Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

First page of “IT ACT 2000 – PENALTIES, OFFENCES WITH CASE STUDIES From”

Download Free PDF

IT ACT 2000 – PENALTIES, OFFENCES WITH CASE STUDIES From

Profile image of aru mugam

Related papers

Crime, in whatever forms it is, directly or indirectly, always affects the society. In today’s world, there is immense increase in the use of Internet in every field of the society and due to this increase in usage of Internet, a number of new crimes have evolved. Such crimes where use of computers coupled with the use of Internet is involved are broadly termed as Cyber Crimes.

International Journal of Engineering and Applied Sciences, 2015

Now a dayrsquos most of the activities and financial transactions uses internet, since internet is accessible from anywhere, perpetrator takes advantage of this and commit a crime.nbsp Cybercrime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. Cyber criminals take full advantage of the anonymity, secrecy, and interconnections provided by the Internet. In this paper we have tried to provide information about Cyber crime, its nature, Perpetrators, Classification of cyber crime, Reasons for its emergence, In next section of this paper we have given an information about cyber law, IT legislation in India. Further in next section we have discuses about Cyber crime scenario in India. Finally Last tw...

BANGLADESH RESEARCH PUBLICATIONS JOURNAL, 2016

The advent of internet technology and the use of ICT tools in every human activity has facilitated people to live in a boundary less, borderless world that is known as cyber world. Computer today are being misused for illegal activities like e-mail espionage, credit card fraud, spams and software piracy and so on which invade our privacy. The objective of this article are; to know the basic concept of cyber crime and reasons for cyber crime, evaluate different provisions relating to computer and computer related crimes under ICT Act,2006 (amended 2013), analyze the role of police power of arrest without warrant under this Act etc. Secondary sources have been used during the time of the research. However this article has revealed some issues such as; cyber crime are increasing day by day, police can misuse their power regarding arrest without warrant, only few cyber tribunal have been established that's why it cannot provide adequate justice for the victims, police are not trained properly, there is no digital forensic laboratory etc. Later on this article has provided some recommendations such as; provisions relating to section 57 of the ICT Act should need to change, the government have to establish one digital forensic laboratory, a well trained cyber police force is needed in order to detect cyber criminals, adequate cyber tribunals are to be established, police power of arrest are to be removed by amending ICT Act and minor and major offences are to be tackled and penalized accordingly.

SSRN Electronic Journal, 2017

—No stones are untouched by technology which gives rise to various refined crimes performed by so called intellectual criminals. The crimes performed using technology is termed as cybercrime. This paper tries to give insight on the broader areas effected by cybercrime in India. It also tries to associate various laws under various sections of IT Act 2000 which can be levied upon the culprit. It focuses on three categories of crime, viz. crime against individual, crime against property and crime against government. The paper tries to give insight on the loopholes as well as statistics of various cybercrimes in India.

Fast growing internet has its own advantages as well as disadvantages. The increasing use of information technology facilitate common people to get information, store information, share information etc. Internet provides great facilities to society but same time it present opportunities for crime also. Credit card frauds, spams, defamation or hate expression on the social networking sites and piracies are some of disadvantages due to illegal activities on internet. Cyber Law has emerged due to proliferation of misuse of the computer and internet in the cyber space. The content of this article is intended to provide a general guide to the subject matter. In present paper there is brief discussion about cyber law and cyber crime and legal provisions to overcome cyber crimes and penalty there for.

As we all know that this is the era where most of the things are done usually over the internet starting from online dealing to the online transaction. Since the web is considered as worldwide stage, anyone can access the resources of the internet from anywhere. The internet technology has been using by the few people for criminal activities like unauthorized access to other's network, scams etc. These criminal activities or the offense/crime related to the internet is termed as cyber crime. In order to stop or to punish the cyber criminals the term " Cyber Law " was introduced. We can define cyber law as it is the part of the legal systems that deals with the Internet, cyberspace, and with the legal issues. It covers a broad area, encompassing many subtopics as well as freedom of expressions, access to and utilization of the Internet, and online security or online privacy. Generically, it is alluded as the law of the web.

