case. The said provision is extracted
hereunder:
“66-F. Punishment for cyber terrorism.—
(1) Whoever,—
(A) with intent to threaten the unity, integrity,
security ... foreign
nation, group of individuals or otherwise,
commits the offence of cyber terrorism.
(2) Whoever commits or conspires to commit
cyber terrorism shall be punishable
Technology Act, 2000 reads as
follows:
"66-F. Punishment for cyber terrorism.?(1) Whoever,?
(A) with intent to threaten the unity, integrity, security ... foreign nation, group of individuals or otherwise, commits the offence of
cyber terrorism.
(2) Whoever commits or conspires to commit cyber terrorism shall be
punishable
that it be viewed by a person or persons;
Punishment for cyber terrorism.
(b) “capture”, with respect to an image, means to videotape, photograph, film ... foreign nation, group of individuals or otherwise,
commits the offence of cyber terrorism.
(2) Whoever commits or conspires to commit cyber terrorism shall be punishable
Information Technology Act, 2000 reads
thus :
"Section 66F. - Punishment for cyber terrorism.
(1) Whoever,--
(A) with intent to threaten the unity, integrity, security ... foreign nation, group of individuals
or otherwise, commits the offence of cyber terrorism.
(2) Whoever commits or conspires to commit cyber terrorism
shall be punishable
This
provision provides punishment for cyber terrorism and the
punishment provided may extend to imprisonment for life.
According to learned counsel for petitioner ... indicate
involvement of this petitioner/A.1 in any acts of cyber terrorism
and therefore, it is an excess charge on part of the prosecution
like, so as to attract the offence of "cyber terrorism"
as defined. Learned counsel invited our attention to the
definition of "reason ... like. The act
committed is nothing short of "cyber terrorism" as
defined in S.66F(1)(B) of the I.T Act. Alternatively
Technology Act into the Schedule listing offences. Section 66F deals with cyber terrorism. My submission is that we do not have a Data Protection ... Chair)
It also includes offences related to counterfeit currency notes and cyber terrorism. Of late, we have seen that offences related to cyber space
also pointed to certain material, which
indicate that cyber terrorism, is on the rise within the valley. The
Respondent No. 1, has brought
follows:-
The Respondent is Terrorism Supporter in Public Interest Litigation at Madras High Court.
The Respondent objective for terrorism support for all Public Interest Litigation ... Madras High Court in pursuance of their avowed objective of Cyber terrorism and wrecking revenge on the traitor and enemies.
And though Terrorism
committed offence under Section 66A, 66B, 66C, 66D, 66E
whereas the Cyber terrorism is defined under Section 66F and
the materials collected on behalf ... that the
allegation made against the petitioner does not satisfy the Cyber
terrorism and the petitioner has not used any cyber weapons like
Radio Frequency