Document Fragment View

Matching Fragments

27. Applying the aforesaid principles to the facts involved in the case, perusal of the complaint would reveal that the allegations relate to the use of the data code by the employees of the complainant company by accessing the Code and stealing the said data by using the computer source code. The Act of accessing or securing access to computer/computer system or computer network or computer resources by any person without permission of the owner or any person who is in charge of the computer, computer system, computer network or downloading of any such data or information from computer in a similar manner falls within the purview of Section 43 of the Information Technology Act, 2000. When such Act is done dishonestly and fraudulently it would attract the punishment under Section 66 of the Information Technology Act, such Act being held to be an offence. The ingredients of dishonesty and fraudulently are the same which are present if the person is charged with Section 420 of the Indian penal Code. The Offence of Section 379 in terms of technology is also covered under Section 43.
(a) accesses or secures access to such computer, computer system or computer network [or computer resource];
(b) downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium;
(c) introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network;
(d) damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network;
(e) disrupts or causes disruption of any computer, computer system or computer network;
(f) denies or causes the denial of access to any person
- 18 -

authorised to access any computer, computer system or computer network by any means;

(g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder;

(h) charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network,

(i) destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means;