{"id":13853,"date":"2026-04-07T16:21:24","date_gmt":"2026-04-07T10:51:24","guid":{"rendered":"https:\/\/www.infipark.com\/articles\/?p=13853"},"modified":"2026-04-11T15:26:04","modified_gmt":"2026-04-11T09:56:04","slug":"chapter-xi-of-the-information-technology-act-2000-offences-and-procedural-aspects","status":"publish","type":"post","link":"https:\/\/www.infipark.com\/articles\/chapter-xi-of-the-information-technology-act-2000-offences-and-procedural-aspects\/","title":{"rendered":"Chapter XI of the Information Technology Act, 2000 \u2013 Offences and Procedural Aspects"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Chapter XI of the Information Technology Act, 2000 \u2013 Offences and Procedural Aspects: A Practitioner\u2019s Guide<\/h1>\n\n\n\n<p><strong>Chapter XI<\/strong> of the <strong>Information Technology Act, 2000 <\/strong>(\u201cIT Act\u201d) is the core penal chapter dealing with cyber offences and related procedural aspects, and runs broadly from <strong>Section 65 to Section 78<\/strong>. It is routinely invoked together with IPC provisions in cybercrime prosecutions, so a clear grasp of its structure, ingredients, punishments, and procedural consequences is essential for effective defence and prosecution work.<a href=\"#fn1\"><sup>[1]<\/sup><\/a><a href=\"#fn2\"><sup>[2]<\/sup><\/a><a href=\"#fn3\"><sup>[3]<\/sup><\/a><a href=\"#fn4\"><sup>[4]<\/sup><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Position of Chapter XI within the IT Act<\/h2>\n\n\n\n<p>Chapter XI contains criminal offences, as distinct from the civil contraventions and compensation regime in <strong>Chapter IX (Section 43, 43A, etc.)<\/strong>. In practice, many fact situations start as a Section 43 contravention and escalate to Chapter XI once \u201cdishonestly\u201d or \u201cfraudulently\u201d is alleged, triggering criminal liability under Section 66 and related provisions.<a href=\"#fn5\"><sup>[5]<\/sup><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><a href=\"#fn7\"><sup>[7]<\/sup><\/a><\/p>\n\n\n\n<p>The chapter covers: tampering with source code (Section 65), computer-related offences and variants (<strong>Sections 66, 66B\u201366F<\/strong>), obscenity and child sexual abuse material online (<strong>Sections 67\u201367B<\/strong>), data retention and intermediary obligations (Section 67C), governmental interception\/blocking powers (<em>Sections 69\u201369B<\/em>), critical infrastructure (<strong>Sections 70\u201370B<\/strong>), confidentiality\/privacy breaches (Sections 72\u201372A), digital signature certificate-related misconduct (<strong>Sections 71, 73, 74<\/strong>), extra\u2011territoriality and confiscation (Sections 75\u201376), and rules on compounding, cognizability, bailability and investigation (<strong>Sections 77A, 77B, 78<\/strong>).<a href=\"#fn2\"><sup>[2]<\/sup><\/a><a href=\"#fn8\"><sup>[8]<\/sup><\/a><a href=\"#fn1\"><sup>[1]<\/sup><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"chapter-xi--offences-under-the-it-act-2000\">Chapter XI \u2013 Offences under the IT Act, 2000<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th>Section<\/th><th>Heading in Act (gist)<\/th><th>Core idea of offence \/ provision<\/th><th>Maximum punishment \/ nature<\/th><\/tr><\/thead><tbody><tr><td>65<\/td><td>Tampering with computer source documents<\/td><td>Knowingly or intentionally concealing, destroying or altering legally\u2011required computer source code<\/td><td>Imprisonment up to 3 years, or fine up to \u20b92 lakh, or both<\/td><\/tr><tr><td>66<\/td><td>Computer related offences<\/td><td>Any Section 43 act (unauthorised access, data copying, virus, etc.) done dishonestly or fraudulently<\/td><td>Imprisonment up to 3 years, or fine up to \u20b95 lakh, or both<\/td><\/tr><tr><td>66A*<\/td><td>Sending offensive messages (struck down)<\/td><td>Offensive\/menacing messages, annoying emails etc. (now unconstitutional in <em>Shreya Singhal<\/em>)<\/td><td>Provision struck down by Supreme Court; no longer enforceable<\/td><\/tr><tr><td>66B<\/td><td>Dishonest receiving of stolen computer resource\/device<\/td><td>Dishonestly receiving or retaining any stolen computer resource or communication device<\/td><td>Imprisonment up to 3 years, or fine up to \u20b91 lakh, or both<\/td><\/tr><tr><td>66C<\/td><td>Identity theft<\/td><td>Fraudulent or dishonest use of electronic signature, password or other unique ID of another<\/td><td>Imprisonment up to 3 years, or fine up to \u20b91 lakh, or both<\/td><\/tr><tr><td>66D<\/td><td>Cheating by personation using computer<\/td><td>Cheating by personation by using computer resource or communication device<\/td><td>Imprisonment up to 3 years, or fine up to \u20b91 lakh, or both<\/td><\/tr><tr><td>66E<\/td><td>Violation of privacy<\/td><td>Intentionally capturing, publishing or transmitting image of a private area without consent<\/td><td>Imprisonment up to 3 years, or fine up to \u20b92 lakh, or both<\/td><\/tr><tr><td>66F<\/td><td>Cyber terrorism<\/td><td>Acts using computer resources to threaten unity, integrity, security or sovereignty, or to attack critical infrastructure<\/td><td>Imprisonment for life<\/td><\/tr><tr><td>67<\/td><td>Obscene material in electronic form<\/td><td>Publishing or transmitting lascivious or prurient material in electronic form<\/td><td>For first conviction: up to 3 years and fine up to \u20b95 lakh; subsequent: up to 5 years and fine up to \u20b910 lakh<\/td><\/tr><tr><td>67A<\/td><td>Sexually explicit content<\/td><td>Publishing or transmitting material containing sexually explicit act\/conduct in electronic form<\/td><td>First conviction: up to 5 years and fine up to \u20b910 lakh; subsequent: up to 7 years and fine up to \u20b910 lakh<\/td><\/tr><tr><td>67B<\/td><td>Child sexual abuse material (CSAM)<\/td><td>Publishing, transmitting, creating, browsing, collecting or facilitating sexually explicit depiction of children<\/td><td>First conviction: up to 5 years and fine up to \u20b910 lakh; subsequent: up to 7 years and fine up to \u20b910 lakh<\/td><\/tr><tr><td>67C<\/td><td>Preservation and retention by intermediaries<\/td><td>Duty of intermediaries to preserve and retain specified information as notified<\/td><td>Penalty up to \u20b925 lakh for intentional\/knowing contravention<\/td><\/tr><tr><td>68<\/td><td>Power of Controller to give directions<\/td><td>Non\u2011compliance with Controller\u2019s directions to Certifying Authorities etc.<\/td><td>Fine up to \u20b925 lakh (earlier imprisonment up to 2 years and fine up to \u20b91 lakh)<\/td><\/tr><tr><td>69<\/td><td>Interception, monitoring, decryption<\/td><td>Failure to assist in interception\/monitoring\/decryption ordered by Government<\/td><td>Imprisonment up to 7 years and fine<\/td><\/tr><tr><td>69A<\/td><td>Blocking for public access<\/td><td>Failure to comply with Government\u2019s directions to block public access to information<\/td><td>Imprisonment up to 7 years and fine<\/td><\/tr><tr><td>69B<\/td><td>Monitoring and collecting traffic data<\/td><td>Failure to comply with Government directions for monitoring\/collecting traffic data for cyber security<\/td><td>Imprisonment up to 1 year or fine up to \u20b91 crore<\/td><\/tr><tr><td>70<\/td><td>Protected systems<\/td><td>Securing or attempting to secure access to a \u201cprotected system\u201d (critical information infrastructure) without authorisation<\/td><td>Imprisonment up to 10 years and fine<\/td><\/tr><tr><td>70A<\/td><td>Critical information infrastructure authority<\/td><td>Provides for designated authority for critical information infrastructure (institutional, not an offence definition)<\/td><td>Structural\/procedural provision<\/td><\/tr><tr><td>70B<\/td><td>CERT\u2011In \u2013 incident response<\/td><td>Establishes CERT\u2011In as national nodal agency for cyber incident response (institutional)<\/td><td>Structural\/procedural provision<\/td><\/tr><tr><td>71<\/td><td>Misrepresentation<\/td><td>Misrepresentation or suppression of material fact in obtaining electronic\/digital signature certificate<\/td><td>Imprisonment up to 2 years, or fine up to \u20b91 lakh, or both<\/td><\/tr><tr><td>72<\/td><td>Breach of