Un-authorized access to protected system - Sec.70 - Information Technology Act
Information Technology Act
*[ 70. Protected system.-(1) The appropriate Government may, by notification in the Official Gazette, declare any computer resource which directly or indirectly affects the facility of Critical Information Infrastructure, to be a protected system.
Explanation: For the purposes of this section, Critical Information Infrastructure means the computer resource, the incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety.
(2) The appropriate Government may, by order in writing, authorize the persons who are authorized to access protected systems notified under sub-section (1).
(3) Any person who secures access or attempts to secure access to a protected system in contravention of the provisions of this section shall be punished with imprisonment of either description for a term which may extend to ten years and shall also be liable to fine.
(4) The Central Government shall prescribe the information security practices and procedures for such protected system.
[* Amended vide Information Technology Amendment Act, 2008]
Related Posts
- OWASP Top 10 Web Application Security Risks
- Offences by Companies - Sec.85 - Information Technology Act
- Ultimate Guide: Legal Compliance for E-commerce in India [2024]
- E-commerce Laws and Compliances in India: A Deep Dive into Legal Metrology (Packaged Commodities) Rules
- External Data Protection Officer Services