Home Acts & Rules Indian Laws Indian Laws - Acts The Aadhaar (Targeted Delivery of Financial And Other Subsidies, Benefits And Services) Act, 2016 Chapters List Chapter VII OFFENCES AND PENALTIES This
Forgot password New User/ Regiser ⇒ Register to get Live Demo
Section 38 - Penalty for unauthorised access to the Central Identities Data Repository - The Aadhaar (Targeted Delivery of Financial And Other Subsidies, Benefits And Services) Act, 2016Extract Penalty for unauthorised access to the Central Identities Data Repository. 38. Whoever, not being authorised by the Authority, intentionally,- (a) accesses or secures access to the Central Identities Data Repository; (b) downloads, copies or extracts any data from the Central Identities Data Repository or stored in any removable storage medium; (c) introduces or causes to be introduced any virus or other computer contaminant in the Central Identities Data Repository; (d) damages or causes to be damaged the data in the Central Identities Data Repository; (e) disrupts or causes disruption of the access to the Central Identities Data Repository; (f) denies or causes a denial of access to any person who is authorised to access the Central Identities Data Repository; (g) reveals any information in contravention of sub-section (5) of section 28, or shares, uses or displays information in contravention of section 29 or assists any person in any of the aforementioned acts; (h) destroys, deletes or alters any information stored in any removable storage media or in the Central Identities Data Repository or diminishes its value or utility or affects it injuriously by any means; or (i) steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used by the Authority with an intention to cause damage, shall be punishable with imprisonment for a term which may extend to 1 [ ten years ] and shall also be liable to a fine which shall not be less than ten lakh rupees. Explanation.-For the purposes of this section, the expressions computer contaminant , computer virus and damage shall have the meanings respectively assigned to them in the Explanation to section 43 of the Information Technology Act, 2000 (21 of 2000), and the expression computer source code shall have the meaning assigned to it in the Explanation to section 65 of the said Act. ****** Notes:- 1. Substituted vide AADHAAR AND OTHER LAWS (AMENDMENT) ACT, 2019 before it was read as three years
|