<Tr> <Td> 66 </Td> <Td> Hacking with computer system </Td> <Td> If a person with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hack . </Td> <Td> Imprisonment up to three years, or / and with fine up to ₹ 500,000 </Td> </Tr> <Tr> <Td> 66B </Td> <Td> Receiving stolen computer or communication device </Td> <Td> A person receives or retains a computer resource or communication device which is known to be stolen or the person has reason to believe is stolen . </Td> <Td> Imprisonment up to three years, or / and with fine up to ₹ 100,000 </Td> </Tr> <Tr> <Td> 66C </Td> <Td> Using password of another person </Td> <Td> A person fradulently uses the password, digital signature or other unique identification of another person . </Td> <Td> Imprisonment up to three years, or / and with fine up to ₹ 100,000 </Td> </Tr> <Tr> <Td> 66D </Td> <Td> Cheating using computer resource </Td> <Td> If a person cheats someone using a computer resource or communication . </Td> <Td> Imprisonment up to three years, or / and with fine up to ₹ 100,000 </Td> </Tr>

Under which section the state government may make rules to carry out provisions of itact