Chapter XI of the Information Technology Act, 2000 – Offences and Procedural Aspects: A Practitioner’s Guide

Chapter XI of the Information Technology Act, 2000 (“IT Act”) is the core penal chapter dealing with cyber offences and related procedural aspects, and runs broadly from Section 65 to Section 78. It is routinely invoked together with IPC provisions in cybercrime prosecutions, so a clear grasp of its structure, ingredients, punishments, and procedural consequences is essential for effective defence and prosecution work.[1][2][3][4]

Position of Chapter XI within the IT Act

Chapter XI contains criminal offences, as distinct from the civil contraventions and compensation regime in Chapter IX (Section 43, 43A, etc.). In practice, many fact situations start as a Section 43 contravention and escalate to Chapter XI once “dishonestly” or “fraudulently” is alleged, triggering criminal liability under Section 66 and related provisions.[5][6][7]

The chapter covers: tampering with source code (Section 65), computer-related offences and variants (Sections 66, 66B–66F), obscenity and child sexual abuse material online (Sections 67–67B), data retention and intermediary obligations (Section 67C), governmental interception/blocking powers (Sections 69–69B), critical infrastructure (Sections 70–70B), confidentiality/privacy breaches (Sections 72–72A), digital signature certificate-related misconduct (Sections 71, 73, 74), extra‑territoriality and confiscation (Sections 75–76), and rules on compounding, cognizability, bailability and investigation (Sections 77A, 77B, 78).[2][8][1]

Chapter XI – Offences under the IT Act, 2000

SectionHeading in Act (gist)Core idea of offence / provisionMaximum punishment / nature
65Tampering with computer source documentsKnowingly or intentionally concealing, destroying or altering legally‑required computer source codeImprisonment up to 3 years, or fine up to ₹2 lakh, or both
66Computer related offencesAny Section 43 act (unauthorised access, data copying, virus, etc.) done dishonestly or fraudulentlyImprisonment up to 3 years, or fine up to ₹5 lakh, or both
66A*Sending offensive messages (struck down)Offensive/menacing messages, annoying emails etc. (now unconstitutional in Shreya Singhal)Provision struck down by Supreme Court; no longer enforceable
66BDishonest receiving of stolen computer resource/deviceDishonestly receiving or retaining any stolen computer resource or communication deviceImprisonment up to 3 years, or fine up to ₹1 lakh, or both
66CIdentity theftFraudulent or dishonest use of electronic signature, password or other unique ID of anotherImprisonment up to 3 years, or fine up to ₹1 lakh, or both
66DCheating by personation using computerCheating by personation by using computer resource or communication deviceImprisonment up to 3 years, or fine up to ₹1 lakh, or both
66EViolation of privacyIntentionally capturing, publishing or transmitting image of a private area without consentImprisonment up to 3 years, or fine up to ₹2 lakh, or both
66FCyber terrorismActs using computer resources to threaten unity, integrity, security or sovereignty, or to attack critical infrastructureImprisonment for life
67Obscene material in electronic formPublishing or transmitting lascivious or prurient material in electronic formFor first conviction: up to 3 years and fine up to ₹5 lakh; subsequent: up to 5 years and fine up to ₹10 lakh
67ASexually explicit contentPublishing or transmitting material containing sexually explicit act/conduct in electronic formFirst conviction: up to 5 years and fine up to ₹10 lakh; subsequent: up to 7 years and fine up to ₹10 lakh
67BChild sexual abuse material (CSAM)Publishing, transmitting, creating, browsing, collecting or facilitating sexually explicit depiction of childrenFirst conviction: up to 5 years and fine up to ₹10 lakh; subsequent: up to 7 years and fine up to ₹10 lakh
67CPreservation and retention by intermediariesDuty of intermediaries to preserve and retain specified information as notifiedPenalty up to ₹25 lakh for intentional/knowing contravention
68Power of Controller to give directionsNon‑compliance with Controller’s directions to Certifying Authorities etc.Fine up to ₹25 lakh (earlier imprisonment up to 2 years and fine up to ₹1 lakh)
69Interception, monitoring, decryptionFailure to assist in interception/monitoring/decryption ordered by GovernmentImprisonment up to 7 years and fine
69ABlocking for public accessFailure to comply with Government’s directions to block public access to informationImprisonment up to 7 years and fine
69BMonitoring and collecting traffic dataFailure to comply with Government directions for monitoring/collecting traffic data for cyber securityImprisonment up to 1 year or fine up to ₹1 crore
70Protected systemsSecuring or attempting to secure access to a “protected system” (critical information infrastructure) without authorisationImprisonment up to 10 years and fine
70ACritical information infrastructure authorityProvides for designated authority for critical information infrastructure (institutional, not an offence definition)Structural/procedural provision
70BCERT‑In – incident responseEstablishes CERT‑In as national nodal agency for cyber incident response (institutional)Structural/procedural provision
71MisrepresentationMisrepresentation or suppression of material fact in obtaining electronic/digital signature certificateImprisonment up to 2 years, or fine up to ₹1 lakh, or both
72Breach of confidentiality and privacyUnauthorised disclosure of information obtained by virtue of powers under the ActFine up to ₹5 lakh (earlier up to 2 years and ₹1 lakh)
72ADisclosure in breach of lawful contractDisclosure of personal information in breach of contract with intent to cause wrongful loss or gainImprisonment up to 3 years, or fine up to ₹5 lakh, or both
73Publishing false electronic signature certificatesPublishing a false or misleading electronic signature certificateImprisonment up to 2 years, or fine up to ₹1 lakh, or both
74Publication for fraudulent purposesCreation, publication or use of electronic signature certificates for fraudulent or unlawful purposesImprisonment up to 2 years, or fine up to ₹1 lakh, or both
75Extra‑territorial applicationApplies to offences involving computer resources located in India, irrespective of offender’s locationJurisdictional rule, not a standalone offence
76ConfiscationProvides for confiscation of computer resources, devices and media involved in contraventions/offencesProcedural consequence – confiscation
77ACompounding of offencesAllows court to compound IT Act offences with max imprisonment up to 3 years (subject to exceptions)Compounding provisionlawgist+1
77BOffences: cognizable/bailable ruleDeclares which IT Act offences are cognizable and which are bailable based on maximum imprisonment termClassification rule for procedure
78Investigation by police officersOnly police officer not below rank of Inspector may investigate IT Act offencesProcedural – investigation competence

