



1. Short title, extent, commencement and application 2
2. De nitions 3 CHAPTER II
DIGITAL SIGNATURE AND ELECTRONIC SIGNATURE
3. Authentication of electronic records 8
3A. Electronic signature 10 CHAPTER III ELECTRONIC GOVERNANCE
4. Legal recognition of electronic records 11
5. Legal recognition of electronic signatures 12
6. Use of electronic records and electronic signatures in Government and its agencies 12
6A. Delivery of services by service provider 13
7. Retention of electronic records 14
7A. Audit of documents, etc., maintained in electronic form 16
8. Publication of rule, regulation, etc., in Electronic Gazette 16
9. Sections 6, 7 and 8 not to confer right to insist document should be accepted in electronic form 17
10. Power to make rules by Central Government in respect of electronic signature 17
10A. Validity of contracts formed through electronic means 18
CHAPTER IV
ATTRIBUTION, ACKNOWLEDGEMENT AND DESPATCH OF ELECTRONIC RECORDS
11. Attribution of electronic records 18
12. Acknowledgement of receipt 18
13. Time and place of despatch and receipt of electronic record 19
CHAPTER V
SECURE ELECTRONIC RECORDS AND SECURE ELECTRONIC SIGNATURES
14. Secure electronic record
15. Secure electronic signature
16. Security procedures and practices
CHAPTER VI
17. Appointment of Controller and other of cers
18. Functions of Controller
19. Recognition of foreign Certifying Authorities
20. [Omitted by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009]
21. Licence to issue Electronic Signature Certi cates
22. Application for licence
23. Renewal of licence
24. Procedure for grant or rejection of licence
25. Suspension of licence
26. Notice of suspension or revocation of licence
27. Power to delegate
28. Power to investigate contraventions
29. Access to computers and data
30. Certifying authority to follow certain procedures
31. Certifying Authority to ensure compliance of the Act, etc.
32. Display of licence
33.
35. Certifying authority to issue Electronic Signature Certi cate
36. Representations upon issuance of Digital Signature Certi cate
37. Suspension of Digital Signature Certi cate
38. Revocation of Digital Signature
39. Notice of suspension or revocation
40. Generating
43. Penalty and compensation for damage to computer, computer system, etc.
43A. [Omitted by the Digital Personal data Protection Act, 2023, with effect from a date yet to be noti ed]
44.
48. Establishment of Appellate
49. [Omitted by the Finance Act, 2017, w.e.f. 26-5-2017
50. [Omitted by the Finance Act, 2017, w.e.f. 26-5-2017]
51. [Omitted by the Finance Act, 2017, w.e.f. 26-5-2017]
52. [Omitted by the Finance Act, 2017, w.e.f. 26-5-2017]
52A. [Omitted by the Finance Act, 2017, w.e.f. 26-5-2017]
52B. [Omitted by the Finance Act, 2017, w.e.f. 26-5-2017]
52C. [Omitted by the Finance Act, 2017, w.e.f. 26-5-2017] 45
52D. Decision by majority 45
53. [Omitted by the Finance Act, 2017, w.e.f. 26-5-2017]
54. [Omitted by the Finance Act, 2017, w.e.f. 26-5-2017]
55. Orders constituting Appellate Tribunal to be nal and not to invalidate its proceedings
56. [Omitted by the nance Act, 2017, w.e.f. 26-5-2017]
57. Appeal to Appellate Tribunal
58. Procedure and powers of the Appellate Tribunal
59. Right to legal representation
60. Limitation
61. Civil court not to have jurisdiction
62. Appeal to High Court
63. Compounding of contraventions
64. Recovery of penalty or
CHAPTER XI
OFFENCES
65. Tampering with computer source documents
66. Computer related offences
66A. [Omitted by the Jan Vishwas (Amendment of Provision) Act, 2023, w.e.f. 30-11-2023]
66B. Punishment for dishonestly receiving stolen computer resource or communication device
66C. Punishment for identity theft
66D. Punishment for cheating by personation by using computer resource
66E. Punishment for violation of privacy
66F. Punishment for cyber terrorism
67. Punishment for publishing or transmitting obscene material in electronic form
67A. Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form
67B. Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc., in electronic form
CONTENTS
67C. Preservation and retention of information by intermediaries 61
68. Power of Controller to give directions
69. Power to issue directions for interception or monitoring or decryption of any information through any computer resource