In the today’s era of rapid growth, Information technology is encompassing all walks of life all over the world. These technological developments have made the transition from paper to paperless transactions possible. We are now creating new standards of speed, efficiency, and accuracy in communication, which has become key tools for boosting innovations, creativity and increasing overall productivity. Computers are extensively used to store confidential data of political, social, economic or personal nature bringing immense benefit to the society. The rapid development of Internet and Computer technology globally has led to the growth of new forms of transnational crime especially Internet related. These crimes have virtually no boundaries and may affect any country across the globe. Thus, there is a need for awareness and enactment of necessary legislation in all countries for the prevention of computer related crime. Globally Internet and Computer based commerce and communications cut across territorial boundaries, thereby creating a new realm of human activity and undermining the feasibility and legitimacy of applying laws based on geographic boundaries. This new boundary, which is made up of the screens and passwords, separate the “Cyber world” from the "real world" of atoms. Territorially based law-making and law-enforcing authorities find this new environment deeply threatening.

Graduate Faculty Philosophy Journal, 1988

Muhammad Iqbal, 2020

Article, 2023

International Encyclopedia of the Social and Behavioral Sciences, 2015

The Journal of Technology Transfer, 2012

InTech eBooks, 2016

History of Education Review, 2019

Jesuit Higher Education: A Journal, 2022

EGA. Revista de expresión gráfica arquitectónica, 2015

نشر خاص , 2023

Jair Pinheiro, 2016

Stroke, 2002

Bulletin 208 3000, 2002

Dermatology Online Journal, 2016

Archives of Electrical Engineering, 2019

EBioMedicine, 2020

Cancer, 1993

2003 GSW Proceedings

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

The Law Bug

First Conviction Case under Sec 67 of the IT ACT, 2000

Bandana Saikia

Bandana Saikia

Suhas Katti v. Tamil Nadu, was the first case in India where a conviction was handed down in connection with the posting of obscene messages on the internet under the controversial section 67 of the Information Technology Act, 2000. The case was filed in  2004 and within a short span of about seven months from the filing of the FIR, the Chennai Cyber Crime Cell achieved the conviction .The Case of Suhas Katti is a notable case where the conviction was achieved successfully within 7 months from filing of the FIR. The efficient handling of the case which happened to be the first case of the Chennai Cyber Crime Cell going to trial deserves a special mention.

The accused originated an obscene message on 7.02.04 from Bombay at a browsing centre and went on to surf Yahoo Web Site and created an email in the name of Roselind (the victim) as “ [email protected] ”. He went into five different Sex Groups through Yahoo website (Radha lovers, Beautiful Tamil Actresses, Tamil girls showing their P***ai, Tamil **** Babes, and Tamil girls showing everything ) and became a member. He started making obscene and defamatory messages about the victim as if she is soliciting sex work and gave her office phone numbers and residence phone number and her email ID- “ [email protected] ”. On seeing such messages in the Yahoo group, several people from different places made offending calls to the victim through phones and emails. The accused also started forwarding emails received in the fake account opened by him in the victim’s name. Again on 9.02.04, the accused posted another similar obscene message about the victim. After suffering defamation due to all such acts of the accused, victim filed a complaint against the accused. The police traced the accused that was the victim’s friend to Mumbai and was interested in marrying her. She married to another person, but that marriage ended in divorce and the accused started convincing her once again and her reluctance to marry him, he started harassing her through the internet. A Charge sheet was filed under section 67 of the IT Act 2000, 469 and 509 IPC against him.

The issues before the honorable court was –

  • Whether the accused was liable of the charges under Section 67 of the Information Technology Act, 2000.
  • Whether the accused was liable of the charges under Section 469 of IPC, 1860.
  • Whether the accused was liable of the charges under Section 509 of IPC, 1860.
  • Whether the documentary evidence under Sec 65B of the Evidence Act, 1872 was sustainable.