Tampering with computer source documents – Section 65

Section 65 criminalises knowingly or intentionally concealing, destroying or altering computer source code which is required by law to be kept or maintained. “Computer source code” is defined broadly to include program listings, commands, design and layout and program analysis in any form.[9][7][1]

Punishment can extend to three years’ imprisonment, or fine up to two lakh rupees, or both. Practically, this section is useful where the core grievance is destruction or manipulation of source code or configuration files (for example, by disgruntled employees or vendors) rather than just unauthorised access to data.[10][6][4][9]

Computer-related offences – Section 66

Originally titled “hacking”, Section 66 was recast by the 2008 amendment to cover any act listed in Section 43 when done “dishonestly or fraudulently”. Section 43 itself covers unauthorised access, data copying, introducing viruses, causing denial of access, damage to computer systems, and similar actions.[6][7][11][10]

If any such act in Section 43 is done with the mental element of dishonesty or fraud (as understood from Sections 24 and 25 IPC), the accused faces imprisonment up to three years or fine up to five lakh rupees or both. In practice, Section 66 is often clubbed with IPC provisions on mischief, theft or cheating, and the overlap between Section 66 and IPC sections (for example, 378, 425–426, 420 IPC) has led to sustained debate and case law on dual applicability.[7][12][4][6]

