top of page
A group of people discussing about laws
CYBERLAWS

Cyberlaws - FAQs  

Cyber Laws

Q: What are cyberlaws?

A: Cyberlaws are legal regulations governing the use of computers, the internet, digital devices, and cyberspace. They address issues like cybercrime, electronic commerce, digital signatures, data protection, intellectual property in the digital realm, and online content regulation. Cyberlaws establish legal frameworks for both preventing misuse of technology and facilitating legitimate digital activities.

 

Q: What is the primary cyberlaw in India?

A: The Information Technology Act, 2000 (IT Act) is India's primary legislation dealing with cybercrime and electronic commerce. It was amended significantly in 2008 to address emerging challenges. The IT Act provides legal recognition to electronic transactions, digital signatures, and electronic records, while also defining cybercrimes and prescribing penalties for various offences.

Q: What other laws govern cyber-related matters in India?

A: Besides the IT Act, several laws address cyber issues including the Bharatiya Nyaya Sanhita (BNS), 2023 with provisions on fraud, defamation, and obscenity; the Bharatiya Sakshya Adhiniyam (BSA), 2023 recognising electronic evidence; Copyright Act protecting digital content; the Digital Personal Data Protection Act, 2023; Banking Regulation Act for online banking; and various sector-specific regulations addressing telecommunications, broadcasting, and intermediary liability.

Electronic Evidence

 

Q: Are electronic records admissible as evidence in Indian courts?

A: Yes, Section 63 of the Bharatiya Sakshya Adhiniyam, 2023  (as amended by the IT Act) makes electronic records admissible as evidence, provided certain conditions are met. A certificate describing the computer system, the manner of producing the record, and confirming proper operation must accompany the electronic evidence. In 2014, the Supreme Court clarified that a Section 63 certificate is mandatory for the admissibility of electronic evidence.

 

Q: What is the legal status of electronic contracts?

A: Section 10A of the IT Act recognises electronic contracts as valid and enforceable. Contracts cannot be denied validity solely because they are in electronic form or involve electronic signatures. The Act specifies that the communication of proposals, acceptance, and revocation can be expressed through electronic means, facilitating e-commerce and digital business transactions.

 

Q: How are electronic records authenticated?

A: Electronic records are authenticated through digital signatures, electronic signatures, or other secure electronic methods. Authentication ensures the record's integrity and verifies the sender's identity. Courts also consider metadata, hash values, audit trails, timestamps, and expert testimony when assessing the authenticity of electronic evidence in legal proceedings.

Cybercrime Investigation & Adjudication

Q: Who investigates cybercrimes in India?

A: Cybercrimes are investigated by police cyber cells established at the state and national levels. The Central Bureau of Investigation (CBI) has a specialised Cyber Crime Cell. Section 78 empowers police officers of Inspector rank and above to investigate offences under the IT Act. Many states have established dedicated cybercrime police stations with trained personnel to handle technology-related crimes.

Q: What are Adjudicating Officers under the IT Act?

A: Adjudicating Officers are appointed under Section 46 to adjudicate civil contraventions (not criminal offences) under the IT Act and determine compensation. They hold inquiry proceedings, consider evidence and submissions, and pass orders awarding compensation up to ₹1 crore for violations like unauthorised access, data damage, or denial of service. Appeals against their orders lie with the Cyber Appellate Tribunal.

 

Q: What is the Cyber Appellate Tribunal?

A: Originally established under Section 48, the Cyber Appellate Tribunal heard appeals from Adjudicating Officers' orders and Certifying Authorities' licenses. However, in 2017, the Finance Act abolished the Tribunal and transferred its functions to the Appellate Tribunal constituted under the Telecom Regulatory Authority of India Act (later shifted to designated High Courts for adjudication of such matters).

Digital Signatures

 

Q: What is a Digital Signature Certificate?

