66 F. Punishment for cyber terrorism

66 F. Punishment for cyber terrorism

(1) Whoever,—

(A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people by—

(i) denying or cause the denial of access to any person authorised to access computer resource;

or

(ii) attempting to penetrate or access a computer resource without authorisation or exceeding authorised access;

or

(iii) introducing or causing to introduce any computer contaminant,

and

by means of such conduct

  • causes or is likely to cause death or injuries to persons or
  • damage to or destruction of property or
  • disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or
  • adversely affects the critical information infrastructure specified under Section 70;

or

(B) knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorised access, and

by means of such conduct obtains access to information, data or computer database that is restricted for reasons of the security of the State or foreign relations; or any restricted information, data or computer database,

with reasons to believe that such information, data or computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise,

commits the offence of cyber terrorism.

(2) Whoever commits or conspires to commit cyber terrorism shall be punishable with

  • imprisonment which may extend to imprisonment for life

Summary

This section is broken up into 2 parts. The first part deals with the commission of an act which causes death / injury / damage. The second part deals with knowingly obtaining secret information or classified information, even though that information may not be used to cause any damage or spoil foreign relations.

Examples

This section is so broad that it will also cover the leaking of WikiLeaks “cables”, which may be used by foreign nations against India.

Leave a Reply

Your email address will not be published.