Page 357 - Computer Science Class 11 Without Functions
P. 357
Some of the offences and punishments that fall under the IT Act, 2000, are as follows:
Section Offence Penalty
65 Tampering with the computer source Imprisonment up to three years, or/and with a fine
documents up to `2,00,000
66 Hacking with computer system Imprisonment up to three years, or/and with a fine
up to `5,00,000
67 Publishing of information which is obscene Imprisonment up to five years, or/and with a fine up
in electronic form to `10,00,000
68 Power of Controller to give directions Imprisonment up to two years, or/and with a fine up
to `1,00,000
69 Directions of Controller to a subscriber to Imprisonment up to seven years, or/and shall be
extend facilities to decrypt information liable to fine.
70 Securing access or attempting to secure Imprisonment up to ten years, or/and with fine
access to a protected system
71 Misrepresentation Imprisonment up to 2 years, or/and with a fine up to
`1,00,000
72 Breach of confidentiality and privacy Imprisonment up to 2 years, or/and with a fine up to
`1,00,000
73 Publishing Digital Signature Certificate false Imprisonment up to 2 years, or/and with a fine up to
in certain particulars `1,00,000
74 Publication for fraudulent purpose Imprisonment up to 2 years, or/and with a fine up to
`1,00,000
14.10.1 Privacy Law
Privacy is the ability of an organisation or individual to determine what data can be shared with third parties. Privacy
law establishes the rules that regulate the collection, storage, and disclosure of a person’s or organisation’s financial,
medical, and other personal information to third parties.
14.10.2 Cyber Law
Cyber Laws are the statutory provisions against various forms of cybercrime. These laws define the crimes and the
corresponding penalties and punishments imposed against people who commit such crimes. For cyber security, an
amendment to the IT Act 2000 named the Information Technology Amendment Act, 2008 was also introduced.
14.10.3 Cyber Forensics
Cyber forensics aims to use the IT infrastructure to track cybercrimes and may include the following activities:
● Retrieve deleted data, chat histories, emails, and more.
● ecord phone calls for use as evidence.
R
● Track who and when used the IT infrastructure such as computer, mobile app, or a website.
Society, Law and Ethics 355

