Section 69 of ITA, 2000 : Section 69: Power To Issue Directions For Interception Or Monitoring Or Decryption Of Any Information Through Any Computer Resource
ITA, 2000
JavaScript did not load properly
Some content might be missing or broken. Please try disabling content blockers or use a different browser like Chrome, Safari or Firefox.
Explanation using Example
Let's consider a hypothetical scenario where the Indian government suspects that a group of individuals is planning a terrorist attack on Indian soil, and they are using encrypted communication channels to plan and coordinate their activities. The communication is happening over a popular social media platform.
In this context, under the powers vested by Section 69 of The Information Technology Act, 2000, the government can authorize a specific officer to issue a directive to the social media company. This directive would order them to intercept, monitor, or decrypt the suspected communications for the purpose of national security and prevention of a potential terrorist attack.
The social media company, being an intermediary as per the act, is obligated to provide all necessary assistance to the government agency, which includes providing access to the computer resources storing such information, helping in interception or decryption of the communications, or providing stored information from their computer resources. Failure to do so could result in imprisonment up to seven years and a fine as per subsection (4) of the act.