69A. Power to issue directions for blocking for public access of any information through any computer resource
69B. Power to authorize to monitor and collect traf c data or information through any computer resource for cyber security
70. Protected system
70A. National nodal agency
70B. Indian Computer Emergency Response Team to serve as national agency for incident response
71. Penalty for misrepresentation
72. Penalty for breach of con dentiality and privacy
72A. Penalty for disclosure of information in breach of lawful contract
73. Penalty for publishing Electronic Signature Certi cate false in certain particulars
74. Publication for fraudulent purpose
75. Act to apply for offence or contravention committed outside India 69
76. Con scation
77. Compensation, penalties or con scation not to interfere with other punishment
77A. Compounding of offences
77B. Offences with three years imprisonment to be bailable
78. Power to investigate offences
CHAPTER XII
INTERMEDIARIES NOT TO BE LIABLE IN CERTAIN CASES
79. Exemption from liability of intermediary in certain cases 73
CHAPTER XIIA
EXAMINER OF ELECTRONIC EVIDENCE
79A. Central Government to notify Examiner of Electronic Evidence 75
CHAPTER XIII MISCELLANEOUS
80. Power of police of cer and other of cers to enter, search, etc. 76
81. Act to have overriding effect 76
81A. Application of the Act to electronic cheque and truncated cheque 77
82. Controller, Deputy Controller and Assistant Controller to be public servants 78
83. Power to give directions 78
84. Protection of action taken in good faith 79
84A. Modes or methods for encryption 79
84B. Punishment for abetment of offences
84C. Punishment for attempt to commit offences
85. Offences by companies 79
86. Removal of dif culties
87. Power of Central Government to make rules 80
88. Constitution of Advisory Committee 83
89. Power of Controller to make regulations 84
90. Power of State Government to make rules 85
91 to 94. [Omitted by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009] 85
FIRST SCHEDULE : Documents or Transactions to which the Act shall not Apply 85
SECOND SCHEDULE : Electronic Signature or Electronic Authentication Technique and Procedure
THIRD SCHEDULE : [Omitted by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009]
FOURTH SCHEDULE : [Omitted by the Information Technology (Amendment) Act, 2008, w.e.f. 27-10-2009] 89
INFORMATION TECHNOLOGY (CERTIFYING AUTHORITIES) RULES, 2000
1. Short title and commencement
2. De nitions
3. The manner in which information be authenticated by means of Digital Signature
4. Creation of Digital Signature
5.
5A.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
23.
24.
25.
26.
27.
28.
29.
30.
32.
SCHEDULE IV : Digital Signature Certi cate 144
SCHEDULE V : Glossary 147
CYBER REGULATIONS APPELLATE
TRIBUNAL (PROCEDURE) RULES, 2000
1. Short title and commencement 160
2. De nitions 160
3. Procedure for ling applications 161
4. Presentation and scrutiny of applications 161
5. Place of ling application 161
6. Application fee 161
7. Contents of application 162
8. Paper book, etc., to accompany the application 162
9. Plural remedies 162
10. Service of notice of application on the respondents 162
11. Filing of reply and other documents by the respondent 163
12. Date and place of hearing to be noti ed 163
13. Sittings of the Tribunal 163
14. Decision on applications 164
15. Action on application for applicant’s default 164
16. Hearing on application ex parte 164
17. Adjournment of application 164
18. Order to be signed and dated 164
19. Publication of orders 165
20. Communication of orders to parties 165
21. No fee for inspection of records 165
22. Orders and directions in certain cases 165
23. Registration of legal practitioners clerks 165
24. Working hours of the Tribunal 165
25. Sitting hours of the Tribunal 165
26. Powers and functions of the Registrar 166
27. Additional powers and duties of Registrar 166
28. Seal and emblem 166
FORM 1: Application Under section 57 of the Information Technology Act, 2000
FORM 2: Application for the Registration of a Clerk
INFORMATION TECHNOLOGY (OTHER POWERS OF CIVIL COURT VESTED IN CYBER
APPELLATE TRIBUNAL) RULES, 2003
1. Short title and commencement
2. De nitions
3. Powers of Cyber Appellate Tribunal
INFORMATION TECHNOLOGY (OTHER STANDARDS) RULES, 2003
1. Short title and commencement
2. De nitions