confidentiality and privacy<\/td><td>Unauthorised disclosure of information obtained by virtue of powers under the Act<\/td><td>Fine up to \u20b95 lakh (earlier up to 2 years and \u20b91 lakh)<\/td><\/tr><tr><td>72A<\/td><td>Disclosure in breach of lawful contract<\/td><td>Disclosure of personal information in breach of contract with intent to cause wrongful loss or gain<\/td><td>Imprisonment up to 3 years, or fine up to \u20b95 lakh, or both<\/td><\/tr><tr><td>73<\/td><td>Publishing false electronic signature certificates<\/td><td>Publishing a false or misleading electronic signature certificate<\/td><td>Imprisonment up to 2 years, or fine up to \u20b91 lakh, or both<\/td><\/tr><tr><td>74<\/td><td>Publication for fraudulent purposes<\/td><td>Creation, publication or use of electronic signature certificates for fraudulent or unlawful purposes<\/td><td>Imprisonment up to 2 years, or fine up to \u20b91 lakh, or both<\/td><\/tr><tr><td>75<\/td><td>Extra\u2011territorial application<\/td><td>Applies to offences involving computer resources located in India, irrespective of offender\u2019s location<\/td><td>Jurisdictional rule, not a standalone offence<\/td><\/tr><tr><td>76<\/td><td>Confiscation<\/td><td>Provides for confiscation of computer resources, devices and media involved in contraventions\/offences<\/td><td>Procedural consequence \u2013 confiscation<\/td><\/tr><tr><td>77A<\/td><td>Compounding of offences<\/td><td>Allows court to compound IT Act offences with max imprisonment up to 3 years (subject to exceptions)<\/td><td>Compounding provisionlawgist+1<\/td><\/tr><tr><td>77B<\/td><td>Offences: cognizable\/bailable rule<\/td><td>Declares which IT Act offences are cognizable and which are bailable based on maximum imprisonment term<\/td><td>Classification rule for procedure<\/td><\/tr><tr><td>78<\/td><td>Investigation by police officers<\/td><td>Only police officer not below rank of Inspector may investigate IT Act offences<\/td><td>Procedural \u2013 investigation competence<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Tampering with computer source documents \u2013 Section 65<\/h2>\n\n\n\n<p>Section 65 criminalises knowingly or intentionally concealing, destroying or altering computer source code which is required by law to be kept or maintained. <strong>\u201cComputer source code\u201d<\/strong> is defined broadly to include program listings, commands, design and layout and program analysis in any form.<a href=\"#fn9\"><sup>[9]<\/sup><\/a><a href=\"#fn7\"><sup>[7]<\/sup><\/a><a href=\"#fn1\"><sup>[1]<\/sup><\/a><\/p>\n\n\n\n<p>Punishment can extend to three years\u2019 imprisonment, or fine up to two lakh rupees, or both. Practically, this section is useful where the core grievance is destruction or manipulation of source code or configuration files (for example, by disgruntled employees or vendors) rather than just unauthorised access to data.<a><\/a><a href=\"#fn10\"><sup>[10]<\/sup><\/a><a><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><a><\/a><a href=\"#fn4\"><sup>[4]<\/sup><\/a><a><\/a><a href=\"#fn9\"><sup>[9]<\/sup><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Computer-related offences \u2013 Section 66<\/h2>\n\n\n\n<p>Originally titled<strong> \u201chacking\u201d<\/strong>, Section 66 was recast by the 2008 amendment to cover any act listed in Section 43 when done <strong>\u201cdishonestly or fraudulently\u201d<\/strong>. Section 43 itself covers unauthorised access, data copying, introducing viruses, causing denial of access, damage to computer systems, and similar actions.<a href=\"#fn6\"><sup>[6]<\/sup><\/a><a href=\"#fn7\"><sup>[7]<\/sup><\/a><a href=\"#fn11\"><sup>[11]<\/sup><\/a><a href=\"#fn10\"><sup>[10]<\/sup><\/a><\/p>\n\n\n\n<p>If any such act in Section 43 is done with the mental element of dishonesty or fraud (as understood from Sections 24 and 25 IPC), the accused faces imprisonment up to three years or fine up to five lakh rupees or both. In practice, Section 66 is often clubbed with IPC provisions on mischief, theft or cheating, and the overlap between Section 66 and IPC sections (for example, 378, 425\u2013426, 420 IPC) has led to sustained debate and case law on dual applicability.<a><\/a><a href=\"#fn7\"><sup>[7]<\/sup><\/a><a><\/a><a href=\"#fn12\"><sup>[12]<\/sup><\/a><a><\/a><a href=\"#fn4\"><sup>[4]<\/sup><\/a><a><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"sections-66-to-66f--overview\">Sections 66 to 66F \u2013 Overview<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th>Section<\/th><th>Statutory heading (gist)<\/th><th>Core conduct covered<\/th><th>Punishment \/ status<\/th><\/tr><\/thead><tbody><tr><td>66<\/td><td>Computer related offences<\/td><td>Any act listed in Section 43 (unauthorised access, data copying, virus, damage, denial of access, etc.) when done <strong>dishonestly or fraudulently<\/strong>.<\/td><td>Imprisonment up to <strong>3 years<\/strong> or fine up to <strong>\u20b95 lakh<\/strong>, or both.<\/td><\/tr><tr><td>66A*<\/td><td>Sending offensive messages through communication service, etc.<\/td><td>Sending, by computer resource or communication device, any information that is grossly offensive or menacing, or messages sent repeatedly to cause annoyance, inconvenience, etc. (as originally enacted).<\/td><td><strong>Struck down as unconstitutional<\/strong> by the Supreme Court in <em><strong>Shreya Singhal v. Union of India<\/strong><\/em>; cannot be invoked or enforced.<\/td><\/tr><tr><td>66B<\/td><td>Dishonestly receiving stolen computer resource or communication device<\/td><td>Dishonestly receiving or retaining any stolen computer resource or communication device, knowing or having reason to believe it to be stolen.<\/td><td>Imprisonment up to <strong>3 years<\/strong> or fine up to <strong>\u20b91 lakh<\/strong>, or both.<\/td><\/tr><tr><td>66C<\/td><td>Identity theft<\/td><td>Fraudulent or dishonest use of electronic signature, password or any other unique identification feature of any person.<\/td><td>Imprisonment up to <strong>3 years<\/strong> and fine up to <strong>\u20b91 lakh<\/strong>.<\/td><\/tr><tr><td>66D<\/td><td>Cheating by personation by using computer resource<\/td><td>Cheating by personation by using computer resource or communication device (e.g. online impersonation scams).<\/td><td>Imprisonment up to <strong>3 years<\/strong> and fine up to <strong>\u20b91 lakh<\/strong>.<\/td><\/tr><tr><td>66E<\/td><td>Violation of privacy<\/td><td>Intentionally capturing, publishing or transmitting the image of the \u201cprivate area\u201d of any person without consent, under circumstances violating privacy.<\/td><td>Imprisonment up to <strong>3 years<\/strong> or fine up to <strong>\u20b92 lakh<\/strong>, or both.<\/td><\/tr><tr><td>66F<\/td><td>Punishment for cyber terrorism<\/td><td>Using computer resource to threaten the unity, integrity, security or sovereignty of India, or to strike terror by causing death, injuries, damage to critical information infrastructure, etc.; also unauthorised access to protected systems with such intent.<\/td><td><strong>Imprisonment for life<\/strong>, and fine (most serious offence in the chapter).<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>*Section 66A is void and should only be discussed historically (no current penal consequence).<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Ancillary computer offences \u2013 Sections 66B to 66F<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Dishonest receipt of stolen computer resources \u2013 Section 66B<\/h3>\n\n\n\n<p>Section 66B punishes dishonestly receiving any stolen computer resource or communication device, mirroring Section 411 IPC in the digital context. Punishment can extend to three years\u2019 imprisonment or fine up to one lakh rupees, or both.<a><\/a><a href=\"#fn8\"><sup>[8]<\/sup><\/a><a><\/a><a href=\"#fn3\"><sup>[3]<\/sup><\/a><a><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><\/p>\n\n\n\n<p>For advocates, this section frequently arises against re\u2011sellers of stolen laptops, smartphones or cloned POS terminals, and can be invoked alongside Section 411 IPC, though the latter is non\u2011bailable whereas Section 66B is bailable.