The Amended IT Act Came Into Effect From 27 Oct, 2009
The Amended IT Act Came Into Effect From 27 Oct, 2009
(browsers are requested to follow the hyperlinks for detailed commentary the commentary is
courtesy our law department)
The amended IT Act came into effect from 27th Oct, 2009.
Main Features
The Act shall not apply to the documents listed in the First
Schedule. The exclusions include -A negotiable instrument (other
than a cheque) as defined in the NI Act, 181, POA as defined under
POA Act, 1882, trusts defined under Trust Act, a Will under Succession
Act, a contract for sale of immovable property.
Documents or transactions to which the Act shall not apply
Formally defines the meaning and scope of the following in the context
of the amended IT Act-2008-:
a) Intermediary , Cyber Cafe , Cyber Security , Communication
Device, Computer Network, Secure Electronic Signature;
b) Duties of Subscribers of Electronic Signature Certificate;
c) States that audit requirements for records maintained in physical
form shall automatically be extended to electronic records
/documents ;
Audit of documents maintained in Electronic Form
d)
Annexure
Salient Features of Information Technology (Amendment) Act, 2008
1.
Introduction
Information Technology (Amendment) Act, 2008 (hereinafter referred to
as Amendment Act), has been passed by the Lok Sabha on 22nd December
2008 and by Rajya Sabha on 23rd December 2008 and received the assent of
the President on 5th February 2009. The Act came into force with effect from
27th October 2009. By the Amendment Act, various provisions of Information
Technology Act, 2000 (hereinafter IT Act or the Act) have been amended
and the major amendments are described hereunder.
2.
(ii)
(iii)
(iv)
(v)
Electronic Signature
As per Section 2(ta) of the IT Act, as inserted by the Amendment Act,
(i)
(ii)
(iii)
(iv)
(v)
The Central Government can also prescribe the procedure for the
purpose of ascertaining whether the Electronic signature is that of the person
by whom it is purported to have been affixed or authenticated. The Central
Government can also by notification in the Official Gazette add or omit any
electronic signature or electronic authentication technique and the procedure
for affixing such signature from the Second Schedule. Further, no electronic
signature or authentication technique shall be specified in the Second
Schedule unless such signature or technique is reliable.
As per Section 2 of the Amendment Act, the words Digital Signature
has been replaced with Electronic Signature in various provisions of the IT
Act.
The net effect of such amendment is that the scope of authentication of
electronic records has been got widened.
4.
Intermediary
The term intermediary has been defined in Section 2(w) of the IT Act.
As per the said Section, intermediary with respect to any particular electronic
records, means any person who on behalf of another person receives, stores
or transmits that record or provides any service with respect to that record and
includes telecom service providers, network service providers, internet service
providers, web-hosting service providers, search engines, online payment
sites, online market places and cyber cafes.
(b)
Cyber Cafe
As per Section 2(na), cyber cafe means any facility from where access
Cyber Security
Communication Device
As per Section 2(ha), communication device means cellphones,
Computer Network
Section 2(j) of the Act has been amended to include inter connection of
the Secure Digital Signature. The said Section has been substituted by the
new Section dealing with Secure Electronic Signature. As per the amended
section, an Electronic Signature shall be deemed to be a Secure Electronic
Signature, if
(i)
(ii)
whereby powers have been given to the Government to authorise any service
provider to set up, maintain and upgrade the computerised facilities and
perform such other services as specified in the notification for the purpose of
Electronic Governance and for efficient delivery of services to the public
through electronic means. For this purpose, any individual, private agency,
private company, partnership firm, sole proprietory firm or any such other
body or agency can be appointed as a service provider and they have to offer
services through electronic means in accordance with the policy governing
such service sector.
The Government can also provide scales of service charge which may be
charged and collected by the service provider.
Click here to go backMain Features
8.
Controller shall be the repository of all the digital signature certificates issued
under the Act. However, as per the amendment Act, this section has been
omitted. The role of repository of all electronic signature certificates has been
assigned to Central Certifying Authority by amending Section 30 of the IT Act.
It is also stipulated that every Certifying Authority shall publish information
regarding its practices, electronic signature certificates and current status of
such certificates.
Click here to go backMain Features
11.
System, etc.
