Section 29 of ITA, 2000 : Section 29: Access To Computers And Data
ITA, 2000
JavaScript did not load properly
Some content might be missing or broken. Please try disabling content blockers or use a different browser like Chrome, Safari or Firefox.
Explanation using Example
Let's consider a hypothetical scenario. Suppose there's a company named XYZ Tech. Based on some anonymous tip, the Controller of Certifying Authorities (CCA) in India or a person authorised by him suspects that XYZ Tech is involved in some cybercrime activities, potentially violating the provisions of The Information Technology Act, 2000.
According to Section 29(1), the Controller or his authorised person can access XYZ Tech's computer systems, apparatus, data, or any other material connected to such systems. This could be to search for any information or data contained in or available to such computer systems that may provide evidence of the alleged contravention.
As per Section 29(2), the Controller or his authorised person can direct any person in charge at XYZ Tech, or anyone else involved with the operation of the computer system, to provide them with the necessary technical and other assistance. This could include helping to navigate the system, explaining how data is stored, or even decrypting encrypted data.