3. Standards to be observed by the Controller
INFORMATION TECHNOLOGY (QUALIFICATION AND EXPERIENCE OF ADJUDICATING OFFICERS AND MANNER OF HOLDING ENQUIRY) RULES, 2003
1. Short title and commencement
2. De nitions
3. Eligibility for Adjudicating Of cer
4. Scope and manner of holding inquiry
5. Order of the Adjudicating Of cer
6. Copy of the order
7. Service of notices and orders
8. Fee
9. Duplicity avoided
10. Frivolous complaints
11. Compounding of contraventions
12. Certifying Authorities and other Governmental agencies to assist
APPENDIX : Proforma for Complaint to Adjudicating Of cer Under Information Technology Act, 2000
INFORMATION TECHNOLOGY (USE OF ELECTRONIC RECORDS AND DIGITAL SIGNATURES) RULES, 2004
1. Short title and commencement 179
2. De nitions 179
3. Filing of form, application or any other document 179
4. Issue or grant of any licence, permit, sanction or approval 180
5. Payment and receipt of fee or charges 180
INFORMATION TECHNOLOGY (SECURITY PROCEDURE) RULES, 2004
1. Short title and commencement
2. De nitions
3. Secure electronic record
4. Secure digital signature
CYBER APPELLATE TRIBUNAL (SALARY, ALLOWANCES AND OTHER TERMS AND CONDITIONS OF SERVICE OF CHAIRPERSON AND MEMBERS) RULES, 2009
1. Short title and commencement 183
2. De nitions
3. Salary and allowances
4. Leave
5. Leave Sanctioning Authority
6. Pension or Provident Fund
7. Travelling and daily allowances
8. Leave Travel Concession
9. Facility of Conveyance
10. House Rent Allowance 185
11. Facilities for medical treatment 185
12. Oath of of ce and secrecy 186
13. Declaration of nancial or other interest 186
14. Residuary Provision 186
FORM I : Form of oath of of ce for the Chairperson/Members of the Cyber Appellate Tribunal 186
FORM II : Form of oath of Secrecy for the Chairperson/Members of the Cyber Appellate Tribunal 186
FORM III : Declaration against acquisition of any adverse nancial or other interest 187
CYBER APPELLATE TRIBUNAL
(PROCEDURE FOR INVESTIGATION OF MISBEHAVIOUR OR INCAPACITY OF CHAIRPERSON AND MEMBERS) RULES, 2009
1. Short title and commencement 188
2. De nitions 188
3. Committee for investigation of complaints 189
4. Judge to conduct inquiry 189
5. Application of the Departmental Inquiries (Enforcement of Witness and Production of Documents) Act, 1972 to inquiries under these rules 190
6. Powers of Judge 190
7. Suspension of Chairperson or Member 191
8. Subsistence allowance 191
9. Inquiry Report 191
INFORMATION
TECHNOLOGY
(PROCEDURE
AND SAFEGUARDS FOR INTERCEPTION, MONITORING AND DECRYPTION OF INFORMATION) RULES, 2009
1. Short title and commencement 192
2. De nitions 192
CONTENTS
3. Directions for interception or monitoring or decryption of any information. 194
4. Authorisation of agency of Government 195
5. Issue of decryption direction by competent authority 195
6. Interception or monitoring or decryption of information by a State beyond its jurisdiction 195
7. Contents of direction 195
8. Competent authority to consider alternative means in acquiring information 195
9. Direction of interception or monitoring or decryption of any speci c information 195
10. Direction to specify the name and designation of the of cer to whom information to be disclosed 195
11. Period within which direction shall remain in force 196
12. Authorised agency to designate nodal of cer 196
13. Intermediary to provide facilities, etc. 196
14. Intermediary to designate of cers to receive and handle requisition 196
15. Acknowledgement of instruction 196
16. Maintenance of records by designated of cer 196
17. Decryption key holder to disclose decryption key or provide decryption assistance 197
18. Submission of list of interception or monitoring or decryption of information 197
19. Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information 197
20. Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information 198
21. Responsibility of intermediary 198
22. Review of directions of competent authority 198
23. Destruction of records of interception or monitoring or decryption of information 198
24. Prohibition of interception or monitoring or decryption of information without authorisation 199
25. Prohibition of disclosure of intercepted or monitored or decrypted information 200
INFORMATION TECHNOLOGY (PROCEDURE AND SAFEGUARDS FOR BLOCKING FOR ACCESS OF INFORMATION BY PUBLIC) RULES, 2009
1. Short title and commencement 201
