magnetic or optical impulses, and includes
all input, output, processing, storage, computer
software or communication facilities which are
connected or related to the computer ... source
documents.- Whoever knowingly or intentionally
conceals, destroys or alters or intentionally or
knowingly causes another to conceal, destroy, or alter
any computer source code
magnetic or optical impulses, and includes
all input, output, processing, storage, computer
software or communication facilities which are
connected or related to the computer ... source
documents.- Whoever knowingly or intentionally
conceals, destroys or alters or intentionally or
knowingly causes another to conceal, destroy, or alter
any computer source code
magnetic or optical impulses, and includes
all input, output, processing, storage, computer
software or communication facilities which are
connected or related to the computer ... source
documents.- Whoever knowingly or intentionally
conceals, destroys or alters or intentionally or
knowingly causes another to conceal, destroy, or alter
any computer source code
magnetic or optical impulses, and includes
all input, output, processing, storage, computer
software or communication facilities which are
connected or related to the computer ... source
documents.- Whoever knowingly or intentionally
conceals, destroys or alters or intentionally or
knowingly causes another to conceal, destroy, or alter
any computer source code
magnetic or optical impulses, and includes
all input, output, processing, storage, computer
software or communication facilities which are
connected or related to the computer ... source
documents.- Whoever knowingly or intentionally
conceals, destroys or alters or intentionally or
knowingly causes another to conceal, destroy, or alter
any computer source code
magnetic or optical impulses, and includes
all input, output, processing, storage, computer
software or communication facilities which are
connected or related to the computer ... source
documents.- Whoever knowingly or intentionally
conceals, destroys or alters or intentionally or
knowingly causes another to conceal, destroy, or alter
any computer source code
hold any copy
(hard or soft) of any such information, source and object
codes together with all related listings and
documentation i.e (Intellectual Property ... such information, source and
- 16 -
NC: 2025:KHC:43558
CRL.P No. 7222 of 2025
HC-KAR
object codes together with all relates listings
RESPONDENTS
14
THIS CRIMINAL APPEAL IS FILED UNDER SECTION 377 OF
CR.P.C. PRAYING TO ENHANCE THE LEVY OF FINE AGAINST
RESPONDENT ... RESPONDENT
THIS CRIMINAL APPEAL IS FILED UNDER SECTION 377(1)
OF CR.P.C. PRAYING TO CALL FOR RECORDS IN C.C.No.76/2019
RESPONDENTS
14
THIS CRIMINAL APPEAL IS FILED UNDER SECTION 377 OF
CR.P.C. PRAYING TO ENHANCE THE LEVY OF FINE AGAINST
RESPONDENT ... RESPONDENT
THIS CRIMINAL APPEAL IS FILED UNDER SECTION 377(1)
OF CR.P.C. PRAYING TO CALL FOR RECORDS IN C.C.No.76/2019
RESPONDENTS
14
THIS CRIMINAL APPEAL IS FILED UNDER SECTION 377 OF
CR.P.C. PRAYING TO ENHANCE THE LEVY OF FINE AGAINST
RESPONDENT ... RESPONDENT
THIS CRIMINAL APPEAL IS FILED UNDER SECTION 377(1)
OF CR.P.C. PRAYING TO CALL FOR RECORDS IN C.C.No.76/2019