Section 70 of ITA, 2000 : Section 70: Protected System
ITA, 2000
JavaScript did not load properly
Some content might be missing or broken. Please try disabling content blockers or use a different browser like Chrome, Safari or Firefox.
Explanation using Example
Let's consider a hypothetical situation where the Indian Government identifies a computer resource that is integral to the functioning of the nation's banking system and classifies it as a 'Critical Information Infrastructure' under Section 70(1) of the IT Act. This computer resource could be a server hosting the core banking application, which, if incapacitated or destroyed, would have a debilitating impact on the economy.
Under Section 70(2), the Government then authorises specific personnel, such as certain IT administrators and cybersecurity professionals, to access this protected system. This access is strictly regulated, and any unauthorized access is prohibited.
Now, if an individual, say Mr. X, tries to hack into this protected system without authorization, he would be in violation of Section 70(3). If caught, Mr. X could face imprisonment for up to ten years and may also be liable to pay a fine.
Finally, under Section 70(4), the Central Government would lay down specific information security practices and procedures that need to be followed to ensure the protection of this critical system.