2. De nitions 201
3. Designated Of cer. 202
4. Nodal Of cer of organisation 202
5. Direction by Designated Of cer 202
6. Forwarding of request by organisation 202
7. Committee for examination of request 203
8. Examination of request 203
9. Blocking of information in cases of emergency 204
10. Process of order of court for blocking of information 205
11. Expeditious disposal of request 205
12. Action for non-compliance of direction by intermediary 205
13. Intermediary to designate one person to receive and handle directions 205
14. Meeting of Review Committee 205
15. Maintenance of records by Designated Of cer 205
16. Requests and complaints to be con dential 205 FORM 206
INFORMATION TECHNOLOGY (PROCEDURE AND SAFEGUARD FOR MONITORING AND COLLECTING TRAFFIC DATA OR INFORMATION) RULES, 2009
1. Short title and commencement 208
2. De nitions 208
3. Directions for monitoring 209
4. Authorised agency of Government for monitoring and collection of traf c data or information 210
5. Intermediary to ensure effective check in handling monitoring or collection of traf c data or information 211
6. Responsibility of intermediary 211
7. Review of directions of competent authority
8. Destruction of records
9. Prohibition of monitoring or collection of traf c data or information without authorisation
10. Prohibition of disclosure of traf c data or information by authorised agency 213
11. Maintenance of con dentiality 213
INFORMATION TECHNOLOGY
(REASONABLE SECURITY PRACTICES AND PROCEDURES AND SENSITIVE PERSONAL DATA OR INFORMATION) RULES, 2011
1. Short title and commencement
2. De nitions
3. Sensitive personal data or information
4. Body corporate to provide policy for privacy and disclosure of information
5. Collection of information
6. Disclosure of information
7. Transfer of information
8. Reasonable Security Practices and Procedures 218
INFORMATION TECHNOLOGY (GUIDELINES FOR CYBER CAFE) RULES, 2011
1. Short title and commencement 219
2. De nitions 219
3. Agency for registration of cyber cafe 220
4. Identi cation of user 220
5. Log Register 221
6. Management of Physical Layout and computer resource 222
7. Inspection of cyber cafe 222
INFORMATION
TECHNOLOGY (ELECTRONIC SERVICE DELIVERY) RULES, 2011
1. Short title and commencement
2. De nitions
3. System of electronic service delivery
4. Noti cation of electronic service delivery
5. Creation of repository of electronically signed electronic records by Government Authorities
6. Procedure for making changes in a repository of electronically signed electronic records
7. Responsibility of service provider and authorised agents for nancial management and accounting
8. Audit of the Information System and Accounts of service provider and authorised agents
9. Use of special stationery in electronic service delivery
INFORMATION TECHNOLOGY (NATIONAL CRITICAL INFORMATION INFRASTRUCTURE PROTECTION CENTRE AND MANNER OF PERFORMING FUNCTIONS AND DUTIES) RULES, 2013
1. Short title and commencement
4. Functions and duties of the National Critical Information Infrastructure Protection Centre.
5. Manner of performing
6. Advisory
7.
INFORMATION TECHNOLOGY (THE INDIAN COMPUTER EMERGENCY RESPONSE TEAM AND MANNER OF PERFORMING FUNCTIONS
AND DUTIES) RULES, 2013
1. Short title and commencement
2. De nitions
3. Location
4. Authority
5. Functioning on 24-hour basis
6. Advisory Committee
7. Constituency
8. Functions and responsibilities of CERT-In
9. Services
10. Stake holders
11. Policies and procedures
12. CERT-In operations
13. Disclosure of information
14. Seeking information, carrying out functions and for compliance in terms of sub-section (6) of section 70(B) of the Act
15. Directions for compliance
16. Report of non-compliance
17. Point of Contact
18. Dealing with non-compliance
19. Review Committee
20. Action for non-compliance of direction
DIGITAL SIGNATURE (END ENTITY) RULES, 2015
1. Short title and commencement
2. De nitions
3. Manner of authentication of information by means of digital signature
4. Creation of digital signature
5. Veri cation of digital signature
6. Veri cation of Digital Signature Certi cate
7. Digital signature standards
8. Manner of authentication of information by means of xml digital signature
9. Creation of xml digital signature
10. Veri cation of xml digital signature
11. The xml digital signature standards
12.
