Section 24(2)(vi) in The Information Techonolgy (Procedure and Safeguards for interception, Monitoring and Decryption of Information) Rules, 2009
(vi)accessing or analysing information from a computer resource for the purpose of tracing a computer resource or any person who has contravened, or is suspected of having contravened or being likely to contravene, any provision of the Act that is likely to have an adverse impact on the services provided by the intermediary.