<a><\/a><a href=\"#fn3\"><sup>[3]<\/sup><\/a><a><\/a><a href=\"#fn4\"><sup>[4]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Identity theft \u2013 Section 66C<\/h3>\n\n\n\n<p>Section 66C targets fraudulent or dishonest use of another person\u2019s electronic signature, password or other unique identification feature, i.e. \u201cidentity theft\u201d. Punishment is imprisonment up to three years and fine up to one lakh rupees.<a><\/a><a href=\"#fn13\"><sup>[13]<\/sup><\/a><a><\/a><a href=\"#fn14\"><sup>[14]<\/sup><\/a><a><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><\/p>\n\n\n\n<p>This provision is commonly attracted in phishing, unauthorised use of login credentials, SIM swap frauds and Aadhaar\u2011linked misuse, often together with IPC provisions on forgery and cheating.<a><\/a><a href=\"#fn4\"><sup>[4]<\/sup><\/a><a><\/a><a href=\"#fn3\"><sup>[3]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cheating by personation via computer \u2013 Section 66D<\/h3>\n\n\n\n<p>Section 66D criminalises cheating by personation \u201cby using computer resource or communication device\u201d. It carries punishment of imprisonment up to three years and fine up to one lakh rupees.<a><\/a><a href=\"#fn14\"><sup>[14]<\/sup><\/a><a><\/a><a href=\"#fn13\"><sup>[13]<\/sup><\/a><a><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><a><\/a><a href=\"#fn3\"><sup>[3]<\/sup><\/a><\/p>\n\n\n\n<p>This is the workhorse provision in online job scam, OTP scam, KYC fraud, and fake customer care cases, usually read with Sections 419 and 420 IPC, though Section 66D itself is bailable and compoundable under the IT Act.<a><\/a><a href=\"#fn3\"><sup>[3]<\/sup><\/a><a><\/a><a href=\"#fn4\"><sup>[4]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Violation of privacy \u2013 Section 66E<\/h3>\n\n\n\n<p>Section 66E punishes intentional capturing, publishing or transmitting of the image of the \u201cprivate area\u201d of any person without consent, under circumstances violating privacy. The offence is punishable by imprisonment up to three years or fine up to two lakh rupees, or both.<a><\/a><a href=\"#fn13\"><sup>[13]<\/sup><\/a><a><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><a><\/a><a href=\"#fn14\"><sup>[14]<\/sup><\/a><\/p>\n\n\n\n<p>Fact patterns include non\u2011consensual circulation of intimate images and voyeuristic recordings, and this section often operates alongside IPC provisions on outraging modesty and voyeurism.<a><\/a><a href=\"#fn12\"><sup>[12]<\/sup><\/a><a><\/a><a href=\"#fn3\"><sup>[3]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cyber terrorism \u2013 Section 66F<\/h3>\n\n\n\n<p>Section 66F defines <strong>\u201ccyber terrorism\u201d<\/strong>, covering conduct using computer resources that is intended to threaten the unity, integrity, security or sovereignty of India, or to strike terror by causing death, injury, or damage to critical information infrastructure. It also covers attempts to access protected systems where the conduct is likely to cause death, injuries, disruption of essential services or adverse impact on critical information infrastructure.<a href=\"#fn15\"><sup>[15]<\/sup><\/a><a href=\"#fn2\"><sup>[2]<\/sup><\/a><\/p>\n\n\n\n<p>The section prescribes imprisonment for life and is non\u2011bailable, making it the gravest offence in the chapter and one that significantly affects bail strategy and investigative powers.<a><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><a><\/a><a href=\"#fn15\"><sup>[15]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sending offensive messages \u2013 Section 66A (now unconstitutional)<\/h3>\n\n\n\n<p>Section 66A (introduced in 2008) criminalised sending <strong>\u201cgrossly offensive\u201d<\/strong> or <strong>\u201cmenacing\u201d<\/strong> messages or persistently sending messages to cause annoyance or inconvenience, using computer resources. In <em><strong>Shreya Singhal v. Union of India<\/strong><\/em>, the Supreme Court struck down Section 66A in its entirety for violating Article 19(1)(a) and not being saved under Article 19(2).<a href=\"#fn16\"><sup>[16]<\/sup><\/a><a href=\"#fn17\"><sup>[17]<\/sup><\/a><a href=\"#fn18\"><sup>[18]<\/sup><\/a><a href=\"#fn7\"><sup>[7]<\/sup><\/a><\/p>\n\n\n\n<p>The Court held the provision to be vague and overbroad, and clarified that 66A is void <em>ab initio<\/em> and cannot be enforced, while upholding the constitutionality of Section 69A and its blocking rules. Practitioners should insist that charges under 66A be quashed and that police and magistrates not invoke it despite occasional reports of its continued use.<a><\/a><a href=\"#fn17\"><sup>[17]<\/sup><\/a><a><\/a><a href=\"#fn19\"><sup>[19]<\/sup><\/a><a><\/a><a href=\"#fn20\"><sup>[20]<\/sup><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Obscenity and sexually explicit content \u2013 Sections 67, 67A, 67B<\/strong><\/h2>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"sections-67-to-67c--obscenity-csam-and-retention\">Sections 67 to 67C \u2013 Obscenity, CSAM and Retention<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th>Section<\/th><th>Statutory heading (gist)<\/th><th>Core conduct covered<\/th><th>Punishment \/ nature<\/th><\/tr><\/thead><tbody><tr><td>67<\/td><td>Punishment for publishing or transmitting obscene material in electronic form<\/td><td>Publishing, transmitting, or causing to be published or transmitted in electronic form any material which is <strong>lascivious<\/strong>, appeals to the <strong>prurient interest<\/strong>, or tends to <strong>deprave and corrupt<\/strong> persons likely to read, see or hear it.<\/td><td>First conviction: imprisonment up to <strong>3 years<\/strong> and fine up to <strong>\u20b95 lakh<\/strong>. Subsequent conviction: imprisonment up to <strong>5 years<\/strong> and fine up to <strong>\u20b910 lakh<\/strong>.<\/td><\/tr><tr><td>67A<\/td><td>Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form<\/td><td>Publishing, transmitting, or causing to be published or transmitted in electronic form any material containing <strong>sexually explicit act or conduct<\/strong> (higher gravity than simple obscenity).<\/td><td>First conviction: imprisonment up to <strong>5 years<\/strong> and fine up to <strong>\u20b910 lakh<\/strong>. Subsequent conviction: imprisonment up to <strong>7 years<\/strong> and fine up to <strong>\u20b910 lakh<\/strong>.<\/td><\/tr><tr><td>67B<\/td><td>Punishment for publishing or transmitting of material depicting children in sexually explicit acts, etc., in electronic form<\/td><td>Creating, publishing, transmitting, collecting, browsing, downloading, advertising, promoting, distributing or facilitating <strong>child sexual abuse material (CSAM)<\/strong>; enticing children into sexual online relationships; recording such abuse in electronic form.<\/td><td>First conviction: imprisonment up to <strong>5 years<\/strong> and fine up to <strong>\u20b910 lakh<\/strong>. Subsequent conviction: imprisonment up to <strong>7 years<\/strong> and fine up to <strong>\u20b910 lakh<\/strong>.<\/td><\/tr><tr><td>67C<\/td><td>Preservation and retention of information by intermediaries<\/td><td>Imposes a duty on <strong>intermediaries<\/strong> (ISPs, platforms, hosts) to preserve and retain specified information for such duration, manner and format as the Central Government may prescribe.<\/td><td>Originally: imprisonment up to <strong>3 years<\/strong> and fine for intentional\/knowing contravention. After 2023 amendment: liable to <strong>penalty up to \u20b925 lakh<\/strong> for contravention.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Obscene material in electronic form \u2013 Section 67<\/h3>\n\n\n\n<p>Section 67 punishes publishing or transmitting in electronic form any material which is lascivious or appeals to the prurient interest, or whose effect tends to deprave and corrupt persons likely to read, see or hear it. After the 2008 amendment, first conviction attracts imprisonment up to three years and fine up to five lakh rupees, with subsequent convictions raising this to imprisonment up to five years and fine up to ten lakh rupees.