Computer Crimes and the Act
World over there is a great concern due to various types of crimes committed by using computers and on the Internet. Almost everyday there is an international story about some or the other portal attacked or credit card fraud or some virus bringing down the system.
Broadly such crimes can be classified as:
- Unauthorised access
- Unauthorised interception
- Unauthorised use of computer, computer system
- Computer related fraud
- Computer forgery
- Damage to computer data
- Computer sabotage
The Information Technology Act 2000 (India) covers in detail various types of computer crimes and the penalties provided for such crimes.
Penalty for damage to computer, computer system, etc
Some of the important provisions of the Act in respect of the crimes and offences are as under:
Penalty for damage to computer, computer system, etc
If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network
(a) accesses or secures access
(b) downloads, copies or extracts any data, computer data base or information
(ii) "computer database" means a representation of information, knowledge, facts, concepts or instructions in text, image, audio, video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network;
(c) introduces or causes to be introduced any computer contaminant or computer virus
(i) "computer contaminant" means any set of computer instructions that are designed -
(a) to modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or
(b) by any means to usurp the normal operation of the computer, computer system, or computer network;
(iii) "computer virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource;
(d) damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes(iv) "damage" means to destroy, alter, delete, add, modify or rearrange any computer resource by any means.
(e) disrupts or causes disruption
(f) denies or causes the denial of access to any person authorised to access
(g) provides any assistance to any person to facilitate access in contravention of the provisions of this Act, rules or regulations made thereunder,
(h) charges the services availed of by a person to the account of another person by tampering with or manipulating he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected.
Investigation of cyber crimes
Any police officer, not below the rank of a Deputy Superintendent of Police, can search and arrest without warrant any person found therein who is reasonably suspected or having committed or of committing or of being about to commit any offence under this Act.
Things which can be confiscated are Hardware which can include any data-processing devices (such as central processing units, memory typewriters, "laptop" or "notebook" computers); internal and peripheral storage devices (such as fixed disks, external hard disks, floppy disk drives and diskettes, tape drives and tapes, optical storage devices, transistor-like binary devices, and other memory storage devices), peripheral input/output devices (such as keyboards, printers, scanners, plotters, video display monitors, and optical readers); and related communications devices (such as modems, cables and connections, recording equipment, RAM or ROM units, acoustic couplers, automatic dialers, speed dialers, programmable telephone dialing or signaling devices, and electronic tone-generating devices).