Sections 66 to 66F – Overview

SectionStatutory heading (gist)Core conduct coveredPunishment / status
66Computer related offencesAny act listed in Section 43 (unauthorised access, data copying, virus, damage, denial of access, etc.) when done dishonestly or fraudulently.Imprisonment up to 3 years or fine up to ₹5 lakh, or both.
66A*Sending offensive messages through communication service, etc.Sending, by computer resource or communication device, any information that is grossly offensive or menacing, or messages sent repeatedly to cause annoyance, inconvenience, etc. (as originally enacted).Struck down as unconstitutional by the Supreme Court in Shreya Singhal v. Union of India; cannot be invoked or enforced.
66BDishonestly receiving stolen computer resource or communication deviceDishonestly receiving or retaining any stolen computer resource or communication device, knowing or having reason to believe it to be stolen.Imprisonment up to 3 years or fine up to ₹1 lakh, or both.
66CIdentity theftFraudulent or dishonest use of electronic signature, password or any other unique identification feature of any person.Imprisonment up to 3 years and fine up to ₹1 lakh.
66DCheating by personation by using computer resourceCheating by personation by using computer resource or communication device (e.g. online impersonation scams).Imprisonment up to 3 years and fine up to ₹1 lakh.
66EViolation of privacyIntentionally capturing, publishing or transmitting the image of the “private area” of any person without consent, under circumstances violating privacy.Imprisonment up to 3 years or fine up to ₹2 lakh, or both.
66FPunishment for cyber terrorismUsing computer resource to threaten the unity, integrity, security or sovereignty of India, or to strike terror by causing death, injuries, damage to critical information infrastructure, etc.; also unauthorised access to protected systems with such intent.Imprisonment for life, and fine (most serious offence in the chapter).

*Section 66A is void and should only be discussed historically (no current penal consequence).

Ancillary computer offences – Sections 66B to 66F

Dishonest receipt of stolen computer resources – Section 66B

Section 66B punishes dishonestly receiving any stolen computer resource or communication device, mirroring Section 411 IPC in the digital context. Punishment can extend to three years’ imprisonment or fine up to one lakh rupees, or both.[8][3][6]

For advocates, this section frequently arises against re‑sellers of stolen laptops, smartphones or cloned POS terminals, and can be invoked alongside Section 411 IPC, though the latter is non‑bailable whereas Section 66B is bailable.[3][4]

Identity theft – Section 66C

Section 66C targets fraudulent or dishonest use of another person’s electronic signature, password or other unique identification feature, i.e. “identity theft”. Punishment is imprisonment up to three years and fine up to one lakh rupees.[13][14][6]

This provision is commonly attracted in phishing, unauthorised use of login credentials, SIM swap frauds and Aadhaar‑linked misuse, often together with IPC provisions on forgery and cheating.[4][3]

Cheating by personation via computer – Section 66D

Section 66D criminalises cheating by personation “by using computer resource or communication device”. It carries punishment of imprisonment up to three years and fine up to one lakh rupees.[14][13][6][3]

This is the workhorse provision in online job scam, OTP scam, KYC fraud, and fake customer care cases, usually read with Sections 419 and 420 IPC, though Section 66D itself is bailable and compoundable under the IT Act.[3][4]

Violation of privacy – Section 66E

Section 66E punishes intentional capturing, publishing or transmitting of the image of the “private area” of any person without consent, under circumstances violating privacy. The offence is punishable by imprisonment up to three years or fine up to two lakh rupees, or both.[13][6][14]

Fact patterns include non‑consensual circulation of intimate images and voyeuristic recordings, and this section often operates alongside IPC provisions on outraging modesty and voyeurism.[12][3]

Cyber terrorism – Section 66F

Section 66F defines “cyber terrorism”, covering conduct using computer resources that is intended to threaten the unity, integrity, security or sovereignty of India, or to strike terror by causing death, injury, or damage to critical information infrastructure. It also covers attempts to access protected systems where the conduct is likely to cause death, injuries, disruption of essential services or adverse impact on critical information infrastructure.[15][2]

The section prescribes imprisonment for life and is non‑bailable, making it the gravest offence in the chapter and one that significantly affects bail strategy and investigative powers.[6][15]

Sending offensive messages – Section 66A (now unconstitutional)

Section 66A (introduced in 2008) criminalised sending “grossly offensive” or “menacing” messages or persistently sending messages to cause annoyance or inconvenience, using computer resources. In Shreya Singhal v. Union of India, the Supreme Court struck down Section 66A in its entirety for violating Article 19(1)(a) and not being saved under Article 19(2).[16][17][18][7]

