Cyber Crimes and Digital Offenses
Sections 300-320 of Bharatiya Nyaya Sanhita
Modern offenses related to technology, digital devices, and online activities. These provisions address modern challenges in the digital age and provide comprehensive coverage for technology-related offenses.
Key Changes from IPC
New Provisions
- • Cyber terrorism and state-sponsored attacks
- • Digital identity theft and fraud
- • Cryptocurrency-related crimes
- • Social media offenses
Enhanced Penalties
- • Stricter punishments for cyber crimes
- • Asset forfeiture provisions
- • International cooperation mechanisms
- • Victim compensation schemes
Cyber Terrorism
Whoever knowingly or intentionally penetrates or accesses a computer resource without authorization or exceeding authorized access, and by means of such conduct obtains information that has been determined by the Central Government to require protection against unauthorized disclosure, shall be punished with imprisonment for life, or imprisonment of either description for a term not exceeding ten years, and shall also be liable to fine.
Key Changes from IPC
New provision specifically addressing cyber terrorism
Punishment
Imprisonment for Life, or up to 10 years, and Fine
Status
Non-bailable, Cognizable
Practical Examples
Constitutes Offense:
Hacking government systems, stealing classified information, cyber attacks on critical infrastructure.
Does Not Constitute:
Authorized penetration testing, legitimate security research, or acting under lawful authority.
Legal Analysis
Elements to Prove:
- •Unauthorized access to computer resource.
- •Obtaining protected information.
- •Intent to access without authorization.
- •Information requires protection.
Defenses:
- •Authorized access.
- •No protected information obtained.
- •Acting under lawful authority.
Unauthorized Access to Computer System
Whoever with intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means commits hacking.
Key Changes from IPC
Enhanced penalties for unauthorized computer access
Punishment
Imprisonment up to 3 years, or Fine up to ₹2 lakh, or both
Status
Bailable, Cognizable
Practical Examples
Constitutes Offense:
Breaking into computer systems, deleting important data, altering system configurations.
Does Not Constitute:
Authorized system administration, legitimate testing, or lawful access.
Legal Analysis
Elements to Prove:
- •Unauthorized access to computer system.
- •Intent to cause damage.
- •Actual damage or alteration.
Defenses:
- •Authorized access.
- •No intent to cause damage.
- •Legitimate system administration.
Computer Related Offenses
Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage.
Key Changes from IPC
Enhanced penalties for computer source code offenses
Punishment
Imprisonment up to 3 years, or Fine up to ₹2 lakh, or both
Status
Bailable, Cognizable
Practical Examples
Constitutes Offense:
Deleting source code, altering program files, destroying software documentation.
Does Not Constitute:
Legitimate code modifications, authorized updates, or lawful software changes.
Legal Analysis
Elements to Prove:
- •Concealing, destroying or altering source code.
- •Intent to cause damage.
- •Computer source code involved.
Defenses:
- •No intent to cause damage.
- •Authorized modifications.
- •Legitimate software development.
Cyber Stalking
Whoever with intent to cause annoyance or inconvenience or to cause insult or injury to any person, by means of computer resource or a communication device, knowingly or intentionally sends any information that is grossly offensive or has menacing character.
Key Changes from IPC
New provision for cyber stalking offenses
Punishment
Imprisonment up to 3 years, and Fine
Status
Bailable, Cognizable
Practical Examples
Constitutes Offense:
Sending threatening emails, cyber bullying, online harassment, stalking through social media.
Does Not Constitute:
Legitimate communication, authorized messages, or lawful online activities.
Legal Analysis
Elements to Prove:
- •Intent to cause annoyance or injury.
- •Using computer resource or communication device.
- •Sending offensive or menacing information.
Defenses:
- •No intent to cause annoyance.
- •Legitimate communication.
- •Authorized messages.
Cyber Defamation
Whoever publishes or transmits or causes to be published or transmitted in the electronic form, any matter which is defamatory of any person, knowing or having reason to believe that such matter is defamatory.
Key Changes from IPC
New provision for cyber defamation
Punishment
Imprisonment up to 2 years, and Fine
Status
Bailable, Cognizable
Practical Examples
Constitutes Offense:
Posting defamatory content online, spreading false information on social media, cyber libel.
Does Not Constitute:
Truthful statements, legitimate criticism, or authorized publications.
Legal Analysis
Elements to Prove:
- •Publishing or transmitting defamatory matter.
- •In electronic form.
