Category of Bare Act | Name of the Act | Year of Promulgation |
---|---|---|
Criminal Laws | Indian Penal Code | 1860 |
Act Number | Enactment Date | Chapter Number |
45 | 06.10.1860 | 1 |
Chapter Title | Sub-Chapter | Legislated by |
Introduction | - | Parliament of India |
1[The provisions of this Code apply also to any offence committed by—
2[(1) any citizen of India in any place without and beyond India;
(2) any person on any ship or aircraft registered in India wherever it may be.]
3[(3) any person in any place without and beyond India committing offence targeting a computer resource located in India.]
4[Explanation.—In this section—
(a) the word “offence” includes every act committed outside India which, if committed in India, would be punishable under this Code;
(b) the expression “computer resource” shall have the meaning assigned to it in clause (k) of sub-section (1) of section 2 of the Information Technology Act, 2000 (21 of 2000);]
___________________________________________________
1. Subs. by Act 4 of 1898, s. 2, for section 4.
2. Subs. by the A.O. 1950, for cls. (1) to (4).
3. Ins. by Act 10 of 2009, s. 51 (w.e.f. 27-10-2009).
4. Subs. by s. 51, ibid., for the Explanation (w.e.f. 27-10-2009).
5. Subs. by Act 36 of 1957, s. 3 and Schedule II, for “lllustrations”
6. The brackets and letter “(a)” omitted by s. 3 and the Second Sch., ibid.
7. Subs. by the A.O. 1948, for “a coolie, who is a Native Indian subject”
8. Subs. by the A.O. 1950, for “a British subject of Indian domicile”.
9. The words “British India” have been successively amended by the A.O. 1948, the A.O. 1950 and Act 3 of 1951, s. 3 and the Sch., to read as above.
10. Illustrations (b), (c) and (d) omitted by the A.O. 1950.
Offence Description | Punishment provided | Cognizable/Non-Cognizable |
---|---|---|
- | - | - |
Bailable/Non-Bailable | Trial Court Details | Compoundable/Non-Compoundable |
- | - | Non-Compoundable |
Compoundable by Whom | Concerned Ministry | Concerned Department |
Non-Compoundable | Ministry of Home Affairs | Department of Internal Security |