<a><\/a><a href=\"#fn11\"><sup>[11]<\/sup><\/a><a><\/a><a href=\"#fn21\"><sup>[21]<\/sup><\/a><a><\/a><a href=\"#fn1\"><sup>[1]<\/sup><\/a><\/p>\n\n\n\n<p>The provision is patterned on Sections 292\u2013293 IPC but customised for electronic dissemination, and courts examine context, community standards and intent while applying the obscenity test.<a><\/a><a href=\"#fn21\"><sup>[21]<\/sup><\/a><a><\/a><a href=\"#fn22\"><sup>[22]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sexually explicit content \u2013 Section 67A<\/h3>\n\n\n\n<p>Section 67A addresses publication or transmission of material containing sexually explicit acts or conduct in electronic form. For a first conviction, punishment may extend to five years\u2019 imprisonment and fine up to ten lakh rupees; for subsequent convictions, imprisonment may extend to seven years with the same maximum fine.<a><\/a><a href=\"#fn23\"><sup>[23]<\/sup><\/a><a><\/a><a href=\"#fn22\"><sup>[22]<\/sup><\/a><a><\/a><a href=\"#fn21\"><sup>[21]<\/sup><\/a><\/p>\n\n\n\n<p>Section 67A is invoked in online pornography distribution, circulation of explicit videos and \u201crevenge porn\u201d cases, often along with IPC provisions depending on consent and coercion.<a><\/a><a href=\"#fn24\"><sup>[24]<\/sup><\/a><a><\/a><a href=\"#fn23\"><sup>[23]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Child sexual abuse material \u2013 Section 67B<\/h3>\n\n\n\n<p>Section 67B specifically targets <strong>child sexual abuse material (CSAM)<\/strong>, criminalising publishing, transmitting, creating, collecting, browsing, downloading, advertising, promoting or distributing material depicting children in sexually explicit acts or in obscene or indecent manner. It also covers grooming, enticing children to online relationships for sexually explicit acts, and recording such abuse.<a href=\"#fn25\"><sup>[25]<\/sup><\/a><a href=\"#fn23\"><sup>[23]<\/sup><\/a><\/p>\n\n\n\n<p>The punishment mirrors Section 67A: first conviction up to five years and fine up to ten lakh rupees; subsequent convictions up to seven years and the same fine. Limited defences exist where material is kept or used for bona fide scientific, literary, artistic or religious purposes, but these are narrowly construed.<a><\/a><a href=\"#fn22\"><sup>[22]<\/sup><\/a><a><\/a><a href=\"#fn23\"><sup>[23]<\/sup><\/a><a><\/a><a href=\"#fn25\"><sup>[25]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Preservation and retention by intermediaries \u2013 Section 67C<\/h3>\n\n\n\n<p>Section 67C imposes a statutory duty on intermediaries to preserve and retain specified information for such duration and in such manner as the Central Government may prescribe. Any intermediary who intentionally or knowingly contravenes these obligations commits an offence; a 2023 amendment converted the consequence into a penalty that may extend to twenty\u2011five lakh rupees.<a><\/a><a href=\"#fn26\"><sup>[26]<\/sup><\/a><a><\/a><a href=\"#fn27\"><sup>[27]<\/sup><\/a><a><\/a><a href=\"#fn28\"><sup>[28]<\/sup><\/a><a><\/a><a href=\"#fn29\"><sup>[29]<\/sup><\/a><\/p>\n\n\n\n<p>For advocates, Section 67C is crucial when seeking or challenging production of logs, IP addresses and other technical data, and in assessing intermediary liability where failure to retain data prejudices investigation.<a><\/a><a href=\"#fn30\"><sup>[30]<\/sup><\/a><a><\/a><a href=\"#fn26\"><sup>[26]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Powers regarding certifying authorities \u2013 Sections 68, 71, 73, 74<\/h3>\n\n\n\n<p>Section 68 empowers the Controller to direct Certifying Authorities or their employees to take specified measures or cease activities to ensure compliance with the Act, with disobedience punishable by up to two years\u2019 imprisonment or fine up to one lakh rupees. Section 71 penalises misrepresentation or suppression of material facts in obtaining digital\/electronic signature certificates, prescribing imprisonment up to two years or fine up to one lakh rupees, or both.<a><\/a><a href=\"#fn9\"><sup>[9]<\/sup><\/a><a><\/a><a href=\"#fn1\"><sup>[1]<\/sup><\/a><a><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><\/p>\n\n\n\n<p>Sections 73 and 74 deal with publishing false or misleading digital signature certificates or creating such certificates for fraudulent or unlawful purposes, carrying imprisonment terms and fines aimed at protecting the integrity of electronic authentication infrastructure. These provisions rarely arise in routine policing cases but are relevant in PKI\u2011driven environments such as e\u2011governance, banking and e\u2011tendering.<a><\/a><a href=\"#fn31\"><sup>[31]<\/sup><\/a><a><\/a><a href=\"#fn32\"><sup>[32]<\/sup><\/a><a><\/a><a href=\"#fn1\"><sup>[1]<\/sup><\/a><a><\/a><a href=\"#fn10\"><sup>[10]<\/sup><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Interception, decryption and blocking powers \u2013 Sections 69, 69A, 69B<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Section 69 \u2013 Interception\/monitoring\/decryption<\/h3>\n\n\n\n<p>Section 69 empowers the Central and State Governments (or authorised officers) to direct interception, monitoring or decryption of information in any computer resource on grounds such as sovereignty and integrity of India, defence, security of the State, friendly relations with foreign States, public order, or preventing incitement to a cognizable offence. Non\u2011compliance with a decryption direction can attract imprisonment up to seven years and fine.<a><\/a><a href=\"#fn33\"><sup>[33]<\/sup><\/a><a><\/a><a href=\"#fn19\"><sup>[19]<\/sup><\/a><a><\/a><a href=\"#fn32\"><sup>[32]<\/sup><\/a><\/p>\n\n\n\n<p>For practitioners, legality of interception and adherence to procedure (including necessity, proportionality and recording of reasons in writing) becomes a key ground for challenging evidence obtained under this provision.<a><\/a><a href=\"#fn19\"><sup>[19]<\/sup><\/a><a><\/a><a href=\"#fn33\"><sup>[33]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Section 69A \u2013 Blocking public access<\/h3>\n\n\n\n<p>Section 69A enables the Central Government to direct any agency or intermediary to block public access to information generated, transmitted, received, stored or hosted in any computer resource, on similar grounds. The Supreme Court in <em>Shreya Singhal<\/em> upheld Section 69A and the blocking rules as constitutionally valid due to their relatively narrow tailoring and procedural safeguards.<a><\/a><a href=\"#fn18\"><sup>[18]<\/sup><\/a><a><\/a><a href=\"#fn17\"><sup>[17]<\/sup><\/a><a><\/a><a href=\"#fn33\"><sup>[33]<\/sup><\/a><a><\/a><a href=\"#fn19\"><sup>[19]<\/sup><\/a><\/p>\n\n\n\n<p>Blocking orders must be reasoned and are typically confidential, so litigation often concerns transparency and procedural fairness around blocking rather than the mere existence of the power.<a><\/a><a href=\"#fn33\"><sup>[33]<\/sup><\/a><a><\/a><a href=\"#fn19\"><sup>[19]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Section 69B \u2013 Monitoring traffic data for cyber security<\/h3>\n\n\n\n<p>Section 69B authorises monitoring and collection of traffic data or information through any computer resource for cyber security, particularly for analysing, preventing and investigating cyber incidents. Intermediaries who intentionally or knowingly contravene directions issued under this section can face imprisonment up to three years and fines (one MeitY summary notes a possible fine up to one crore rupees).<a><\/a><a href=\"#fn34\"><sup>[34]<\/sup><\/a><a><\/a><a href=\"#fn2\"><sup>[2]<\/sup><\/a><a><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><\/p>\n\n\n\n<p>These powers are often relevant in large\u2011scale incident response, DDoS investigations and national\u2011security\u2011linked cyber operations.<a><\/a><a href=\"#fn35\"><sup>[35]<\/sup><\/a><a><\/a><a href=\"#fn15\"><sup>[15]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Protected systems and critical infrastructure \u2013 Sections 70, 70A, 70B<\/h3>\n\n\n\n<p>Section 70 allows the Government to declare any computer resource which directly or indirectly affects critical information infrastructure as a \u201cprotected system\u201d; unauthorised access or attempts to access such systems can attract imprisonment up to ten years and fine. Critical information infrastructure includes systems whose incapacity or destruction would impact national security, economy, public health or safety.