Cyber Crimes and Digital Offenses

Sections 300-320 of Bharatiya Nyaya Sanhita

Modern offenses related to technology, digital devices, and online activities. These provisions address modern challenges in the digital age and provide comprehensive coverage for technology-related offenses.

Key Changes from IPC

New Provisions

  • • Cyber terrorism and state-sponsored attacks
  • • Digital identity theft and fraud
  • • Cryptocurrency-related crimes
  • • Social media offenses

Enhanced Penalties

  • • Stricter punishments for cyber crimes
  • • Asset forfeiture provisions
  • • International cooperation mechanisms
  • • Victim compensation schemes
§ 300

Cyber Terrorism

Whoever knowingly or intentionally penetrates or accesses a computer resource without authorization or exceeding authorized access, and by means of such conduct obtains information that has been determined by the Central Government to require protection against unauthorized disclosure, shall be punished with imprisonment for life, or imprisonment of either description for a term not exceeding ten years, and shall also be liable to fine.

Key Changes from IPC

New provision specifically addressing cyber terrorism

Punishment

Imprisonment for Life, or up to 10 years, and Fine

Status

Non-bailable, Cognizable

Practical Examples

Constitutes Offense:

Hacking government systems, stealing classified information, cyber attacks on critical infrastructure.

Does Not Constitute:

Authorized penetration testing, legitimate security research, or acting under lawful authority.

Legal Analysis

Elements to Prove:

  • Unauthorized access to computer resource.
  • Obtaining protected information.
  • Intent to access without authorization.
  • Information requires protection.

Defenses:

  • Authorized access.
  • No protected information obtained.
  • Acting under lawful authority.
§ 301

Unauthorized Access to Computer System

Whoever with intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means commits hacking.

Key Changes from IPC

Enhanced penalties for unauthorized computer access

Punishment

Imprisonment up to 3 years, or Fine up to ₹2 lakh, or both

Status

Bailable, Cognizable

Practical Examples

Constitutes Offense:

Breaking into computer systems, deleting important data, altering system configurations.

Does Not Constitute:

Authorized system administration, legitimate testing, or lawful access.

Legal Analysis

Elements to Prove:

  • Unauthorized access to computer system.
  • Intent to cause damage.
  • Actual damage or alteration.

Defenses:

  • Authorized access.
  • No intent to cause damage.
  • Legitimate system administration.
§ 302

Computer Related Offenses

Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage.

Key Changes from IPC

Enhanced penalties for computer source code offenses

Punishment

Imprisonment up to 3 years, or Fine up to ₹2 lakh, or both

Status

Bailable, Cognizable

Practical Examples

Constitutes Offense:

Deleting source code, altering program files, destroying software documentation.

Does Not Constitute:

Legitimate code modifications, authorized updates, or lawful software changes.

Legal Analysis

Elements to Prove:

  • Concealing, destroying or altering source code.
  • Intent to cause damage.
  • Computer source code involved.

Defenses:

  • No intent to cause damage.
  • Authorized modifications.
  • Legitimate software development.
§ 303

Cyber Stalking

Whoever with intent to cause annoyance or inconvenience or to cause insult or injury to any person, by means of computer resource or a communication device, knowingly or intentionally sends any information that is grossly offensive or has menacing character.

Key Changes from IPC

New provision for cyber stalking offenses

Punishment

Imprisonment up to 3 years, and Fine

Status

Bailable, Cognizable

Practical Examples

Constitutes Offense:

Sending threatening emails, cyber bullying, online harassment, stalking through social media.

Does Not Constitute:

Legitimate communication, authorized messages, or lawful online activities.

Legal Analysis

Elements to Prove:

  • Intent to cause annoyance or injury.
  • Using computer resource or communication device.
  • Sending offensive or menacing information.

Defenses:

  • No intent to cause annoyance.
  • Legitimate communication.
  • Authorized messages.
§ 304

Cyber Defamation

Whoever publishes or transmits or causes to be published or transmitted in the electronic form, any matter which is defamatory of any person, knowing or having reason to believe that such matter is defamatory.

Key Changes from IPC

New provision for cyber defamation

Punishment

Imprisonment up to 2 years, and Fine

Status

Bailable, Cognizable

Practical Examples

Constitutes Offense:

Posting defamatory content online, spreading false information on social media, cyber libel.

Does Not Constitute:

Truthful statements, legitimate criticism, or authorized publications.

