Page 408 - Computer Science Class 11 With Functions
P. 408
Section Offence Penalty
Tampering with the computer source Imprisonment up to three years, or/and
65
documents with a fine up to `2,00,000
Imprisonment up to three years, or/and
66 Hacking with computer system
with a fine up to `5,00,000
Publishing of information which is obscene Imprisonment up to five years, or/and
67
in electronic form with a fine up to `10,00,000
Imprisonment up to two years, or/and
68 Power of Controller to give directions
with a fine up to `1,00,000
Directions of Controller to a subscriber to Imprisonment up to seven years, or/and
69
extend facilities to decrypt information shall be liable to fine.
Securing access or attempting to secure Imprisonment up to ten years, or/and
70
access to a protected system with fine
Imprisonment up to 2 years, or/and
71 Misrepresentation
with a fine up to `1,00,000
Imprisonment up to 2 years, or/and
72 Breach of confidentiality and privacy
with a fine up to `1,00,000
Publishing Digital Signature Certificate false Imprisonment up to 2 years, or/and
73
in certain particulars with a fine up to `1,00,000
Imprisonment up to 2 years, or/and
74 Publication for fraudulent purpose
with a fine up to `1,00,000
15.10.1 Privacy Law
Privacy is the ability of an organisation or individual to determine what data can be shared with third parties. Privacy
law establishes the rules that regulate the collection, storage, and disclosure of a person’s or organisation’s financial,
medical, and other personal information to third parties.
15.10.2 Cyber Law
Cyber Laws are the statutory provisions against various forms of cybercrime. These laws define the crimes and the
corresponding penalties and punishments imposed against people who commit such crimes. For cyber security, an
amendment to the IT Act 2000 named the Information Technology Amendment Act, 2008 was also introduced.
15.10.3 Cyber Forensics
Cyber forensics aims to use the IT infrastructure to track cybercrimes and may include the following activities:
● Retrieve deleted data, chat histories, emails, and more.
● Record phone calls for use as evidence.
● Track who and when used the IT infrastructure such as computer, mobile app, or a website.
406 Touchpad Computer Science-XI

