Section 69 of ITA, 2000 : Section 69: Power To Issue Directions For Interception Or Monitoring Or Decryption Of Any Information Through Any Computer Resource

ITA, 2000

JavaScript did not load properly

Some content might be missing or broken. Please try disabling content blockers or use a different browser like Chrome, Safari or Firefox.

Explanation using Example

Let's consider a hypothetical scenario where the Indian government suspects that a group of individuals is planning a terrorist attack on Indian soil, and they are using encrypted communication channels to plan and coordinate their activities. The communication is happening over a popular social media platform.

In this context, under the powers vested by Section 69 of The Information Technology Act, 2000, the government can authorize a specific officer ...

Login to access all pages and read more content.

To disable ads and read rest of the premium content, subscribe to KanoonGPT Pro.

Update: Discover how KanoonGPT revolutionizes legal research! Watch our demo video on the homepage to see how you can chat with various legal sections using our innovative hybrid AI search. Enjoy free unlimited AI access for a limited time!
Update: Our AI tools are cooking — and they are almost ready to serve! Stay hungry — your invite to the table is coming soon.

Download Digital Bare Acts on mobile or tablet with "Kanoon Library" app

Kanoon Library Android App - Play Store LinkKanoon Library iOS App - App Store Link