Section 66F of ITA, 2000 : Section 66F: Punishment For Cyber Terrorism
ITA, 2000
JavaScript did not load properly
Some content might be missing or broken. Please try disabling content blockers or use a different browser like Chrome, Safari or Firefox.
Explanation using Example
Let's consider a hypothetical scenario. Mr. X, a skilled hacker, has a grudge against India due to some personal reasons. He decides to express his anger by disrupting the nation's digital infrastructure. To do this, he intentionally penetrates a critical computer resource of a government department without authorization.
He introduces a malicious software, a 'computer contaminant', into the system. This software is designed to deny access to authorized personnel, thereby disrupting the department's functioning. The disruption leads to significant damage to property and also disrupts essential services to the community. Furthermore, Mr. X accesses sensitive data related to the security of the state and foreign relations, with the intent to use this data to harm the interests of India.
In this scenario, Mr. X's actions align with the description of cyber terrorism under Section 66F of The Information Technology Act, 2000. If caught and convicted, Mr. X could face life imprisonment for his actions.