{"id":48545,"date":"2026-02-27T06:35:29","date_gmt":"2026-02-27T06:35:29","guid":{"rendered":"https:\/\/mcqsadda.com\/?p=48545"},"modified":"2026-02-27T06:35:36","modified_gmt":"2026-02-27T06:35:36","slug":"it-act-2000-all-124-sections-one-liner-summary","status":"publish","type":"post","link":"https:\/\/mcqsadda.com\/index.php\/2026\/02\/27\/it-act-2000-all-124-sections-one-liner-summary\/","title":{"rendered":"IT ACT 2000 \u2013 ALL 124 SECTIONS (One-Liner Summary)"},"content":{"rendered":"\n<p>Under the <strong>Information Technology Act, 2000 (Amended 2008)<\/strong> there are <strong>124 Sections (Section 1 to Section 124)<\/strong>.<\/p>\n\n\n\n<p>\u26a0 Important for Exams:<br>Not all 124 sections contain punishments.<br>Many sections are about <strong>definitions, authorities, procedures, powers, and administration<\/strong>.<br>Punishments mainly appear in <strong>Sections 43, 65\u201374, 84B, 84C, etc.<\/strong><\/p>\n\n\n\n<p>Below is a <strong>Complete One-Liner Summary of All 124 Sections (Short Exam-Oriented Version)<\/strong>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83d\udcd8 IT ACT 2000 \u2013 ALL 124 SECTIONS (One-Liner Summary)<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 CHAPTER I \u2013 Preliminary<\/h2>\n\n\n\n<p><strong>Section 1<\/strong> \u2013 Short title, extent &amp; commencement.<br><strong>Section 2<\/strong> \u2013 Definitions (computer, data, intermediary, etc.).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 CHAPTER II \u2013 Digital \/ Electronic Signature<\/h2>\n\n\n\n<p><strong>Section 3<\/strong> \u2013 Authentication of electronic records.<br><strong>Section 3A<\/strong> \u2013 Electronic signature recognition.<br><strong>Section 4<\/strong> \u2013 Legal recognition of electronic records.<br><strong>Section 5<\/strong> \u2013 Legal recognition of digital signatures.<br><strong>Section 6<\/strong> \u2013 Use of electronic records in Government.<br><strong>Section 6A<\/strong> \u2013 Delivery of services electronically.<br><strong>Section 7<\/strong> \u2013 Retention of electronic records.<br><strong>Section 7A<\/strong> \u2013 Audit of electronic records.<br><strong>Section 8<\/strong> \u2013 Publication of rules electronically.<br><strong>Section 9<\/strong> \u2013 Exceptions (not applicable to certain documents).<br><strong>Section 10<\/strong> \u2013 Power to make rules for digital signature.<br><strong>Section 10A<\/strong> \u2013 Validity of e-contracts.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 CHAPTER III \u2013 Certifying Authorities<\/h2>\n\n\n\n<p><strong>Section 11\u201334<\/strong> \u2013 Licensing, powers &amp; duties of Certifying Authorities.<br>(No criminal punishment; administrative provisions.)<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 CHAPTER IX \u2013 Penalties &amp; Adjudication (VERY IMPORTANT)<\/h2>\n\n\n\n<p><strong>Section 43<\/strong> \u2013 Damage to computer system \u2192 Compensation up to \u20b91 crore.<br><strong>Section 43A<\/strong> \u2013 Failure to protect data \u2192 Compensation.<br><strong>Section 44<\/strong> \u2013 Failure to furnish information \u2192 Fine up to \u20b91.5 lakh.<br><strong>Section 45<\/strong> \u2013 Residuary penalty \u2192 Up to \u20b925,000.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 CHAPTER XI \u2013 OFFENCES (MOST IMPORTANT FOR EXAMS)<\/h2>\n\n\n\n<p><strong>Section 65<\/strong> \u2013 Tampering with source code \u2192 3 years \/ \u20b92 lakh \/ both.<br><strong>Section 66<\/strong> \u2013 Computer-related offences \u2192 3 years \/ \u20b95 lakh \/ both.<br><strong>Section 66A<\/strong> \u2013 (Struck down by Supreme Court in 2015).<br><strong>Section 66B<\/strong> \u2013 Receiving stolen computer resource \u2192 3 years \/ \u20b91 lakh.<br><strong>Section 66C<\/strong> \u2013 Identity theft \u2192 3 years \/ \u20b91 lakh.