BACK TO IT ACT
IT Act 2000

Section 29

Access to Computers and Data

THE STATUTE

Original Text

(1) Notwithstanding anything contained in any other law for the time being in force, the Controller or any person authorised by him shall, if he has reasonable cause to suspect that any contravention of the provisions of this Act, rules or regulations made thereunder has been or is being or is about to be committed, have access to any computer system, any apparatus, data or any other material connected with such system, for the purpose of searching or causing a search to be made for obtaining any information or data contained in or available to such computer system. (2) For the purposes of sub-section (1), any person in charge of, or otherwise concerned with the operation of a computer system shall, on being asked, provide reasonable technical and other assistance to the Controller or any person authorised by him.

Simplified

Section 29 is the practical access power that makes Section 28's investigatory framework operational. Where Section 28 imports Income-tax Act search and seizure powers (which apply to physical premises and documents), Section 29 specifically addresses the digital dimension: access to computer systems, apparatus, data, and connected material. The access power is triggered by 'reasonable cause to suspect' a contravention has been, is being, or is about to be committed — a forward-looking threshold that allows access before a contravention is complete, enabling preventive action against a CA that appears to be about to issue fraudulent certificates. The phrase 'notwithstanding anything contained in any other law' in Section 29(1) overrides potentially conflicting provisions in other legislation, including provisions that might otherwise protect the confidentiality of computer systems or data. This override is necessary because a Certifying Authority will operate computer systems containing sensitive subscriber data and cryptographic key material — Section 29 ensures that these confidentiality interests cannot be used to obstruct a legitimate regulatory investigation. Section 29(2) creates an affirmative duty to cooperate: any person in charge of or concerned with a computer system must provide 'reasonable technical and other assistance' to the Controller or authorised officer. This duty to assist is critical in investigations involving complex technical systems where the investigator may not have the technical knowledge to navigate the system without operator assistance.

Legal Evolution

Section 29 was in the original IT Act 2000. The duty to provide technical assistance in Section 29(2) anticipates the complexity of investigating PKI and cryptographic systems — a CA's HSM, key generation systems, and certificate databases require specialist knowledge to access and interpret.

Key Amendments

Unchanged since the original IT Act 2000.