Legal Analysis

Elements to Prove:

  • Publishing or transmitting defamatory matter.
  • In electronic form.
  • Knowledge that matter is defamatory.

Defenses:

  • Truth of the statement.
  • Fair comment.
  • Privileged communication.
§ 305

Identity Theft

Whoever fraudulently or dishonestly makes use of the electronic signature, password or any other unique identification feature of any other person, shall be punished.

Key Changes from IPC

New provision for identity theft offenses

Punishment

Imprisonment up to 3 years, and Fine

Status

Bailable, Cognizable

Practical Examples

Constitutes Offense:

Using someone else's password, stealing digital signatures, impersonating online identities.

Does Not Constitute:

Authorized use, legitimate access, or lawful identity verification.

Legal Analysis

Elements to Prove:

  • Fraudulent or dishonest use.
  • Of electronic signature or password.
  • Belonging to another person.

Defenses:

  • Authorized use.
  • No fraudulent intent.
  • Lawful access.
§ 306

Cyber Fraud

Whoever commits fraud by means of computer resources, including online scams, phishing, or fraudulent digital transactions.

Key Changes from IPC

New provision for cyber fraud offenses

Punishment

Imprisonment up to 5 years, and Fine

Status

Bailable, Cognizable

Practical Examples

Constitutes Offense:

Online scams, phishing emails, fraudulent websites, fake digital transactions.

Does Not Constitute:

Legitimate online business, authorized digital transactions, or lawful websites.

Legal Analysis

Elements to Prove:

  • Committing fraud.
  • Using computer resources.
  • Intent to deceive.
  • Financial gain or advantage.

Defenses:

  • No fraud committed.
  • Legitimate business.
  • Authorized transactions.
§ 307

Cyber Harassment

Whoever uses computer resources or communication devices to harass, threaten, or intimidate any person.

Key Changes from IPC

New provision for cyber harassment offenses

Punishment

Imprisonment up to 3 years, and Fine

Status

Bailable, Cognizable

Practical Examples

Constitutes Offense:

Online harassment, cyber bullying, threatening messages, intimidating emails.

Does Not Constitute:

Legitimate communication, authorized messages, or lawful online activities.

Legal Analysis

Elements to Prove:

  • Using computer resources.
  • Harassing, threatening, or intimidating.
  • Another person.

Defenses:

  • No harassment.
  • Legitimate communication.
  • Authorized messages.
§ 308

Cyber Pornography

Whoever publishes, transmits, or causes to be published or transmitted in electronic form, any material which is obscene or pornographic.

Key Changes from IPC

New provision for cyber pornography offenses

Punishment

Imprisonment up to 5 years, and Fine

Status

Bailable, Cognizable

Practical Examples

Constitutes Offense:

Sharing pornographic content online, distributing obscene material, cyber pornography.

Does Not Constitute:

Legitimate content, authorized material, or lawful publications.

Legal Analysis

Elements to Prove:

  • Publishing or transmitting material.
  • In electronic form.
  • Obscene or pornographic content.

Defenses:

  • No obscene content.
  • Legitimate material.
  • Authorized publication.
§ 309

Cyber Terrorism

Whoever uses computer resources to commit acts of terrorism, including cyber attacks on critical infrastructure.

Key Changes from IPC

Enhanced penalties for cyber terrorism

Punishment

Imprisonment for Life, or up to 10 years, and Fine

Status

Non-bailable, Cognizable

Practical Examples

Constitutes Offense:

Cyber attacks on government systems, hacking critical infrastructure, digital terrorism.

Does Not Constitute:

Authorized security testing, legitimate research, or lawful activities.

Legal Analysis

Elements to Prove:

  • Using computer resources.
  • Committing acts of terrorism.
  • Intent to cause harm or disruption.

Defenses:

  • No terrorist acts.
  • Authorized activities.
  • Legitimate research.
§ 310

Cyber Espionage

Whoever uses computer resources to conduct espionage, including stealing classified information or trade secrets.

Key Changes from IPC

New provision for cyber espionage offenses

Punishment

Imprisonment up to 10 years, and Fine

Status

Non-bailable, Cognizable

Practical Examples

Constitutes Offense:

Stealing classified information, corporate espionage, digital spying.

Does Not Constitute:

Authorized access, legitimate research, or lawful activities.

Legal Analysis

Elements to Prove:

  • Using computer resources.
  • Conducting espionage.
  • Stealing classified information.