<a><\/a><a href=\"#fn15\"><sup>[15]<\/sup><\/a><a><\/a><a href=\"#fn2\"><sup>[2]<\/sup><\/a><a><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><\/p>\n\n\n\n<p>Sections 70A and 70B provide for a national nodal agency for critical information infrastructure and designate the Indian <strong>Computer Emergency Response Team (CERT\u2011In)<\/strong> as the national agency for incident response, respectively. These provisions are not offences themselves but are structurally placed in the same chapter and define the institutional actors whose reports often underpin prosecutions under Sections 66F, 69, 69A and 70.<a href=\"#fn2\"><sup>[2]<\/sup><\/a><a href=\"#fn35\"><sup>[35]<\/sup><\/a><a href=\"#fn15\"><sup>[15]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Confidentiality and privacy breaches \u2013 Sections 72 and 72A<\/h3>\n\n\n\n<p>Section 72 punishes any person who, by virtue of powers under the Act, has secured access to any electronic record, book or information, and discloses it without consent in breach of the lawful contract or authority, with imprisonment up to two years or fine up to one lakh rupees, or both. It is aimed at public officials and others exercising statutory powers under the IT Act who misuse information obtained in that capacity.<a><\/a><a href=\"#fn32\"><sup>[32]<\/sup><\/a><a><\/a><a href=\"#fn1\"><sup>[1]<\/sup><\/a><a><\/a><a href=\"#fn31\"><sup>[31]<\/sup><\/a><\/p>\n\n\n\n<p>Section 72A separately penalises disclosure of personal information by a person who, in pursuance of a contract, has obtained such information and discloses it without consent with intent to cause wrongful loss or gain; punishment may extend to three years imprisonment or fine up to five lakh rupees, or both. This provision is frequently cited in data\u2011sharing and call\u2011detail\u2011record leakage scenarios, and it complements sectoral data\u2011protection obligations.<a><\/a><a href=\"#fn31\"><sup>[31]<\/sup><\/a><a><\/a><a href=\"#fn32\"><sup>[32]<\/sup><\/a><a><\/a><a href=\"#fn24\"><sup>[24]<\/sup><\/a><a><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Extra\u2011territorial application, confiscation and overriding effect \u2013 Sections 75, 76, 81<\/h3>\n\n\n\n<p>Section 75 gives the Act extra\u2011territorial reach where an offence or contravention involves a computer, computer system or computer network located in India, even if the accused is outside India. Section 76 provides for confiscation of computer resources, devices and media involved in the commission of any contravention or offence under the Act.<a><\/a><a href=\"#fn36\"><sup>[36]<\/sup><\/a><a><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><a><\/a><a href=\"#fn15\"><sup>[15]<\/sup><\/a><a><\/a><a href=\"#fn2\"><sup>[2]<\/sup><\/a><\/p>\n\n\n\n<p>Separately, Section 81 (outside Chapter XI but important strategically) gives the IT Act an overriding effect over inconsistent provisions in other laws, and has been relied on by courts to hold that, where conduct squarely falls under the IT Act, it may prevail over overlapping IPC provisions. This interplay significantly affects charge\u2011framing and questions of double jeopardy or parallel prosecution under IPC and IT Act.<a><\/a><a href=\"#fn37\"><sup>[37]<\/sup><\/a><a><\/a><a href=\"#fn12\"><sup>[12]<\/sup><\/a><a><\/a><a href=\"#fn4\"><sup>[4]<\/sup><\/a><a><\/a><a href=\"#fn36\"><sup>[36]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Compounding, cognizability and bailability \u2013 Sections 77A and 77B<\/h3>\n\n\n\n<p>Section 77A (inserted by the 2008 amendment) allows any court of competent jurisdiction to compound offences under the IT Act, except those punishable with life imprisonment or with imprisonment exceeding three years. The court cannot compound an offence where the accused is liable to enhanced punishment by reason of previous conviction, or where the offence affects the socio\u2011economic conditions of the country or is committed against a child under 18 years or a woman.<a><\/a><a href=\"#fn38\"><sup>[38]<\/sup><\/a><a><\/a><a href=\"#fn39\"><sup>[39]<\/sup><\/a><a><\/a><a href=\"#fn8\"><sup>[8]<\/sup><\/a><\/p>\n\n\n\n<p>Section 77B lays down that offences punishable with imprisonment of three years and above are cognizable, while offences punishable with imprisonment up to three years are bailable. Government responses and practitioner commentaries emphasise that many financial cybercrime offences under the IT Act are therefore bailable yet cognizable, which has direct implications for arrest, investigation strategy and bail arguments.<a><\/a><a href=\"#fn40\"><sup>[40]<\/sup><\/a><a><\/a><a href=\"#fn41\"><sup>[41]<\/sup><\/a><a><\/a><a href=\"#fn8\"><sup>[8]<\/sup><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Investigation powers \u2013 Section 78 and allied provisions<\/h3>\n\n\n\n<p>Section 78 provides that, notwithstanding the CrPC, only a police officer not below the rank of Inspector may investigate offences under the IT Act. This rank requirement has been reiterated in multiple training materials and practice guides, and irregularity in rank can be a ground to question the legality of investigation.<a><\/a><a href=\"#fn42\"><sup>[42]<\/sup><\/a><a><\/a><a href=\"#fn43\"><sup>[43]<\/sup><\/a><a><\/a><a href=\"#fn44\"><sup>[44]<\/sup><\/a><a><\/a><a href=\"#fn32\"><sup>[32]<\/sup><\/a><\/p>\n\n\n\n<p>In practice, cybercrime investigations depend heavily on digital evidence, and admissibility is governed by Sections 65A and 65B of the Indian Evidence Act, as clarified by <strong><em>Anvar P.V. v. P.K. Basheer<\/em> and <em>Arjun Panditrao Khotkar<\/em><\/strong>. Courts have insisted that electronic records produced as secondary evidence must be accompanied by a proper Section 65B(4) certificate identifying the device, process and authenticity, failing which the material may be ruled inadmissible.<a href=\"#fn45\"><sup>[45]<\/sup><\/a><a href=\"#fn46\"><sup>[46]<\/sup><\/a><a href=\"#fn30\"><sup>[30]<\/sup><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Strategic points for practicing advocates<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Charge selection and overlap with IPC<\/strong><br>Many fact situations permit parallel invocation of IT Act provisions (e.g. Sections 66, 66C, 66D, 67, 67A, 67B) and IPC provisions (e.g. theft, cheating, forgery, obscenity), and courts have recognised both overlap and complementarity rather than automatic exclusion. Advocates should carefully assess whether the IT Act\u2019s overriding clause and special\u2011law status support arguing that the IT Act should prevail or that dual charges cause prejudice in sentencing, bail or compounding.<a href=\"#fn12\"><sup>[12]<\/sup><\/a><a href=\"#fn4\"><sup>[4]<\/sup><\/a><a href=\"#fn37\"><sup>[37]<\/sup><\/a><a href=\"#fn3\"><sup>[3]<\/sup><\/a><\/li>\n\n\n\n<li><strong>Bail, cognizability and compounding strategy<\/strong><br>Because Section 77B makes several serious\u2011looking cyber offences bailable but cognizable (e.g. Sections 66B\u201366E), and Section 77A allows compounding of offences where the maximum imprisonment does not exceed three years, defence counsel can leverage these features for early settlement and bail. At the same time, the presence of Sections like 66F, 69 and 70, with higher maximum sentences and non\u2011bailable status, demands heightened attention to anticipatory bail and constitutional challenges.<a href=\"#fn40\"><sup>[40]<\/sup><\/a><a href=\"#fn8\"><sup>[8]<\/sup><\/a><a href=\"#fn6\"><sup>[6]<\/sup><\/a><a href=\"#fn15\"><sup>[15]<\/sup><\/a><\/li>\n\n\n\n<li><strong>Evidence and 65B compliance<\/strong><br>Almost every Chapter XI prosecution hinges on electronic logs, device images, server records or communications, which must pass the Section 65B Evidence Act test to be admissible. Defence counsel should scrutinise the chain of custody, the Section 65B certificate, and compliance with Section 67C retention obligations and Section 69\/69A procedures, while prosecutors must ensure forensic\u2011grade collection and proper certification to avoid exclusion of crucial evidence.