<br><strong>Section 66D<\/strong> \u2013 Cheating by personation \u2192 3 years \/ \u20b91 lakh.<br><strong>Section 66E<\/strong> \u2013 Violation of privacy \u2192 3 years \/ \u20b92 lakh.<br><strong>Section 66F<\/strong> \u2013 Cyber terrorism \u2192 Life imprisonment.<\/p>\n\n\n\n<p><strong>Section 67<\/strong> \u2013 Publishing obscene content \u2192 3 years + \u20b95 lakh (1st).<br><strong>Section 67A<\/strong> \u2013 Sexually explicit content \u2192 5 years + \u20b910 lakh.<br><strong>Section 67B<\/strong> \u2013 Child pornography \u2192 5 years + \u20b910 lakh.<br><strong>Section 67C<\/strong> \u2013 Intermediary must preserve data.<\/p>\n\n\n\n<p><strong>Section 68<\/strong> \u2013 Non-compliance with Controller \u2192 2 years \/ \u20b91 lakh.<br><strong>Section 69<\/strong> \u2013 Interception power \u2192 Non-compliance 7 years.<br><strong>Section 69A<\/strong> \u2013 Blocking public access to information.<br><strong>Section 69B<\/strong> \u2013 Monitor traffic data.<\/p>\n\n\n\n<p><strong>Section 70<\/strong> \u2013 Protected system \u2192 10 years imprisonment.<br><strong>Section 70A<\/strong> \u2013 Critical Information Infrastructure authority.<br><strong>Section 70B<\/strong> \u2013 CERT-In powers.<\/p>\n\n\n\n<p><strong>Section 71<\/strong> \u2013 Misrepresentation \u2192 2 years \/ \u20b91 lakh.<br><strong>Section 72<\/strong> \u2013 Breach of confidentiality \u2192 2 years \/ \u20b91 lakh.<br><strong>Section 72A<\/strong> \u2013 Disclosure of information \u2192 3 years \/ \u20b95 lakh.<br><strong>Section 73<\/strong> \u2013 False digital signature certificate \u2192 2 years \/ \u20b91 lakh.<br><strong>Section 74<\/strong> \u2013 Publication for fraudulent purpose \u2192 2 years \/ \u20b91 lakh.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 CHAPTER XII \u2013 Intermediary Liability<\/h2>\n\n\n\n<p><strong>Section 79<\/strong> \u2013 Safe harbour to intermediaries (if due diligence).<br><strong>Section 79A<\/strong> \u2013 Examiner of electronic evidence.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 CHAPTER XIII \u2013 Miscellaneous<\/h2>\n\n\n\n<p><strong>Section 80<\/strong> \u2013 Power to enter, search &amp; arrest.<br><strong>Section 81<\/strong> \u2013 Act overrides other laws.<br><strong>Section 82\u201390<\/strong> \u2013 Powers, rule-making &amp; procedures.<br><strong>Section 84A<\/strong> \u2013 Encryption rules.<br><strong>Section 84B<\/strong> \u2013 Abetment \u2192 Punished as offence.<br><strong>Section 84C<\/strong> \u2013 Attempt \u2192 Punishable.<br><strong>Section 85<\/strong> \u2013 Offences by companies.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83d\udd39<\/strong><strong> Section 86<\/strong><\/p>\n\n\n\n<p>Removal of difficulties in giving effect to provisions of the Act.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83d\udd39 Section 87<\/strong><\/p>\n\n\n\n<p>Power of Central Government to make rules under the Act.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83d\udd39 Section 88<\/strong><\/p>\n\n\n\n<p>Power of State Government to make rules.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83d\udd39 Section 89<\/strong><\/p>\n\n\n\n<p>Rules made by Central Government to be laid before Parliament.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83d\udd39 Section 90<\/strong><\/p>\n\n\n\n<p>Power of Controller to make regulations (regarding Certifying Authorities).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83d\udd39 Section 91<\/strong><\/p>\n\n\n\n<p>Power of Central Government to amend Schedule.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83d\udd39 Section 92<\/strong><\/p>\n\n\n\n<p>Power to make rules regarding electronic signature.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83d\udd39 Section 93<\/strong><\/p>\n\n\n\n<p>Amendment of Indian Penal Code (IPC) to include cyber offences.