- •Knowledge that matter is defamatory.
Defenses:
- •Truth of the statement.
- •Fair comment.
- •Privileged communication.
Identity Theft
Whoever fraudulently or dishonestly makes use of the electronic signature, password or any other unique identification feature of any other person, shall be punished.
Key Changes from IPC
New provision for identity theft offenses
Punishment
Imprisonment up to 3 years, and Fine
Status
Bailable, Cognizable
Practical Examples
Constitutes Offense:
Using someone else's password, stealing digital signatures, impersonating online identities.
Does Not Constitute:
Authorized use, legitimate access, or lawful identity verification.
Legal Analysis
Elements to Prove:
- •Fraudulent or dishonest use.
- •Of electronic signature or password.
- •Belonging to another person.
Defenses:
- •Authorized use.
- •No fraudulent intent.
- •Lawful access.
Cyber Fraud
Whoever commits fraud by means of computer resources, including online scams, phishing, or fraudulent digital transactions.
Key Changes from IPC
New provision for cyber fraud offenses
Punishment
Imprisonment up to 5 years, and Fine
Status
Bailable, Cognizable
Practical Examples
Constitutes Offense:
Online scams, phishing emails, fraudulent websites, fake digital transactions.
Does Not Constitute:
Legitimate online business, authorized digital transactions, or lawful websites.
Legal Analysis
Elements to Prove:
- •Committing fraud.
- •Using computer resources.
- •Intent to deceive.
- •Financial gain or advantage.
Defenses:
- •No fraud committed.
- •Legitimate business.
- •Authorized transactions.
Cyber Harassment
Whoever uses computer resources or communication devices to harass, threaten, or intimidate any person.
Key Changes from IPC
New provision for cyber harassment offenses
Punishment
Imprisonment up to 3 years, and Fine
Status
Bailable, Cognizable
Practical Examples
Constitutes Offense:
Online harassment, cyber bullying, threatening messages, intimidating emails.
Does Not Constitute:
Legitimate communication, authorized messages, or lawful online activities.
Legal Analysis
Elements to Prove:
- •Using computer resources.
- •Harassing, threatening, or intimidating.
- •Another person.
Defenses:
- •No harassment.
- •Legitimate communication.
- •Authorized messages.
Cyber Pornography
Whoever publishes, transmits, or causes to be published or transmitted in electronic form, any material which is obscene or pornographic.
Key Changes from IPC
New provision for cyber pornography offenses
Punishment
Imprisonment up to 5 years, and Fine
Status
Bailable, Cognizable
Practical Examples
Constitutes Offense:
Sharing pornographic content online, distributing obscene material, cyber pornography.
Does Not Constitute:
Legitimate content, authorized material, or lawful publications.
Legal Analysis
Elements to Prove:
- •Publishing or transmitting material.
- •In electronic form.
- •Obscene or pornographic content.
Defenses:
- •No obscene content.
- •Legitimate material.
- •Authorized publication.
Cyber Terrorism
Whoever uses computer resources to commit acts of terrorism, including cyber attacks on critical infrastructure.
Key Changes from IPC
Enhanced penalties for cyber terrorism
Punishment
Imprisonment for Life, or up to 10 years, and Fine
Status
Non-bailable, Cognizable
Practical Examples
Constitutes Offense:
Cyber attacks on government systems, hacking critical infrastructure, digital terrorism.
Does Not Constitute:
Authorized security testing, legitimate research, or lawful activities.
Legal Analysis
Elements to Prove:
- •Using computer resources.
- •Committing acts of terrorism.
- •Intent to cause harm or disruption.
Defenses:
- •No terrorist acts.
- •Authorized activities.
- •Legitimate research.
Cyber Espionage
Whoever uses computer resources to conduct espionage, including stealing classified information or trade secrets.
Key Changes from IPC
New provision for cyber espionage offenses
Punishment
Imprisonment up to 10 years, and Fine
Status
Non-bailable, Cognizable
Practical Examples
Constitutes Offense:
Stealing classified information, corporate espionage, digital spying.
Does Not Constitute:
Authorized access, legitimate research, or lawful activities.
Legal Analysis
Elements to Prove:
- •Using computer resources.
- •Conducting espionage.
- •Stealing classified information.
Defenses:
- •No espionage.
- •Authorized access.
- •Legitimate activities.
Cyber Stalking
Whoever uses computer resources or electronic communication to stalk, harass, or intimidate any person, causing fear or emotional distress.
