top of page

Information Technology Act 2000 Section 65

IT Act Section 65 defines tampering with computer source documents as a punishable offence under cyber law.

Information Technology Act Section 65 addresses the offence of tampering with computer source documents. This section criminalises the intentional alteration, destruction, or concealment of source codes used for computer programmes. It aims to protect the integrity and authenticity of digital information and software.

In today's digital environment, source codes are vital for software functioning and security. Tampering with them can lead to software malfunction, data breaches, and cybercrimes. This section safeguards users, businesses, and law enforcement by penalising such malicious acts, ensuring trust in digital systems.

Information Technology Act Section 65 – Exact Provision

This provision criminalises deliberate acts of tampering with computer source codes. It focuses on intentional concealment, destruction, or alteration with the purpose of causing damage. The punishment includes imprisonment, fines, or both, reflecting the seriousness of compromising software integrity.

  • Targets intentional tampering with source code.

  • Applies to concealment, destruction, or alteration.

  • Requires intent to cause damage.

  • Prescribes imprisonment up to three years.

  • Allows fines up to two lakh rupees or both penalties.

Explanation of Information Technology Act Section 65

This section prohibits deliberate interference with computer source codes that underpin software programmes.

  • States that knowingly or intentionally tampering with source code is an offence.

  • Applies to individuals who handle or have access to computer source documents.

  • Triggered when source code is concealed, destroyed, or altered.

  • Legal criteria include intent to cause damage or harm.

  • Allows prosecution of hackers, insiders, or any person causing damage.

  • Prohibits unauthorised modification or destruction of source code.

Purpose and Rationale of IT Act Section 65

The section aims to protect the integrity of software and digital systems by preventing malicious tampering with source codes.

  • Protects users and businesses from software sabotage.

  • Prevents cybercrimes involving source code manipulation.

  • Ensures secure and reliable electronic transactions.

  • Regulates responsible behaviour in digital environments.

When IT Act Section 65 Applies

This section applies when there is intentional tampering with source code that causes or intends to cause damage.

  • When source code is altered, concealed, or destroyed.

  • Applicable to programmers, employees, hackers, or third parties.

  • Invoked by affected parties or law enforcement agencies.

  • Requires evidence of intent and digital proof of tampering.

  • Relevant to computer programmes and software systems.

  • Exceptions may include authorised modifications or lawful access.

Legal Effect of IT Act Section 65

This section creates a criminal offence for tampering with source codes, restricting unauthorised interference with software integrity. It imposes penalties including imprisonment and fines. It complements other laws like the Indian Penal Code for offences such as forgery or cheating when digital manipulation is involved.

  • Creates criminal liability for source code tampering.

  • Penalties include imprisonment up to three years and fines.

  • Protects software developers and users from damage.

Nature of Offence or Liability under IT Act Section 65

The offence under this section is criminal and cognizable. It involves intentional acts causing damage to computer programmes. Arrest may be made without warrant due to the serious nature of the offence.

  • Criminal liability for intentional tampering.

  • Cognizable offence enabling police investigation.

  • Arrest can be made without warrant.

  • Focus on protecting digital infrastructure.

Stage of Proceedings Where IT Act Section 65 Applies

This section is relevant during investigation, evidence collection, complaint filing, trial, and appeal stages in cybercrime cases involving source code tampering.

  • Investigation includes digital forensics and logs.

  • Collection of electronic evidence like altered source files.

  • Filing of complaints by affected parties or authorities.

  • Trial in appropriate courts with cybercrime jurisdiction.

  • Appeals follow standard criminal procedure.

Penalties and Consequences under IT Act Section 65

Violators face imprisonment up to three years, fines up to two lakh rupees, or both. Corporate entities may also be held liable if involved. Intermediaries must ensure source code security to avoid liability. Compensation claims may arise from damages caused.

  • Imprisonment up to three years.

  • Fine up to two lakh rupees.

  • Corporate and intermediary liability possible.

  • Compensation for damages may be claimed.

Example of IT Act Section 65 in Practical Use

X is a software developer who intentionally alters the source code of a company’s financial application to manipulate transaction records. The tampering causes financial loss and data corruption. The company files a complaint under Section 65. Investigation reveals the altered source code and intent. X is prosecuted and punished under this section.

  • Intentional source code tampering detected and penalised.

  • Protects companies from internal sabotage and fraud.

Historical Background of IT Act Section 65

The IT Act 2000 was introduced to regulate electronic commerce and address emerging cybercrimes. Section 65 was included to criminalise source code tampering, a threat to software security. The 2008 Amendment reinforced cyber offence provisions. Interpretation has evolved with technological advancements.

  • Introduced to secure digital transactions and software.

  • Amended in 2008 to strengthen cybercrime laws.

  • Interpretation adapts to new cyber threats.

Modern Relevance of IT Act Section 65

In 2026, cybersecurity and data protection are critical. Source code integrity is essential for fintech, digital identity, and online services. Section 65 supports enforcement against cyber sabotage. Challenges include evolving hacking techniques and ensuring online safety.

  • Supports digital evidence collection and prosecution.

  • Enhances online safety and trust.

