Section 66 of Information Technology Act.

anveshika thakur
anveshika thakurstudent à Arya College of Engg. & IT
Presentation
on
Section 66A of IT Act
BY
Anveshika
1
Contents:-
1.Information Technology Act 2000
2.Objective of IT Legislation in India
3.Structure of IT Act
4.Section 66 of IT act
i. Section 66A
ii. Section 66B
iii. Section 66C
iv. Section 66D
v. Section 66E
vi. Section 66F
5.Conclusion
2
Information Technology Act
2000
The Information Technology Act 2000 has been
substantially amended through the Information
Technology Act 2008 which was passed by the
two houses of the Indian Parliament on December
23, and 24, 2008. It got the Presidential assent on
February 5, 2009 and came into force on October
27, 2009. The amended Act has provided
additional focus on information security.
3
OBJECTIVES OF IT
LEGISLATION IN INDIA
“to provide legal recognition for transactions
carried out by means of electronic data
interchange and other means of electronic
communication, commonly referred to as
"electronic commerce" .
4
STRUCTURE OF IT ACT
.Information technology Act 2000 consisted
of 94 sections segregated into 13 chapters.
.In the 2008 version of the Act, there are
124 sections and 14 chapters.
5
Section 66 of IT Act:-
“If any person, dishonestly, or fraudulently,
does any act referred to in section 43, he shall
be punishable with imprisonment for a term
which may extend to three years or with fine
which may extend to five lakh rupees or with
both.”
6
7
Related Case :-
.In this case the accused, N G Arun Kumar, the
techie from Bangalore gained unauthorized access to the Joint
Academic Network (JANET) and deleted, added files and changed
the passwords to deny access to the authorized users.
.The CBI had registered a cyber crime case against
Kumar and carried out investigations on the basis of a complaint by
the Press Information Bureau, Chennai, which detected the
unauthorised use of broadband Internet.
8
Cont :
.The complaint also stated that the subscribers had
incurred a loss of Rs 38,248 due to Kumar’s wrongful act.
Verdict:-
The Additional Chief Metropolitan Magistrate, Egmore,
Chennai, sentenced the accused to undergo a rigorous
imprisonment for one year with a fine of Rs 5,000 Section 66 of
IT Act.
9
Subsection of Section 66:-
Section 66A :–
“Punishment for sending offensive messages
through communication service.”
Punishment:-imprisonment for a term which may
extend to three years and with fine.
10
Related Case :-
Fake profile of President posted by imposter
.On September 9, 2010, the imposter made a
fake profile in the name of the Hon’ble President Pratibha Devi
Patil.
.A complaint was made from Additional
Controller, President Household, President Secretariat regarding
the fake profiles created on Facebook.
.The First Information Report Under Section
66A Information Technology Act, 2000 was registered based on
the said complaint at the police station, the elite wing of Delhi
Police which specializes in investigating economic crimes
including cyber offences.
11
Section 66B:-
“Punishment for dishonestly receiving stolen computer
resource or communication device.”
Punishment:-imprisonment for a term which may extend
to three years or with fine which may extend to rupees one lakh or
with both.
12
Section 66C:-
“For identity theft i.e., fraudulently or dishonestly making
use of the electronic signature, password or any other
unique identification feature of any other person.”
Punishment:-imprisonment of either description for a term
which may extend to three years and shall also be liable to fine
which may extend to rupees one lakh.
13
Related Case:-
.The CEO of an identity theft protection company,
Lifelock, Todd Davis's social security number was exposed by Matt
Lauer on NBC’s Today Show.
.Davis’ identity was used to obtain a $500 cash
advance loan.
14
Section 66D :-
“Punishment for cheating by personation by using
computer resource.”
Punishment:-with imprisonment of either description
for a term which may extend to three years and shall also be liable
to fine which may extend to one lakh rupees.
15
Related Case:-
. A complaint filed by the representative of a
Company, The company has a web-site in the name and and style
`www.jaypolychem.com' but, another web site
`www.jayplychem.org' was set up by the accused,Samdeep
Varghese @ Sam, (who was dismissed from the company).
.The Company suffered losses of several crores of
Rupees from producers, suppliers and customers and were unable
to do business.
16
Section 66E:-
“For violation of privacy i.e., intentionally or knowingly
capturing, publishing or transmitting the image of a private
area of any person without his or her consent, violating the
privacy of that person,.”
Punishment:-imprisonment which may extend to three
years or with fine not exceeding two lakh rupees, or with both.
17
Related Case:-
Jawaharlal Nehru University MMS scandal
.A pornographic MMS clip was apparently made
in the campus and transmitted outside the university.
. reports claimed that the two accused students
initially tried to extort money from the girl in the video but when
they failed the culprits put the video out on mobile phones, on the
internet and even sold it as a CD .
18
Section 66F-
“For cyber terrorism i.e., intention to threaten the
unity, integrity, security or sovereignty of India or to strike
terror in the people or any section of the people.”
Punishment:-imprisonment which may extend to
imprisonment for life.
19
Related case:-
.The Mumbai police have registered a case of ‘cyber
terrorism’ here a threat email was sent to the BSE and NSE .
. an email challenging the security agencies to
prevent a terror attack was sent by one Shahab Md with an ID
sh.itaiyeb125@yahoo.in to BSE’s administrative email ID
corp.relations@bseindia.com.
. The MRA Marg police have registered forgery for
purpose of cheating, criminal intimidation cases under the IPC
and a cyber-terrorism case under the IT Act.
20
Conclusion:-
.Section 66A of the Information Technology
Act, “does not silence anyone”.
. You can always exercise your right to speak,
your freedom of speech and expression without offending
people
ANY QUERIES…..
21
22
1 sur 22