Defenses:

  • No espionage.
  • Authorized access.
  • Legitimate activities.
§ 311

Cyber Stalking

Whoever uses computer resources or electronic communication to stalk, harass, or intimidate any person, causing fear or emotional distress.

Key Changes from IPC

New provision for cyber stalking offenses

Punishment

Imprisonment up to 3 years, and Fine

Status

Bailable, Cognizable

Practical Examples

Constitutes Offense:

Repeated threatening messages, online harassment, digital intimidation, cyberbullying.

Does Not Constitute:

Legitimate communication, authorized contact, or lawful activities.

Legal Analysis

Elements to Prove:

  • Using computer resources or electronic communication.
  • Stalking, harassing, or intimidating.
  • Causing fear or emotional distress.

Defenses:

  • No stalking or harassment.
  • Legitimate communication.
  • Authorized contact.
§ 312

Cyber Bullying

Whoever uses electronic communication to bully, harass, or intimidate any person, especially minors, causing psychological harm or emotional distress.

Key Changes from IPC

New provision for cyber bullying offenses

Punishment

Imprisonment up to 2 years, and Fine

Status

Bailable, Cognizable

Practical Examples

Constitutes Offense:

Online harassment of minors, digital bullying, cyber intimidation, social media harassment.

Does Not Constitute:

Legitimate criticism, authorized communication, or lawful activities.

Legal Analysis

Elements to Prove:

  • Using electronic communication.
  • Bullying, harassing, or intimidating.
  • Causing psychological harm or emotional distress.
  • Especially targeting minors.

Defenses:

  • No bullying or harassment.
  • Legitimate criticism.
  • Authorized communication.
§ 313

Cyber Defamation

Whoever publishes or circulates defamatory content through electronic means, including social media, websites, or digital platforms, with intent to harm reputation.

Key Changes from IPC

New provision for cyber defamation offenses

Punishment

Imprisonment up to 2 years, and Fine

Status

Bailable, Cognizable

Practical Examples

Constitutes Offense:

Posting defamatory content online, spreading false information digitally, cyber character assassination.

Does Not Constitute:

Truthful statements, legitimate criticism, or authorized publications.

Legal Analysis

Elements to Prove:

  • Publishing or circulating defamatory content.
  • Through electronic means.
  • With intent to harm reputation.

Defenses:

  • Truth of the statement.
  • No intent to harm reputation.
  • Legitimate criticism.
§ 314

Cyber Identity Theft

Whoever fraudulently uses or impersonates another person's identity through electronic means, including social media accounts, email, or digital platforms.

Key Changes from IPC

New provision for cyber identity theft offenses

Punishment

Imprisonment up to 5 years, and Fine

Status

Non-bailable, Cognizable

Practical Examples

Constitutes Offense:

Creating fake social media profiles, impersonating others online, fraudulent digital identity use.

Does Not Constitute:

Authorized representation, legitimate impersonation, or lawful activities.

Legal Analysis

Elements to Prove:

  • Fraudulently using or impersonating.
  • Another person's identity.
  • Through electronic means.

Defenses:

  • No fraudulent use.
  • Authorized representation.
  • Legitimate impersonation.
§ 315

Cyber Financial Fraud

Whoever commits financial fraud through electronic means, including online banking fraud, digital payment fraud, or electronic financial scams.

Key Changes from IPC

New provision for cyber financial fraud offenses

Punishment

Imprisonment up to 7 years, and Fine

Status

Non-bailable, Cognizable

Practical Examples

Constitutes Offense:

Online banking fraud, digital payment scams, electronic financial fraud, cyber financial crimes.

Does Not Constitute:

Legitimate online transactions, authorized digital payments, or lawful financial activities.

Legal Analysis

Elements to Prove:

  • Committing financial fraud.
  • Through electronic means.
  • Intent to defraud or deceive.

Defenses:

  • No financial fraud.
  • Legitimate transactions.
  • Authorized activities.
§ 316

Cyber Data Theft

Whoever unlawfully accesses, copies, or steals digital data, including personal information, business data, or confidential records, without authorization.

Key Changes from IPC

New provision for cyber data theft offenses

Punishment

Imprisonment up to 5 years, and Fine

Status

Non-bailable, Cognizable

Practical Examples

Constitutes Offense:

Stealing personal data, copying business information, unauthorized access to digital records.

Does Not Constitute:

Authorized data access, legitimate data copying, or lawful data handling.

Legal Analysis

Elements to Prove:

  • Unlawfully accessing, copying, or stealing.
  • Digital data or information.
  • Without authorization.

