While
considering the general terrain of cyber law, as of now, the following acts are
construed as cyber crimes in the IT Act, 2000:
- Without permission of the
authorized user
- Accessing or securing access to
such computer, computer system or computer network
- Downloading, copying or
extracting any data or information for such computer, computer system or
computer network including information or data held or stored on any
removable storage medium
- Introducing any computer virus
or contaminant in the computer, computer system or network
- Damaging the computer, computer
system or network
- Disrupting the working of the
computer, computer system or network
- Disrupting the access of the
computer, computer system or network of an authorized user
- Providing assistance to ensure
unauthorized access to the computer, computer system or network
- Tampering with computer source
documents
- Hacking with computer system
- Publishing of information,
which is obscene in electronic form
- Carrying on activities that are
not in compliance with the provisions of the Act
- Failure to extend all
facilities and technical assistance to the Controller to decrypt any
information necessary for the security of the nation
- Unauthorized access or attempt
to secure unauthorized access to a system that by official notification is
declared a protected system
- Hacking with computer system
No comments:
Post a Comment