Why BNS Matters in Cyber Cases
While IT Act handles technology-specific crimes, the BNS 2023 captures the human element — the intent, deception, and traditional criminal conduct that underlies most cyber offences. A cyber lawyer must master both.
Why Police Prefer BNS: Officers are trained in traditional criminal law. BNS sections (cheating, extortion, forgery) are familiar. IT Act requires understanding technology. Result: Many cyber FIRs cite only BNS, missing mandatory IT Act sections.
When IT Act vs BNS Applies
🖥️ IT Act Mandatory When:
- Unauthorized computer access (hacking)
- Identity credential theft (passwords, OTPs)
- Impersonation via computer resource
- Privacy violation (capturing images)
- Obscene/explicit content online
- Attack on critical infrastructure
📜 BNS Applies When:
- Deception inducing delivery of property
- Threats causing fear (intimidation)
- False document creation
- Repeated unwanted contact (stalking)
- Injury to reputation (defamation)
- IT Act is silent on specific conduct
A. Cheating & Fraud in Digital Transactions
Definition (S.318):
Whoever by deceiving any person fraudulently or dishonestly induces the person so deceived to:
- Deliver any property to any person, or
- Consent that any person shall retain property, or
- Intentionally induces to do/omit anything which causes damage
Online Cheating Examples: Fake e-commerce sites, advance fee frauds, job scams, matrimonial frauds, investment scams. The "property" includes money transferred via UPI/NEFT/card.
Cheating by pretending to be some other person, or by knowingly substituting one person for another.
When to use which?
• S.66D IT Act — Personation using computer resource (mandatory for digital impersonation)
• S.319 BNS — General personation (adds to IT Act charge)
Best Practice: Charge both S.66D + S.319 for digital impersonation fraud.
Victim searches "SBI customer care" on Google, calls a fake number appearing in search results. Caller poses as SBI official, obtains OTP, transfers ₹2 lakhs.
Correct Charging:
- S.66C IT Act — Identity theft (obtaining OTP)
- S.66D IT Act — Cheating by personation using communication device
- S.318 BNS — Cheating (inducing delivery of money)
- S.319 BNS — Cheating by personation (pretending to be bank official)
B. Online Extortion & Sextortion
Elements:
- Intentionally putting any person in fear of injury
- To that person or any other person
- And thereby dishonestly inducing delivery of property or valuable security
"Injury" includes injury to reputation. This is the foundation for sextortion charges.
Sextortion = S.308 BNS + IT Act sections
Typical pattern: Accused obtains intimate images (consent or non-consent), threatens to publish unless money paid.
Applicable Sections:
• S.308 BNS — Extortion (fear of reputational injury)
• S.66E IT Act — Privacy violation (if images captured without consent)
• S.67/67A IT Act — If images actually published
• S.351 BNS — Criminal intimidation
Threatening another with injury to person, reputation, or property with intent to cause alarm or to cause that person to do/omit any act.
S.351 fills the S.66A gap. Since S.66A (offensive messages) was struck down, S.351 BNS is the primary section for threatening messages sent via WhatsApp, email, social media.
C. Forgery of Electronic Records
Making a false document or electronic record with intent to cause damage, support claim, induce parting with property, or dishonest/fraudulent purpose.
Electronic Forgery Examples:
- Fake bank statements (PDF manipulation)
- Forged email headers
- Doctored screenshots of conversations
- Fake digital certificates
- Manipulated photos/documents
Forgery committed with intent to commit fraud/cheating. This is the aggravated form — use when forgery is means to commit cheating.
Business Email Compromise: Fake email domain (abc-pharma.co) impersonating company → S.338 (forgery for cheating) + S.66D IT Act + S.318 BNS.
D. Cyber Stalking & Harassment
Definition (S.78):
A man who follows a woman and contacts/attempts to contact despite clear indication of disinterest, or monitors use of internet/email/electronic communication.
Cyber Stalking Elements:
- Repeated unwanted contact via social media, email, messaging
- Creating fake profiles to monitor victim
- Tracking online activity
- Despite clear indication of disinterest
S.78 BNS applies only to male accused, female victim. For other gender combinations, use S.351 (criminal intimidation) or general harassment provisions.
Watching or capturing image of woman engaging in private act where she would expect not to be observed.
Both cover similar conduct. Charge both:
• S.77 BNS — General voyeurism provision
• S.66E IT Act — When done using electronic device + publishing/transmitting
Making or publishing any imputation concerning any person intending to harm, or knowing that it will harm, the reputation of such person.
Online Defamation:
- Defamatory posts on social media
- Fake reviews damaging business reputation
- Morphed images with defamatory captions
- False accusations in online forums
IT Act has no defamation section. S.66A was struck down. For online defamation, S.356 BNS is the only criminal remedy. Civil suit also available.
E. Data Theft as Property Offence
Intending to take dishonestly any movable property out of possession of any person without consent.
Legal Debate: Traditional theft requires "movable property." Data is intangible. Courts have inconsistent views.
Safer Approach: For data theft, prefer S.43/66 IT Act (unauthorized access/extraction) over S.303 BNS. Use S.303 only if physical medium (USB, laptop) stolen.
| Scenario | IT Act Section | BNS Section | Notes |
|---|---|---|---|
| Employee copies database to USB | S.43 + S.66 | S.303 (if USB stolen) | IT Act primary |
| Hacker exfiltrates customer data | S.43 + S.66 | — | IT Act only |
| Ex-employee retains company laptop with data | S.66 | S.303 (laptop) + S.405 (breach of trust) | Both applicable |
Quick Reference: BNS Cyber Sections
| Section | Offence | Punishment | Bail | Cyber Application |
|---|---|---|---|---|
| S.303 | Theft | 3 yrs | Bailable | Physical device theft with data |
| S.308 | Extortion | 7 yrs | Non-Bailable | Sextortion, ransomware demands |
| S.318 | Cheating | 7 yrs | Non-Bailable | Online fraud, phishing |
| S.319 | Cheating by Personation | 5 yrs | Non-Bailable | + S.66D IT Act |
| S.336 | Forgery | 2 yrs | Bailable | Fake documents, emails |
| S.338 | Forgery for Cheating | 7 yrs | Non-Bailable | BEC fraud, fake websites |
| S.351 | Criminal Intimidation | 2/7 yrs | Bailable/NB | Threatening messages (S.66A gap) |
| S.356 | Defamation | 2 yrs | Bailable | Online defamation |
| S.77 | Voyeurism | 3/7 yrs | Bailable | + S.66E IT Act |
| S.78 | Stalking | 3/5 yrs | Bailable | Cyber stalking (male accused only) |
🎯 Key Takeaways
- BNS captures intent, IT Act captures method: Most cyber cases need both
- S.318/319 + S.66D: Standard combo for online fraud/impersonation
- S.308 + S.66E: Sextortion framework
- S.351 fills S.66A gap: Use for threatening messages
- S.356 for defamation: IT Act has no defamation provision
- S.78 is gender-specific: Male accused, female victim only
- Data theft controversy: Prefer IT Act over S.303 for pure data theft
