Section 2 Information Technology Act 2000

By | May 1, 2017
(Last Updated On: May 1, 2017)

Section 2 Information Technology Act  2000

Definitions .

2 . (1) In this Act, unless the context otherwise requires,—

(a)“access” with its grammatical variations and cognate expressions means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network;
(b)“addressee” means a person who is intended by the originator to receive the electronic record but does not include any intermediary;
(c)“adjudicating officer” means an adjudicating officer appointed under sub-section (1) of section 46;
(d)“affixing 1[electronic] signature” with its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record by means of 2[electronic] signature;
3 [ (da)“Appellate Tribunal” means the Appellate Tribunal referred to in sub-section (1) of section 48; ]
(e)“appropriate Government” means as respects any matter,—
(i)enumerated in List II of the Seventh Schedule to the Constitution;
(ii)relating to any State law enacted under List III of the Seventh Schedule to the Constitution,
the State Government and in any other case, the Central Government;
(f)“asymmetric crypto system” means a system of a secure key pair consisting of a private key for creating a digital signature and a public key to verify the digital signature;
(g)“Certifying Authority” means a person who has been granted a licence to issue a 4[Electronic] Signature Certificate under section 24;
(h)“certification practice statement” means a statement issued by a Certifying Authority to specify the practices that the Certifying Authority employs in issuing 5[Electronic] Signature Certificates;
6[(ha)“communication device” means cell phones, personal digital assistance or combination of both or any other device used to communicate, send or transmit any text, video, audio or image;]
(i)“computer” means any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network;
7[(j)“computer network” means the inter-connection of one or more computers or computer systems or communication device through—
(i)the use of satellite, microwave, terrestrial line, wire, wireless or other communication media; and
(ii)terminals or a complex consisting of two or more inter-connected computers or communication device whether or not the inter-connection is continuously maintained;]
(k)“computer resource” means computer, computer system, computer network, data, computer database or software;
(l)“computer system” means a device or collection of devices, including input and output support devices and excluding calculators which are not programmable and capable of being used in conjunction with external files, which contain computer programmes, electronic instructions, input data and output data, that performs logic, arithmetic, data storage and retrieval, communication control and other functions;
(m)“Controller” means the Controller of Certifying Authorities appointed under sub-section (1) of section 17;
(n)8 [ *** ]
9[(na)“cyber cafe” means any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public;
(nb)“cyber security” means protecting information, equipment, devices, computer, computer resource, communication device and informationstored therein from unauthorised access, use, disclosure, disruption, modification or destruction;]
(o)“data” means a representation of information, knowledge, facts, concepts or instructions which are being prepared or have been prepared in a formalised manner, and is intended to be processed, is being processed or has been processed in a computer system or computer network, and may be in any form (including computer printouts magnetic or optical storage media, punched cards, punched tapes) or stored internally in the memory of the computer;
(p)“digital signature” means authentication of any electronic record by a subscriber by means of an electronic method or procedure in accordance with the provisions of section 3;
(q)“Digital Signature Certificate” means a Digital Signature Certificate issued under sub-section (4) of section 35;
(r)“electronic form” with reference to information means any information generated, sent, received or stored in media, magnetic, optical, computer memory, microfilm, computer generated micro fiche or similar device;
(s)“electronic Gazette” means the Official Gazette published in the electronic form;
(t)“electronic record” means data, record or data generated, image or sound stored, received or sent in an electronic form or microfilm or computer generated micro fiche;
10[(ta)“electronic signature” means authentication of any electronic record by a subscriber by means of the electronic technique specified in the Second Schedule and includes digital signature;
(tb)“Electronic Signature Certificate” means an Electronic Signature Certi-ficate issued under section 35 and includes Digital Signature Certificate;]
(u)“function”, in relation to a computer, includes logic, control, arithmetical process, deletion, storage and retrieval and communication or telecommunication from or within a computer;
11[(ua)“Indian Computer Emergency Response Team” means an agency established under sub-section (1) of section 70B;]
(v)“information” includes data, 12[message,] text, images, sound, voice, codes, computer programmes, software and databases or microfilm or computer generated micro fiche;
13[(w)“intermediary”, with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web-hosting service providers, search engines, online payment sites, online-auction sites, online-market places and cyber cafes;]
(x)“key pair”, in an asymmetric crypto system, means a private key and its mathematically related public key, which are so related that the public key can verify a digital signature created by the private key;
(y)“law” includes any Act of Parliament or of a State Legislature, Ordinances promulgated by the President or a Governor, as the case may be, Regulations made by the President under article 240, Bills enacted as President’s Act under sub-clause (a) of clause (1) of article 357 of the Constitution and includes rules, regulations, bye-laws and orders issued or made thereunder;
(z)“licence” means a licence granted to a Certifying Authority under section 24;
(za)“originator” means a person who sends, generates, stores or transmits any electronic message or causes any electronic message to be sent, generated, stored or transmitted to any other person but does not include an intermediary;
(zb)“prescribed” means prescribed by rules made under this Act;
(zc)“private key” means the key of a key pair used to create a digital signature;
(zd)“public key” means the key of a key pair used to verify a digital signature and listed in the Digital Signature Certificate;
(ze)“secure system” means computer hardware, software, and procedure that—
(a)are reasonably secure from unauthorised access and misuse;
(b)provide a reasonable level of reliability and correct operation;
(c)are reasonably suited to performing the intended functions; and
(d)adhere to generally accepted security procedures;
(zf)“security procedure” means the security procedure prescribed under section 16 by the Central Government;
(zg)“subscriber” means a person in whose name the 1[Electronic] Signature Certificate is issued;
(zh)“verify” in relation to a digital signature, electronic record or public key, with its grammatical variations and cognate expressions means to determine whether—
(a)the initial electronic record was affixed with the digital signature by the use of private key corresponding to the public key of the subscriber;
(b)the initial electronic record is retained intact or has been altered since such electronic record was so affixed with the digital signature.

(2) Any reference in this Act to any enactment or any provision thereof shall, in relation to an area in which such enactment or such provision is not in force, be construed as a reference to the corresponding law or the relevant provision of the corresponding law, if any, in force in that area.


1. Substituted for “digital” by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009.

2. Substituted for “Digital” by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009.
3. Clause (da) inserted by the Finance Act, 2017, w.e.f. a date yet to be notified.
5. Substituted for “digital” by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009.
6. Inserted by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009.

7. Clause (j) substituted by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009. Prior to its substitution, said clause read as under :

“(j) “computer network”means the inter-connection of one or more computers through—

(i)the use of satellite, microwave, terrestrial line or other communication media; and
(ii)terminals or a complex consisting of two or more inter-connected computers whether or not the inter-connection is continuously maintained;”

8. Clause (n) omitted by the Finance Act, 2017, w.e.f. a date yet to be notified. Prior to its omission, said clause, as amended by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009, read as under :

“(n) “Cyber Appellate Tribunal” means the Cyber Appellate Tribunal established under sub-section (1) of section 48;”

9. Inserted by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009.
10. Clauses (ta) and (tb) inserted by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009.
11. Clause (ua) inserted by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009.

12. Inserted by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009.

13. Substituted by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009. Prior to its substitution, clause (w) read as under:

“(w) “intermediary” with respect to any particular electronic message means any person who on behalf of another person receives, stores or transmits that message or provides any service with respect to that message;”

 

Leave a Reply

Your email address will not be published.