📧 admissions@cyberlawacademy.com
⚖️ Part 2.3 of 5

Cyber Offences under BNS, 2023

Mens Rea, Deception & Human Conduct Online — Understanding how traditional crimes are digitally committed under the Bharatiya Nyaya Sanhita.

⏱️ ~90 minutes 📋 8 Key Sections 🎯 Charging strategy

Why BNS Matters in Cyber Cases

While IT Act handles technology-specific crimes, the BNS 2023 captures the human element — the intent, deception, and traditional criminal conduct that underlies most cyber offences. A cyber lawyer must master both.

💡Key Insight

Why Police Prefer BNS: Officers are trained in traditional criminal law. BNS sections (cheating, extortion, forgery) are familiar. IT Act requires understanding technology. Result: Many cyber FIRs cite only BNS, missing mandatory IT Act sections.

When IT Act vs BNS Applies

🖥️ IT Act Mandatory When:

  • Unauthorized computer access (hacking)
  • Identity credential theft (passwords, OTPs)
  • Impersonation via computer resource
  • Privacy violation (capturing images)
  • Obscene/explicit content online
  • Attack on critical infrastructure

📜 BNS Applies When:

  • Deception inducing delivery of property
  • Threats causing fear (intimidation)
  • False document creation
  • Repeated unwanted contact (stalking)
  • Injury to reputation (defamation)
  • IT Act is silent on specific conduct

A. Cheating & Fraud in Digital Transactions

Section 318 BNS
Cheating
Up to 7 years + fine
Non-Bailable

Definition (S.318):

Whoever by deceiving any person fraudulently or dishonestly induces the person so deceived to:

  • Deliver any property to any person, or
  • Consent that any person shall retain property, or
  • Intentionally induces to do/omit anything which causes damage
⚖️Cyber Application

Online Cheating Examples: Fake e-commerce sites, advance fee frauds, job scams, matrimonial frauds, investment scams. The "property" includes money transferred via UPI/NEFT/card.

Section 319 BNS
Cheating by Personation
Up to 5 years + fine
Non-Bailable

Cheating by pretending to be some other person, or by knowingly substituting one person for another.

⚠️S.319 BNS vs S.66D IT Act

When to use which?
S.66D IT Act — Personation using computer resource (mandatory for digital impersonation)
S.319 BNS — General personation (adds to IT Act charge)
Best Practice: Charge both S.66D + S.319 for digital impersonation fraud.

Case Study
The Fake Customer Support Scam

Victim searches "SBI customer care" on Google, calls a fake number appearing in search results. Caller poses as SBI official, obtains OTP, transfers ₹2 lakhs.

Correct Charging:
  • S.66C IT Act — Identity theft (obtaining OTP)
  • S.66D IT Act — Cheating by personation using communication device
  • S.318 BNS — Cheating (inducing delivery of money)
  • S.319 BNS — Cheating by personation (pretending to be bank official)

B. Online Extortion & Sextortion

Section 308 BNS
Extortion
Up to 7 years + fine
Non-Bailable

Elements:

  • Intentionally putting any person in fear of injury
  • To that person or any other person
  • And thereby dishonestly inducing delivery of property or valuable security

"Injury" includes injury to reputation. This is the foundation for sextortion charges.

💡Sextortion Legal Framework

Sextortion = S.308 BNS + IT Act sections
Typical pattern: Accused obtains intimate images (consent or non-consent), threatens to publish unless money paid.

Applicable Sections:
S.308 BNS — Extortion (fear of reputational injury)
S.66E IT Act — Privacy violation (if images captured without consent)
S.67/67A IT Act — If images actually published
S.351 BNS — Criminal intimidation

Section 351 BNS
Criminal Intimidation
Up to 2/7 years
Bailable / Non-Bailable

Threatening another with injury to person, reputation, or property with intent to cause alarm or to cause that person to do/omit any act.

Key for Cyber Cases

S.351 fills the S.66A gap. Since S.66A (offensive messages) was struck down, S.351 BNS is the primary section for threatening messages sent via WhatsApp, email, social media.

C. Forgery of Electronic Records

Section 336 BNS
Forgery
Up to 2 years + fine
Bailable

Making a false document or electronic record with intent to cause damage, support claim, induce parting with property, or dishonest/fraudulent purpose.