The Court held the provision to be vague and overbroad, and clarified that 66A is void ab initio and cannot be enforced, while upholding the constitutionality of Section 69A and its blocking rules. Practitioners should insist that charges under 66A be quashed and that police and magistrates not invoke it despite occasional reports of its continued use.[17][19][20]

Obscenity and sexually explicit content – Sections 67, 67A, 67B

Sections 67 to 67C – Obscenity, CSAM and Retention

SectionStatutory heading (gist)Core conduct coveredPunishment / nature
67Punishment for publishing or transmitting obscene material in electronic formPublishing, transmitting, or causing to be published or transmitted in electronic form any material which is lascivious, appeals to the prurient interest, or tends to deprave and corrupt persons likely to read, see or hear it.First conviction: imprisonment up to 3 years and fine up to ₹5 lakh. Subsequent conviction: imprisonment up to 5 years and fine up to ₹10 lakh.
67APunishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic formPublishing, transmitting, or causing to be published or transmitted in electronic form any material containing sexually explicit act or conduct (higher gravity than simple obscenity).First conviction: imprisonment up to 5 years and fine up to ₹10 lakh. Subsequent conviction: imprisonment up to 7 years and fine up to ₹10 lakh.
67BPunishment for publishing or transmitting of material depicting children in sexually explicit acts, etc., in electronic formCreating, publishing, transmitting, collecting, browsing, downloading, advertising, promoting, distributing or facilitating child sexual abuse material (CSAM); enticing children into sexual online relationships; recording such abuse in electronic form.First conviction: imprisonment up to 5 years and fine up to ₹10 lakh. Subsequent conviction: imprisonment up to 7 years and fine up to ₹10 lakh.
67CPreservation and retention of information by intermediariesImposes a duty on intermediaries (ISPs, platforms, hosts) to preserve and retain specified information for such duration, manner and format as the Central Government may prescribe.Originally: imprisonment up to 3 years and fine for intentional/knowing contravention. After 2023 amendment: liable to penalty up to ₹25 lakh for contravention.

Obscene material in electronic form – Section 67

Section 67 punishes publishing or transmitting in electronic form any material which is lascivious or appeals to the prurient interest, or whose effect tends to deprave and corrupt persons likely to read, see or hear it. After the 2008 amendment, first conviction attracts imprisonment up to three years and fine up to five lakh rupees, with subsequent convictions raising this to imprisonment up to five years and fine up to ten lakh rupees.[11][21][1]

The provision is patterned on Sections 292–293 IPC but customised for electronic dissemination, and courts examine context, community standards and intent while applying the obscenity test.[21][22]

Sexually explicit content – Section 67A

Section 67A addresses publication or transmission of material containing sexually explicit acts or conduct in electronic form. For a first conviction, punishment may extend to five years’ imprisonment and fine up to ten lakh rupees; for subsequent convictions, imprisonment may extend to seven years with the same maximum fine.[23][22][21]

Section 67A is invoked in online pornography distribution, circulation of explicit videos and “revenge porn” cases, often along with IPC provisions depending on consent and coercion.[24][23]

Child sexual abuse material – Section 67B

Section 67B specifically targets child sexual abuse material (CSAM), criminalising publishing, transmitting, creating, collecting, browsing, downloading, advertising, promoting or distributing material depicting children in sexually explicit acts or in obscene or indecent manner. It also covers grooming, enticing children to online relationships for sexually explicit acts, and recording such abuse.[25][23]

The punishment mirrors Section 67A: first conviction up to five years and fine up to ten lakh rupees; subsequent convictions up to seven years and the same fine. Limited defences exist where material is kept or used for bona fide scientific, literary, artistic or religious purposes, but these are narrowly construed.[22][23][25]

Preservation and retention by intermediaries – Section 67C

Section 67C imposes a statutory duty on intermediaries to preserve and retain specified information for such duration and in such manner as the Central Government may prescribe. Any intermediary who intentionally or knowingly contravenes these obligations commits an offence; a 2023 amendment converted the consequence into a penalty that may extend to twenty‑five lakh rupees.[26][27][28][29]

For advocates, Section 67C is crucial when seeking or challenging production of logs, IP addresses and other technical data, and in assessing intermediary liability where failure to retain data prejudices investigation.[30][26]

