Topics In Demand
Notification
New

No notification found.

Re: For Indian citizens ,how does the IT Act 2000 articulate protection of personal data and consent sought while accessing data of Indian individuals
Re: For Indian citizens ,how does the IT Act 2000 articulate protection of personal data and consent sought while accessing data of Indian individuals

April 24, 2018

606

0


Listen to this article



 

 

The IT Act underwent changes as Internet technology grew. In 2008, additions expanded the definition of “communication device” to include mobile devices and placed owners of given IP addresses responsible for distributed and accessed content.

 

Privacy was addressed in 2011 when stringent requirements for collecting personal information came into effect.

Section 72A in The Information Technology Act, 2000

90 [ 72A Punishment for disclosure of information in breach of lawful contract. -Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such material to any other person, shall be punished with imprisonment for a term which may extend to three years, or with fine which may extend to five lakh rupees, or with both.]

The following important sections have been substituted and inserted by the IT Amendment Act, 2008:

Section 43A – Compensation for failure to protect data.
Section 66 – Computer Related Offences
Section 66A – Punishment for sending offensive messages through communication service, etc.
Section 66B – Punishment for dishonestly receiving stolen computer resource or communication device.
Section 66C – Punishment for identity theft
Section 66D – Punishment for cheating by personation by using computer resource
Section 66E – Punishment for violation for privacy
Section 66F – Punishment for cyber terrorism
Section 67 – Punishment for publishing or transmitting obscene material in electronic form
Section 67A – Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form
Section 67B – Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form
Section 67C – Preservation and Retention of information by intermediaries
Section 69 – Powers to issue directions for interception or monitoring or decryption of any information through any computer resource
Section 69A – Power to issue directions for blocking for public access of any information through any computer resource
Section 69B – Power to authorize to monitor and collect traffic data or information through any computer resource for cyber security
Section 72A – Punishment for Disclosure of information in breach of lawful contract
Section 79 – Exemption from liability of intermediary in certain cases
Section 84A –Modes or methods for encryption
Section 84B –Punishment for abetment of offences
Section 84C –Punishment for attempt to commit offences

 

 


That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.


© Copyright nasscom. All Rights Reserved.