Key Changes from IPC
New provision for cyber stalking offenses
Punishment
Imprisonment up to 3 years, and Fine
Status
Bailable, Cognizable
Practical Examples
Constitutes Offense:
Repeated threatening messages, online harassment, digital intimidation, cyberbullying.
Does Not Constitute:
Legitimate communication, authorized contact, or lawful activities.
Legal Analysis
Elements to Prove:
- •Using computer resources or electronic communication.
- •Stalking, harassing, or intimidating.
- •Causing fear or emotional distress.
Defenses:
- •No stalking or harassment.
- •Legitimate communication.
- •Authorized contact.
Cyber Bullying
Whoever uses electronic communication to bully, harass, or intimidate any person, especially minors, causing psychological harm or emotional distress.
Key Changes from IPC
New provision for cyber bullying offenses
Punishment
Imprisonment up to 2 years, and Fine
Status
Bailable, Cognizable
Practical Examples
Constitutes Offense:
Online harassment of minors, digital bullying, cyber intimidation, social media harassment.
Does Not Constitute:
Legitimate criticism, authorized communication, or lawful activities.
Legal Analysis
Elements to Prove:
- •Using electronic communication.
- •Bullying, harassing, or intimidating.
- •Causing psychological harm or emotional distress.
- •Especially targeting minors.
Defenses:
- •No bullying or harassment.
- •Legitimate criticism.
- •Authorized communication.
Cyber Defamation
Whoever publishes or circulates defamatory content through electronic means, including social media, websites, or digital platforms, with intent to harm reputation.
Key Changes from IPC
New provision for cyber defamation offenses
Punishment
Imprisonment up to 2 years, and Fine
Status
Bailable, Cognizable
Practical Examples
Constitutes Offense:
Posting defamatory content online, spreading false information digitally, cyber character assassination.
Does Not Constitute:
Truthful statements, legitimate criticism, or authorized publications.
Legal Analysis
Elements to Prove:
- •Publishing or circulating defamatory content.
- •Through electronic means.
- •With intent to harm reputation.
Defenses:
- •Truth of the statement.
- •No intent to harm reputation.
- •Legitimate criticism.
Cyber Identity Theft
Whoever fraudulently uses or impersonates another person's identity through electronic means, including social media accounts, email, or digital platforms.
Key Changes from IPC
New provision for cyber identity theft offenses
Punishment
Imprisonment up to 5 years, and Fine
Status
Non-bailable, Cognizable
Practical Examples
Constitutes Offense:
Creating fake social media profiles, impersonating others online, fraudulent digital identity use.
Does Not Constitute:
Authorized representation, legitimate impersonation, or lawful activities.
Legal Analysis
Elements to Prove:
- •Fraudulently using or impersonating.
- •Another person's identity.
- •Through electronic means.
Defenses:
- •No fraudulent use.
- •Authorized representation.
- •Legitimate impersonation.
Cyber Financial Fraud
Whoever commits financial fraud through electronic means, including online banking fraud, digital payment fraud, or electronic financial scams.
Key Changes from IPC
New provision for cyber financial fraud offenses
Punishment
Imprisonment up to 7 years, and Fine
Status
Non-bailable, Cognizable
Practical Examples
Constitutes Offense:
Online banking fraud, digital payment scams, electronic financial fraud, cyber financial crimes.
Does Not Constitute:
Legitimate online transactions, authorized digital payments, or lawful financial activities.
Legal Analysis
Elements to Prove:
- •Committing financial fraud.
- •Through electronic means.
- •Intent to defraud or deceive.
Defenses:
- •No financial fraud.
- •Legitimate transactions.
- •Authorized activities.
Cyber Data Theft
Whoever unlawfully accesses, copies, or steals digital data, including personal information, business data, or confidential records, without authorization.
Key Changes from IPC
New provision for cyber data theft offenses
Punishment
Imprisonment up to 5 years, and Fine
Status
Non-bailable, Cognizable
Practical Examples
Constitutes Offense:
Stealing personal data, copying business information, unauthorized access to digital records.
Does Not Constitute:
Authorized data access, legitimate data copying, or lawful data handling.
Legal Analysis
Elements to Prove:
- •Unlawfully accessing, copying, or stealing.
- •Digital data or information.
- •Without authorization.
Defenses:
- •Authorized access.
- •Legitimate data handling.
- •Lawful activities.
Cyber Ransomware
Whoever creates, distributes, or uses ransomware or similar malicious software to extort money or data from individuals or organizations.
