top of page

Information Technology Act 2000 Section 65

IT Act Section 65 defines tampering with computer source documents as a punishable offence under cyber law.

Information Technology Act Section 65 addresses the offence of tampering with computer source documents. This section criminalises the intentional alteration, destruction, or concealment of source codes used for computer programmes. It aims to protect the integrity and authenticity of digital information and software.

In today's digital environment, source codes are vital for software functioning and security. Tampering with them can lead to software malfunction, data breaches, and cybercrimes. This section safeguards users, businesses, and law enforcement by penalising such malicious acts, ensuring trust in digital systems.

Information Technology Act Section 65 – Exact Provision

This provision criminalises deliberate acts of tampering with computer source codes. It focuses on intentional concealment, destruction, or alteration with the purpose of causing damage. The punishment includes imprisonment, fines, or both, reflecting the seriousness of compromising software integrity.

  • Targets intentional tampering with source code.

  • Applies to concealment, destruction, or alteration.

  • Requires intent to cause damage.

  • Prescribes imprisonment up to three years.

  • Allows fines up to two lakh rupees or both penalties.

Explanation of Information Technology Act Section 65

This section prohibits deliberate interference with computer source codes that underpin software programmes.

  • States that knowingly or intentionally tampering with source code is an offence.

  • Applies to individuals who handle or have access to computer source documents.

  • Triggered when source code is concealed, destroyed, or altered.

  • Legal criteria include intent to cause damage or harm.

  • Allows prosecution of hackers, insiders, or any person causing damage.

  • Prohibits unauthorised modification or destruction of source code.

Purpose and Rationale of IT Act Section 65

The section aims to protect the integrity of software and digital systems by preventing malicious tampering with source codes.

  • Protects users and businesses from software sabotage.

  • Prevents cybercrimes involving source code manipulation.

  • Ensures secure and reliable electronic transactions.

  • Regulates responsible behaviour in digital environments.

When IT Act Section 65 Applies

This section applies when there is intentional tampering with source code that causes or intends to cause damage.

  • When source code is altered, concealed, or destroyed.

  • Applicable to programmers, employees, hackers, or third parties.

  • Invoked by affected parties or law enforcement agencies.

  • Requires evidence of intent and digital proof of tampering.

  • Relevant to computer programmes and software systems.

  • Exceptions may include authorised modifications or lawful access.

Legal Effect of IT Act Section 65

This section creates a criminal offence for tampering with source codes, restricting unauthorised interference with software integrity. It imposes penalties including imprisonment and fines. It complements other laws like the Indian Penal Code for offences such as forgery or cheating when digital manipulation is involved.

  • Creates criminal liability for source code tampering.

  • Penalties include imprisonment up to three years and fines.

  • Protects software developers and users from damage.

Nature of Offence or Liability under IT Act Section 65

The offence under this section is criminal and cognizable. It involves intentional acts causing damage to computer programmes. Arrest may be made without warrant due to the serious nature of the offence.

  • Criminal liability for intentional tampering.

  • Cognizable offence enabling police investigation.

  • Arrest can be made without warrant.

  • Focus on protecting digital infrastructure.

Stage of Proceedings Where IT Act Section 65 Applies

This section is relevant during investigation, evidence collection, complaint filing, trial, and appeal stages in cybercrime cases involving source code tampering.

  • Investigation includes digital forensics and logs.

  • Collection of electronic evidence like altered source files.

  • Filing of complaints by affected parties or authorities.

  • Trial in appropriate courts with cybercrime jurisdiction.

  • Appeals follow standard criminal procedure.

Penalties and Consequences under IT Act Section 65

Violators face imprisonment up to three years, fines up to two lakh rupees, or both. Corporate entities may also be held liable if involved. Intermediaries must ensure source code security to avoid liability. Compensation claims may arise from damages caused.

  • Imprisonment up to three years.

  • Fine up to two lakh rupees.

  • Corporate and intermediary liability possible.

  • Compensation for damages may be claimed.

Example of IT Act Section 65 in Practical Use

X is a software developer who intentionally alters the source code of a company’s financial application to manipulate transaction records. The tampering causes financial loss and data corruption. The company files a complaint under Section 65. Investigation reveals the altered source code and intent. X is prosecuted and punished under this section.

  • Intentional source code tampering detected and penalised.

  • Protects companies from internal sabotage and fraud.

Historical Background of IT Act Section 65

The IT Act 2000 was introduced to regulate electronic commerce and address emerging cybercrimes. Section 65 was included to criminalise source code tampering, a threat to software security. The 2008 Amendment reinforced cyber offence provisions. Interpretation has evolved with technological advancements.

  • Introduced to secure digital transactions and software.

  • Amended in 2008 to strengthen cybercrime laws.

  • Interpretation adapts to new cyber threats.

Modern Relevance of IT Act Section 65

In 2026, cybersecurity and data protection are critical. Source code integrity is essential for fintech, digital identity, and online services. Section 65 supports enforcement against cyber sabotage. Challenges include evolving hacking techniques and ensuring online safety.

