Import acts Information Technology (Amendment) Act, 2008
Tampering with computer source Documents Sec.65
Hacking with computer systems , Data Alteration Sec.66
Sending offensive messages through communication service, etc Sec.66A
Dishonestly receiving stolen computer resource or communication device Sec.66B
Identity theft Sec.66C
Cheating by personation by using computer resource Sec.66D
Violation of privacy Sec.66E
Cyber terrorism Sec.66F
Publishing or transmitting obscene material in electronic form Sec .67
Hackers scans the computer pre attack to identify - Vulnerability in the systemPunishment for
publishing or transmitting of material depicting children in sexually explicit act, etc.
in electronic form Sec.67B
Preservation and Retention of information by intermediaries Sec.67C
Powers to issue directions for interception or monitoring or decryption of any information through
any computer resource Sec.69
Power to issue directions for blocking for public access of any information through any computer
resource Sec.69A
Power to authorize to monitor and collect traffic data or information through any computer resource
for Cyber Security Sec.69B
Un-authorized access to protected system Sec.70
Penalty for misrepresentation Sec.71
Breach of confidentiality and privacy Sec.72
Publishing False digital signature certificates Sec.73
Publication for fraudulent purpose Sec.74
Tampering with computer source Documents Sec.65
Hacking with computer systems , Data Alteration Sec.66
Sending offensive messages through communication service, etc Sec.66A
Dishonestly receiving stolen computer resource or communication device Sec.66B
Identity theft Sec.66C
Cheating by personation by using computer resource Sec.66D
Violation of privacy Sec.66E
Cyber terrorism Sec.66F
Publishing or transmitting obscene material in electronic form Sec .67
Hackers scans the computer pre attack to identify - Vulnerability in the systemPunishment for
publishing or transmitting of material depicting children in sexually explicit act, etc.
in electronic form Sec.67B
Preservation and Retention of information by intermediaries Sec.67C
Powers to issue directions for interception or monitoring or decryption of any information through
any computer resource Sec.69
Power to issue directions for blocking for public access of any information through any computer
resource Sec.69A
Power to authorize to monitor and collect traffic data or information through any computer resource
for Cyber Security Sec.69B
Un-authorized access to protected system Sec.70
Penalty for misrepresentation Sec.71
Breach of confidentiality and privacy Sec.72
Publishing False digital signature certificates Sec.73
Publication for fraudulent purpose Sec.74
No comments:
Post a Comment