The damage of compensation not exceeding Rs.1 crore prescribed
under Section 43 of the IT Act (before its amendment) for damage to
computer, computer system, etc. has been deleted and the relevant portion of
the section has been substituted by the words he shall be liable to pay
damages by way of compensation to the person so affected. In addition to
the other existing provisions (Section 43), the following are also added as
instances where a person can be made liable to pay damages by way of
compensation :
If a person without permission of the owner or any other person, who is
in-charge of a computer, computer system or computer network, (a)
(b)
(c)
For the purpose of the section dealing with the penalties (Section 43)
Computer Source Code has been defined as the listing of programmes,
computer commands, design and layout and programme analysis of computer
source code in any form.
Further,
Adjudicative Power
Section 46 of the IT Act gives power to the Central Government to
appoint any officer not below the rank of a Director of Government of India or
Act prior to its amendment has been renamed as Cyber Appellate Tribunal
(Section 48).
redesignated as Chairperson.
As per the IT Act prior to its amendment, the Tribunal shall consist of
one person only. However, as per the amendment made to Section 49 of the
IT Act, the Cyber Appellate Tribunal shall consist of a Chairperson and such
number of other Members as the Central Government may appoint by
notification. Further, the selection of Chairperson and members of the Cyber
Appellate Tribunal shall be made by the Central Government in consultation
with the Chief Justice of India.
The jurisdiction, powers and authority of the Cyber Appellate Tribunal
can be exercised by the benches of the Tribunal. The chairperson of the
Tribunal can constitute a bench with one or two members of the Tribunal as
he deems fit. The benches of the Tribunal shall sit at New Delhi and such
other places as the Central Government may notify in consultation with the
Chairperson.
A person shall not be qualified for appointment as a Chairperson of the
Cyber Appellate Tribunal, unless he is or has been or qualified to be a judge
of a High Court. The IT Act also stipulates the qualifications for a person to
be appointed as a member or judicial member of Cyber Appellate Tribunal.
Further, before appointing any person as Chairperson or Member of the
Tribunal, the Central Government shall satisfy itself that the person does not
have any such financial or other interest as is likely to affect judicially his
functions as such chairperson or Member.
The salary and allowances payable to, and other terms and conditions
of services of the Chairman or Member shall be such as may be prescribed by
the Central Government. The Chairperson of the Cyber Appellate Tribunal
shall have the powers of general superintendence and directions in the
conduct of the affairs of the Tribunal including power to distribute the business
or transfer of cases among the different benches of Cyber Appellate Tribunal.
Click here to go backMain Features
15.
with Computer System has been substituted with a new Section titled as
Computer related Offences.
dishonestly or fraudulently does any act for damage to computer system, etc.
as stated in Section 43, he shall be punishable with imprisonment for a term
which may extend to three years or with fine which may extend to Rs.5 lacs or
with both.
(ii)
(iii)
For the purpose of above stated Section, terms electronic mail and
electronic mail message means a message or information created or
transmitted or received on a computer or a computer system, computer
resources or communication device including attachments in text, image,
audio, video and any other electronic record, which may be transmitted with
the message.
Section 66B deals with the punishment for dishonestly receiving stolen
computer resource or communication device. As per this Section, whoever
dishonestly
receives
or
retains
any
stolen
computer
resource
or
imprisonment of either description for a term which may extend to three years
or with fine which may extend to one lac rupees or with both.
Section 66C deals with the punishment for identity, theft. As per this
Section, whoever fraudulently or dishonestly makes use of the electronic
signature, password or any other unique identification feature of any other
person shall be punished with imprisonment of either description for a term
which may extend to three years and shall also be liable to fine which may
extend to one lac rupees.
Section 66D deals with the punishment for cheating by personation by
using computer resource. As per this Section, whoever by means for any
communication device or computer resource, cheats by personating, shall be
punished with the imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which may extend to one
lac rupees.
Section 66E deals with the punishment for violation of privacy. As per
this Section, whoever intentionally or knowingly captures, publishes or
transmits the image of a private area of any person without his or her consent
under circumstances violating the privacy of that person, shall be punished
with imprisonment which may extend to three years or with fine not exceeding
Rs.2 lacs or with both.
Section 66F deals with the punishment for cyber terrorism. As per this
Section, whoever commits or conspires to commit cyber terrorism shall be
punishable with imprisonment which may extend imprisonment for life. The
offence of cyber terrorism has been defined as whoever, with intent to
threaten the unity, integrity, security or sovereignty of India or to strike terror in
the people or any section of the people by
(i)
(ii)
(iii)
electronic form
Section 67 of the IT Act is amended to reduce the term of
imprisonment for publishing or transmitting obscene material in electronic
form to three years from five years and increase the fine from Rs. 1 lac to
Rs.5 lacs. A host of new Sections have been inserted as Section 67A to 67C.
