Blog : Theft of Confidential Information

Theft of Confidential Information

Written by Rohas Nagpal
Friday, 16 April 2010 12:46 - Last Updated Monday, 19 April 2010 09:11
Most business organizations store their sensitive information in computer systems. This
information is targeted by rivals, criminals and sometimes disgruntled employees.
Scenario 1:
A business rival obtains the information (e.g. tender quotations, business plans etc) using
hacking or social engineering. He then uses the information for the benefit of his own business
(e.g. quoting lower rates for the tender).
Usual motives: Illegal financial gain.
Applicable law (Before 27 October, 2009): Sections 43 & 66 of the Information Technology
Act and section 426 of Indian Penal Code.
Applicable law (After 27 October, 2009): Sections 43, 66 & 66B of the Information Technology
Act and section 426 of Indian Penal Code.
Scenario 2:
A criminal obtains the information by hacking or social engineering and threatens to make the
information public unless the victim pays him some money.
Usual motives: Illegal financial gain.
Applicable law (Before 27 October, 2009): Sections 43 & 66 of the Information Technology
Act and section 384 of Indian Penal Code.
Applicable law (After 27 October, 2009): Sections 43, 66 & 66B of the Information Technology
Act and section 384 of Indian Penal Code.
Scenario 3:
1 / 2
Theft of Confidential Information
Written by Rohas Nagpal
Friday, 16 April 2010 12:46 - Last Updated Monday, 19 April 2010 09:11
A disgruntled employee steals the information and mass mails it to the victim’s rivals and also
posts it to numerous websites and newsgroups.
Usual motives: Revenge.
Applicable law (Before 27 October, 2009): Sections 43 and 66 of the Information Technology
Act and section 426 of Indian Penal Code.
Applicable law (After 27 October, 2009): Sections 43, 66, 66B of the Information Technology
Act and section 426 of Indian Penal Code.