Recommandé

Information Technology Act par
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
11.9K vues21 diapositives
Introduction to Cyber law (IT Act 2000) par
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
1.5K vues21 diapositives
Introduction to Cyber Crimes par
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
6.3K vues74 diapositives
Cyber laws in India par
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
2.3K vues23 diapositives
IT ACT, 2000 (Information Technology Act, 2000) par
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
5.4K vues75 diapositives
Information technology act 2000.avi par
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
15.6K vues73 diapositives

Contenu connexe

Tendances

Information Technology Act 2000 par
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
12.6K vues23 diapositives
Cyber crime and its types par
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
2.1K vues23 diapositives
Indian Cyber laws par
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
1.3K vues23 diapositives
Information technology Act with Cyber offences .pptx par
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
354 vues27 diapositives
Right to privacy on internet and Data Protection par
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
11.4K vues43 diapositives
Information technology act 2000 par
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
187.2K vues27 diapositives

Tendances(20)

Information Technology Act 2000 par Vijay Dalmia
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
Vijay Dalmia12.6K vues
Indian Cyber laws par mulikaa
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa1.3K vues
Information technology Act with Cyber offences .pptx par Rahul Bharati
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
Rahul Bharati354 vues
Right to privacy on internet and Data Protection par atuljaybhaye
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
atuljaybhaye11.4K vues
Information technology act 2000 par Akash Varaiya
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya187.2K vues
Cyber Crime & Information technology Act 2000 par V'vek Sharma
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma13.1K vues
Cyberspace par Utchi
CyberspaceCyberspace
Cyberspace
Utchi20.4K vues
Unit 5 Intellectual Property Protection in Cyberspace par Tushar Rajput
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
Tushar Rajput14.4K vues
Information technology act par AKSHAY KHATRI
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI12.1K vues
Statutory laws pertaining to cybercrimes in india par Dr. Arun Verma
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
Dr. Arun Verma2.2K vues
Cyber law In India: its need & importance par Aditya Shukla
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla83.7K vues

En vedette

66a it act APOORVA BILLORE ITMI DELHI par
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHIApoorva Billore
727 vues33 diapositives
66a it act APOORVA BILLORE ITMI par
66a it act APOORVA BILLORE ITMI66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMIApoorva Billore
594 vues33 diapositives
Information Technology par
Information TechnologyInformation Technology
Information TechnologyKunal Agrawal
1.2K vues25 diapositives
Awareness Against Cyber Crime par
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber CrimeNithin Raj
2.1K vues28 diapositives
Cyber defamation par
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
25.3K vues19 diapositives
cyber crime par
cyber crimecyber crime
cyber crimeSaba MuShtaq
2.3K vues12 diapositives

En vedette(17)