A: A Digital Signature Certificate (DSC) is an electronic credential issued by a licensed Certifying Authority that establishes the certificate holder's identity in digital transactions. It contains the holder's name, public key, serial number, validity period, and CA's digital signature. DSCs are mandatory for various purposes, including e-filing of income tax returns, company incorporation, government tenders, and certain legal documents.

 

Q: What are the different classes of Digital Signature Certificates? A: DSCs are classified into three classes: Class 1 (basic identification, email verification), Class 2 (business and private use with higher verification, commonly used for e-filing), and Class 3 (the highest level of security requiring personal appearance before the Registration Authority, used for e-commerce, e-tendering, and sensitive transactions requiring strong authentication).

Blocking & Content Regulation

 

Q: Can the government block websites and content?

A: Yes, Section 69A empowers the Central Government or authorised officers to block public access to any information through computer resources if necessary for sovereignty, integrity, defence, security, friendly relations with foreign states, public order, preventing incitement to cognizable offences, or other specified grounds. The IT (Procedure and Safeguards for Blocking Access of Information by the Public) Rules, 2009, govern this process.

 

Q: What is the procedure for content blocking?

A: Blocking requests are examined by a Committee for Examination of Requests. If satisfied, the Designated Officer issues directions to intermediaries or government agencies to block content. Affected parties can submit representations to the Committee within specified timeframes. Emergency blocking provisions exist for urgent situations. The process aims to balance security concerns with freedom of expression and due process.

 

Q: Can the government intercept communications?

A: Section 69 permits the Central/State Government to intercept, monitor, or decrypt information through computer resources if necessary for investigation, sovereignty, security, public order, preventing incitement to offences, or friendly relations with foreign states. The IT (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 prescribe procedures, including approval by competent authorities and periodic review by oversight committees.

Cybercrimes

Q: What constitutes unauthorised access under the IT Act?

A: Section 43 addresses unauthorised access to computer systems, downloading or extracting data, introducing viruses or malicious code, damaging or deleting data, disrupting computer systems, denying authorised access, and assisting others in unauthorised access. These acts are civil wrongs punishable with compensation up to ₹1 crore to the affected party.

Q: What is hacking, and what are its penalties?

A: Section 66 defines hacking as unauthorised access to any computer resource with the intent to commit fraud, dishonesty, or to cause wrongful loss or damage. Hacking is a criminal offence punishable with imprisonment up to three years, or a fine up to ₹5 lakhs, or both. This includes unauthorised access to systems, networks, and data with malicious intent.

 

Q: What is cyber terrorism under the IT Act?

A: Section 66F defines cyber terrorism as acts committed with the intent to threaten the unity, integrity, security, or sovereignty of India or to strike terror in people by denying access to computer resources, attempting to penetrate or attack critical infrastructure systems, or introducing contaminants that threaten national security. Cyber terrorism is punishable with imprisonment for life.

 

Q: What are identity theft and cheating by personation?

A: Section 66C addresses identity theft, which involves dishonestly or fraudulently using another person's electronic signature, password, or unique identification feature. Section 66D covers cheating by personation using computer resources, such as impersonating someone online to deceive others. Both offences are punishable with imprisonment up to three years and fines up to ₹1 lakh.

 

Q: What are the provisions against child pornography?

A: Section 67B specifically addresses child pornography and child sexual abuse material (CSAM). It prohibits publishing, transmitting, creating, collecting, browsing, or facilitating such content in electronic form. The offence is punishable with imprisonment of five years and a fine of ₹10 lakhs for the first conviction, and seven years with ₹10 lakhs for subsequent convictions. This reflects India's zero-tolerance approach toward crimes against children.

 

Q: What is data theft under the IT Act?

A: Data theft falls under Section 43(b), which addresses unauthorised downloading, copying, or extraction of data from computer systems. Additionally, Section 66 covers theft of computer resources or communication devices. Section 379 of the IPC also applies to intangible property like data and information. Penalties include compensation and imprisonment, depending on the nature and severity of theft.

Cyber Forensics

Q: What is cyber forensics?

