or servers.


Section 77 – Dual Liability Under Other Laws


Clarifies that a person can face legal action under the IT Act and also under other applicable laws simultaneously for the same act.


Section 77A – Compounding of Offenses


Allows certain IT Act offenses (except severe ones) to be settled through mutual agreement in court, reducing the burden of prolonged litigation.


Section 77B – Bailable Offenses for Minor Cybercrimes


States that offenses under the IT Act carrying punishment of three years or less are considered bailable, making the legal process smoother for minor infractions.


Section 78 – Investigating Authority


Specifies that only a police officer of at least Inspector rank can investigate offenses under the IT Act, ensuring proper scrutiny and seriousness in handling cybercrimes.

Popular Case Laws


Syed Asifuddin Case: ESN Tampering Invokes IT Act


In the Syed Asifuddin case, Tata Indicom employees faced arrest for manipulating the Electronic Serial Number (ESN) programmed into mobile phones. These phones were exclusively franchised to Reliance Infocom. The court ruled that tampering with the source code falls under Section 65 of the Information Technology Act. This section deals with altering or destroying computer source code with fraudulent intent.


Parliament Attack Case: Digital Evidence Key in Terror Conviction


On 13 December 2001, terrorists attacked the Indian Parliament. Digital evidence played a crucial role in convicting the accused. The suspects argued that computer data could be easily tampered with and should not be trusted.
Investigators recovered laptops and storage devices from a truck in Srinagar based on suspect disclosures. The laptop contained fake ID templates, video clips of political leaders from news broadcasts, and the Ministry of Home Affairs car sticker design. It also had a game titled “Wolf Pack” with the user name ‘Ashiq,’ matching a name used on a fake ID.
No data backup existed, and the defense challenged the digital evidence’s reliability in court. However, the court accepted it, emphasizing the role of digital forensics in national security cases.


How Did The Shreya Singhal Case Impact Section 66A Of The IT Act?


This landmark verdict came in response to the Shreya Singhal v. Union of India case. Shreya Singhal, a law student, filed a public interest litigation after two girls were arrested for a Facebook post. The case challenged the constitutional validity of Section 66A. The Court ruled in her favor, striking down the provision and strengthening digital free speech in India.
On March 24, 2015, the Supreme Court struck down Section 66A of the IT Act. It ruled that the section violated Article 19(1)(a) of the Indian Constitution, which protects freedom of speech and expression.
The Court found the law too vague and broad. It caused a chilling effect on free speech. Authorities often misused it to silence political dissent and social commentary. Arbitrary arrests under the section were common.

Terms like “offensive” and “menacing” lacked clear definitions. This gave excessive power to the authorities. The Court stressed that any law limiting speech must be clear and precise.
The judgment set a strong legal precedent. It highlighted the need for narrow and specific laws when restricting speech. It also reinforced the importance of protecting fundamental rights.

Conclusion


The IT Act plays a big role in today’s digital age. It protects users, ensures online responsibility, and punishes cybercriminals. As technology evolves, knowing your digital rights and the laws that guard them becomes more important than ever.

You Might Also Like

What Are The Steps To Take When Subjected To Triple Talaq?

What Are The Legal Rights Of Tenants In India

How To Apply For A Birth Certificate?

Supreme Court Issues Notice On Petition Challenging Kerala HC’s Ruling On Melshanthis Appointment At Sabarimala And Malikappuram Temple

A Guide To Claiming Ancestral Property In India As An NRI

TAGGED:Cyber OffencesInformation Technology ActInformation Technology Act 2000IT ActIT Act amendmentsIT Act offencesIT Act Summarysection 66A IT ActShreya Singhal Case
Share This Article
Facebook Email Print
Previous Article High Court of Kerala College Canteen Run By Educational Trust Must Register Under KVAT Act: Kerala HC
Next Article Data Breach Section 43A of IT Act: When Can Companies Be Sued For Data Breach
3 Comments
  • Pingback: What Are The Anti-Terrorism Laws In India? - ApniLaw
  • Pingback: Are E-Contracts Legally Binding in India? Know about Section 10A Of The IT Act - ApniLaw
  • Pingback: Section 43A of IT Act: When Can Companies Be Sued For Data Breach - ApniLaw

Leave a Reply Cancel reply

You must be logged in to post a comment.

Follow US

Find US on Social Medias
FacebookLike
XFollow
InstagramFollow
YoutubeSubscribe

Weekly Newsletter

Subscribe to our newsletter to get our newest articles instantly!
Popular News
Divorce Laws In India: What Every NRI Should Know
High CourtKerala High CourtMarriage and DivorceNewsWomen Rights

Wife Can Claim Maintenance Even If She Has a Temporary Job: Kerala HC

Amna Kabeer
By Amna Kabeer
4 months ago
Habeas Corpus Cannot Be Used for Missing Persons Cases: Madhya Pradesh High Court
Supreme Court Overturns Rajasthan High Court Rulings On Departmental Enquiry: Clarifies Limited Role Of Courts In Reassessing Evidence
Supreme Court Issues Notice On PIL For Online Access To Digitised Judicial Records
Calcutta High Court Rejects Hoichoi’s Plea Against Google Play Store Delisting: RBI to Make Final Call on Payment Aggregator Issue
- Advertisement -
- Advertisement -
Ad imageAd image

Your one-stop destination for legal news, articles, queries, and a directory of lawyers in India – all under one roof at ApniLaw.

Stay Updated

  • BNSS
  • News
  • Documentation
  • Acts
  • Supreme Court
  • High Court

Information

  • ApniLaw Services
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

Advertise

  • Advertise with us
  • Newsletters
  • Deal

Find Us on Socials

ApniLawApniLaw
Follow US
© ApniLaw 2025. All Rights Reserved.
bg-n
Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..
Zero spam, Unsubscribe at any time.

More Interesting News

Data Breach - Cyber Attack - IT Act

Why Are Innocent People’s Bank Accounts Being Frozen in Cyber Crime Investigations?

How To Avoid Cyber Crimes That May Freeze Your Account?

Why Has the Police Frozen My Bank Account in India?

login
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?