66a it act APOORVA BILLORE ITMI DELHI par Apoorva Billore
66a it act APOORVA BILLORE ITMI DELHI66a it act APOORVA BILLORE ITMI DELHI
66a it act APOORVA BILLORE ITMI DELHI
Apoorva Billore727 vues
Awareness Against Cyber Crime par Nithin Raj
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
Nithin Raj2.1K vues
Cyber defamation par Tuhin Batra
Cyber defamationCyber defamation
Cyber defamation
Tuhin Batra25.3K vues
Cyber crime ppt new par Onkar1431
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
Onkar14311.2K vues
The Wild Flam-Ingos OWBC. Year 1 Chapter 1 par shannonagins
The Wild Flam-Ingos OWBC. Year 1 Chapter 1The Wild Flam-Ingos OWBC. Year 1 Chapter 1
The Wild Flam-Ingos OWBC. Year 1 Chapter 1
shannonagins448 vues
Hp 3 par storeserv 7000 storage par evelines2909
Hp 3 par storeserv 7000 storageHp 3 par storeserv 7000 storage
Hp 3 par storeserv 7000 storage
evelines2909481 vues
Timeline of a film opening par AlessiaAva97
Timeline of a film openingTimeline of a film opening
Timeline of a film opening
AlessiaAva97230 vues

Similaire à Section 66 of Information Technology Act.

Cyber law assignment par
Cyber law assignmentCyber law assignment
Cyber law assignmentAnusha Kadayyanmath
1K vues18 diapositives
Cyber law11 par
Cyber law11Cyber law11
Cyber law11maradabudkinsantosh
367 vues23 diapositives
Cyber law assignment par
Cyber law assignmentCyber law assignment
Cyber law assignmentVarsha Mali
360 vues8 diapositives
Cyber law assignment par
Cyber law assignmentCyber law assignment
Cyber law assignmentRini Mahade
3.7K vues8 diapositives
Cyber law and ipc codes par
Cyber law and ipc codesCyber law and ipc codes
Cyber law and ipc codesRakesh Otari
670 vues8 diapositives
Anil final par
Anil finalAnil final
Anil finalRakshith Shetty
495 vues23 diapositives

Similaire à Section 66 of Information Technology Act.(20)

Cyber law assignment par Rini Mahade
Cyber law assignmentCyber law assignment
Cyber law assignment
Rini Mahade3.7K vues
Cyber law cases and sections par vijayjituri
Cyber law cases and sectionsCyber law cases and sections
Cyber law cases and sections
vijayjituri432 vues
Cyber laws in India, An overview and relevant cases. par Ezra Paul
Cyber laws in India, An overview and relevant cases. Cyber laws in India, An overview and relevant cases.
Cyber laws in India, An overview and relevant cases.
Ezra Paul975 vues
Cyber law cases and sections(1) par santoshdkamat
Cyber law cases and sections(1)Cyber law cases and sections(1)
Cyber law cases and sections(1)
santoshdkamat310 vues
Cyber assignment par sparun
Cyber assignmentCyber assignment
Cyber assignment
sparun333 vues
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ... par Rahul Bharati
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
Rahul Bharati19 vues

Dernier

Sangyun Lee, 'Criminal Enforcement of the MRFTA against ASBP in Korea' (Kyoto... par
Sangyun Lee, 'Criminal Enforcement of the MRFTA against ASBP in Korea' (Kyoto...Sangyun Lee, 'Criminal Enforcement of the MRFTA against ASBP in Korea' (Kyoto...
Sangyun Lee, 'Criminal Enforcement of the MRFTA against ASBP in Korea' (Kyoto...Sangyun Lee
10 vues16 diapositives
Innovator Visa UK Cost par
Innovator Visa UK CostInnovator Visa UK Cost
Innovator Visa UK CosteLHRConsultant
9 vues1 diapositive
Baromètre Women's Forum 2023 par
Baromètre Women's Forum 2023Baromètre Women's Forum 2023
Baromètre Women's Forum 2023Ipsos France
306 vues29 diapositives
Indonesia Green Taxonomy: Towards a More Sustainable Financial System par
Indonesia Green Taxonomy: Towards a More Sustainable Financial SystemIndonesia Green Taxonomy: Towards a More Sustainable Financial System
Indonesia Green Taxonomy: Towards a More Sustainable Financial SystemAHRP Law Firm
6 vues10 diapositives
Religious Freedom, Registration Issues and the Colonial Legacy of State Recog... par
Religious Freedom, Registration Issues and the Colonial Legacy of State Recog...Religious Freedom, Registration Issues and the Colonial Legacy of State Recog...
Religious Freedom, Registration Issues and the Colonial Legacy of State Recog...Cometan
11 vues36 diapositives
Public-Private Partnership for Infrastructure Procurement in Indonesia’s New ... par
Public-Private Partnership for Infrastructure Procurement in Indonesia’s New ...Public-Private Partnership for Infrastructure Procurement in Indonesia’s New ...
Public-Private Partnership for Infrastructure Procurement in Indonesia’s New ...AHRP Law Firm
9 vues24 diapositives

