Cybercrimes are illegal activities in which computers are used as a target or a tool or in
some cases both. Cybercrimes include unlawful acts such as theft, defamation, forgery and
mischief, all these activities are subject to the Indian Penal Code. Because of easy access to
computers and technology, there has been a steep rise in cybercrimes. This necessitated the
need for a law regulating the same. Thus, the Information Technology Act, of 2000 was
implemented that addresses these crimes.
Why are cyber laws important?
Cyberlaw is imperative in our modern-day society. Cyberlaw covers the entire ambit of
transactions or activities that are done over the internet or the World Wide Web (WWW).
There is a general notion that cyber laws are technical and natural and therefore, are hard to
interpret by a normal person. But this is far from the truth. We are surrounded by
cyberspace, and every action done in Cyberspace has some legal consequence. Thus, it
is important to regulate this cyberspace and implemented laws that prohibit illegal activities
What are the advantages of Cyber laws?
There are several advantages of Cyber laws. Some of them are-
• Organisations or companies can carry out businesses online known as E-commerce in
a regulated environment. Thus, making it safer for not just the organisation but also
• The Information Technology Act, of 2000 has empowered the government to issue
notifications online thus, giving rise to E-governance.
• The IT act addresses various important issues of security. Thus, leading to the
success of electronic transactions.
• The act has implemented harsher punishments for people who commit crimes like
fraud, theft etc over the internet or by using computers.
What are the various provisions of the Information Technology Act, 2000?
• Tampering with Evidence- Section 65
Section 65 of the IT act commands any person who intentionally conceals, alters or destroys
any computer source to be sentenced to 3 years of imprisonment or be made to pay a fine
of rupees 2 Lakhs or both.
• Using password of another- Section 66
Any person who uses the password, digital signature or any other unique identification of
another person fraudulently will be subject to 3 years of imprisonment or a fine of rupees
of 1 Lakh or both.
• Cheating using the computer as a source- Section 66D
Any person who by using computer resources cheats on another person will be subject to up
to 3 years of imprisonment or a fine of 1 Lakh rupees or both.
• Publishing private images of another- Section 66E
If any person without the consent of another, captures, transmits or publishes images of a
person’s private parts, that person will be subject to up to 3 years of imprisonment or a fine
of 2 Lakhs or both.
• Acts of cyber terrorism- Section 66F
If any person attempts to access a computer source without authorization or denies access
to the computer source to any authorized person, with an intention to hard the unity,
integrity, security or sovereignty of the nation, that person can be subject to life
imprisonment. This offence is non-bailable in nature.
• Predating children online or publishing child porn- Section 67
A person is subject to 7 years of imprisonment or a fine of 10 lakh rupees or both if a person
captures publishes or transmits sexually explicit images of a child under the age of 18.
• Government’s power to block websites- Section 69
Under section 69 of the act, the government can intercept, monitor or decrypt any data
generated, transmitted or stored in any computer source if the government finds it
necessary in the interest of sovereignty and integrity of India.
Cyberspace is a common heritage of ours. We have inherited this in our lives and is one of the
benefits of our growing technology. In this technology-driven and dependent society, this
cyberspace serves as a backbone and holds a great position in our lives. It is the duty and
responsibility of every person to preserve this and make the cyberspace a safe place for
everyone and crime-free
The Information Technology Act, of 2000 has paved the way for a regulated and monitored
cyberspace. It puts forward a system where all those who commit fraudulent activities over
the internet are penalised or punished. Thus, it is imperative to have laws guarding
cyberspace so as to make it safe for all the parties that use it and make transactions over it.
By Yashita Kapoor