Section 65 of the IT Act, 2000 and its Link with the Bharatiya Nyaya Sanhita (BNS), 2023
Introduction
Section 65 of the Information Technology Act, 2000 criminalises tampering with computer source documents. It protects the integrity of software systems and electronic infrastructure. In the modern legal framework, such tampering may also attract liability under the Bharatiya Nyaya Sanhita, 2023 (BNS) where the act results in wrongful loss, destruction of property, or public harm.
Thus, Section 65 operates as a special cyber offence, while BNS provides general criminal liability.
Section 65 – Tampering with Computer Source Documents
Provision
Whoever knowingly or intentionally conceals, destroys, or alters computer source code required by law to be maintained commits an offence.
Essential Ingredients
1. Existence of computer source code
2. Code required to be preserved by law
3. Intentional or knowing tampering
4. Unauthorised act
📌 Mens rea is essential.
Punishment
Imprisonment up to 3 years
Fine up to ₹2 lakh
Or both
Purpose of Section 65
Protect digital infrastructure
Prevent cyber sabotage
Preserve evidentiary reliability
Safeguard public and corporate systems
Flowchart – Section 65 Offence
Computer Source Code Exists
↓
Legally Required to be Preserved
↓
Intentional Alteration/Destruction
↓
Tampering Established
↓
Punishment under Section 65
Link with Bharatiya Nyaya Sanhita (BNS), 2023
Although BNS does not use the term “source code”, electronic records are recognised as property, and tampering may attract the following provisions:
✅ Section 324 BNS – Mischief causing damage to the property
If tampering causes wrongful loss or damage to digital systems, it may amount to mischief.
✅ Section 316 BNS – Criminal breach of trust
If a person entrusted with system access destroys source code dishonestly.
✅ Section 336 BNS – Forgery of electronic record
If tampering is done to falsify electronic records.
✅ Section 318 BNS – Cheating
If tampering is done to obtain wrongful gain.
Electronic records are legally recognised as property, therefore destruction attracts criminal liability.
Doctrine Applied
👉 IT Act = Special law
👉 BNS = General law
Legal principle:
Special law prevails, but general law supplements.
Thus, prosecution may occur under both statutes depending on consequences.
Flowchart – Interaction of IT Act and BNS
Tampering with Source Code
↓
Offence under Section 65 IT Act
↓
Causes wrongful loss/public damage?
↓
Yes → BNS provisions also apply
↓
Dual criminal liability possible
Judicial Perspective
State of Tamil Nadu v. Suhas Katti (2004)
Facts:
The accused misused digital platforms and tampered with electronic communication to harass a woman online.
Issue:
Whether electronic tampering attracts liability under the IT Act.
Judgment:
The court recognised electronic misconduct as punishable under the IT Act and emphasised protection of digital integrity.
📌 Significance: First conviction under IT Act; validated cyber offence framework.
Avnish Bajaj v. State (Bazee.com Case, 2005)
Facts:
Illegal material was circulated through an online platform.
Issue:
Liability of intermediaries and digital systems.
Judgment:
The court stressed accountability in electronic environments and recognised the importance of safeguarding digital infrastructure.
📌 Significance: Reinforced legal responsibility in cyberspace.
Anvar P.V. v. P.K. Basheer (2014)
Relevance:
Supreme Court emphasised integrity of electronic records and strict compliance with digital evidence safeguards.
📌 Supports rationale behind Section 65. Critical Analysis Challenges in enforcing Section 65: Difficulty proving intention, Technical forensic complexity, Jurisdiction issues, Rapid software evolution, Overlap with general criminal law. However, its importance grows with increasing cyber dependency.
Conclusion
Section 65 of the IT Act provides a specialised framework to punish tampering with computer source documents, ensuring digital security and evidentiary reliability. When such acts cause broader harm, provisions of the Bharatiya Nyaya Sanhita may apply simultaneously. Together, these laws create a dual-layered protection system safeguarding India’s digital infrastructure.
Section 65 functions as a special cyber safeguard, while BNS ensures broader criminal accountability, creating a comprehensive legal shield against digital sabotage.
Comments
Post a Comment