Executive Summary
The Information Technology Act, 2000 defines cyber crimes and prescribes penalties for computer-related offenses:
- Primary provisions: Sections 66, 66A-66F
- Offenses covered: Hacking, identity theft, cyber terrorism
- Section 66A: Struck down by Supreme Court (Shreya Singhal)
- Penalties: Imprisonment and fines
- Investigation: Cyber cells and special courts
- Cross-border: International cooperation challenges
This guide examines IT Act cyber crime provisions and prosecution framework.
1. Key Cyber Crime Provisions
| Offense |
Description |
| Dishonestly/fraudulently |
Any act under Section 43 |
| Punishment |
Up to 3 years + Rs. 5 lakh fine |
Section 66B - Receiving Stolen Computer Resource
| Element |
Requirement |
| Receipt |
Of stolen computer resource |
| Knowledge |
Reason to believe stolen |
| Punishment |
Up to 3 years + Rs. 1 lakh fine |
Section 66C - Identity Theft
| Element |
Requirement |
| Using |
Electronic signature or password |
| Of another person |
Without authority |
| Fraudulently/dishonestly |
Intent required |
| Punishment |
Up to 3 years + Rs. 1 lakh fine |
Section 66D - Cheating by Personation
| Element |
Requirement |
| Using |
Computer resource |
| Personating |
Another person |
| Cheating |
Resulting effect |
| Punishment |
Up to 3 years + Rs. 1 lakh fine |
2. Section 66A - Struck Down
Shreya Singhal v. Union of India (2015)
| Issue |
Finding |
| Vagueness |
Terms undefined |
| Overbreadth |
Excessive restriction |
| Article 19(1)(a) |
Violated free speech |
| Result |
Section struck down |
Impact
| Aspect |
Effect |
| Arrests |
Under 66A no longer valid |
| Pending cases |
To be dropped |
| New law |
Not yet enacted |
3. Serious Cyber Crimes
Section 66E - Privacy Violation
| Element |
Requirement |
| Capturing |
Image of private area |
| Publishing |
Without consent |
| Punishment |
Up to 3 years + Rs. 2 lakh fine |
Section 66F - Cyber Terrorism
| Element |
Requirement |
| Intent |
Threaten unity, integrity, sovereignty |
| Acts |
Denying access, introducing virus |
| Punishment |
Imprisonment for life |
4. Investigation Framework
Cyber Police Stations
| Function |
Scope |
| Registration |
FIR for cyber crimes |
| Investigation |
Technical examination |
| Evidence |
Digital forensics |
Section 80 - Powers
| Power |
Application |
| Enter premises |
Search and seizure |
| Seize equipment |
Computer, data |
| Documentation |
Maintain records |
5. Evidence Collection
Section 65B Certificate
| Requirement |
Specification |
| Certificate |
For electronic evidence |
| Contents |
Authenticity details |
| Signatory |
Person in charge |
| Admissibility |
Mandatory for court |
Digital Forensics
| Step |
Process |
| Preservation |
Maintain integrity |
| Collection |
Forensic imaging |
| Analysis |
Technical examination |
| Reporting |
Expert opinion |
6. Compliance Checklist
For Organizations
For Victims
7. Key Takeaways
- Section 66: Primary offense provision for computer crimes.
- Section 66A: No longer valid after Shreya Singhal.
- Identity Theft: Specifically covered under Section 66C.
- Cyber Terrorism: Severe punishment including life imprisonment.
- Evidence: Section 65B certificate essential.
Conclusion
IT Act cyber crime provisions provide the framework for prosecuting computer-related offenses. While Section 66A has been struck down, other provisions remain effective. Proper investigation procedures and evidence collection are critical for successful prosecution.