Main Search Premium Members Advanced Search Disclaimer
Citedby 6 docs - [View All]
The Palakkad District ... vs The Joint Registrar Of ... on 27 February, 2013
Rustomjee Kerawalla Foundation vs Avisha Gopalkrishnan Kulkarni on 29 August, 2012
Ace Matrix Solutions Ltd.,, Delhi vs Assessee on 13 February, 2012
Ramkhilavan Sharma vs Smt. Ramkunwar Maheshwari on 12 February, 2014
Kagzi Jahanara Mohammadasif & vs State Of Gujarat on 17 June, 2015

[Complete Act]
User Queries
Try out the Virtual Legal Assistant to take your notes as you use the website, build your case briefs and professionally manage your legal research. Also try out our Query Alert Service and enjoy an ad-free experience. Become a Premium Member for free for three months and pay only if you like it.
Central Government Act
Section 69 in The Information Technology Act, 2000
82 [ 69 Power to issue directions for interception or monitoring or decryption of any information through any computer resource. -
(1) Where the Central Government or a State Government or any of its officers specially authorised by the Central Government or the State Government, as the case may be, in this behalf may, if satisfied that it is necessary or expedient to do in the interest of the sovereignty or integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above or for investigation of any offence, it may, subject to the provisions of sub-section (2), for reasons to be recorded in writing, by order, direct any agency of the appropriate Government to intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any information generated, transmitted, received or stored in any computer resource.
(2) The procedure and safeguards subject to which such interception or monitoring or decryption may be carried out, shall be such as may be prescribed.
(3) The subscriber or intermediary or any person in-charge of the computer resource shall, when called upon by any agency referred to in sub-section (1), extend all facilities and technical assistance to-
(a) provide access to or secure access to the computer resource generating, transmitting, receiving or storing such information; or
(b) intercept, monitor, or decrypt the information, as the case may be; or
(c) provide information stored in computer resource.
(4) The subscriber or intermediary or any person who fails to assist the agency referred to in sub-section (3) shall be punished with imprisonment for a term which may extend to seven years and shall also be liable to fine.]