Section 66F of ITA, 2000 : Section 66F: Punishment For Cyber Terrorism

ITA, 2000

JavaScript did not load properly

Some content might be missing or broken. Please try disabling content blockers or use a different browser like Chrome, Safari or Firefox.

Explanation using Example

Let's consider a hypothetical scenario. Mr. X, a skilled hacker, has a grudge against India due to some personal reasons. He decides to express his anger by disrupting the nation's digital infrastructure. To do this, he intentionally penetrates a critical computer resource of a government department without authorization.

He introduces a malicious software, a 'computer contaminant', into the system. This software is designed to deny access to authorized personnel, thereby disrupting the department's functioning. The disruption leads to significant damage to property and also disrupts essential services to the community. Furthermore, Mr. X accesses sensitive data related to the security of the state and foreign relations, with the intent to use this data to harm the interests of India.

In this scenario, Mr. X's actions align with the description of cyber terrorism under Section 66F of The Information Technology Act, 2000. If caught and convicted, Mr. X could face life imprisonment for his actions.

Update: Our AI tools are cooking — and they are almost ready to serve! Stay hungry — your invite to the table is coming soon.

Download Digital Bare Acts on mobile or tablet with "Kanoon Library" app

Kanoon Library Android App - Play Store LinkKanoon Library iOS App - App Store Link