A new section 69B has been inserted whereby power has been
conferred on the Central Government to authorise, monitor and collect traffic
data or information through any computer resources for cyber security.
Click here to go backMain Features
18.
Protected System
Section 70 of the IT Act dealing with the protected system has been
Director General and such other officers and employee to the ICERT. The
salary and allowances of such Director General and such other officers and
employees shall be as prescribed by the Central Government.
The ICERT shall serve as the National Agency for performing the
following functions in the area of cyber security.
(i)
(ii)
(iii)
(iv)
(v)
(vi)
Any
person who fails to comply with any such directions given by ICERT shall be
punishable with imprisonment for a term which may extend to one year or with
fine which may extend to Rs.1 lac or with both.
Click here to go backMain Features
20.
under the terms of lawful contract, has secured access to any material
containing personal information about any other person, with the intent to
cause or knowing that he is likely to cause wrongful loss or wrongful gain
discloses, without the consent of the person concerned, or in breach of a
lawful contract such material to any other person, shall be punished with
imprisonment for a term which may extend to three years or with fine which
may extend to Rs.5 lacs or with both.
Click here to go backMain Features
21.
Compounding of offences
A new Section has been inserted as Section 77A whereby, it is
specified that offences under IT Act other than those for which the punishment
is for life or imprisonment for a term exceeding three years shall be
compoundable. However, cases where the accused is liable to enhanced
punishment or for a punishment of different kind on account of previous
conviction shall not be compoundable. Further, offences affecting the socioeconomic conditions of the country or which has been committed against child
below the age of 18 years or against a woman shall not be compoundable.
As per Section 77B of the IT Act, the offences punishable with
imprisonment of three years and above shall be cognizable and the offences
with punishment of imprisonment with three years shall be bailable.
Section 78 of the Act has been amended to confer power upon a police
officer not below the rank of inspector to investigate any offence under the IT
Act whereas prior to the amendment, it was an officer not below the rank of
Deputy Superintendent of Police.
Similarly, Section 80 has also been amended to authorise police officer
not below the rank of inspector to enter any public place and search, and
arrest without warrant any suspected offender under IT Act, whereas, as per
earlier provisions, the powers were vested with an officer not below the rank
of Deputy Superintendent of Police.
Click here to go backMain Features
22.
from liability in certain cases has been amended to provide exemption from
liability of intermediary in certain cases. As per the amended provisions, an
intermediary shall not be liable for any third party information, data or
communication link made available or hosted by him if ;
(a)
(b)
the intermediary does not, (i) initiate the transmission, (ii) select
the receiver of the transmission and (iii) select or modify the
information contained in the transmission.
(c)
23.
Government has been conferred with the power to specify any department,
body or agency of the Central Government or a State Government as an
Examiner of an Electronic Evidence for the purpose of providing expert
opinion on electronic form evidence before any Court or other authority. Here,
electronic form evidence means any information of probative value, i.e. either
stored or transmitted in electronic form and includes computer evidence,
digital audio, digital video, cellphones, digital fax machines.
Click here to go backMain Features
24.
that the provisions of the IT Act shall apply to, or in relation to electronic
cheques and the truncated cheques.
Protection of Copyright
A proviso has been added to Section 81 which is dealing with the
overriding effect of the IT Act on other laws. As per the proviso, now added
the said overriding effect of IT Act shall not restrict any person from exercising
any right conferred under the Copyright Act or Patent Act.
Click here to go backMain Features
26.
Modes of Encryption
A new Section as 84A has been inserted whereby it is stated that the
Central Government may for secure use of the Electronic media and
promotion of e-governance and e-commerce prescribe the modes or methods
for encryption.
Click here to go backMain Features
27.
any offence shall also be punishable with the punishment provided for the
offences so abated provided the abated offence has been committed in
consequences of such abatement.
As per Section 84C inserted by the Amendment Act, whoever attempts
to commit an offence punishable under the IT Act or causes such an offence
to be committed and in such an attempt does any act towards the commission
of the offence, shall, be punished with imprisonment for a term which may
extend to one half of the longest term of imprisonment provided for the
offence or with such fine as is provided for the offence, or with both.
Click here to go backMain Features