13. Digital Signature functions Standard
CYBER APPELLATE TRIBUNAL (POWERS AND FUNCTIONS OF THE CHAIRPERSON) RULES, 2016
1. Short title and commencement 252
2. De nitions 252
3. Powers and functions of the Chairperson of the Cyber Appellate Tribunal 252
INFORMATION TECHNOLOGY (PRESERVATION AND RETENTION OF INFORMATION BY INTERMEDIARIES PROVIDING DIGITAL LOCKER FACILITIES) RULES, 2016
1. Short title and commencement 254
2. De nitions
3. Appointment of Digital Locker Authority
4. Digital Locker System
5. Operation of Digital Locker System
6. Location of the Facilities
7. The manner in which Digital Locker system be used by Subscriber 257
8. The manner in which Digital Locker system be used by requester 257
9. The manner in which Digital Locker system be used by issuer 258
9A. Issuing certi cates or documents in Digital Locker System and accepting certi cates or documents shared from Digital Locker Account at par with Physical Documents 258
10. Role of Digital Locker service providers
11. Digital Locker service provider to ensure compliance of the Act, etc. 259
12. Appointment of grievance of cer by the Digital Locker service provider for dispute resolution
13. Suspension and revocation of Digital Locker account
14. Control of Digital Locker account credentials
15. Fees for opening Digital Locker account
16. Portability of Digital Locker account of subscriber
17. Audit 261
18. Auditor’s relationship with Digital Locker service provider
19. Con dential Information
20. Access to con dential information
21. Maintenance of reasonable security practices
INFORMATION TECHNOLOGY (INFORMATION SECURITY PRACTICES
AND PROCEDURES FOR PROTECTED SYSTEM)
1. Short title and commencement
2. De nitions
RULES, 2018
3. Information Security Practices and Procedures for “Protected System”
4. Roles and Responsibilities of “Protected System(s)” towards National Critical Information Infrastructure Protection Centre
INFORMATION TECHNOLOGY (INTERMEDIARY GUIDELINES AND DIGITAL MEDIA ETHICS CODE) RULES, 2021
1. Short title and commencement
2. De nitions
BY INTERMEDIARIES AND GRIEVANCE
3. Due diligence by an intermediary
3A. Appeal to Grievance Appellate Committee(s) 277
CONTENTS
4. Additional due diligence to be observed by signi cant social media intermediary and online gaming intermediary
4A. Veri cation of online real money game
4B. Applicability of certain obligations after an initial period
4C. Obligations in relation to online game other than online real money game
5. Additional due diligence to be observed by an intermediary in relation to news and current affairs content
6. Noti cation of other intermediary
7. Non-observance of Rules
PART III
CODE OF ETHICS AND PROCEDURE AND SAFEGUARDS IN RELATION TO DIGITAL MEDIA
8. Application of this Part
9. Observance and adherence to the Code
CHAPTER I
GRIEVANCE REDRESSAL MECHANISM
10. Furnishing and processing of grievance
CHAPTER II
SELF REGULATING MECHANISM - LEVEL I
11. Self-Regulating mechanism at Level I
CHAPTER III
SELF REGULATING MECHANISM – LEVEL II
12. Self-regulating body
CHAPTER IV
OVERSIGHT MECHANISM — LEVEL III
13. Oversight mechanism
14. Inter-Departmental Committee
15. Procedure for issuing of direction
16. Blocking of information in case of emergency
17. Review of directions issued
18. Furnishing of information
19. Disclosure of Information
: Code of Ethics
INFORMATION TECHNOLOGY (CERTIFYING AUTHORITY) REGULATIONS, 2001
1. Short title and commencement
2. De nitions
3. Terms and conditions of licence to issue Digital Signature Certicate
4. The standards followed by the Certifying Authority for carrying out its functions
5. Every Certifying Authority shall disclose.
6. Communication of compromise of Private Key
NATIONAL POLICY ON SOFTWARE PRODUCTS, 2019
National Policy on Software Products, 2019
AAROGYA SETU DATA ACCESS AND KNOWLEDGE SHARING PROTOCOL, 2020
Aarogya Setu Data Access and Knowledge Sharing Protocol, 2020 326