  • Addresses enforcement challenges with new technologies.

Related Sections

  • IT Act Section 43 – Penalty for unauthorised access and data theft.

  • IT Act Section 66 – Computer-related offences.

  • IT Act Section 66F – Cyber terrorism.

  • IPC Section 420 – Cheating, relevant for online fraud.

  • Evidence Act Section 65B – Admissibility of electronic evidence.

  • CrPC Section 91 – Summons for digital records or documents.

Case References under IT Act Section 65

No landmark case directly interprets this section as of 2026.

Key Facts Summary for IT Act Section 65

  • Section: 65

  • Title: Tampering with Computer Source Documents

  • Category: Cybercrime, Digital Integrity

  • Applies To: Programmers, hackers, insiders, companies

  • Stage: Investigation, Trial, Appeal

  • Legal Effect: Criminal offence with imprisonment and fines

  • Penalties: Up to 3 years imprisonment, fine up to 2 lakh rupees

Conclusion on IT Act Section 65

Section 65 of the Information Technology Act 2000 plays a vital role in protecting the integrity of computer source codes. By criminalising intentional tampering, it safeguards software systems from malicious damage that can disrupt businesses and harm users. This legal provision is essential in maintaining trust in digital technologies.

As cyber threats evolve, Section 65 remains relevant for enforcing cybersecurity and deterring sabotage. It complements other cybercrime laws and supports law enforcement in prosecuting offenders. Users, companies, and intermediaries benefit from this protection, ensuring a safer digital environment.

FAQs on IT Act Section 65

What is considered tampering under Section 65?

Tampering includes intentional concealment, destruction, or alteration of computer source code with the intent to cause damage. It covers any unauthorised modification that affects software integrity.

Who can be held liable under Section 65?

Any individual or entity, including programmers, employees, hackers, or companies, can be held liable if they knowingly tamper with source code intending to cause damage.

What penalties does Section 65 prescribe?

Penalties include imprisonment up to three years, fines up to two lakh rupees, or both. Corporate liability may also apply if the offence involves a company.

Is intent required to prosecute under Section 65?

Yes, the prosecution must prove that the tampering was done knowingly and intentionally with the purpose of causing damage.

How does Section 65 protect software users?

By criminalising source code tampering, it ensures software reliability and security, protecting users from fraud, data loss, and system failures caused by malicious alterations.

Related Sections

Detailed analysis of Central Goods and Services Tax Act, 2017 Section 133 on search and seizure procedures under GST law.

Understand the legal status of Forex Broker Services (FBS) in India, including regulations and enforcement details.

Esports are legal in India with certain regulations and no specific bans, allowing you to participate and organize esports events.

IPC Section 174A addresses the punishment for negligent conduct with respect to dangerous weapons or explosives, ensuring public safety.

Uniform Civil Code is currently not legal in India but may be implemented by Parliament under Article 44 of the Constitution.

Understand the legality of port scanning in India, including laws, exceptions, and enforcement practices.

Discover the legal status of Betwinner in India, including regulations, enforcement, and common misunderstandings about online betting.

Income Tax Act Section 115JD deals with special provisions for tax on income of specified undertakings in the business of developing Special Economic Zones.

Companies Act 2013 Section 126 governs the procedure for service of documents to shareholders.

Understand the legal status of accessing Pornhub in India, including restrictions, enforcement, and common misconceptions.

Hookah is conditionally legal in India with restrictions on public use, age limits, and licensing under state laws.

Contract Act 1872 Section 35 covers contracts contingent on uncertain events and their enforceability.

Evidence Act 1872 Section 49 defines the admissibility of expert opinion to assist courts in understanding complex facts.

Understand the history and current status of abortion legality in India, including early abortion laws and their enforcement.

Capuchin monkeys are illegal to own or trade in India under wildlife protection laws.

Section 186 of the Income Tax Act 1961 regulates loans and advances by companies and firms in India.

CPC Section 19 details the procedure for transferring suits from one court to another for convenience or justice.

CrPC Section 209 mandates the committal of cases to a Sessions Court after preliminary inquiry by a Magistrate.

Negotiable Instruments Act, 1881 Section 19 explains the liability of parties in case of dishonour due to non-acceptance of bills of exchange.

Negotiable Instruments Act, 1881 Section 49 explains the liability of the acceptor of a bill of exchange upon dishonour by non-acceptance.

Negotiable Instruments Act, 1881 Section 7 defines the term 'holder' and explains who qualifies as a holder of a negotiable instrument.

IPC Section 296 addresses the offence of voluntarily causing disturbance to a religious assembly or procession.

Rivers are not legal entities in India but are protected under environmental laws and public trust doctrine.

Hymenoplasty is legal in India but regulated with ethical and medical guidelines. Consent and privacy are crucial for lawful practice.

Explore the legal age and rules for betting in India, including exceptions and enforcement realities.

Blueberry Markets is not officially regulated in India; trading is possible but with risks due to lack of local regulation.

Negotiable Instruments Act, 1881 Section 122 defines the term 'holder' and explains who is entitled to possess and enforce negotiable instruments.

bottom of page