<a href=\"#fn47\"><sup>[47]<\/sup><\/a><a href=\"#fn48\"><sup>[48]<\/sup><\/a><a href=\"#fn49\"><sup>[49]<\/sup><\/a><a href=\"#fn30\"><sup>[30]<\/sup><\/a><\/li>\n\n\n\n<li><strong>Post\u2011Shreya Singhal landscape<\/strong><br>With Section 66A invalidated but Sections 69A and 79 (safe\u2011harbour) read down and upheld, arguments around free speech increasingly shift to alleged misuse of obscenity provisions (67\u201367B) and blocking powers under 69A. Advocates must distinguish between mere offensive speech (no 66A any more) and content that genuinely meets obscenity or CSAM thresholds, ensuring that prosecution does not expand these provisions to constitutionally protected expression.<a href=\"#fn17\"><sup>[17]<\/sup><\/a><a href=\"#fn18\"><sup>[18]<\/sup><\/a><a href=\"#fn21\"><sup>[21]<\/sup><\/a><a href=\"#fn19\"><sup>[19]<\/sup><\/a><\/li>\n\n\n\n<li><strong>Intermediary and corporate exposure<\/strong><br>Intermediaries and corporate entities face exposure not only under 67C, 69B and 72A, but also under Section 43A (civil compensation for failure of reasonable security practices), so compliance programmes and retention policies directly affect criminal risk. Practitioners advising corporates should align IT\u2011Act compliance with sectoral regulations and emerging data\u2011protection norms, given the Government\u2019s repeated emphasis on cyber security and citizen protection.<a href=\"#fn11\"><sup>[11]<\/sup><\/a><a href=\"#fn26\"><sup>[26]<\/sup><\/a><a href=\"#fn32\"><sup>[32]<\/sup><\/a><a href=\"#fn24\"><sup>[24]<\/sup><\/a><\/li>\n<\/ol>\n\n\n\n<p>Taken together, Chapter XI offers a specialised penal framework for cyber offences, but its real complexity emerges from how these provisions intersect with the IPC, the Evidence Act and constitutional guarantees\u2014making doctrinal clarity and close attention to procedural detail indispensable in day\u2011to\u2011day practice.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a id=\"fn1\"><\/a><a href=\"https:\/\/www.indiacode.nic.in\/bitstream\/123456789\/13116\/1\/it_act_2000_updated.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.indiacode.nic.in\/bitstream\/123456789\/13116\/1\/it_act_2000_updated.pdf<\/a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn2\"><\/a><a href=\"https:\/\/childsafety.cgpolice.gov.in\/assets\/img\/resource\/IT-Act-2000_English.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/childsafety.cgpolice.gov.in\/assets\/img\/resource\/IT-Act-2000_English.pdf<\/a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn3\"><\/a><a href=\"https:\/\/blog.ipleaders.in\/cyber-crime-laws-in-india\/\" target=\"_blank\" rel=\"noopener\">https:\/\/blog.ipleaders.in\/cyber-crime-laws-in-india\/<\/a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn4\"><\/a><a href=\"https:\/\/www.argus-p.com\/papers-publications\/thought-paper\/cyber-crimes-in-the-ipc-and-it-act-an-uneasy-co-existence\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.argus-p.com\/papers-publications\/thought-paper\/cyber-crimes-in-the-ipc-and-it-act-an-uneasy-co-existence\/<\/a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn5\"><\/a><a href=\"https:\/\/thelaw.institute\/regulation-of-cyberspace\/penalties-offences-information-technology-act\/\" target=\"_blank\" rel=\"noopener\">https:\/\/thelaw.institute\/regulation-of-cyberspace\/penalties-offences-information-technology-act\/<\/a><\/li>\n\n\n\n<li><a id=\"fn6\"><\/a><a href=\"https:\/\/cleartax.in\/s\/it-act-2000\" target=\"_blank\" rel=\"noopener\">https:\/\/cleartax.in\/s\/it-act-2000<\/a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn7\"><\/a><a href=\"https:\/\/www.naavi.org\/ita_2008\/ch11_2008.htm\" target=\"_blank\" rel=\"noopener\">https:\/\/www.naavi.org\/ita_2008\/ch11_2008.htm<\/a>&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn8\"><\/a><a href=\"https:\/\/lawgic.info\/which-offences-under-the-information-technology-act-2000-are-cognizable-bailable-or-compoundable\/\" target=\"_blank\" rel=\"noopener\">https:\/\/lawgic.info\/which-offences-under-the-information-technology-act-2000-are-cognizable-bailable-or-compoundable\/<\/a>&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn9\"><\/a><a href=\"https:\/\/naavi.org\/importantlaws\/itbill2000\/ch11.html\" target=\"_blank\" rel=\"noopener\">https:\/\/naavi.org\/importantlaws\/itbill2000\/ch11.html<\/a>&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn10\"><\/a><a href=\"https:\/\/www.networkintelligence.ai\/blogs\/it-act-2000-penalties-offences-with-case-studies\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.networkintelligence.ai\/blogs\/it-act-2000-penalties-offences-with-case-studies\/<\/a>&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn11\"><\/a><a href=\"https:\/\/www.indiancybersecurity.com\/amendment_itact_2008.php\" target=\"_blank\" rel=\"noopener\">https:\/\/www.indiancybersecurity.com\/amendment_itact_2008.php<\/a>&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn12\"><\/a><a href=\"https:\/\/www.juscorpus.com\/dual-applicability-of-the-it-act-2000-and-ipc-1860-a-comprehensive-analysis\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.juscorpus.com\/dual-applicability-of-the-it-act-2000-and-ipc-1860-a-comprehensive-analysis\/<\/a>&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn13\"><\/a><a href=\"https:\/\/www.dsci.in\/files\/content\/documents\/2023\/Information%20Technology%20Act%202000.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.dsci.in\/files\/content\/documents\/2023\/Information Technology Act 2000.pdf<\/a>&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn14\"><\/a><a href=\"https:\/\/blog.ipleaders.in\/information-technology-act-2000\/\" target=\"_blank\" rel=\"noopener\">https:\/\/blog.ipleaders.in\/information-technology-act-2000\/<\/a>&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn15\"><\/a><a href=\"https:\/\/mcrhrdi.gov.in\/splfc2023\/week9\/Information%20Technology%20Act%20&amp;%20Cyber%20crime.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/mcrhrdi.gov.in\/splfc2023\/week9\/Information Technology Act &amp; Cyber crime.pdf<\/a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn16\"><\/a><a href=\"http:\/\/informationtechnologyactindia.blogspot.com\/p\/offences-section-65-to.html\" target=\"_blank\" rel=\"noopener\">http:\/\/informationtechnologyactindia.blogspot.com\/p\/offences-section-65-to.html<\/a><\/li>\n\n\n\n<li><a id=\"fn17\"><\/a><a href=\"http:\/\/www.manupatracademy.com\/LegalPost\/MANU_SC_0329_2015\" target=\"_blank\" rel=\"noopener\">http:\/\/www.manupatracademy.com\/LegalPost\/MANU_SC_0329_2015<\/a>&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn18\"><\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/Shreya_Singhal_v._Union_of_India\" target=\"_blank\" rel=\"noopener\">https:\/\/en.wikipedia.org\/wiki\/Shreya_Singhal_v._Union_of_India<\/a>&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn19\"><\/a><a href=\"https:\/\/www.pmfias.com\/section-69a-section-66a-of-the-it-act\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.pmfias.com\/section-69a-section-66a-of-the-it-act\/<\/a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn20\"><\/a><a href=\"https:\/\/globalfreedomofexpression.columbia.edu\/cases\/shreya-singhal-v-union-of-india\/\" target=\"_blank\" rel=\"noopener\">https:\/\/globalfreedomofexpression.columbia.edu\/cases\/shreya-singhal-v-union-of-india\/<\/a><\/li>\n\n\n\n<li><a id=\"fn21\"><\/a><a href=\"https:\/\/blog.ipleaders.in\/section-67-of-information-technology-act-2000\/\" target=\"_blank\" rel=\"noopener\">https:\/\/blog.ipleaders.in\/section-67-of-information-technology-act-2000\/<\/a>&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn22\"><\/a><a href=\"https:\/\/internetdemocracy.in\/laws\/the-information-technology-amendment-act-2008\/section-67-and-67a\/\" target=\"_blank\" rel=\"noopener\">https:\/\/internetdemocracy.in\/laws\/the-information-technology-amendment-act-2008\/section-67-and-67a\/<\/a>&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn23\"><\/a><a