BNS Section 310 - Cyber Espionage

Whoever uses computer resources to conduct espionage, including stealing classified information or trade secrets.

Share:
Non-bailable, Cognizable

Official Text

Whoever uses computer resources to conduct espionage, including stealing classified information or trade secrets.

Legal Analysis

Elements to Prove:

  • Using computer resources.
  • Conducting espionage.
  • Stealing classified information.

Potential Defenses:

  • No espionage.
  • Authorized access.
  • Legitimate activities.

Practical Examples

What Constitutes the Offense:

Stealing classified information, corporate espionage, digital spying.

What Doesn't Constitute:

Authorized access, legitimate research, or lawful activities.

Punishment

Imprisonment up to 10 years, and Fine