Electronic Forgery Examples:

  • Fake bank statements (PDF manipulation)
  • Forged email headers
  • Doctored screenshots of conversations
  • Fake digital certificates
  • Manipulated photos/documents
Section 338 BNS
Forgery for Purpose of Cheating
Up to 7 years + fine
Non-Bailable

Forgery committed with intent to commit fraud/cheating. This is the aggravated form — use when forgery is means to commit cheating.

⚖️BEC Fraud Charging

Business Email Compromise: Fake email domain (abc-pharma.co) impersonating company → S.338 (forgery for cheating) + S.66D IT Act + S.318 BNS.

D. Cyber Stalking & Harassment

Section 78 BNS
Stalking
1st: 3 years
2nd: 5 years
Bailable (1st)

Definition (S.78):

A man who follows a woman and contacts/attempts to contact despite clear indication of disinterest, or monitors use of internet/email/electronic communication.

Cyber Stalking Elements:

  • Repeated unwanted contact via social media, email, messaging
  • Creating fake profiles to monitor victim
  • Tracking online activity
  • Despite clear indication of disinterest
⚠️Gender-Specific

S.78 BNS applies only to male accused, female victim. For other gender combinations, use S.351 (criminal intimidation) or general harassment provisions.

Section 77 BNS
Voyeurism
1st: 1-3 years
2nd: 3-7 years
Bailable

Watching or capturing image of woman engaging in private act where she would expect not to be observed.

💡S.77 BNS vs S.66E IT Act

Both cover similar conduct. Charge both:
S.77 BNS — General voyeurism provision
S.66E IT Act — When done using electronic device + publishing/transmitting

Section 356 BNS
Defamation
Up to 2 years + fine
Bailable

Making or publishing any imputation concerning any person intending to harm, or knowing that it will harm, the reputation of such person.

Online Defamation:

  • Defamatory posts on social media
  • Fake reviews damaging business reputation
  • Morphed images with defamatory captions
  • False accusations in online forums
IT Act Gap

IT Act has no defamation section. S.66A was struck down. For online defamation, S.356 BNS is the only criminal remedy. Civil suit also available.

E. Data Theft as Property Offence

Section 303 BNS
Theft
Up to 3 years + fine
Bailable

Intending to take dishonestly any movable property out of possession of any person without consent.

⚠️Controversy: Is Data "Movable Property"?

Legal Debate: Traditional theft requires "movable property." Data is intangible. Courts have inconsistent views.

Safer Approach: For data theft, prefer S.43/66 IT Act (unauthorized access/extraction) over S.303 BNS. Use S.303 only if physical medium (USB, laptop) stolen.

ScenarioIT Act SectionBNS SectionNotes
Employee copies database to USBS.43 + S.66S.303 (if USB stolen)IT Act primary
Hacker exfiltrates customer dataS.43 + S.66IT Act only
Ex-employee retains company laptop with dataS.66S.303 (laptop) + S.405 (breach of trust)Both applicable

Quick Reference: BNS Cyber Sections

SectionOffencePunishmentBailCyber Application
S.303Theft3 yrsBailablePhysical device theft with data
S.308Extortion7 yrsNon-BailableSextortion, ransomware demands
S.318Cheating7 yrsNon-BailableOnline fraud, phishing
S.319Cheating by Personation5 yrsNon-Bailable+ S.66D IT Act
S.336Forgery2 yrsBailableFake documents, emails
S.338Forgery for Cheating7 yrsNon-BailableBEC fraud, fake websites
S.351Criminal Intimidation2/7 yrsBailable/NBThreatening messages (S.66A gap)
S.356Defamation2 yrsBailableOnline defamation
S.77Voyeurism3/7 yrsBailable+ S.66E IT Act
S.78Stalking3/5 yrsBailableCyber stalking (male accused only)

🎯 Key Takeaways

  • BNS captures intent, IT Act captures method: Most cyber cases need both
  • S.318/319 + S.66D: Standard combo for online fraud/impersonation
  • S.308 + S.66E: Sextortion framework
  • S.351 fills S.66A gap: Use for threatening messages
  • S.356 for defamation: IT Act has no defamation provision
  • S.78 is gender-specific: Male accused, female victim only
  • Data theft controversy: Prefer IT Act over S.303 for pure data theft