  • Supports digital evidence collection and prosecution.

  • Enhances online safety and trust.

  • Addresses enforcement challenges with new technologies.

Related Sections

  • IT Act Section 43 – Penalty for unauthorised access and data theft.

  • IT Act Section 66 – Computer-related offences.

  • IT Act Section 66F – Cyber terrorism.

  • IPC Section 420 – Cheating, relevant for online fraud.

  • Evidence Act Section 65B – Admissibility of electronic evidence.

  • CrPC Section 91 – Summons for digital records or documents.

Case References under IT Act Section 65

No landmark case directly interprets this section as of 2026.

Key Facts Summary for IT Act Section 65

  • Section: 65

  • Title: Tampering with Computer Source Documents

  • Category: Cybercrime, Digital Integrity

  • Applies To: Programmers, hackers, insiders, companies

  • Stage: Investigation, Trial, Appeal

  • Legal Effect: Criminal offence with imprisonment and fines

  • Penalties: Up to 3 years imprisonment, fine up to 2 lakh rupees

Conclusion on IT Act Section 65

Section 65 of the Information Technology Act 2000 plays a vital role in protecting the integrity of computer source codes. By criminalising intentional tampering, it safeguards software systems from malicious damage that can disrupt businesses and harm users. This legal provision is essential in maintaining trust in digital technologies.

As cyber threats evolve, Section 65 remains relevant for enforcing cybersecurity and deterring sabotage. It complements other cybercrime laws and supports law enforcement in prosecuting offenders. Users, companies, and intermediaries benefit from this protection, ensuring a safer digital environment.

FAQs on IT Act Section 65

What is considered tampering under Section 65?

Tampering includes intentional concealment, destruction, or alteration of computer source code with the intent to cause damage. It covers any unauthorised modification that affects software integrity.

Who can be held liable under Section 65?

Any individual or entity, including programmers, employees, hackers, or companies, can be held liable if they knowingly tamper with source code intending to cause damage.

What penalties does Section 65 prescribe?

Penalties include imprisonment up to three years, fines up to two lakh rupees, or both. Corporate liability may also apply if the offence involves a company.

Is intent required to prosecute under Section 65?

Yes, the prosecution must prove that the tampering was done knowingly and intentionally with the purpose of causing damage.

How does Section 65 protect software users?

By criminalising source code tampering, it ensures software reliability and security, protecting users from fraud, data loss, and system failures caused by malicious alterations.

Related Sections

Companies Act 2013 Section 210 governs the power of the Tribunal to grant relief in cases of oppression and mismanagement.

Evidence Act 1872 Section 90A defines the presumption of genuineness for electronic records, crucial for digital evidence admissibility.

CrPC Section 122 details the procedure for issuing summons to witnesses to ensure their attendance in court proceedings.

IPC Section 489E addresses the offence of counterfeiting currency notes or banknotes, defining its scope and penalties.

Sride is not a recognized legal term or item in India; its legality depends on context and specific usage under Indian law.

In India, second marriage is legal under certain conditions depending on personal laws and marital status.

Negotiable Instruments Act, 1881 Section 85A defines the liability of partners for negotiable instruments signed on behalf of a firm.

Companies Act 2013 Section 446 details the power of the Central Government to compound offences under the Act.

Section 203AA of Income Tax Act 1961 mandates quoting PAN for tax deduction or collection in India.

Negotiable Instruments Act, 1881 Section 30 defines the liability of the acceptor of a bill of exchange upon acceptance.

Consumer Protection Act 2019 Section 67 details penalties for false or misleading advertisements to protect consumers from deceptive practices.

IPC Section 258 penalizes public servants who intentionally disobey the law to cause injury to any person.

Section 194DA of the Income Tax Act 1961 mandates TDS on payments from life insurance policy maturity in India.

Companies Act 2013 Section 417 governs the power of the Central Government to appoint inspectors for company investigations.

Income Tax Act Section 71B allows carry forward and set off of losses from house property for tax relief.

Group marriage is not legally recognized in India; only monogamous marriages under personal laws are valid.

Omegle is legal in India but subject to strict regulations and monitoring due to privacy and safety concerns.

Understand the legal status of Hawala in India, its regulations, and enforcement realities.

Understand the legality of Modicare in India, its regulatory status, and consumer protections.

IPC Section 51 defines the punishment for disobedience to an order lawfully promulgated by a public servant.

IPC Section 456 defines lurking house-trespass or house-breaking by night, focusing on unlawful entry with intent to commit an offence.

CrPC Section 275 details the procedure for the disposal of property seized during a criminal investigation.

Understand the legality of pornography watching in India, including age restrictions, enforcement, and common misconceptions.

Understand the legality of assignment of tenancy rights in India, including rules, restrictions, and enforcement practices.

IPC Section 305 addresses abetment of suicide by a child or insane person, outlining punishment and legal scope.

Understand the legality of bait and switch advertising in India, its enforcement, and common misconceptions.

Companies Act 2013 Section 407 governs appeals to the National Company Law Appellate Tribunal (NCLAT) against NCLT orders.

bottom of page