Powers regarding certifying authorities – Sections 68, 71, 73, 74

Section 68 empowers the Controller to direct Certifying Authorities or their employees to take specified measures or cease activities to ensure compliance with the Act, with disobedience punishable by up to two years’ imprisonment or fine up to one lakh rupees. Section 71 penalises misrepresentation or suppression of material facts in obtaining digital/electronic signature certificates, prescribing imprisonment up to two years or fine up to one lakh rupees, or both.[9][1][6]

Sections 73 and 74 deal with publishing false or misleading digital signature certificates or creating such certificates for fraudulent or unlawful purposes, carrying imprisonment terms and fines aimed at protecting the integrity of electronic authentication infrastructure. These provisions rarely arise in routine policing cases but are relevant in PKI‑driven environments such as e‑governance, banking and e‑tendering.[31][32][1][10]

Interception, decryption and blocking powers – Sections 69, 69A, 69B

Section 69 – Interception/monitoring/decryption

Section 69 empowers the Central and State Governments (or authorised officers) to direct interception, monitoring or decryption of information in any computer resource on grounds such as sovereignty and integrity of India, defence, security of the State, friendly relations with foreign States, public order, or preventing incitement to a cognizable offence. Non‑compliance with a decryption direction can attract imprisonment up to seven years and fine.[33][19][32]

For practitioners, legality of interception and adherence to procedure (including necessity, proportionality and recording of reasons in writing) becomes a key ground for challenging evidence obtained under this provision.[19][33]

Section 69A – Blocking public access

Section 69A enables the Central Government to direct any agency or intermediary to block public access to information generated, transmitted, received, stored or hosted in any computer resource, on similar grounds. The Supreme Court in Shreya Singhal upheld Section 69A and the blocking rules as constitutionally valid due to their relatively narrow tailoring and procedural safeguards.[18][17][33][19]

Blocking orders must be reasoned and are typically confidential, so litigation often concerns transparency and procedural fairness around blocking rather than the mere existence of the power.[33][19]

Section 69B – Monitoring traffic data for cyber security

Section 69B authorises monitoring and collection of traffic data or information through any computer resource for cyber security, particularly for analysing, preventing and investigating cyber incidents. Intermediaries who intentionally or knowingly contravene directions issued under this section can face imprisonment up to three years and fines (one MeitY summary notes a possible fine up to one crore rupees).[34][2][6]

These powers are often relevant in large‑scale incident response, DDoS investigations and national‑security‑linked cyber operations.[35][15]

Protected systems and critical infrastructure – Sections 70, 70A, 70B

Section 70 allows the Government to declare any computer resource which directly or indirectly affects critical information infrastructure as a “protected system”; unauthorised access or attempts to access such systems can attract imprisonment up to ten years and fine. Critical information infrastructure includes systems whose incapacity or destruction would impact national security, economy, public health or safety.[15][2][6]

Sections 70A and 70B provide for a national nodal agency for critical information infrastructure and designate the Indian Computer Emergency Response Team (CERT‑In) as the national agency for incident response, respectively. These provisions are not offences themselves but are structurally placed in the same chapter and define the institutional actors whose reports often underpin prosecutions under Sections 66F, 69, 69A and 70.[2][35][15]

Confidentiality and privacy breaches – Sections 72 and 72A

Section 72 punishes any person who, by virtue of powers under the Act, has secured access to any electronic record, book or information, and discloses it without consent in breach of the lawful contract or authority, with imprisonment up to two years or fine up to one lakh rupees, or both. It is aimed at public officials and others exercising statutory powers under the IT Act who misuse information obtained in that capacity.[32][1][31]

Section 72A separately penalises disclosure of personal information by a person who, in pursuance of a contract, has obtained such information and discloses it without consent with intent to cause wrongful loss or gain; punishment may extend to three years imprisonment or fine up to five lakh rupees, or both. This provision is frequently cited in data‑sharing and call‑detail‑record leakage scenarios, and it complements sectoral data‑protection obligations.[31][32][24][6]

Extra‑territorial application, confiscation and overriding effect – Sections 75, 76, 81