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83d\udd39 Section 94<\/strong><\/p>\n\n\n\n<p>Amendment of Indian Evidence Act (Electronic records admissibility).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83d\udd39 Section 95<\/strong><\/p>\n\n\n\n<p>Amendment of Bankers\u2019 Books Evidence Act.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83d\udd39 Section 96<\/strong><\/p>\n\n\n\n<p>Amendment of RBI Act (electronic fund transfer recognition).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83d\udd39 Section 97<\/strong><\/p>\n\n\n\n<p>Repeal and saving clause (earlier ordinance repealed).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83d\udd39 Sections 98\u2013124<\/strong><\/p>\n\n\n\n<p>(These sections mainly deal with amendments to various existing laws to align them with electronic records and digital transactions.)<\/p>\n\n\n\n<p>They include amendments to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Indian Penal Code<\/li>\n\n\n\n<li>Code of Criminal Procedure<\/li>\n\n\n\n<li>Indian Evidence Act<\/li>\n\n\n\n<li>Bankers\u2019 Books Evidence Act<\/li>\n\n\n\n<li>RBI Act<\/li>\n<\/ul>\n\n\n\n<p>These sections ensure that:<br>\u2714 Electronic records are legally valid<br>\u2714 Digital signatures are recognized<br>\u2714 Cyber offences are punishable under IPC<br>\u2714 Electronic evidence is admissible in court<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\ud83c\udfaf EXAM POINTS (VERY IMPORTANT)<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading\">\ud83c\udfaf MOST EXAM-IMPORTANT SECTIONS<\/h1>\n\n\n\n<p>\u2714 43 \u2013 Damage to computer<br>\u2714 65 \u2013 Source code tampering<br>\u2714 66C \u2013 Identity theft<br>\u2714 66D \u2013 Online cheating<br>\u2714 66F \u2013 Cyber terrorism<br>\u2714 67 \u2013 Obscene content<br>\u2714 69 \u2013 Interception<br>\u2714 70 \u2013 Protected system<br>\u2714 72 \u2013 Breach of confidentiality<br>\u2714 79 \u2013 Intermediary liability<br>\u2714 Sections 86\u201392 \u2192 Rule-making powers<br>\u2714 Sections 93\u201396 \u2192 Amendments to IPC &amp; Evidence Act<br>\u2714 Section 97 \u2192 Repeal &amp; saving clause<br>\u2714 98\u2013124 \u2192 Consequential amendments<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Under the Information Technology Act, 2000 (Amended 2008) there are 124 Sections (Section 1 to Section 124). \u26a0 Important for Exams:Not all 124 sections contain punishments.Many sections are about definitions, authorities, procedures, powers, and administration.Punishments mainly appear in Sections 43, 65\u201374, 84B, 84C, etc. Below is a Complete One-Liner Summary of All 124 Sections (Short<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[20483,4029,5649,5623],"class_list":{"0":"post-48545","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-computer","7":"tag-it-act-2000-all-124-sections-one-liner-summary","8":"tag-mcqs-adda","9":"tag-mcqs-for-pc-psi-sda-fda-pdo-vao-banking-kas-ias-ssc-gd-ssc-chsl-ssc-cgl-for-all-compitative-exams","10":"tag-mcqs-for-sda-fda-pdo-vao-banking-kas-ias-ssc-gd-ssc-chsl-ssc-cgl-for-all-compitative-exams"},"_links":{"self":[{"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/posts\/48545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/comments?post=48545"}],"version-history":[{"count":1,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/posts\/48545\/revisions"}],"predecessor-version":[{"id":48546,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/posts\/48545\/revisions\/48546"}],"wp:attachment":[{"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/media?parent=48545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/categories?post=48545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mcqsadda.com\/index.php\/wp-json\/wp\/v2\/tags?post=48545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}