Arguments on behalf of the Prosecution analyzed

It is evident from the facts of the case presented before the honorable court about the relationship between the accused and the victim. Before the marriage of the victim with her ex-husband Prajapathi, the accused wanted to marry her and after the victim secured divorce, the accused expressed his desire to marry the victim but she refused his marriage proposal. In order to seek revenge of her refusal, he took the medium of Internet to abuse her by making a false ID in her name, projecting to be soliciting sex-work.

Sec.67 of the IT Act, 2000 provides the punishment for the person who transmits obscene content on an electronic form. From the evidence submitted, it is evident that the accused intentionally published obscene content in the victim’s name. The posting of such messages resulted in annoying phone calls and emails to the victim in the belief that she was soliciting sex-work. Creating a fake ID in the victim’s name and transmitting obscene content over the Yahoo groups revealing her personal details was completely an offence under the said section. The accused misused the medium of Internet and took revenge on the victim and is liable to be punished under the said section. Sec.498 of IPC talks about the Forgery for purpose harming reputation. Whoever commits forgery, [intending that the document or electronic record forged ] shall harm the repu­tation of any party, or knowing that it is likely to be used for that purpose, shall be punished. It is evident that the accused has chosen to post the obscene message for a reason that she refused to marry him. Unknown persons contacted her through phone and email and harmed her dignity which was very defamatory in nature resulting in harm in her reputation at her office and among her peer groups. The mental sufferings and humiliation undergone by the victim is irreversible.

Section 509 says that any person intending to insult the modesty of any woman through uttering any words, gesture, or exhibits any object intending that such gesture or words shall be seen by such woman intrudes upon the privacy of such woman, & shall be punished under this section. The accused posted such obscene messages over different sex groups through fake Yahoo ID in her name and tried to insult the modesty of the victim by portraying her as a call-girl which definitely became intruding for the victim’s privacy as he also shared her personal details for contacting. The documentary evidence under Sec 65B of the Evidence Act is sustainable before the court.  Counsel for the Accused contended that as per sec.65B, to make an output admissible in evidence, the certificate of the person having lawful control over the use of computer is essential and that evidence produced before the court is invalid. This section doesn’t not suggest that the certificate should be issued by an expert, it is enough if the person issuing the certificate stated that any matter covered by the certificate was to be of his best knowledge. The victim herself has taken out the computer output from her systems and speaks about them in her evidence.

Arguments on behalf of the Accused discussed

The documentary evidence was not sustainable under Section 65B of the Indian Evidence Act, 1872. Section 85B of the IEA states that only in the case of secured electronic record, the court shall presume that such records have not been altered. In the case of other electronic records section 65B insists for a certificate. The legislative wisdom itself accepts that electronic records can be altered and hence the certificate. The accused is neither liable under sec.469 nor 509 of the Indian Penal Code. The complainant has blocked the ID of the alleged accused so that she doesn’t receive messages from him, in the same document produced it is seen that the email ID of her ex-husband was also blocked. Question arises why she blocked his messages that too after blocking the ID of the accused. The prosecution has no answers to these questions. Such obscene messages can also be made by her ex-husband too.

The accused is not liable under Sec.67 of the IT Act, 2000. The offending mails are sent by the lady herself to implicate the accused as accused alleged to have refused her marriage proposal.  It is submitted from the evidence that the warning message and the blocking of E-mail ID of accused was done from the computer system installed at prosecution’s house and computer system installed at her office respectively. The Investigation Officer has failed to inspect the computer system at the residence and office nor took any precaution to establish the chain of custody required in computer forensics.

With the evidences and arguments proposed on behalf of the prosecution, and the witnesses produced, Ld. Additional Chief Metropolitan Magistrate, Egmore, delivered the judgment on 5-11-04 as follows - the accused was found guilty of offences under s.469, 509 IPC and under s.67 of the I.T. Act and the accused is convicted and is sentenced to undergo rigorous imprisonment for 2 years u/s 468 IPC and pay a fine of Rs-500/- and for offences u/s 509 IPC sentenced to undergo 1 year simple imprisonment and pay fine Rs-500/- and for offence u/s 67 of IT Act to undergo rigorous imprisonment for two years and pay fine of Rs-4000/-.

