📧 admissions@cyberlawacademy.com
🖥️ Part 2.2 of 5

Cyber Offences under the IT Act, 2000

Technology-Specific Criminalisation — Master IT Act offences that cannot be replaced by BNS sections. From hacking to cyber terrorism, from identity theft to CSAM.

⏱️ ~120 minutes 📋 10+ Sections 🎯 Section-by-section analysis

A. Civil Wrongs with Criminal Consequences

The IT Act uniquely combines civil and criminal liability. Section 43 creates civil liability for unauthorized computer access, while Section 66 criminalizes the same acts when done dishonestly or fraudulently.

Section 43
Penalty for Damage to Computer, Computer System, etc.
Compensation up to ₹1 Crore
Civil Remedy

Prohibited Acts under S.43(a) to (j):

  • S.43(a): Unauthorized access to computer/network
  • S.43(b): Downloading/copying/extracting data
  • S.43(c): Introducing computer contaminant (virus/malware)
  • S.43(d): Intentionally damaging computer/data
  • S.43(e): Disrupting or causing denial of access
  • S.43(f): Denial of service to authorized person
  • S.43(g): Assisting in unauthorized access
  • S.43(h): Charging service to another person's account
  • S.43(i): Destroying/altering source code
  • S.43(j): Stealing/destroying any computer
💡Key Point

Section 43 provides civil compensation (up to ₹1 crore) adjudicated by IT Adjudicating Officer. No imprisonment. Perfect for corporate victims seeking damages without criminal prosecution delays.

Section 66
Computer Related Offences (Hacking)
Up to 3 years + ₹5 lakhs
Bailable

Essential Elements:

Actus Reus
Any act referred to in Section 43
Mens Rea
Dishonestly or Fraudulently

S.66 criminalizes S.43 acts when done with criminal intent. The key differentiator is mens rea — dishonest or fraudulent intention converts civil wrong into criminal offence.

Practice Tip

Bailability: S.66 is punishable with max 3 years — making it bailable. Bail is matter of right. Key defence argument: once devices seized, no tampering risk.

B. Core Cyber Crimes

Section 65
Tampering with Computer Source Documents
Up to 3 years + ₹2 lakhs
Bailable

Scope:

Concealing, destroying, altering source code when required to be maintained by law. "Source code" includes programs, computer commands, design, and layout.

⚖️Practical Use

Often used in: Employee stealing proprietary code, software piracy, website defacement affecting source files, destroying audit logs.

Section 66C
Identity Theft
Up to 3 years + ₹1 lakh
Bailable

Essential Elements:

What's Stolen
Electronic signature, password, or unique identification feature
Manner
Fraudulently or Dishonestly

Covers stealing login credentials, OTPs, biometric data, Aadhaar numbers, or any unique digital identifier.

💡S.66C vs S.66D

S.66C = Theft of identity credentials (stealing the password)
S.66D = Using stolen identity (impersonating with that password)
Often charged together in phishing cases.

Section 66D
Cheating by Personation using Computer Resource
Up to 3 years + ₹1 lakh
Bailable

Essential Elements:

Act
Cheating by personation
Medium
Using computer resource or communication device

This is the primary phishing section. Covers: fake websites impersonating banks, CEO fraud emails, social media impersonation for fraud, fake customer support calls.

⚠️Common Mistake

Charging only BNS S.318 (cheating) for phishing misses the technology element. S.66D is mandatory when impersonation occurs through digital means. Always charge both.

Section 66E
Violation of Privacy
Up to 3 years + ₹2 lakhs
Bailable

Prohibited Acts:

  • Capturing image of private area without consent
  • Publishing or transmitting such image
  • "Private area" = naked/undergarment-covered genitals, pubic area, buttocks, female breast

Primary section for voyeurism, upskirting, hidden camera offences. Often combined with S.67/67A if images are obscene.

Section 66F
Cyber Terrorism
Up to Life Imprisonment
Non-Bailable

Two Types of Acts:

Type 1 (S.66F(1)): Intent to threaten unity, integrity, security, sovereignty of India or strike terror:

  • Denial of access to authorized persons to computer resource
  • Attempting to penetrate secured computer resource
  • Introducing contaminant (knowing it may cause death, injury, property damage)

Type 2 (S.66F(2)): Knowingly accessing computer and obtaining information that could be used to injure sovereignty, integrity, security of India, relations with foreign states, public order, or cause offence to foreign nationals.

⚠️Critical Section

Life imprisonment + Non-bailable = Most serious IT Act offence. Used for: attacks on critical infrastructure (hospitals, power grid, banking), ransomware affecting essential services, state-sponsored hacking.

C. Obscenity & Content-Based Offences

Section 67
Publishing Obscene Material in Electronic Form
1st: 3 years + ₹5 lakhs
2nd+: 5 years + ₹10 lakhs
Bailable (1st) / Non-Bailable (2nd)

Publishing or transmitting in electronic form any material that is lascivious or appeals to prurient interest, or whose effect tends to deprave and corrupt.

Test: Community standards + likely audience + dominant theme. Similar to IPC 292 but for electronic medium.

Section 67A
Publishing Sexually Explicit Material
1st: 5 years + ₹10 lakhs
2nd+: 7 years + ₹10 lakhs
Non-Bailable

Publishing or transmitting material containing sexually explicit act in electronic form. More severe than S.67 — covers explicit depictions regardless of obscenity test.

💡S.67 vs S.67A

S.67: Obscene material (subjective test)
S.67A: Sexually explicit acts (objective — actual sex acts depicted)
S.67A is more serious with higher punishment.

Section 67B
Child Sexual Abuse Material (CSAM)
1st: 5 years + ₹10 lakhs
2nd+: 7 years + ₹10 lakhs
Non-Bailable + POCSO

Prohibited Acts:

  • Publishing/transmitting material depicting children in sexually explicit act
  • Creating text/digital images/advertising/promoting CSAM
  • Cultivating/enticing/inducing children for online relationship for sexually explicit act
  • Facilitating online abuse of children
  • Recording own abuse or abuse of others
⚠️Mandatory POCSO

S.67B must always be charged alongside POCSO Act provisions. POCSO has stricter punishments and procedures. Failure to invoke POCSO is a serious prosecution error.

Quick Reference: IT Act Offences

Section Offence Punishment Bail Key Elements
S.43Damage to computer₹1 Cr compensationCivilUnauthorized access/damage
S.65Source code tampering3 yrs + ₹2LBailableAlter/destroy source code
S.66Hacking3 yrs + ₹5LBailableS.43 acts + dishonest intent
S.66CIdentity theft3 yrs + ₹1LBailableSteal password/credential
S.66DCheating by personation3 yrs + ₹1LBailableImpersonate via computer
S.66EPrivacy violation3 yrs + ₹2LBailableCapture/publish private images
S.66FCyber terrorismLifeNon-BailableThreaten sovereignty/security
S.67Obscene material3/5 yrsBailable/NBLascivious/prurient content
S.67ASexually explicit5/7 yrsNon-BailableExplicit sex acts
S.67BCSAM5/7 yrs + POCSONon-BailableChild in sexual content

🎯 Key Takeaways

  • S.43 is civil, S.66 is criminal: Same acts, different consequences based on mens rea
  • S.66C + S.66D often charged together: Identity theft (stealing) + Cheating by personation (using)
  • S.66D is mandatory for phishing: Can't charge only BNS cheating
  • S.66F = Life imprisonment: Most serious; use for critical infrastructure attacks
  • S.67B always needs POCSO: Never charge CSAM without POCSO provisions
  • Most IT Act offences are bailable: Except S.66F, S.67A, S.67B (2nd offence)