Exclusive HOLI Discounts!
Get Courses and Combos at Upto 50% OFF!
Upgrad
LCI Learning

Share on Facebook

Share on Twitter

Share on LinkedIn

Share on Email

Share More

r kumar   08 April 2017

Cyber access

Is enter some one id and delete mails related to legal case as an evidence ,and use email id,without information to person ,is voilation of law,if so,what is act ,can be used for this and what are penalties for this.My wife bother ,access my e mail id and delete mail ,where i put black and white to him about her sister(WIFE),her vnonverbal and fighting with me.More ever he is using same id ,in domestic voilence case and trying to show adultry against me,ehen when he access the mail id.

 

What action can be taken ,i have proof of his access and he sent mail to some one ,which is there in my mail id ,and i am regular getting details for access of my email from haryana with ip adress ,even when i am sitting in my office.



Learning

 2 Replies

Jayesh Kumar (n)     08 April 2017

You are from which place. If that place has a cyber police, go and register a Complaint there and get your account secured. If not, then go to a police station and file Complaint. You can yourself also secure your account by changing your password and put more stringent security options.

Dr. Atul [9013898936] (Lawyer, Scholar)     09 April 2017

The offender would be liable to be punished and/or pay compensation under Section 43 read with Section 66 of the Information Technology Act. The relevant provisions applicable to your case should be Section 43, sub-sections (a), (b), (i) and (j), as follows:

43. Penalty and compensation for damage to computer, computer system, etc. -If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network,-
(a) accesses or secures access to such computer, computer system or computer network or computer resource;
(b) downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium;

...

(i) destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means;
(j) steal, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage;

he shall be liable to pay damages by way of compensation to the person so affected.

Complaint under Section 43 has to be made before the Adjudicating Officer appointed by your State Government under the IT Act.

 

Section 66 prescribes the punishment for the actions spelt out in Section 43:

66. Computer related offences. -If any person, dishonestly or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.

Subject to correction, I think since the IT Act itself does not specify the trial of offences, CrPC should be applicable and the offence should be cognizable and non-bailable. A case by the name of Kumar vs. Whiteley seems to come closest to your facts (couldn't find the full decision and this following case summary is from another website).

Kumar vs. Whiteley: In this case the accused gained unauthorized access to the Joint Academic Network (JANET) and deleted, added files and changed the passwords to deny access to the authorized users. Investigations had revealed that Kumar was logging on to the BSNL broadband Internet connection as if he was the authorized genuine user and ‘made alteration in the computer database pertaining to broadband Internet user accounts’ of the subscribers. The CBI had registered a cyber crime case against Kumar and carried out investigations on the basis of a complaint by the Press Information Bureau, Chennai, which detected theunauthorized use of broadband Internet. The complaint also stated that the subscribers had incurred a loss of Rs 38,248 due to Kumar’s wrongful act. He used to ‘hack’ sites from Bangalore, Chennai and other cities too, they said. The Additional Chief Metropolitan Magistrate, Egmore, Chennai, sentenced N G Arun Kumar, the techie from Bangalore to undergo a rigorous imprisonment for one year with a fine of Rs 5,000 under section 420 IPC (cheating) and Section 66 of IT Act (Computer related Offence).

But I won't raise your hopes. Even the most developed nations are still struggling with information technology law concepts such as limits of authorization, excess of authorization and standards of proof etc. For instance, in your case, the IT Act requires the action to be without the permission of the owner of the computer system or computer network; you are the owner of your email ID, but are you "owner of the computer system" on which the email's were residing and from which they were deleted - I think no, unless you were running your own mailserver. Even so, no harm in making a complaint to bring things on record and trying.


Leave a reply

Your are not logged in . Please login to post replies

Click here to Login / Register