Internet has played a vital role in our lives in an unprecedented manner. State of Tamil Nadu v. Suhas Katti was the first case in India where a conviction was handled in connection with the posting of obscene messages on the Internet under sec.67 of the I.T. Act, 2000. Cases like Avnish Bajaj v. State [1] , National Association Of Software v. Ajay Sood And Ors. [2] are some noteworthy cyber law cases in India. There is a heavy toll in the growing number of cybercrimes across India. The law enforcement agencies should be made aware about the various facets of cybercrimes and that there should be an effective redressal mechanism taking cognizance of such cyber crime activities effectively.

it act 2000 case study

NB - The case of Suhas Katti vs. State of Tamil Nadu is not available in any of the online legal databases. If you wish to read the original scanned judgement of the case, kindly mail us : [email protected]

[1] Avnish Bajaj v. State of N.C.T of Delhi , 116 (2005) DLT 427.

[2] National Association Of Software v. Ajay Sood And Ors ., 119 (2005) DLT 596

Critical Analysis of the Enrica Lexie Case in Light of the SS Lotus Case

The prolong history and the continued existence of Piracy over the years have given rise to various treaties, and conventions such as UNCLOS[1]that equip and entitles nation states to implement anti-piracy measures in order to promote maritime trade.[2]The Anderson case[3], the Caroline[4], the Franconia[

DIGITAL AWARDS AND THE UNCITRAL MODEL LAW ON INTERNATIONAL COMMERCIAL ARBITRATION

The COVID-19 pandemic has wreaked havoc on many businesses throughout the globe, including international commercial arbitration.[1]In response to the pandemic's effect, the United Nations Commission on International Trade Law (UNCITRAL) held two round-table meetings in 2020 during its fifty-third session[2]that focused on the use

GLASS BANGLE FACTORIES OF FIROZABAD: AN ANALYTICAL STUDY TO RE-LOOK INTO THE CHILD LABOUR LAWS IN INDIA

INTRODUCTION Labour rights and labour laws have always been a source of contention in every society. The worldwide economic slump induced by the Covid-19 pandemic has resulted in widespread deployment of children being driven into child labour.[1] There is an estimate of 152 million children under the age of

M/S MIND TREE EDUCATION PRIVATE LIMITED V. MINDTREE LIMITED AND OTHERS

(2019(3)RCR(Civil)780) Facts: The appellant company is engaged in imparting education since 2006 operating three different schools and has registered with the Registrar of Companies, Chandigarh on 21.07.2009 filed for an application of trademark with the Trademark Authorities on 16.02.2016. The respondent company

IMAGES

  1. (PDF) IT ACT 2000

    it act 2000 case study

  2. IT Act 2000 Cases

    it act 2000 case study

  3. Critical Assessment of Information Technology Act, 2000

    it act 2000 case study

  4. (PDF) Research on Cyber Offenses under Information Technology Act, 2000

    it act 2000 case study

  5. IT Act 2000- Defects, IT Act 2000 UPSC Notes

    it act 2000 case study

  6. IT Act 2000 Penalties, Offences with case studies

    it act 2000 case study

VIDEO

  1. Limitations of Information Technology Act ,2000||IT Act 2000||IT Act 2000 in Hindi

  2. Overview of IT Act ,2000||Information Technology Act 2000

  3. INFORMATION TECHNOLOGY ACT 2000 BY CS RAMANDEEP SINGH(CYBER LAWYER)

  4. Edexcel Information Technology /IT AS level-Day 2 /Unit 1 & Unit 2 Introduction

  5. IT Act 2000 and its Amendments 2008 & 2018

  6. Lecture 10- Certifying Authorities under IT Act 2000