Dernier(15)

Sangyun Lee, 'Criminal Enforcement of the MRFTA against ASBP in Korea' (Kyoto... par Sangyun Lee
Sangyun Lee, 'Criminal Enforcement of the MRFTA against ASBP in Korea' (Kyoto...Sangyun Lee, 'Criminal Enforcement of the MRFTA against ASBP in Korea' (Kyoto...
Sangyun Lee, 'Criminal Enforcement of the MRFTA against ASBP in Korea' (Kyoto...
Sangyun Lee10 vues
Baromètre Women's Forum 2023 par Ipsos France
Baromètre Women's Forum 2023Baromètre Women's Forum 2023
Baromètre Women's Forum 2023
Ipsos France306 vues
Indonesia Green Taxonomy: Towards a More Sustainable Financial System par AHRP Law Firm
Indonesia Green Taxonomy: Towards a More Sustainable Financial SystemIndonesia Green Taxonomy: Towards a More Sustainable Financial System
Indonesia Green Taxonomy: Towards a More Sustainable Financial System
Religious Freedom, Registration Issues and the Colonial Legacy of State Recog... par Cometan
Religious Freedom, Registration Issues and the Colonial Legacy of State Recog...Religious Freedom, Registration Issues and the Colonial Legacy of State Recog...
Religious Freedom, Registration Issues and the Colonial Legacy of State Recog...
Cometan11 vues
Public-Private Partnership for Infrastructure Procurement in Indonesia’s New ... par AHRP Law Firm
Public-Private Partnership for Infrastructure Procurement in Indonesia’s New ...Public-Private Partnership for Infrastructure Procurement in Indonesia’s New ...
Public-Private Partnership for Infrastructure Procurement in Indonesia’s New ...
Women in Law and Politics Journal.pdf Danielle Mikaelian par DanielleMikaelian
Women in Law and Politics Journal.pdf Danielle MikaelianWomen in Law and Politics Journal.pdf Danielle Mikaelian
Women in Law and Politics Journal.pdf Danielle Mikaelian
Atty. Yebra - Criminal Law - Case Doctrines 07292022.pdf par JonalynBedking
Atty. Yebra - Criminal Law - Case Doctrines 07292022.pdfAtty. Yebra - Criminal Law - Case Doctrines 07292022.pdf
Atty. Yebra - Criminal Law - Case Doctrines 07292022.pdf
Jackpocket v. Lottomatrix fee petition order.pdf par Mike Keyes
Jackpocket v. Lottomatrix fee petition order.pdfJackpocket v. Lottomatrix fee petition order.pdf
Jackpocket v. Lottomatrix fee petition order.pdf
Mike Keyes18 vues
Jamaica's Data Protection Act: Compliance required from the business community par Emerson Bryan
Jamaica's Data Protection Act: Compliance required from the business communityJamaica's Data Protection Act: Compliance required from the business community
Jamaica's Data Protection Act: Compliance required from the business community
Emerson Bryan33 vues
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING.docx par JosephVincentASalvad
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING.docxTRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING.docx
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING.docx
Navigating Divorce Law in Ontario: A Practical Guide par BTL Law P.C.
Navigating Divorce Law in Ontario: A Practical GuideNavigating Divorce Law in Ontario: A Practical Guide
Navigating Divorce Law in Ontario: A Practical Guide
BTL Law P.C.9 vues

Section 66 of Information Technology Act.

