Chat Room Blog

Actions and Reactions in cyberspace has legal angles: Indian Cyber laws Awareness

Cyber crimes related to all virtual technology/online related offences. Laws are framed to protect the rights of every victimized citizens in various platform but many are unaware of the basic rights and acts behind to protect their interest. So lets shed lights on basic essential cyber laws related to chat environment governing in India and their redressal mechanism.


Significant acts regulating the cyber offences are Information technology act (2000) amended in 2008 and Indian penal code (IPC),1860. Few nomenclature overlap based on the nature of offence in both these acts.


Online harassments:

Fake profiles in various social media accounts and virtual platform to defame and taint the users for personal vendetta. The case reported comes under
IT act: Sections 66A, 67
IPC: Section 509


Hostile Community:

Various communities formed to spread hate between larger group or give objectional views on people, country or religion.
IT act: Sections 66A
IPC: Section 153A and 153 B


Account hacking:

Personal information hacked and obscene messages or images sent to personal devices threatening the victims.
IT act: Sections 43, 66, 66A, 66C, 67, 67A and 67B


Bugs spread:

Activating malicious programs and sending viruses to read personal data and acquire information
IT act: Sections 43, 66, 66A
IPC: Section 426



Anything related to child sexual abuse and pornography
IT act: Sections 67, 67A and 67B



Acquisition of information by fraudulent methods.
IT act: Sections 66, 66A and 66D
IPC: Section 420



Most of the cyber crimes are punishable with imprisonment of three years or less in IT act. Few which are punishable more than three years are

Publishing or transmitting in electronic form

  1. Section 67: obscene material
  2. Section 67A sexually explicit material
  3. Section 67B depicting children in sexually explicit material
  4. Section 66F, cyber terrorism

Others offences according to sections,


  • 43. Penalty and compensation for damage to computer,
  • 43A. Compensation for failure to protect data
  • 44. Penalty for failure to furnish information, return
  • 65. Tampering with computer source documents.
  • 66. Computer related offences.
  • 66A. Punishment for sending offensive messages through communication service, etc.
  • 66B. Punishment for dishonestly receiving stolen computer resource or communication device.
  • 66C. Punishment for identity theft.
  • 66D. Punishment for cheating by personation by using computer resource.
  • 66E. Punishment for violation of online privacy.


Why should you know this?

Have you come across the war strategy of know your enemy and yourself before you place yourself in any quadrant based on your awareness.
Know the enemy and know yourself, you need not fear the result of a hundred battles
Know yourself but not the enemy, for every victory gained you will also suffer a defeat.
Know neither the enemy nor yourself, you will succumb in every battle.


Equip yourself and suit up, if you are gonna survive the strategic virtual wars.

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.