href=\"https:\/\/legal.bihar.in\/section-67a-67b-it-act-punishment-for-obscene-and-csam-content\/\" target=\"_blank\" rel=\"noopener\">https:\/\/legal.bihar.in\/section-67a-67b-it-act-punishment-for-obscene-and-csam-content\/<\/a>&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn24\"><\/a><a href=\"https:\/\/www.pib.gov.in\/Pressreleaseshare.aspx?PRID=1885363\" target=\"_blank\" rel=\"noopener\">https:\/\/www.pib.gov.in\/Pressreleaseshare.aspx?PRID=1885363<\/a>&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn25\"><\/a><a href=\"https:\/\/lawgist.in\/information-technology-act\/67B\" target=\"_blank\" rel=\"noopener\">https:\/\/lawgist.in\/information-technology-act\/67B<\/a>&nbsp;<\/li>\n\n\n\n<li><a id=\"fn26\"><\/a><a href=\"https:\/\/www.worldlawdigest.com\/india\/information-technology-act-2000-section-67c\" target=\"_blank\" rel=\"noopener\">https:\/\/www.worldlawdigest.com\/india\/information-technology-act-2000-section-67c<\/a>&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn27\"><\/a><a href=\"https:\/\/lawgist.in\/information-technology-act\/67C\" target=\"_blank\" rel=\"noopener\">https:\/\/lawgist.in\/information-technology-act\/67C<\/a><\/li>\n\n\n\n<li><a id=\"fn28\"><\/a><a href=\"https:\/\/www.meity.gov.in\/static\/uploads\/2024\/03\/MeitY-JVA-1.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.meity.gov.in\/static\/uploads\/2024\/03\/MeitY-JVA-1.pdf<\/a><\/li>\n\n\n\n<li><a id=\"fn29\"><\/a><a href=\"https:\/\/www.indiacode.nic.in\/handle\/123456789\/1362\/simple-search?query=Information+Technology+%28Preservation+and+Retention+of+Information+by+Intermediaries+Providing+Digital+Locker+Facilities%29+Rules%2C+2016&amp;searchradio=rules\" target=\"_blank\" rel=\"noopener\">https:\/\/www.indiacode.nic.in\/handle\/123456789\/1362\/simple-search?query=Information+Technology+(Preservation+and+Retention+of+Information+by+Intermediaries+Providing+Digital+Locker+Facilities)+Rules%2C+2016&amp;searchradio=rules<\/a><\/li>\n\n\n\n<li><a id=\"fn30\"><\/a><a href=\"https:\/\/corporate.cyrilamarchandblogs.com\/2020\/07\/section-65b-of-the-indian-evidence-act-1872-requirements-for-admissibility-of-electronic-evidence-revisited-by-the-supreme-court\/\" target=\"_blank\" rel=\"noopener\">https:\/\/corporate.cyrilamarchandblogs.com\/2020\/07\/section-65b-of-the-indian-evidence-act-1872-requirements-for-admissibility-of-electronic-evidence-revisited-by-the-supreme-court\/<\/a>&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn31\"><\/a><a href=\"https:\/\/www.pib.gov.in\/PressReleasePage.aspx?PRID=1602398\" target=\"_blank\" rel=\"noopener\">https:\/\/www.pib.gov.in\/PressReleasePage.aspx?PRID=1602398<\/a>&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn32\"><\/a><a href=\"https:\/\/www.asianlaws.org\/blog\/the-ultimate-guide-to-cyber-law-in-india\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.asianlaws.org\/blog\/the-ultimate-guide-to-cyber-law-in-india\/<\/a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn33\"><\/a><a href=\"https:\/\/www.drishtiias.com\/daily-news-analysis\/information-technology-act-s-section-69a\" target=\"_blank\" rel=\"noopener\">https:\/\/www.drishtiias.com\/daily-news-analysis\/information-technology-act-s-section-69a<\/a>&nbsp;&nbsp;&nbsp;<\/li>\n\n\n\n<li><a id=\"fn34\"><\/a><a href=\"https:\/\/www.iilsindia.com\/study-material\/352752_1610897516.docx\" target=\"_blank\" rel=\"noopener\">https:\/\/www.iilsindia.com\/study-material\/352752_1610897516.docx<\/a><\/li>\n\n\n\n<li><a id=\"fn35\"><\/a><a href=\"https:\/\/www.mcrhrdi.gov.in\/splfc2021\/week11\/Information%20Technology%20Act%20&amp;%20Cyber%20crime.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.mcrhrdi.gov.in\/splfc2021\/week11\/Information Technology Act &amp; Cyber crime.pdf<\/a>&nbsp;<\/li>\n\n\n\n<li><a id=\"fn36\"><\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/Information_Technology_Act,_2000\" target=\"_blank\" rel=\"noopener\">https:\/\/en.wikipedia.org\/wiki\/Information_Technology_Act,_2000<\/a>&nbsp;<\/li>\n\n\n\n<li><a id=\"fn37\"><\/a><a href=\"https:\/\/blog.ipleaders.in\/punishments-cyber-crimes-ipc\/\" target=\"_blank\" rel=\"noopener\">https:\/\/blog.ipleaders.in\/punishments-cyber-crimes-ipc\/<\/a>&nbsp;<\/li>\n\n\n\n<li><a id=\"fn38\"><\/a><a href=\"https:\/\/lawgist.in\/information-technology-act\/77A\" target=\"_blank\" rel=\"noopener\">https:\/\/lawgist.in\/information-technology-act\/77A<\/a><\/li>\n\n\n\n<li><a id=\"fn39\"><\/a><a href=\"https:\/\/www.mcrhrdi.gov.in\/FC2020\/week11\/Information%20Technology%20Act%20-%20Offences%20edited.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.mcrhrdi.gov.in\/FC2020\/week11\/Information Technology Act &#8211; Offences edited.pdf<\/a><\/li>\n\n\n\n<li><a id=\"fn40\"><\/a><a href=\"https:\/\/sansad.in\/getFile\/loksabhaquestions\/annex\/182\/AS226_y8fPvt.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/sansad.in\/getFile\/loksabhaquestions\/annex\/182\/AS226_y8fPvt.pdf<\/a>&nbsp;<\/li>\n\n\n\n<li><a id=\"fn41\"><\/a><a href=\"https:\/\/criminallawstudiesnluj.wordpress.com\/2023\/09\/02\/bail-in-cases-of-cyber-crimes-under-the-information-technology-act-2000-a-critical-re-evaluation-of-the-penal-framework\/\" target=\"_blank\" rel=\"noopener\">https:\/\/criminallawstudiesnluj.wordpress.com\/2023\/09\/02\/bail-in-cases-of-cyber-crimes-under-the-information-technology-act-2000-a-critical-re-evaluation-of-the-penal-framework\/<\/a><\/li>\n\n\n\n<li><a id=\"fn42\"><\/a><a href=\"https:\/\/testbook.com\/question-answer\/a-police-officer-empowered-to-investigate-cybercri--6900ff4e10bcc86292df7d21\" target=\"_blank\" rel=\"noopener\">https:\/\/testbook.com\/question-answer\/a-police-officer-empowered-to-investigate-cybercri&#8211;6900ff4e10bcc86292df7d21<\/a><\/li>\n\n\n\n<li><a id=\"fn43\"><\/a><a href=\"https:\/\/blog.ipleaders.in\/cyber-crime-investigation-conducted\/\" target=\"_blank\" rel=\"noopener\">https:\/\/blog.ipleaders.in\/cyber-crime-investigation-conducted\/<\/a><\/li>\n\n\n\n<li><a id=\"fn44\"><\/a><a href=\"https:\/\/jajharkhand.in\/wp\/wp-content\/uploads\/2019\/10\/05_reading_material.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/jajharkhand.in\/wp\/wp-content\/uploads\/2019\/10\/05_reading_material.pdf<\/a><\/li>\n\n\n\n<li><a id=\"fn45\"><\/a><a href=\"https:\/\/www.cyberprivilege.com\/cyber-forensics-in-india\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cyberprivilege.com\/cyber-forensics-in-india<\/a><\/li>\n\n\n\n<li><a id=\"fn46\"><\/a><a href=\"https:\/\/nja.gov.in\/Concluded_Programmes\/2019-20\/P-1163_PPTs\/2.%20Admissibility%20of%20Electronic%20Evidence.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/nja.gov.in\/Concluded_Programmes\/2019-20\/P-1163_PPTs\/2. Admissibility of Electronic Evidence.pdf<\/a><\/li>\n\n\n\n<li><a id=\"fn47\"><\/a><a href=\"https:\/\/jajharkhand.in\/wp\/wp-content\/uploads\/2019\/10\/02_sop_english.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/jajharkhand.in\/wp\/wp-content\/uploads\/2019\/10\/02_sop_english.pdf<\/a><\/li>\n\n\n\n<li><a id=\"fn48\"><\/a><a href=\"https:\/\/www.asvlawoffices.com\/cybercrime-investigation-framework-enforcement-mechanisms-and-judicial-coordination\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.asvlawoffices.com\/cybercrime-investigation-framework-enforcement-mechanisms-and-judicial-coordination\/<\/a><\/li>\n\n\n\n<li><a id=\"fn49\"><\/a><a href=\"https:\/\/nja.gov.in\/Concluded_Programmes\/2017-18\/P-1026_PPTs\/7.Electronic%20Evidence.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/nja.gov.in\/Concluded_Programmes\/2017-18\/P-1026_PPTs\/7.Electronic Evidence.pdf<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cag.gov.in\/uploads\/media\/IT-ACT-20210330163049.