  • 1. Presentation on Section 66A of IT Act BY Anveshika 1
  • 2. Contents:- 1.Information Technology Act 2000 2.Objective of IT Legislation in India 3.Structure of IT Act 4.Section 66 of IT act i. Section 66A ii. Section 66B iii. Section 66C iv. Section 66D v. Section 66E vi. Section 66F 5.Conclusion 2
  • 3. Information Technology Act 2000 The Information Technology Act 2000 has been substantially amended through the Information Technology Act 2008 which was passed by the two houses of the Indian Parliament on December 23, and 24, 2008. It got the Presidential assent on February 5, 2009 and came into force on October 27, 2009. The amended Act has provided additional focus on information security. 3
  • 4. OBJECTIVES OF IT LEGISLATION IN INDIA “to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce" . 4
  • 5. STRUCTURE OF IT ACT .Information technology Act 2000 consisted of 94 sections segregated into 13 chapters. .In the 2008 version of the Act, there are 124 sections and 14 chapters. 5
  • 6. Section 66 of IT Act:- “If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.” 6
  • 7. 7 Related Case :- .In this case the accused, N G Arun Kumar, the techie from Bangalore gained unauthorized access to the Joint Academic Network (JANET) and deleted, added files and changed the passwords to deny access to the authorized users. .The CBI had registered a cyber crime case against Kumar and carried out investigations on the basis of a complaint by the Press Information Bureau, Chennai, which detected the unauthorised use of broadband Internet.
  • 8. 8 Cont : .The complaint also stated that the subscribers had incurred a loss of Rs 38,248 due to Kumar’s wrongful act. Verdict:- The Additional Chief Metropolitan Magistrate, Egmore, Chennai, sentenced the accused to undergo a rigorous imprisonment for one year with a fine of Rs 5,000 Section 66 of IT Act.
  • 9. 9 Subsection of Section 66:- Section 66A :– “Punishment for sending offensive messages through communication service.” Punishment:-imprisonment for a term which may extend to three years and with fine.
  • 10. 10 Related Case :- Fake profile of President posted by imposter .On September 9, 2010, the imposter made a fake profile in the name of the Hon’ble President Pratibha Devi Patil. .A complaint was made from Additional Controller, President Household, President Secretariat regarding the fake profiles created on Facebook. .The First Information Report Under Section 66A Information Technology Act, 2000 was registered based on the said complaint at the police station, the elite wing of Delhi Police which specializes in investigating economic crimes including cyber offences.
  • 11. 11 Section 66B:- “Punishment for dishonestly receiving stolen computer resource or communication device.” Punishment:-imprisonment for a term which may extend to three years or with fine which may extend to rupees one lakh or with both.
  • 12. 12 Section 66C:- “For identity theft i.e., fraudulently or dishonestly making use of the electronic signature, password or any other unique identification feature of any other person.” Punishment:-imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.
  • 13. 13 Related Case:- .The CEO of an identity theft protection company, Lifelock, Todd Davis's social security number was exposed by Matt Lauer on NBC’s Today Show. .Davis’ identity was used to obtain a $500 cash advance loan.
  • 14. 14 Section 66D :- “Punishment for cheating by personation by using computer resource.” Punishment:-with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.
  • 15. 15 Related Case:- . A complaint filed by the representative of a Company, The company has a web-site in the name and and style `www.jaypolychem.com' but, another web site `www.jayplychem.org' was set up by the accused,Samdeep Varghese @ Sam, (who was dismissed from the company). .The Company suffered losses of several crores of Rupees from producers, suppliers and customers and were unable to do business.
  • 16. 16 Section 66E:- “For violation of privacy i.e., intentionally or knowingly capturing, publishing or transmitting the image of a private area of any person without his or her consent, violating the privacy of that person,.” Punishment:-imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both.
  • 17. 17 Related Case:- Jawaharlal Nehru University MMS scandal .A pornographic MMS clip was apparently made in the campus and transmitted outside the university. . reports claimed that the two accused students initially tried to extort money from the girl in the video but when they failed the culprits put the video out on mobile phones, on the internet and even sold it as a CD .
  • 18. 18 Section 66F- “For cyber terrorism i.e., intention to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people.” Punishment:-imprisonment which may extend to imprisonment for life.
  • 19. 19 Related case:- .The Mumbai police have registered a case of ‘cyber terrorism’ here a threat email was sent to the BSE and NSE . . an email challenging the security agencies to prevent a terror attack was sent by one Shahab Md with an ID sh.itaiyeb125@yahoo.in to BSE’s administrative email ID corp.relations@bseindia.com. . The MRA Marg police have registered forgery for purpose of cheating, criminal intimidation cases under the IPC and a cyber-terrorism case under the IT Act.
  • 20. 20 Conclusion:- .Section 66A of the Information Technology Act, “does not silence anyone”. . You can always exercise your right to speak, your freedom of speech and expression without offending people
  • 22. 22