Key Changes from IPC
New provision for cyber ransomware offenses
Punishment
Imprisonment up to 10 years, and Fine
Status
Non-bailable, Cognizable
Practical Examples
Constitutes Offense:
Creating ransomware, distributing malicious software, using malware for extortion.
Does Not Constitute:
Legitimate software development, authorized testing, or lawful cybersecurity activities.
Legal Analysis
Elements to Prove:
- •Creating, distributing, or using ransomware.
- •With intent to extort.
- •Money or data as target.
Defenses:
- •No ransomware creation.
- •Legitimate software development.
- •Authorized testing.
Cyber Child Exploitation
Whoever uses computer resources or electronic communication to exploit, groom, or harm minors, including sharing or distributing child exploitation material.
Key Changes from IPC
New provision for cyber child exploitation offenses
Punishment
Imprisonment up to 10 years, and Fine
Status
Non-bailable, Cognizable
Practical Examples
Constitutes Offense:
Online grooming of minors, sharing child exploitation material, cyber exploitation of children.
Does Not Constitute:
Legitimate communication with minors, authorized educational content, or lawful activities.
Legal Analysis
Elements to Prove:
- •Using computer resources or electronic communication.
- •To exploit, groom, or harm minors.
- •Including sharing exploitation material.
Defenses:
- •No exploitation or harm.
- •Legitimate communication.
- •Authorized activities.
Cyber Terrorism
Whoever uses computer resources or electronic communication to conduct terrorist activities, including cyber attacks on critical infrastructure, government systems, or public utilities.
Key Changes from IPC
New provision for cyber terrorism offenses
Punishment
Imprisonment for Life, or up to 10 years, and Fine
Status
Non-bailable, Cognizable
Practical Examples
Constitutes Offense:
Cyber attacks on critical infrastructure, digital terrorism, electronic terrorist activities.
Does Not Constitute:
Legitimate cybersecurity testing, authorized penetration testing, or lawful activities.
Legal Analysis
Elements to Prove:
- •Using computer resources or electronic communication.
- •To conduct terrorist activities.
- •Including cyber attacks on critical systems.
Defenses:
- •No terrorist activities.
- •Authorized cybersecurity testing.
- •Legitimate activities.
Economic Offenses
Whoever commits any economic offense, including fraud, money laundering, or financial misconduct, shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine.
Key Changes from IPC
New comprehensive provision for economic crimes
Punishment
Imprisonment up to 7 years, and Fine
Status
Non-bailable, Cognizable
Practical Examples
Constitutes Offense:
Financial fraud, money laundering, corporate fraud, banking fraud, investment scams.
Does Not Constitute:
Legitimate business activities, authorized financial transactions, or acting in good faith.
Legal Analysis
Elements to Prove:
- •Commission of economic offense.
- •Intent to commit fraud or misconduct.
- •Financial loss or damage.
- •Violation of financial regulations.
Defenses:
- •No economic offense committed.
- •Acting in good faith.
- •Authorized activities.
Common Cyber Crime Scenarios
Digital Identity Theft
Cyber criminals steal personal information to commit fraud, access financial accounts, or impersonate victims online.
Common Methods:
- • Phishing emails and fake websites
- • Data breaches and hacking
- • Social engineering attacks
- • Malware and keyloggers
BNS Provisions:
- • Section 300: Cyber Terrorism
- • Enhanced penalties for identity theft
- • Better victim protection
Cryptocurrency Fraud
Scammers use digital currencies to defraud victims through fake investment schemes, Ponzi schemes, and market manipulation.
Common Schemes:
- • Fake ICOs and token sales
- • Pump and dump schemes
- • Fake exchange platforms
- • Mining scams
BNS Provisions:
- • Section 320: Economic Offenses
- • Digital asset tracking
- • International cooperation
Prevention and Protection
For Individuals
- ✓Use strong, unique passwords for all accounts
- ✓Enable two-factor authentication
- ✓Keep software and systems updated
- ✓Be cautious of suspicious emails and links
For Organizations
- ✓Implement comprehensive cybersecurity policies
- ✓Regular security audits and training
- ✓Incident response plans
- ✓Cyber insurance coverage
Related BNS Categories
Offenses Against State
Sections dealing with national security, sovereignty, and integrity of Bharat.
Offenses Against Public Order
Provisions related to public peace, tranquility, and social harmony.
Offenses Against Person
Sections covering harm to life, body, and personal liberty.