A: Cyber forensics (digital forensics) is the scientific process of collecting, preserving, analysing, and presenting electronic evidence from computers, networks, mobile devices, and storage media for the investigation and prosecution of cybercrimes. It involves creating forensic images, recovering deleted data, analysing logs and metadata, tracking digital footprints, and maintaining a chain of custody for admissibility in courts.

 

Q: What is an Examiner of Electronic Evidence?

A: Under Section 79A, the Central Government may appoint Examiners of Electronic Evidence to assist in cybercrime investigations. These experts examine electronic evidence, provide technical opinions, recover data, analyse digital devices, and assist courts and investigating agencies in understanding complex technological aspects of cases. Their reports carry evidentiary value in proceedings.

 

Q: How should organisations preserve electronic evidence?

A: Organisations should implement evidence preservation protocols, including immediate isolation of affected systems, creating forensic images without altering original data, documenting the chain of custody, preserving logs and metadata, maintaining hash values to prove integrity, securing physical and logical access, and engaging qualified forensic experts. Proper preservation is crucial for evidence admissibility and successful prosecution.

Penalties & Offences

Q: What is the punishment for damaging computer systems?

A: Section 66 addresses damage to computer systems, data, or networks. Offenders face imprisonment for up to three years or fines of up to ₹5 lakhs, or both. If the damage is to critical infrastructure (defined under Section 70), penalties are more severe. Additional civil liability under Section 43 allows affected parties to claim compensation up to ₹1 crore.

 

Q: What are the penalties for publishing obscene content?

A: Section 67 prohibits publishing or transmitting obscene material in electronic form, punishable with imprisonment up to three years and a fine up to ₹5 lakhs for the first conviction, five years and ₹10 lakhs for subsequent convictions. Section 67A addresses sexually explicit content with higher penalties, while Section 67B specifically targets child sexual abuse material with the most severe punishments.

 

Q: What is the punishment for failure to comply with directions?

A: Section 69 (failure to comply with interception/decryption directions) and Section 69A (failure to comply with blocking directions) prescribe imprisonment up to seven years and fines for non-compliance. Section 70 (failure to protect critical infrastructure) provides for imprisonment up to ten years. These provisions emphasise the importance of cooperation with lawful government directions.

 

Q: Are cybercrimes bailable or non-bailable offences?

A: The IT Act contains both bailable and non-bailable offences. Most offences under Sections 66, 66C, 66D, and 67 are generally bailable and cognizable. However, serious offences like cyber terrorism (Section 66F), hacking critical infrastructure (Section 70), and certain data breaches are non-bailable. The Bharatiya Nagarik Suraksha Sanhita, 2023 (BNSS) governs bail procedures based on the prescribed punishment for each offence.

Reporting & Redressal

Q: How can individuals report cybercrimes?

A: Cybercrimes can be reported through the National Cyber Crime Reporting Portal (cybercrime.gov.in), state cybercrime cells, local police stations, or the national helpline (1930). The portal allows online complaint registration for various offences, including financial fraud, social media crimes, ransomware, hacking, and cyber stalking. Anonymous reporting is available for certain sensitive crimes.

 

Q: What is the Indian Computer Emergency Response Team (CERT-In)?

A: CERT-In, established under Section 70B of the IT Act, is the national nodal agency for responding to computer security incidents. It issues alerts and advisories on cybersecurity threats, coordinates incident response, provides guidance on security best practices, tracks cybersecurity trends, and serves as the national contact for international cooperation on cyber incidents and information sharing.

 

Q: What are CERT-In's recent directions for cybersecurity?

A: In 2022, CERT-In issued directions requiring service providers, intermediaries, data centres, and corporate entities to maintain synchronised system logs for 180 days, report cyber incidents within six hours of noticing them, maintain information for Know Your Customer (KYC) purposes, and designate points of contact for coordination. These directions aim to strengthen incident response and forensic capabilities.

bottom of page