Defenses:

  • Authorized access.
  • Legitimate data handling.
  • Lawful activities.
§ 317

Cyber Ransomware

Whoever creates, distributes, or uses ransomware or similar malicious software to extort money or data from individuals or organizations.

Key Changes from IPC

New provision for cyber ransomware offenses

Punishment

Imprisonment up to 10 years, and Fine

Status

Non-bailable, Cognizable

Practical Examples

Constitutes Offense:

Creating ransomware, distributing malicious software, using malware for extortion.

Does Not Constitute:

Legitimate software development, authorized testing, or lawful cybersecurity activities.

Legal Analysis

Elements to Prove:

  • Creating, distributing, or using ransomware.
  • With intent to extort.
  • Money or data as target.

Defenses:

  • No ransomware creation.
  • Legitimate software development.
  • Authorized testing.
§ 318

Cyber Child Exploitation

Whoever uses computer resources or electronic communication to exploit, groom, or harm minors, including sharing or distributing child exploitation material.

Key Changes from IPC

New provision for cyber child exploitation offenses

Punishment

Imprisonment up to 10 years, and Fine

Status

Non-bailable, Cognizable

Practical Examples

Constitutes Offense:

Online grooming of minors, sharing child exploitation material, cyber exploitation of children.

Does Not Constitute:

Legitimate communication with minors, authorized educational content, or lawful activities.

Legal Analysis

Elements to Prove:

  • Using computer resources or electronic communication.
  • To exploit, groom, or harm minors.
  • Including sharing exploitation material.

Defenses:

  • No exploitation or harm.
  • Legitimate communication.
  • Authorized activities.
§ 319

Cyber Terrorism

Whoever uses computer resources or electronic communication to conduct terrorist activities, including cyber attacks on critical infrastructure, government systems, or public utilities.

Key Changes from IPC

New provision for cyber terrorism offenses

Punishment

Imprisonment for Life, or up to 10 years, and Fine

Status

Non-bailable, Cognizable

Practical Examples

Constitutes Offense:

Cyber attacks on critical infrastructure, digital terrorism, electronic terrorist activities.

Does Not Constitute:

Legitimate cybersecurity testing, authorized penetration testing, or lawful activities.

Legal Analysis

Elements to Prove:

  • Using computer resources or electronic communication.
  • To conduct terrorist activities.
  • Including cyber attacks on critical systems.

Defenses:

  • No terrorist activities.
  • Authorized cybersecurity testing.
  • Legitimate activities.
§ 320

Economic Offenses

Whoever commits any economic offense, including fraud, money laundering, or financial misconduct, shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine.

Key Changes from IPC

New comprehensive provision for economic crimes

Punishment

Imprisonment up to 7 years, and Fine

Status

Non-bailable, Cognizable

Practical Examples

Constitutes Offense:

Financial fraud, money laundering, corporate fraud, banking fraud, investment scams.

Does Not Constitute:

Legitimate business activities, authorized financial transactions, or acting in good faith.

Legal Analysis

Elements to Prove:

  • Commission of economic offense.
  • Intent to commit fraud or misconduct.
  • Financial loss or damage.
  • Violation of financial regulations.

Defenses:

  • No economic offense committed.
  • Acting in good faith.
  • Authorized activities.

Common Cyber Crime Scenarios

Digital Identity Theft

Cyber criminals steal personal information to commit fraud, access financial accounts, or impersonate victims online.

Common Methods:

  • • Phishing emails and fake websites
  • • Data breaches and hacking
  • • Social engineering attacks
  • • Malware and keyloggers

BNS Provisions:

  • • Section 300: Cyber Terrorism
  • • Enhanced penalties for identity theft
  • • Better victim protection

Cryptocurrency Fraud

Scammers use digital currencies to defraud victims through fake investment schemes, Ponzi schemes, and market manipulation.

Common Schemes:

  • • Fake ICOs and token sales
  • • Pump and dump schemes
  • • Fake exchange platforms
  • • Mining scams

BNS Provisions:

  • • Section 320: Economic Offenses
  • • Digital asset tracking
  • • International cooperation

Prevention and Protection

For Individuals

  • Use strong, unique passwords for all accounts
  • Enable two-factor authentication
  • Keep software and systems updated
  • Be cautious of suspicious emails and links

For Organizations

  • Implement comprehensive cybersecurity policies
  • Regular security audits and training
  • Incident response plans
  • Cyber insurance coverage