Section 29 of ITA, 2000 : Section 29: Access To Computers And Data

ITA, 2000

JavaScript did not load properly

Some content might be missing or broken. Please try disabling content blockers or use a different browser like Chrome, Safari or Firefox.

Explanation using Example

Let's consider a hypothetical scenario. Suppose there's a company named XYZ Tech. Based on some anonymous tip, the Controller of Certifying Authorities (CCA) in India or a person authorised by him suspects that XYZ Tech is involved in some cybercrime activities, potentially violating the provisions of The Information Technology Act, 2000.

According to Section 29(1), the Controller or his authorised person can access XYZ Tech's computer systems, apparatus, data, or any other material connected to such systems. This could be to search for any information or data contained in or available to such computer systems that may provide evidence of the alleged contravention.

As per Section 29(2), the Controller or his authorised person can direct any person in charge at XYZ Tech, or anyone else involved with the operation of the computer system, to provide them with the necessary technical and other assistance. This could include helping to navigate the system, explaining how data is stored, or even decrypting encrypted data.

Update: Our AI tools are cooking — and they are almost ready to serve! Stay hungry — your invite to the table is coming soon.
Update: KanoonGPT Chat interface is launched for beta testing. Try it out here

Download Digital Bare Acts on mobile or tablet with "Kanoon Library" app

Kanoon Library Android App - Play Store LinkKanoon Library iOS App - App Store Link