Section 75 gives the Act extra‑territorial reach where an offence or contravention involves a computer, computer system or computer network located in India, even if the accused is outside India. Section 76 provides for confiscation of computer resources, devices and media involved in the commission of any contravention or offence under the Act.[36][6][15][2]

Separately, Section 81 (outside Chapter XI but important strategically) gives the IT Act an overriding effect over inconsistent provisions in other laws, and has been relied on by courts to hold that, where conduct squarely falls under the IT Act, it may prevail over overlapping IPC provisions. This interplay significantly affects charge‑framing and questions of double jeopardy or parallel prosecution under IPC and IT Act.[37][12][4][36]

Compounding, cognizability and bailability – Sections 77A and 77B

Section 77A (inserted by the 2008 amendment) allows any court of competent jurisdiction to compound offences under the IT Act, except those punishable with life imprisonment or with imprisonment exceeding three years. The court cannot compound an offence where the accused is liable to enhanced punishment by reason of previous conviction, or where the offence affects the socio‑economic conditions of the country or is committed against a child under 18 years or a woman.[38][39][8]

Section 77B lays down that offences punishable with imprisonment of three years and above are cognizable, while offences punishable with imprisonment up to three years are bailable. Government responses and practitioner commentaries emphasise that many financial cybercrime offences under the IT Act are therefore bailable yet cognizable, which has direct implications for arrest, investigation strategy and bail arguments.[40][41][8]

Investigation powers – Section 78 and allied provisions

Section 78 provides that, notwithstanding the CrPC, only a police officer not below the rank of Inspector may investigate offences under the IT Act. This rank requirement has been reiterated in multiple training materials and practice guides, and irregularity in rank can be a ground to question the legality of investigation.[42][43][44][32]

In practice, cybercrime investigations depend heavily on digital evidence, and admissibility is governed by Sections 65A and 65B of the Indian Evidence Act, as clarified by Anvar P.V. v. P.K. Basheer and Arjun Panditrao Khotkar. Courts have insisted that electronic records produced as secondary evidence must be accompanied by a proper Section 65B(4) certificate identifying the device, process and authenticity, failing which the material may be ruled inadmissible.[45][46][30]

Strategic points for practicing advocates

  1. Charge selection and overlap with IPC
    Many fact situations permit parallel invocation of IT Act provisions (e.g. Sections 66, 66C, 66D, 67, 67A, 67B) and IPC provisions (e.g. theft, cheating, forgery, obscenity), and courts have recognised both overlap and complementarity rather than automatic exclusion. Advocates should carefully assess whether the IT Act’s overriding clause and special‑law status support arguing that the IT Act should prevail or that dual charges cause prejudice in sentencing, bail or compounding.[12][4][37][3]
  2. Bail, cognizability and compounding strategy
    Because Section 77B makes several serious‑looking cyber offences bailable but cognizable (e.g. Sections 66B–66E), and Section 77A allows compounding of offences where the maximum imprisonment does not exceed three years, defence counsel can leverage these features for early settlement and bail. At the same time, the presence of Sections like 66F, 69 and 70, with higher maximum sentences and non‑bailable status, demands heightened attention to anticipatory bail and constitutional challenges.[40][8][6][15]
  3. Evidence and 65B compliance
    Almost every Chapter XI prosecution hinges on electronic logs, device images, server records or communications, which must pass the Section 65B Evidence Act test to be admissible. Defence counsel should scrutinise the chain of custody, the Section 65B certificate, and compliance with Section 67C retention obligations and Section 69/69A procedures, while prosecutors must ensure forensic‑grade collection and proper certification to avoid exclusion of crucial evidence.[47][48][49][30]
  4. Post‑Shreya Singhal landscape
    With Section 66A invalidated but Sections 69A and 79 (safe‑harbour) read down and upheld, arguments around free speech increasingly shift to alleged misuse of obscenity provisions (67–67B) and blocking powers under 69A. Advocates must distinguish between mere offensive speech (no 66A any more) and content that genuinely meets obscenity or CSAM thresholds, ensuring that prosecution does not expand these provisions to constitutionally protected expression.[17][18][21][19]
  5. Intermediary and corporate exposure
    Intermediaries and corporate entities face exposure not only under 67C, 69B and 72A, but also under Section 43A (civil compensation for failure of reasonable security practices), so compliance programmes and retention policies directly affect criminal risk. Practitioners advising corporates should align IT‑Act compliance with sectoral regulations and emerging data‑protection norms, given the Government’s repeated emphasis on cyber security and citizen protection.[11][26][32][24]

Taken together, Chapter XI offers a specialised penal framework for cyber offences, but its real complexity emerges from how these provisions intersect with the IPC, the Evidence Act and constitutional guarantees—making doctrinal clarity and close attention to procedural detail indispensable in day‑to‑day practice.