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/cag.gov.in\/uploads\/media\/IT-ACT-20210330163049.pdf<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.linkedin.com\/pulse\/information-technology-act-2000-critical-study-from-jurists-axeyc\" target=\"_blank\" rel=\"noopener\">https:\/\/www.linkedin.com\/pulse\/information-technology-act-2000-critical-study-from-jurists-axeyc<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.scribd.com\/document\/450656990\/Offences-Under-Information-Technology-Act\" target=\"_blank\" rel=\"noopener\">https:\/\/www.scribd.com\/document\/450656990\/Offences-Under-Information-Technology-Act<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/police.py.gov.in\/Information%20Technology%20Act%202000%20-%202008%20(amendment).pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/police.py.gov.in\/Information Technology Act 2000 &#8211; 2008 (amendment).pdf<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.dhyeyalaw.in\/shreya-singhal-v-union-of-india\" target=\"_blank\" rel=\"noopener\">https:\/\/www.dhyeyalaw.in\/shreya-singhal-v-union-of-india<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.tscld.com\/shreya-singhal-v-union-of-india-a-critical-analysis\" target=\"_blank\" rel=\"noopener\">https:\/\/www.tscld.com\/shreya-singhal-v-union-of-india-a-critical-analysis<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/eprocure.gov.in\/cppp\/rulesandprocs\/kbadqkdlcswfjdelrquehwuxcfmijmuixngudufgbuubgubfugbububjxcgfvsbdihbgfGhdfgFHytyhRtMjk4NzY=\" target=\"_blank\" rel=\"noopener\">https:\/\/eprocure.gov.in\/cppp\/rulesandprocs\/kbadqkdlcswfjdelrquehwuxcfmijmuixngudufgbuubgubfugbububjxcgfvsbdihbgfGhdfgFHytyhRtMjk4NzY=<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/lawx.in\/acts\/section\/17\/224\/2253\" target=\"_blank\" rel=\"noopener\">https:\/\/lawx.in\/acts\/section\/17\/224\/2253<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.caclubindia.com\/acts\/29760-section-77a-information-technology-act-2000.asp\" target=\"_blank\" rel=\"noopener\">https:\/\/www.caclubindia.com\/acts\/29760-section-77a-information-technology-act-2000.asp<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/nja.gov.in\/Concluded_Programmes\/2019-20\/P-1198_PPTs\/2.LAWS%20RELATING%20TO%20CYBERCRIMES%20-%20ADVANCES%20&amp;%20BOTTLENECKS.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/nja.gov.in\/Concluded_Programmes\/2019-20\/P-1198_PPTs\/2.LAWS RELATING TO CYBERCRIMES &#8211; ADVANCES &amp; BOTTLENECKS.pdf<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/or.niscpr.res.in\/index.php\/JIPR\/article\/download\/4311\/4096\/73108\" target=\"_blank\" rel=\"noopener\">https:\/\/or.niscpr.res.in\/index.php\/JIPR\/article\/download\/4311\/4096\/73108<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.indiacode.nic.in\/show-data?actid=AC_CEN_45_76_00001_200021_1517807324077&amp;orderno=103\" target=\"_blank\" rel=\"noopener\">https:\/\/www.indiacode.nic.in\/show-data?actid=AC_CEN_45_76_00001_200021_1517807324077&amp;orderno=103<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blog.ccasociety.com\/section-67c-preservation-and-retention-of-information-by-intermediaries\/\" target=\"_blank\" rel=\"noopener\">https:\/\/blog.ccasociety.com\/section-67c-preservation-and-retention-of-information-by-intermediaries\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/testbook.com\/question-answer\/a-police-officer-empowered-to-investigate-cybercri--65edf09a579e9e4fed91e773\" target=\"_blank\" rel=\"noopener\">https:\/\/testbook.com\/question-answer\/a-police-officer-empowered-to-investigate-cybercri&#8211;65edf09a579e9e4fed91e773<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.mcrhrdi.gov.in\/FC2020\/week11\/IT%20Act%202000%20-%20Digital%20evidence.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.mcrhrdi.gov.in\/FC2020\/week11\/IT Act 2000 &#8211; Digital evidence.pdf<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blog.ipleaders.in\/all-about-digital-evidence\/\" target=\"_blank\" rel=\"noopener\">https:\/\/blog.ipleaders.in\/all-about-digital-evidence\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/nja.gov.in\/Concluded_Programmes\/2021-22\/P-1271_PPTs\/1.Digital%20Forensics%20Collection,%20Presservation%20and%20Appreciation%20of%20Electronic%20Evidence.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/nja.gov.in\/Concluded_Programmes\/2021-22\/P-1271_PPTs\/1.Digital Forensics Collection, Presservation and Appreciation of Electronic Evidence.pdf<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.scconline.com\/blog\/post\/2024\/04\/19\/deciphering-legal-overlap-bombay-hc-expounds-on-interplay-between-ipc-and-it-act-legal-news\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.scconline.com\/blog\/post\/2024\/04\/19\/deciphering-legal-overlap-bombay-hc-expounds-on-interplay-between-ipc-and-it-act-legal-news\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.linkedin.com\/posts\/b-b-associates-llp_cybercrime-cyberlaw-itact-activity-7369327614374748160-ha9G\" target=\"_blank\" rel=\"noopener\">https:\/\/www.linkedin.com\/posts\/b-b-associates-llp_cybercrime-cyberlaw-itact-activity-7369327614374748160-ha9G<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/ijrpr.com\/uploads\/V4ISSUE4\/IJRPR11489.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/ijrpr.com\/uploads\/V4ISSUE4\/IJRPR11489.pdf<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Chapter XI of the Information Technology Act, 2000 \u2013 Offences and Procedural Aspects: A Practitioner\u2019s Guide Chapter XI of the Information Technology Act, 2000 (\u201cIT Act\u201d) is the core penal chapter dealing with cyber offences and related procedural aspects, and runs broadly from Section 65 to Section 78. It is routinely invoked together with IPC [&hellip;]<\/p>\n","protected":false},"author":35,"featured_media":13855,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[3847,3844,3853,3863,3876,3861,3864,3860,3870,3877,3849,3857,3875,3858,3840,3873,3848,3868,3871,3862,3865,3859,3845,3841,3843,3842,3846,3850,3852,3851,3854,3856,3855,3869,3874,3867,3866,3872],"class_list":["post-13853","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bachelor-laws","tag-chapter-11-it-act","tag-chapter-xi-offences","tag-cheating-by-personation-it-act","tag-child-sexual-abuse-material-online","tag-cognizable-and-bailable-it-act-offences","tag-compounding-of-it-act-offences","tag-csam-it-act","tag-cyber-crime-investigation-india","tag-cyber-crime-laws-in-india","tag-cyber-law-article","tag-cyber-offences-in-india","tag-cyber-terrorism-under-it-act","tag-digital-evidence-and-section-65b","tag-identity-theft-it-act","tag-information-technology-act-2000","tag-intermediary-liability-and-67c","tag-it-act-2000","tag-it-act-and-ipc-overlap","tag-legal-guide-for-practicing-advocates","tag-obscenity-in-electronic-form","tag-offences-and-penalties-under-it-act","tag-privacy-violation-it-act","tag-section-65-it-act","tag-section-66-it-act","tag-section-66b-it-act","tag-section-66c-it-act","tag-section-66d-it-act","tag-section-66e-it-act","tag-section-66f-it-act","tag-section-67-it-act","tag-section-67a-it-act","tag-section-67b-it-act","tag-section-67c-it-act","tag-section-69a-blocking-orders","tag-section-77a-it-act","tag-section-77b-it-act","tag-section-78-it-act","tag-shreya-singhal-section-66a"],"_links":{"self":[{"href":"https:\/\/www.infipark.com\/articles\/wp-json\/wp\/v2\/posts\/13853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infipark.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infipark.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infipark.com\/articles\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infipark.com\/articles\/wp-json\/wp\/v2\/comments?post=13853"}],"version-history":[{"count":13,"href":"https:\/\/www.infipark.com\/articles\/wp-json\/wp\/v2\/posts\/13853\/revisions"}],"predecessor-version":[{"id":13878,"href":"https:\/\/www.infipark.com\/articles\/wp-json\/wp\/v2\/posts\/13853\/revisions\/13878"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infipark.com\/articles\/wp-json\/wp\/v2\/media\/13855"}],"wp:attachment":[{"href":"https:\/\/www.infipark.com\/articles\/wp-json\/wp\/v2\/media?parent=13853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infipark.com\/articles\/wp-json\/wp\/v2\/categories?post=13853"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infipark.com\/articles\/wp-json\/wp\/v2\/tags?post=13853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}