Section 70 of ITA, 2000 : Section 70: Protected System

ITA, 2000

JavaScript did not load properly

Some content might be missing or broken. Please try disabling content blockers or use a different browser like Chrome, Safari or Firefox.

Explanation using Example

Let's consider a hypothetical situation where the Indian Government identifies a computer resource that is integral to the functioning of the nation's banking system and classifies it as a 'Critical Information Infrastructure' under Section 70(1) of the IT Act. This computer resource could be a server hosting the core banking application, which, if incapacitated or destroyed, would have a debilitating impact on the economy.

Under Section 70(2), the Government then authorises specific personnel, such as certain IT administrators and cybersecurity professionals, to access this protected system. This access is strictly regulated, and any unauthorized access is prohibited.

Now, if an individual, say Mr. X, tries to hack into this protected system without authorization, he would be in violation of Section 70(3). If caught, Mr. X could face imprisonment for up to ten years and may also be liable to pay a fine.

Finally, under Section 70(4), the Central Government would lay down specific information security practices and procedures that need to be followed to ensure the protection of this critical system.

Update: Our AI tools are cooking — and they are almost ready to serve! Stay hungry — your invite to the table is coming soon.
Update: KanoonGPT Chat interface is launched for beta testing. Try it out here

Download Digital Bare Acts on mobile or tablet with "Kanoon Library" app

Kanoon Library Android App - Play Store LinkKanoon Library iOS App - App Store Link