  1. https://www.indiacode.nic.in/bitstream/123456789/13116/1/it_act_2000_updated.pdf      
  2. https://childsafety.cgpolice.gov.in/assets/img/resource/IT-Act-2000_English.pdf      
  3. https://blog.ipleaders.in/cyber-crime-laws-in-india/       
  4. https://www.argus-p.com/papers-publications/thought-paper/cyber-crimes-in-the-ipc-and-it-act-an-uneasy-co-existence/       
  5. https://thelaw.institute/regulation-of-cyberspace/penalties-offences-information-technology-act/
  6. https://cleartax.in/s/it-act-2000              
  7. https://www.naavi.org/ita_2008/ch11_2008.htm    
  8. https://lawgic.info/which-offences-under-the-information-technology-act-2000-are-cognizable-bailable-or-compoundable/    
  9. https://naavi.org/importantlaws/itbill2000/ch11.html  
  10. https://www.networkintelligence.ai/blogs/it-act-2000-penalties-offences-with-case-studies/  
  11. https://www.indiancybersecurity.com/amendment_itact_2008.php  
  12. https://www.juscorpus.com/dual-applicability-of-the-it-act-2000-and-ipc-1860-a-comprehensive-analysis/   
  13. https://www.dsci.in/files/content/documents/2023/Information Technology Act 2000.pdf  
  14. https://blog.ipleaders.in/information-technology-act-2000/  
  15. https://mcrhrdi.gov.in/splfc2023/week9/Information Technology Act & Cyber crime.pdf      
  16. http://informationtechnologyactindia.blogspot.com/p/offences-section-65-to.html
  17. http://www.manupatracademy.com/LegalPost/MANU_SC_0329_2015   
  18. https://en.wikipedia.org/wiki/Shreya_Singhal_v._Union_of_India  
  19. https://www.pmfias.com/section-69a-section-66a-of-the-it-act/     
  20. https://globalfreedomofexpression.columbia.edu/cases/shreya-singhal-v-union-of-india/
  21. https://blog.ipleaders.in/section-67-of-information-technology-act-2000/   
  22. https://internetdemocracy.in/laws/the-information-technology-amendment-act-2008/section-67-and-67a/  
  23. https://legal.bihar.in/section-67a-67b-it-act-punishment-for-obscene-and-csam-content/   
  24. https://www.pib.gov.in/Pressreleaseshare.aspx?PRID=1885363  
  25. https://lawgist.in/information-technology-act/67B 
  26. https://www.worldlawdigest.com/india/information-technology-act-2000-section-67c  
  27. https://lawgist.in/information-technology-act/67C
  28. https://www.meity.gov.in/static/uploads/2024/03/MeitY-JVA-1.pdf
  29. https://www.indiacode.nic.in/handle/123456789/1362/simple-search?query=Information+Technology+(Preservation+and+Retention+of+Information+by+Intermediaries+Providing+Digital+Locker+Facilities)+Rules%2C+2016&searchradio=rules
  30. https://corporate.cyrilamarchandblogs.com/2020/07/section-65b-of-the-indian-evidence-act-1872-requirements-for-admissibility-of-electronic-evidence-revisited-by-the-supreme-court/  
  31. https://www.pib.gov.in/PressReleasePage.aspx?PRID=1602398  
  32. https://www.asianlaws.org/blog/the-ultimate-guide-to-cyber-law-in-india/     
  33. https://www.drishtiias.com/daily-news-analysis/information-technology-act-s-section-69a   
  34. https://www.iilsindia.com/study-material/352752_1610897516.docx
  35. https://www.mcrhrdi.gov.in/splfc2021/week11/Information Technology Act & Cyber crime.pdf 
