Information
Technology Act, 2000
Nineteen chapter notes covering India’s cyber-law code — the legal recognition of electronic records and digital signatures, the substantive cyber-offences under Sections 65 to 74, the intermediary safe harbour under Section 79, the data-protection framework under Section 43A, the post-Shreya Singhal position on Section 66A, and the adjudicatory machinery under the Cyber Appellate Tribunal. Section first, cyber offence second, leading case third.
Cyber law in India — the 2000 Act and its 2008 expansion.
The Information Technology Act 2000, substantially expanded by the 2008 amendment, is India’s principal cyber-law statute. The Act addresses three broad themes — the legal recognition of electronic records and digital signatures (Sections 4 to 17), the regulatory framework for certifying authorities and intermediaries, and the substantive cyber-offences (Sections 65 to 74). The 2008 amendment added the data-protection compensation regime under Section 43A, expanded the offences to include cyber-terrorism (Section 66F), child-sexual-abuse material (Section 67B), and the controversial Section 66A (online speech) which was struck down in Shreya Singhal v. Union of India (2015).
These notes anchor every chapter to its statutory section. The most-tested provisions are Section 43 (compensation for damage to computer system), Section 43A (data protection), Section 65 (tampering with computer source documents), Section 66 (computer-related offences), Section 66F (cyber-terrorism), Section 67 (publishing obscene material in electronic form), Section 67B (CSAM), Section 69 (power to issue directions for interception), and Section 79 (intermediary liability and safe harbour).
Each chapter is designed to be read in twelve to fifteen minutes and to leave the reader with the statutory section, the category of cyber offence or regulatory provision, the punishment or compensation, the intermediary-liability position where applicable, and the leading authority.
How to read these notes
Start with the section.
Every chapter opens with the precise Section of the IT Act and the relevant amendment year. Read it. The most-tested provisions — Section 43, Section 43A, Section 65, Section 66, Section 66F, Section 67, Section 69, Section 79 — must be cited section-and-clause with attention to the post-2008 and post-2015 positions.
Identify the cyber-offence or regulatory provision.
Every IT Act question first identifies the operative section. Civil compensation for damage to computer (Section 43), criminal computer-related offences (Section 66), cyber-terrorism (Section 66F), obscenity (Section 67), CSAM (Section 67B), interception (Section 69), or intermediary safe harbour (Section 79). The category determines the punishment, the procedure, and the burden of proof.
Test on the leading case.
If you can restate the holding of Shreya Singhal v. Union of India, Anvar P.V. v. P.K. Basheer, or K.S. Puttaswamy v. Union of India in two sentences, you understand the chapter. If not, return to the statutory section and rebuild from there.
All 19 chapters, in 5 groups
Sequenced through the natural structure of the subject — every chapter sits in a doctrinal cluster.Foundations — Electronic Records & Signatures
Sections 1–10 — the recognition framework
The Act’s scope and applicability, the legal recognition of electronic records under Section 4, the legal recognition of digital signatures under Section 5, the use of electronic records and digital signatures in Government and its agencies, the retention of electronic records, the audit of documents, and the publication of rules in the Electronic Gazette.
Certifying Authorities & Subscriber Duties
Sections 17–42 — the regulatory framework
The regulatory framework for Certifying Authorities under Sections 17 to 34 — appointment, powers, duties of the Controller, the licensing of Certifying Authorities, the duties of Certifying Authorities and subscribers. The Section 43 compensation for damage to computer, computer system, etc. The Section 43A reasonable security practices for sensitive personal data and information.
Cyber Offences — Sections 65 to 67B
The substantive criminal cyber-law
Section 65 tampering with computer source documents. Section 66 computer-related offences — dishonestly accessing, downloading, copying. Section 66B receiving stolen computer resource. Section 66C identity theft. Section 66D cheating by personation. Section 66E violation of privacy. Section 66F cyber-terrorism. Section 67 publishing obscene material in electronic form. Section 67A sexually explicit material. Section 67B CSAM.
Penalties and Adjudication (Sections 43–47)
IT · 10Compensation for Failure to Protect Data (Section 43A)
IT · 11Cyber Appellate Tribunal — Composition and Procedure (Sections 48–64)
IT · 12Offences Under IT Act:
IT · 13Publishing Obscene Material in Electronic Form (Section 67, 67A, 67B)
Interception, Decryption & Intermediary Liability
Sections 69, 69A, 69B, 79 — the State-versus-private balance
Section 69 power of Central Government to issue directions for interception, monitoring, or decryption of any information. Section 69A power to block public access in the interest of sovereignty, integrity, security, defence, or public order. Section 69B power for monitoring traffic data. Section 79 intermediary liability with the safe-harbour requirements as read down in Shreya Singhal.
Adjudication, Appeal & Wrap-Up
Sections 46–64, 80–90 + reference
The Adjudicating Officer under Section 46 with summary jurisdiction up to five crore rupees. The Cyber Appellate Tribunal (now merged with TDSAT) and the appeal mechanism. The Section 80 power of police to enter, search, etc. The Section 81 overriding effect. The interface with the Indian Evidence Act on electronic records (Section 65B post-Anvar P.V. and post-Arjun Panditrao Khotkar). The post-Shreya Singhal position on Section 66A. The landmark Supreme Court decisions.