Section 43 of ITA, 2000 : Section 43: Penalty And Compensation For Damage To Computer, Computer System, Etc
The Information Technology Act, 2000
Bare Act
- CHAPTER IX: PENALTIES, COMPENSATION AND ADJUDICATION
43. Penalty and compensation for damage to computer, computer system, etc - If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network,
- (a) accesses or secures access to such computer, computer system or computer network or computer resource;
- (b) downloads, copies or extracts any data, computer database or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium;
- (c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network;
- (d) damages or causes to be damaged any computer, computer system or computer network, data, computer database or any other programmes residing in such computer, computer system or computer network;
- (e) disrupts or causes disruption of any computer, computer system or computer network;
- (f) denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means;
- (g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder;
- (h) charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network;
- (i) destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means;
- (j) steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage;
he shall be liable to pay damages by way of compensation to the person so affected.
Explanation - For the purposes of this section, -
- (i) "computer contaminant" means any set of computer instructions that are designed -
- (a) to modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or
- (b) by any means to usurp the normal operation of the computer, computer system, or computer network;
- (ii) "computer database" means a representation of information, knowledge, facts, concepts or instructions in text, image, audio, video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network;
- (iii) "computer virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource;
- (iv) "damage" means to destroy, alter, delete, add, modify or rearrange any computer resource by any means.
- (v) "computer source code" means the listing of programmes, computer commands, design and layout and programme analysis of computer resource in any form.
Simplified Act
Simplified Explanation of Section 43 of The Information Technology Act, 2000
If someone uses a computer or computer network without permission and:
- (a) Gets into the system or takes information from it;
- (b) Copies or downloads data without authorization;
- (c) Puts harmful software like a virus into the system;
- (d) Harms the system, data, or its programs;
- (e) Causes the system to stop working properly;
- (f) Blocks someone who is allowed to use the system from accessing it;
- (g) Helps someone else break the rules of this law;
- (h) Charges someone for services they didn't use by messing with the system;
- (i) Deletes or changes information in a way that reduces its value or harms it;
- (j) Steals or messes with the code that makes a computer program work;
That person will have to pay money to the person who is harmed by these actions.
Definitions:
- "Co...
Explanation using Example
Let's consider a hypothetical scenario to understand the application of Section 43 of The Information Technology Act, 2000.
John is an employee at XYZ Ltd. He is frustrated with his boss and decides to take revenge. He uses his technical skills to gain unauthorized access to the company's computer network. Without permission, he downloads confidential data and introduces a computer virus into the network, causing significant disruption and damage to the computer system.
He also denies his boss access to the system and manipulates the system to charge services availe...