The
IT Act defines unauthorized access by any person as acts done without the
permission of the owner, which includes:
- Accessing or securing access to
such computer, computer system or computer network,
- Downloading, copying or
extracting any data or information for such computer, computer system or
computer network including information or data held or stored on any
removable storage medium,
- Introducing any computer virus
or contaminant in the computer, computer system or network,
- Damaging the computer, computer
system or network,
- Disrupting the working of the
computer, computer system or network,
- Disrupting the access of the
computer, computer system or network to an authorized user
- Providing assistance to ensure
unauthorized access to the computer, computer system or network,
No comments:
Post a Comment