  36. https://en.wikipedia.org/wiki/Information_Technology_Act,_2000 
  37. https://blog.ipleaders.in/punishments-cyber-crimes-ipc/ 
  38. https://lawgist.in/information-technology-act/77A
  39. https://www.mcrhrdi.gov.in/FC2020/week11/Information Technology Act – Offences edited.pdf
  40. https://sansad.in/getFile/loksabhaquestions/annex/182/AS226_y8fPvt.pdf 
  41. https://criminallawstudiesnluj.wordpress.com/2023/09/02/bail-in-cases-of-cyber-crimes-under-the-information-technology-act-2000-a-critical-re-evaluation-of-the-penal-framework/
  42. https://testbook.com/question-answer/a-police-officer-empowered-to-investigate-cybercri–6900ff4e10bcc86292df7d21
  43. https://blog.ipleaders.in/cyber-crime-investigation-conducted/
  44. https://jajharkhand.in/wp/wp-content/uploads/2019/10/05_reading_material.pdf
  45. https://www.cyberprivilege.com/cyber-forensics-in-india
  46. https://nja.gov.in/Concluded_Programmes/2019-20/P-1163_PPTs/2. Admissibility of Electronic Evidence.pdf
  47. https://jajharkhand.in/wp/wp-content/uploads/2019/10/02_sop_english.pdf
  48. https://www.asvlawoffices.com/cybercrime-investigation-framework-enforcement-mechanisms-and-judicial-coordination/
  49. https://nja.gov.in/Concluded_Programmes/2017-18/P-1026_PPTs/7.Electronic Evidence.pdf
  50. https://cag.gov.in/uploads/media/IT-ACT-20210330163049.pdf
  51. https://www.linkedin.com/pulse/information-technology-act-2000-critical-study-from-jurists-axeyc
  52. https://www.scribd.com/document/450656990/Offences-Under-Information-Technology-Act
  53. https://police.py.gov.in/Information Technology Act 2000 – 2008 (amendment).pdf
  54. https://www.dhyeyalaw.in/shreya-singhal-v-union-of-india
  55. https://www.tscld.com/shreya-singhal-v-union-of-india-a-critical-analysis
  56. https://eprocure.gov.in/cppp/rulesandprocs/kbadqkdlcswfjdelrquehwuxcfmijmuixngudufgbuubgubfugbububjxcgfvsbdihbgfGhdfgFHytyhRtMjk4NzY=
  57. https://lawx.in/acts/section/17/224/2253
  58. https://www.caclubindia.com/acts/29760-section-77a-information-technology-act-2000.asp
  59. https://nja.gov.in/Concluded_Programmes/2019-20/P-1198_PPTs/2.LAWS RELATING TO CYBERCRIMES – ADVANCES & BOTTLENECKS.pdf
  60. https://or.niscpr.res.in/index.php/JIPR/article/download/4311/4096/73108
  61. https://www.indiacode.nic.in/show-data?actid=AC_CEN_45_76_00001_200021_1517807324077&orderno=103
  62. https://blog.ccasociety.com/section-67c-preservation-and-retention-of-information-by-intermediaries/
  63. https://testbook.com/question-answer/a-police-officer-empowered-to-investigate-cybercri–65edf09a579e9e4fed91e773
  64. https://www.mcrhrdi.gov.in/FC2020/week11/IT Act 2000 – Digital evidence.pdf
  65. https://blog.ipleaders.in/all-about-digital-evidence/
  66. https://nja.gov.in/Concluded_Programmes/2021-22/P-1271_PPTs/1.Digital Forensics Collection, Presservation and Appreciation of Electronic Evidence.pdf
  67. https://www.scconline.com/blog/post/2024/04/19/deciphering-legal-overlap-bombay-hc-expounds-on-interplay-between-ipc-and-it-act-legal-news/
  68. https://www.linkedin.com/posts/b-b-associates-llp_cybercrime-cyberlaw-itact-activity-7369327614374748160-ha9G
  69. https://ijrpr.com/uploads/V4ISSUE4/IJRPR11489.pdf